Pg 24 Flashcards

1
Q

Topic 1
A systems administrator is reviewing the VPN logs and notices that during non-working hours a user is accessing the company file server and information is being transferred to a suspicious IP address. Which of the following threats is most likely occurring?

A. Typosquatting
B. Root or trust
C. Data exfiltration
D. Blackmail

A

Data exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company discovers suspicious transactions that were entered into the company’s database and attached to a user account that was created as a trap for malicious activity. Which of the following is the user account an example of?

A. Honeytoken
B. Honeynet
C. Honeypot
D. Honeyfile

A

Honeytoken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network engineer is increasing the overall security of network devices and needs to harden the devices. Which of the following will best accomplish this task?

A. Configuring centralized logging
B. Generating local administrator accounts
C. Replacing Telnet with SSH
D. Enabling HTTP administration

A

Replacing Telnet with SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company’s accounting department receives an urgent payment message from the company’s bank domain with instructions to wire transfer funds. The sender requests that the transfer be completed as soon as possible. Which of the following attacks is described?

A. Business email compromise
B. Vishing
C. Spear phishing
D. Impersonation

A

Business email compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company filed a complaint with its IT service provider after the company discovered the service provider’s external audit team had access to some of the company’s confidential information. Which of the following is the most likely reason the company filed the complaint?

A. The MOU had basic clauses from a template.
B. A SOW had not been agreed to by the client.
C. A WO had not been mutually approved.
D. A required NDA had not been signed.

A

A required NDA had not been signed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?

A. Destruction
B. Certification
C. Retention
D. Sanitization

A

Retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An analyst is reviewing job postings to ensure sensitive company information is not being shared with the general public. Which of the following is the analyst most likely looking for?

A. Office addresses
B. Software versions
C. List of board members
D. Government identification numbers

A

List of board members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An engineer has ensured that the switches are using the latest OS, the servers have the latest patches, and the endpoints’ definitions are up to date. Which of the following will these actions most effectively prevent?

A. Zero-day attacks
B. Insider threats
C. End-of-life support
D. Known exploits

A

Known exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is most likely a security concern when installing and using low-cost IoT devices in infrastructure environments?

A. Country of origin
B. Device responsiveness
C. Ease of deployment
D. Storage of data

A

Storage of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company captures log-in details and reviews them each week to identify conditions such as excessive log-in attempts and frequent lockouts. Which of the following should a security analyst recommend to improve security compliance monitoring?

A. Including the date and person who reviewed the information in a report
B. Adding automated alerting when anomalies occur
C. Requiring a statement each week that no exceptions were noted
D. Masking the username in a report to protect privacy

A

Adding automated alerting when anomalies occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security team is in the process of hardening the network against externally crafted malicious packets. Which of the following is the most secure method to protect the internal network?

A. Anti-malware solutions
B. Host-based firewalls
C. Intrusion prevention systems
D. Network access control
E. Network allow list

A

Intrusion prevention systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the best way to prevent an unauthorized user from plugging a laptop into an employee’s phone network port and then using tools to scan for database servers?

A. MAC filtering
B. Segmentation
C. Certification
D. Isolation

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following should a systems administrator use to decrease the company’s hardware attack surface?

A. Replication
B. Isolation
C. Centralization
D. Virtualization

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company wants to add an MFA solution for all employees who access the corporate network remotely. Log-in requirements include something you know, are, and have. The company wants a solution that does not require purchasing third-party applications or specialized hardware. Which of the following MFA solutions would best meet the company’s requirements?

A. Smart card with PIN and password
B. Security questions and a one-time passcode sent via email
C. Voice and fingerprint verification with an SMS one-time passcode
D. Mobile application-generated, one-time passcode with facial recognition

A

Mobile application-generated, one-time passcode with facial recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company is using a legacy FTP server to transfer financial data to a third party. The legacy system does not support SFTP, so a compensating control is needed to protect the sensitive, financial data in transit. Which of the following would be the most appropriate for the company to use?

A. Telnet connection
B. SSH tunneling
C. Patch installation
D. Full disk encryption

A

SSH tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A security manager wants to reduce the number of steps required to identify and contain basic threats. Which of the following will help achieve this goal?

A. SOAR
B. SIEM
C. DMARC
D. NIDS

17
Q

The Chief Information Officer (CIO) asked a vendor to provide documentation detailing the specific objectives within the compliance framework that the vendor’s services meet. The vendor provided a report and a signed letter stating that the services meet 17 of the 21 objectives. Which of the following did the vendor provide to the CIO?

A. Penetration test results
B. Self-assessment findings
C. Attestation of compliance
D. Third-party audit report

A

Attestation of compliance

18
Q

Which of the following describes the most effective way to address OS vulnerabilities after they are identified?

A. Endpoint protection
B. Removal of unnecessary software
C. Configuration enforcement
D. Patching

19
Q

The management team reports that employees are missing features on company-provided tablets, which is causing productivity issues. The management team directs the IT team to resolve the issue within 48 hours. Which of the following would be the best solution for the IT team to leverage in this scenario?

A. EDR
B. COPE
C. MDM
D. FDE