Security + Measure Up #4 Flashcards
Pass the First Time
A security administrator discovers that an employee is exfiltrating proprietary company information. The administrator is concerned that the user may try to cover their tracks. What should the administrator do first?
A. Install a keylogger on the employee’s workstation
B. Implement a legal hold on the user’s mailbox
C. Enable data loss prevention on email servers
D. Create a bit-stream image of the employee’s workstation
B: Implement a legal hold on the user’s mailbox. This ensures that all email data is preserved and prevents any deletions or alterations, maintaining the integrity of the evidence while the investigation is conducted. It’s an immediate step that helps to secure critical data.
A security analyst has completed forensics on a compromised server. The analyst suspects the server was breached using a buffer overflow attack. What is the BEST indicator of this attack?
A. User logon errors
B. System crashes
C. Directory traversal events
D. Corrupted system files
B: System crashes. Buffer overflow attacks often result in system instability and crashes because they manipulate memory, causing the system to behave unpredictably.
An organization plans to contract with a provider for a disaster recovery site that will host server hardware. When the primary data center fails, data will be restored, and the secondary site will be activated. Costs must be minimized. Which type of disaster recovery site should the organization deploy?
A. Hot site
B. Cold site
C. Warm site
D. Mobile site
C. Warm site
In that scenario, deploying a warm site (Option C) strikes a balance between cost and readiness. A warm site is partially equipped and has some pre-installed systems, making it quicker to activate than a cold site, yet more cost-effective than a fully operational hot site.
A server is the victim of a data breach. Customer password information is exposed to the attacker. Which step in the incident response process is necessary to mitigate the risk of a reoccurrence of the attack?
A. Notify the customers that their passwords should be changed
B. Conduct a post-mortem review to identify lessons learned
C. Escalate the incident to the CEO
D. Quarantine the server
B: Conduct a post-mortem review to identify lessons learned. This step is crucial for understanding what went wrong and implementing measures to prevent a similar attack in the future. It’s about learning from the incident and strengthening your defenses.
An organization discovers that some of its proprietary data is for sale on a dark web hacker site. As part of the incident response, a security administrator analyzes application and system logs on all Internet-facing servers. On one web server, the administrator observes the following text listed repeatedly in POST requests: “ or “”=”
Which type of application attack is MOST likely indicated by this finding?
A. Directory
B. XSS
C. SQL injection
D. CSRF
C: SQL injection. The repeated text “ or “”=” suggests that the attacker is attempting to exploit a vulnerability in the web server by injecting malicious SQL code. This kind of attack can manipulate the database by bypassing authentication or extracting data.
What is the MOST likely consequence of non-compliance with GDPR?
A. SLA breach
B. Reputational damage
C. BPA violation
D. Fines
Option D: Fines. Non-compliance with GDPR can result in significant financial penalties, which can be quite hefty depending on the severity of the violation. However, it’s worth noting that non-compliance can also lead to reputational damage (Option B), making both consequences highly likely. Fines are just the most immediate and tangible consequence.
Field sales personnel have product and price lists loaded on their smartphones. This is critical data for the business and must not be accidentally disclosed or compromised while salespeople are traveling or are at customer sites. What two steps should be taken? (Choose Two).
A. Disable unused device features
B. Keep product and price information on removable storage
C. Require Passwords on mobile devices
D. Install and enable remote wipe
E. Implement full device encryption
C: Require passwords on mobile devices, and D: Install and enable remote wipe. Ensuring that devices are protected by passwords helps prevent unauthorized access, while remote wipe allows data to be erased if a device is lost or stolen. Both are essential for protecting sensitive data in the field.
An organization wants to use source code inspections to identify vulnerabilities in custom-built applications. Which method should the organization choose?
A. Static Application Security Testing (SAST)
B. Extended detection and response (XDR)
C. Vulnerability scanning
D. Dynamic Application Security Testing (DAST)
A: Static Application Security Testing (SAST). SAST involves analyzing the source code to identify security vulnerabilities at an early stage, before the software is run. It’s an essential method for catching issues that could lead to security breaches if left unaddressed.
Following a breach investigation, a company is found negligent and in violation of due care requirements by a cybersecurity insurer. What BEST explains this finding?
A. A lack of reasonable cybersecurity policies and procedures
B. Failure of perform comprehensive vendor risk assessments
C. Missing attestation documentation from third-party auditors
D. Failure to honor customer requests to have their data deleted
A: A lack of reasonable cybersecurity policies and procedures. Due care requires that a company take necessary and reasonable precautions to protect its data and systems. If a company fails to establish and follow such policies, it can be deemed negligent in the eyes of a cybersecurity insurer.
A company stores sensitive identification numbers for its clients. Rather than store the numbers in an internet-accessible database, a security engineer has suggested that the sensitive IDs should be moved to an encrypted database and fake numbers used in their place. The original data will be retrievable, as needed. Which of the following methods is the engineer recommending?
A. Segmentation
B. Tokenization
C. Masking
D. Hashing
B: Tokenization. By replacing sensitive data with a token that stands in for the original data, tokenization ensures that the real data is stored securely in an encrypted database, while only the tokens are used in its place.
Following a breach, an organization implements awareness training to help users identify the risks associated with removable media. Which of the following attacks will this training help mitigate?
A. Injection
B. Steganography
C. Side loading
D. Baiting
D: Baiting. Awareness training about the risks associated with removable media can help users recognize and avoid baiting attacks, where malicious actors leave infected USB drives or other media in public places, hoping someone will pick them up and plug them into their system.
An organization plans to deploy a centrally managed wireless network that will require a PKI. The organization needs to ensure that user onboarding is as seamless and error free as possible. What should the organization do first?
A. Obtain a certificate from a public CA
B. Generate a CSR
C. Obtain a self-signed certificate
D. Install and configure a CA
The correct response would involve obtaining a CSR (Certificate Signing Request) from a public CA (Certificate Authority). This step ensures the necessary certificate for the wireless network, facilitating a smooth and error-free onboarding process by leveraging the trusted public CA infrastructure.
An nmap scan of open ports includes TCP ports 21, 22, 23, 80, 443, and 990. Which three ports indicate that unsecure protocols are in use on the computer? Select three.
A. 21
B. 23
C. 22
D. 80
E. 443
F. 990
A. 21, B. 23, and D. 80.
Port 21 is used for FTP (File Transfer Protocol), which is not secure.
Port 23 is used for Telnet, another unsecure protocol.
Port 80 is used for HTTP, which is unencrypted and hence not secure.
A security administrator discovers an attack that uses PowerShell to make unauthorized registry changes. What should the administrator do to prevent this attack on sensitive systems?
A. Configure each system’s firewall
B. Disable access to the CLI
C. Whitelist allowed applications
D. Install a HIDS on sensitive systems
C: Whitelist allowed applications. By creating a whitelist of permitted applications, the administrator can ensure that only authorized programs are allowed to run on the system, effectively blocking unauthorized use of PowerShell for making registry changes.
An employee brings a gaming server from home and plugs it into the corporate network. Which governance tool should be used to control this behavior?
A. Memorandum of understanding (MOU)
B. Service-level agreement (SLA)
C. Master service (MSA)
D. Acceptable use policy (AUP)
D: Acceptable Use Policy (AUP). This policy outlines the do’s and don’ts regarding the use of an organization’s IT resources, including the prohibition of unauthorized devices like a personal gaming server.
Following a breach, a security administrator is instructed to run a vulnerability scan against the affected servers. There is evidence that the attack was network-based, but the administrator is unsure which vulnerability was exploited. What should the administrator do to pinpoint the vulnerability?
A. Evaluate any vulnerabilities with a scope of unchanged.
B. Investigate the attack vector metric for all sever vulnerabilities
C. Evaluate all vulnerabilities with a CVSS score of 8 or higher
D. Investigate all services that use TCP ports between 1 and 1023
B: Investigate the attack vector metric for all server vulnerabilities. By focusing on the attack vector metric, the security administrator can determine how vulnerabilities are accessed or exploited, providing critical insights into how the network-based attack occurred.
An organization enters a contract with a third-party. Which of the following should occur NEXT as part of third-party risk management (TPRM)?
A. Continuous monitoring
B. Due diligence
C. Data inventory and retention
D. Risk assessment
A: Continuous monitoring is because ongoing surveillance of third-party activity and security measures ensures they continue to meet your organization’s standards throughout the contract duration. Continuous monitoring helps detect any security lapses or non-compliance issues in real time, mitigating potential risks more effectively.