Q Flashcards

1
Q

Which of the following tools would work best to prevent the exposure of PII outside of an organization?
A. Pam
B. IDS
C. Pki
D. DLP

A

D. DLP
Data loss prevention technologies helps prevent unauthorized access, sharing, or exposure of sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following items should be included in a vulnerability scan report? Choose 2.
A. Lessons learned
B. Service-level agreement
C. Playbook
D. Affected hosts
E. Risk score
F. Education plan

A

D. Affected hosts
E. Risk score

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following scripting languages was used in the script using get-aduser
A. Powershell
B. Ruby
C. Python
D. Shell script

A

A. Powershell
PowerShell’s the only language that uses - get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security analyst received a malicious binary file to analyze. Which of the following is the best technique to perform the analysis?
A. Code analysis
B. Static analysis
C. Reverse engineering
D. Fuzzing

A

Static analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A breach of customer transactions
Under the terms of PCI das, which of the following groups should the organization report the breach to?
A. PCI security standards council
B. Local law enforcement
C. Federal law enforcement
D. Card issuer

A

Card issuer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which is the best metric for an organization to focus on given recent investments in SIEM, soar, and a ticketing system?
A. Mean time to detect
B. Number of exploits by tactic
C. Alert volume
D. Quantity of intrusion attempts

A

Mean time to detect
Tells you how long it takes to detect an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

First Step that should be performed unseen establishing a disaster recovery plan?
A. Agree on goals
B. Determine the site to be used during a disaster
C. Adherence to a disaster process
D. Identify applications

A

Agree on goals of the disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After applying a patch, what should happen next?
A. Testing
B. Implementation
C. Validation
D. Rollback

A

Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which allows S6 to no longer jump between tools?
A. Data enrichment
B. Security central plane
C. Threat feed combination
D. Single pane of glass

A

Single pane of glass is when s6 can manage the network from one place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When starting an investigation, which should happen first?
A. Notify the law
B. Secure the scene
C. Seize evidence
D. Interview witnesses

A

Always secure the scene first before doing anything else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly