Test ?'s 3 Flashcards
Which of the following, if implemented, will NOT help mitigate the threat of tailgating?
Installing non-discretionary privilege management
An unmanned aerial vehicle is equipped with a component to ensure position and movement sensors are aligned and relays information to a ground control. Which of the following computing devices does this best describe?
Embedded System – An embedded system is a combination of hardware and software that contains a dedicated function and uses a computer component to complete the function.
A cloud service provider (CSP) offers an organization the ability to build and run applications and services without having to manage infrastructure such as provisioning, authentication, and server maintenance. This offering reduces overhead and allows the organization to focus on the product being built. What type of design pattern is this?
Serverless Architecture
A Local Area Network (LAN) is set up with an Authentication, Authorization, and Account (AAA) server. The AAA server allows remote supplicants to access the LAN through a Network Access Point (NAP). Which of the following best describes the type of remote authentication solution that is set up on the LAN?
Remote Authentication Dial-in User Service (RADIUS) is made up of an Authentication, Authorization, and Account (AAA) server, a Network Access Control (NAC) or RADIUS client, and the supplicant. A supplicant is any device that is trying to access the local network remotely.
Determine the type of code execution policy that would ensure that unrecognized software cannot run.
Allow List
What are the main features that differentiate the Test Access Point (TAP) from a Switched Port Analyzer (SPAN)?
Test access point (TAP) is a separate hardware device and Test access point (TAP) avoids frame loss.
Which of the following will reduce the risk of data exposure between containers on a cloud platform?
Namespaces and control groups
The client wants to deploy a wireless network that uses a smart card or a certificate that can be installed on the client’s PC. Which type of authentication mechanism is most suitable for this task?
EAP-TLS – EAP-TLS requires client certificates, but most other types of EAP can be configured to perform mutual authentication (including EAP-TTLS, PEAP with TLS, and EAP-FAST).
A hacker can use Microsoft Office applications as an attack vector to automatically run multiple tasks in the background using which of the following?
VBA (Visual Basic for Applications)
A systems administrator plans to protect a data center with various security controls and safety mechanisms. Which solution does the administrator plan based on a “triangle” principle?
Fire Suppression – The fire triangle works on the principle that fire requires heat, oxygen, and fuel to ignite and burn. Removing any one of those elements provides fire suppression.
Conclude which terms represent a core feature of the Diamond Model of Intrusion Analysis.
Victim, capability, and infrastructure
A company with offices in multiple countries deployed a cyber threat intelligence (CTI) appliance in the cloud to detect network attacks. The security team examined last week’s data and spent a significant amount of time trying to better predict future attacks and ways to improve security. How can the team take advantage of cloud resources to better analyze these threats?
Use artificial intelligence
A system engineer is researching backup solutions that are inexpensive and can store large amounts of data offline. The backup solution must be portable and maintainable for a certain length of time defined in the company’s backup recovery plan. Which of the following is the best backup solution?
A tape backup solution is the storing of data on a magnetic tape. It is less expensive than most backup solutions. When stored properly, tape can last longer and is small and portable.
After a year of vulnerability scans, a security engineer realized that there were zero false positive cases. The application logs showed no issues with the scanning tool and reports. What type of scanning tool or configuration would result in zero false positives being reported?
Credentialed scan and intrusive tool
Which team performs the offensive role in a penetration exercise?
Red Team