Pg 26 Flashcards

1
Q

Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?

A. Risk assessment
B. Risk identification
C. Risk treatment
D. Risk monitoring and review

A

Risk identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company’s website is www.company.com. Attackers purchased the domain www.c0mpany.com. Which of the following types of attacks describes this example?

A. Typosquatting
B. Brand impersonation
C. On-path
D. Watering-hole

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following allows a systems administrator to tune permissions for a file?

A. Patching
B. Access control list
C. Configuration enforcement
D. Least privilege

A

Access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would be the greatest concern for a company that is aware of the consequences of non-compliance with government regulations?

A. Right to be forgotten
B. Sanctions
C. External compliance reporting
D. Attestation

A

Sanctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?

A. Authorization
B. Identification
C. Non-repudiation
D. Authentication

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A growing organization, which hosts an externally accessible application, adds multiple virtual servers to improve application performance and decrease the resource usage on individual servers. Which of the following solutions is the organization most likely to employ to further increase performance and availability?

A. Load balancer
B. Jump server
C. Proxy server
D. SD-WAN

A

Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?

A. Impersonation
B. Replication
C. Phishing
D. Smishing

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security engineer at a large company needs to enhance IAM in order to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?

A. Role-based
B. Time-of-day restrictions
C. Least privilege
D. Biometric authentication

A

Time-of-day restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company wants to ensure employees are allowed to copy files from a virtual desktop during the workday but are restricted during non-working hours. Which of the following security measures should the company set up?

A. Digital rights management
B. Role-based access control
C. Time-based access control
D. Network access control

A

Role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?

A. SLA
B. BPA
C. NDA
D. MOA

A

NDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A systems administrator just purchased multiple network devices. Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?

A. Install endpoint protection.
B. Disable ports/protocols.
C. Change default passwords.
D. Remove unnecessary software.

A

Change default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A CVE in a key back-end component of an application has been disclosed. The systems administrator is identifying all of the systems in the environment that are susceptible to this risk. Which of the following should the systems administrator perform?

A. Packet capture
B. Vulnerability scan
C. Metadata analysis
D. Automated reporting

A

Vulnerability scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following activities uses OSINT?

A. Social engineering testing
B. Data analysis of logs
C. Collecting evidence of malicious activity
D. Producing IOC for malicious artifacts

A

Social engineering testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are the best security controls for controlling on-premises access? (Choose two.)

A. Swipe card
B. Picture ID
C. Phone authentication application
D. Biometric scanner
E. Camera
F. Memorable question

A

Swipe card
Biometric scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?

A. Threshold
B. Appetite
C. Avoidance
D. Register

A

Appetite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is the act of proving to a customer that software developers are trained on secure coding?

A. Assurance
B. Contract
C. Due diligence
D. Attestation

A

Attestation

17
Q

An administrator is creating a secure method for a contractor to access a test environment. Which of the following would provide the contractor with the best access to the test environment?

A. Application server
B. Jump server
C. RDP server
D. Proxy server

A

Jump server

18
Q

A security analyst notices unusual behavior on the network. The IDS on the network was not able to detect the activities. Which of the following should the security analyst use to help the IDS detect such attacks in the future?

A. Signatures
B. Trends
C. Honeypot
D. Reputation

A

Signatures

19
Q

To which of the following security categories does an EDR solution belong?

A. Physical
B. Operational
C. Managerial
D. Technical

20
Q

A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company’s reliance on open-source libraries?

A. Buffer overflow
B. SQL injection
C. Cross-site scripting
D. Zero-day