Pg 26 Flashcards
Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?
A. Risk assessment
B. Risk identification
C. Risk treatment
D. Risk monitoring and review
Risk identification
A company’s website is www.company.com. Attackers purchased the domain www.c0mpany.com. Which of the following types of attacks describes this example?
A. Typosquatting
B. Brand impersonation
C. On-path
D. Watering-hole
Typosquatting
Which of the following allows a systems administrator to tune permissions for a file?
A. Patching
B. Access control list
C. Configuration enforcement
D. Least privilege
Access control list
Which of the following would be the greatest concern for a company that is aware of the consequences of non-compliance with government regulations?
A. Right to be forgotten
B. Sanctions
C. External compliance reporting
D. Attestation
Sanctions
Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?
A. Authorization
B. Identification
C. Non-repudiation
D. Authentication
Authorization
A growing organization, which hosts an externally accessible application, adds multiple virtual servers to improve application performance and decrease the resource usage on individual servers. Which of the following solutions is the organization most likely to employ to further increase performance and availability?
A. Load balancer
B. Jump server
C. Proxy server
D. SD-WAN
Load balancer
A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?
A. Impersonation
B. Replication
C. Phishing
D. Smishing
Phishing
A security engineer at a large company needs to enhance IAM in order to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?
A. Role-based
B. Time-of-day restrictions
C. Least privilege
D. Biometric authentication
Time-of-day restrictions
A company wants to ensure employees are allowed to copy files from a virtual desktop during the workday but are restricted during non-working hours. Which of the following security measures should the company set up?
A. Digital rights management
B. Role-based access control
C. Time-based access control
D. Network access control
Role-based access control
Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?
A. SLA
B. BPA
C. NDA
D. MOA
NDA
A systems administrator just purchased multiple network devices. Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?
A. Install endpoint protection.
B. Disable ports/protocols.
C. Change default passwords.
D. Remove unnecessary software.
Change default passwords
A CVE in a key back-end component of an application has been disclosed. The systems administrator is identifying all of the systems in the environment that are susceptible to this risk. Which of the following should the systems administrator perform?
A. Packet capture
B. Vulnerability scan
C. Metadata analysis
D. Automated reporting
Vulnerability scan
Which of the following activities uses OSINT?
A. Social engineering testing
B. Data analysis of logs
C. Collecting evidence of malicious activity
D. Producing IOC for malicious artifacts
Social engineering testing
Which of the following are the best security controls for controlling on-premises access? (Choose two.)
A. Swipe card
B. Picture ID
C. Phone authentication application
D. Biometric scanner
E. Camera
F. Memorable question
Swipe card
Biometric scanner
A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?
A. Threshold
B. Appetite
C. Avoidance
D. Register
Appetite
Which of the following is the act of proving to a customer that software developers are trained on secure coding?
A. Assurance
B. Contract
C. Due diligence
D. Attestation
Attestation
An administrator is creating a secure method for a contractor to access a test environment. Which of the following would provide the contractor with the best access to the test environment?
A. Application server
B. Jump server
C. RDP server
D. Proxy server
Jump server
A security analyst notices unusual behavior on the network. The IDS on the network was not able to detect the activities. Which of the following should the security analyst use to help the IDS detect such attacks in the future?
A. Signatures
B. Trends
C. Honeypot
D. Reputation
Signatures
To which of the following security categories does an EDR solution belong?
A. Physical
B. Operational
C. Managerial
D. Technical
Technical
A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company’s reliance on open-source libraries?
A. Buffer overflow
B. SQL injection
C. Cross-site scripting
D. Zero-day
Zero Day