Pg 19 Flashcards

1
Q

Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?

A. Deploy a SIEM solution
B. Create custom scripts to aggregate and analyze logs.
C. Implement EDR technology.
D. Install a unified threat management appliance.

A

Deploy a SIEM solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Topic 1
A new security regulation was announced that will take effect in the coming year. A company must comply with it to remain in business. Which of the following activities should the company perform next?

A. Gap analysis
B. Policy review
C. Security procedure evaluation
D. Threat scope reduction

A

Gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An accountant is transferring information to a bank over FTP. Which of the following mitigations should the accountant use to protect the confidentiality of the data?

A. Tokenization
B. Data masking
C. Encryption
D. Obfuscation

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization has recently decided to implement SSO. The requirements are to leverage access tokens and focus on application authorization rather than user authentication. Which of the following solutions would the engineering team most likely configure?

A. LDAP
B. Federation
C. SAML
D. OAuth

A

OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following would most likely be used by attackers to perform credential harvesting?

A. Social engineering
B. Supply chain compromise
C. Third-party software
D. Rainbow table

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security engineer would like to enhance the use of automation and orchestration within the SIEM. Which of the following would be the primary benefit of this enhancement?

A. It increases complexity.
B. It removes technical debt.
C. It adds additional guard rails.
D. It acts as a workforce multiplier.

A

It acts as a workforce multiplier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following data states applies to data that is being actively processed by a database server?

A. In use
B. At rest
C. In transit
D. Being hashed

A

In use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following architectures is most suitable to provide redundancy for critical business processes?

A. Network-enabled
B. Server-side
C. Cloud-native
D. Multitenant

A

Cloud-native

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

A. Bluetooth
B. Wired
C. NFC
D. SCADA

A

Wired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An organization issued new laptops to all employees and wants to provide web filtering both in and out of the office without configuring additional access to the network. Which of the following types of web filtering should a systems administrator configure?

A. Agent-based
B. Centralized proxy
C. URL scanning
D. Content categorization

A

Agent-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following should be used to aggregate log data in order to create alerts and detect anomalous activity?

A. SIEM
B. WAF
C. Network taps
D. IDS

A

SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following provides the best protection against unwanted or insecure communications to and from a device?

A. System hardening
B. Host-based firewall
C. Intrusion detection system
D. Anti-malware software

A

Host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the primary purpose of a service that tracks log-ins and time spent using the service?

A. Availability
B. Accounting
C. Authentication
D. Authorization

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An employee who was working remotely lost a mobile device containing company data. Which of the following provides the best solution to prevent future data loss?

A. MDM
B. DLP
C. FDE
D. EDR

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An IT administrator needs to ensure data retention standards are implemented on an enterprise application. Which of the following describes the administrator’s role?

A. Processor
B. Custodian
C. Privacy officer
D. Owner

A

Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company plans to secure its systems by:

  • Preventing users from sending sensitive data over corporate email
  • Restricting access to potentially harmful websites

Which of the following features should the company set up? (Choose two.)

A. DLP software
B. DNS filtering
C. File integrity monitoring
D. Stateful firewall
E. Guardrails
F. Antivirus signatures

A

A. DLP software
B. DNS filtering

17
Q

A company processes and stores sensitive data on its own systems. Which of the following steps should the company take first to ensure compliance with privacy regulations?

A. Implement access controls and encryption.
B. Develop and provide training on data protection policies.
C. Create incident response and disaster recovery plans.
D. Purchase and install security software.

A

Implement access controls and encryption.

18
Q

Topic 1
Which of the following cryptographic methods is preferred for securing communications with limited computing resources?

A. Hashing algorithm
B. Public key infrastructure
C. Symmetric encryption
D. Elliptic curve cryptography

A

Symmetric encryption