wk4-other-252-301 Flashcards
QUESTION: 251
During a recent company safety stand-down, the cyber-awareness team gave a presentation on
the importance of cyber hygiene. One topic the team covered was best practices for printing
centers.
Which of the following describes an attack method that relates to printing centers?
A. Whaling
B. Credential harvesting
C. Prepending
D. Dumpster diving
D. Dumpster diving
QUESTION: 252
Which of the following considerations is the most important regarding cryptography used in an
IoT device?
A. Resource constraints
B. Available bandwidth
C. The use of block ciphers
D. The compatibility of the TLS version
A. Resource constraints
QUESTION: 253
A coffee shop owner wants to restrict internet access to only paying customers by prompting them for a receipt number.
Which of the following is the best method to use given this requirement?
A. WPA3
B. Captive portal
C. PSK
D. IEEE 802.1X
B. Captive portal
QUESTION: 254
While performing digital forensics, which of the following is considered the most volatile and
should have the contents collected first?
A. Hard drive
B. RAM
C. SSD
D. Temporary files
B. RAM
QUESTION: 255
A hosting provider needs to prove that its security controls have been in place over the last six
months and have sufficiently protected customer data.
Which of the following would provide the best proof that the hosting provider has met the
requirements?
A. NIST CSF
B. SOC 2 Type 2 report
C. CIS Top 20 compliance reports
D. Vulnerability report
B. SOC 2 Type 2 report
QUESTION: 256
A city municipality lost its primary data center when a tornado hit the facility.
Which of the following should the city staff use immediately after the disaster to handle essential
public services?
A. BCP
B. Communication plan
C. DRP
D. IRP
C. DRP
QUESTION: 258
A systems administrator notices that a testing system is down.
While investigating, the systems administrator finds that the servers are online and accessible
from any device on the server network. The administrator reviews the following information from
the monitoring system:
Which of the following is the most likely cause of the outage?
A. Denial of service
B. ARP poisoning
C. Jamming
D. Kerberoasting
A. Denial of service
QUESTION: 259
A security team has been alerted to a flood of incoming emails that have various subject lines
and are addressed to multiple email inboxes. Each email contains a URL shortener link that is
redirecting to a dead domain.
Which of the following is the best step for the security team to take?
A. Create a blocklist for all subject lines.
B. Send the dead domain to a DNS sinkhole.
C. Quarantine all emails received and notify all employees.
D. Block the URL shortener domain in the web proxy.
D. Block the URL shortener domain in the web proxy.
QUESTION: 260
A security administrator is working to secure company data on corporate laptops in case the
laptops are stolen.
Which of the following solutions should the administrator consider?
A. Disk encryption
B. Data loss prevention
C. Operating system hardening
D. Boot security
A. Disk encryption
QUESTION: 257
Which of the following is considered a preventive control?
A. Configuration auditing
B. Log correlation
C. Incident alerts
D. Segregation of duties
D. Segregation of duties
QUESTION: 261
A company needs to keep the fewest records possible, meet compliance needs, and ensure
destruction of records that are no longer needed.
Which of the following best describes the policy that meets these requirements?
A. Security policy
B. Classification policy
C. Retention policy
D. Access control policy
C. Retention policy
QUESTION: 262
Which of the following is a common source of unintentional corporate credential leakage in
cloud environments?
A. Code repositories
B. Dark web
C. Threat feeds
D. State actors
E. Vulnerability databases
A. Code repositories
QUESTION: 263
Which of the following is the best reason an organization should enforce a data classification
policy to help protect its most sensitive information?
A. End users will be required to consider the classification of data that can be used in
documents.
B. The policy will result in the creation of access levels for each level of classification.
C. The organization will have the ability to create security requirements based on classification
levels.
D. Security analysts will be able to see the classification of data within a document before
opening it.
C. The organization will have the ability to create security requirements based on classification
levels.
QUESTION: 264
An analyst is performing a vulnerability scan against the web servers exposed to the internet
without a system account.
Which of the following is most likely being performed?
A. Non-credentialed scan
B. Packet capture
C. Privilege escalation
D. System enumeration
E. Passive scan
A. Non-credentialed scan
QUESTION: 265
A security administrator is hardening corporate systems and applying appropriate mitigations by
consulting a real-world knowledge base for adversary behavior.
Which of the following would be best for the administrator to reference?
A. MITRE ATT&CK
B. CSIRT
C. CVSS
D. SOAR
A. MITRE ATT&CK
QUESTION: 266
An architect has a request to increase the speed of data transfer using JSON requests
externally. Currently, the organization uses SFTP to transfer data files.
Which of the following will most likely meet the requirements?
A. A website-hosted solution
B. Cloud shared storage
C. A secure email solution
D. Microservices using API
D. Microservices using API
QUESTION: 267
Which of the following addresses individual rights such as the right to be informed, the right of
access, and the right to be forgotten?
A. GDPR
B. PCI DSS
C. NIST
D. ISO
A. GDPR
QUESTION: 268
An administrator is installing an LDAP browser tool in order to view objects in the corporate
LDAP directory. Secure connections to the LDAP server are required.
When the browser connects to the server, certificate errors are being displayed, and then the
connection is terminated.
Which of the following is the most likely solution?
A. The administrator should allow SAN certificates in the browser configuration.
B. The administrator needs to install the server certificate into the local truststore.
C. The administrator should request that the secure LDAP port be opened to the server.
D. The administrator needs to increase the TLS version on the organization’s RA.
B. The administrator needs to install the server certificate into the local truststore.
QUESTION: 269
Which of the following is the most important security concern when using legacy systems to
provide production service?
A. Instability
B. Lack of vendor support
C. Loss of availability
D. Use of insecure protocols
B. Lack of vendor support
QUESTION: 270
A security investigation revealed that malicious software was installed on a server using a
server administrator’s credentials. During the investigation, the server administrator explained
that Telnet was regularly used to log in.
Which of the following most likely occurred?
A. A spraying attack was used to determine which credentials to use.
B. A packet capture tool was used to steal the password.
C. A remote-access Trojan was used to install the malware.
D. A dictionary attack was used to log in as the server administrator.
B. A packet capture tool was used to steal the password.
QUESTION: 271
A user is requesting Telnet access to manage a remote development web server. Insecure
protocols are not allowed for use within any environment.
Which of the following should be configured to allow remote access to this server?
A. HTTPS
B. SNMPv3
C. SSH
D. RDP
E. SMTP
C. SSH
QUESTION: 272
A security administrator is working to find a cost-effective solution to implement certificates for a
large number of domains and subdomains owned by the company.
Which of the following types of certificates should the administrator implement?
A. Wildcard
B. Client certificate
C. Self-signed
D. Code signing
A. Wildcard