Udemy CASP Practice Exam 5 Flashcards
Dion Training wants to install a new accounting system and is considering moving to a cloud-based solution to reduce cost, reduce the information technology overhead costs, improve reliability, and improve availability. Your Chief Information Officer is supportive of this move since it will be more fiscally responsible. Still, the Chief Risk Officer is concerned with housing all of the company’s confidential financial data in a cloud provider’s network that might be shared with other companies. Since the Chief Information Officer is determined to move to the cloud, what type of cloud-based solution would you recommend to account for the Chief Risk Officer’s concerns?
A. PaaS in a hybrid cloud
B. SaaS in a public cloud
C. SaaS in a private cloud
D. PaaS in a community cloud
C. SaaS in a private cloud
Explanation:
OBJ-1.6: A SaaS (Software as a Service) solution best describes an accounting system or software used as part of a cloud service. This meets the CIO’s requirements. To mitigate the concerns of the Chief Risk Officer, you should use a private cloud solution. This type of solution ensures that the cloud provider does not comingle your data with other customers’ data and providers dedicated servers and resources for your company’s use only.
A company’s NetFlow collection system can handle up to 2 Gbps. Due to excessive load, this has begun to approach full utilization at various times of the day. If the security team does not have additional money in their budget to purchase a more capable collector, which of the following options could they use to collect useful data?
A. Enable sampling of the data
B. Enable QoS
C. Enable NetFlow compression
D. Enable full packet capture
A. Enable sampling of the data
Explanation:
OBJ-1.1: The organization should enable sampling of the data collected. Sampling can help them capture network flows that could be useful without collecting everything passing through the sensor. This reduces the bottleneck of 2 Gbps and still provides useful information. Quality of Service (QoS) is a set of technologies that work on a network to guarantee its ability to run high-priority applications and traffic dependably, but that does not help in this situation. Compressing NetFlow data helps save disk space, but it does not increase the capacity of the bottleneck of 2 Gbps during collection. Enabling full packet capture would take even more resources to process and store and not minimize the bottleneck of 2 Gbps during collection.
When you purchase an exam voucher at diontraining.com, the system only collects your name, email, and credit card information. Which of the following privacy methods is being used by Dion Training?
A. Data masking
B. Tokenization
C. Data minimization
D. Anonymization
C. Data minimization
Explanation:
OBJ-1.4: Data minimization involves limiting data collection to only what is required to fulfill a specific purpose. Reducing what information is collected reduces the amount and type of information that must be protected. Since we only need your name and email to deliver the voucher and your credit card to receive payment for the voucher, we do not collect any additional information, such as your home address or phone number. Data masking can mean that all or part of a field’s contents are redacted, by substituting all character strings with x, for example. Tokenization means that all or part of data in a field is replaced with a randomly generated token. The token is stored with the original value on a token server or token vault, separate from the production database. An authorized query or app can retrieve the original value from the vault, if necessary, so tokenization is a reversible technique. Data anonymization is the process of removing personally identifiable information from data sets so that the people whom the data describe remain anonymous.
What type of services can allow you to get more storage and more resources added to the cloud as fast as possible?
A. Rapid elasticity
B. Measured services
C. Resource pooling
D. Metered services
A. Rapid elasticity
Explanation:
OBJ-1.2: Rapid elasticity allows users to automatically request additional space in the cloud or other types of services. Because of the setup of cloud computing services, provisioning can be seamless for the client or user. Providers still need to allocate and de-allocate resources that are often irrelevant on the client or user’s side. This feature allows a service to be scaled up without purchasing, installing, and configuring new hardware, unlike if you had to install more physical storage into a server or datacenter. Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Metered services are pre-paid, a-la-carte, pay-per-use, or committed offerings. A metered service like a database may charge its users based on the actual usage of the service resources on an hourly or monthly basis. For example, Dion Training used the AWS Lambda serverless product in some of our automation. This service charges us $0.20 for every 1 million requests processed. Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning.
Marta’s organization is concerned with the vulnerability of a user’s account being vulnerable for an extended period of time if their password was compromised. Which of the following controls should be configured as part of their password policy to minimize this vulnerability?
A. Password history
B. Password expiration
C. Password complexity
D. Minimum password length
B. Password expiration
Explanation:
OBJ-1.5: A password expiration control in the policy would force users to change their passwords at specific time intervals. This will then locks out a user who types in the incorrect password or create an alter that the user’s account has been potentially compromised. While the other options are good components of password security to prevent an overall compromise, they are not effective against the vulnerability described in this particular scenario. It states the issue is based on time. Password history is used to determine the number of unique passwords a user must use before using an old password again. The Passwords must meet complexity requirements policy setting determines whether passwords must meet a series of guidelines that are considered important for a strong password. Maximum password length creates a limit to how long the password can be, but a longer password is considered stronger against a brute force attack.
During the analysis of data as part of ongoing security monitoring activities, which of the following is NOT a good source of information to validate the results of an analyst’s vulnerability scans of the network’s domain controllers?
A. DMARC and DKIM
B. Log files
C. SIEM systems
D. Configuration moanagement systems
A. DMARC and DKIM
Explanation:
OBJ-2.3: Vulnerability scans should never take place in a vacuum. Analysts should correlate scan results with other information sources, including logs, SIEM systems, and configuration management systems. DMARC (domain-based message authentication, reporting, and conformance) and DKIM (domain keys identified mail) are configurations performed on a DNS server to verify whether an email is sent by a third-party are verified to send it on behalf of the organization. For example, if you are using a third-party mailing list provider, they need your organization to authorize them to send an email on your behalf by setting up DMARC and DKIM in your DNS records. While this is an important security configuration, it would not be a good source of information to validate the results of an analyst’s vulnerability scans on a domain controller.
In which phase of the security intelligence cycle is information from several different sources aggregated into useful repositories?
A. Dissemination
B. Collection
C. Analysis
D. Feedback
B. Collection
Explanation:
OBJ-2.1: The collection phase is usually implemented by administrators using various software suites, such as security information and event management (SIEM). This software must be configured with connectors or agents that can retrieve data from sources such as firewalls, routers, IDS sensors, and servers. The analysis phase focuses on converting collected data into useful information or actionable intelligence. The dissemination phase refers to publishing information produced by analysis to consumers who need to develop the insights. The final phase of the security intelligence cycle is feedback and review, which utilizes both intelligence producers’ and intelligence consumers’ input. This phase aims to improve the implementation of the requirements, collection, analysis, and dissemination phases as the life cycle is developed.
Dion Training is drafting a new business continuity plan and is trying to determine the appropriate recovery time objective for their practice exam web application. This application is used by all of Dion Training’s students to prepare for their upcoming certification exams. Historically, the organization has observed that if the application is down for more than a few hours, then a large number of complaints are created by students. Which of the following roles is most qualified to determine the appropriate recovery time objective to use for this application?
A. Data custodian
B. CEO
C. Cybersecurity analysis
D. Director of studen success
D. Director of studen success
Explanation:
OBJ-4.4: The “director of student success” is the person responsible for supporting the students and answering their complaints and serves as the business unit manager or director for the training of students at Dion Training. They are the person most qualified to determine the maximum amount of time that performing a recovery should take without creating a negative experience for the students (customers). The recovery time objective defines the maximum amount of time that performing a recovery can take and the service can be offline. The data custodian is responsible for the safe custody, transport, storage of the data, and implementation of the organization’s business rules. Cybersecurity analysts plan and carry out security measures to protect a company’s computer networks and systems, but they do not define the recovery time objective. The chief executive officer (CEO) is the head of the executive team and manages the day-to-day operations of the organization, its people, and resources. The CEO might make the final decision on the recovery time objective based on comparing the costs and benefits of meeting a certain recovery time objective proposed by the director of student success (the business unit manager/director).
Review the following packet captured at your NIDS:
After reviewing the packet above, you discovered there is an unauthorized service running on the host. Which of the following ACL entries should be implemented to prevent further access to the unauthorized service while maintaining full access to the approved services running on this host?
A. DENY IP HOST 86.18.10.3 EQ 3389
B. DENY TCP ANY HOST 86.18.10.3 EQ 25
C. DENY TCP ANY HOST 71.168.10.45 EQ 3389
D. DENY IP HOST 71.168.10.45 ANY EQ 25
C. DENY TCP ANY HOST 71.168.10.45 EQ 3389
Explanation:
OBJ-2.2: Since the question asks you to prevent unauthorized service access, we need to block port 3389 from accepting connections on 71.168.10.45 (the host). This option will deny ANY workstation from connecting to this machine (host) over the Remote Desktop Protocol service that is unauthorized (port 3389).
Dion Training performed an assessment as part of its disaster recovery planning. The assessment found that the organization can only tolerate a maximum of 60 minutes worth of data loss in the event of a disaster. Therefore, the organization has implemented a system of database snapshots that are backed up every hour. Which of the following metrics would best represent this timeframe?
A. RPO
B. RTO
C. MTTR
D. MTBF
A. RPO
Explanation:
OBJ-4.4: Recovery point objective (RPO) describes the timeframe in which an enterprise’s operations must be restored following a disruptive event, e.g., a cyberattack, natural disaster, or communications failure. RPO is about how much data you afford to lose before it impacts business operations. For example, at Dion Training, if 1 hour of data loss occurred, that means that any student progress within the last hour would be lost once the organization restored a server from a known good backup.
Which type of personnel control is being implemented if Kirsten must receive and inventory any items that her coworker, Bob, orders?
A. Background checks
B. Mandatory vacation
C. Dual control
D. Seperation of Duties
D. Seperation of Duties
Explanation:
OBJ-4.1: This organization uses separation of duties to ensure that neither Kirsten nor Bob can exploit the organization’s ordering processes for their gain. Separation of duties is the concept of having more than one person required to complete a particular task to prevent fraud and error. Dual control, instead, requires both people to act together. For example, a nuclear missile system uses dual control and requires two people to each turn a different key simultaneously to allow for a missile launch to occur. Mandatory vacation policies require employees to take time away from their job and detect fraud or malicious activities. A background check is a process a person or company uses to verify that a person is who they claim to be and provides an opportunity for someone to check a person’s criminal record, education, employment history, and other past activities to confirm their validity.
Which of the following types of operational technologies is designed to be used for a single purpose or function and cannot be patched when a flaw or defect is identified?
A. FPGA
B. IoT
C. SoC
D. ASIC
D. ASIC
Explanation:
OBJ-3.3: An application-specific integrated circuit (ASIC) is a type of processor designed to perform a specific function. ASICs are expensive to design and only work for a single application or function, such as the ASICs used to conduct switching in an Ethernet switch. ASICs cannot be rewritten, flashed, or updated once they are created and installed. If a flaw or defect is discovered in the ASIC, it must be replaced to patch the vulnerability. A field programmable gate array (FPGA) is a type of processor that can be programmed to perform a specific function by a customer rather than at the time of manufacture. A FPGA can be configured by the end customer to run programming logic on the device for their specific use case or application. A System on a Chip (SoC) integrates practically all the components of a traditional chipset (which is comprised of as many as four chips that control communication between the CPU, RAM, storage, and peripherals) into a single chip. SoC includes the processor as well as a GPU (graphics processor), memory, USB controller, power management circuits, and wireless radios. Internet of Things (IoT) is a term used to describe a global network of appliances and personal devices that have been equipped with sensors, software, and network connectivity. The Internet of Things includes hub/control systems, smart devices, wearables, and sensors.
Dion Training has just installed a new security patch into their existing practice exam web application. Which of the following tests should be conducted to ensure that all of the previous system functionality still works as expected after installing the patch?
A. Unit testing
B. Integration testing
C. Regression testing
D. CI/CD
C. Regression testing
Explanation:
OBJ-1.3: Regression testing is the process of testing an application after changes are made to see if these changes have triggered problems in older areas of code. Continuous integration/continuous delivery (CI/CD) is a software development methodology in which code updates are tested and committed to a development or build server/code repository rapidly. Integration testing is used to test individual components of a system together to ensure that they interact as expected. Unit testing is used to test a particular block of code performs the exact action intended and provides the exact output expected. Normally, unit testing is coded into the software using simply pass/no pass tests for each block of code.
You are analyzing the vulnerability scanning results from a recent web vulnerability scan in preparation for the exploitation phase of an upcoming assessment. A portion of the scan results is shown below.
Which exploit is the website vulnerable to based on the results?
A. Session hijacking
B. Cookie manipulation
C. SQL Injection
D. Local file inclusion
C. SQL Injection
Explanation:
OBJ-2.4: The most common type of code injection is SQL injection. An SQL injection attempts to modify one or more of an SQL query’s four basic functions: select, insert, delete, or update. Two common methods of performing an SQL injection are either using a single apostrophe (‘) or submitting an always true statement like 1=1. In the scan results, you can see that a statement of “1 OR 17 - 7 = 10” was used. Notice that %20 is the ASCII encoded equivalent of the space character. As a penetration tester, you need to be familiar with common ASCII encoded text used in URLs equivalents like %20 (space), %5c (), and %2F (/) to identify SQL injections and file inclusions.
Dion Training is developing a new web-based practice exam test engine. The application uses REST API and TLS to communicate securely between the front end and backend servers. You have been hired as a security analyst and have been asked to provide a solution that would help secure the application from attack. Which of the following solutions should you recommend to prevent an on-path or interception attack against this web-based application?
A. Certificate pinning
B. Secure encrypted enclave
C. Extended validation certificate
D. HSTS
D. HSTS
Explanation:
OBJ-3.5: HTTP Strict Transport Security (HSTS) is configured as a response header on a web server and notifies a browser to connect to the requested website using HTTPS only. HSTS helps prevent on-path and downgrade attacks. Certificate pinning is a deprecated method of trusting digital certificates that bypasses the CA hierarchy and chain of trust to minimize on-path (formerly man-in-the-middle) attacks. Certificate pinning is no longer considered secure and should not be used. Extended Validation (EV) digital certificates are subject to a process that requires more rigorous checks on the subject’s legal identity and control over the domain or software being signed. A major drawback to EV certificates is that they cannot be issued for a wildcard domain. Secure encrypted enclaves protect CPU instructions, dedicated secure subsystems in a system on a chip (SoC), or a protected region of memory in a database engine by only allowing data to be decrypted on the fly within the CPU, SoC, or protected region.
Christina is conducting a penetration test against Dion Training’s network. The goal of this engagement is to conduct data exfiltration of the company’s exam database without detection. Christina enters the following command into the terminal:
Next, Christina emailed the beachpic.png file to her personal email account. Which of the following techniques did she use to exfiltrate the file?
A. NTFS Encryption
B. DLL Hijacking
C. Alternate data streams
D. Unquoted service path
C. Alternate data streams
Explanation:
OBJ-1.4: An alternate data stream (ADS) is a feature of Microsoft’s NT File System (NTFS) that enables multiple data streams for a single file name by forking one or more files to another. ADS can be abused by hiding one file into another, as shown in this scenario. Once received in her email, she could access the database by opening the file as “beachpic.png:exams.db”.
You have just completed writing the scoping document for your next penetration test, which clearly defines what tools, techniques, and targets you intend to include during your assessment. Which of the following actions should you take next?
A. Conduct a port scan of the target network
B. Conduct passive fingerprinting on target servers
C. Provide a copy of the scoping document to local law enforcement
D. Get leadership concurrence on the scoping document
D. Get leadership concurrence on the scoping document
Explanation:
OBJ-2.4: Once the scoping document has been prepared, you must get concurrence with your plan before you begin your penetration test. Therefore, you must get the scoping plan reviewed and approved by the organization’s leadership as your next action. You should never begin a penetration test before you have written permission and concurrence from the target organization. Port scanning of the target and even passive fingerprinting could be construed as a cybercrime if you did not get the scoping document signed off before beginning your assessment. There is no requirement to notify local law enforcement of your upcoming penetration test as long as you have a signed scoping document and contract with the targeted company.
Susan is working at a nuclear power plant as a reactor operator. During his shift, the reactor temperature starts rising rapidly. Suddenly, he sees flashing lights on the console and hears a warning siren. The automatic controls take over and scram the reactor by inserting the control rods and returning the plant to a safe state while the other engineers investigate what went wrong. Which of the following operational technologies was responsible for the lights, siren, and initiating a reactor scram?
A. Data historian
B. Safety instrumented system
C. Human machine interface
D. Ladder Logic
B. Safety instrumented system
Explanation:
OBJ-3.3: A Safety Instrumented System (SIS) is composed of sensors, logic solvers, and final control elements (devices like horns, flashing lights, and/or sirens) used to return an industrial process to a safe state after predetermined conditions are detected. The human-machine interface (HMI) provides the input and output controls on a PLC to allow a user to configure and monitor the system. In this scenario, Jason is sitting at a control panel with buttons and switches that are used to manually control the PLCs located throughout the reactor plant. Ladder Logic is a graphical, flowchart-like programming language used to program the special sequential control sequences used by a programmable logic controller (PLC). The data historian is a type of software that aggregates and catalogs data from multiple sources within an industrial control system’s control loop.
Janet, a defense contractor for the military, performs an analysis of their enterprise network to identify what type of work the Army would be unable to perform if the network were down for more than a few days. Which of the following was Janet trying to identify?
A. Critical systems
B. Backup and restoration plan
C. Mission essential function
D. Single point of failure
C. Mission essential function
Explanation:
OBJ-4.4: Mission essential functions are things that must be performed by an organization to meet its mission. For example, the Army being able to deploy its soldiers is a mission-essential function. If they couldn’t do that because a network server is offline, then that system would be considered a critical system and should be prioritized for higher security and better defenses.
Why would a company want to utilize a wildcard certificate for their servers?
A. To secure the certificates private key
B. To reduce the certificate management burden
C. To increase the certificates encryption key length
D. To extend the renewal date of the certificate
B. To reduce the certificate management burden
Expolanation:
OBJ-3.5: A wildcard certificate is a public key certificate that can be used with multiple subdomains of a domain. This saves money and reduces the management burden of managing multiple certificates, one for each subdomain. A single wildcard certificate for *.diontraining.com will secure all these domains (www.diontraining.com, mail.diontraining.com, ftp.diontraining.com, etc.). The other options provided are not solved by using a wildcard certificate.
What phase of the software development lifecycle is sometimes known as the acceptance, installation, and deployment phase?
A. Training and transition
B. Operations and maintenance
C. Development
D. Disposition
A. Training and transition
Explanation:
OBJ-1.3: The training and transition phase ensures that end users are trained on the software and entered general use. Because of these activities, this phase is sometimes called the acceptance, installation, and deployment phase. Disposition is focused on the retirement of an application or system. Operations and maintenance are focused on the portion of the lifecycle where the application or system goes into use to provide value to the end-users. Development is the portion of the lifecycle focused on designing and coding the application or system.
Dion Training has been issued a digital certificate for a test server from an intermediate certificate authority (R3) who is subordinate to the root certification authority (ISRG Root X1). The digital certificate was issued for 12 months and has been in use without any issues for the past 4 months. When Jason accessed the test server’s login page today, he noticed that there was an error stating that the connection is untrusted. Which of the following is MOST likely causing this error?
A. There is a chain issue with the certificate authorities
B. There is a validity date error on the certificate
C. There are incorrect permissions on the template
D. The certificate was self signed
A. There is a chain issue with the certificate authorities
Explanation:
OBJ-3.7: Chain issues occur when the root, subordinate, or leaf certificate fails to pass a validity check. Since the certificate authorities must all pass the validity checks for the certification issued to be considered valid, if any of these are invalid then the entire chain is considered invalid, too. A validity date error occurs when a certificate is presented for use on a date that is already past the expiration date. The expiration date is not reached yet as it still has 8 months remaining on the digital certificate. A self-signed certificate is a certificate generated independently of a certificate authority and is considered not trustworthy. Since there is a root and intermediate certificate authority involved, the digital certificate is not self-signed. An incorrect permissions error is generated when a template is used for certificate enrollment but the template’s permissions are misconfigured. This can result in a “cannot enroll for this type of certificate” or an “operation failed” error. Since the question was not asking about enrolling or renewing a certificate, it cannot be an incorrect permissions error.
If you want to conduct an operating system identification during a nmap scan, which syntax should you utilize?
A. nmap -id
B. nmap -os
C. nmap -O
D. nmap -osscan
C. nmap -O
Explanation:
OBJ-2.9: The -O flag indicates to nmap that it should attempt to identify the target’s operating system during the scanning process. It does this by evaluating the responses it received during the scan against its signature database for each operating system.
What type of wireless security measure can easily be defeated by a hacker by spoofing their network interface card’s hardware address?
A. WPS
B. MAC Filtering
C. DIsable SSID Broadcast
D. WEP
B. MAC Filtering
Explanation:
OBJ-1.1: Wireless access points can utilize MAC filtering to ensure only known network interface cards are allowed to connect to the network. If the hacker changes their MAC address to a trusted MAC address, they can easily bypass this security mechanism. MAC filtering is considered a good security practice as part of a larger defense-in-depth strategy, but it won’t stop a skilled hacker for long. MAC addresses are permanently burned into the network interface card by the manufacturer and serve as the device’s physical address. WEP is the Wired Equivalent Privacy encryption standard, which is considered obsolete in modern wireless networks. WEP can be broken using a brute force attack within just a few minutes by an attacker. Another security technique is to disable the SSID broadcast of an access point. While this prevents the SSID broadcast, a skilled attacker can still find the SSID using discovery scanning techniques. WPS is the WiFi Protected Setup. WPS is used to connect and configure wireless devices to an access point easily.
Which of the following would a virtual private cloud (VPC) infrastructure be classified as?
A. PaaS
B. SaaS
C. IaaS
D. Function as a Service
C. IaaS
Explanation:
OBJ-1.6: Infrastructure as a Service (IaaS) is a computing method that uses the cloud to provide any or all infrastructure needs. In a VPC environment, an organization may provision virtual servers in a cloud-hosted network. The service consumer is still responsible for maintaining the IP address space and routing internally to the cloud. Platform as a Service (PaaS) is a computing method that uses the cloud to provide any platform-type services. Software as a Service (SaaS) is a computing method that uses the cloud to provide users with application services. Function as a Service (FaaS) is a cloud service model that supports serverless software architecture by provisioning runtime containers to execute code in a particular programming language.
Which of the following security controls provides Windows system administrators with an efficient way to deploy system configuration settings across many devices?
A. Anti malware
B. HIPS
C. Patch management
D. GPO
D. GPO
Explanation:
OBJ-3.2: Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users. A Group Policy is the primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization. In an active directory environment, Group Policy is applied to users or computers based on their membership in sites, domains, or organizational units. A host-based intrusion detection system (HIDS) is a device or software application that monitors a system for malicious activity or policy violations. Any malicious activity or violation is typically reported to an administrator or collected centrally using a security information and event management system. Anti-malware software is a program that scans a device or network for known viruses, Trojans, worms, and other malicious software. Patch management is the process of distributing and applying updates to the software to prevent vulnerabilities from being exploited by an attacker or malware. Proper patch management is a technical control that would prevent future outbreaks.
You have noticed some unusual network traffic outbound from a certain host. The host is communicating with a known malicious server over port 443 using an encrypted TLS tunnel. You ran a full system anti-virus scan of the host with an updated anti-virus signature file, but the anti-virus did not find any infection signs. Which of the following has MOST likely occurred?
A. Password spraying
B. Zero Day Attack
C. Session hijacking
D. Directory traversal
B. Zero Day Attack
Explanation:
OBJ-2.2: Since you scanned the system with the latest anti-virus signatures and did not find any signs of infection, it would most likely be evidence of a zero-day attack. A zero-day attack has a clear sign of compromise (the web tunnel being established to a known malicious server). The anti-virus doesn’t have a signature yet for this particular malware variant. Password spraying occurs when an attacker tries to log in to multiple different user accounts with the same compromised password credentials. Session hijacking is exploiting a valid computer session to gain unauthorized access to information or services in a computer system. Based on the scenario, it doesn’t appear to be session hijacking since the user would not normally attempt to connect to a malicious server. Directory traversal is an HTTP attack that allows attackers to access restricted directories and execute commands outside of the web server’s root directory. A directory traversal is usually indicated by a dot dot slash (../) in the URL being attempted.
The Chief Security Officer at Dion Training is concerned with the threat of data remnants being exposed as their cloud-based servers elastically scale to meet rising and falling user demands. Which of the following cryptographic techniques would BEST be used to mitigate the risk of data remnants being read by a malicious attacker?
A. User a self signature certificate
B. Key rotation
C. Cryptographic obfuscation
D. Crypto shredding
D. Crypto shredding
Explanation:
OBJ-3.7: Crypto shredding is used to destroy a decryption key to effectively destroy the data that key was used to protect. This technique ensures that the data will remain encrypted if the key is fully destroyed and the encryption algorithm itself remains secure. To protect against data remnants left behind during elastic scaling operations, the storage of each cloud server should be encrypted using a different key and that key should be destroyed when the server is deprovisioned during scaling in operations. Cryptographic obfuscation is used to transform protected data into an unreadable format. For example, the Linux user passwords stored in the /etc/shadow file are obfuscated to protect them. Key rotation is the process of purposely changing keys periodically to mitigate against brute force attacks and key disclosure compromises. During key rotation, the previous key is also revoked and invalidated. A self-signed certificate is a certificate generated independently of a certificate authority and is considered not trustworthy.
Your network security manager wants a monthly report of the security posture of all the assets on the network (e.g., workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, or other essential security feature and its risk severity. Which tool would work best to find this data?
A. Penetration test
B. Vulnerability Scanner
C. Security policy
D. Antivirus scan
B. Vulnerability Scanner
Explanation:
OBJ-2.4: A vulnerability scanner is a computer program designed to assess computers, computer systems, networks, or applications for weaknesses. Most vulnerability scanners also create an itemized report of their findings after the scan.
A small business recently experienced a catastrophic data loss due to flooding from a recent hurricane. The customer had no backups, and flooding destroyed all of the hardware associated with the small business. As part of the rebuilding process, the small business contracts with your company to help create a disaster recovery plan to ensure this never reoccurs again. Which of the following recommendations should you include as part of the disaster recovery plan?
A. Purchase waterproof devices to prevent data loss
B. Local backups should be conducted
C. Backups should be conducted to a cloud based storage solution
D. Local backups should be verified weekly to ensure no data loss occurs
C. Backups should be conducted to a cloud based storage solution
Explanation:
OBJ-4.4: While losing the hardware is a problem for the business, their insurance will replace the hardware if flooding destroyed it. The data involved is more of a concern. Therefore, backups should be the primary concern. Local backups are risky since a flood might also destroy them; therefore, using a cloud-based storage solution would be ideal and prevent future data loss.
Dion Consulting Group has recently been awarded a contract to provide cybersecurity services for a major hospital chain in 48 cities across the United States. You are conducting a vulnerability scan of the hospital’s enterprise network when you detect several devices that could be vulnerable to a buffer overflow attack. Upon further investigation, you determine that these devices are PLCs used to control the hospital’s elevators. Unfortunately, there is not an update available from the elevator manufacturer for these devices. Which of the following mitigations do you recommend?
A. recommend immediate replacement of the PLCs with ones that are not vulnerable to this type of attack
B. Conduct a penetration test of the elevator control system to prove that the possibility of this kind of attack exists
C. Recommend isolation of the elevator control system from the rest of the production network through the change control process
D. Recommend immediate disconnection of the elevators control system from the enterprise neetwork
C. Recommend isolation of the elevator control system from the rest of the production network through the change control process
Explanation:
OBJ-3.3: The best recommendation is to conduct the elevator control system’s logical or physical isolation from the rest of the production network and the internet. This should be done through the change control process that brings the appropriate stakeholders together to discuss the best way to mitigate the vulnerability to the elevator control system that defines the business impact and risk of the decision. Sudden disconnection of the PLCs from the rest of the network might have disastrous results (i.e., sick and injured trapped in an elevator) if there were resources that the PLCs were dependent on in the rest of the network. Replacement of the elevators may be prohibitively expensive, time-consuming, and likely something that the hospital would not be able to justify to mitigate this vulnerability. Attempting further exploitation of the buffer overflow vulnerability might inadvertently trap somebody in an elevator or cause damage to the elevators themselves.
Which of the following is NOT considered a phase in the incident response cycle?
A. Detection and analysis
B. Notification and communication
C. Preparation
D. Containment, eradication and recovery
B. Notification and communication
Explanation:
OBJ-2.7: There are four phases to the incident response cycle: preparation; detection and analysis; containment, eradication, and recovery; and post-incident activity. While you will conduct some notifications and communication during your incident response, that term is not one of the four defined phases.
Which of the following layers within software-defined networking focuses on providing network administrators the ability to oversee network operations, monitor traffic conditions, and display the status of the network?
A .Control lyaer
B. Infrastructure layer
C. Application layer
D. Management plane
D. Management plane
Explanation:
OBJ-1.1: The management plane is used to monitor traffic conditions, the status of the network, and allows network administrators to oversee the network and gain insight into its operations. The application layer focuses on the communication resource requests or information about the network. The control layer uses the information from applications to decide how to route a data packet on the network and to make decisions about how traffic should be prioritized, how it should be secured, and where it should be forwarded to. The infrastructure layer contains the physical networking devices that receive information from the control layer about where to move the data and then perform those movements.
(This is a simulated performance-based question.)
Review the network diagram provided. Which of the following ACL entries should be added to the firewall to allow only the Human Resources (HR) computer to have SMB access to the file server (Files)?
(Note: The firewall in this network is using implicit deny to maintain a higher level of security. ACL entries are in the format of Source IP, Destination IP, Port Number, TCP/UDP, Allow/Deny.)
What kind of security vulnerability would a newly discovered flaw in a software application be considered?
A. Input validation flaw
B. Time to check to time to use flaw
C. HTTP Header INjection vulnerability
D. Zero day vulnerability
D. Zero day vulnerability
Explanation:
OBJ-2.5: A zero-day vulnerability refers to a hole in software unknown to the vendor and newly discovered. This security hole can become exploited by hackers before the vendor becomes aware of it and can fix it. An input validation attack is any malicious action against a computer system that involves manually entering strange information into a normal user input field that is successful due to an input validation flaw. HTTP header injection vulnerabilities occur when user input is insecurely included within server response headers. The time of check to time of use is a class of software bug caused by changes in a system between checking a condition (such as a security credential) and using the check’s results and the difference in time passed. This is an example of a race condition.
Which technique would provide the largest increase in security on a network with ICS, SCADA, or IoT devices?
A. User and entity behavior analytics
B. Installation of antivirus tools
C. Implement endpoint protection platforms
D. Use of a host based IDS or IPS
A. User and entity behavior analytics
Explanation:
OBJ-3.3: Since ICS, SCADA, and IoT devices often run proprietary, inaccessible, or unpatchable operating systems, the traditional tools used to detect the presence of malicious cyber activity in normal enterprise networks will not function properly. Therefore, user and entity behavior analytics (UEBA) is best suited to detect and classify known-good behavior from these systems to create a baseline. Once a known-good baseline is established, deviations can be detected and analyzed. UEBA may be heavily dependent on advanced computing techniques like artificial intelligence and machine learning and may have a higher false-positive rate. As the name suggests, the analytics software tracks user account behavior across different devices and cloud services. Entity refers to machine accounts, such as client workstations or virtualized server instances, and embedded hardware, such as the Internet of Things (IoT) devices. Traditional technologies include anti-virus tools, host-based IDS and IPS, and endpoint protection platforms.