Pg 19 Flashcards
Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?
A. Deploy a SIEM solution
B. Create custom scripts to aggregate and analyze logs.
C. Implement EDR technology.
D. Install a unified threat management appliance.
Deploy a SIEM solution
Topic 1
A new security regulation was announced that will take effect in the coming year. A company must comply with it to remain in business. Which of the following activities should the company perform next?
A. Gap analysis
B. Policy review
C. Security procedure evaluation
D. Threat scope reduction
Gap analysis
An accountant is transferring information to a bank over FTP. Which of the following mitigations should the accountant use to protect the confidentiality of the data?
A. Tokenization
B. Data masking
C. Encryption
D. Obfuscation
Encryption
An organization has recently decided to implement SSO. The requirements are to leverage access tokens and focus on application authorization rather than user authentication. Which of the following solutions would the engineering team most likely configure?
A. LDAP
B. Federation
C. SAML
D. OAuth
OAuth
Which of the following would most likely be used by attackers to perform credential harvesting?
A. Social engineering
B. Supply chain compromise
C. Third-party software
D. Rainbow table
Social engineering
A security engineer would like to enhance the use of automation and orchestration within the SIEM. Which of the following would be the primary benefit of this enhancement?
A. It increases complexity.
B. It removes technical debt.
C. It adds additional guard rails.
D. It acts as a workforce multiplier.
It acts as a workforce multiplier
Which of the following data states applies to data that is being actively processed by a database server?
A. In use
B. At rest
C. In transit
D. Being hashed
In use
Which of the following architectures is most suitable to provide redundancy for critical business processes?
A. Network-enabled
B. Server-side
C. Cloud-native
D. Multitenant
Cloud-native
After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?
A. Bluetooth
B. Wired
C. NFC
D. SCADA
Wired
An organization issued new laptops to all employees and wants to provide web filtering both in and out of the office without configuring additional access to the network. Which of the following types of web filtering should a systems administrator configure?
A. Agent-based
B. Centralized proxy
C. URL scanning
D. Content categorization
Agent-based
Which of the following should be used to aggregate log data in order to create alerts and detect anomalous activity?
A. SIEM
B. WAF
C. Network taps
D. IDS
SIEM
Which of the following provides the best protection against unwanted or insecure communications to and from a device?
A. System hardening
B. Host-based firewall
C. Intrusion detection system
D. Anti-malware software
Host-based firewall
Which of the following is the primary purpose of a service that tracks log-ins and time spent using the service?
A. Availability
B. Accounting
C. Authentication
D. Authorization
Accounting
An employee who was working remotely lost a mobile device containing company data. Which of the following provides the best solution to prevent future data loss?
A. MDM
B. DLP
C. FDE
D. EDR
MDM
An IT administrator needs to ensure data retention standards are implemented on an enterprise application. Which of the following describes the administrator’s role?
A. Processor
B. Custodian
C. Privacy officer
D. Owner
Custodian
A company plans to secure its systems by:
- Preventing users from sending sensitive data over corporate email
- Restricting access to potentially harmful websites
Which of the following features should the company set up? (Choose two.)
A. DLP software
B. DNS filtering
C. File integrity monitoring
D. Stateful firewall
E. Guardrails
F. Antivirus signatures
A. DLP software
B. DNS filtering
A company processes and stores sensitive data on its own systems. Which of the following steps should the company take first to ensure compliance with privacy regulations?
A. Implement access controls and encryption.
B. Develop and provide training on data protection policies.
C. Create incident response and disaster recovery plans.
D. Purchase and install security software.
Implement access controls and encryption.
Topic 1
Which of the following cryptographic methods is preferred for securing communications with limited computing resources?
A. Hashing algorithm
B. Public key infrastructure
C. Symmetric encryption
D. Elliptic curve cryptography
Symmetric encryption