Pg 29 Flashcards

1
Q

An engineer needs to ensure that a script has not been modified before it is launched. Which of the following best provides this functionality?

A. Masking
B. Obfuscation
C. Hashing
D. Encryption

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the most important element when defining effective security governance?

A. Discovering and documenting external considerations
B. Developing procedures for employee onboarding and offboarding
C. Assigning roles and responsibilities for owners, controllers, and custodians
D. Defining and monitoring change management procedures

A

Assigning roles and responsibilities for owners, controllers, and custodians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A contractor is required to visually inspect the motherboards of all new servers that are purchased to determine whether the servers were tampered with. Which of the following risks is the contractor attempting to mitigate?

A. Embedded rootkit
B. Supply chain
C. Firmware failure
D. RFID keylogger

A

Supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following could potentially be introduced at the time of side loading?

A. User impersonation
B. Rootkit
C. On-path attack
D. Buffer overflow

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

While a school district is performing state testing, a security analyst notices all internet services are unavailable. The analyst discovers that ARP poisoning is occurring on the network and then terminates access for the host. Which of the following is most likely responsible for this malicious activity?

A. Unskilled attacker
B. Shadow IT
C. Insider threat
D. Nation-state

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user needs to complete training at https://comptiatraining.com. After manually entering the URL, the user sees that the accessed website is noticeably different from the standard company website. Which of the following is the most likely explanation for the difference?

A. Cross-site scripting
B. Pretexting
C. Typosquatting
D. Vishing

A

TypoSquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company has yearly engagements with a service provider. The general terms and conditions are the same for all engagements. The company wants to simplify the process and revisit the general terms every three years. Which of the following documents would provide the best way to set the general terms?

A. MSA
B. NDA
C. MOU
D. SLA

A

MSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Topic 1
While updating the security awareness training, a security analyst wants to address issues created if vendors’ email accounts are compromised. Which of the following recommendations should the security analyst include in the training?

A. Refrain from clicking on images included in emails from new vendors
B. Delete emails from unknown service provider partners.
C. Require that invoices be sent as attachments
D. Be alert to unexpected requests from familiar email addresse

A

Be alert to unexpected requests from familiar email addresse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A new corporate policy requires all staff to use multifactor authentication to access company resources. Which of the following can be utilized to set up this form of identity and access management? (Choose two.)

A. Authentication tokens
B. Least privilege
C. Biometrics
D. LDAP
E. Password vaulting
F. SAML

A

Authentication tokens
Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A help desk employee receives a call from someone impersonating the Chief Executive Officer. The caller asks for assistance with resetting a password. Which of the following best describes this event?

A. Vishing
B. Hacktivism
C. Blackmail
D. Misinformation

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The number of tickets the help desk has been receiving has increased recently due to numerous false-positive phishing reports. Which of the following would be best to help to reduce the false positives?

A. Performing more phishing simulation campaigns
B. Improving security awareness training
C. Hiring more help desk staff
D. Implementing an incident reporting web page

A

Improving security awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization that handles sensitive information wants to protect the information by using a reversible technology. Which of the following best satisfies this requirement?

A. Hardware security module
B. Hashing algorithm
C. Tokenization
D. Steganography

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A systems administrator needs to encrypt all data on employee laptops. Which of the following encryption levels should be implemented?

A. Volume
B. Partition
C. Full disk
D. File

A

Full disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following actions best addresses a vulnerability found on a company’s web server?

A. Patching
B. Segmentation
C. Decommissioning
D. Monitoring

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company is changing its mobile device policy. The company has the following requirements:

  • Company-owned devices
  • Ability to harden the devices
  • Reduced security risk
  • Compatibility with company resources

Which of the following would best meet these requirements?

A. BYOD
B. CYOD
C. COPE
D. COBO

A

COBO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company is concerned about employees unintentionally introducing malware into the network. The company identified fifty employees who clicked on a link embedded in an email sent by the internal IT department. Which of the following should the company implement to best improve its security posture?

A. Social engineering training
B. SPF configuration
C. Simulated phishing campaign
D. Insider threat awareness

A

Simulated phishing campaign

17
Q

A penetration test identifies that an SMBv1 is enabled on multiple servers across an organization. The organization wants to remediate this vulnerability in the most efficient way possible. Which of the following should the organization use for this purpose?

A. GPO
B. ACL
C. SFTP
D. DLP

18
Q

Topic 1
Which of the following best protects sensitive data in transit across a geographically dispersed infrastructure?

A. Encryption
B. Masking
C. Tokenization
D. Obfuscation

A

Encryption

19
Q

As part of new compliance audit requirements, multiple servers need to be segmented on different networks and should be reachable only from authorized internal systems. Which of the following would meet the requirements?

A. Configure firewall rules to block external access to Internal resources.
B. Set up a WAP to allow internal access from public networks.
C. Implement a new IPSec tunnel from internal resources.
D. Deploy an internal jump server to access resources.

A

Configure firewall rules to block external access to Internal resources.

20
Q

Which of the following activities should be performed first to compile a list of vulnerabilities in an environment?

A. Automated scanning
B. Penetration testing
C. Threat hunting
D. Log aggregation
E. Adversarial emulation

A

Automated scanning

21
Q

Which of the following can be used to mitigate attacks from high-risk regions?

A. Obfuscation
B. Data sovereignty
C. IP geolocation
D. Encryption

A

IP geolocation