QA Flashcards
A chief information security officer requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the ciso requesting?
Lessons Learned
A web server has been compromised due to a ransomware attack. Further investigation reveals the ransomware has been in the server for the past 72 hours. The system administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?
The last incremental backup that was conducted 72 hours ago
Which of the following is the most effective control against zero-day vulnerabilities?
Intrusion Prevention System
A chief information security officer has defined resiliency requirements for a new data center architecture. The requirements are as follows:
- Critical file shares will remain accessible during and after a natural disaster
- Five percent of hard disks can fail at any given time without impacting the data
- Systems will be forced to shut down gracefully when battery levels are below 20%
Which of the following are required to best meet these requirements?
IaC, NAS and RAID
A user wanted to catch up on some work over the weekend but has issues logging into the corporate network using a VPN. On Monday, the user opened a ticket for this issue but was able to log in successfully. Which of the following best describes the policy that is being implemented?
Geofencing
A routine audit of medical billing claims revealed that several claims were submitted without the subscriber’s knowledge. A review of the audit logs for the medical billing company’s system indicated a company employee downloaded customer records and adjusted the direct deposit information to a personal bank account. Which of the following does this action describe?
Insider threat
A security manager has tasked the security operations center with locating all web servers that respond to an unsecure protocol. Which of the following commands could an analyst run to find the requested servers?
nmap -p 80 10.10.10.0/24
Which of the following tools is effective in preventing a user from accessing unauthorized removable media?
USB data blocker
A security proposal was set up to track requests for remote access by creating a baseline of the user’s common sign-in properties. When a baseline deviation is detected, an MFA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?
Context-aware authentication
Which of the following best reduces the security risks introduced when running systems that have expired vendor support and lack an immediate replacement?
Implement proper network access restrictions
A user reports falling for a phishing email to an analyst. Which of the following system logs would the analyst check first?
DNS
A company wants to improve end users experiences when they log in to a trusted partner website. The company does not want the users to be issued separate credentials for the partner website. Which of the following should be implemented to allow users to authenticate using their own credentials to log in to the trusted partner’s website?
AAA server
An organization wants to participate in threat intelligence information sharing with peer groups. Which of the following would most likely meet the organization’s requirements?
Implement a TAXII server
Security analysts are conducting an investigation of an attack that occurred inside the organizations network. An attacker was able to collect network traffic between workstations throughout the network. The analysts review the following logs:
VLAN. Address
1. 0007.1e5d.3213
1. 002a.7d.44.8801
1. 0011.aab4.344d
The layer 2 address table has hundreds of entries similar to the ones above. Which of the following attacks has most likely occurred?
MAC flooding
A security analyst is evaluating the risks of authorizing multiple security solutions to collect data from the company’s cloud environment. Which of the following is an immediate consequence of these integrations?
Non-Compliance with data sovereignty rules