Test ?'s 3 Flashcards

1
Q

Which of the following, if implemented, will NOT help mitigate the threat of tailgating?

A

Installing non-discretionary privilege management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An unmanned aerial vehicle is equipped with a component to ensure position and movement sensors are aligned and relays information to a ground control. Which of the following computing devices does this best describe?

A

Embedded System – An embedded system is a combination of hardware and software that contains a dedicated function and uses a computer component to complete the function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A cloud service provider (CSP) offers an organization the ability to build and run applications and services without having to manage infrastructure such as provisioning, authentication, and server maintenance. This offering reduces overhead and allows the organization to focus on the product being built. What type of design pattern is this?

A

Serverless Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Local Area Network (LAN) is set up with an Authentication, Authorization, and Account (AAA) server. The AAA server allows remote supplicants to access the LAN through a Network Access Point (NAP). Which of the following best describes the type of remote authentication solution that is set up on the LAN?

A

Remote Authentication Dial-in User Service (RADIUS) is made up of an Authentication, Authorization, and Account (AAA) server, a Network Access Control (NAC) or RADIUS client, and the supplicant. A supplicant is any device that is trying to access the local network remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Determine the type of code execution policy that would ensure that unrecognized software cannot run.

A

Allow List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the main features that differentiate the Test Access Point (TAP) from a Switched Port Analyzer (SPAN)?

A

Test access point (TAP) is a separate hardware device and Test access point (TAP) avoids frame loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following will reduce the risk of data exposure between containers on a cloud platform?

A

Namespaces and control groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The client wants to deploy a wireless network that uses a smart card or a certificate that can be installed on the client’s PC. Which type of authentication mechanism is most suitable for this task?

A

EAP-TLS – EAP-TLS requires client certificates, but most other types of EAP can be configured to perform mutual authentication (including EAP-TTLS, PEAP with TLS, and EAP-FAST).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A hacker can use Microsoft Office applications as an attack vector to automatically run multiple tasks in the background using which of the following?

A

VBA (Visual Basic for Applications)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A systems administrator plans to protect a data center with various security controls and safety mechanisms. Which solution does the administrator plan based on a “triangle” principle?

A

Fire Suppression – The fire triangle works on the principle that fire requires heat, oxygen, and fuel to ignite and burn. Removing any one of those elements provides fire suppression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Conclude which terms represent a core feature of the Diamond Model of Intrusion Analysis.

A

Victim, capability, and infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company with offices in multiple countries deployed a cyber threat intelligence (CTI) appliance in the cloud to detect network attacks. The security team examined last week’s data and spent a significant amount of time trying to better predict future attacks and ways to improve security. How can the team take advantage of cloud resources to better analyze these threats?

A

Use artificial intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system engineer is researching backup solutions that are inexpensive and can store large amounts of data offline. The backup solution must be portable and maintainable for a certain length of time defined in the company’s backup recovery plan. Which of the following is the best backup solution?

A

A tape backup solution is the storing of data on a magnetic tape. It is less expensive than most backup solutions. When stored properly, tape can last longer and is small and portable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

After a year of vulnerability scans, a security engineer realized that there were zero false positive cases. The application logs showed no issues with the scanning tool and reports. What type of scanning tool or configuration would result in zero false positives being reported?

A

Credentialed scan and intrusive tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which team performs the offensive role in a penetration exercise?

A

Red Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which aspect of certificate and key management should an administrator consider when trying to mitigate or prevent the loss of private keys?

A

Storage

17
Q

Which of the following cryptographic algorithm standards is best suited for Internet of Things (IoT) devices?

A

Lightweight

18
Q

Recommend an immediate response that does not require generating new certificates in a scenario where an attacker has compromised a host on a network by spoofing digital certificates.

A

Revoke the host’s certificate

19
Q

The IT team manages multiple root accounts on a spreadsheet that provides access to virtual hosts. Although only administrators have access to the share location where the spreadsheet exists, management would like to add auditing measures to these accounts. Which solution will support the requirement?

A

Privilege access management

20
Q

A Windows firewall rule allows all programs, all protocols, and all ports within a 192.168.0.0/24 subnet to connect to the network. What type of Windows Firewall with Advanced Security is this?

A

Access Control List

21
Q

A threat actor logs in to a website as a free user and submits a request for a file. The request references the parent directory of the web server. This injection attack is successful by using a canonicalization attack to disguise the nature of the malicious input. How was the threat actor able to retrieve the file?

A

Using a directory traversal attack – A directory traversal attack is an injection attack that uses specific code to request information from a web server’s root directory by submitting the directory path.

22
Q

Which attack is a brute-force type that mixes common passwords with usernames?

A

Spraying

23
Q

A datacenter requires an instantaneous failover power solution that is inexpensive. Which of the following is the least likely solution for the datacenter?

A

Generator

24
Q

Describe scenarios where containment measures, such as isolation and segmentation techniques, should be taken.

A

An unauthorized user accesses a server, A worm has infected a device on the network, The investigation of a recent incident is ongoing

25
Q

Which of the following are deployed similarly to a credit card skimmer?

A

Malicious USB plug

26
Q

An organization receives numerous negative reviews on social media platforms in response to a recent public statement. Experts use machine learning to identify any threatening language. Which approach do the experts use to identify security risks?

A

Sentiment analysis – Sentiment analysis is used to monitor social media for incidents, such as disgruntled consumers posting negative content. In terms of security, this can be used to gather threat intelligence.

27
Q

A vulnerability database loaded on a scanning tool such as Tenable Nessus will commonly show which of the following properties?

A

Score and dictionary

28
Q

A file system audit shows a malicious account was able to obtain a password database. The malicious account will be able to use the information without interacting with an authentication system. What type of attack will the malicious account be able to perform on systems?

A

Offline password attack

29
Q

A retail organization documents a workflow. By doing so, it can supply evidence of why processing and storage of particular fields of customer data are required. What data collection principle does the organization practice?

A

Data minimization

30
Q

An electrical cooperative startup needs the ability to monitor energy use, collect data taken from the monitoring, and use the data to lower costs and energy waste. Which component of an industrial control system (ICS) would be the best solution for the cooperative?

A

Supervisory control and data acquisition (SCADA) – (SCADA) is part of an industrial control system (ICS) and is used for gathering and analyzing real-time data. A SCADA aids industry in making data-driven decisions based on reporting and analytics.

31
Q

Finance representatives at an organization meet professional standards by providing reports that are highly detailed and designed to be restricted. As members of the American Institute of Certified Public Accountants (AICPA), which standards do the finance representatives follow?

A

SSAE SOC 2 Type II – A Service Organization Control (SOC2) Type II report assesses the ongoing effectiveness of the security architecture over a period of 6-12 months. SOC2 reports are highly detailed and designed to be restricted.

32
Q

A new company implements a datacenter that will hold proprietary data that is output from a daily workflow. As the company has not received any funding, no risk controls are in place. How does the company approach risk during operations?

A

Acceptance – Risk acceptance means that no countermeasures are put in place either because the level of risk does not justify the cost or because there will be an unavoidable delay before the countermeasures are deployed.