Pg 24 Flashcards
Topic 1
A systems administrator is reviewing the VPN logs and notices that during non-working hours a user is accessing the company file server and information is being transferred to a suspicious IP address. Which of the following threats is most likely occurring?
A. Typosquatting
B. Root or trust
C. Data exfiltration
D. Blackmail
Data exfiltration
A company discovers suspicious transactions that were entered into the company’s database and attached to a user account that was created as a trap for malicious activity. Which of the following is the user account an example of?
A. Honeytoken
B. Honeynet
C. Honeypot
D. Honeyfile
Honeytoken
A network engineer is increasing the overall security of network devices and needs to harden the devices. Which of the following will best accomplish this task?
A. Configuring centralized logging
B. Generating local administrator accounts
C. Replacing Telnet with SSH
D. Enabling HTTP administration
Replacing Telnet with SSH
A company’s accounting department receives an urgent payment message from the company’s bank domain with instructions to wire transfer funds. The sender requests that the transfer be completed as soon as possible. Which of the following attacks is described?
A. Business email compromise
B. Vishing
C. Spear phishing
D. Impersonation
Business email compromise
A company filed a complaint with its IT service provider after the company discovered the service provider’s external audit team had access to some of the company’s confidential information. Which of the following is the most likely reason the company filed the complaint?
A. The MOU had basic clauses from a template.
B. A SOW had not been agreed to by the client.
C. A WO had not been mutually approved.
D. A required NDA had not been signed.
A required NDA had not been signed.
Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?
A. Destruction
B. Certification
C. Retention
D. Sanitization
Retention
An analyst is reviewing job postings to ensure sensitive company information is not being shared with the general public. Which of the following is the analyst most likely looking for?
A. Office addresses
B. Software versions
C. List of board members
D. Government identification numbers
List of board members
An engineer has ensured that the switches are using the latest OS, the servers have the latest patches, and the endpoints’ definitions are up to date. Which of the following will these actions most effectively prevent?
A. Zero-day attacks
B. Insider threats
C. End-of-life support
D. Known exploits
Known exploits
Which of the following is most likely a security concern when installing and using low-cost IoT devices in infrastructure environments?
A. Country of origin
B. Device responsiveness
C. Ease of deployment
D. Storage of data
Storage of data
A company captures log-in details and reviews them each week to identify conditions such as excessive log-in attempts and frequent lockouts. Which of the following should a security analyst recommend to improve security compliance monitoring?
A. Including the date and person who reviewed the information in a report
B. Adding automated alerting when anomalies occur
C. Requiring a statement each week that no exceptions were noted
D. Masking the username in a report to protect privacy
Adding automated alerting when anomalies occur
A security team is in the process of hardening the network against externally crafted malicious packets. Which of the following is the most secure method to protect the internal network?
A. Anti-malware solutions
B. Host-based firewalls
C. Intrusion prevention systems
D. Network access control
E. Network allow list
Intrusion prevention systems
Which of the following is the best way to prevent an unauthorized user from plugging a laptop into an employee’s phone network port and then using tools to scan for database servers?
A. MAC filtering
B. Segmentation
C. Certification
D. Isolation
MAC filtering
Which of the following should a systems administrator use to decrease the company’s hardware attack surface?
A. Replication
B. Isolation
C. Centralization
D. Virtualization
Virtualization
A company wants to add an MFA solution for all employees who access the corporate network remotely. Log-in requirements include something you know, are, and have. The company wants a solution that does not require purchasing third-party applications or specialized hardware. Which of the following MFA solutions would best meet the company’s requirements?
A. Smart card with PIN and password
B. Security questions and a one-time passcode sent via email
C. Voice and fingerprint verification with an SMS one-time passcode
D. Mobile application-generated, one-time passcode with facial recognition
Mobile application-generated, one-time passcode with facial recognition
A company is using a legacy FTP server to transfer financial data to a third party. The legacy system does not support SFTP, so a compensating control is needed to protect the sensitive, financial data in transit. Which of the following would be the most appropriate for the company to use?
A. Telnet connection
B. SSH tunneling
C. Patch installation
D. Full disk encryption
SSH tunneling
A security manager wants to reduce the number of steps required to identify and contain basic threats. Which of the following will help achieve this goal?
A. SOAR
B. SIEM
C. DMARC
D. NIDS
SOAR
The Chief Information Officer (CIO) asked a vendor to provide documentation detailing the specific objectives within the compliance framework that the vendor’s services meet. The vendor provided a report and a signed letter stating that the services meet 17 of the 21 objectives. Which of the following did the vendor provide to the CIO?
A. Penetration test results
B. Self-assessment findings
C. Attestation of compliance
D. Third-party audit report
Attestation of compliance
Which of the following describes the most effective way to address OS vulnerabilities after they are identified?
A. Endpoint protection
B. Removal of unnecessary software
C. Configuration enforcement
D. Patching
Patching
The management team reports that employees are missing features on company-provided tablets, which is causing productivity issues. The management team directs the IT team to resolve the issue within 48 hours. Which of the following would be the best solution for the IT team to leverage in this scenario?
A. EDR
B. COPE
C. MDM
D. FDE
MDM