Study Guide 101-200 Flashcards
After reviewing the following vulnerability scanning report:
A security analyst performs the following test:
Which of the following would the security analyst conclude for this reported vulnerability?
● A. It is a false positive.
● B. A rescan is required.
● C. It is considered noise.
● D. Compensating controls exist.
A. It is a false positive.
An organization disabled unneeded services and placed a firewall in front of a business-critical
legacy system. Which of the following best describes the actions taken by the organization?
● A. Exception
● B. Segmentation
● C. Risk transfer
● D. Compensating controls
D. Compensating controls
A security consultant needs secure, remote access to a client environment. Which of the
following should the security consultant most likely use to gain access?
● A. EAP (Extensible Authentication Protocol)
● B. DHCP (Dynamic Host Configuration Protocol)
● C. IPSec (Internet Protocol Security)
● D. NAT (Network Address Translation)
C. IPSec
Which of the following should a systems administrator use to ensure an easy deployment of
resources within the cloud provider?
● A. Software as a service
● B. Infrastructure as code
● C. Internet of Things
● D. Software-defined networking
B. Infrastructure as code
After a security awareness training session, a user called the IT help desk and reported a
suspicious call. The suspicious caller stated that the Chief Financial Officer wanted credit card
information in order to close an invoice. Which of the following topics did the user recognize
from the training?
● A. Insider threat
● B. Email phishing
● C. Social engineering
● D. Executive whaling
C. Social engineering
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive
customer data. Which of the following should the administrator do first?
● A. Block access to cloud storage websites.
● B. Create a rule to block outgoing email attachments.
● C. Apply classifications to the data.
● D. Remove all user permissions from shares on the file server.
C. Apply classifications to the data.
An administrator assists the legal and compliance team with ensuring information about
customer transactions is archived for the proper time period. Which of the following data policies
is the administrator carrying out?
● A. Compromise
● B. Retention
● C. Analysis
● D. Transfer
● E. Inventory
B. Retention
A company is working with a vendor to perform a penetration test. Which of the following
includes an estimate about the number of hours required to complete the engagement?
● A. SOW (Statement of Work)
● B. BPA (Business Partnership Agreement)
● C. SLA (Service Level Agreement)
● D. NDA (Non Disclosure Agreement)
A. SOW
A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the
increase of ransomware-as-a-service in a report to the management team. Which of the
following best describes the threat actor in the CISO’s report?
● A. Insider threat
● B. Hacktivist
● C. Nation-state
● D. Organized crime
D. Organized crime
Which of the following practices would be best to prevent an insider from introducing malicious
code into a company’s development process?
● A. Code scanning for vulnerabilities
● B. Open-source component usage
● C. Quality assurance testing
● D. Peer review and approval
D. Peer review and approval
Which of the following can best protect against an employee inadvertently installing malware on
a company system?
● A. Host-based firewall
● B. System isolation
● C. Least privilege
● D. Application allow list
D. Application allow list
A company is adding a clause to its AUP that states employees are not allowed to modify the
operating system on mobile devices. Which of the following vulnerabilities is the organization
addressing?
● A. Cross-site scripting
● B. Buffer overflow
● C. Jailbreaking
● D. Side loading
C. Jailbreaking
Which of the following would be the best ways to ensure only authorized personnel can access
a secure facility? (Choose two.)
● A. Fencing
● B. Video surveillance
● C. Badge access
● D. Access control vestibule
● E. Sign-in sheet
● F. Sensor
C. Badge access
D. Access control vestibule
An organization would like to store customer data on a separate part of the network that is not
accessible to users on the main corporate network. Which of the following should the
administrator use to accomplish this goal?
● A. Segmentation
● B. Isolation
● C. Patching
● D. Encryption
A. Segmentation
Which of the following is the most common data loss path for an air-gapped network?
● A. Bastion host
● B. Unsecured Bluetooth
● C. Unpatched OS
● D. Removable devices
D. Removable devices
Malware spread across a company’s network after an employee visited a compromised industry
blog. Which of the following best describes this type of attack?
● A. Impersonation
● B. Disinformation
● C. Watering-hole
● D. Smishing
C. Watering-hole
An organization is struggling with scaling issues on its VPN concentrator and internet circuit due
to remote work. The organization is looking for a software solution that will allow it to reduce
traffic on the VPN and internet circuit, while still providing encrypted tunnel access to the data
center and monitoring of remote employee internet traffic. Which of the following will help
achieve these objectives?
● A. Deploying a SASE (Secure Access Service Edge) solution to remote employees
● B. Building a load-balanced VPN solution with redundant internet
● C. Purchasing a low-cost SD-WAN (Software Defined Wide Area Network) solution for VPN traffic
● D. Using a cloud provider to create additional VPN concentrators
A. Deploying a SASE solution to remote employees
Which of the following is the best reason to complete an audit in a banking environment?
● A. Regulatory requirement
● B. Organizational change
● C. Self-assessment requirement
● D. Service-level requirement
A. Regulatory requirement
Which of the following security concepts is the best reason for permissions on a human
resources fileshare to follow the principle of least privilege?
● A. Integrity
● B. Availability
● C. Confidentiality
● D. Non-repudiation
C. Confidentiality
Which of the following are cases in which an engineer should recommend the decommissioning
of a network device? (Choose two.)
● A. The device has been moved from a production environment to a test environment.
● B. The device is configured to use cleartext passwords.
● C. The device is moved to an isolated segment on the enterprise network.
● D. The device is moved to a different location in the enterprise.
● E. The device’s encryption level cannot meet organizational standards.
● F. The device is unable to receive authorized updates.
E. The device’s encryption level cannot meet organizational standards.
F. The device is unable to receive authorized updates.
A company is required to perform a risk assessment on an annual basis. Which of the following
types of risk assessments does this requirement describe?
● A. Continuous
● B. Ad hoc
● C. Recurring
● D. One time
C. Recurring
After a recent ransomware attack on a company’s system, an administrator reviewed the log
files. Which of the following control types did the administrator use?
● A. Compensating
● B. Detective
● C. Preventive
● D. Corrective
B. Detective
Which of the following exercises should an organization use to improve its incident response
process?
● A. Tabletop
● B. Replication
● C. Failover
● D. Recovery
A. Tabletop
Which of the following best ensures minimal downtime and data loss for organizations with
critical computing equipment located in earthquake-prone areas?
● A. Generators and UPS
● B. Off-site replication
● C. Redundant cold sites
● D. High availability networking
B. Off-site replication