Wk2-other-151-201 Flashcards
QUESTION: 151
Which of the following is the best way to secure an on-site data center against intrusion from an
insider?
A. Bollards
B. Access badge
C. Motion sensor
D. Video surveillance
B. Access badge
QUESTION: 152
An engineer moved to another team and is unable to access the new team’s shared folders
while still being able to access the shared folders from the former team. After opening a ticket,
the engineer discovers that the account was never moved to the new group.
Which of the following access controls is most likely causing the lack of access?
A. Role-based
B. Discretionary
C. Time of day
D. Least privilege
A. Role-based
QUESTION: 153
Which of the following factors are the most important to address when formulating a training
curriculum plan for a security awareness program? (Choose two.)
A. Channels by which the organization communicates with customers
B. The reporting mechanisms for ethics violations
C. Threat vectors based on the industry in which the organization operates
D. Secure software development training for all personnel
E. Cadence and duration of training events
F. Retraining requirements for individuals who fail phishing simulations
C. Threat vectors based on the industry in which the organization operates
E. Cadence and duration of training events
QUESTION: 154
A network administrator is working on a project to deploy a load balancer in the company’s
cloud environment.
Which of the following fundamental security requirements does this project fulfill?
A. Privacy
B. Integrity
C. Confidentiality
D. Availability
D. Availability
QUESTION: 155
A systems administrator is changing the password policy within an enterprise environment and
wants this update implemented on all systems as quickly as possible.
Which of the following operating system security measures will the administrator most likely
use?
A. Deploying PowerShell scripts
B. Pushing GPO update
C. Enabling PAP
D. Updating EDR profiles
B. Pushing GPO update
QUESTION: 156
Which of the following would be most useful in determining whether the long-term cost to
transfer a risk is less than the impact of the risk?
A. ARO
B. RTO
C. RPO
D. ALE
E. SLE
D. ALE
QUESTION: 157
In order to strengthen a password and prevent a hacker from cracking it, a random string of 36
characters was added to the password.
Which of the following best describes this technique?
A. Key stretching
B. Tokenization
C. Data masking
D. Salting
D. Salting
QUESTION: 158
A technician is deploying a new security camera.
Which of the following should the technician do?
A. Configure the correct VLAN.
B. Perform a vulnerability scan.
C. Disable unnecessary ports.
D. Conduct a site survey.
D. Conduct a site survey.
QUESTION: 159
A company is experiencing a web services outage on the public network. The services are up
and available but inaccessible. The network logs show a sudden increase in network traffic that
is causing the outage.
Which of the following attacks is the organization experiencing?
A. ARP poisoning
B. Brute force
C. Buffer overflow
D. DDoS
D. DDoS
QUESTION: 160
Which of the following threat actors is the most likely to be motivated by profit?
A. Hacktivist
B. Insider threat
C. Organized crime
D. Shadow IT
C. Organized crime
QUESTION: 161
An organization experiences a cybersecurity incident involving a command-and-control server.
Which of the following logs should be analyzed to identify the impacted host? (Choose two.)
A. Application
B. Authentication
C. DHCP
D. Network
E. Firewall
F. Database
D. Network
E. Firewall
QUESTION: 162
During a penetration test, a vendor attempts to enter an unauthorized area using an access
badge.
Which of the following types of tests does this represent?
A. Defensive
B. Passive
C. Offensive
D. Physical
D. Physical
QUESTION: 163
A systems administrator uses a key to encrypt a message being sent to a peer in a different
branch office. The peer then uses the same key to decrypt the message.
Which of the following describes this example?
A. Symmetric
B. Asymmetric
C. Hashing
D. Salting
A. Symmetric
QUESTION: 164
A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company’s
network.
Which of the following should be configured on the existing network infrastructure to best
prevent this activity?
A. Port security
B. Web application firewall
C. Transport layer security
D. Virtual private network
A. Port security
QUESTION: 165
A security administrator is reissuing a former employee’s laptop.
Which of the following is the best combination of data handling activities for the administrator to
perform? (Choose two.)
A. Data retention
B. Certification
C. Destruction
D. Classification
E. Sanitization
F. Enumeration
C. Destruction
E. Sanitization
QUESTION: 166
A systems administrator would like to deploy a change to a production system.
Which of the following must the administrator submit to demonstrate that the system can be
restored to a working state in the event of a performance issue?
A. Backout plan
B. Impact analysis
C. Test procedure
D. Approval procedure
A. Backout plan
QUESTION: 167
A company is redesigning its infrastructure and wants to reduce the number of physical servers
in use.
Which of the following architectures is best suited for this goal?
A. Serverless
B. Segmentation
C. Virtualization
D. Microservices
C. Virtualization
QUESTION: 168
A bank set up a new server that contains customers’ PII.
Which of the following should the bank use to make sure the sensitive data is not modified?
A. Full disk encryption
B. Network access control
C. File integrity monitoring
D. User behavior analytics
C. File integrity monitoring
QUESTION: 169
Users at a company are reporting they are unable to access the URL for a new retail website
because it is flagged as gambling and is being blocked.
Which of the following changes would allow users to access the site?
A. Creating a firewall rule to allow HTTPS traffic
B. Configuring the IPS to allow shopping
C. Tuning the DLP rule that detects credit card data
D. Updating the categorization in the content filter
D. Updating the categorization in the content filter
QUESTION: 170
Which of the following most impacts an administrator’s ability to address CVEs discovered on a
server?
A. Rescanning requirements
B. Patch availability
C. Organizational impact
D. Risk tolerance
B. Patch availability