SEC= Flashcards
(362 cards)
Ann. a user, reported to the service desk that many files on her computer will not open or the contents are
not readable. The service desk technician asked Ann if she encountered any strange messages on boot-up
or login, and Ann indicated she did not. Which of the following has MOST likely occurred on Ann’s
computer?
The computer has been infected with crypto-malware
A security administrator is investigating a report that a user is receiving suspicious emails. The user’s
machine has an old functioning modem installed. Which of the following security concerns need to be
identified and mitigated? (Choose two.)
War dialing
F. Hoaxing
An administrator needs to protect rive websites with SSL certificates Three of the websites have different
domain names, and two of the websites share the domain name but have different subdomain prefixes. Which of the following SSL certificates should the administrator purchase to protect all the websites and be
able to administer them easily at a later time?
One Unified Communications Certificate and one wildcard certificate
Which of the following are the MOST likely vectors for the unauthorized or unintentional inclusion of
vulnerable code in a software company’s final software releases? (Select TWO)
Unsecure protocols
Weak passwords
An organization has hired a security analyst to perform a penetration test. The analyst captures 1GB worth
of inbound network traffic to the server and transfers the pcap back to the machine for analysis. Which of
the following tools should the analyst use to future review the pcap?
Wireshark
An administrator is beginning an authorized penetration test of a corporate network. Which of the following
tools would BEST assist in identifying potential attacks?
Nmap
A company is examining possible locations for a hot site. Which of the following considerations is of MOST
concern if the replication technology being used is highly sensitive to network latency?
Location proximity to the production site
Which of the following is an example of the second A in the AAA model?
The one-time password is keyed in, and the login system grants access.
Which of the following BEST explains the reason why a server administrator would place a document
named password.txt on the desktop of an administrator account on a server?
The document is a honeyfile and is meant to attract the attention of a cyberintruder
A systems engineer is configuring a wireless network. The network must not require installation of
third-party software. Mutual authentication of the client and the server must be used. The company has an
internal PKI. Which of the following configuration should the engineer choose?
EAP-TLS
A first responder needs to collect digital evidence from a compromised headless virtual host. Which of the
following should the first responder collect FIRST?
Snapshot
An organization’s policy requires users to create passwords with an uppercase letter, lowercase letter, number, and symbol. This policy is enforced with technical controls, which also prevents users from using
any of their previous 12 passwords. The quantization does not use single sign-on, nor does it centralize
storage of passwords. The incident response team recently discovered that passwords for one system were compromised. Passwords for a completely separate system have NOT been compromised, but unusual login activity has
been detected for that separate system. Account login has been detected for users who are on vacation. Which of the following BEST describes what is happening?
The compromised password file has been brute-force hacked, and the complexity requirements are not
adequate to mitigate this risk
A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external
networks. Which of the following methods would BEST prevent the exfiltration of data? (Select TWO)
Drive encryption
Network firewall
A company has had a BYOD policy in place for many years and now wants to roll out an MDM solution. The
company has decided that end users who wish to utilize their personal devices for corporate use must opt
in to the MDM solution. End users are voicing concerns about the company having access to their personal
devices via the MDM solution. Which of the following should the company implement to ease these
concerns?
Application management
A company has a backup site with equipment on site without any data. This is an example of:
a cold site.
Fuzzing is used to reveal which of the following vulnerabilities in web applications?
Improper input handling
A company occupies the third floor of a leased building that has other tenants. The path from the
demarcation point to the company’s controlled space runs through unsecured areas managed by other
companies. Which of the following could be used to protect the company’s cabling as it passes through
uncontrolled spaces?
Cable locks
Which of the following is a security consideration for IoT devices?
. IoT devices have built-in accounts that users rarely access.
A network administrator was concerned during an audit that users were able to use the same passwords
the day after a password change policy took effect. The following settings are in place: * Users must change their passwords every 30 days. * Users cannot reuse the last 10 passwords. Which of the following settings would prevent users from being able to immediately reuse the same
passwords?
Minimum password age of five days
A security administrator is choosing an algorithm to generate password hashes. Which of the following
would offer the BEST protection against offline brute force attacks?
SHA-1
A network technician discovered the usernames and passwords used for network device configuration have
been compromised by a user with a packet sniffer. Which of the following would secure the credentials from
sniffing?
Use SSH for remote access.
A systems administrator needs to integrate multiple loT and small embedded devices into the company’s
wireless network securely Witch of the following should the administrator implement to ensure low-power
and legacy devices can connect to the wireless network?
WPS
After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?
A VLAN
An Organization requires secure configuration baselines for all platforms and technologies that are used. If
any system cannot conform to the secure baseline, the organization must process a risk acceptance and
receive approval before the system is placed into production. It may have non-conforming systems in its
lower environments (development and staging) without risk acceptance, but must receive risk approval
before the system is placed in production. Weekly scan reports identify systems that do not conform to any
secure baseline. The application team receive a report with the following results:
There are currently no risk acceptances for baseline deviations. This is a mission-critical application, and
the organization cannot operate If the application is not running. The application fully functions in the
development and staging environments. Which of the following actions should the application team take?
Process a risk acceptance for 2633 and remediate 3124.