SecurityX Practice Exam #6 (Dion) Flashcards
Hilda needs a cost-effective backup solution that would allow for the restoration of data within a 24 hour RPO. The disaster recovery plan requires that backups occur during a specific timeframe each week, and then the backups should be transported to an off-site facility for storage. What strategy should Hilda choose to BEST meet these requirements?
Create disk-to-disk snapshots of the server every hour
Configure replication of the data to a set of servers located at a hot site
Conduct full backups daily to tape
Create a daily incremental backup to tape
Create a daily incremental backup to tape
Explanation:
OBJ 1.1: Since the RPO must be within 24 hours, daily or hourly backups must be conducted. Since the requirement is for backups to be conducted at a specific time each week, hourly snapshots would not meet this requirement and are not easily transported since they are being conducted as a disk-to-disk backup. Replication to a hot site environment also doesn’t allow for transportation of the data to an off-site facility for storage, and replication would continuously occur throughout the day. Therefore, a daily incremental backup should be conducted since it will require the least amount of time to conduct. The tapes could be easily transported for storage and restored incrementally from tape since the last full backup was conducted. For support or reporting issues, include Question ID: 63fe07ea3b7322449ddbd3e7 in your ticket. Thank you.
You have been asked to recommend a capability to monitor all of the traffic entering and leaving the corporate network’s default gateway. Additionally, the company’s CIO requests to block certain content types before it leaves the network based on operational priorities. Which of the following solution should you recommend to meet these requirements?
Configure IP filtering on the internal and external interfaces of the router
Install a NIPS on the internal interface and a firewall on the external interface of the router
Install a firewall on the router’s internal interface and a NIDS on the router’s external interface
Installation of a NIPS on both the internal and external interfaces of the router
Install a NIPS on the internal interface and a firewall on the external interface of the router
Explanation:
OBJ 4.1: Due to the requirements provided, you should install a NIPS on the gateway router’s internal interface and a firewall on the external interface of the gateway router. The firewall on the external interface will allow the bulk of the malicious inbound traffic to be filtered before reaching the network. Then, the NIPS can be used to inspect the traffic entering the network and provide protection for the network using signature-based or behavior-based analysis. A NIPS is less powerful than a firewall and could easily “fail open” if it is overcome with traffic by being placed on the external interface. The NIPS installed on the internal interface would also allow various content types to be quickly blocked using custom signatures developed by the security team. We wouldn’t want to place the NIPS on the external interface in the correct choice for the same reasons. We also wouldn’t choose to install a NIPS on both the internal and external connections. IP filtering on both interfaces of the router will not provide the ability to monitor the traffic or to block traffic based on content type. Finally, we would not want to rely on a NIDS on the external interface alone since it can only monitor and not provide the content blocking capabilities needed. For support or reporting issues, include Question ID: 63fe06d03b7322449ddbc625 in your ticket. Thank you.
A military defense contracting company has hired your company to conduct a penetration test against their networks. Their company has a strong vulnerability management program in place, but they are concerned that they may still be subject to remote hackers’ intrusion. They have asked your company to create a red team with their most skilled hackers and conduct a long-term engagement over 6-12 months. The goal of this assessment is to emulate an attacking group that uses stealth while infiltrating the network, quietly maintaining persistence, and slowly exfiltrating data out of the network over time to determine if their cybersecurity analysts could detect this type of threat. Which of the following type of threat actors will your red team need to emulate?
Script kiddies
Hacktivists
Insider threat
APT
APT
Explanation:
OBJ 1.4: An advanced persistent threat (APT) is a type of attacker that keeps a low profile while infiltrating a remote network. Once inside the network, they maintain their patience while gathering intelligence and slowly exfiltrating data out of the network. Many APTs work for a nation-state and focus on intelligence operations. Some APTs also perform corporate espionage to steal highly guarded trade secrets from competitors. APTs commonly use several attack vectors to ensure their success in gaining unauthorized access to information. For support or reporting issues, include Question ID: 63fe074f3b7322449ddbcc46 in your ticket. Thank you.
An organization uses a configuration management system to secure its endpoints and servers. During a security audit, the team identifies several servers with outdated configurations that deviate from the organization’s security baseline. What is the most appropriate action to address this issue?
Manually update the configurations on each affected server to match the baseline settings
Use the configuration management system to enforce the baseline across all affected servers
Conduct a vulnerability scan to identify additional misconfigurations before taking action
Disable network access to the affected servers until their configurations are manually corrected
Use the configuration management system to enforce the baseline across all affected servers
Explanation:
OBJ 3.2: A configuration management system ensures that all endpoints and servers are consistently aligned with the organization’s security baseline by automating the process of applying standardized configurations. This approach minimizes human error and ensures rapid remediation. Manually updating servers is time-consuming and error-prone, while conducting a vulnerability scan or disabling network access does not address the root issue of enforcing secure configurations. For support or reporting issues, include Question ID: 675145d8d79f13209663ff43 in your ticket. Thank you.
What is used to define how much bandwidth can be used by various protocols on the network?
Load balancing
High availability
Traffic shaping
Fault tolerance
Traffic shaping
Explanation:
OBJ 2.1: Traffic shaping, also known as packet shaping, is the manipulation and prioritization of network traffic to reduce the impact of heavy users or machines from affecting other users. Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds. High availability (HA) is a component of a technology system that eliminates single points of failure to ensure continuous operations or uptime for an extended period. Fault tolerance refers to the ability of a system (computer, network, cloud cluster, etc.) to continue operating without interruption when one or more of its components fail. Load balancing refers to the process of distributing a set of tasks over a set of resources, intending to make their overall processing more efficient. Load balancing can optimize the response time and avoid unevenly overloading some compute nodes while other compute nodes are left idle. For support or reporting issues, include Question ID: 63fe06ca3b7322449ddbc5d4 in your ticket. Thank you.
Which cloud computing concept allows users to store files on a cloud-based server when necessary and copy that data from the cloud, and put it back on the device when space once again becomes available on the device?
On-demand
Shared resources
Synchronization application
Resource pooling
On-demand
Explanation:
OBJ 2.5: On-demand refers to the fact that a consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider. In this question, the cloud storage is provisioned and deprovisioned automatically for the user, and thereby it would be categorized as on-demand. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Using a synchronization app can allow the files to be stored on both the laptop and the cloud service while maintaining the latest versions in both places. This allows a user to synchronize content between all of their own devices as well as share their cloud storage content with other users. Multiple users can simultaneously access the content to work collaboratively, or they can access it at different times. Each user’s changes are typically marked with a flag or color highlighting to indicate who made changes to what content. Shared resources are any resources shared by multiple users or systems within an internal or cloud-based network. For support or reporting issues, include Question ID: 63fe06f23b7322449ddbc7c0 in your ticket. Thank you.
What SCAP component could be used to create a checklist to be used by different security teams within an organization and then report results in a standardized fashion?
CVE
CCE
CPE
XCCDF
XCCDF
Explanation:
OBJ 3.6: XCCDF (extensible configuration checklist description format) is a language that is used in creating checklists for reporting results. The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures. The Common Configuration Enumeration (CCE) provides unique identifiers to system configuration issues to facilitate fast and accurate correlation of configuration data across multiple information sources and tools. Common Platform Enumeration (CPE) is a standardized method of describing and identifying classes of applications, operating systems, and hardware devices present among an enterprise’s computing assets. For support or reporting issues, include Question ID: 63fe071e3b7322449ddbc9e9 in your ticket. Thank you.
What is the biggest disadvantage of using single sign-on (SSO) for authentication?
It introduces a single point of failure
Systems must be configured to utilize the federation
Users need to authenticate with each server as they log on
The identity provider issues the authorization
It introduces a single point of failure
Explanation:
OBJ 2.4: Single sign-on is convenient for users since they only need to remember one set of credentials. Unfortunately, single sign-on also introduces a single point of failure. If the identity provider is offline, then the user cannot log in to any of the resources they may wish to utilize across the web. Additionally, if the single sign-on is compromised, the attacker now has access to every site that the user would have access to using the single set of credentials. For support or reporting issues, include Question ID: 63fe06c63b7322449ddbc5a2 in your ticket. Thank you.
A financial services organization deploys Virtual Trusted Platform Modules (vTPMs) on its VMs to support hardware-backed encryption and secure application deployment. After a ransomware attack on its hypervisor, the IT team discovers that the vTPMs of several VMs were compromised, allowing the attacker to decrypt sensitive customer data. What is the most effective countermeasure to protect vTPMs against hypervisor-level attacks?
Deploy endpoint detection tools to monitor VM activity for anomalies
Restrict vTPM usage to non-critical workloads to reduce risk exposure
Use a hardware-based root of trust to isolate vTPMs from the hypervisor
Regularly rotate encryption keys stored in the vTPMs to limit data exposure
Use a hardware-based root of trust to isolate vTPMs from the hypervisor
Explanation:
OBJ 3.4 - A hardware-based root of trust, such as a physical TPM or a secure enclave, ensures that vTPMs remain isolated and secure even if the hypervisor is compromised. Regularly rotating keys reduces exposure but does not address the root cause. Endpoint monitoring detects anomalies but cannot prevent vTPM compromise. Limiting vTPM usage undermines the benefits of hardware-backed encryption for critical workloads. For support or reporting issues, include Question ID: 67508465267e7f17527dbcbd in your ticket. Thank you.
Which of the following might be exploited on a Linux server to conduct a privilege escalation?
Kerberoasting
Cpassword
DLL hijacking
Insecure sudo
Insecure sudo
Explanation:
OBJ 4.2: An insecure sudo vulnerability could allow an attacker to circumvent protections and execute commands that would normally require a password, resulting in privilege escalation. Kerberoasting, Cpassword, and DLL hijacking are Windows-specific privilege escalation techniques. For support or reporting issues, include Question ID: 63fe06e23b7322449ddbc702 in your ticket. Thank you.
An organization deploys an AI-powered digital assistant to streamline employee workflows, such as drafting reports and automating data entry. During testing, the assistant inadvertently accessed sensitive financial data unrelated to its assigned tasks. Which of the following measures should be implemented to prevent such incidents?
Establishing strict guardrails to limit the assistant’s access and permissions
Configuring the assistant to only use encrypted communication channels
Enhancing the assistant’s computational resources for faster processing
Integrating real-time monitoring for the assistant’s data access patterns
Establishing strict guardrails to limit the assistant’s access and permissions
Explanation:
OBJ 1.5 - This scenario highlights the need for guardrails to restrict an AI assistant’s access to only necessary data and permissions, ensuring it operates within its defined scope. While monitoring and encryption improve security overall, they do not directly address the problem of unrestricted access. Enhancing computational resources is unrelated to preventing unauthorized data access. For support or reporting issues, include Question ID: 674f5eccbe11e784309a298e in your ticket. Thank you.
Dion Training uses an authentication protocol to connect a network client to a networked file server by providing its authentication credentials. The file server then uses the authentication credentials to issue an authentication request to the server running this protocol. The server can then exchange authentication messages with the file server on behalf of the client. Throughout this process, a shared secret is used to protect the communication. Which of the following technologies relies upon the shared secret?
PKI
Kerberos
LDAP
RADIUS
RADIUS
Explanation:
OBJ 2.4: Remote Authentication Dial-In User Service (RADIUS) is a networking protocol operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple-A) management for users who connect and use a network service. The RADIUS protocol utilizes an obfuscated password created from the shared secret and creates an MD5 hash of the authentication request to protect the communications. For support or reporting issues, include Question ID: 63fe06c43b7322449ddbc589 in your ticket. Thank you.
As a SOC analyst, you receive an alert concerning a dramatic slowdown affecting the company’s e-commerce server due to the load balancer’s critical failure. Your company depends on online sales for all of its business, and you know the immediate impact of this event will be a loss of sales. Which of the following is an appropriate classification of the impact in terms of the total impact and notification requirements? (SELECT THREE)
Total impact includes a loss of customers
Total impact includes damages to the company’s reputation
Notification of external authorities is optional
Organization impact is anticipated
Notification of external authorities is required
Localized impact is anticipated
Total impact includes a loss of customers
Notification of external authorities is optional
Organization impact is anticipated
Explanation:
OBJ 1.2: Since online sales are critical to business operations, the impact would be categorized as organizational and not localized. While the immediate impact is a loss of sales due to the slow servers causing customer frustration and abandoned carts, the longer-term impact could include losing customers who will never return. It is unlikely to include damages to the company’s reputation over this event, though it isn’t a major trust and security issue like a data breach. In terms of notification requirements, it is optional to inform external authorities since there is no evidence of a crime. For support or reporting issues, include Question ID: 63fe081b3b7322449ddbd64a in your ticket. Thank you.
Dion Training is currently budgeting for the next fiscal year. Susan has calculated that the asset value of a web server is $12,000. Based on her analysis, she believes that a data breach to this server will occur once every five years and has a risk exposure factor of 50%. What is the annual rate of occurrence (ARO) of a data breach involving this webserver?
0.80
0.50
0.25
0.20
0.20
Explanation:
OBJ 1.2: The annual rate of occurrence (ARO) is an expression of the probability/likelihood of a risk stated as the number of times per year a particular loss is expected to occur. The annual rate of occurrence (ARO) is calculated by dividing the number of occurrences by the amount of time observed for that number of occurrences. In this case, the server is expected to suffer a data breach once every five years, which equates to 1/5, 0.20, or 20%, depending on how your organization represents the ARO in its reports. The other information in the question, such as the asset value and exposure factor, is not relevant to this calculation. Those are only needed if you are calculating the single loss expectancy (SLE) or the annualized loss expectancy (ALE). For support or reporting issues, include Question ID: 63fe07fa3b7322449ddbd4af in your ticket. Thank you.
Which of the following terms represents the maximum amount of time that an organization is willing to be offline before it has undesirable consequences to the organization?
RPO
RTO
MTTR
MTBF
RTO
Explanation:
OBJ 1.1: The recovery time objective (RTO) is the duration of time and a service level within which a business process must be restored after a disaster to avoid unacceptable consequences associated with a break in continuity. The recovery point objective (RPO) is the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or tolerance. The mean time to repair (MTTR) measures the average time it takes to repair a network device when it breaks. The mean time between failures (MTBF) measures the average time between when failures occur on a device. For support or reporting issues, include Question ID: 63fe08163b7322449ddbd60d in your ticket. Thank you.
Dion Training has contracted a cloud service provider to host their webservers. Dion Training wants to ensure their webservers are highly available and fault-tolerant, but they want to ensure all their data remains located in the same geographic area. Which of the following would allow Dion Training to host their webservers in two different data centers located in the same geographic area?
Data zone
Region
Availability zone
VPC/Vnet
Availability zone
Explanation:
OBJ 2.5: An availability zone is a physical or logical data center within a single region. A region describes a collection of data centers located within a geographic area and they are distributed across the globe. A Virtual Private Cloud (VPC) or a Virtual Network (VNet) allows for the creation of cloud resources within a private network that parallels the functionality of the same resources in a traditional, privately operated data center. Data zones describe the state and location of data to help isolate and protect it from unauthorized/inappropriate use within a data lake. For support or reporting issues, include Question ID: 63fe06cb3b7322449ddbc5e3 in your ticket. Thank you.
In a Zero Trust model with context-based reauthentication, an enterprise wants to enforce dynamic authentication policies. Which scenario demonstrates proper application of context-based reauthentication?
Automatically logging out users after 15 minutes of inactivity without additional checks
Allowing unrestricted access to all resources for users authenticated via MFA
Requiring users to authenticate at the start of every session regardless of context
Prompting reauthentication when a user accesses sensitive resources from an unfamiliar location
Prompting reauthentication when a user accesses sensitive resources from an unfamiliar location
Explanation:
OBJ 2.6: Context-based reauthentication dynamically evaluates risks based on changes such as location, device, or access patterns. Accessing sensitive resources from an unfamiliar location introduces risk, requiring the system to reverify the user’s identity. Requiring authentication for every session is static and ignores dynamic context. Automatically logging out users focuses on idle time, not context-aware triggers. Unrestricted access after MFA contradicts Zero Trust principles by failing to adapt to changing risks. For support or reporting issues, include Question ID: 6751007723df37e1b5ec5ffc in your ticket. Thank you.
What control provides the best protection against both SQL injection and cross-site scripting attacks?
Network layer firewalls
CSRF
Hypervisors
Input validation
Input validation
Explanation:
OBJ 4.2: Input validation prevents the attacker from sending invalid data to an application and is a strong control against both SQL injection and cross-site scripting attacks. A network layer firewall is a device that is designed to prevent unauthorized access, thereby protecting the computer network. It blocks unauthorized communications into the network and only permits authorized access based on the IP address, ports, and protocols in use. Cross-site request forgery (CSRF) is another attack type. A hypervisor controls access between virtual machines. For support or reporting issues, include Question ID: 63fe07043b7322449ddbc89c in your ticket. Thank you.
NA
\Your boss is looking for a recommendation for a cloud solution that will only allow your company’s employees to use the service while preventing anyone else from accessing it. What type of cloud model would you recommend to ensure the contents are best secured from those outside your company?
Public Cloud
Hybrid Cloud
Community Cloud
Private Cloud
Private Cloud
Explanation:
OBJ 2.5: A private cloud service would be the best recommendation to protect and secure the services from those outside the company from accessing its contents. The private cloud is defined as computing services offered either over the Internet or a private internal network and only to select users instead of the general public. Private cloud computing gives businesses many of the benefits of a public cloud including self-service, scalability, and elasticity with the additional control and customization available from dedicated resources over a computing infrastructure hosted on-premises. Private clouds also deliver a higher level of security and privacy through both company firewalls and internal hosting to ensure operations and sensitive data are not accessible to third-party providers. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A community cloud is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third party and hosted internally or externally. For support or reporting issues, include Question ID: 63fe06dd3b7322449ddbc6bc in your ticket. Thank you.
Miranda is attempting to visit https://www.FailToPass.com but is receiving an error that states “Your connection is not private”. She clicks on the “Not Secure” label next to the website’s address to view the details of the digital certificate. She checks the expiration date of the digital certificate and notices it doesn’t expire for another 7 months. She checks the CN name and sees it listed as https://www.FailToPass.com. She also notices that the digital certificate was issued by DigiCert, a well-known root certificate authority. Which of the following is MOST likely causing this error?
The incorrect name is on the certificate
There is a validity date error on the certificate
The certificate is self-signed
The certificate has been revoked
The certificate has been revoked
Explanation:
OBJ 3.1: The most likely cause of the issue is that the certificate has been revoked prematurely by the certificate authority. A revoked certificate error is generated when a certificate is presented for use after it has been added to the certificate revocation list. A validity date error occurs when a certificate is presented for use on a date that is already past the expiration date. An incorrect name error is generated when the certificate’s CN name does not match the FQDN of the system that is using the certificate. For example, if the certificate is issued to diontraining.com but is being presented for www.diontraining.com or yourcyberpath.com, it will generate an incorrect name error. A self-signed certificate is a certificate generated independently of a certificate authority and is considered not trustworthy. For support or reporting issues, include Question ID: 63fe07bc3b7322449ddbd19c in your ticket. Thank you.
You just finished conducting a remote scan of a class C network block using the following command “nmap -sS 202.15.73.0/24”. The results only showed a single web server. Which of the following techniques would allow you to gather additional information about the network?
Scan using the -p 1-65535 flag
Perform a scan from on-site
Use a UDP scan
Use an IPS evasion technique
Perform a scan from on-site
Explanation:
OBJ 4.1: You should request permission to conduct an on-site scan of the network. If the organization’s network is set up correctly, scanning from off-site will be much more difficult as many of the devices will be hidden behind the firewall. By conducting an on-site scan, you can conduct the scan from behind the firewall and receive more detailed information on the various servers and services running on the internal network. While nmap does provide some capabilities to scan through a firewall, it is not as detailed as being on-site. For support or reporting issues, include Question ID: 63fe07373b7322449ddbcb1f in your ticket. Thank you.
Which of the following vulnerabilities involves leveraging access from a single virtual machine to other machines on a hypervisor?
VM migration
VM data remnant
VM sprawl
VM escape
VM escape
Explanation:
OBJ 4.2: Virtual machine escape vulnerabilities are the most severe issue that may exist in a virtualized environment. In this attack, the attacker can access a single virtual host and then leverages that access to intrude on the resources assigned to different virtual machines. Data remnant is the residual representation of digital data that remains even after attempts have been made to remove or erase it. Virtualization sprawl is a phenomenon that occurs when the number of virtual machines on a network reaches a point where the administrator can no longer manage them effectively. Virtual machine migration is the task of moving a virtual machine from one physical hardware environment to another. For support or reporting issues, include Question ID: 63fe071f3b7322449ddbc9ee in your ticket. Thank you.
After Hurricane Katrina, the Department of Defense deployed a Deployable Joint Command & Control Center (DJC2) to provide an alternative datacenter in the disaster area. The DJC2 is a self-contained, self-power, and network-enabled headquarters used to quickly recover communications for the military commanders and staff in that region. Which of the following recovery site strategies BEST describes the use of a DJC2 or similar type of system?
Cold site
Mobile site
Warm site
Hot site
Mobile site
Explanation:
OBJ 1.1: A mobile site is essentially a data center in a container or trailer that can be rapidly deployed to a given location. In the case of the DJC2, it is a series of large tents that come equipped with all the computers, phones, desks, chairs, servers, printers, satellite communications equipment, and HVAC systems needed to be fully remote and independent. A mobile site is best categorized as a mixture of a cold site and a warm site which can also be relocated when needed. A cold site is a predetermined alternative location where a network can be rebuilt after a disaster. A cold site does not have a pre-established information systems capability, but it is open and available for building out an alternate site after the disaster occurs. A warm site is an alternate processing location that is dormant or performs noncritical functions under normal conditions, but which can be rapidly converted to a key operations site when needed. A warm site typically includes a data center that is typically scaled down from the primary site to include the capacity and throughput needed to run critical systems and software. A hot site is a fully configured alternate processing site that can be brought online either instantly or very quickly after a disaster. A hot site requires specialized knowledge, sophisticated automation capabilities, and platforms that are designed to operate as a fully redundant and ready alternate site. For support or reporting issues, include Question ID: 63fe08183b7322449ddbd62b in your ticket. Thank you.