+Practice Flashcards
A company has hired a third-party to gather information about the company’s servers and data. This third-party will not have direct access to the company’s internal network, but they can gather information from any other source. Which of the following would BEST describe this approach?
Passive reconnaissance.
A company’s email server has received an email from a third-party, but the origination server does not match the list of authorized devices. Which of the following would determine the disposition of this message?
DMARC (Domain-based Message Authentication Reporting, and Conformance)
Which of these threat actors would be MOST likely to attack systems for direct financial gain?
Organized crime.
A security administrator has examined a server recently compromised by an attacker, and has determined the system was exploited due to a known operating system vulnerability. Which of the following would BEST describe this finding?
Root cause analysis.
A city is building an ambulance service network for emergency medical dispatching. Which of the following should have the highest priority?
System availability.
A system administrator receives a text alert when access rights are changed on a database containing private customer information. Which of the following would describe this alert?
Automation.
A security administrator is concerned about the potential for data exfiltration using external storage drives. Which of the following would be the BEST way to prevent this method of data exfiltration?
Create an operating system security policy to block the use of removable media.
A company creates a standard set of government reports each calendar quarter. Which of the following would describe this type of data?
Regulated.
An insurance company has created a set of policies to handle data breaches. The security team has been given this set of requirements based on these policies:
* Access records from all devices must be saved and archived
* Any data access outside of normal working hours must be immediately reported
* Data access must only occur inside of the country
* Access logs and audit reports must be created from a single database
Which of the following should be implemented by the security team to meet these requirements? (Select THREE)
Restrict login access by IP address and GPS location. Consolidate all logs on a SIEM. Enable time-of-day restrictions on the authentication server.
A security engineer is viewing this record from the firewall logs:
UTC 04/05/2023 03:09:15809 AV Gateway Alert 136.127.92.171 80 -> 10.16.10.14 60818
Gateway Anti-Virus Alert: XPACK.A_7854 (Trojan) blocked.
Which of the following can be observed from this log information?
A download was blocked from a web server.
A user connects to a third-party website and receives this message: Your connection is not private. NET::ERR_CERT_INVALID
Which of the following attacks would be the MOST likely reason for this message?
On-path.
Which of the following would be the BEST way to provide a website login using existing credentials from a third-party site?
Federation.
A system administrator is working on a contract that will specify a minimum required uptime for a set of Internet facing firewalls. The administrator needs to know how often the firewall hardware is expected to fail between repairs. Which of the following would BEST describe this information?
MTBF. (Mean Time Between Failures)
An attacker calls into a company’s help desk and pretends to be the director of the company’s manufacturing department. The attacker states that they have forgotten their password and they need to have the password reset quickly for an important meeting. What kind of attack would BEST describe this phone call?
Social engineering.
Two companies have been working together for a number of months, and they would now like to qualify their partnership with a broad formal agreement between both organizations. Which of the following would describe this agreement?
MOA (Memorandum of Agreement).
Which of the following would explain why a company would automatically add a digital signature to each outgoing email message?
Integrity.
The embedded OS in a company’s time clock appliance is configured to reset the file system and reboot when a file system error occurs. On one of the time clocks, this file system error occurs during the startup process and causes the system to constantly reboot. Which of the following BEST describes this issue?
Race condition.
A recent audit has found that existing password policies do not include any restrictions on password attempts, and users are not required to periodically change their passwords. Which of the following would correct these policy issues? (Select TWO)
Password expiration. Account lockout.
What kind of security control is associated with a login banner?
Deterrent.
An internal audit has discovered four servers that have not been updated in over a year, and it will take two weeks to test and deploy the latest patches. Which of the following would be the best way to quickly respond to this situation in the meantime?
Move the servers to a protected segment.
A business manager is documenting a set of steps for processing orders if the primary Internet connection fails. Which of these would BEST describe these steps?
Continuity of operations.
A company would like to examine the credentials of each individual entering the data center building. Which of the following would BEST facilitate this requirement?
Access control vestibule.
A company stores some employee information in encrypted form, but other public details are stored as plaintext. Which of the following would BEST describe this encryption strategy?
Record.
A company would like to minimize database corruption if power is lost to a server. Which of the following would be the BEST strategy to follow?
Journaling.