Qs probably on da test Flashcards

1
Q

Lisa periodically runs a vulnerability scans on the organization’s network. Lately, she has been receiving many false positives. Which of the following actions can reduce false positives?

Run the scans as credentialed scans
Run the scans as non credentialed scans
Run the scans using passive recon
Run the scans using active recon

A

Run the scans as credentialed scans

Obj: 1.7 Technique used in sec assements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security professionals are preforming a pen test on your network. After compromising a server, they use the compromised server to launch additional attacks within the network. Which of the following best describes this activity

Privilege Escalation
Black Box Testing
Pivoting
Persistence

A

Pivoting

Pivoting refers to the technique used by attackers to move deeper into a network after gaining initial access. It typically involves the use of a compromised system as a launchpad to access other parts of the network that are not directly reachable from the attacker’s position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the access control system needs to protect data based on the document type

Students | Private | Students
Faculty Compensation | Private | Compensation
Internal Phone Lists | Private | Employee

Which of the following models will they implement?

DAC
MAC
Role-BAC
ABAC

A

MAC

It uses security levels. MAC is the only one thatu utlizies secuirty levels

3.8 Implement authentiction and authorization solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Experts want to reduce risks associated with updating critical Operating systems. Which of the following will best meet this goal?

Implement a change management policy
Implement patches when they are released
Use only trusted operating systems
Implement operating systems with secure configurations

A

Implement a change management policy

Change management policy helps reduce risks assoc with making changes to system, including updating

5.3 Explain the importance of policy’s to org security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lisa is a database administrator. She received a phone call from someone identifying himself as a representative from a known hardware vendor. He said he’s calling customers to inform them of a problem with database servers they’ve sold, but he said the problem only affects servers running a specific operating system version. He asks Lisa what operating system versions the company is running on their database servers. Which of the following best describes the tactic used by the caller in this scenario?

Prepending
Tailgating
Pharming
Smishing

A

Prepending

social engineering tactic of prepending by setting up a scenario that has a better chance of victim giving out information

1.1 Compare and Contrast different types of social engineering techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your organization’s security policy states that administrators should follow the principle of least priveldge. Which of the following administrators are following the policy?

Account Audits
Risk Assessment
Vulnerability Assessment
Threat Assessment

A

Account Audits

Account audits verify users have the permissions they need for the job, but no more

3.7 implement identity and account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bart recently hooked up a switch incorrectly causing a switching loop problem, which took down part of the organizations network. Management wants to implement a solution that will prevent this from occurring in the future. Which of the following is the best choice to meet this need?

Flood Guard
SNMPv3
SRTP
RSTP

A

RSTP

Rapid Spanning Tree Protocol prevents switching loop problems and provides loop protection

3.3 implement secure network designs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Management within your org has defined a use case to support confidentiality of data stored in a database. Which of the following solutions will best meet this need?

hashing
Digital Signature
Encryption
Smart Card

A

Encryption

hashing is integrity

2.8 Summarize the basics of cryptographic concepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

While reviewing logs for a web app, a secuirty analyst notices that it has crashed several time’s reporting a memory error. Shortly after it crashes, the logs show malicious code that isn’t part for a known app. Which of the following is most likely occurring?

Buffer Overflow
ARP Poisoning
Privilege Escalation
Replay

A

Privledge Escalation

1.3, analyze potential indicators associated with application tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lisa has been hired as a pen tester by your org to test the security of a web server. She decides to start by Foot printing the server. Which of the following tools will best help her in this phase?

SIEM
Netcat
Tcpdump
Gray Box Testing

A

Netcat

Netcat can be used for outspringing a system during recon stage of pen testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you see ` OR 1=1; on the exam, it’s an SQL injection

A

If you see ` OR 1=1; on the exam, it’s an SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RC4 is the only stream cipher covered

A

RC4 is the only stream cipher covered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetric encryption is also known as public key cryptography

A

Two keys are used in public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Instantly match integrity and hashing on the exam

A

MD5 and SHA are the most common hash functions used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

▪ Policies are generic

A

▪ Procedures are specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?

Jailbreaking
Memory injection
Resource reuse
Side loading

A

Side loading

17
Q

A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors.

Which of the following should the systems administrator use?

Packet captures
Vulnerability scans
Metadata
Dashboard

A

Dashboard

A dashboard is a graphical user interface that provides a visual representation of key performance indicators, metrics, and trends related to security events and incidents.

18
Q

A technician needs to apply a high-priority patch to a production system.

Which of the following steps should be taken first?

Air gap the system.
Move the system to a different network segment.
Create a change control request.
Apply the patch to the system.

A

Create a change control request.

19
Q

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

SCAP
Net Flow
Antivirus
DLP

A

DLP

20
Q

A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work.

Which of the following is the best option?

Send out periodic security reminders

Update the content of new hire documentation.

Modify the content of recurring training.

Implement a phishing campaign

A

Implement a phishing campaign

21
Q

A systems administrator works for a local hospital and needs to ensure patient data is protected and secure.

Which of the following data classifications should be used to secure patient data?
Private
Critical
Sensitive
Public

A

Sensitive

22
Q

A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation.

Which of the following logs should the analyst use as a data source?

Application
IPS/IDS
Network
Endpoint

A

Endpoint

An endpoint log is a file that contains information about the activities and events that occur on an end-user device, such as a laptop, desktop, tablet, or smartphone

23
Q

Which of the following would be the best way to block unknown programs from executing?

Access control list
Application allow list
Host-based firewall
DLP solution

A

Application allow list

24
Q

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

Automation
Compliance checklist
Attestation
Manual audit

A

Automation

25
Q

An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days.

Which of the following types of sites is the best for this scenario?

Real-time recovery
Hot
Cold
Warm

A

Cold

A cold site is a type of backup data center that has the necessary infrastructure to support IT operations, but does not have any pre-configured hardware or software. A cold site is the cheapest option among the backup data center types, but it also has the longest recovery time objective (RTO) and recovery point objective (RPO) value

26
Q

A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates.

Which of the following should be done next?

Conduct an audit
Initiate a penetration test.
Rescan the network
Submit a report

A

Rescan the network

27
Q

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

Disaster recovery plan
Incident response procedure
Business continuity plan
Change management procedure

A

Change management procedure

A change management procedure is a set of steps and guidelines that a security administrator should adhere to when setting up a new set of firewall rules