Quiz B Flashcards

1
Q

A security manager needs to access the security posture of one of the org vendors. The contract with this vendor does not allow for auditing of their security controls which of the following should the manager request to complete the assessment?

A

A SOC 2 Type 2 report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A back door was detected in the containerized application environment. The investigation detected a zero – day vulnerability was introduced when the last container image version was downloaded from a public registry. Which of the following is the best solution to prevent this type of incident from reoccurring?

A

Enforce the use of controlled trusted source of container images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security analyst was deploying a new website and found a connection attempting to authenticate on the site’s portal. While investigating the incident, the analyst identified the following input in the username field:

Admin’ or 1=1- -

A

SQLi on the field to bypass authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security manager runs Nessus scans of the network after every maintenance window. Which of the following is the security manager most likely trying to accomplish?

A

Verify that system patching has effectively removed known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As part of a company’s ongoing SOC maturation process, the company wants to implement a method to share cyberthreat intelligence data with outside security partners. Which of the following will the company most likely implement?

A

TAXll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During an investigation, the security manager received a notification from local authorities that company proprietary data was found on a former employee’s home computer. The former employee’s corporate workstation has since been repurposed, and the data on the hard drive has been overwritten. Which of the following would BEST provide the security manager with enough details to determine when the data was removed from the company network?

A

Properly configured SIEM with retention policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security analyst must enforce policies to harden an MDM infrastructure. The requirements are as follows:

Ensure mobile devices can be tracked Confirm mobile devices are encrypted

Which of the following should the analyst enable to ensure all devices meet these requirements?

A

Geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An organization is building backup server rooms in geographically diverse locations. The CISO implemented a requirement on the project that states the new hardware cannot be susceptible to the same vulnerabilities in the existing server room. Which of the following should the systems engineer consider?

A

Purchasing hardware from different vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Of the following, which should a tech choose when selecting an encryption method for data that needs to remain confidential for a specific length of time?

A

The encryption algorithm’s longevity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Chief Compliance Officer from a bank has approved a background check policy for all new hires. What is this new policy protecting against?

A

Hiring an employee who has been convicted of theft to adhere to industry compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following would produce the closest experience of responding to an actual incident response scenario?

A

Simulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A user reports trouble using their corporate laptop. The report states the laptop is freezing and responding slowly when writing documents, and the mouse pointer occasionally disappears.
The task list shows the following:
NAME CPU% MEM\RAM NETWORK% Calculator 0.0 4.1 MB 0.0 Mbps
Chrome 0.2 207.1 MB 0.1 Mbps
Explorer 99.7 2.15 GB 0.1 Mbps
Notepad 0.0 3.9 MB 0.0 Mbps
Which of the following is most likely the issue?

A

PUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following must be in place before implementing BCP?

A

BIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What social engineering attack relies on an executive at a small business visiting a fake banking website where cerdit card and account details are harvested?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is most effective at containing a rapidly spreading attack, affecting a large number of organizations?

A

DNS Sinkhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After a recent security breach, a security analyst reports that several admin usernames and passwords are being sent via cleartext across the network to access network devices over port 23. What should be implemented so all credentials sent over the network are encrypted when remotely accessing and configuring network devices?

A

SSH

17
Q

A SOC is currently being outsourced. Which of the following is being used?

A

MSSP

18
Q

A store receives reports that shoppers’ cc info is being stolen. Upon further analysis, those same shoppers also withdrew money from an ATM in that store. The attackers are using the targeted shoppers’ cc info to make online purchases. Which of the following attacks is the most probable cause?

A

Card skimming

19
Q

A pentester gains access to a network by exploiting a vulnerability on a public-facing webserver. Which of the following is the tester most likely to perform NEXT?

A

Create a user account to maintain persistence

20
Q

After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?

A

ACL

21
Q

A security analyst is investigating a phishing email that contains a malicious document directed to the company’s CEO. Which of the following should the analyst perform to understand the threat and retrieve possible IoCs?

A

Install a sandbox to run the malicious payload in a safe environment

22
Q

A company implemented a new telework policy that allows employees to use BYOD devices for official email and file sharing while working from home. Some of the requirements are:

Employees must provide an alternate work location ( i.e., a home address).
Employees must install software on the device that will prevent the loss of proprietary data but will not restrict any other software from being installed?

Which of the following BEST describes the MDM options the company is using?

A

Application management, remote wipe, geofencing, context aware authentication, and containerization

23
Q

Review the following log:

TCP 192.168.10.10:80 192.168.1.2:60100 TIME_WAIT
TCP 192.168.10.10:80 192.168.1.2:60101 TIME_WAIT
TCP 192.168.10.10:80 192.168.1.2:60102 TIME_WAIT
TCP 192.168.10.10:80 192.168.1.2:60103 TIME_WAIT
TCP 192.168.10.10:80 192.168.1.2:60104 TIME_WAIT TCP 192.168.10.10:80 192.168.1.2:60105 TIME_WAIT TCP 192.168.10.10:80 192.168.1.2:60106 TIME_WAIT TCP 192.168.10.10:80 192.168.1.2:60107 TIME_WAIT TCP 192.168.10.10:80 192.168.1.2:60108 TIME_WAIT TCP 192.168.10.10:80 192.168.1.2:60109 TIME_WAIT TCP 192.168.10.10:80 192.168.1.2:60110 TIME_WAIT
Which of the following is most likely being observed here?

A

DoS

24
Q

An organization regularly scans its infrastructure for missing security patches but is concerned about hackers gaining access to the scanner’s account. Which of the following would be best to minimize this risk while ensuring the scans are useful?

A

Require complex, eight-character password every 90 days

25
Q

Which of the following would be used to find the most common web-application vulnerabilities?

A

OWASP

26
Q

A security researcher has alerted an org that its sensitive user data was found for sale on a website. Which of the following should the org use to inform the affected parties?

A

Communications plan