question 147 to 207 Flashcards
A security admin suspects an employee has been emailing proprietary information to a competitor. Company policy requires the admin to capture an exact copy of the employee’s hard disk.
Which of the following should the admin use?
dd
A network admin would like to configure a site-to-site VPN utilizing iPSec. The admin wants the tunnel to be established with data integrity encryption, authentication and anti-replay functions.
Which of the following should the admin use when configuring the VPN?
ESP
Encapsulating security Payload
Which of the following relets to applications and systems that are used within an organization without consent or approval?
Shadow IT
Which of the following algorithms has the SMALLEST key size?
Twofish
A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue.
Which of the following BEST explains what happened?
A malicious USB was introduced by an unsuspecting employee
An organization routes all of its traffic through a VPN Most users are remote and connect into a corporate datacenter that houses confidential information. There is a firewall at the Internet border followed by a DIP appliance, the VPN server and the datacenter itself.
Which of the following is the WEAKEST design element?
Encrypted VPN traffic will not be inspected when entering or leaving he network.
An end User reports a computer has been acting slower than normal for a few weeks. During an investigation, an analyst determines the system is sending the user’s email address and a ten-digit number to an IP address once a day. The only recent log entry regarding the user’s computer is the following
Which of the following is the MOST likely cause of the issue?
The end user purchased and installed a PUP from a web browser
A company recently experienced an attack in which a malicious actor was able to exfilitrate data by cracking stolen passwords, using a reainbow table the sensitive data.
Which of the following should a security engineer do to prevent such an attack in the future?
Disable password reuse
Which of the following are requirements that must be configured for PCI DSS compliance?
(Select TWO)
Testing security systems and processes regularly
Assigning a unique ID to each person with computer access
Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchablility of data within the could-based servcies?
Data encryption
Which of the following disaster recovery tests is the LEAST time consuming for the disaster recovery team?
Simulation
An attacked is attempting to exploit users by creating a fake website with the URL www.validwebsite.com. The attackers intent is to imitate the look and feel of a legitimate website to obtain personal information from unsuspecting users.
Which of the following social engineering attacks does this describe?
Watering-hole attack
A security manager for a retailer needs to reduce the scope of a project to comply with PCI DSS. The PCI data is located in different offices than where credit cards are accepted. All the offices are connected via MPLS back to the primary datacenter.
Which of the following should the security manager implement to achieve the objective?
Segmentation
When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?
Normalization
A network engineer needs to create a plan for upgrading the wireless infastructure in a large office Priority must be given to areas that are currently experiencing latency and connection issues.
Which of the following would be the BEST resource for determining the order of priority?
Heat Maps
An Organization has been experiencing outages during holiday sales and needs to ensure availability of its point-of-sales systems. The IT administrator has been asked to improve both server-data fault tolerance and site availability under high consumer load
Whgich of the following are BEST options to accomplish this objective? (Select TWO)
Load Balancing
RAID
A security analyst is reviewing logs on a server and observes the following output:
Which of the following is the security analyst observing?
A dictionary attack
Which of the following scenarios BEST describes a risk reduction technique?
A security control objective cannot be met through a technical change, so the company implements a policy to train users on a more secure method of operation.
A security analyst is investigating an incident to determine what an attacker was able to do on a compromised laptop. The analyst review the following SIEM log:
Which of the following describes the method that was used to compromised the laptop?
An attacker was able to move laterally from PC1 to PC2 using a pass-the-hash attack
A company’s CISO recently warned the security manager that the company CEO is planning to publish a controversial option artical in a national newspaper, which may resulut in new cyberattacks.
Which of the following would be BEST for the security manager to use in a threat mode?
Hacktivists
An organization is concerned that its hosted webservers are not running the most updated version of the software.
Which of the following would work BEST to help identifiy potential vulnerabilities?
nmap comptia.org -p 80 –sV
Which of the following types of controls is a CCTV camera that is not being monitored?
Deterrent
A security analyst is logged into a Windows file server and needs to see who is accessing files and from which computers.
Which of the following tools should the analyst use?
Netstat
The Facilities supervisor for a government agenc is concerned about unauthorized access to environmental systems in the event the staff WiFi network is breached.
Which of the blowing would BEST address this security concern?
Segment the staff WiFi network from the environmental systems network.