Q 46-60 Flashcards

1
Q

A Chief Information Officer receives an email stating a database will be encrypted within 24 hours unless a payment of $20,000 is credited to the account mentioned in the email. This best describes a scenario related to:

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company would like to provide flexibility to employees on device preference. However, the company is concerned about supporting too many different types of hardware. Which of the following deployment models will provide the needed flexibility with the GREATEST amount of control and security over company data and infrastructure?

A

BYOD (Bring Your Own Device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security researcher is tracking an adversary by noting its attacks and techniques based on its capabilities, infrastructure, and victims. What is the researcher most likely using?

A

The Diamond Model of Intrusion Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company is required to continue using legacy software to support a critical service. What best explains a risk of this practice?

A

Lack of Vendor Support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security researcher has alerted an organization that its sensitive user data was found for sale on a website. What should the organization use to inform the affected parties?

A

An incident response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A business is looking for a cloud service provider that offers a la crate services, including cloud backups, VM elasticity, and secure networking. What cloud service provider types should the business engage?

A

IaaS (Infrastructure as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Developers are writing code and merging it into shared repositories several times a day, where it is tested automatically. What concept does this best represent?

A

Continuous integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ann, a customer, received a notification from her mortgage company stating her PII may be shared with partners, affiliates, and associates to maintain day-to-day business operations. Which of the following documents did Ann receive?

A

An annual privacy notice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security analyst is running a vulnerability scan to check for missing patches during a suspected security incident. During which phase of the response process is this activity MOST likely occurring?

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An enterprise has hired an outside security firm to facilitate penetration testing on its network and applications. The firm has agreed to pay for each vulnerability that is discovered. What best represents the type of testing that is being used?

A

Bug Bounty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security analyst must enforce policies to harden an MDM infrastructure. The requirements are as follows:
1). Ensure mobile devices can be tracked and wiped.
2). Confirm mobile devices are encrypted.

What should the analyst enable on all the devices to meet these requirements?

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which disaster recovery test is the LEAST time consuming for the disaster recovery team?

A

Tabletop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00am - 4:00am. The malware has evaded detection by traditional antivirus software. What type of malware is MOST likely infecting the hosts?

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company uses a drone for precise perimeter and boundary monitoring. What should be the most concerning to the company?

A

GPS Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If a current private key is compromised, what would ensure it cannot be used to decrypt all historical data?

A

Perfect forward secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly