Test ?'s 4 Flashcards
A company is looking into integrating on-premise services and cloud services with a cloud service provider (CSP) using an Infrastructure as a Service (IaaS) plan. As a cloud architect works on architectural design, which of the following statements would NOT apply in this case?
The provider is responsible for the availability of the software.
Identify the concepts that function as alternatives to kill chain life cycle analysis in threat intelligence.
MITRE ATT&CK and The Diamond Model of Intrusion Analysis
A social engineer used a phishing attack to trick users into visiting a website. Once users visit the site, a vulnerability exploit kit installs, which actively exploits vulnerabilities on the client. What type of attack did the users become a victim of?
A Man-in-the-Browser (MitB) attack – A MitB attack compromises the web browser by installing malicious plug-ins, scripts, or intercepting API calls. Vulnerability exploit kits installed on a website can actively try to exploit vulnerabilities in clients browsing the site.
Analyze the methods and determine which a technician uses as a non-persistent recovery method on a server using a system baseline.
Rollback to known configuration – Rollback to known configuration is a mechanism for restoring a baseline system configuration, such as Windows System Restore.
Identify the most volatile form of memory.
Cache
What type of scanning tool or configuration would result in zero false positives being reported?
Non-credentialed scan and Non-intrusive tool
A tablet uses a key-based technique for encrypting data. It focuses on a pair of public and private keys for decryption and encryption of web traffic using less power than other encryption methods. Which encryption method is this?
Elliptic curve cryptography (ECC) is an asymmetric public and private key-based cryptographic technique for encrypting data. ECC generates keys through the properties of the elliptic curve equation providing smaller and more efficient cryptographic key processes.
What is AAA?
Authentication, Authorization, and Accounting
A security administrator protects systems passwords by hashing their related keys. The administrator discovers that this approach does not make the key any stronger or more difficult to crack. Analyze the different security properties and determine which one the administrator implemented.
Key stretching – Key stretching takes a key that is generated from a user password and repeatedly converts it to a longer and more random key.
Analyze the active defense solution statements and determine which best describes the purpose of a honeyfile.
The attempts to reuse can be traced if the threat actor successfully exfiltrates it.
A developer uses a prepackaged set of tools that includes documentation, application programming interfaces (APIs), code samples, and libraries to easily integrate an application with the company Linux operating system. Which secure coding process is the developer using?
Software development kit (SDK)
A start-up company operates all of its web servers and services on a cloud platform using Platform as a Service (PaaS). The company offices run a local domain controller for directory services. Which type of attacks would the cloud service provider consider as cloud-based attacks as opposed to on-premise?
Backdoor to virtual platforms and RAT on web servers
A recent attack on the company involving a threat actor from another country prompted the security team to host regular penetration testing exercises. The recent attack involved the IT team as well as human resources because an employee’s desktop was breached. In the upcoming exercise, what role would the human resource team portray along with the IT team to simulate the recent attack and its experiences?
The blue team is one of two competing teams in a penetration testing exercise. The blue team performs a defensive role by operating, monitoring, and alerting controls.
Which boot integrity concepts utilize the trusted platform module (TPM)?
Boot attestation and Measured boot
Which classification of data is likely to be immediately escalated in the case of a breach?
Critical data, sometimes top-secret, is too valuable to permit any risk of a breach. Therefore, any detected abnormality should immediately be escalated to senior decision-makers.