Quiz B Flashcards
A security manager needs to access the security posture of one of the org vendors. The contract with this vendor does not allow for auditing of their security controls which of the following should the manager request to complete the assessment?
A SOC 2 Type 2 report
A back door was detected in the containerized application environment. The investigation detected a zero – day vulnerability was introduced when the last container image version was downloaded from a public registry. Which of the following is the best solution to prevent this type of incident from reoccurring?
Enforce the use of controlled trusted source of container images
A security analyst was deploying a new website and found a connection attempting to authenticate on the site’s portal. While investigating the incident, the analyst identified the following input in the username field:
Admin’ or 1=1- -
SQLi on the field to bypass authentication
A security manager runs Nessus scans of the network after every maintenance window. Which of the following is the security manager most likely trying to accomplish?
Verify that system patching has effectively removed known vulnerabilities
As part of a company’s ongoing SOC maturation process, the company wants to implement a method to share cyberthreat intelligence data with outside security partners. Which of the following will the company most likely implement?
TAXll
During an investigation, the security manager received a notification from local authorities that company proprietary data was found on a former employee’s home computer. The former employee’s corporate workstation has since been repurposed, and the data on the hard drive has been overwritten. Which of the following would BEST provide the security manager with enough details to determine when the data was removed from the company network?
Properly configured SIEM with retention policies
A security analyst must enforce policies to harden an MDM infrastructure. The requirements are as follows:
Ensure mobile devices can be tracked Confirm mobile devices are encrypted
Which of the following should the analyst enable to ensure all devices meet these requirements?
Geolocation
An organization is building backup server rooms in geographically diverse locations. The CISO implemented a requirement on the project that states the new hardware cannot be susceptible to the same vulnerabilities in the existing server room. Which of the following should the systems engineer consider?
Purchasing hardware from different vendors
Of the following, which should a tech choose when selecting an encryption method for data that needs to remain confidential for a specific length of time?
The encryption algorithm’s longevity
The Chief Compliance Officer from a bank has approved a background check policy for all new hires. What is this new policy protecting against?
Hiring an employee who has been convicted of theft to adhere to industry compliance
Which of the following would produce the closest experience of responding to an actual incident response scenario?
Simulation
A user reports trouble using their corporate laptop. The report states the laptop is freezing and responding slowly when writing documents, and the mouse pointer occasionally disappears.
The task list shows the following:
NAME CPU% MEM\RAM NETWORK% Calculator 0.0 4.1 MB 0.0 Mbps
Chrome 0.2 207.1 MB 0.1 Mbps
Explorer 99.7 2.15 GB 0.1 Mbps
Notepad 0.0 3.9 MB 0.0 Mbps
Which of the following is most likely the issue?
PUP
Which of the following must be in place before implementing BCP?
BIA
What social engineering attack relies on an executive at a small business visiting a fake banking website where cerdit card and account details are harvested?
Whaling
Which of the following is most effective at containing a rapidly spreading attack, affecting a large number of organizations?
DNS Sinkhole