Q 46-60 Flashcards
A Chief Information Officer receives an email stating a database will be encrypted within 24 hours unless a payment of $20,000 is credited to the account mentioned in the email. This best describes a scenario related to:
Spear phishing
A company would like to provide flexibility to employees on device preference. However, the company is concerned about supporting too many different types of hardware. Which of the following deployment models will provide the needed flexibility with the GREATEST amount of control and security over company data and infrastructure?
BYOD (Bring Your Own Device)
A security researcher is tracking an adversary by noting its attacks and techniques based on its capabilities, infrastructure, and victims. What is the researcher most likely using?
The Diamond Model of Intrusion Analysis
A company is required to continue using legacy software to support a critical service. What best explains a risk of this practice?
Lack of Vendor Support
A security researcher has alerted an organization that its sensitive user data was found for sale on a website. What should the organization use to inform the affected parties?
An incident response plan
A business is looking for a cloud service provider that offers a la crate services, including cloud backups, VM elasticity, and secure networking. What cloud service provider types should the business engage?
IaaS (Infrastructure as a Service)
Developers are writing code and merging it into shared repositories several times a day, where it is tested automatically. What concept does this best represent?
Continuous integration
Ann, a customer, received a notification from her mortgage company stating her PII may be shared with partners, affiliates, and associates to maintain day-to-day business operations. Which of the following documents did Ann receive?
An annual privacy notice
A security analyst is running a vulnerability scan to check for missing patches during a suspected security incident. During which phase of the response process is this activity MOST likely occurring?
Identification
An enterprise has hired an outside security firm to facilitate penetration testing on its network and applications. The firm has agreed to pay for each vulnerability that is discovered. What best represents the type of testing that is being used?
Bug Bounty
A security analyst must enforce policies to harden an MDM infrastructure. The requirements are as follows:
1). Ensure mobile devices can be tracked and wiped.
2). Confirm mobile devices are encrypted.
What should the analyst enable on all the devices to meet these requirements?
Geofencing
Which disaster recovery test is the LEAST time consuming for the disaster recovery team?
Tabletop
A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00am - 4:00am. The malware has evaded detection by traditional antivirus software. What type of malware is MOST likely infecting the hosts?
Polymorphic
A company uses a drone for precise perimeter and boundary monitoring. What should be the most concerning to the company?
GPS Spoofing
If a current private key is compromised, what would ensure it cannot be used to decrypt all historical data?
Perfect forward secrecy