Test ?'s 3 Flashcards
Which of the following, if implemented, will NOT help mitigate the threat of tailgating?
Installing non-discretionary privilege management
An unmanned aerial vehicle is equipped with a component to ensure position and movement sensors are aligned and relays information to a ground control. Which of the following computing devices does this best describe?
Embedded System – An embedded system is a combination of hardware and software that contains a dedicated function and uses a computer component to complete the function.
A cloud service provider (CSP) offers an organization the ability to build and run applications and services without having to manage infrastructure such as provisioning, authentication, and server maintenance. This offering reduces overhead and allows the organization to focus on the product being built. What type of design pattern is this?
Serverless Architecture
A Local Area Network (LAN) is set up with an Authentication, Authorization, and Account (AAA) server. The AAA server allows remote supplicants to access the LAN through a Network Access Point (NAP). Which of the following best describes the type of remote authentication solution that is set up on the LAN?
Remote Authentication Dial-in User Service (RADIUS) is made up of an Authentication, Authorization, and Account (AAA) server, a Network Access Control (NAC) or RADIUS client, and the supplicant. A supplicant is any device that is trying to access the local network remotely.
Determine the type of code execution policy that would ensure that unrecognized software cannot run.
Allow List
What are the main features that differentiate the Test Access Point (TAP) from a Switched Port Analyzer (SPAN)?
Test access point (TAP) is a separate hardware device and Test access point (TAP) avoids frame loss.
Which of the following will reduce the risk of data exposure between containers on a cloud platform?
Namespaces and control groups
The client wants to deploy a wireless network that uses a smart card or a certificate that can be installed on the client’s PC. Which type of authentication mechanism is most suitable for this task?
EAP-TLS – EAP-TLS requires client certificates, but most other types of EAP can be configured to perform mutual authentication (including EAP-TTLS, PEAP with TLS, and EAP-FAST).
A hacker can use Microsoft Office applications as an attack vector to automatically run multiple tasks in the background using which of the following?
VBA (Visual Basic for Applications)
A systems administrator plans to protect a data center with various security controls and safety mechanisms. Which solution does the administrator plan based on a “triangle” principle?
Fire Suppression – The fire triangle works on the principle that fire requires heat, oxygen, and fuel to ignite and burn. Removing any one of those elements provides fire suppression.
Conclude which terms represent a core feature of the Diamond Model of Intrusion Analysis.
Victim, capability, and infrastructure
A company with offices in multiple countries deployed a cyber threat intelligence (CTI) appliance in the cloud to detect network attacks. The security team examined last week’s data and spent a significant amount of time trying to better predict future attacks and ways to improve security. How can the team take advantage of cloud resources to better analyze these threats?
Use artificial intelligence
A system engineer is researching backup solutions that are inexpensive and can store large amounts of data offline. The backup solution must be portable and maintainable for a certain length of time defined in the company’s backup recovery plan. Which of the following is the best backup solution?
A tape backup solution is the storing of data on a magnetic tape. It is less expensive than most backup solutions. When stored properly, tape can last longer and is small and portable.
After a year of vulnerability scans, a security engineer realized that there were zero false positive cases. The application logs showed no issues with the scanning tool and reports. What type of scanning tool or configuration would result in zero false positives being reported?
Credentialed scan and intrusive tool
Which team performs the offensive role in a penetration exercise?
Red Team
Which aspect of certificate and key management should an administrator consider when trying to mitigate or prevent the loss of private keys?
Storage
Which of the following cryptographic algorithm standards is best suited for Internet of Things (IoT) devices?
Lightweight
Recommend an immediate response that does not require generating new certificates in a scenario where an attacker has compromised a host on a network by spoofing digital certificates.
Revoke the host’s certificate
The IT team manages multiple root accounts on a spreadsheet that provides access to virtual hosts. Although only administrators have access to the share location where the spreadsheet exists, management would like to add auditing measures to these accounts. Which solution will support the requirement?
Privilege access management
A Windows firewall rule allows all programs, all protocols, and all ports within a 192.168.0.0/24 subnet to connect to the network. What type of Windows Firewall with Advanced Security is this?
Access Control List
A threat actor logs in to a website as a free user and submits a request for a file. The request references the parent directory of the web server. This injection attack is successful by using a canonicalization attack to disguise the nature of the malicious input. How was the threat actor able to retrieve the file?
Using a directory traversal attack – A directory traversal attack is an injection attack that uses specific code to request information from a web server’s root directory by submitting the directory path.
Which attack is a brute-force type that mixes common passwords with usernames?
Spraying
A datacenter requires an instantaneous failover power solution that is inexpensive. Which of the following is the least likely solution for the datacenter?
Generator
Describe scenarios where containment measures, such as isolation and segmentation techniques, should be taken.
An unauthorized user accesses a server, A worm has infected a device on the network, The investigation of a recent incident is ongoing