Quiz C Flashcards
An organization is concerned about intellectual property theft by employees who leave the organization. Which of the following will the organization MOST likely implement?
NDA
An organization recently recovered from a data breach. During the root cause analysis, the org determined the source of the breach to be a personal cell phone that had been reported lost. Which of the following solutions should the organiation implement to reduce the likelihood of future data breaches?
MDM
A security analyst is reviewing the output of a web server log and notices a particular account is attempting to transfer large amounts of money:
GET http://yourbank.com/transfer.do?acctnum=087646958&amount=50000 HTTP/1.1 GET http://yourbank.com/transfer.do?acctnum=087646958&amount=500000 HTTP/1.1 GET http://yourbank.com/transfer.do?acctnum=087646958&amount=100000 HTTP/1.1 GET http://yourbank.com/transfer.do?acctnum=087646958&amount=5000 HTTP/1.1
What attack is most likely happening?
CSRF
Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO)
Included 3rd party libraries
vendors/supply chain
An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?
AH
An org has hired a red team to simulate attacks on its security posture. Which of the following will the blue team do after detecting the IoC?
Activate runbooks for incident response
The security team received a copyright infringement from the IP space of the corporate network. The report provided a precise time stamp for the incident as well as the name of the copyrighted file. The analyst has been tasked with determining the infringing source machine and instructed to implement measures to prevent such incidents from occurring again. Which of the following is MOST capable of accomplishing both tasks?
NGFW
An organization relies on 3rd party video conferencing to conduct daily business. Recent security changes now require all remote workers to utilize a VPN to corporate resources. Which of the following would best maintain high-quality video conferencing while minimizing latency when connected to the VPN?
Configuring QoS properly on the VPN accelerators
An analyst just discovered an ongoing attack on a host that is on the network. The analyst observes the below taking place:
The computer performance is slow
Ads are appearing from various pop-up windows
OS files are modified
The computer is receiving AV alerts for execution of malicious processes
Which of the following steps should the analyst consider first?
Put the machine in containment
A news article states that a popular web browser deployed on all corporate PCs is vulnerable to a zero-day attack. Which of the following MOST concerns the CISO about the info in the news article?
No patches are available for the web browser
Admin have allowed employees to have access to their company email from personal computers. However, the admins are concerned that these computers are another attack surface and can result in user accounts being breached. Which of the following actions would provide the MOST secure solution?
Enforce a policy that allows employees to be able to access their emails only while they are connected to the
Internet via VPN
A security analyst is evaluating solutions to deploy an additional layer of protection for a web application. The goal is to allow only encrypted communications without relying on network devices. Which of the following can be implemented?
HTTP security header
A network analyst is investigating compromised corporate info, the analyst leads to a theory that network traffic was intercepted before being transmitted to the internet. The following output was captured on an internal host:
IPv4 Address - - - - - - - 10.0.0.87 Subnet Mask - - - - - - - - 255.255.255.0 Default Gateway - - - - - - 10.0.0.1
Internet Address 10.10.255.255 10.0.0.1 10.0.0.254 224.0.0.2
Physical Address ff-ff-ff-ff-ff-ff aa-aa-aa-aa-aa-aa aa-aa-aa-aa-aa-aa 01-00-5e-00-00-02
Based on the IoCs, what is the most likely attack being used to compromise the network communication?
ARP poisoning
Which of the following describes a maintenance metric that measures the average time required to fix and restore failed equipment?
MTTR
An actor tries to persuade someone into providing financial info over the phone in order to gain access to funds. Which of the following types of attacks does this describe?
Vishing