SecurityX Practice Exam #4 (Dion) Flashcards
Which of the following layers within software-defined networking determines how to route a data packet on the network?
Management plane
Control layer
Infrastructure layer
Application layer
Control layer
Explanation:
OBJ 2.3: The control layer uses the information from applications to decide how to route a data packet on the network and to make decisions about how traffic should be prioritized, how it should be secured, and where it should be forwarded to. The application layer focuses on the communication resource requests or information about the network. The infrastructure layer contains the physical networking devices that receive information from the control layer about where to move the data and then perform those movements. The management plane is used to monitor traffic conditions, the status of the network, and allows network administrators to oversee the network and gain insight into its operations. For support or reporting issues, include Question ID: 63fe06e43b7322449ddbc716 in your ticket. Thank you.
A financial institution is deploying HIPS and HIDS across its endpoints and servers to enhance security. During a simulated attack, the SOC observes that some critical events were missed by HIDS due to insufficient visibility into encrypted network traffic. Which approach would best address this limitation while maintaining proactive protection?
Augment HIDS with HIPS to actively block threats and reduce reliance on event visibility
Configure HIPS to decrypt all network traffic for inspection on endpoints
Implement endpoint detection and response (EDR) solutions to supplement HIDS capabilities
Deploy a centralized SIEM system to analyze logs generated by the HIDS and HIPS
Augment HIDS with HIPS to actively block threats and reduce reliance on event visibility
Explanation:
OBJ 3.2 - While HIDS excels in monitoring and analyzing events for potential threats, it can struggle with visibility into encrypted traffic. Augmenting HIDS with EDR solutions enhances threat detection by analyzing behavioral patterns, memory, and endpoint activities, addressing blind spots like encrypted traffic. Adding HIPS helps with proactive blocking but does not solve the visibility issue. Centralizing logs with a SIEM improves analysis but does not enhance the HIDS detection capabilities. Configuring HIPS to decrypt traffic on endpoints is impractical and introduces risks of exposing sensitive data. For support or reporting issues, include Question ID: 675067683af44d9e9e56c771 in your ticket. Thank you.
Which of the following practices best ensures interoperability when designing a system to enhance availability and integrity?
Implementing open standards and cross-platform compatibility
Using vendor-specific integrations to simplify implementation
Standardizing on proprietary protocols for all system components
Prioritizing performance optimization over compatibility testing
Implementing open standards and cross-platform compatibility
Explanation:
OBJ 2.1 - Interoperability ensures that different systems, applications, and devices can work seamlessly together. Using open standards and ensuring cross-platform compatibility support interoperability, which is critical for maintaining system availability and integrity in diverse environments. Proprietary protocols and vendor-specific integrations can limit compatibility and increase lock-in risks. Performance optimization is important but should not override thorough compatibility testing. For support or reporting issues, include Question ID: 674f6205a9b09ba6f669559b in your ticket. Thank you.
A cybersecurity analyst is tasked with identifying and mitigating malware threats across the organization’s endpoints. The analyst decides to use YARA for this purpose. Which of the following best describes how YARA helps in detecting malware?
YARA provides a universal framework for converting malware signatures into platform-specific rules
YARA scans network traffic in real-time to block malicious activity before it reaches endpoint systems
YARA allows analysts to create flexible rules based on patterns and characteristics found in malware files
YARA leverages machine learning algorithms to predict future malware variants
YARA allows analysts to create flexible rules based on patterns and characteristics found in malware files
Explanation:
OBJ 4.3 - YARA is a rule-based language used for creating patterns or signatures that help in identifying malware based on specific attributes, such as file contents, strings, or behaviors. It is designed for scanning files and directories to detect known threats. While YARA helps identify malware, it does not provide real-time network traffic analysis, convert rules for specific platforms, or utilize machine learning for predictive analysis. For support or reporting issues, include Question ID: 67508be751d49058ffc6847a in your ticket. Thank you.
What is the primary advantage of implementing a Secure Access Service Edge (SASE) framework in a deperimeterized network environment?
It eliminates the need for encryption by providing end-to-end segmentation
It enables secure access to resources regardless of user location or device type
It consolidates network security functions into a centralized on-premises appliance
It restricts access to cloud resources based solely on IP address allowlisting
It enables secure access to resources regardless of user location or device type
Explanation:
OBJ 2.6 - SASE integrates networking and security functions in a cloud-delivered framework, allowing users to securely access resources from any location or device while adhering to Zero Trust principles. It is not tied to centralized on-premises appliances, and encryption remains essential for secure communications. IP address-based access control is insufficient for SASE’s dynamic, identity-based approach. For support or reporting issues, include Question ID: 674f72ad25e0bdcbe9af8fa1 in your ticket. Thank you.
During an investigation of a ransomware attack, a cybersecurity team obtains a malicious executable from an infected system. To understand the malware’s behavior, the team breaks down the executable to analyze its code, revealing a routine that encrypts user files and contacts a command-and-control (C2) server for instructions. What reverse engineering technique is being used in this scenario?
Dynamic analysis
Sandboxing
Disassembly
Behavioral analysis
Disassembly
Explanation:
OBJ 4.4: Disassembly involves converting executable code into a human-readable format to understand its logic and functionality, as demonstrated by analyzing the ransomware’s encryption routine and C2 communication. Dynamic analysis observes malware behavior during execution, behavioral analysis focuses on system changes caused by malware, and sandboxing isolates malware in a controlled environment for testing. For support or reporting issues, include Question ID: 6751b98772f8a45d44021760 in your ticket. Thank you.
NA
An online retailer experiences a sudden surge in traffic, causing its e-commerce platform to become unresponsive. After investigation, the IT team determined that the surge was due to a Distributed Denial of Service (DDoS) attack originating from a botnet targeting the application layer. The team must mitigate the attack while maintaining service availability for legitimate customers. Which of the following measures would most effectively mitigate this type of attack?
Disable access to the platform temporarily to reduce server load
Increase server capacity to handle the additional traffic from the botnet
Block all traffic from affected IP ranges to prevent further disruptions
Deploy rate-limiting rules to control the number of requests per client
Deploy rate-limiting rules to control the number of requests per client
Explanation:
OBJ 3.3 - Rate limiting is effective against application-layer DDoS attacks because it ensures that no single client can overwhelm the server, while legitimate users can still access the service. Temporarily disabling the platform disrupts all users, including legitimate ones. Increasing server capacity may mitigate the effects temporarily but does not address the root cause. Blocking IP ranges can result in overblocking, affecting legitimate users in shared IP spaces. For support or reporting issues, include Question ID: 6750731b3af44d9e9e56c801 in your ticket. Thank you.
During an investigation into a suspected malware infection on an employee’s workstation, the security team analyzes the system logs and identifies unusual user account activity, including privilege escalation and unauthorized file access. They also examine installed programs and identify a recently added executable that matches known malware signatures. What type of incident response activity is the team performing?
Host analysis
Network analysis
Volatile memory analysis
Metadata analysis
Host analysis
Explanation:
OBJ 4.4: Host analysis involves examining a specific system for signs of compromise, such as log activity, installed programs, and unauthorized changes. Network analysis focuses on traffic patterns across systems; volatile memory analysis examines data in RAM; and metadata analysis evaluates file attributes like timestamps, not system-level activity. For support or reporting issues, include Question ID: 6751ba8072f8a45d44021798 in your ticket. Thank you.
You are reviewing the latest list of important web application security controls published by OWASP. Which of these items is LEAST likely to appear on that list?
Implement identity and authentication controls
Leverage security frameworks and libraries
Obscure web interface locations
Implement appropriate access controls
Obscure web interface locations
Explanation:
OBJ 4.2: The least likely option to appear in the list is to obscure web interface locations. This recommendation is based on security through obscurity and is not considered a good security practice. The other options are all considered best practices in designing web application security controls and creating software assurance in our programs. For support or reporting issues, include Question ID: 63fe06e93b7322449ddbc757 in your ticket. Thank you.
During the development of a cloud-based application, the security team integrates automated testing into the CI/CD pipeline. The team aims to detect potential vulnerabilities during runtime. Which type of testing should be implemented in this scenario?
Code linting
Unit testing
DAST
SAST
DAST
Explanation:
OBJ 2.2: Dynamic application security testing (DAST) analyzes an application during runtime to identify vulnerabilities, such as SQL injection and cross-site scripting (XSS). It is particularly effective in detecting issues that only manifest when the application is operational. Static application security testing (SAST) analyzes code before runtime, not during operation. Unit testing evaluates individual components, not runtime vulnerabilities. Code linting checks for coding standard compliance, not security vulnerabilities. For support or reporting issues, include Question ID: 6750fe7423df37e1b5ec5f96 in your ticket. Thank you.
An organization implements a secrets management system to secure credentials used by applications. The security team notices that developers occasionally copy secrets from the management tool into their local code for easier testing. What is the most effective way to prevent this behavior?
Enforce a policy prohibiting secrets in code and conduct regular audits
Require developers to use shared credentials stored locally on their devices
Store secrets in plain text in a secure, isolated server
Remove all access to the secrets management tool from developers
Enforce a policy prohibiting secrets in code and conduct regular audits
Explanation:
OBJ 3.1: To maintain secure secrets management, it is critical to enforce policies that prevent developers from embedding secrets in code, as this introduces significant security risks. Regular audits help identify and address such violations. Removing access to secrets management or relying on insecure storage options undermines the purpose of secrets management, while shared credentials increase the risk of exposure and reduce accountability. For support or reporting issues, include Question ID: 67513d076a9dc9d16f2d02f4 in your ticket. Thank you.
Which of the following is a primary benefit of implementing load balancing in an enterprise environment?
Enforces access controls to prevent unauthorized tampering and use
Scans the server infrastructure to detect vulnerabilities
Encrypts sensitive data to protect it during transmission throughout the network
Improves performance by distributing traffic across servers
Improves performance by distributing traffic across servers
Explanation:
OBJ 2.1 - Load balancing improves performance and availability by evenly distributing traffic across multiple servers, preventing overload and ensuring system reliability. Encryption, vulnerability detection, and access controls are vital for security but are not functions of load balancing. For support or reporting issues, include Question ID: 674f60fbd737cdb079388f0d in your ticket. Thank you.
A company needs to implement stronger authentication by adding an authentication factor to its wireless system. The wireless system only supports WPA with pre-shared keys, but the back-end authentication system supports EAP and TTLS. What should the network administrator implement?
MAC address filtering with IP filtering
802.1x using PAP
PKI with user authentication
WPA2 with a pre-shared key
802.1x using PAP
Explanation:
OBJ 2.4: The network administrator can utilize 802.1x using EAP-TTLS with PAP for authentication since the backend system supports it. Password Authentication Protocol (PAP) is a password-based authentication protocol used by Point to Point Protocol (PPP) to validate users. MAC address filtering does not filter based on IP addresses, but instead, it filters based on the hardware address of a network interface card, known as a MAC address. WPA2 is a secure method of wireless encryption that relies on the use of a pre-shared key or the 802.1x protocol. In the question, though, it states that the system only supports WPA, therefore WPA2 cannot be used. PKI with user authentication would be extremely secure, but it is only used with EAP-TLS, not EAP-TTLS. EAP-TTLS only works with credential-based authentication, such as a username and password. Therefore, 802.1x using PAP is the best answer. For support or reporting issues, include Question ID: 63fe06df3b7322449ddbc6da in your ticket. Thank you.
What is a primary risk associated with model inversion attacks on an AI system?
Disruption of the AI’s computational processes
Exposure of sensitive data used during training
Introduction of noise into decision-making outputs
Increased latency in real-time predictions
Exposure of sensitive data used during training
Explanation:
OBJ 1.5: Model inversion attacks attempt to reverse-engineer an AI model to extract sensitive information from its training data. This poses a significant privacy risk, especially when the model is trained on personal or confidential data. Disruption of computational processes is more related to availability attacks, not model inversion. The introduction of noise could result from adversarial input attacks but is not specific to model inversion. Increased latency is unrelated to this type of attack. For support or reporting issues, include Question ID: 674fef1ddb3fddf57c662c75 in your ticket. Thank you.
Which of the following classifications would apply to patents, copyrights, and trademarks?
Trade secrets
PHI
PII
Intellectual property
Intellectual property
Explanation:
OBJ 1.1: Patents, copyrights, and trademarks are all considered to be intellectual property. Trade secrets are considered proprietary and are not protected by governments. Personally identifiable information (PII) is any data that could be used to identify a particular person. Protected health information (PHI) is any information about health status, provision of health care, or payment for health care linked to a specific individual. For support or reporting issues, include Question ID: 63fe08103b7322449ddbd5bd in your ticket. Thank you.
A penetration tester is emulating an insider threat during an engagement. The penetration tester was given access to a regular user account and a basic Windows 10 client on the network. The penetration tester did not receive any network diagrams, maps, or target IP address. Their goal is to identify any possible Windows domain controllers on the intranet.diontaining.com domain. Which of the following commands should they use from the command prompt to achieve their goal?
nslookup -type=any _ldap._tcp.intranet.diontraining.com
nslookup -type=any _lanman._tcp.intranet.diontraining.com
nslookup -type=any _kerberos._tcp.intranet.diontraining.com
nslookup -type=any _smtp._tcp.intranet.diontraining.com
nslookup -type=any _ntlm._tcp.intranet.diontraining.com
nslookup -type=any _ldap._tcp.intranet.diontraining.com
nslookup -type=any _kerberos._tcp.intranet.diontraining.com
Explanation:
OBJ 4.3: There are several methods for locating Domain Controllers, depending on what you know about the environment you are using. If you are using a Windows client, you can use the nslookup command. You need to specify which protocol you are searching for in the name. Since we are trying to identify domain controllers, we need to look for Kerberos and LDAP-based protocols on the intranet.diontraining.com domain. If you were using a Linux client, you could run a similar command syntax using dig. For support or reporting issues, include Question ID: 63fe07133b7322449ddbc961 in your ticket. Thank you.
A new security appliance was installed on a network as part of a managed service deployment. The vendor controls the appliance, and the IT team cannot log in or configure it. The IT team is concerned about the appliance receiving the necessary updates. Which of the following mitigations should be performed to minimize the concern for the appliance and updates?
Scan and patch the device
Configuration management
Automatic updates
Vulnerability scanning
Vulnerability scanning
Explanation:
OBJ 3.6: The best option here is vulnerability scanning as this allows the IT team to know what risks their network is taking on and where subsequent mitigations may be possible. Configuration management, automatic updates, and patching could normally be possible solutions, but these are not viable options without gaining administrative access to the appliance. Therefore, the analyst should continue to conduct vulnerability scanning of the device to understand the risks associated with it and then make recommendations to add additional compensating controls like firewall configurations, adding a WAF, providing segmentation, and other configurations outside the appliance that could minimize the vulnerabilities it presents. For support or reporting issues, include Question ID: 63fe07353b7322449ddbcb01 in your ticket. Thank you.
You are a cybersecurity analyst working for an accounting firm that manages the accounting for multiple smaller firms. You have successfully detected an APT operating in your company’s network that appears to have been there for at least 8 months. In conducting a qualitative assessment of the impact, which of the following factors should be most prominently mentioned in your report to your firm’s executives? (SELECT TWO)
Recovery time
Detection time
Economic
Downtime
Data integrity
Economic
Data integrity
Explanation:
OBJ 1.2: While all of the above options should be included in your report to management, due to the nature of your company’s work, the economic impact on the business should be your top factor. This would include any possible liability and damage that will be done to the company’s reputation. Data integrity would be the second most important factor to highlight in your report since an APT may have stolen significant amounts of money by altering your financial documentation and accounts’ data integrity. Downtime, recovery time, and detection time are important for understanding the broader cybersecurity concern and remediation steps but are not going to be the primary concern for your accounting firm’s executives. As a cybersecurity analyst, you often prioritize what will be highlighted to the executives and management. It is important to remember their perspective and priorities, which are usually focused on monetary cost/ROI and the business’s longevity over the technical details an analyst usually focuses on. To be successful in this career field, you need to learn to speak both languages (the technical details when working with the system administrators and the business impact when discussing with management/executives). For support or reporting issues, include Question ID: 63fe081a3b7322449ddbd644 in your ticket. Thank you.
Dion Training has just installed a new security patch into their existing practice exam web application. Which of the following tests should be conducted to ensure that all of the previous system functionality still works as expected after installing the patch?
Unit testing
Integration testing
CI/CD
Regression testing
Regression testing
Explanation:
OBJ 2.1: Regression testing is the process of testing an application after changes are made to see if these changes have triggered problems in older areas of code. Continuous integration/continuous delivery (CI/CD) is a software development methodology in which code updates are tested and committed to a development or build server/code repository rapidly. Integration testing is used to test individual components of a system together to ensure that they interact as expected. Unit testing is used to test a particular block of code performs the exact action intended and provides the exact output expected. Normally, unit testing is coded into the software using simply pass/no pass tests for each block of code. For support or reporting issues, include Question ID: 63fe07013b7322449ddbc883 in your ticket. Thank you.
NA
A penetration tester has issued the following command on a victimized host: nc -l -p 8080 | nc 192.168.1.76 443. What will occur based on this command?
Netcat will listen on port 8080 and output anything received to a remote connection on 192.168.1.76 port 443
Netcat will listen for a connection from 192.168.1.76 on port 443 and output anything received to port 8080
Netcat will listen on port 8080 and then output anything received to local interface 192.168.1.76
Netcat will listen on the 192.168.1.76 interface for 443 seconds on port 8080
Netcat will listen on port 8080 and output anything received to a remote connection on 192.168.1.76 port 443
Explanation:
OBJ 4.1: The proper syntax for netcat (nc) is -l to signify listening and -p to specify the listening port. Then, the | character allows multiple commands to execute during a single command’s execution. Next, netcat sends the data to the given IP (192.168.1.76) over port 443. This is a common technique to bypass the firewall by sending traffic over port 443 (a secure SSL/TLS tunnel). For support or reporting issues, include Question ID: 63fe074c3b7322449ddbcc19 in your ticket. Thank you.
An enterprise network requires a firewall configuration to secure a critical web application server hosted in a screened subnet. The web application needs to allow HTTPS traffic from external users while restricting all other types of incoming connections. Additionally, internal administrators need secure SSH access to the server from the corporate LAN. Which of the following firewall rules would best meet the requirements?
Block all incoming traffic to the server and allow only outgoing traffic from the server
Permit incoming HTTPS traffic to the server, restrict other incoming connections, and allow SSH traffic from the LAN to the server
Allow HTTP and HTTPS traffic from external users and permit SSH from the public IP addresses of the administrators
Allow all incoming traffic to the screened subnet and restrict outgoing traffic from the screened subnet
Permit incoming HTTPS traffic to the server, restrict other incoming connections, and allow SSH traffic from the LAN to the server
Explanation:
OBJ 2.1: The scenario involves securing a web application in the DMZ while allowing specific administrative access. “Permitting incoming HTTPS traffic to the server, restricting other incoming connections, and allowing SSH traffic from the LAN to the server” aligns with best practices: Permitting HTTPS ensures the server is accessible for web users securely. Restricting other incoming traffic minimizes attack vectors. Allowing SSH from the LAN provides secure management for administrators. Allowing all incoming traffic to the screened subnet is too permissive and exposes the application to unnecessary risks. Blocking all incoming traffic prevents the web application from serving external users. Allowing HTTP violates security by enabling unsecured communication, and permitting administrator access from public IPs is unsafe. For support or reporting issues, include Question ID: 6750eefbec280b7d2c7fa1c9 in your ticket. Thank you.
A non-profit organization uses an identity and access management (IAM) system to control access to sensitive resources. A new employee is unable to access any of the tools needed for their job, even after being added to the correct groups. Which of the following is the most likely cause of the issue?
The IAM system does not support the RBAC required in the scenario
The tools are experiencing an unrelated outage that needs remediation
The employee’s account credentials have expired and need to be configured
The employee’s account has not been assigned a valid IAM policy
The employee’s account has not been assigned a valid IAM policy
Explanation:
OBJ 3.1: In IAM systems, access to resources is governed by policies that define permissions for users and groups. If the employee’s account has not been assigned a valid IAM policy, they will not have the necessary permissions to access tools, even if they are in the correct groups. While credential expiration or service outages could also block access, they would not specifically align with this scenario where group membership is correct but permissions are lacking. IAM systems generally support role-based access control (RBAC), so that is less likely the issue here. For support or reporting issues, include Question ID: 67513d806a9dc9d16f2d02f9 in your ticket. Thank you.