Sec+ Flashcards
The security analyst is investigating a phishing email that contains a malicious document directed to the company’s Chief Executive Officer (CEO). Which of the following should the analyst perform to understand the threat and retrieve possible IoCs?
Install a sandbox to run the malicious payload in a safe environment.
A cybersecurity administrator needs to harden a server after installing Windows. Which of the following best practices should the administrator do to achieve his goal? (Select TWO)
Disabling NetBIOS over TCP/IP
Disabling guest accounts
Which of the following corporate policies is used to help prevent employee fraud and to detect system log modifications or other malicious activity based on tenure?
Mandatory vacation
After scamming a user’s credentials, the red team was able to craft a payload to deploy on a server. The attack allowed the installation of malicious software that initiates a new remote session. Which type of attack has occurred?
Privilege escalation
A company just implemented a new telework policy that allows employees to use personal devices for official email and file sharing while working from home. Some of the requirements are:
Employees must provide an alternate work location.
Employees must install software on the device that will prevent the loss of proprietary data but will not restrict any other software from being installed.
Which of the following BEST describes the MDM options the company is using?
Remote wipe, geolocation, screen locks, storage segmentation, and full-device encryption.
A new PnP storage device was installed on a PC in the corporate environment. Which of the following safeguards will BEST defend the PC from malicious files on the storage device?
Change the default setting on the PC
A user has concerns that a web app will not handle unexpected or random inputs without crashing. Which of the following types of testing should the user perform?
Fuzzing
A security admin is analyzing the corporate wireless network. The network only has two access points running on channels 1 and 11. While using airdump-ng, the admin notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of the legitimate APs. What attack is being performed on the corporate network?
Evil Twin
A network administrator is concerned about users being exposed to malicious content when accessing the company cloud applications. The administrator wants to be able to block access to sites based on the AUP. The users must also be protected because many of them work from home or at remote locations, providing on-site customer support. Which of the following should the administrator employ to meet these criteria?
SWG
Following a prolonged datacenter outage that affected web based sales, a company has decided to move its operations to a private cloud solution. The security team has received the following requirements:
Must be visibility into how teams are using CBS
The company must be able to identify when data related to payment cards is being sent to the cloud
Data must be available regardless of the end user’s geographical location
Admin need a single pane of glass view into traffic and trends
Which of the following should the security analyst recommend?
Implement a CASB solution
An analyst notices several attacks are being blocked by the NIPS but does not see anything on the boundary FW logs. The attack seems to have been stopped. Which of the following resiliency techniques was applied to the network to prevent this attack?
Defense in depth
A government agency just acquired a new web application. The app must be assessed and authorized before being deployed. Which of the following is required to assess the vulnerabilities resident in the application?
Common vulnerability and exposures
An organization with a large number of mobile devices is exploring enhanced security controls to manage unauthorized access if a device is lost or stolen. Specifically, if mobile devices are more than 3mi from the building, the management team would like to have the security team alerted and server resources restricted on those devices. Which of the following controls should the organization implement?
Geofencing
A small business office is setting up a wireless infrastructure with primary requirements centered on protecting customer information and preventing unauthorized access to the business network. Which of the following would BEST support the office’s business needs? (Select TWO)
Configuring access using WPA3-Enterprise
Enabling 802.1X
A security administrator needs to inspect in-transit files on the enterprise network to search for PII, cc data, and classification words. Which of the following would be the BEST to use?
Network DLP
A security analyst has been reading about a new cyberattack from a known threat actor. Which of the following would BEST support the analyst’s review of the tactics, techniques, and protocols the threat actor was observed using in previous campaigns?
MITRE ATT&CK framework
Which of the following is the most secure but LEAST expensive data destruction method for data that is stored on hard drives?
Degaussing
Which of the following is the correct order of volatility from most to least likely volatile?
Cache, memory, temp filesystems, disk, archival media
The security engineer installs a WAF to protect the company’s website from malicious web requests over SSL. Which of the following is needed to meet the objective?
Reverse proxy
A public relations team will be taking a group of guests on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboards are cleaned and all disks are cleared. The company is most likely trying to protect against:
Social engineering
An incident affecting dozens of systems, involves malware that reaches out to an Internet service for rules and updates. The IP addresses for the Internet host appear to be different in each case. The organization would like to determine a common IoC to support response and recovery actions. Which of the following sources of information would best support this solution?
DNS query logs
Which of the following best describes a social engineering attack that relies on an executive at a small business visiting a fake banking website where cc and account details are harvested?
Whaling
Which of the following would be best for a tech to review to determine the total risk an organization can bear when assessing a “cloud first” adoption strategy?
Appetite
Access to a secure area requires passing through two doors, both of which require someone who is already inside to initiate access. Which of the following types of physical security controls does this describe?
Access control vestibule
Which of the following function as preventative, detective, and deterrent controls to reduce risk of physical theft? (Select TWO)
Security guards
Video surveillance
An analyst needs to verify that a client-server (non-web) application is sending encrypted traffic. Which of the following should the analyst use?
tcpdump
A multinational organization that offers web based services has datacenters that are located only in the United States; however, a large number of its customers are in Australia, Europe, and China. Payments for services are managed by a third party in the United Kingdom that specializes in payment gateways. The management team is concerned the organization is not compliant with privacy laws that cover some of its customers. Which of the following frameworks should the management team follow?
Payment Card Industry Data Security Standard (PCI DSS)
A security analyst is performing a packet capture on a series of SOAP HTTP requests for a security assessment. The analyst redirects the output to a text file. After the capture is complete, the analyst needs to review the first transactions quickly and then search the entire series of requests for a particular string. Which of the following would be BEST to use to accomplish this task? (Select TWO)
head
grep
Users must provide a password and a USB key to authenticate against a secure computer, and authentication is limited to the state in which the company resides. Which authentication concepts are in use?
Something you know, something you have, somewhere you are.
The CISO is evaluating the dangers involved in deploying a new ERP system for the company. The CISO categorizes the system, selects the controls that apply to the system, implements the controls, and then assesses the success of the controls before authorizing the system. Which of the following is the CISO using to evaluate the environment for this new ERP system?
NIST Risk Management Framework
Log file of a successful attack:
[DATA] attacking service ftp on port 21
[ATTEMPT] 09:00:01UTC target 192.168.50.1 - login “admin” -pass “p@55w0rd”
[ATTEMPT] 09:00:01UTC target 192.168.50.1 - login “admin” -pass “AcCe55”
[ATTEMPT] 09:00:01UTC target 192.168.50.1 - login “admin” -pass “A11ow!”[ATTEMPT] 09:00:01UTC target 192.168.50.1 - login “admin” -pass “PL34s3#”
[ATTEMPT] 09:00:01UTC target 192.168.50.1 - login “admin” -pass “FTPL0gin!”
[ATTEMPT] 09:00:01UTC target 192.168.50.1 - login “admin” -pass “L3tM31N!”
[21] [ftp] host 192.168.50.1 login: admin password: L3tM31N!1 of 1 target successfully completed, 1 valid password found in <1 second
Which of the following controls would be BEST to use to prevent such a breach in the future?
Account lockout
Of the following, which should a data owner require all personnel to sign to legally protect intellectual property?
NDA
The concept of connecting a user account across the systems of multiple enterprises is BEST known as:
Federation
The CEO is unhappy with the level of service from the company’s new SP. The SP is preventing the CEO from sending email from a work account to a personal account. Which of the following types of SPs is being used?
Managed security service provider
An organization needs to remediate the risk associated with its CSP not meeting its advertised 99.999% availability metrics. Which of the following should the organization consult for the exact requirements for the CP?
SLA
An organization’s CSO wants to validate the business’s involvement in the incident response plan to ensure its validity and thoroughness. Which of the following will the CSO most likely use?
Tabletop exercise
Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)
Private key
Hashing
An organization’s RPO for a critical system is two hours. The system is used Monday through Friday, from 9am to 5pm. Currently, the org performs a full backup every Saturday that takes four hours to complete. Which of the following additional backup implementations would be the MOST efficient way for the analyst to meet the business requirements?
Full backups Mon-Fri at 6pm and differential backups hourly
When implementing automation with IoT devices, what should be considered FIRST to keep the network secure?
Communication protocols
A web server administrator has redundant servers and needs to ensure failover to the secondary server when the primary server goes down. Which of the following should the admin implement to avoid disruption?
High availability
A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company’s server:
GET index.php?page=..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswdGET index.php?page=..2f..2f..2f..2f..2f..2f..2f..2..2fetc2fpasswd
GET index.php?page=..2f..2f..2f..2f..2f..2f..2f..2f..2f..2fetc2fpasswd
Which of the following BEST describes this kind of attack?
Directory traversal
Which of the following types of controls is a CCTV camera not being monitored?
Deterrent
After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?
ACL
Which of the following BEST helps to demonstrate integrity during a forensic investigation?
Hashing
A security analyst is reviewing a penetration-testing report from a third-party contractor. The penetration testers used the organization’s new API to bypass a driver to perform privilege escalation on the organization’s web servers. After looking at the API, the analyst realizes the particular API call was to a legacy system running an outdated OS. Which of the following is the most likely attack type?
Shimming
A security analyst must determine if either SSH or Telnet is being used to log in to servers. Which of the following should the analyst use?
tcpdump
The company is implementing a new SIEM to log and send alerts whenever malicious activity is blocked by its antivirus and web content filters. Which of the following is the primary use case for this scenario?
Implementation of detective controls
The human resources department of a large online retailer has received multiple customer complaints about the rudeness of the automated chatbots it uses to interface and assist online shoppers. The system, which continuously learns and adapts, was working fine when it was installed a few months ago. Which of the following BEST describes the method being used to exploit the system?
Tainted training data
The systems admin needs to install the same X.509 certificate on multiple servers. Which of the following should the admin use?
Self-signed certificate
A CSO is concerned about the volume and integrity of sensitive information that is exchanged between the organization and a third party through email. The CSO is particularly concerned about an unauthorized party who is intercepting information that is in transit between the two organizations. Which of the following would address the CSO’s concerns?
DKIM
An enterprise needs to keep cryptographic keys in a safe manner. Which of the following network appliances can achieve this goal?
HSM
While reviewing the wireless router, an admin of a small business determines someone is spoofing the MAC address of an authorized device. Given the table below:
Hostname IP Address MAC MAC Filter PC1 192.168.1.20 00:1E:1B:43:21:B2 On PC2 192.168.1.23 31:1C:3C:13:25:C4 Off PC3 192.168.1.25 20:A2:22:45:11:D2 On UNKNOWN 192.168.1.21 12:44:B2:FF:A1:22 Off
Which of the following should be the administrator’s next step to detect if there is a rogue system without impacting availability?
Physically check each system
Which of the following scenarios best describes a risk reduction technique?
A security control objective cannot be met through a technical change, so the company implements a policy to train users on a more secure method of operation.
A security analyst is reviewing the following output:
IP Address Physical Address Type
- 168.1.1 aa-bb-cc-00-11-22 dynamic
- 168.1.2 aa-bb-cc-00-11-22 dynamic
- 168.1.3 aa-bb-cc-00-11-22 dynamic
- 168.1.4 aa-bb-cc-00-11-22 dynamic
- 168.1.5 aa-bb-cc-00-11-22 dynamic—output omitted—192.168.1.251 aa-bb-cc-00-11-22 dynamic
- 168.1.252 aa-bb-cc-00-11-22 dynamic
- 168.1.253 aa-bb-cc-00-11-22 dynamic
- 168.1.254 aa-bb-cc-00-11-22 dynamic
- 168.1.255 ff-ff-ff-ff-ff-ff static
Which of the following is the analyst observing?
MAC address cloning
An organization recently acquired an ISO 27001 certification. Which of the following would most likely be considered a benefit of this certification?
It assures customers that the organization meets security standards
Which of the following is a risk that is specifically associated with hosting applications in the public cloud?
Shared tenancy
A forensic analyst needs to prove that the data she originally acquired has remained unchanged while in her custody. Which of the following should the analyst use?
Checksum
An analyst is trying to identify insecure services that are running on the internal network. After performing a port scan, the analyst identifies that a server has some insecure services enabled on default ports. Which of the following BEST describes the services that are currently running and the secure alternatives for replacing them? (Select THREE)
SNMPv2,SNMPv3
HTTP,HTTPS
Telnet,SSH
A global company is experiencing unauthorized logins due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third party identity provider to help mitigate these attacks. Which of the following would be the BEST control for the global company to require from prospective vendors?
MFA
An enterprise has hired an outside security firm to facilitate penetration testing on its networks and applications. The firm has agreed to pay for each vulnerability that is discovered. Which of the following BEST represents the type of testing being used?
Bug bounty
Which of the following distributes data among nodes, making it more difficult to manipulate the data while also minimizing downtime?
Fog computing
The lessons learned analysis from a recent incident reveals that an administrative office worker received a call from someone claiming to be from tech support. The caller convinced the office worker to visit a website, and then download and install a program masquerading as an antivirus package. The program was actually a backdoor that an attacker could later use to remote control the worker’s PC. Which of the following would be BEST to prevent this type of attack?
Segmentation
A bank detects fraudulent activity on a user’s account. The user confirms transactions completed yesterday on the bank website at https://www.company.com. A security analyst then examines the user’s Internet usage logs and observes the following output:
date;username;url;destinationport;responsecode
2020-03-01;userann;http://www.company.org/ ;80;302
2020-03-01;userann;http://www.company.org/ secure_login/;80;200
2020-03-01;userann;http://www.company.org/dashboard/;80;200
Which of the following has MOST likely occurred?
SSL stripping
A security analyst needs to perform periodic vulnerability scans on production systems. Which of the following scan types would produce the BEST vulnerability scan report?
Credentialed
After a hardware incident, an unplanned emergency maintenance activity was conducted to rectify the issue. Multiple alerts were generated on the SIEM during this period of time. Which of the following BEST explains what happened?
The SIEM was unable to correlate the rules, triggering the alerts
Users reported several suspicious activities within the last two weeks that resulted in several unauthorized transactions. Upon investigation, the security analyst found the following:
Multiple reports of breached credentials within that time period
Traffic being redirected in certain parts of the network
Fraudulent emails being sent by various internal users without their consent
Which of the following types of attacks was MOST likely used?
Request forgeries