Practice Qs Flashcards
What is the most appropriate physical control to mitigate risk?
Install locks on Servers & Rack Doors.
*Physical Control
To prevent data exfiltration, what Technical Control should be implemented to address issue?
Install a Firewall to monitor and control incoming/ outgoing network traffic.
*Technical Control
What is the most effective deterrent control to prevent Tailgating?
Install more surveillance cameras at all entry points.
*Physical Control (deterrent)
A smartphone user wants to gain access to admin functions, what would enable this?
Jailbreaking (iPhone) allows the User to have Admin Privileges
Rooting = Android
Best way to ensure adherence to the C and I (CIA) in terms of securing data storage?
Encrypting stored data.
*Confidentiality and Integrity
Which process allows security professionals to identify discrepancies between “current state posture to desired state posture?”
Gap Analysis. “How to go from Point A to Point B?”
How to mitigate Vehicular attacks?
Erecting bollards along the building’s street-facing side
*Physical Control
Significant changes to the current Network Infrastructure will always require which step prior to implementing ANY changes?
Obtain formal approval for the project from senior management.
Which team is both Offense (red) and Defense (blue) of testing Networks?
Purple team consists of members responsible for both Testing and Securing networks.
How does a Security Analyst ensure evidence is handled correctly?
Chain of Custody
A secured way to establish a shared secret key for symmetric Encryption - which method should be used to securely exchange the symmetric key?
Using an Asymmetric Algorithm such as Diffie-Hellman.
*Asymmetric encryption was invented to pass Symmetric Keys
A method to protect the Passwords from being exposed in case of a breach. Which Technique is best used to Safeguard passwords in the Database?
Hashing. “One way encryption”
A network with multiple SSL/ TLS secured devices. Need a mechanism to promptly revoke the trust of a compromised certificate across all devices. What technology is used to maintain a list of REVOKED certificates that can be checked by clients?
Certificate Revocation List (CRL). A list of all compromised certificates.
Unusual behavior from an Employee who has access to sensitive data. What type of threat actor is the employee mostly categorized as?
Insider Threat.
When employees of a company is tricked by a Fake Website that looks legitimate?
Watering-Hole.
How to quickly address vulnerabilities found in the Firmware of IoT devices?
Patching
Phone calls with intentions of requesting sensitive information - which technique is most likely used to deceive employees through Phone calls?
Vishing (Voice Phishing). A form of Phishing but through Phone Calls.
*Social Engineering
To identify the creator and creation date of a suspicious file found on a Server, what should a Security Analyst check?
File’s Metadata.
1 - Right Click File
2 - Select Properties
3 - Select appropriate Tabs
What is “Virtual Machine Escape?”
A Security breach where a malicious actor gains control of the Host system from within a VM
How does a Company prevent employees from inadvertently installing harmful applications?
Implementing an Application Allow list