wk2-other-101-150 Flashcards

1
Q

QUESTION: 101
After reviewing the following vulnerability scanning report:
A security analyst performs the following test:
Which of the following would the security analyst conclude for this reported vulnerability?
A. It is a false positive.
B. A rescan is required.
C. It is considered noise.
D. Compensating controls exist.

A

A. It is a false positive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QUESTION: 102
An organization disabled unneeded services and placed a firewall in front of a business-critical
legacy system.
Which of the following best describes the actions taken by the organization?
A. Exception
B. Segmentation
C. Risk transfer
D. Compensating controls

A

D. Compensating controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QUESTION: 103
A security consultant needs secure, remote access to a client environment.
Which of the following should the security consultant most likely use to gain access?
A. EAP
B. DHCP
C. IPSec
D. NAT

A

C. IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QUESTION: 104
Which of the following should a systems administrator use to ensure an easy deployment of
resources within the cloud provider?
A. Software as a service
B. Infrastructure as code
C. Internet of Things
D. Software-defined networking

A

B. Infrastructure as code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

QUESTION: 105
After a security awareness training session, a user called the IT help desk and reported a
suspicious call. The suspicious caller stated that the Chief Financial Officer wanted credit card
information in order to close an invoice.
Which of the following topics did the user recognize from the training?
A. Insider threat
B. Email phishing
C. Social engineering
D. Executive whaling

A

C. Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

QUESTION: 106
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data.
Which of the following should the administrator do first?
A. Block access to cloud storage websites.
B. Create a rule to block outgoing email attachments.
C. Apply classifications to the data.
D. Remove all user permissions from shares on the file server.

A

C. Apply classifications to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QUESTION: 107
An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period.
Which of the following data policies is the administrator carrying out?
A. Compromise
B. Retention
C. Analysis
D. Transfer
E. Inventory

A

B. Retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

QUESTION: 108
A company is working with a vendor to perform a penetration test.
Which of the following includes an estimate about the number of hours required to complete the
engagement?
A. SOW
B. BPA
C. SLA
D. NDA

A

A. SOW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

QUESTION: 109
A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the
increase of ransomware-as-a-service in a report to the management team.
Which of the following best describes the threat actor in the CISO’s report?
A. Insider threat
B. Hacktivist
C. Nation-state
D. Organized crime

A

D. Organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

QUESTION: 110
Which of the following practices would be best to prevent an insider from introducing malicious
code into a company’s development process?
A. Code scanning for vulnerabilities
B. Open-source component usage
C. Quality assurance testing
D. Peer review and approval

A

D. Peer review and approval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

QUESTION: 111
Which of the following can best protect against an employee inadvertently installing malware on
a company system?
A. Host-based firewall
B. System isolation
C. Least privilege
D. Application allow list

A

D. Application allow list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

QUESTION: 112
A company is adding a clause to its AUP that states employees are not allowed to modify the
operating system on mobile devices.
Which of the following vulnerabilities is the organization addressing?
A. Cross-site scripting
B. Buffer overflow
C. Jailbreaking
D. Side loading

A

C. Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

QUESTION: 113
Which of the following would be the best ways to ensure only authorized personnel can access
a secure facility? (Choose two.)
A. Fencing
B. Video surveillance
C. Badge access
D. Access control vestibule
E. Sign-in sheet
F. Sensor

A

C. Badge access
D. Access control vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

QUESTION: 114
An organization would like to store customer data on a separate part of the network that is not
accessible to users on the main corporate network.
Which of the following should the administrator use to accomplish this goal?
A. Segmentation
B. Isolation
C. Patching
D. Encryption

A

A. Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

QUESTION: 115
Which of the following is the most common data loss path for an air-gapped network?
A. Bastion host
B. Unsecured Bluetooth
C. Unpatched OS
D. Removable devices

A

D. Removable devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

QUESTION: 116
Malware spread across a company’s network after an employee visited a compromised industry
blog.
Which of the following best describes this type of attack?
A. Impersonation
B. Disinformation
C. Watering-hole
D. Smishing

A

C. Watering-hole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

QUESTION: 117
An organization is struggling with scaling issues on its VPN concentrator and internet circuit due
to remote work. The organization is looking for a software solution that will allow it to reduce
traffic on the VPN and internet circuit, while still providing encrypted tunnel access to the data
center and monitoring of remote employee internet traffic.
Which of the following will help achieve these objectives?
A. Deploying a SASE solution to remote employees
B. Building a load-balanced VPN solution with redundant internet
C. Purchasing a low-cost SD-WAN solution for VPN traffic
D. Using a cloud provider to create additional VPN concentrators

A

A. Deploying a SASE solution to remote employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

QUESTION: 118
Which of the following is the best reason to complete an audit in a banking environment?
A. Regulatory requirement
B. Organizational change
C. Self-assessment requirement
D. Service-level requirement

A

A. Regulatory requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

QUESTION: 119
Which of the following security concepts is the best reason for permissions on a human
resources fileshare to follow the principle of least privilege?
A. Integrity
B. Availability
C. Confidentiality
D. Non-repudiation

A

C. Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

QUESTION: 120
Which of the following are cases in which an engineer should recommend the decommissioning
of a network device? (Choose two.)
A. The device has been moved from a production environment to a test environment.
B. The device is configured to use cleartext passwords.
C. The device is moved to an isolated segment on the enterprise network.
D. The device is moved to a different location in the enterprise.
E. The device’s encryption level cannot meet organizational standards.
F. The device is unable to receive authorized updates.

A

E. The device’s encryption level cannot meet organizational standards.
F. The device is unable to receive authorized updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

QUESTION: 121
A company is required to perform a risk assessment on an annual basis.
Which of the following types of risk assessments does this requirement describe?
A. Continuous
B. Ad hoc
C. Recurring
D. One time

A

C. Recurring

22
Q

QUESTION: 122
After a recent ransomware attack on a company’s system, an administrator reviewed the log files.
Which of the following control types did the administrator use?
A. Compensating
B. Detective
C. Preventive
D. Corrective

A

B. Detective

23
Q

QUESTION: 123
Which of the following exercises should an organization use to improve its incident response
process?
A. Tabletop
B. Replication
C. Failover
D. Recovery

A

A. Tabletop

24
Q

QUESTION: 124
Which of the following best ensures minimal downtime and data loss for organizations with
critical computing equipment located in earthquake-prone areas?
A. Generators and UPS
B. Off-site replication
C. Redundant cold sites
D. High availability networking

A

B. Off-site replication

25
Q

QUESTION: 125
A newly identified network access vulnerability has been found in the OS of legacy IoT devices.
Which of the following would best mitigate this vulnerability quickly?
A. Insurance
B. Patching
C. Segmentation
D. Replacement

A

C. Segmentation

26
Q

QUESTION: 126
After an audit, an administrator discovers all users have access to confidential data on a file
server.
Which of the following should the administrator use to restrict access to the data quickly?
A. Group Policy
B. Content filtering
C. Data loss prevention
D. Access control lists

A

D. Access control lists

27
Q

QUESTION: 127
A client demands at least 99.99% uptime from a service provider’s hosted security services.
Which of the following documents includes the information the service provider should return to
the client?
A. MOA
B. SOW
C. MOU
D. SLA

A

D. SLA

28
Q

QUESTION: 128
A company is discarding a classified storage array and hires an outside vendor to complete the
disposal.
Which of the following should the company request from the vendor?
A. Certification
B. Inventory list
C. Classification
D. Proof of ownership

A

A. Certification

29
Q

QUESTION: 129
A company is planning a disaster recovery site and needs to ensure that a single natural
disaster would not result in the complete loss of regulated backup data.
Which of the following should the company consider?
A. Geographic dispersion
B. Platform diversity
C. Hot site
D. Load balancing

A

A. Geographic dispersion

30
Q

QUESTION: 130
A security analyst locates a potentially malicious video file on a server and needs to identify
both the creation date and the file’s creator.
Which of the following actions would most likely give the security analyst the information
required?
A. Obtain the file’s SHA-256 hash.
B. Use hexdump on the file’s contents.
C. Check endpoint logs.
D. Query the file’s metadata.

A

D. Query the file’s metadata.

31
Q

QUESTION: 131
Which of the following teams combines both offensive and defensive testing techniques to
protect an organization’s critical systems?
A. Red
B. Blue
C. Purple
D. Yellow

A

C. Purple

32
Q

QUESTION: 132
A small business uses kiosks on the sales floor to display product information for customers. A
security team discovers the kiosks use end-of-life operating systems.
Which of the following is the security team most likely to document as a security implication of
the current architecture?
A. Patch availability
B. Product software compatibility
C. Ease of recovery
D. Cost of replacement

A

A. Patch availability

33
Q

QUESTION: 133
Which of the following would help ensure a security analyst is able to accurately measure the
overall risk to an organization when a new vulnerability is disclosed?
A. A full inventory of all hardware and software
B. Documentation of system classifications
C. A list of system owners and their departments
D. Third-party risk assessment documentation

A

A. A full inventory of all hardware and software

34
Q

QUESTION: 134
Which of the following best practices gives administrators a set period to perform changes to an
operational system to ensure availability and minimize business impacts?
A. Impact analysis
B. Scheduled downtime
C. Backout plan
D. Change management boards

A

B. Scheduled downtime

35
Q

QUESTION: 135
A company must ensure sensitive data at rest is rendered unreadable.
Which of the following will the company most likely use?
A. Hashing
B. Tokenization
C. Encryption
D. Segmentation

A

C. Encryption

36
Q

QUESTION: 136
A legacy device is being decommissioned and is no longer receiving updates or patches.
Which of the following describes this scenario?
A. End of business
B. End of testing
C. End of support
D. End of life

A

D. End of life

37
Q

QUESTION: 137
A bank insists all of its vendors must prevent data loss on stolen laptops.
Which of the following strategies is the bank requiring?
A. Encryption at rest
B. Masking
C. Data classification
D. Permission restrictions

A

A. Encryption at rest

38
Q

QUESTION: 138
A company’s end users are reporting that they are unable to reach external websites. After
reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk,
and memory usage are minimal, but the network interface is flooded with inbound traffic.
Network logs show only a small number of DNS queries sent to this server.
Which of the following best describes what the security analyst is seeing?
A. Concurrent session usage
B. Secure DNS cryptographic downgrade
C. On-path resource consumption
D. Reflected denial of service

A

D. Reflected denial of service

39
Q

QUESTION: 139
A systems administrator wants to prevent users from being able to access data based on their
responsibilities. The administrator also wants to apply the required access structure via a
simplified format.
Which of the following should the administrator apply to the site recovery resource group?
A. RBAC
B. ACL
C. SAML
D. GPO

A

A. RBAC

40
Q

QUESTION: 140
During the onboarding process, an employee needs to create a password for an intranet
account. The password must include ten characters, numbers, and letters, and two special
characters. Once the password is created, the company will grant the employee access to other
company-owned websites based on the intranet profile.
Which of the following access management concepts is the company most likely using to
safeguard intranet accounts and grant access to multiple sites based on a user’s intranet
account? (Choose two.)
A. Federation
B. Identity proofing
C. Password complexity
D. Default password changes
E. Password manager
F. Open authentication

A

A. Federation
C. Password complexity

41
Q

QUESTION: 141
Which of the following describes a security alerting and monitoring tool that collects system,
application, and network logs from multiple sources in a centralized system?
A. SIEM
B. DLP
C. IDS
D. SNMP

A

A. SIEM

42
Q

QUESTION: 142
A network manager wants to protect the company’s VPN by implementing multifactor
authentication that uses:
Something you know
Something you have
Something you are
Which of the following would accomplish the manager’s goal?
A. Domain name, PKI, GeoIP lookup
B. VPN IP address, company ID, facial structure
C. Password, authentication token, thumbprint
D. Company URL, TLS certificate, home address

A

C. Password, authentication token, thumbprint

43
Q

QUESTION: 143
Which of the following would be the best way to handle a critical business application that is
running on a legacy server?
A. Segmentation
B. Isolation
C. Hardening
D. Decommissioning

A

B. Isolation

44
Q

QUESTION: 144
Which of the following vulnerabilities is exploited when an attacker overwrites a register with a
malicious address?
A. VM escape
B. SQL injection
C. Buffer overflow
D. Race condition

A

C. Buffer overflow

45
Q

QUESTION: 145
After a company was compromised, customers initiated a lawsuit. The company’s attorneys
have requested that the security team initiate a legal hold in response to the lawsuit.
Which of the following describes the action the security team will most likely be required to
take?
A. Retain the emails between the security team and affected customers for 30 days.
B. Retain any communications related to the security breach until further notice.
C. Retain any communications between security members during the breach response.
D. Retain all emails from the company to affected customers for an indefinite period of time.

A

B. Retain any communications related to the security breach until further notice.

46
Q

QUESTION: 146
Which of the following describes the process of concealing code or text inside a graphical
image?
A. Symmetric encryption
B. Hashing
C. Data masking
D. Steganography

A

D. Steganography

47
Q

QUESTION: 147
An employee receives a text message from an unknown number claiming to be the company’s
Chief Executive Officer and asking the employee to purchase several gift cards.
Which of the following types of attacks does this describe?
A. Vishing
B. Smishing
C. Pretexting
D. Phishing

A

B. Smishing

48
Q

QUESTION: 148
Which of the following risk management strategies should an enterprise adopt first if a legacy
application is critical to business operations and there are preventative controls that are not yet
implemented?
A. Mitigate
B. Accept
C. Transfer
D. Avoid

A

A. Mitigate

49
Q

QUESTION: 149
Visitors to a secured facility are required to check in with a photo ID and enter the facility
through an access control vestibule.
Which of the following best describes this form of security control?
A. Physical
B. Managerial
C. Technical
D. Operational

A

A. Physical

50
Q

QUESTION: 150
The local administrator account for a company’s VPN appliance was unexpectedly used to log
in to the remote management interface.
Which of the following would have most likely prevented this from happening?
A. Using least privilege
B. Changing the default password
C. Assigning individual user IDs
D. Reviewing logs more frequently

A

B. Changing the default password