Pg 29 Flashcards
An engineer needs to ensure that a script has not been modified before it is launched. Which of the following best provides this functionality?
A. Masking
B. Obfuscation
C. Hashing
D. Encryption
Hashing
Which of the following is the most important element when defining effective security governance?
A. Discovering and documenting external considerations
B. Developing procedures for employee onboarding and offboarding
C. Assigning roles and responsibilities for owners, controllers, and custodians
D. Defining and monitoring change management procedures
Assigning roles and responsibilities for owners, controllers, and custodians
A contractor is required to visually inspect the motherboards of all new servers that are purchased to determine whether the servers were tampered with. Which of the following risks is the contractor attempting to mitigate?
A. Embedded rootkit
B. Supply chain
C. Firmware failure
D. RFID keylogger
Supply chain
Which of the following could potentially be introduced at the time of side loading?
A. User impersonation
B. Rootkit
C. On-path attack
D. Buffer overflow
Rootkit
While a school district is performing state testing, a security analyst notices all internet services are unavailable. The analyst discovers that ARP poisoning is occurring on the network and then terminates access for the host. Which of the following is most likely responsible for this malicious activity?
A. Unskilled attacker
B. Shadow IT
C. Insider threat
D. Nation-state
Shadow IT
A user needs to complete training at https://comptiatraining.com. After manually entering the URL, the user sees that the accessed website is noticeably different from the standard company website. Which of the following is the most likely explanation for the difference?
A. Cross-site scripting
B. Pretexting
C. Typosquatting
D. Vishing
TypoSquatting
A company has yearly engagements with a service provider. The general terms and conditions are the same for all engagements. The company wants to simplify the process and revisit the general terms every three years. Which of the following documents would provide the best way to set the general terms?
A. MSA
B. NDA
C. MOU
D. SLA
MSA
Topic 1
While updating the security awareness training, a security analyst wants to address issues created if vendors’ email accounts are compromised. Which of the following recommendations should the security analyst include in the training?
A. Refrain from clicking on images included in emails from new vendors
B. Delete emails from unknown service provider partners.
C. Require that invoices be sent as attachments
D. Be alert to unexpected requests from familiar email addresse
Be alert to unexpected requests from familiar email addresse
A new corporate policy requires all staff to use multifactor authentication to access company resources. Which of the following can be utilized to set up this form of identity and access management? (Choose two.)
A. Authentication tokens
B. Least privilege
C. Biometrics
D. LDAP
E. Password vaulting
F. SAML
Authentication tokens
Biometrics
A help desk employee receives a call from someone impersonating the Chief Executive Officer. The caller asks for assistance with resetting a password. Which of the following best describes this event?
A. Vishing
B. Hacktivism
C. Blackmail
D. Misinformation
Vishing
The number of tickets the help desk has been receiving has increased recently due to numerous false-positive phishing reports. Which of the following would be best to help to reduce the false positives?
A. Performing more phishing simulation campaigns
B. Improving security awareness training
C. Hiring more help desk staff
D. Implementing an incident reporting web page
Improving security awareness training
An organization that handles sensitive information wants to protect the information by using a reversible technology. Which of the following best satisfies this requirement?
A. Hardware security module
B. Hashing algorithm
C. Tokenization
D. Steganography
Tokenization
A systems administrator needs to encrypt all data on employee laptops. Which of the following encryption levels should be implemented?
A. Volume
B. Partition
C. Full disk
D. File
Full disk
Which of the following actions best addresses a vulnerability found on a company’s web server?
A. Patching
B. Segmentation
C. Decommissioning
D. Monitoring
Patching
A company is changing its mobile device policy. The company has the following requirements:
- Company-owned devices
- Ability to harden the devices
- Reduced security risk
- Compatibility with company resources
Which of the following would best meet these requirements?
A. BYOD
B. CYOD
C. COPE
D. COBO
COBO
A company is concerned about employees unintentionally introducing malware into the network. The company identified fifty employees who clicked on a link embedded in an email sent by the internal IT department. Which of the following should the company implement to best improve its security posture?
A. Social engineering training
B. SPF configuration
C. Simulated phishing campaign
D. Insider threat awareness
Simulated phishing campaign
A penetration test identifies that an SMBv1 is enabled on multiple servers across an organization. The organization wants to remediate this vulnerability in the most efficient way possible. Which of the following should the organization use for this purpose?
A. GPO
B. ACL
C. SFTP
D. DLP
GPO
Topic 1
Which of the following best protects sensitive data in transit across a geographically dispersed infrastructure?
A. Encryption
B. Masking
C. Tokenization
D. Obfuscation
Encryption
As part of new compliance audit requirements, multiple servers need to be segmented on different networks and should be reachable only from authorized internal systems. Which of the following would meet the requirements?
A. Configure firewall rules to block external access to Internal resources.
B. Set up a WAP to allow internal access from public networks.
C. Implement a new IPSec tunnel from internal resources.
D. Deploy an internal jump server to access resources.
Configure firewall rules to block external access to Internal resources.
Which of the following activities should be performed first to compile a list of vulnerabilities in an environment?
A. Automated scanning
B. Penetration testing
C. Threat hunting
D. Log aggregation
E. Adversarial emulation
Automated scanning
Which of the following can be used to mitigate attacks from high-risk regions?
A. Obfuscation
B. Data sovereignty
C. IP geolocation
D. Encryption
IP geolocation