Study Guide Flashcards
Which of the following command line utilities would an analyst use on an end-user PC to determine the parts it is listening on? A tracert B ping C nslookup D netstat
netstat
An employee has been terminated for providing company confidential information to an outside party. The employee should not have had access to this information as part of the employee’s normal job function. Human resources has asked the security analyst to take possession of the computer and provide a copy of this hard drive to law enforcement, who will conduct a forensic investigation to look for information to help determine if they can bring criminal charges against the former employee. Which of the following steps should be taken when making a copy of the hard drive to provide to law enforcement? A Make a copy of the hard drive using a write blocker to image the disk to forensically prepared media. B Degauss the hard drive and then copy to a hard drive of at least equivalent size using ITFS formatting. C Log onto the computer with administrator privileges, and copy the hard drive to an external storage device. D Provide the hard drive to law enforcement to conduct the forensic exam directly on the original hard drive.
A Make a copy of the hard drive using a write blocker to image the disk to forensically prepared media
Which of the following is a vulnerability when using window as a host OS for virtual machines? A Window requires frequent patching. B Windows virtualized environments are typically unstable. C Windows requires hundreds of open firewall ports to operate. D Windows is vulnerable to the “ping of death”.
A Window requires frequent patching.
A security analyst received an alert from the antivirus software identifying a complex instance of malware on a company’s network. The company does not have the resources to fully analyze the malware and determine its effect on the system. Which of the following is the BEST action to take in the incident recovery and post-incident response process? A Wipe hard drives, reimage the system, and return the affected systems to ready state. B Direct and analyze he precursors and indicators; schedule a lessons learned meeting. C Remove the malware and inappropriate materials; eradicate the incident. D Perform event correlation; create a log retention policy.
A Wipe hard drives, reimage the system, and return the affected systems to ready state.
The security team has determined that the current incident response resources cannot meet management’s objective to secure a forensic image for all serious security incidents within 24 hours. Which of the following compensation controls can be used to help meet management’s expectations? A Separation of duties B Scheduled reviews C Dual control D Outsourcing
D Outsourcing
An organization has had problems with security teams remediating vulnerabilities that are either false positives or are not applicable to the organization’s server. Management has put emphasis on security teams conducting details analysis and investigation before conducting any remediation. The output from a recent Apache web server scan is shown below:s —- Scan Host: 192.168.1.18 15-Jan-16 10:12:10.1 PDT Vulnerability CVE-2006-5752 Cross-site scripting (XSS) vulnerability in the mod_status module of Apache server (httpd), when ExtendedStatus is enabled and a public-server-status page is used, allows remote attackers to inject arbitrary web script or HTML. Severity: 4.3 (medium) — The team performs some investigation and finds the statement from Apache on 07/02/2008. “Fixed in Apache HTTP server 2.2.6, 2.0.61, and 1.3.39” Which of the following conditions would require the team to perform remediation on this finding? A The organization is running version 2.2.6 and has ExtendedStatus enabled. B The organization is running version 2.0.59 and is not using a public-server-status page. C The organization is running version 1.3.39 and is using a public-sever-status page. D The organization is running version 2.0.5 and has ExtendedStatus enabled.
D The organization is running version 2.0.5 and has ExtendedStatus enabled.
A new security manager was hired to establish a vulnerability management program. The manager asked for a corporate strategic plan and risk register that the project management office developed. The manager conducted a tools and skill sets inventory to document the plan. Which of the following is a critical task for the establishment of a successful program? A Establish continuous monitoring B Update vulnerability feed C Perform information classification D Establish corporate policy
B Update vulnerability feed
Which of the following tools should an analyst use to scan for web server vulnerabilities? A Wireshark B Qualys C ArcSight D SolarWinds
B Qualys
An analyst preparing for a technical security compliance check on all Apache server. Which of the following will be the BEST to use? A CIS benchmark B Nagios C Untidy D Chain & Abel
A CIS benchmark
A technician is troubleshooting a desktop computer with low disk space. The technician reviews the following information snippets: Disk Allocation Report 350GB - C:\user1\movies\movies Network Stats Proto Local Address Foreign Address State TCP 0.0.0.0:8080 0.0.0.0 LISTENING movieDB TCP 192.168.1.10:8080 172.16.34.77:1200 TIME_WAIT Which of the following should the technician do the BEST resolve the issue based on the above information? (Select TWO) A Delete the movie\movies directory. B Disable the movieDB service. C Enable OS auto updates. D Install a file integrity tool. E Defragment the disk.
A Delete the movie\movies directory. B Disable the movieDB service.
A cybersecurity analyst was asked to review of web vulnerability scan logs. Given the following snippet of code: Iframe src=”http://65.240.22.1” width=”0” height=”0” franeborder=”0” tabindex=”-1” title=”empty” style=visibility:hidden;display:none /iframe Which of the following BEST describes the situation and recommendations to be made? A The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The code should include the domain name. Recommend the entry be updated with the domain name. B The security analyst has discovered an embedded iframe that is hidden from users accessing the web page. This code is correct. This is a design preference, and no vulnerabilities are present. C The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The link is hidden and suspicious. Recommend the entry be removed from the web page. D The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. Recommend making the iframe visible. Fixing the code will correct the issue.
C The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The link is hidden and suspicious. Recommend the entry be removed from the web page.
A cybersecurity analyst is currently auditing a new Active Directory server for compliance. The analyst uses Nessus to do the initial scan, and Nessus reports the following: PluginID IP Port 10955 192.168.1.215 Microsoft-ds (445/tcp) 11210 192.168.1.215 Microsoft-ds (445/tcp) 12350 192.168.1.215 Netbus (35/udp) 12345 192.168.1.215 Ftp (21/tcp) Which of the following critical vulnerabilities has the analyst discovered? A Known backdoor B Zero-day C Path disclosure D User enumeration
A Known backdoor
Malicious users utilized brute force to access a system. An analyst is investigating these attacks and recommends methods to management that would help secure the system. Which of the following controls should the analyst recommend? (Select THREE). A Multifactor authentication B Network segmentation C Single sign-on D Encryption E Complexity policy F Biometrics G Obfuscation
A Multifactor authentication B Network segmentation E Complexity policy
A small company is publishing a new web application to receive customer feedback related to its products. The web server will only host a form to receive customer feedback and store it in a local database. The web server is placed in a DMZ network, and the web service and file system have been hardened. However, the cybersecurity analyst discover that data from the database can be mined from over the internet. Which of the following should the cybersecurity analyst recommend be done to provide temporary mitigation from unauthorized access to the database? A Configure the database to listen for incoming connections on the internet network. B Change the database connection string and apply necessary patches. C Configure an ACL in the border firewall to block all connections to the web server for ports different than 80 and 443. D Deploy a web application firewall to protect the web application from attacks to the database.
C Configure an ACL in the border firewall to block all connections to the web server
A security administrator uses FTK to take an image of a hard drive that is under investigation. Which of the following processes are used to ensure the image is the same as the original disk? (Select TWO). A Validate the folder and file directory listings on both. B Check the hash value between the image and the original. C Boot up the image and the original system to compare. D Connect a write blocker to the imaging device. E Copy the data to a disk of the same size and manufacturer
B Check the hash value between the image and the original. D Connect a write blocker to the imaging device.
A company’s IDP/DLP solution triggered the following alerts: A. 02/25-07:16:07.294705 SSH to Non-standard Port (TCP) 245.23.123.150:51533 -> 67.178.142.153:1234 B 02/25-08:16:24.637829 E-mail sent containing text pattern 9999 9999 9999 9999 (TCP) 192.168.123.150:36543 -> 209.34.13.163:25 C. 02/25-08:23:53.367782 Malformed DNS Packet, size exceeded (UDP) 192.168.84.150:45513 -> 172.16.32.12:53 D. 02/25-09:01:34.335672 XMAS packet detected (TCP) 192.168.233.18:61412 -> 172.16.15.233:445 E. 02/25-09:12:51.564607 Attempted FTP Connection, clear text auth (TCP) 192.168.12.45:47654 -> 172.16.222.12:21 Which of the following alerts should a security analyst investigate FIRST? A A B B C C D D E E
B
A threat intelligence analyst who is working on the SOC floor has been forwarded an email that was sent to one of the executives in business development. The executive mentions the email was from the Chief Executive Officer (CEO), who was requesting an emergency wire transfer. This request was unprecedented. Which of the following threats MOST accurately aligns with this behavior? A Phishing B Whaling C Spam D Ransomware
B Whaling
A security analyst is conducting traffic analysis and observes an HTTP POST to the company’s main web server. The POST header is approximately 1000 bytes in length. During transmission, one byte is delivered every ten seconds. Which of the following attacks is the traffic indicative of? A Exfiltration B DoS C Buffer overflow D SQL injection
A Exfiltration
A security analyst want to confirm a finding from a penetration test report on the internal web server. To do so, the analyst logs into the web server using SSH to send the request locally. The report provides a link to https://hrserver.internal/../etc/paswd. And the server IP address is 10.10.10.15 However, after several attempts, the analyst cannot get the file, despite attempting to get it using different ways, as shown below: Request Response https://hrserver.internal/../…/etc/paswd Host not found https://localhost/../…/etc/passwd File not found https://10.10.10.15/../…/etc/passwd File not found Which of the following would explain this problem? (Select TWO) A The web server uses SNI to check for a domain name. B Request can only be sent remotely to the web server C There is no local name resolution for hrserver internal D The password file is write protected E The web server has not started
A The web server uses SNI to check for a domain name. C There is no local name resolution for hrserver internal
A SIEM alert occurs with the following output: Mac IP Duration Logged on 01:23:45:33:89:cc 192.168.122.3 15 h gours Yes 01:23:45:33:89:cc 192.168.122.9 4 days Yes Which of the following BEST describe this alert? A The alert is a positive, there is a device with dual NICs. B The alert is valid because IP spoofing may be occurring on the network. C The alert is a false positive, both NICs are of the same brand. D The alert is valid because there may be rogue device on the network
D The alert is valid because there may be rogue device on the network
A company provides wireless connectivity to the internal network from all physical locations for company-owned devices. Users were able to connect the day before, but now all users have reported that when they connect to an access point in the conference room, they cannot access company resources. Which of the following BEST describes the cause of the problem? A The access point is blocking access by MAC address. Disable MAC address filtering. B The network is not available. Escalate the issue to network support. C Expired DNS entries exist on users devices. Request the affected users perform a DNS flush. D The access point is a rogue device. Follow incident response procedures.
D The access point is a rogue device. Follow incident response procedures.
An application contains the following log entries in a file named “authlog.log”. User ‘oidc-provider-fb:john’ successfully logged in 2016-01-01 23:00:01 User ‘local:Administrator’ successfully logged out 2016-01-01 23:00:05 User ‘oidc-provider-fb:kate’ successfully logged out 2016-01-01 23:00:07 A security analyst has been asked to parse the log file and print out all valid usernames. Which of the following achieves this task? A security analyst has been asked to parse the log file and print out all valid usernames. Which of the following achieves this task? A grep -e “successfully” authlog.log | awk ‘{print $2}’ | sed s/\’//g B cat authlog.log | grep “2016-01-01” | echo “valid username found: $2” C echo authlog.log > sed ‘s/User//’ | print “username exists: $user” D cat “authlog.log” | grep “User” | cut -F’ ‘ | “username exists: $1”
A grep -e “successfully” authlog.log | awk ‘{print $2}’ | sed s/\’//g
An organization has two environments: development and production. Development is where applications are developed with unit testing. The development environment has many configuration differences from the production environment. All applications are hosted on virtual machines. Vulnerability scans are performed against all systems before and after any application or configuration changes to any environment. Lately, vulnerability remediation activity has caused production applications to crash and behave unpredictably. Which of the following changes should be made to the current vulnerability management process? A Create a third environment between development and production that mirrors production and tests all changes before deployment to the user. B Refine testing in the development environment to include fuzzing and user acceptance testing so application are more stable before they migrate to production. C Create a second production environment by cloning the virtual machines, and if any stability problems occur, migrate user to the alternate production environment. D Refine testing in the production environment to include more exhaustive application stability testing while continuing to maintain the robust vulnerability remediation activities.
A Create a third environment between development and production that mirrors production and tests all changes before deployment to the user.
When reviewing the system log, the cybersecurity analyst noticed a suspicious log entry. Wmic /node:HRDepartment1 computersystem get username Which of the following combinations describes what occurred, and what action should be taken in this situation? A A rogue user has queried for users logged in remotely. Disable local access to network shares. B A rogue user has queried for the administrator logged into the system. Attempt to determine who executed the command. C A rogue user has queried for the administrator logged into the system. Disable local access to use cmd prompt. D A rogue user has queried for user logged in remotely. Attempt to determine who executed the command.
D A rogue user has queried for user logged in remotely. Attempt to determine who executed the command.