Pg 4 Flashcards

1
Q

Which of the following allows for the attribution of messages to individuals?

A. Adaptive identity
B. Non-repudiation
C. Authentication
D. Access logs

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

A. Automation
B. Compliance checklist
C. Attestation
D. Manual audit

A

Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

A. SCAP
B. NetFlow
C. Antivirus
D. DLP

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization recently updated its security policy to include the following statement:
Regular expressions are included in source code to remove special characters such as $, |, ;. &, `, and ? from variables set by forms in a web application.
Which of the following best explains the security technique the organization adopted by making this addition to the policy?

A. Identify embedded keys
B. Code debugging
C. Input validation
D. Static code analysis

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message. Which of the following should the analyst do?

A. Place posters around the office to raise awareness of common phishing activities.
B. Implement email security filters to prevent phishing emails from being delivered.
C. Update the EDR policies to block automatic execution of downloaded programs.
D. Create additional training for users to recognize the signs of phishing attempts.

A

Update the EDR policies to block automatic execution of downloaded programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

A. Compensating control
B. Network segmentation
C. Transfer of risk
D. SNMP traps

A

Compensating control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The management team notices that new accounts that are set up manually do not always have correct access or permissions.
Which of the following automation techniques should a systems administrator use to streamline account creation?

A. Guard rail script
B. Ticketing workflow
C. Escalation script
D. User provisioning script

A

User provisioning script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?

A. Corrective
B. Preventive
C. Detective
D. Deterrent

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A systems administrator is looking for a low-cost application-hosting solution that is cloud-based. Which of the following meets these requirements?

A. Serverless framework
B. Type 1 hypervisor
C. SD-WAN
D. SDN

A

Serverless framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security operations center determines that the malicious activity detected on a server is normal. Which of the following activities describes the act of ignoring detected activity in the future?

A. Tuning
B. Aggregating
C. Quarantining
D. Archiving

A

Tuning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?

A. Clustering servers
B. Geographic dispersion
C. Load balancers
D. Off-site backups

A

Geographic dispersion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a primary security concern for a company setting up a BYOD program?

A. End of life
B. Buffer overflow
C. VM escape
D. Jailbreaking

A

Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks.
Which of the following analysis elements did the company most likely use in making this decision?

A. MTTR
B. RTO
C. ARO
D. MTBF

A

ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the most likely to be included as an element of communication in a security awareness program?

A. Reporting phishing attempts or other suspicious activities
B. Detecting insider threats using anomalous behavior recognition
C. Verifying information when modifying wire transfer data
D. Performing social engineering as part of third-party penetration testing

A

Reporting phishing attempts or other suspicious activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?

A. Preparation
B. Recovery
C. Lessons learned
D. Analysis

A

Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After a recent vulnerability scan, a security engineer needs to harden the routers within the corporate network. Which of the following is the most appropriate to disable?

A. Console access
B. Routing protocols
C. VLANs
D. Web-based administration

A

Web-based administration

17
Q

A security administrator needs a method to secure data in an environment that includes some form of checks so track any changes. Which of the following should the administrator set up to achieve this goal?

A. SPF
B. GPO
C. NAC
D. FIM