security+ 501 Flashcards

1
Q

A security analyst wishes to increase the security of an FTP server. Currently, all trails to the FTP server is
unencrypted. Users connecting to the FTP server use a variety of modem FTP client software. The security
analyst wants to keep the same port and protocol, while also still allowing unencrypted connections. Which of
the following would BEST accomplish these goals?

A. Require the SFTP protocol to connect to the file server.
B. Use implicit TLS on the FTP server.
C. Use explicit FTPS for the connections.
D. Use SSH tunneling to encrypt the FTP traffic.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company has three divisions, each with its own networks and services. The company decides to make its
secure web portal accessible to all employees utilizing their existing usernames and passwords, The security
administrator has elected to use SAML to support authentication. In this scenario, which of the following will
occur when users try to authenticate to the portal? (Select TWO)

A. The portal will function as an identity provider and issue an authentication assertion
B. The portal will request an authentication ticket from each network that is transitively trusted
C. he back-end networks will function as an identity provider and issue an authentication assertion
D. The back-end networks will request authentication tickets from the portal, which will act as the third-party
service provider authentication store E. F. The back-end networks will verify the assertion token issued by
the portal functioning as the identity provider

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following would a security specialist be able to determine upon examination of a server’s
certificate?

A. CA public key
B. Server private key
C. CSR
D. OID

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user suspects someone has been accessing a home network without permission by spoofing the MAC
address of an authorized system While attempting to determine if an unauthorized user is togged into the home
network, the user reviews the wireless router, which shows the following table for systems that are currently on
the home network.
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?

A. Apply MAC filtering and see if the router drops any of the systems.
B. Physically check each of the authorized systems to determine if they are togged onto the network.
C. Deny the “unknown” host because the hostname is not known and MAC filtering is not applied to this host.
D. Conduct a ping sweep of each of the authorized systems and see if an echo response is received.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the
default driver and print settings. Which of the following is the MOST likely risk in this situation?

A. An attacker can access and change the printer configuration.
B. SNMP data leaving the printer will not be properly encrypted.
C. An MITM attack can reveal sensitive information.
D. An attacker can easily inject malicious code into the printer firmware.
E. Attackers can use the PCL protocol to bypass the firewall of client computers.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security analyst is hardening a server with the directory services role installed. The analyst must ensure
LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the
following should the analyst implement to meet these requirements? (Select TWO).

A. Generate an X 509-complaint certificate that is signed by a trusted CA.
B. Install and configure an SSH tunnel on the LDAP server.
C. Ensure port 389 is open between the clients and the servers using the communication.
D. Ensure port 636 is open between the clients and the servers using the communication.
E. Remove the LDAP directory service role from the server.

A

AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS
attack News outlets discover a certain type of refrigerator was exploited and used to send outbound packets to
the website that crashed. To which of the following categories does the refrigerator belong?

A. SoC
B. ICS
C. IoT
D. MFD

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user has attempted to access data at a higher classification level than the user’s account is currency
authorized to access. Which of the following access control models has been applied to this user’s account?

A. MAC
B. DAC
C. RBAC
D. ABAC

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company determines that it is prohibitively expensive to become compliant with new credit card regulations.
Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the
following is the company doing?

A. Transferring the risk
B. Accepting the risk
C. Avoiding the risk
D. Mitigating the risk

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An organization has determined it can tolerate a maximum of three hours of downtime.
Which of the following has been specified?

A. RTO
B. RPO
C. MTBF
D. MTTR

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the
future, impact of similar incidents. Which of the following would assist Company.com with its goal?

A. Certificate pinning
B. Certificate stapling
C. Certificate chaining
D. Certificate with extended validation

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

After a user reports stow computer performance, a systems administrator detects a suspicious file, which was
installed as part of a freeware software package. The systems administrator reviews the output below:

C:\WINDOWS\SYSTEM32\netstat -nab
Active Connections
Proto Local Address Foreign addr State
TCP 192.168.10.5000 10.37.213.20 Established
UDP 192.168.1.10.1900 .

Based on the above information, which of the following types of malware was installed on the user’s computer?

A. RAT
B. Keylogger
C. Spyware
D. Worm
E. Bot
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A high-security defense installation recently began utilizing large guard dogs that bark very loudly and excitedly
at the slightest provocation. Which of the following types of controls does this BEST describe?

A. Deterent
B. Preventive
C. Detective
D. Compensating

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An application team is performing a load-balancing test for a critical application during off- hours and has
requested access to the load balancer to review. Which servers are up without having the administrator on call.
The security analyst is hesitant to give the application team full access due to other critical applications running
on the road balancer. Which of the following is the BEST solution for the security analyst to process the
request?

A. Give the application team administrator access during off hours
B. Disable other critical applications before granting the team access.
C. Give the application team read-only access
D. Share the account with the application team

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An auditor wants to test the security posture of an organization by running a tool that will display the following:
JIMS <00> UNIQUE Registered
WORKGROUP <00> GROUP Registered
JIMS <00> UNIQUE Registered
Which of the following commands should be used?

A. nbtstat
B. nc
C. arp
D. ipconfig

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following attacks specifically impacts data availability?

A. DDoS
B. Trojan
C. MITM
D. Rootkit

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When connected to a secure WAP, which of the following encryption technologies is MOST likely to be
configured when connecting to WPA2-PSK?

A. DES
B. AES
C. MD5
D. WEP

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent
with a malware infection. Which of the following steps should the responder perform NEXT?

A. Capture and document necessary information to assist in the response
B. Request the user capture and provide a screenshot or recording of the symptoms
C. Use a remote desktop client to collect and analyze the malware m real time
D. Ask the user to back up files for later recovery

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An analyst wants to implement a more secure wireless authentication for office access points. Which of the
following technologies allows for encrypted authentication of wireless clients over TLS?

A. PEAP
B. EAP
C. WPA2
D. RADIUS

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is
mutual authentication and delegation. Given these requirements, which of the following technologies should the
analyst recommend and configure?

A. Kerberos services
B. NTLM services
C. CHAP services
D. EAP-TLS

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An organization wishes to provide better security for its name resolution services. Which of the following
technologies BEST supports the deployment DNSSEC at the organization?

A. TPM
B. TLS
C. SSL
D. PW

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ann, an employee in the payroll department, has contacted the help desk citing multiple issues with her device,
including:
· Slow performance
· Word documents, PDFs, and images no longer opening
· A pop-up
Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the
invoice, she had to click several security warnings to view it in her word processor. With which of the following
is the device MOST likely infected?

A. Crypto-malware
B. Rootkit
C. Backdoor
D. Botnet

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A department head at a university resigned on the first day of the spring semester. It was subsequently
determined that the department head deleted numerous files and directories from the server-based home
directory while the campus was closed. Which of the following policies or procedures co have prevented this
from occurring?

A. Time-of-day restrictions
B. Permission auditing and review
C. Offboarding
D. Account expiration

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A company is using a mobile device deployment model in which employees use their personal devices for work
at their own discretion. Some of the problems the company is encountering include the following:
*There is no standardization.
*Employees ask for reimbursement for their devices.
*Employees do not replace their devices often enough to keep them running efficiently.
*The company does not have enough control over the devices.
Which of the following is a deployment model that would help the company overcome these problems?

A. BYOD
B. VDI
C. COPE
D. CYOD

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following can be provided to an AAA system for the identification phase?

A. Username
B. Permissions
C. One-time token
D. Private certificate

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A Security engineer is configuring a system that requires the X 509 certificate information to be pasted into a
form field in Base64 encoded format to import it into the system. Which of the following certificate formats
should the engineer use to obtain the information in the required format?

A. PFX
B. PEM
C. DER
D. CER

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When performing data acquisition on a workstation, which of the following should be captured based on
memory volatility? (Select TWO).

A. USB-attached hard disk
B. Swap/pagefile
C. Mounted network storage
D. ROM
E. RAM
A

BE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following types of cloud Infrastructures would allow several organizations with similar structures
and interests to realize shared storage and resources?

A. Private
B. Hybrid
C. Public
D. Community

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following implements two-factor authentication?

A. A phone system requiring a PIN to make a call
B. An ATM requiring a credit card and PIN
C. A computer requiring username and password
D. A datacenter mantrap requiring fingerprint and iris scan

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A company is terminating an employee for misbehavior. Which of the following steps is MOST important in the
process of disengagement from this employee?

A. Obtain a list of passwords used by the employee.
B. Generate a report on outstanding projects the employee handled
C. Have the employee surrender company identification.
D. Have the employee sign an NDA before departing

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A penetration tester is crawling a target website that is available to the public. Which of the following represents
the actions the penetration tester is performing?

A. URL hijacking
B. Reconnaissance
C. White box testing
D. Escalation of privilege

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:

A. system sprawl.
B. end-of-life systems
C. resource exhaustion
D. a default configuration

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An organization’s internal auditor discovers that large sums of money have recently been paid to a vendor that
management does not recognize. The IT security department is asked to investigate the organization’s ERP
system to determine how the accounts payable module has been used to make these vendor payments.
The IT security department finds the following security configuration for the accounts payable module:
Which of the following changes to the security configuration of the accounts payable module would BEST
mitigate this risk?
A.
B.
C.
D.
A. Option A
B. Option B
C. Option C
D. Option D

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A
technician must ensure the OS settings are hardened. Which of the following is the BEST way to do this?

A. Use a vulnerability scanner.
B. Use a configuration compliance scanner.
C. Use a passive, in-line scanner.
D. Use a protocol analyzer.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a
free movie application that he installed from a third party on his corporate smartphone. Joe’s colleagues were
unable to find the application in the app stores. Which of the following allowed Joe to install the application?
(Select TWO).

A. Near-field communication
B. Rooting/jailbreaking
C. Ad-hoc connections
D. Tethering
E. Sideloading
A

BE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user
is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers the
user is on vacation and does not have network access. Which of the following types of attacks are MOST likely
occurring? (Select TWO)

A. Replay
B. Rainbow tables
C. Brute force
D. Pass the hash
E. Dictionary
A

CE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

When configuring settings in a mandatory access control environment, which of the following specifies the
subjects that can access specific data objects?

A. Owner
B. System
C. Administrator
D. User

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

server:

Process DEP Local Address Rem
MySQL NO 127.0.0.1 127
Apache NO 0.0.0.0
LSASS YES 0.0.0.0

Given the above information, which of the following processes was MOST likely exploited via a remote buffer
overflow attack?

A. Apache
B. LSASS
C. MySQL
D. TFTP

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A user clicked an email link that led to a website that infected the workstation with a virus. The virus encrypted
all the network shares to which the user had access. The virus was not detected or blocked by the company’s
email filter, website filter, or antivirus. Which of the following describes what occurred?

A. The WAP failed
B. Improper error handling triggered a false negative in all three controls B.
C. The email originated from a private email server with no malware protection
D. The virus was a zero-day attack

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following security controls does an iris scanner provide?

A. Logical
B. Administrative
C. Corrective
D. Physical
E. Detective
F. Deterrent
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

A. The scan job is scheduled to run during off-peak hours.
B. The scan output lists SQL injection attack vectors.
C. The scan data identifies the use of privileged-user credentials
D. The scan results identify the hostname and IP address

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Despite having implemented password policies, users continue to set the same weak passwords and reuse old
passwords. Which of the following technical controls would help prevent these policy violations? (Select TWO).

A. Password expiration
B. Password length
C. Password complexity
D. Password history
E. Password lockout
A

AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Users report the following message appears when browsing to the company’s secure site:
This website cannot be trusted. Which of the following actions should a security analyst take to resolve these
messages? (Select TWO).

A. Verify the certificate has not expired on the server.
B. Ensure the certificate has a .pfx extension on the server.
C. Update the root certificate into the client computer certificate store.
D. Install the updated private key on the web server.
E. Have users clear their browsing history and relaunch the session.

A

AC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for
unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator
accounts. For which of the following is the company hiring the consulting firm?

A. Vulnerability scanning
B. Penetration testing
C. Application fuzzing
D. User permission

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Two users need to send each other emails over unsecured channels. The system should support the principle
of non-repudiation. Winch of the following should be used to sign the users’ certificates?

A. CA
B. CRL
C. CSR
D. Sender’s Private key

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and
mapped shares on their devices when it is opened. The network and security teams perform the following
actions:
*Shut down all network shares.
*Run an email search identifying all employees who received the malicious message.
*Reimage all devices belonging to users who opened the attachment.
Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the
incident response process?

A. Eradication
B. Containment
C. Recovery
D. Lessons learned

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Malicious traffic from an internal network has been detected on an unauthorized port on an application server.
Which of the following network-based security controls should the engineer consider implementing?

A. ACLs
B. HIPS
C. NAT
D. MAC filtering

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A company wants to host a publicly available server that performs the following functions:
· Evaluates MX record lookup
· Can perform authenticated requests for A and AAA records
· Uses RRSIG
Which of the following should the company use to fulfill the above requirements?

A. DNSSEC
B. SFTP
C. nslookup
D. dig

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following attack types BEST describes a client-side attack that is used to mandate an HTML
iframe with JavaScript code via web browser?

A. MITM
B. XSS
C. SQL Injection
D. XSRF

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A company has a data classification system with definitions for “Private” and public.” The company’s security
policy outlines how data should be protected based on type. The company recently added the data type
“Proprietary” Which of the following is the MOST likely reason the company added this data type?

A. Reduced cost
B. More searchable data
C. Better data classification
D. Expanded authority of the privacy officer

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A security analyst is reviewing the following output from an IPS:
EXPLOIT IGMP IGAP MESSAGE OVERFLOW
250.19.18.71 -> 250.19.18.2

Given this output, which of the following can be concluded? (Select TWO).

A. The source IP of the attack is coming from 250.19 18.22.
B. The source IP of the attack is coming from 250 19.18 71.
C. The attacker sent a malformed IGMP packet, triggering the alert.
D. The attacker sent a malformed TCP packet, triggering the alert.
E. The TTL value is outside of the expected range, triggering the alert.

A

BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

An organization finds that most help desk calls are regarding account lockout due to a variety of applications
running on different systems. Manager is looking for a solution to reduce the number of account lockouts while
improving security. Which of the following is the BEST solution for this organization?

A. Create multiple application accounts for each user.
B. Provide secure tokens.
C. Implement SSO.
D. Utilize role-based access control.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

When trying to log onto a company’s new ticketing system, some employees receive the following message:
Access denied: too many concurrent sessions. The ticketing system was recently installed on a small VM with
only the recommended hardware specifications. Which of the following is the MOST likely cause for this error
message?

A. Network resources have been exceeded.
B. The software is out of licenses.
C. The VM does not have enough processing power.
D. The firewall is misconfigured.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented if the administrator does not want to
provide the wireless password or certificate to the employees?

A. B. 802.1x
B. WPS
C. WPA2-PSK
D. TKIP

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A company is developing a new secure technology and requires computers being used for
development to be isolated. Which of the following should be implemented to provide the MOST secure
environment?

A. A perimeter firewall and IDS
B. An air gapped compiler network
C. A honeypot residing in a DMZ
D. An ad hoc network with NAT
E. A bastion host
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which of the following explains why vendors publish MD5 values when they provide software patches for their
customers to download over the Internet?

A. The recipient can verify integrity of the software patch.
B. The recipient can verify the authenticity of the site used to download the patch.
C. The recipient can request future updates to the software using the published MD5 value.
D. The recipient can successfully activate the new software patch.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Refer to the following code:

Public class window {
     public static void main (string
          object blue = null;
          blue.hashcode();}
}

Which of the following vulnerabilities would occur if this is executed?

A. Page exception
B. Pointer dereference
C. NullPointerException
D. Missing null check

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A database backup schedule consists of weekly full backups performed on Saturday at
12:00 a.m. and daily differential backups also performed at 12:00 a.m. If the database is restored on Tuesday
afternoon, which of the following is the number of individual backups that would need to be applied to complete
the database recovery?

A. 1
B. 2
C. 3
D. 4

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which of the following technologies employ the use of SAML? (Select TWO).

A. Single sign-on
B. Federation
C. LDAP
D. Secure token
E. RADIUS
A

AB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

An organization is using a tool to perform a source code review. Which of the following describes the case in
which the tool incorrectly identifies the vulnerability?

A. False negative
B. True negative
C. False positive
D. True positive

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has
requested a cost-effective architecture to handle the variable capacity demand. Which of the following
characteristics BEST describes what the CIO has requested?

A. Elasticity
B. Scalability
C. High availability
D. Redundancy

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A Security analyst is diagnosing an incident in which a system was compromised from an external IP address.
The socket identified on the firewall was traced to 207.46.130.6666. Which of the following should the security
analyst do to determine if the compromised system still has an active connection?

A. tracert
B. netstat
C. Ping
D. nslookup

A

B

63
Q

Which of the following encryption methods does PKI typically use to securely protect keys?

A. Elliptic curve
B. Digital signatures
C. Asymmetric
D. Obfuscation

A

C

64
Q

Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Select
TWO).

A. Rainbow table attacks greatly reduce compute cycles at attack time.
B. Rainbow tables must include precompiled hashes.
C. Rainbow table attacks do not require access to hashed passwords.
D. Rainbow table attacks must be performed on the network.
E. Rainbow table attacks bypass maximum failed login restrictions.

A

BE

65
Q

Which of the following BEST describes a routine in which semicolons, dashes, quotes, and commas are
removed from a string?

A. Error handling to protect against program exploitation
B. Exception handling to protect against XSRF attacks
C. Input validation to protect against SQL injection
D. Padding to protect against string buffer overflows

A

C

66
Q

Which of the following is an important step to take BEFORE moving any installation packages from a test
environment to production?

A. Verify the hashes of files
B. Archive and compress the files
C. Update the secure baseline
D. Backup the installation patches

A

C

67
Q

Which of the following cryptographic attacks would salting of passwords render ineffective?

A. Dictionary
B. Rainbow tables
C. Birthday
D. Key stretching

A

B

68
Q

A network administrator wants to implement a method of securing internal routing. Which of the following
should the administrator implement?

A. DMZ
B. NAT
C. VPN
D. PAT

A

D

69
Q

Which of the following types of keys is found in a key escrow?

A. Public
B. Private
C. Shared
D. Session

A

B

70
Q

A senior incident response manager receives a call about some external IPs communicating with internal
computers during off hours. Which of the following types of malware is MOST likely causing this issue?

A. Botnet
B. Ransomware
C. Polymorphic malware
D. Armored virus

A

A

71
Q

A company is currently using the following configuration:
*IAS server with certificate-based EAP-PEAP and MSCHAP
*Unencrypted authentication via PAP
A security administrator needs to configure a new wireless setup with the following configurations:
*PAP authentication method
*PEAP and EAP provide two-factor authentication
Which of the following forms of authentication are being used? (Select TWO).

A. PAP
B. PEAP
C. MSCHAP
D. PEAP-MSCHAP
E. EAP
F. EAP-PEAP
A

EF

72
Q

A security analyst is checking the bash command history on a Linux host that was involved in a data breach.
The data breach stemmed from the Linux host running a series of commands against a web server on the
internal network, which exploited a vulnerability in an unpatched, outdated Apache module. Given this scenario,
which of the following commands might the analyst find in the bash command history for banner grabbing?
(Select TWO)

A. arp
B. tracert
C. nmap
D. telnet
E. nslookup
F. tcpdump
A

DF

73
Q

An administrator is configuring a wireless network. Security policy states that deprecated cryptography should not be used when there is an alternative choice. Which of the following should the administrator use for the wireless network’s cryptographic protocol?

A. MD5
B. RC4
C. TKIP
D. CCMP
E. Diffie-Hellman
A

D

74
Q

Which of the following allows an auditor to test proprietary-software compiled code for security flaws?

A. Fuzzing
B. Static review
C. Code signing
D. Regression testing

A

A

75
Q

Which of the following would be considered multifactor authentication?

A. Hardware token and smart card
B. Voice recognition and retina scan
C. Strong password and fingerprint
D. PIN and security questions

A

C

76
Q

An organization wants to upgrade its enterprise-wide desktop computer solution. The organization currently has 500 PCs active on the network. The Chief Information Security Officer (CISO) suggests that the organization employ desktop imaging technology for such a large-scale upgrade. Which of the following is a security benefit of implementing an imaging solution?

A. It allows for faster deployment.
B. It provides a consistent baseline.
C. It reduces the number of vulnerabilities.
D. It decreases the boot time.

A

B

77
Q

A security administrator wants to implement a logon script that will prevent MITM attacks on the local LAN.
Which of the following commands should the security administrator implement within the script to accomplish
this task?

A. arp - s 192.168.1.1 00-3a-d1-fa-b1-06
B. dig - x@192.168.1.1 mypc.comptia.com
C. nmap - A - T4 192.168.1.1
D. tcpdump - lnv host 192.168.1.1 or either 00:3a:d1:fa:b1:06

A

A

78
Q

Which of the following is the BEST reason for salting a password hash before it is stored in a database?

A. To prevent duplicate values from being stored
B. To make the password retrieval process very slow
C. To protect passwords from being saved in readable format
D. To prevent users from using simple passwords for their access credentials

A

A

79
Q

An actor downloads and runs a program against a corporate login page. The program imports a list of
usernames and passwords, looking for a successful attempt. Which of the following terms BEST describes the actor in this situation?

A. Script kiddie
B. Hacktivist
C. Cryptologist
D. Security auditor

A

A

80
Q

An organization wants to utilize a common, Internet-based third-party provider for authorization and
authentication. The provider uses a technology based on OAuth 2.0 to provide required services. To which of
the following technologies is the provider referring?

A. OpenID Connect
B. SAML
C. XACML
D. LDAP

A

A

81
Q

A penetration tester harvests potential usernames from a social networking site. The penetration tester then
uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a
network server. Which of the following methods is the penetration tester MOST likely using?

A. Escalation of privilege
B. SQL injection
C. Active reconnaissance
D. Proxy server

A

C

82
Q

Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO)

A. An attacker could potentially perform a downgrade attack.
B. The connection is vulnerable to resource exhaustion.
C. The integrity of the data could be at risk.
D. The VPN concentrator could revert to L2TP.
E. The IPSec payload reverted to 16-bit sequence numbers.

A

AE

83
Q

Which of the following is the BEST choice for a security control that represents a preventive and corrective
logical control at the same time?

A. Security awareness training
B. Antivirus
C. Firewalls
D. Intrusion detection system

A

B

84
Q

A web developers improves client access to the company’s REST API. Authentication needs to be tokenized but not expose the client’s password. Which of the following methods would BEST meet the developer’s
requirements?

A. SAML
B. LDAP
C. OAuth
D. Shibboleth

A

A

85
Q

A vulnerability scan is being conducted against a desktop system. The scan is looking for files, versions, and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed?

A. Non-intrusive
B. Authenticated
C. Credentialed
D. Active

A

C

86
Q

A security analyst is updating a BIA document. The security analyst notices the support vendor’s time to replace a server hard drive went from eight hours to two hours. Given these new metrics, which of the following can be concluded? (Select TWO)

A. The MTTR is faster.
B. The MTTR is slower.
C. The RTO has increased.
D. The RTO has decreased.
E. The MTTF has increased.
F. The MTTF has decreased.
A

AD

87
Q

Which of the following could help detect trespassers in a secure facility? (Select TWO)

A. Faraday cages
B. Motion-detection sensors
C. Tall, chain-link fencing
D. Security guards
E. Smart cards
A

BD

88
Q

The IT department is deploying new computers. To ease the transition, users will be allowed to access their old
and new systems. The help desk is receive reports that users are experiencing the following error when
attempting to log in to their previous system:
Logon Failure: Access Denied Which of the following can cause this issue?

A. Permission issues
B. Access violations
C. Certificate issues
D. Misconfigured devices

A

C

89
Q

A third-party penetration testing company was able to successfully use an ARP cache poison technique to gain
root access on a server. The tester successfully moved to another server that was not in the original network.
Which of the following is the MOST likely method used to gain access to the other host?

A. Backdoor
B. Pivoting
C. Persistance
D. Logic bomp

A

B

90
Q

Ann, a security administrator, wants to ensure credentials are encrypted in transit when implementing a
RADIUS server for SSO. Which of the following are needed given these requirements? (Select TWO)

A. Public key
B. Shared key
C. Elliptic curve
D. MD5
E. Private key
F. DES
A

AE

91
Q

The POODLE attack is a MITM exploit that affects:

A. TLS1.0 with CBC mode cipher.
B. SSLv2.0 with CBC mode cipher,
C. SSLv3.0 with CBC mode cipher.
D. SSLv3.0 with ECB mode cipher.

A

B

92
Q

To determine the ALE of a particular risk, which of the following must be calculated? (Select TWO).

A. ARO
B. ROI
C. RPO
D. SLE
E. RTO
A

AD

93
Q

Which of the following are used to increase the computing time it takes to brute force a password using an offline attack? (Select TWO)

A. XOR
B. PBKDF2
C. bcrypt
D. HMAC
E. RIPEMD
A

BC

94
Q

Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-factor authentication to improve security. Which of the following authentication methods should be deployed to achieve this goal?

A. PIN
B. Security question
C. Smart card
D. Passphrase
E. CAPTCHA
A

C

95
Q

A security administrator needs to address the following audit recommendations for a public-facing SFTP server:
Users should be restricted to upload and download files to their own home directories only.
Users should not be allowed to use interactive shell login.
Which of the following configuration parameters should be implemented? (Select TWO).

A. PermitTunnel
B. ChrootDirectory
C. PermitTTY
D. AllowTcpForwarding
E. IgnoreRhosts
A

BE

96
Q

An organization recently moved its custom web applications to the cloud, and it is obtaining managed services of the back-end environment as part of its subscription. Which of the following types of services is this company now using?

A. SaaS
B. CASB
C. IaaS
D. PaaS

A

B

97
Q

Which of the following is commonly done as part of a vulnerability scan?

A. Exploiting misconfigured applications
B. Cracking employee passwords
C. Sending phishing emails to employees
D. Identifying unpatched workstations

A

D

98
Q

A company is evaluating cloud providers to reduce the cost of its internal IT operations. The company’s aging
systems are unable to keep up with customer demand. Which of the following cloud models will the company
MOST likely select?

A. PaaS
B. SaaS
C. IaaS
D. BaaS

A

C

99
Q

After a security incident, management is meeting with involved employees to document the incident and its
aftermath. Which of the following BEST describes this phase of the incident response process?

A. Lessons learned
B. Recovery
C. Identification
D. Preparation

A

A

100
Q

After an identified security breach, an analyst is tasked to initiate the IR process. Which of the following is the
NEXT step the analyst should take?

A. Recovery
B. Identification
C. Preparation
D. Documentation
E. Escalation
A

B

101
Q

A user needs to send sensitive information to a colleague using PKI. Which of the following concepts apply when a sender encrypts the message hash with the sender’s private key? (Select TWO)

A. Non-repudiation
B. Email content encryption
C. Steganography
D. Transport security
E. Message integrity
A

AE

102
Q

A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING - hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING - hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely on the above information, which of the following types of malware is MOST likely installed on the
system?

A. Rootkit
B. Ransomware
C. Trojan
D. Backdoor

A

A

103
Q

As part of a new BYOD rollout, a security analyst has been asked to find a way to securely store company data on personal devices. Which of the following would BEST help to accomplish this?

A. Require the use of an eight-character PIN.
B. Implement containerization of company data.
C. Require annual AUP sign-off.
D. Use geofencing tools to unlock devices while on the premises.

A

B

104
Q

A web server, which is configured to use TLS with AES-GCM-256, SHA-384, and ECDSA, recently suffered an
information loss breach. Which of the following is MOST likely the cause?

A. Insufficient key bit length
B. Weak cipher suite
C. Unauthenticated encryption method
D. Poor implementation

A

D

105
Q

An incident involving a workstation that is potentially infected with a virus has occurred. The workstation may
have sent confidential data to an unknown internet server. Which of the following should a security analyst do FIRST?

A. Make a copy of everything in memory on the workstation.
B. Turn off the workstation.
C. Consult the information security policy.
D. Run a virus scan.

A

A

106
Q

Which of the following BEST describes an important security advantage yielded by implementing vendor
diversity?

A. Sustainability
B. Homogeneity
C. Resiliency
D. Configurability

A

C

107
Q

A dumpster diver recovers several hard drives from a company and is able to obtain confidential data from one of the hard drives. The company then discovers its information is posted online. Which of the following methods would have MOST likely prevented the data from being exposed?

A. Removing the hard drive from its enclosure
B. Using software to repeatedly rewrite over the disk space
C. Using Blowfish encryption on the hard drives
D. Using magnetic fields to erase the data

A

D

108
Q

A manager wants to distribute a report to several other managers with the company. Some of them reside in
remote locations that are not connected to the domain but have a local server. Because there is sensitive data
within the report and the size of the report is beyond the limit of the email attachment size, emailing the report is
not an option. Which of the following protocols should be implemented to distribute the report securely? (Select THREE)

A. S/MIME
B. SSH
C. SNMPv3
D. FTPS
E. SRTP
F. HTTPS
G. LDAPS
Correct
A

BDF

109
Q

vice president at a manufacturing organization is concerned about desktops being connected to the network.
Employees need to log onto the desktops’ local account to verify that a product is being created within
specifications; otherwise, the desktops should be as isolated as possible. Which of the following is the BEST
way to accomplish this?

A. Put the desktops in the DMZ.
B. Create a separate VLAN for the desktops.
C. Air gap the desktops.
D. Join the desktops to an ad-hoc network.

A

C

110
Q

An in-house penetration tester has been asked to evade a new DLP system. The tester plans to exfiltrate data
through steganography. Discovery of which of the following would help catch the tester in the act?

A. Abnormally high numbers of outgoing instant messages that contain obfuscated text
B. Large-capacity USB drives on the tester’s desk with encrypted zip files
C. Outgoing emails containing unusually large image files
D. Unusual SFTP connections to a consumer IP address

A

C

111
Q

A member of the admins group reports being unable to modify the “changes” file on a server. The permissions
on the file are as follows:
Permissions User Group File
-rwxrw-r–+ Admins Admins changes
Based on the output above, which of the following BEST explains why the user is unable to modify the
“changes” file?

A. The SELinux mode on the server is set to “enforcing.”
B. The SELinux mode on the server is set to “permissive.”
C. An FACL has been added to the permissions for the file.
D. The admins group does not have adequate permissions to access the file.

A

C

112
Q

A penetration tester is conducting an assessment on Comptia.org and runs the following command from a
coffee shop while connected to the public Internet:
c:\nslookup -querytype=MX comptia.org
Server: Unknown
Addres: 198.51.100.45
comptia.org MX preference=10, mail exchanger = 92.68.102.33
comptia.org MX preference=20, mail exchanger = exchg1.comptia.org
exchg1.comptia.org internet address = 192.168.102.67
Which of the following should the penetration tester conclude about the command output?

A. The public/private views on the Comptia.org DNS servers are misconfigured.
B. Comptia.org is running an older mail server, which may be vulnerable to exploits.
C. The DNS SPF records have not been updated for Comptia.org.
D. 192.168.102.67 is a backup mail server that may be more vulnerable to attack.

A

D

113
Q

A security analyst is inspecting the results of a recent internal vulnerability scan that was performed against
intranet services. The scan reports include the following critical-rated vulnerability:
Title: Remote Command Execution vulnerability in web server
Rating: Critical (CVSS 10.0)
Threat actor: any remote user of the web server
Confidence: certain
Recommendation: apply vendor patches
Which of the following actions should the security analyst perform FIRST?

A. Escalate the issue to senior management.
B. Apply organizational context to the risk rating.
C. Organize for urgent out-of-cycle patching.
D. Exploit the server to check whether it is a false positive.

A

B

114
Q

Company A agrees to provide perimeter protection, power, and environmental support with measurable goals for Company B, but will not be responsible for user authentication or patching of operating systems within the perimeter. Which of the following is being described?

A. Service level agreement
B. Memorandum of understanding
C. Business partner agreement
D. Interoperability agreement

A

C

115
Q

A company is deploying smartphones for its mobile salesforce. These devices are for personal and business
use but are owned by the company. Sales personnel will save new customer data via a custom application
developed for the company. This application will integrate with the contact information stored in the
smartphones and will populate new customer records onto it. The customer application’s data is encrypted at
rest, and the application’s connection to the back office system is considered secure. The Chief Information
Security Officer (CISO) has concerns that customer contact information may be accidentally leaked due to the limited security capabilities of the devices and the planned controls. Which of the following will be the MOST efficient security control to implement to lower this risk?

A. Implement a mobile data loss agent on the devices to prevent any user manipulation with the contact
information.
B. Restrict screen capture features on the devices when using the custom application and the contact
information.
C. Restrict contact information storage dataflow so it is only shared with the customer application.
D. Require complex passwords for authentication when accessing the contact information.

A

C

116
Q

The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO
is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of the following equipment MUST be deployed to guard against unknown threats?

A. Cloud-based antivirus solution, running as local admin, with push technology for definition updates
B. Implementation of an off-site datacenter hosting all company data, as well as deployment of VDI for all client
computing needs
C. Host-based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall
ACLs
D. Behavior-based IPS with a communication link to a cloud-based vulnerability and threat feed

A

D

117
Q

An organization has several production-critical SCADA supervisory systems that cannot follow the normal 30-
day patching policy. Which of the following BEST maximizes the protection of these systems from malicious software?

A. Configure a firewall with deep packet inspection that restricts traffic to the systems.
B. Configure a separate zone for the systems and restrict access to known ports.
C. Configure the systems to ensure only necessary applications are able to run.
D. Configure the host firewall to ensure only the necessary applications have listening ports.

A

A

118
Q

An organization identifies a number of hosts making outbound connections to a known malicious IP over port
TCP 80. The organization wants to identify the data being transmitted and prevent future connections to this IP.
Which of the following should the organization do to achieve this outcome?

A. Use a protocol analyzer to reconstruct the data and implement a web-proxy.
B. Deploy a web-proxy and then blacklist the IP on the firewall.
C. Deploy a web-proxy and implement IPS at the network edge.
D. Use a protocol analyzer to reconstruct the data and blacklist the IP on the firewall.

A

D

119
Q

Legal authorities notify a company that its network has been compromised for the second time in two years.
The investigation shows the attackers were able to use the same vulnerability on different systems in both
attacks. Which of the following would have allowed the security team to use historical information to protect
against the second attack?

A. Key risk indicators
B. Lessons learned
C. Recovery point objectives
D. Tabletop exercise

A

B

120
Q

A small company’s Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the
company’s security posture quickly with regard to targeted attacks. Which of the following should the CSO
conduct FIRST?

A. Survey threat feeds from services inside the same industry.
B. Purchase multiple threat feeds to ensure diversity and implement blocks for malicious traffic.
C. Conduct an internal audit against industry best practices to perform a qualitative analysis.
D. Deploy a UTM solution that receives frequent updates from a trusted industry vendor

A

A

121
Q

During a routine vulnerability assessment, the following command was successful:
echo “vrfy ‘perl -e ‘print “hi” x 500 ‘ ‘ “ | nc www.company.com 25
Which of the following vulnerabilities is being exploited?

A. Buffer overflow directed at a specific host MTA
B. SQL injection directed at a web server
C. Cross-site scripting directed at www.company.com
D. Race condition in a UNIX shell script

A

A

122
Q

A forensic investigator has run into difficulty recovering usable files from a SAN drive. Which of the following
SAN features might have caused the problem?

A. Storage multipaths
B. Deduplication
C. iSCSI initiator encryption
D. Data snapshots

A

B

123
Q

A company offers SaaS, maintaining all customers’ credentials and authenticating locally. Many large
customers have requested the company offer some form of federation with their existing authentication
infrastructures. Which of the following would allow customers to manage authentication and authorizations from within their existing organizations?

A. Implement SAML so the company’s services may accept assertions from the customers’ authentication
servers.
B. Provide customers with a constrained interface to manage only their users’ accounts in the company’s
active directory server.
C. Provide a system for customers to replicate their users’ passwords from their authentication service to the
company’s.
D. Use SOAP calls to support authentication between the company’s product and the customers’
authentication servers.

A

A

124
Q

A software development manager is taking over an existing software development project. The team currently suffers from poor communication due to a long delay between requirements documentation and feature
delivery. This gap is resulting in an above average number of security-related bugs making it into production.
Which of the following development methodologies is the team MOST likely using now?

A. Agile
B. Waterfall
C. Scrum
D. Spiral

A

B

125
Q

Following the successful response to a data-leakage incident, the incident team lead facilitates an exercise that focuses on continuous improvement of the organization’s incident response capabilities. Which of the following activities has the incident team lead executed?

A. Lessons learned review
B. Root cause analysis
C. Incident audit
D. Corrective action exercise

A

A

126
Q

A security analyst is attempting to break into a client’s secure network. The analyst was not given prior
information about the client, except for a block of public IP addresses that are currently in use. After network
enumeration, the analyst’s NEXT step is to perform:

A. a gray-box penetration test.
B. a risk analysis.
C. a vulnerability assessment.
D. an external security audit.
E. a red team exercise.
A

A

127
Q

A security architect has convened a meeting to discuss an organization’s key management policy. The
organization has a reliable internal key management system, and some argue that it would be best to manage
the cryptographic keys internally as opposed to using a solution from a third party. The company should use:

A. the current internal key management system.
B. a third-party key management system that will reduce operating costs.
C. risk benefits analysis results to make a determination.
D. a software solution including secure key escrow capabilities.

A

C

128
Q

After a recent internal breach, a company decided to regenerate and reissue all certificates used in the
transmission of confidential information. The company places the greatest importance on confidentiality and
non-repudiation, and decided to generate dual key pairs for each client. Which of the following BEST describes
how the company will use these certificates?

A. One key pair will be used for encryption and decryption. The other will be used to digitally sign the data.
B. One key pair will be used for encryption. The other key pair will provide extended validation.
C. Data will be encrypted once by each key, doubling the confidentiality and non-repudiation strength.
D. One key pair will be used for internal communication, and the other will be used for external
communication.

A

A

129
Q

A security manager is creating an account management policy for a global organization with sales personnel
who must access corporate network resources while traveling all over the world. Which of the following
practices is the security manager MOST likely to enforce with the policy? (Select TWO)

A. Time-of-day restrictions
B. Password complexity
C. Location-based authentication
D. Group-based access control
E. Standard naming convention
A

BC

130
Q
A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented if the administrator does not want to provide the wireless password or certificate to the employees?
A. WPS
B. 802.1x
C. WPA2-PSK
D. TKIP
A

A

131
Q

A security administrator learns that PII, which was gathered by the organization, has been found in an open
forum. As a result, several C-level executives found their identities were compromised, and they were victims of
a recent whaling attack. Which of the following would prevent these problems in the future? (Select TWO).

A. Implement a reverse proxy.
B. Implement an email DLP.
C. Implement a spam filter.
D. Implement a host-based firewall.
E. Implement a HIDS.
A

BC

132
Q

A security engineer is configuring a wireless network with EAP-TLS. Which of the following activities is a
requirement for this configuration?

A. Setting up a server
B. Configuring federation between authentication servers
C. Enabling TOTP
D. Deploying certificates to endpoint devices

A

D

133
Q

Ann is the IS manager for several new systems in which the classification of the systems’ data are being
decided. She is trying to determine the sensitivity level of the data being processed. Which of the following
people should she consult to determine the data classification?

A. Steward
B. Custodian
C. User
D. Owner

A

D

134
Q

Which of the following BEST describes a network-based attack that can allow an attacker to take full control of
a vulnerable host?

A. Remote exploit
B. Amplification
C. Sniffing
D. Man-in-the-middle

A

A

135
Q

A new security administrator ran a vulnerability scanner for the first time and caused a system outage. Which of
the following types of scans MOST likely caused the outage?

A. Non-intrusive credentialed scan
B. Non-intrusive non-credentialed scan
C. Intrusive credentialed scan
D. Intrusive non-credentialed scan

A

D

136
Q

A systems administrator wants to generate a self-signed certificate for an internal website. Which of the
following steps should the systems administrator complete prior to installing the certificate on the server?

A. Provide the private key to a public CA.
B. Provide the public key to the internal CA.
C. Provide the public key to a public CA.
D. Provide the private key to the internal CA.
E. Provide the public/private key pair to the internal CA.
F. Provide the public/private key pair to a public CA

A

D

137
Q

A security analyst has received the following alert snippet from the HIDS appliance:
PROTOCOL SIG SRC.PORT DST.PORT
TCP XMAS SCAN 192.168.1.1:1091 192.168.1.2:8891
TCP XMAS SCAN 192.168.1.1:649 192.168.1.2:9001
TCP XMAS SCAN 192.168.1.1:2264 192.168.1.2:6455
TCP XMAS SCAN 192.168.1.1:3464 192.168.1.2:8744
Given the above logs, which of the following is the cause of the attack?

A. The TCP ports on destination are all open.
B. FIN, URG, and PSH flags are set in the packet header.
C. TCP MSS is configured improperly.
D. There is improper Layer 2 segmentation.

A

B

138
Q

Which of the following is the BEST reason for salting a password hash before it is stored in a database?

A. To prevent duplicate values from being stored.
B. To make the password retrieval process very slow.
C. To protect passwords from being saved in readable format.
D. To prevent users from using simple passwords for their access credentials.

A

A

139
Q

Which of the following controls allows a security guard to perform a post-incident review?

A. Detective
B. Preventive
C. Corrective
D. Deterrent

A

C

140
Q

A user receives an email from ISP indicating malicious traffic coming from the user’s home network is detected.
The traffic appears to be Linux-based, and it is targeting a website that was recently featured on the news as
being taken offline by an Internet attack. The only Linux device on the network is a home surveillance camera
system. Which of the following BEST describes what is happening?

A. The camera system is infected with a bot.
B. The camera system is infected with a RAT.
C. The camera system is infected with a Trojan.
D. The camera system is infected with a backdoor.

A

A

141
Q

Attackers have been using revoked certificates for MITM attacks to steal credentials from employees of
Company.com. Which of the following options should Company.com implement to mitigate these attacks?

A. Captive portal
B. Extended validation certificate
C. OCSP stapling
D. Object identifiers
E. Key escrow
A

C

142
Q

After attempting to harden a web server, a security analyst needs to determine if an application remains
vulnerable to SQL injection attacks. Which of the following would BEST assist the analyst in making this
determination?

A. tracert
B. Fuzzer
C. nslookup
D. Nmap
E. netcat
A

B

143
Q

A company is allowing a BYOD policy for its staff. Which of the following is a best practice that can decrease
the risk of users jailbreaking mobile devices?

A. Install a corporately monitored mobile antivirus on the devices.
B. Prevent the installation of applications from a third-party application store.
C. Build a custom ROM that can prevent jailbreaking.
D. Require applications to be digitally signed

A

D

144
Q

Which of the following describes the key difference between vishing and phishing attacks?

A. Phishing is used by attackers to steal a person’s identity.
B. Vishing attacks require some knowledge of the target of attack.
C. Vishing attacks are accomplished using telephony services.
D. Phishing is a category of social engineering attack.

A

C

145
Q

Which of the following should a security analyst perform FIRST to determine the vulnerabilities of a legacy
system?

A. Passive scan
B. Aggressive scan
C. Credentialed scan
D. Intrusive scan

A

A

146
Q

Which of the following components of printers and MFDs are MOST likely to be used as vectors of compromise if they are improperly configured?

A. Embedded web server
B. Spooler
C. Network interface
D. LCD control panel

A

A

147
Q

A hacker has a packet capture that contains:
……………………….qw…………………………………………………..5
….Joe Smith………E289F21CD33E4F57890DDEA5CF267ED2..
…Jane.Doe………..AD1FAB10D33E4F57890DDEA5CF267ED2..
………………………document.pdf…………………….9……………….
…John.Key……….3374E9E7E33E4F57890DDEA5CF267ED2..
Which of the following tools will the hacker use against this type of capture?

A. Password cracker
B. Vulnerability scanner
C. DLP scanner
D. Fuzzer

A

A

148
Q

A user downloads and installs an MP3 converter, and runs the application. Upon running the application, the
antivirus detects a new port in a listening state. Which of the following has the user MOST likely executed?

A. RAT
B. Worm
C. Ransomware
D. Bot

A

A

149
Q

A manager wants to distribute a report to several other managers within the company. Some of them reside in
remote locations that are not connected to the domain but have a local server. Because there is sensitive data
within the report and the size of the report is beyond the limit of the email attachment size, emailing the report is
not an option. Which of the following protocols should be implemented to distribute the report securely? (Select THREE).

A. S/MIME
B. SSH
C. SNMPv3
D. FTPS
E. SRTP
F. HTTPS
G. LDAPS
A

BDF

150
Q

An attacker exploited a vulnerability on a mail server using the code below.
“ +
“URL:” +”document.location) ; />

Which of the following BEST explains what the attacker is doing?

A. The attacker is replacing a cookie.
B. The attacker is stealing a document.
C. The attacker is replacing a document.
D. The attacker is deleting a cookie.

A

C

151
Q

A security analyst is securing smartphones and laptops for a highly mobile workforce. Priorities include:

Remote wipe capabilities
Geolocation services
Patch management and reporting
Mandatory screen locks
Ability to require passcodes and pins
Ability to require encryption

Which of the following would BEST meet these requirements?

A. Implementing MDM software
B. Deploying relevant group policies to the devices
C. Installing full device encryption
D. Removing administrative rights to the devices

A

A

152
Q

A technician receives a device with the following anomalies:
Frequent pop-up ads
Show response-time switching between active programs
Unresponsive peripherals
The technician reviews the following log file entries:
File Name Source MD5 Target MD5
Status
antivirus.exe F794F21CD33E4F57890DDEA5CF267ED2
F794F21CD33E4F57890DDEA5CF267ED2 Automatic
iexplore.exe 7FAAF21CD33E4F57890DDEA5CF29CCEA
AA87F21CD33E4F57890DDEAEE2197333 Automatic
service.exe 77FF390CD33E4F57890DDEA5CF28881F
77FF390CD33E4F57890DDEA5CF28881F Manual
USB.exe E289F21CD33E4F57890DDEA5CF28EDC0
E289F21CD33E4F57890DDEA5CF28EDC0 Stopped
Based on the above output, which of the following should be reviewed?

A. The web application firewall
B. The file integrity check
C. The data execution prevention
D. The removable media control

A

A

153
Q

A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the
domain controller, the systems administrator needs to provide the domain administrator credentials. Which of
the following account types is the systems administrator using?

A. Guest account
B. Service account
C. User account
D. Local Account

A

C

154
Q

An organization plans to implement multifactor authentication techniques within the enterprise network
architecture. Each authentication factor is expected to be a unique control. Which of the following BEST
describes the proper employment of multifactor authentication?

A. Proximity card, fingerprint scanner, PIN
B. Fingerprint scanner, voice recognition, proximity card
C. Smart card, user PKI certificate, privileged user certificate
D. Voice recognition, smart card, proximity card

A

A