Multiple Choice 3 Flashcards
Which of the following would be the BEST method for creating a detailed diagram of wireless
access points and hotspots?
Footprinting
Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them.
Which of the following will MOST likely adversely impact the operations of unpatched traditional
programmable-logic controllers, running a back-end LAMP server and OT systems with human-
management interfaces that are accessible over the Internet via a web interface? (Choose two.)
Weak encryption & Server-side request forgery
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or
damaged corporate-owned mobile devices. Which of the following technologies would be BEST
to balance the BYOD culture while also protecting the company’s data?
Containerization
You cannot run a Full Disk Encryption on a Staff’s Device. Rather you place the official
application in a container.
A Chief Security Office’s (CSO’s) key priorities are to improve preparation, response, and
recovery practices to minimize system downtime and enhance organizational resilience to
ransomware attacks. Which of the following would BEST meet the CSO’s objectives?
Implement application whitelisting and centralized event-log management, and perform regular
testing and validation of full backups.
A network engineer has been asked to investigate why several wireless barcode scanners and
wireless computers in a warehouse have intermittent connectivity to the shipping server. The
barcode scanners and computers are all on forklift trucks and move around the warehouse during
their regular use. Which of the following should the engineer do to determine the issue? (Choose
two.)
Perform a site survey & Create a heat map
Heat map; a graphical representation of cyber risk data
A security administrator suspects an employee has been emailing proprietary information to a
competitor. Company policy requires the administrator to capture an exact copy of the
employee’s hard disk. Which of the following should the administrator use?
dd
duplicate disk/data dump show sources
DD file is a disk image file and replica of a hard disk drive
Which of the following is MOST likely to outline the roles and responsibilities of data controllers
and data processors?
GDPR
Phishing and spear-phishing attacks have been occurring more frequently against a company’s
staff. Which of the following would MOST likely help mitigate this issue?
Exact mail exchanger records in the DNS
A Mail Exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient’s domain
On which of the following is the live acquisition of data for forensic analysis MOST dependent?
(Choose two.)
Value and volatility of data & Right-to-audit clauses
Data volatility measures how quickly data disappears from a system
A right to audit clause entitles your organization to review your vendor’s work product and reporting
Which of the following incident response steps involves actions to protect critical systems while
maintaining business operations?
Containment
A security auditor is reviewing vulnerability scan data provided by an internal security team.
Which of the following BEST indicates that valid credentials were used?
The scan enumerated software versions of installed programs
Enumeration is defined as a process which establishes an active connection to the target hosts to discover potential attack vectors in the system
Which of the following BEST explains the difference between a data owner and a data custodian?
The data owner is responsible for determining how the data may be used, while the data
custodian is responsible for implementing the protection to the data
A network engineer needs to build a solution that will allow guests at the company’s headquarters
to access the Internet via WiFi. This solution should not allow access to the internal corporate
network, but it should require guests to sign off on the acceptable use policy before accessing the
Internet. Which of the following should the engineer employ to meet these requirements?
Install a captive portal
A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives
against loss or data theft. Which of the following would be the MOST acceptable?
SED
Self-Encrypting Devices
A security analyst receives a SIEM alert that someone logged in to the appadmin test account,
which is only used for the early detection of attacks. The security analyst then reviews the
following application log:
Which of the following can the security analyst conclude?
(SIEM) Security Information and Event Management
An injection attack is being conducted against a user authentication system.
An injection flaw is a vulnerability which allows an attacker to relay malicious code through an application to another system