Quiz E Flashcards

1
Q

Several employees return to work the day after attending an industry trade show. That same day, the security manager notices several malware alerts coming from each of the employees’ workstations. The security manager investigates but finds no evidence of attack by reviewing network based sources like the perimeter firewall or the NIDS. Which of the following is most likely causing the malware alerts?

A

A USB flash drive that is trying to run malicious code but is being blocked by the host firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following would cause a CISO the most concern regarding newly installed Internet-accessible 4k surveillance cameras?

A

The cameras could be compromised if not patched in a timely manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The spread of misinformation surrounding the outbreak of a novel virus on election day led to eligible voters choosing not to take the risk of going to the polls. This is an example of:

A

Influence campaign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company wants to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the best backup strategy to implement?

A

Full backups followed by differential backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security engineer needs to create a network segment that can be used for servers that require connections from untrusted networks. Which of the following should the engineer implement?

A

Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following technical controls is best suited for the detection and prevention of buffer overflows on hosts?

A

EDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following environments utilizes dummy data and is most likely to be installed on a system that allows code to be assessed directly and modified easily with each build?

A

Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security analyst has received several reports of an issue on an internal web application. Users state they are having to provide their credentials twice to log in. The analyst checks with the application team and notes this is not an expected behavior. After looking at several logs, the analyst decides to run some commands on the gateway and obtains the following output:
Internet address Physical address Type 192.168.1.1 ff-ec-ab-00-aa-78 dynamic 192.168.1.5 ff-00-5e-48-00-fb dynamic 192.168.1.8 00-0c-29-1a-e7-fa dynamic 192.168.1.10 fc-41-5e-48-00-ff dynamic 224.215.54.47 fc-00-5e-48-00-fb static

Which of the following best describes the attack the company is experiencing?

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company has decided to move its operations to the cloud. It wants to utilize technology that will prevent users from downloading company applications for personal use, restrict data that is uploaded, and have visibility into which applications are being used across the company. Which of the following solutions will best meet these requirements?

A

CASB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A recent security assessment revealed that an actor exploited a vulnerable workstation within an organization and has persisted on the network for several months. The organization realizes the need to reassess its security strategy for mitigating risks within the perimeter. Which of the following solutions would best support the organization’s strategy?

A

EDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?

A

A right to audit clause allowing for annual security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following would be most effective to contain a rapidly spreading attack that is affecting a large number of organizations?

A

DNS sinkhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an example of risk avoidance?

A

Not installing new software to prevent compatibility errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A website developer who is concerned about theft of the company’s user database wants to protect weak passwords from offline brute force attacks. Which of the following would be the best solution?

A

Use a key stretching technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security analyst needs to find real time data on the latest malware and IoCs. which of the following best describes the solution the analyst should pursue?

A

Threat feeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following would an organization use to assign a value to risks based on probability of occurrence and impact?

A

Risk matrix

17
Q

A retail company that is launching a new website to showcase the company’s product line and other information for online shoppers registered the following URLs:

www.companysite.com shop.companysite.com about-us.companysite.com contact-us.companysite.com secure-logon.companysite.com

Which of the following should the company use to secure its website if the company is concerned with convenience and cost?

A

Wildcard certificate

18
Q

Which of the following should a tech consider when selecting an encryption method for data that needs to remain confidential for a specific length of time?

A

The encryption algorithm’s longevity

19
Q

A company has discovered unauthorized devices are using its WiFi network, and it wants to harden the access point to improve security. Which of the following configurations should an analyst enable to improve security? (select two)

A

RADIUS

EAP-PEAP

20
Q

A backdoor was detected in the containerized application environment. The investigation detected that a zero day vulnerability was introduced when the latest container image version was downloaded from a public registry. Which of the following is the best solution to prevent this type of incident from occurring again?

A

Create a dedicated VPC for the containerized environment