Pocket Prep Flashcards
A SaaS company has a product that they are periodically patching, making modifications to, and offering customer support. What phase of the SDLC is their product in?
A Planning
B Training and transition
C Operations and maintenance
D Coding
C Operations and maintenance =Correct Answer
A company is considering decentralizing its IT infrastructure by moving to a hybrid cloud environment. Which of the following are some unique considerations they need to address when adopting this type of model over other types of cloud models?
A Cloud governance and management
B Resiliency and disaster recovery
C Latency and synchronization
D Data privacy and security
C Latency and synchronization=Correct Answer
A company is considering decentralizing its IT infrastructure by moving to a hybrid cloud environment. Which of the following are some unique considerations they need to address when adopting this type of model over other types of cloud models?
A Cloud governance and management
B Resiliency and disaster recovery
C Latency and synchronization
D Data privacy and security
C Latency and synchronization=Correct Answe
Which vulnerability emerges when a cloud service provider does not properly sanitize disks before provisioning them to new clients?
VM escape
Legacy
Resource reuse
VM sprawl
Resource reuse=Correct Answer
A mobile device manufacturer is creating new prototypes and wants to ensure that the devices are not taken off-premises. Which method to secure the devices would alert administrators if a device leaves the building?
A Geofencing
B Tokenization
C Obfuscation
D Encryption
A Geofencing=Correct Answer
Which of the following techniques is difficult to perform effectively since it involves stripping all PII from a user’s record?
A Tokenization
B Anonymization
C Data masking
D Data minimization
B Anonymization=Correct Answer
You are working remotely at a local coffee shop and go to log in to the wireless network. You are presented with a new web browser window that has just popped open, prompting you to accept an agreement before signing on to the free Wi-Fi.
What technology have you just encountered?
A Captive porta
B Jammer
C Sandbox
D Deauther
A Captive porta=Correct Answer
Sloan Financial is moving toward a work-from-home model, as these have been shown to increase employee satisfaction. They want to permit their employees access to the network from over the internet in their homes.
Of the following, which is a connection between two or more computers NOT on the same private network?
A Proxy server
B Switch
C VPN
D Firewall
C VPN=Correct Answer
An organization has recently deployed their comprehensive security plan to provide protection or mitigation for the majority of discovered and documented risks. At this point, the risks that were too difficult to protect and not likely enough to happen were left without much in the way of mitigation.
What is the term given to this risk that still remains?
A Inherent risk
B Transferred risk
C Avoided risk
D Residual risk
D Residual risk=Correct Answer
Diffie-Hellman (DH) provides a solution for someone who wants to securely exchange encryption keys for primary communications but needs to do it in a way that prevents eavesdroppers from obtaining the key. The process DH uses to prevent the key from being obtained involves creating temporary public and private keys that expire after a set time.
What type of keys are these?
A Ephemeral
B Dynamic
C Static
D Self-destructive
A Ephemeral=Correct Answer
Which of the following test techniques requires the tester to do the MOST research?
A Partially known environment
B Unknown environment
C Known environment
D Mostly known environment
B Unknown environment=Correct Answer
An organization is looking to select a preventative control to defend the perimeter of their network. Which type of solution would be MOST effective for this?
A IDS
B Log analyzer
C SIEM
D Firewall
D Firewall=Correct Answer
An advertising firm wants to use the services of a 3D animation firm to help make commercials. To make arrangements, they need to draft a contract. What department should check the contract to ensure that it is ethical and lawful?
A Legal
B Marketing
C IT
D HR
A Legal
A company’s web server and mail server are connected to the same switch which is behind a firewall. What type of network are they in?
A Screened subnet
B WAN
C Trusted network
D Air-gapped network
A Screened subnet
While investigating a security incident, researchers discover that foreign attackers have been using custom attack methods and have been lurking on the infected systems for several months.
What type of category would the incident fall into?
A Script kiddie
B Hacktivist
C nsider threat
D APT
D APT
What is the role of stakeholders in the change management process?
A Holding a vested interest in the outcome of the organization’s processes
B Testing a potential change before it is implemented in production systems
C Analyzing the impact of a change to other systems in the organization
D Taking ownership of a change to ensure its successful completion
A Holding a vested interest in the outcome of the organization’s processes
Developers pushing out test functions into the production environment have created some unexpected issues. Executives want to isolate the developers so that they have their own custom environment, which does not interfere with the production environment at all.
Which of the following would assist in this situation?
A Compliance audit
B Sandboxing
C Package monitoring
D Patch management
B Sandboxing
What list is provided by the MITRE Corporation to give security administrators up-to-date information on vulnerabilities?
A TSIG
B TAXII
C CVE
D CVSS
C CVE
A company has its cybersecurity staff perform a proactive penetration test that actively identifies and exploits vulnerabilities. The testers will be given network diagrams as well as user credentials when performing their test.
What type of penetration testing are they doing?
A Defensive, unknown environment
B Offensive, known environment
C Physical, known environment
D Integrated, unknown environment
B Offensive, known environment
Items such as wearable technology, home automation, smart TVs, etc. would be considered which of the following?
A SCADA
B ICS
C SoC
D IoT
D IoT
A company creates healthcare products used in hospitals all over the world. What type of risk appetite would be suitable for them?
A Conservative
B Neutral
C Expansionary
D Aggressive
A Conservative
The various control types and goals cover different areas of an organization’s security posture, and it is important to be familiar with the control types and the goals they seek to accomplish.
Which of the following control goals is intended to reverse the impact of an incident or problem after it has occurred?
A Detective
B Corrective
C Compensating
D Deterrent
B Corrective
Which of the following domains will be covered under the certificate for *.example.com?
A test1.example.com
B test1.www.example.com
C test1.example.org
D www.test1.example.com
A test1.example.com
A company is considering methods to secure data. They want users to only be able to access resources based on their role in the company. What method to secure data addresses this requirement?
A Tokenization
B Obfuscation
C Permission restrictions
D Segmentation
C Permission restrictions