Practice Qs Flashcards

1
Q

What is the most appropriate physical control to mitigate risk?

A

Install locks on Servers & Rack Doors.

*Physical Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To prevent data exfiltration, what Technical Control should be implemented to address issue?

A

Install a Firewall to monitor and control incoming/ outgoing network traffic.

*Technical Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most effective deterrent control to prevent Tailgating?

A

Install more surveillance cameras at all entry points.

*Physical Control (deterrent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A smartphone user wants to gain access to admin functions, what would enable this?

A

Jailbreaking (iPhone) allows the User to have Admin Privileges

Rooting = Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Best way to ensure adherence to the C and I (CIA) in terms of securing data storage?

A

Encrypting stored data.

*Confidentiality and Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which process allows security professionals to identify discrepancies between “current state posture to desired state posture?”

A

Gap Analysis. “How to go from Point A to Point B?”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to mitigate Vehicular attacks?

A

Erecting bollards along the building’s street-facing side

*Physical Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Significant changes to the current Network Infrastructure will always require which step prior to implementing ANY changes?

A

Obtain formal approval for the project from senior management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which team is both Offense (red) and Defense (blue) of testing Networks?

A

Purple team consists of members responsible for both Testing and Securing networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a Security Analyst ensure evidence is handled correctly?

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A secured way to establish a shared secret key for symmetric Encryption - which method should be used to securely exchange the symmetric key?

A

Using an Asymmetric Algorithm such as Diffie-Hellman.

*Asymmetric encryption was invented to pass Symmetric Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A method to protect the Passwords from being exposed in case of a breach. Which Technique is best used to Safeguard passwords in the Database?

A

Hashing. “One way encryption”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network with multiple SSL/ TLS secured devices. Need a mechanism to promptly revoke the trust of a compromised certificate across all devices. What technology is used to maintain a list of REVOKED certificates that can be checked by clients?

A

Certificate Revocation List (CRL). A list of all compromised certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unusual behavior from an Employee who has access to sensitive data. What type of threat actor is the employee mostly categorized as?

A

Insider Threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When employees of a company is tricked by a Fake Website that looks legitimate?

A

Watering-Hole.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to quickly address vulnerabilities found in the Firmware of IoT devices?

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Phone calls with intentions of requesting sensitive information - which technique is most likely used to deceive employees through Phone calls?

A

Vishing (Voice Phishing). A form of Phishing but through Phone Calls.

*Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To identify the creator and creation date of a suspicious file found on a Server, what should a Security Analyst check?

A

File’s Metadata.

1 - Right Click File
2 - Select Properties
3 - Select appropriate Tabs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is “Virtual Machine Escape?”

A

A Security breach where a malicious actor gains control of the Host system from within a VM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does a Company prevent employees from inadvertently installing harmful applications?

A

Implementing an Application Allow list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A malware creating copies of itself and consuming Network resources. What type of attack is this?

A

A Worm attack is known for its ability to self-replicate.

22
Q

Missing Logs from critical devices (firewalls/ IDS) have been missing for several hours - how do you address this?

A

Missing logs can be a sign of a security incident or potential breach of the logging system. The security engineer should investigate the cause of the missing logs and take corrective actions.

*An attacker is removing evidence of his attack by deleting all Log files that would otherwise show proof of the attack/ breach

23
Q

A security measure to control incoming/ outgoing network traffic on EACH server unauthorized access and network based attacks.

A

Host-based Firewall

24
Q

What is On-Premises architecture model for hosting servers and data?

A

Hosting servers and data within physical facilities (onsite).

25
Q

Implementing threat detection mechanism in an ICS (Industrial Controls Systems) used for managing a city’s water treatment plant. What threat detection mechanism is essential for MONITORING / ALERTING suspicious activities in an ICS environment?

A

Intrusion Detection System (IDS).

26
Q

Organization requires a way to MONITOR CHANGES in its network environment. Which systems should be implemented?

A

File Integrity Monitoring (What has changed)

27
Q

How to enhance network security on a Remote Desktop Service accessible from the Internet?

A

Setting up a VPN and Firewall restriction

28
Q

What approach should Amazon implement to achieve high availability DURING PEAK SEASON?

A

Load Balancing. Peak Season = busiest time of the Year.

29
Q

How do you ensure that only authorized devices can connect to the switch ports?

A

Network Access Control (NAC).

30
Q

In order to identify and mitigate potential vulnerabilities in the application’s source code, what technique should be used?

A

Perform static code analysis. Reviewing the actual source code itself for vulnerabilities.

31
Q

In order to maintain an accurate inventory of software licenses within an organization, what actions should be taken to address the issue of expired software licenses being used?

A

Initiate the acquisition/ procurement process for new software licenses.

32
Q

During a Pen Testing engagement, what document outlines the estimated time required for the test?

A

Statement of Work (SOW).

*Scope of Work
*Duration of work

33
Q

What tool/ technology should the security technician rely on to receive real-time security alerts from systems and applications?

A

Security Information and Event Management (SIEM).

*SPLUNK

34
Q

What are the best ways to ensure only authorized personnel can access a secure research facility?

A

Badge Access & Controlled Access vestibule (man-traps).

35
Q

Tech needs to ensure that privileged users have temporary and limited access to sensitive systems when necessary. What privileged access management tool or concept should the security technician implement to grant privileged users temporary and limited access to sensitive systems?

A

Just in time permissions. Something that is Temporary & Limited.

36
Q

What are benefits of automation and orchestration?

A

Cost Reduction. Main focus of automation is to reduce cost.

37
Q

A Tech is investigating a suspected security breach in the organization’s web application. What type of log data source is most likely to contain information about user actions, errors, and events related to the web application?

A

Application Logs.

38
Q

What is most likely to be used in a company to document risks, assign responsible parties, and define thresholds?

A

Maintenance of a Risk Register

39
Q

A Tech notices that an unauthorized device has been used to copy the signals from legitimate RFID tags, allowing unauthorized access to a secure area. What type of physical attack is described in the scenario, and how does it work?

A

Cloning Attack.

40
Q

A Tech has discovered that an attacker has gained access to a network and positioned themselves in a way that allows them to intercept and manipulate network traffic. What type of attack is described in the scenario, and how is the attacker positioned?

A

On Path Attack. (Man in the Middle)

41
Q

In the context of mobile device security, what is the organization primarily achieving when enforcing MDM policies for employee-owned smartphone and Tablets?

A

Endpoint Security. MDM is considered “end-point security”

42
Q

Reconnaissance on gathering information about potential vulnerabilities on the company’s external network by reviewing job posting or message boards about the company?

A

Passive Reconnaissance. Gathering information (intel)

43
Q

What security measure is the organization primarily implementing when implementing MFA (Multi-factor Authentication).

A

User Authentication.

44
Q

In the context of threat detection and analysis, what action is the security tech primarily taking when analyzing network traffic logs to identify patterns indicative of a potential DDOS attack?

A

Threat Hunting

45
Q

A company enforces mobile device encryption policies to ensure that data stored on employees smartphones and tablets is protected from unauthorized access in case of device loss or theft. What security measure is the company primarily implementing by enforcing mobile device encryption policies/

A

Data Confidentiality.

46
Q

A Tech needs to ensure that certain sensitive systems are physically isolated from the rest of the network to prevent unauthorized access. Which network design technique should the security technician implement to achieve physical isolation of sensitive systems?

A

Air-gapped. An isolated network separated from the Main Network.

47
Q

A Bank requires all of its vendors to implement measures to prevent data loss on stolen laptops. Which strategy is the bank demanding?

A

Disk Encryption.

48
Q

To ensure software code authenticity in a development environment, which method should a software development manager implement?

A

Code Signing. Uses digital signatures in order to confirm Sender is legitimate.

49
Q

The IT department wants to implement a solution that DIVIDES the network based on security requirements. What mitigation technique is the IT dept planning to implement to enhance network security in this scenario?

A

Segmentation. VLANs

50
Q

Security protocols in a cloud data center are under review to guarantee the protection of the safety of the data center staff. Which of the following best illustrates the appropriate setup for these security controls?

A

Fire Safety mechanisms should Fail Open