Uploaded by Mphatso Mwale

questions

advertisement
724. A security team has been alerted to a flood of incoming emails that have various
subject lines and are addressed to multiple email inboxes. Each email contains a URL
shortener link that is redirecting to a dead domain. Which of the following is the best
step for the security team to take?




A. Create a blocklist for all subject lines.
B. Send the dead domain to a DNS sinkhole. Most Voted
C. Quarantine all emails received and notify all employees.
D. Block the URL shortener domain in the web proxy.
726. A data administrator is configuring authentication for a SaaS application and would
like to reduce the number of credentials employees need to maintain. The company
prefers to use domain credentials to access new SaaS applications. Which of the
following methods would allow this functionality?




A. SSO
B. LEAP
C. MFA
D. PEAP
Most voted A
728. Which of the following would be best suited for constantly changing environments?




A. RTOS
B. Containers Most Voted
C. Embedded systems
D. SCAD
729. A newly identified network access vulnerability has been found in the OS of legacy
IoT devices. Which of the following would best mitigate this vulnerability quickly?




A. Insurance
B. Patching
C. Segmentation Most Voted
D. Replacement
730. The local administrator account for a company’s VPN appliance was unexpectedly
used to log in to the remote management interface. Which of the following would have
prevented this from happening?


A. Using least privilege
B. Changing the default password


C. Assigning individual user IDs
D. Implementing multifactor authentication Most Voted
731. SIMULATION You are a security administrator investigating a potential infection on a
network.
INSTRUCTIONS
Click on each host and firewall. Review all logs to determine which host originated the infection and
then identify if each remaining host is clean or infected.
732. Which of the following describes the exploitation of an interactive process to gain
access to restricted areas?




A. Persistence
B. Port scanning
C. Privilege escalation
D. Pharming
MOST voted c
733. SIMULATION
A company recently added a DR site and is redesigning the network. Users at the DR site are
having issues browsing websites.
INSTRUCTIONS
Click on each firewall to do the following:
1. Deny cleartext web traffic.
2. Ensure secure management protocols are used.
3. Resolve issues at the DR site.
The ruleset order cannot be modified due to outside constraints.
734. DRAG DROP
A data owner has been tasked with assigning proper data classifications and destruction methods
for various types of data contained within the environment.
735. A security analyst is assessing several company firewalls. Which of the following
tools would the analyst most likely use to generate custom packets to use during the
assessment?




A. hping Most Voted
B. Wireshark
C. PowerShell
D. netstat
736. A local business was the source of multiple instances of credit card theft.
Investigators found that most payments at this business were made at self-service
kiosks. Which of the following is the most likely cause of the exposed credit card
Information?





A. Insider threat
B. RAT
C. Backdoor
D. Skimming
E. NFC attack
Most voted D
737. An employee recently resigned from a company. The employee was responsible
for managing and supporting weekly batch jobs over the past five years. A few weeks
after the employee resigned, one of the batch jobs failed and caused a major disruption.
Which of the following would work best to prevent this type of incident from reoccurring?




A. Job rotation Most Voted
B. Retention
C. Outsourcing
D. Separation of duties
738. Following a recent security breach, an analyst discovered that user permissions
were added when joining another part of the organization but were not removed from
existing groups. Which of the following policies would help to correct these issues in the
future?




A. Service accounts
B. Account audits most voted
C. Password complexity
D. Lockout policy
739. Which of the following ensures an organization can continue to do business with
minimal interruption in the event of a major disaster?




A. Business recovery plan
B. Incident response plan
C. Communication plan
D. Continuity of operations plan most voted
740. In a rush to meet an end-of-year business goal, the IT department was told to
implement a new business application. The security engineer reviews the attributes of
the application and decides the time needed to perform due diligence is insufficient from
a cybersecurity perspective. Which of the following BEST describes the security
engineer's response?




A. Risk tolerance
B. Risk acceptance Most Voted
C. Risk importance
D. Risk appetite
742. A company wants to reconfigure an existing wireless infrastructure. The company
needs to ensure the projected WAP placement will provide proper signal strength to all
workstations. Which of the following should the company use to best fulfill the
requirements?




A. Network diagram
B. WPS
C. 802.1X
D. Heat map most voted
743. DRAG DROP
A data owner has been tasked with assigning proper data classifications and destruction
methods for various types of data contained within the environment.
745. An enterprise has hired an outside security firm to conduct penetration testing on
its network and applications. The firm has been given all the developer’s documentation
about the internal architecture. Which of the following best represents the type of testing
that will occur?



A. Bug bounty
B. White-box
C. Black-box

D. Gray-box
746. Which of the following are the most likely vectors for the unauthorized or
unintentional inclusion of vulnerable code in a software company’s final software
releases? (Choose two).






A. Certificate mismatch
B. Use of penetration-testing utilities
C. Weak passwords
D. Included third-party libraries Most Voted
E. Vendors/supply chain Most Voted
F. Outdated anti-malware software
747. A hosting provider needs to prove that its security controls have been in place over
the last six months and have sufficiently protected customer data. Which of the following
would provide the best proof that the hosting provider has met the requirements?




A. NIST CSF
B. SOC 2 Type 2 report
C. CIS Top 20 compliance reports
D. Vulnerability report
748. Which of the following are common VoIP-associated vulnerabilities? (Choose two).






A. SPIM
B. Vishing
C. VLAN hopping
D. Phishing
E. DHCP snooping
F. Tailgating
749. A security administrator received an alert for a user account with the following log activity:
Which of the following best describes the trigger for the alert the administrator received?




A. Number of failed log-in attempts
B. Geolocation
C. Impossible travel time Most Voted
D. Time-based log-in attempt
750. Which of the following is a reason why a forensic specialist would create a plan to
preserve data after an incident and prioritize the sequence for performing forensic
analysis?




A. Order of volatility Most Voted
B. Preservation of event logs
C. Chain of custody
D. Compliance with legal hold
751. In which of the following scenarios is tokenization the best privacy technique to
use?


A. Providing pseudo-anonymization for social media user accounts
B. Serving as a second factor for authentication requests


C. Enabling established customers to safely store credit card information Most Voted
D. Masking personal information inside databases by segmenting data
752. A company develops a complex platform that is composed of a single application.
After several issues with upgrades, the systems administrator recommends breaking
down the application into unique, independent modules. Which of the following best
identifies the systems administrator's recommendation?




A. Virtualization
B. Serverless
C. Microservices Most Voted
D. API gateway
753. A systems administrator is auditing all company servers to ensure they meet the
minimum security baseline. While auditing a Linux server, the systems administrator
observes the /etc/shadow file has permissions beyond the baseline recommendation.
Which of the following commands should the systems administrator use to resolve this
issue?




A. chmod
B. grep
C. dd
D. password
754. A security team received the following requirements for a new BYOD program that
will allow employees to use personal smartphones to access business email:
• Sensitive customer data must be safeguarded.
• Documents from managed sources should not be opened in unmanaged destinations.
• Sharing of managed documents must be disabled.
• Employees should not be able to download emailed images to their devices.
• Personal photos and contact lists must be kept private.
• IT must be able to remove data from lost/stolen devices or when an employee no
longer works for the company.
Which of the following are the best features to enable to meet these requirements?
(Choose two.)






A. Remote wipe
B. VPN connection
C. Biometric authentication
D. Device location tracking
E. Geofencing
F. Application approve list

G. Containerization
755. Which of the following security controls can be used to prevent multiple people
from using a unique card swipe and being admitted to a secure entrance?




A. Visitor logs
B. Faraday cages
C. Access control vestibules Most Voted
D. Motion detection sensors
756. Which of the following cryptographic concepts would a security engineer utilize
while implementing non-repudiation? (Choose two.)






A. Block cipher
B. Hashing
C. Private key
D. Perfect forward secrecy
E. Salting
F. Symmetric keys
757. alrdy
Download