front 1 Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable - logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the internet via a web interface?(PICK 2) | back 1 SQL injection Server-side request forgery |
front 2 A small business just recovered from a ransomware attack its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should thew IT administrator do FIRST after recovery? | back 2 Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis |
front 3 An attack is attempting to exploit users by creating a fake website with the URL www.validwebsite.com. The attacker's intent is to imitate the look and fell of a legitimate website to obtain personal information for unsuspecting users. Which of the following social-engineering attacks does this describe? | back 3 Pharming |
front 4 Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers? | back 4 Red Team |
front 5 To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would BEST meet the needs of the organization? | back 5 SaaS |
front 6 A security engineer at an offline government facility is concerned about the validity of an SSL certificate. The engineer wants to perform the fastest check with the least delay to determine if the certificate has been revoked. Which of the following would BEST these requirement? | back 6 OCSP |
front 7 A security analyst needs to complete an assessment. The analyst is logged into a server and must use native tools map services running on it to the server's listening ports. Which of the following tools can BEST accomplish this talk? | back 7 Netstat |
front 8 On which of the following is the live acquisition of data for forensic analysis MOST dependent? (PICK 2) | back 8 Value and Volatility of data Right-to-audit clauses |
front 9 An organization's Chief Security Officer (CSO) wants to validate the business's involvement in the incident response plan to ensure its validity and thoroughness. Which of the following will the CSO MOST likely use? | back 9 A tabletop exercise |
front 10 During a routine scan of a wireless segment at a retail company, a security administrator discovers several devices are connected to the network that do not match the company's naming convention and are not the asset inventory. WiFi access is protected with 255-Wt encryption visa WPA2. Physical access to the company's facility requires two-factor authentication using a badge and passcode. Which of the following should the administrator implement to find and remediate the issue? (PICK 2) | back 10 Enable MAC filtering on thew switches that support the wireless network Scan the wireless network for rogue access points |
front 11 Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors? | back 11 GDPR |
front 12 An organization routes all of its traffic through a VPN. Most users are remote and connect into a corporate datacenter that houses confidential information. There is a firewall at the internet border followed by a DIP appliance, the VPN server and the datacenter itself. Which of the following is the WEAKEST design element? | back 12 Encrypted VPN traffic will not be inspected when entering or leaving the network |
front 13 Joe, an employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm Joe's identity before sending him the prize Which of the following BEST describes this type of email? | back 13 Phishing |
front 14 A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area. Which of the following would MOST likely have prevented this breach? | back 14 A USB data blocker |
front 15 A security analyst discovers several .jpg photos from a cellular phone during a forensics investigation involving a compromised system. The analyst runs a forensics tool to gather file metadate . Which of the following would be part of the images if all the metadata is still intact? | back 15 The GPS Location |
front 16 A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plan text. Which of the following would mitigate the damage done by this type of data exfiltration in the future? | back 16 Implement salting and hashing |
front 17 Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement? | back 17 A MOU |
front 18 A RAT that was used to compromise an organization's banking credentials was found on a user's computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management toolset. Which of the following recommendations would BEST prevent this from reoccurring? | back 18 Enforce application whitelisting |
front 19 Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log in to any thin client located throughout the building and see the same desktop each time. Which of the following technologies are being utilized to provide these capabilities? (PICK 2) | back 19 VDI RFID |
front 20 A malicious actor recently penetration a company's network and moved laterally the the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server. Which of the following files should be given to the forensics firm? | back 20 Dump |
front 21 A security administrator currently spends a large amount of time on common security tasks, such as report generation, phishing investigations, and user provisioning and deprovisioning. This prevents the administrator from spending time on other security projects. The business DOES NOT have the budget to add more staff members. Which of the following should administrator implement? | back 21 SOAR |
front 22 A security analyst needs to be proactive in understand the types of attacks that could potentially target the company's execute. Which of the following intelligence sources should security analyst review? | back 22 Industry information-sharing and collabortation groups |
front 23 Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (PICK 2) | back 23 Mandatory Vacation Job Rotation |
front 24 N/A | back 24 N/A |
front 25 A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should the engineer do to determine the issue? (PICK 2) | back 25 Perform a site survey Create a heat map |
front 26 Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts? | back 26 EDR |
front 27 A user recently attended an exposition and received some digital promotional materials. The user later noticed blue boxes popping up and disapppearing on the computer, and reported receiving several spam emails. Which the user DID NOT open. Which of the following is MOST likely the cause of the reported issuse? | back 27 There was malicious code on the USB drive |
front 28 A company. Is upgrading It's Wireless infrastructure. To WPA2. - Enterprise Using. Eap-tls. Which of the following? Must be part of the security architecture, to achieve a AAA. | back 28 Radius |
front 29 A company Recently experienced an attack in which a malicious actor was able to exfiltrate data by cracking stolen passwords using a rainbow table, the sensitive data. Which of the following should be? Secretly engineered to do. Prevent such an attack in the future. Question mark. | back 29 Implement password salting |
front 30 A vulnerability assessment report will include the CVS s score of the discovered vulnerabilities because the score allows the organization to better. | back 30 Prioritize remediation of vulnerabilities based on the possible impact. |
front 31 Information officer CIO is meeting with the Chief Information, Security Officer ciso to plan some activities, to enhance the skill levels of the company's developers, which of the following would be most suitable for training the Developers. | back 31 Role Based Security Awareness training |
front 32 A database administrator needs to ensure all passwords or stored in a secure manner. So the administrator adds remotely generated data to each password before string. | back 32 Role Based Security Awareness Training |
front 33 A pharmaceutical sales representative logs on to a laptop and connects to the public Wi-Fi to check emails and update reports, which of the following would be the best to prevent other devices on the network from directly accessing the laptop. | back 33 a host-based firewall a DPL solution |
front 34 Which of the following control sets should a well-written BCP include? | back 34 Preventive Corrective Recovery |
front 35 A Smart Switch has the ability to monitor electrical levels and shut off power to a building in the event of a power, surge or other fault situation. A switch was installed on a wired Network. In a hospital and is monitored by the facilities Department via a cloud application. The Security administrator isolated, the switch on a separate VLAN and set up a patch routine, which of the following steps would also be taken to harden the Smart Switch. | back 35 Change the default password for the switch |
front 36 A company recently, moved sensitive videos between on premises company own websites. The company had then learned. The videos have been uploaded and shared on the internet, which of the following. Would most likely allow the company to find the cause. | back 36 A log analysis |
front 37 In which of the following common use cases would stenography be employed? | back 37 Obfuscation |
front 38 And end user reports that computer has been acting slower than normal for a few days during an investigation and analysts determines. The system is sending the users email address and a 10-digit number to an IP address. Once a day. The only recent log entry regarding the computers, is the following | back 38 The end user purchased and installed a PUP from a web browser |
front 39 A cyber security department purchased a new Pam solution. The team is planning to randomize the service account credentials of the Windows Server first, which of the following would be the best method to increase the security of the Linux server. | back 39 Use SSH keys and remove generic passwords |
front 40 Phishing and spear phishing attacks, have been occurring more frequently against a company staff, which of the following would most likely help mitigate the issue. | back 40 DNSSEC and DMARC |
front 41 An organization wants to implement a third factor to an existing multi-factor authentication. The organization already uses a smart card and password which of the following would meet the organization's needs for the third Factor. | back 41 Fingerprints |
front 42 Which of the following will most likely cause machine learning and AI enabled systems to operate with unintended consequences? | back 42 data bias |
front 43 A manufacturer creates design for very high security products that are required to be protected, and controlled, by the government regulations. These designs are not accessible by corporate networks, or the internet, which of the following would be the best solution to protect these designs. | back 43 An air gap |
front 44 A security auditor is reviewing vulnerability scan data provided by an internal security team, which of the following best indicates the valid credentials were used. | back 44 The scan enumerated software versions of the installed programs. |
front 45 After a ransomware attack a forensics company needs to review. A cryptocurrency transaction between the victim and the attacker, which of the following will the company most likely review to trace this transaction. | back 45 The public ledger |
front 46 A chief security officer. CSO is concerned about the amount of pii that is stored locally on each salesperson. Slap top. The salesperson has a higher than average rate of lost equipment. Which of the following recommendations would best address the cso's concern. | back 46 A CASB |
front 47 A security analyst is reviewing the output of a web server login notices, that particular account, is attempting to transfer large amounts of money, which of the following types of attacks is most likely being conducted. | back 47 Session relay |
front 48 A network technician, is installing a guest wireless network at a coffee shop. When a customer purchases an item, the password for the wireless network is printed on the recent. So the customer can login, which of the following will. The technician most likely configured to provide the highest level of security at that least amount of overhead. | back 48 WPA-PSK |
front 49 When used at the design stage, which of the following improves, the efficiency, accuracy, and speed of a database? | back 49 Normalization |
front 50 Employees are having issues, accessing the company's website, some employees report, very slow performance. While others cannot the website at all, the web and Security administrator search, the logs and find millions of okay, half open connections to Port, 443 on the web server, future analysis, reveals, thousands of different Source, IPS initiating the traffic. Which of the following attacks is the most likely occurred? | back 50 DDoS |
front 51 A company. He has decided to move its operation to the cloud. It wants to utilize technology that will prevent users from downloading Company applications for personal use to restrict data that is uploaded and have visibility and it which applications are being used across the company, which of the following Solutions will best meet these requirements. | back 51 A CASB |
front 52 A company has determined that if it's computer-based, manufacturing is not functional for 12 hours consecutively, it will lose more money than it costs to maintain the equipment, which of the following must be less than 12 hours to maintain a positive total cost of ownership. | back 52 RTO |
front 53 Which of the following environments, minimizes end-user disruption, and is most likely to be used to access the impacts of any database migrations or major system changes by using the final version of the code. | back 53 Staging |
front 54 Which of the following ISO standards is certified for privacy. | back 54 ISO 27701 |
front 55 A network administrator needs to build out a new data center with the focus on resilience and uptime, which of the following would be best meet this objective. | back 55 Dual Power Supply NIC Teaming |
front 56 An organization has implemented a policy, requiring. The use of conductive metal lock boxes for personal electronic devices outside of the secure research lab, which of the following did, the organization determined to be the greatest risk to intellectual property when creating this policy. | back 56 Data exfiltration over a mobile hotspot |
front 57 A company recently, transitioned to a strict BYOD culture due to the cost of replacing lost or damaged corporate. Vices which of the following Technologies would be best to balance the BYOD culture while also protecting the company's data. | back 57 Containerization |
front 58 Several employees return to work the day after attending an industry trade show that same day, the security manager. Notices several mayor Weller alerts coming from each of the employees work stations. This security manager, investigates, but finds no sign of an attack on the perimeter, firewall, or the nids, which of the following is most likely causing the malware or alerts. | back 58 A USB flash drive that is trying to run malicious code but is being blocked by the host firewall |
front 59 The it departments on-site developer has been with the team for many years. Each time. An application is released. The security team is able to identify the multiple vulnerabilities, which of the following would best help. The team ensure. The application is ready to be released to production. | back 59 Submit the application to QA before releasing it |
front 60 A security analyst needs to implement an MDM solution for BYOD users. That will allow the company to retain control over company emails, residing on the device and limit data exfiltration that might occur. If the devices are lost or stolen, which of the following would best meet the requirements. | back 60 Full-device encryption Containerization |
front 61 A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB Network protocol to reply to rapidly, infect computers Once infected computers are encrypted and held at Ransom, which of the following would be the best prevent this attack from reoccurring. | back 61 Configure the perimeter, firewall to deny inbound, external connections to SMB ports. |
front 62 A system administrator needs to implement an access control scheme that will allow and objectives. Access policy to be determined by its owner, which of the following Access Control scheme. Best fits the requirements. | back 62 Discretionary access control |
front 63 An information security incident, recently occurred at an organization and the organization was required to report the incident to authorities and notify the affected parties. When the organization's customers became aware of the incident, some reduced, their orders are stopped, placing orders and entirely, which of the following is the organization experiencing. | back 63 Reputation Damage |
front 64 A security engineer needs to implement an MDM solution that companies with the corporate mobile device policy. The policy states that in order for mobile users to access corporate resources on their devices. The following requirements must be met mobile devices. OS. Must be patched up to the latest release, the screen, lock must be enabled, passcode or biometric corporate data, must be removed if the device is reported lost or stolen, which of the following. Trolls should the security engineer configure? | back 64 Remote Wipe Full-Device encryption |
front 65 The IT department at a university is concerned about the professor's, placing servers on the University Network, in an attempt to bypass, security controls, which of the following best represents this type of threat | back 65 Shadow IT |
front 66 An organization is concerned that it's hosted, web services are not running. The most updated version of the software, which of the following would be the best to help identify potential vulnerabilities. | back 66 nmap comptia.org -p 80- sV |
front 67 An attacker is trying to gain access by installing malware on a website. That is known to be visited by the Target victims. Which of the following is the attacker, most likely attempting. | back 67 A waterhole-hole attack (Pharming) |
front 68 A critical for our server is being upgraded in the system administrator must determine which RAID level. The new server will need to achieve. parity and handle to simulation disk failures, which of the following delayed raid levels meets this requirement. | back 68 RAID 6 |
front 69 Following a prolonged data center outage that affected web-based sales at company, has decided to move its operations to a private Cloud Solutions. A security team has received the following requirements. There must be visible in to how teams are using cloud-based Services. The company must be able to identify when data related to credit card payments. As being sent to the cloud data must be available. Regardless of the end-users geographical location. Administrators need a simple pane of glass. You Into the traffic and Trends which of the following should the security analysts recommend. | back 69 Implement a CASB solution |
front 70 Which of the following would most likely support the Integrity of a voting machine? | back 70 Blockchain |
front 71 An auditor is performing an assessment of a security, Appliance with an embedded OS. That was vulnerable during the last two assessments, which of the following best explains the appliances vulnerable state? | back 71 The vendor has not supplied a patch for the appliance. |
front 72 A company wants to deploy pki on the internet facing website. The application that are currently deployed are www.company.com.Contact us.company.com quotes.company.com., The company wants to purchase one. SSL certificate that will work with all existing applications in any future applications that follow the same naming conventions, such as store company.com, which of the following certificates would be best to meet these requirements. | back 72 Wildcard |
front 73 A cyber security analyst reviews, the log files from a web server and sees that a series of files, that indicate a directory transversal attack has occurred, which of the following is the analysts most likely seeing | back 73 http://sample.url.com/someotherpageonthesite/../../../etc/shadow |
front 74 A security analyst needs to determine how an attacker was able to use user 3 to gain a foothold within the company's Network. The company's lockout policy requires that an account. We locked out for a minimum of 15 minutes. After three unsuccessful attempts are reviewing the log files analysts, discovered the following. | back 74 Brute-force |
front 75 A security analyst is logged into a Windows file server. Needs to see who is accessing the files from, which computers, which of the following tools should be analysts use. | back 75 netstat |
front 76 A chief security officer cso's key priorities are to improve preparation response and Recovery practices to minimize system downtime and to enhance organizational resilience to ransomware attacks, which of the following would best meet the cso's objectives. | back 76 Implement application, whitelisting and centralized event. Log management of perform regular testing and validation of full backups. |
front 77 A security manager for retailer needs to reduce the scope of a project to comply with PCI DSS. The PCI Data is located in a different office than where the credit cards are accepted. All the offices are connected via mpls back to the primary data center, which of the following should the security manager Implement to achieve this objective. | back 77 Segmentation |
front 78 Which of the following describes the best approach for deploying application, patches? | back 78 Apply the patches to the system in a testing environment, then two systems, and a staging environment. And then finally, to production systems. |
front 79 A small company that does not have security staff wants to improve its security posture, which of the following would be the best to assist the company. | back 79 MSSP |
front 80 Which of the following best explains the difference between a data owner and a data custodian? | back 80 The data owner is responsible for determining how much the data must be used, while the data custodian is responsible for implementing the protection of the data. |
front 81 Which of the following provides the best protection for sensitive information and data stored in Cloud Based Services, but still allows for full functionality and searchability of data within the cloud-based services. | back 81 Data encryption |
front 82 Which of the following incident response steps, involves the action to protect critical systems while maintaining business operations? | back 82 Containment |
front 83 A chief information security officer. Ciso is The organization's ability to contain business operations in the event of a prolonged DDOS attack. On the local data center that consumes data resources, which of the following will the ciso most likely recommend to mitigate the risk. | back 83 Implement a hot-site failover location |
front 84 A company is implementing MFA to all applications that store sensitive data, the it manager wants MFA to be non-disruptive and user-friendly, which of the following technology should the it manager use when implementing MFA. | back 84 Push Notifications |
front 85 Which of the following best explains. The reason why server administrator would place a document named password.txt on a desktop of an administrator account on a server? | back 85 The document is a honeyfile and is meant to attract the attention of a cyber intruder. |
front 86 A security analyst receives an SIEM alert that someone logged in to the admin app, test account, which is only used for early detection of attacks the security analysts then reviews The Following application log. Which of the following can the security analysts conclude? | back 86 And injection attack is being conducted against the user authentication system. |
front 87 A security assessment determines DES and 3DES is that still being used on recently deployed production servers? Which of the following did the assessment identify? | back 87 Weak Encryption |
front 88 A security assessment determines DS and 3DS is that still being used on recently deployed production servers? Which of the following did the assessment identify? | back 88 Whaling |
front 89 A security analyst needs to poor form. A periodic vulnerability scans on production systems, which of the following scan types would best produce the vulnerability scan report. | back 89 Credentialed |
front 90 A security modem may have occurred on a desktop PC of an organization's chief executive officer CEO. A duplicate copy. This easel hard drive must be stored securely to ensure appropriate forensics processes in the chain of custody are followed, which of the following should be performed to accomplish this task. | back 90 Connect a write blocker to the hard drive. Then leveraging a forensic workstation utilize the DD command on a live LINUX environment to create a duplicate copy. |
front 91 A security analyst is looking for a solution to help communicate to the leadership team. The severity levels of the organization's former abilities, which of the following would best meet this need. | back 91 CVSS |
front 92 An organization concerned that is hosted, web servers are not running with the most updated version of the software, which of the following would best to help identify potential vulnerabilities. | back 92 nmap comptia.org -p 80 -sV |
front 93 An organization has been experiencing outage during holiday sales and needs to ensure availability of its point to cell system. The it administrator has been asked to improve both server-side data fault, tolerance and the site's availability under high consumer load, which of the following best options to accomplish this objective. | back 93 load balancing RAID |
front 94 A security analyst is investigating an incident. That was first reported to an issue, concerning to network shares and the internet. While reviewing logs and Tool output the analyst sees the following. Which of the following attacks has occurred? | back 94 ARP poisoning |
front 95 The sea sirt is reviewing the lessons. Learned from the recent incident. A worm was able to spread unhindered through the network and infected a large number of computers and servers, which of the following would be the best recommendation to mitigate the impacts of a similar incident in the future. | back 95 Segment, the network with firewalls. |
front 96 A security administrators suspect that there may be unnecessary Services running on the server, which of the following tools would the administrator most likely used to confirm the suspicions | back 96 nmap |
front 97 A recent audit uncovered, a key finding regarding the use of a specific encryption standard in a web application. That is used to communicate with business customers due to technical limitations of its customers. The company is unable to upgrade the encryption standard, which of the following types of controls should be reduced the risk created by the scenario. | back 97 Compensating |
front 98 A retail executive recently, accepted a job with a major competitor the following week. A security analyst reviews the security logs and identify successful. Login attempts to access the Departed Executives account, which of the following security practices would have addressed this issue. | back 98 Offboarding |
front 99 Which of the following job. Roles would sponsor data quality and data entry initiatives, that ensure business and regulatory requirements are met | back 99 The data Steward |
front 100 Which of the following controls is a turnstile | back 100 physical |
front 101 After Consulting with the chief risk, officer CRO a manager decides to acquire cyber security insurance for the company, which of the Risk management. Strategies is the manager adopting. | back 101 Risk transference |
front 102 A nuclear plant was the victim of a recent attack in all of the networks were air-gaped. A subsequent investigation reveals a worm as the source of the issue. What is the best explanation for what happened? | back 102 A malicious USB was introduced by an unsuspecting employee. |
front 103 N/A | back 103 N/A |
front 104 And organization has hired a security analyst to perform a penetration test. The analyst captures one gig worth of inbound, Network traffic to the server and transfers, the pcap back to the machine for analysis, which of the following tools, should the analyst use to Future review the pcap. | back 104 Wireshark |
front 105 A Security Administrative text, the table of a network switch, which shows the following output which of the following is happening to the switch. | back 105 MAC Flooding |
front 106 The process of passively gathering information prior to launching a Cyber attack is called. | back 106 Reconnaissance. |
front 107 A company is launching a new internet platform for its clients. The company does not want to implement its own authorization solution. But instead wants to rely on the authorization provided by another platform, which of the following is the best approach to implement the desired solution. | back 107 Oauth |
front 108 A user recent sent an SMS on a mobile phone, that asked for bank transfer, which of the following social engineering techniques was used. In this case. | back 108 Smishing |
front 109 Which of the following algorithms has the smallest key Size? | back 109 DES |
front 110 An attacker has successfully exfiltrated, several non salted, password, hashes from an online system, which of the following describes, the type of password attack dis attackers performing. | back 110 Brute Force |
front 111 A security engineer needs to implement the following requirements. All layer 2 switches should average active directory for authentication, all layer 2. Switches should have local fallback authentication. If active, directories offline. All layer 2 switches are not the same and are manufactured by different vendors, which of the following actions, should the engineer take to meet these requirements. | back 111 Implement RADIUS Configure AAA on the switch with local login as secondary |
front 112 A startup company is using multiple SaaS and IaaS platforms, to stand up at corporate infrastructure and build out a customer facing web application. Which of the following solutions would be the best to provide security manageability and visibility into these platforms. | back 112 CASB |
front 113 A user is concerned that the web application will not be able to handle unexpected or random inputs without crashing, which of the following best describes, the type of testing the users should perform. | back 113 fuzzing |
front 114 A company recently set up an e-commerce portal to sell its product online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard, which of the following standards must accompany complying with before accepting credit cards on its e-commerce platform. | back 114 PCI DSS |
front 115 A Security administrator needs to create a RAID configuration that is focused on high speeds and fault tolerance. It is unlikely, the multiple drives will fail simultaneously, which of the following raid configurations? Should the administrator use? | back 115 RAID 5 |
front 116 A cyber security analyst needs to implement secure authentication to third-party websites without users passwords, which of the following would be the best way to achieve this objective. | back 116 SAML |
front 117 Which of the following allows for functional test data to be used in a new system for testing and training purposes to protect the read data? | back 117 Data Masking |
front 118 Which of the following Cloud models. Provide clients with server storage and networks, but nothing else? | back 118 IaaS |
front 119 A small retail business that has a local store and newly established and growing online. Storefront a recent storm caused a power outage to the business and local ISP resulting in several hours worth of lost sales and delayed order processing. The business owner, now needs to ensure two things protection from Power surges. Always available connectivity. In case of an outage, the owner has decided to implement battery backups for the computer equipment, which of the following Would best fulfill the owners secondary needs. | back 119 Purchase services from a cloud provider for high availability. |
front 120 An organization needs to implement more, stringent controls over administrator, /root credentials, and service accounts. Requirements for the project include check-in/check-out of credentials, the ability to use, but not know the password, automated password changes. Logging of access to credentials which of the following solutions would meet these requirements. | back 120 A privileged access management system |
front 121 A security analyst is hardening a Linux workstation. No must ensure. It has public Keys forwarded to remote systems for secured login, which of the following steps with the analysts perform to meet these requirements. | back 121 Forward the keys using ssh-copy-id Forward the keys using scp |
front 122 Which of the following will provide the best physical security countermeasures to stop Intruders? | back 122 Mantraps Fencing |
front 123 The manager is responsible for a data set has asked a security engineer to apply encryption to the hard disk. The security engineer and an example of | back 123 data processor |
front 124 In organizations, help desk is flooded with phone calls from user stating that they can no longer access certain websites. The helpdesk escalates the issue to the security team as these websites are accessible to previous day. The security analyst run the following command ipconfig /flushdns, but the issue persist. Finally, the NSA analyst changes. The DNS server for an impacted machine in the issue goes away, which of the following attacks is Most likely occurred on the original DNS server. | back 124 DNS cache posioning |
front 125 An attacker is attempting to exploit users by creating a fake website, and redirecting users, which of the following social engineering attacks. Does this describe? | back 125 Pharming |
front 126 Well-known organization has been experiencing attacks from API's. The organization is concerned. The custom malware is being created and emailed into the company or installed on a USB sticks that are dropped in parking lots, which of the following is the best defense to test the Newfound software. | back 126 Implementing application execution, in the sandbox for unknown software. |
front 127 After reading a security bulletins and network security managers concerned that a malicious actor, may have breached the network using the same software flaw. The exploit code is publicly available and it has been reported as being used against other Industries in the same vertical which of the following should the network security manager. Consult first to determine the priority list of the forensic review. | back 127 The vulnerability scan output |
front 128 A security analyst receives the configuration of her current VPN profile and notices. The authentication is only applied to IP diagram portion of the packet, which of the following should the analysis Implement to authenticate the entire packet. | back 128 AH |
front 129 The facility's supervisor for government agency is concerned about the author unauthorized access to environment systems in the event of a staff. Wi-Fi network is breached. Which of the following would best address the security concern. | back 129 Segment the staff Wi-Fi network from the environmental systems Network. |
front 130 A startup company is using multiple SaaS, and IaaS platforms to stand up a corporate infrastructure and build out a new customer facing web application, which of the following solutions would best to provide security, manageability and visibility onto the platforms. | back 130 CASB |
front 131 A security analyst needs to make a recommendation for restricting access to certain segments of a network using only data link layer security, which of the following controls will be the analyst, most likely recommended. | back 131 MAC |
front 132 A network administrator or like you to configure a site-to-site, VPN you utilizing ipsec. The administrator wants the tunnel to be established with data Integrity encryption authentication and anti relay functions, which of the following should the administrator use when configuring the VPN? | back 132 ESP |
front 133 N/A | back 133 N/A |
front 134 A network engineer is troubleshooting, wireless network connectivity issues that were reported by users. The issues are occurring only in sections of the building. That is closest to the parking lot users are immediately experiencing slow speeds when accessing websites and are unable to connect to network drives. The user appears to increase when the laptop uses return desk, after using their devices in an area of the building. There are also reports of users being required to enter credentials on to Pages. Order to gain access to them, which of the following is the most likely cause of the issue. | back 134 An external access point is engaging an evil twin attack. |
front 135 Joe a user at a company, clicked on an email link led to a website that infected his workstation Joe was connected to the network and the virus spread to the network shares to protective measures failed to stop the virus and it was has contained to evade detection, which of the following should the administrator Implement protect the environment from malware. | back 135 Implement a heuristic Behavior, detection solution. |
front 136 The following is Administrative control, that would be most effective to reduce the occurrence of malware execution. | back 136 Security Awareness Training |
front 137 A cyber security. Manager, has scheduled biannual meetings with the IT team and the department leaders discuss, how they would respond to hypothetical cyber attacks during these meetings, the manager plans, a scenario and injects additional information through the session to replicate what might occur in a dynamic cybersecurity event involving the company. Its facilities its data and its staff which of the following describes, what the manager is doing. | back 137 Conducting a tabletop exersise |
front 138 A financial organization has adopted a new secure encrypted document sharing application to help its customers. Loan process has some important PII needs to be shared across the new platform, but it is blocked by the DPL system, which of the following actions will best allow the PII to be shared with the secured application without compromising the organization security posture. | back 138 Configure the DPL policies to whitelist this application with the specific PII |
front 139 An analyst needs to identify the applications, a user is running and the files that they were open before. The computer users computer will shut off by holding down the power button, which of the following would most likely contain that information. | back 139 Pagefile |
front 140 A security analyst is configuring a large number of new company, issued laptops, the analysts received the following requirements. The devices will be used, internally by staff, who travel extensively occasional personal use is acceptable due to the travel requirements. Users must be able to install and configure sanctioned programs and productivity suites. The devices must be encrypted. The devices must be capable of operating and low bandwidth Pro environments. Which of the following would be provide the greatest benefit to the security posture of the devices? | back 140 Implementing application whitelisting |
front 141 A user recently entered a username and password into a recruiting application website that has been formed to look like the legitimate site upon investigation, a security analyst the identities the following. The legitimate websites IP address is 10.1.1.20, Andy recruit locally resolves to the IP, the forged websites IP address appears to be 10.2.12 99 based on the net flow records. All three of the organization's. DNS server shows the website correctly resolves to the legitimate IP. DNS query logs shows one of the three DNS servers returning, a result of 10. That 1299 cashed at the appropriate approximate time as a suspected compromise, which of the following most likely occurred? | back 141 Am attacker temporarily pawned a name server |
front 142 While checking logs, a security engineer notices, a number of end users suddenly downloading files with the dot r dot gz. Extension closer examination of the files. Reveals. They are PE 32 files the end-user states. They did not initiate any downloads. Further investigation. Reveals, the end-users all clicked on an external email containing an affected MHT file and the href link. A week prior, which of the following is most likely occurred. | back 142 a RAT was installed and is ttransferring additional exploit tools |
front 143 A company uses Wireless laptops for all and keeps very detailed record of its assets along with a comprehensive list of devices that are authorized to be on the wireless network. The Chief Information officer. CIO is concerned about a script kiddie. Potentially being an unauthorized device to brute-force the wireless PSK and obtain access to the internal Network. Which of the following should the company Implement to Best prevent this from happening. Hurry. | back 143 WPA-EAP |
front 144 N/A | back 144 N/A |
front 145 A chief executive officers CEOs personal information was stolen and a social engineering attack, which of the following sources would reveal. If the CEOs personal information is for sale. | back 145 the dark web |
front 146 An organization has a growing Workforce that is mostly driven by additions to sales department, even newly hired salesperson real. It relies on mobile device, to conduct business. The Chief Information officer, CIO is wondering if the organization may need to scale down just as quickly as it scaled up. The CIO is also concerned about the organization security, and customer privacy, which of the following would best to address this cios concerns. Implementing BYOD for the sales department. While leveraging MD m. | back 146 Implementing BYOD for the sales department. While leveraging MDM. |
front 147 A worldwide manufacturing company has been experiencing email account compromises and one incident, a user logged in from the corporate office in France, but then seconds, later the same user account attempted to login, from Brazil, which of the following account policies would best prevent this type of attack. | back 147 Geolocation |
front 148 Financial analyst is expecting an email, containing sensitive information from a client. When the email arrives, the analyst receives an error and is unable to open the encrypted message with to the following is most likely the cause of the issue. | back 148 The SSL certificate has expired |
front 149 An organization, suffered, an outage and a critical system, took 90 minutes to come back online. Though. There were no data loss. During the outage, the expectation was that the critical system would be available within 60 minutes, which of the following is the 60-minute expectation. And example of | back 149 MTTR |
front 150 A security audit has revealed that they process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end of life support and cannot be upgraded. So, it is placed on a projected Network segment, which of the following would be most effective to the Implement to further mitigate the report vulnerability. | back 150 Application whitelisting |
front 151 A researcher has been analyzing large data sets for the last 10 months. The researcher works with colleagues from other institutions and typically connects via SSH to retrieve additional data. Historically, this setup has worked without issue, but the researcher recently started getting the following messages, which of the following Network attacks is the researcher most likely experiencing. | back 151 Man-in-the-middle |
front 152 Which of the following scenarios would be make a sinkhole effective and authority and attack? | back 152 Routing tables have been compromised and attackers rerouting traffic to malicious websites. |
front 153 An organization is developing a plan in the event of a complete loss of critical systems and data, which of the following plans is the organization mostly likely developing. | back 153 Disaster Recovery |
front 154 A security analyst is investigating an incident to determine what an attacker was able to do on a compromise laptop. The analysis reviews, The Following SIEM log, which of the following describes the method that was used to compromise the laptop. The attacker was able to bypass application. Whitelisting by emailing a spreadsheet attached with an embedded Powershell in the file. | back 154 The attacker was able to bypass application. Whitelisting by emailing a spreadsheet attached with an embedded Powershell in the file. |
front 155 Local guidelines required that all information systems meet a minimum security Baseline to be compliant, which of the following can security administrators use to access their system configurations against the Baseline | back 155 Benchmarks |
front 156 A Security engineer is setting up passwordless authentication for the first time | back 156 ssh-keygen -t rsa ssh-copy-id -i ~/.ssh/id/id_rsa.pub user@server ssh -i ~/.ssh/id_rsa user@server |
front 157 A company is designing the layout of a new data center. So it will have the optimal environmental temperature which of the following must be included. | back 157 a cold aisle a hot aisle |
front 158 A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer CFO, which of the following would be the best to allow a security analyst to gather information and confirm that it is a malicious document without executing any code in my contain. | back 158 Detonate the document with an analyst sandbox. |
front 159 A recent malware outbreak across a subnet included successful. Rootkit installations on many PCs ensuring persistence by rendering remediation efforts and effective. Which of the following would best detect the presence of a rootkit in the future? | back 159 EDR |
front 160 A security analyst is reviewing information regarding recent vulnerabilities, which of the following will the analyst most likely consult to validate which platforms has been affected. | back 160 CVE |
front 161 A public relations team will be talking a group of guests on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure. All whiteboards are cleaned and all data disc or cleared. The company is most likely trying to protect against. | back 161 Loss of proprietary information |
front 162 A privileged user in a company stole several proprietary documents from a server. The user also went into the log files, deleted all records of the incident. The system administrator has just informed investigators that the other log files are available for review, which of the following did. The administrator most likely configure that will assist with the investigation. | back 162 The syslog server |
front 163 An organization, hired, a consultant to assist with the active attack and the consultant was able to identify the compromised accounts, a computers, which of the following is the consultant most likely to recommend prepare for eradication. | back 163 Isolating the compromised accounts of computers, cutting off all network and internet access. |
front 164 In which of the following risk management strategies would cybersecurity Insurance be used? | back 164 Transference |
front 165 Which of the following Disaster Recovery test is the least time consuming of the disaster recovery team? | back 165 Tabletop |
front 166 A company is adopting, a BYOD policy and is looking for a comprehensive solution to protect company information on their user devices. | back 166 Mobile Device Manager |
front 167 A symmetric encryption algorithm is best suited for. | back 167 protecting large amounts of data |
front 168 A company needs to centralize its logs to create a Baseline and have visibility on its security events, which of the following technologies will accomplish this objective. | back 168 Security Information and Event Management |
front 169 Which of the following are requirements that must be configured for PCI DSS compliance? | back 169 Assigning a unique ID to each person with computer access. Encrypting transmission of cardholder data across private Networks. |
front 170 Which of the following policies would help an organization identify and mitigate potential single points of failure in the company's IT/ security operations? | back 170 Mandatory Vacations |
front 171 Which of the following describes, the ability to code a target, a hypervisor from inside? | back 171 VM escape |
front 172 Which of the following would best to establish between organizations to Define responsibilities of each party. Outlining the key deliverables and include monetary penalties for breaches to manage third-party risk. | back 172 BPA |
front 173 An analyst visits an internal Forum looking for information. About a tool, the analyst finds a threat that appears to contain relevant information. One of the post says the following which of the following best describes the attack, that was attempted against the forum readers. | back 173 XSS attack |
front 174 Which of the following should be put in place when negotiating with a new vendor about the timelines of response to a significant outage or incident? | back 174 SLA |
front 175 An analyst has determined that a server was not patched and the external actor exfiltrated data on a port 139, which of the following sources should the analyst review to best aascertain. How the incident could have been prevented? | back 175 The vulnerability scan output |
front 176 A company process is highly sensitive data and Senior Management wants to protect the sensitive data by utilizing classification labels, which of the following Access Control schemes would be the best for the company to implement. | back 176 Mandatory |
front 177 A large industry systems smart generator monitors the system status and sends alerts to a third party. Maintenance person when critical failure occurs while reviewing the network logs. The company's security manager notices that. The generators IP is sending packets to an internal file servers IP, which of the following mitigations would be best for the security manager to implement while maintaining alerting capabilities. | back 177 segmentation |
front 178 The SOC is reviewing processes and procedures. After a recent incident, the review indicates. It took more than 30 minutes to determine that quarantine and First was the best course of action, the allowed, the malware to spread to additional host before it was contained, which of the would be the best to improve the incident response process. | back 178 Updating the playbooks with better decision points |
front 179 Which of the following best describes a security exploit for which a vendor patch is not readily available. | back 179 Zero-day |
front 180 IT consulting is configuring a vulnerability scanner for a large Global organization in multiple countries. The consultant will be using a service account to scan systems with administrative privileges on a weekly basis, but there is a concern that they hackers could gain access to account to the account in pivot, through the net Global Network, which of the following would best to help mitigate this concern. | back 180 Create different accounts for each region and limit their login times. An alert on risky logins. |
front 181 During an incident response, a security analyst observes the following, log entry, on the web server, which of the following best describes. The type of attack the analyst is experiencing. | back 181 Directory Traversal |
front 182 The chief executive officer, CEO open our organization. Would like staff members to have the flexibility to work from home. Anytime, during business hours. Incident during a pandemic or crisis. However, the CEO is concerned that some staff members may take advantage of the flexibility and work from home high-risk countries while on holidays working to a third-party organization in another country. The Chief Information officer, CIO believes the company, can implement the same basic to mitigate the majority of the risk. Which of the following would be best to mitigate the CEOs concerns? | back 182 Geolocation Time-of-day restrictions |
front 183 A host was infected with malware. During the incident response, Joe, a use of reported that he did not receive any emails with links, but he had been browsing the internet all day, which of the following would be most likely show where the malware originated. | back 183 The DNS Logs |
front 184 An organization with a low tolerance for user. Inconvenience wants to protect laptop, hard drives against data loss, or Data Theft, which of the following would be the most acceptable. | back 184 SED |
front 185 An organization with a low tolerance for user. Inconvenience wants to protect laptop, hard drives against data loss, or Data Theft, which of the following would be the most acceptable. A network engineer needs to build a solution that will allow guests at a company headquarters to access. The internet via Wi-Fi. The solution should on allow access to internal corporate network, but it should require guests to sign off on an acceptable use policy before accessing the internet which of the following should the engineer employee to meet these requirements | back 185 Install a captive portal |
front 186 Which of the following types of controls is a CCTV camera. That is not being monitored. | back 186 Detective |
front 187 An engineer wants to access sensitive data from a corporate mobile device. Personal data is not allowed on the device. Which of the following MDM configurations must be considered when the engineer travels for business. | back 187 Containerization |
front 188 A security analyst reviews the data center access logs for fingerprint scanner and notices an absence of errors that correlate with the user's reports of issues. Accessing the facility, which one of the following most likely caused the access issues. | back 188 False rejection |
front 189 A cyber Security administrator has reduced team and needs to operate on an on-premises, Network and security infrastructure. Efficiently to help with this situation. The administrator decides to hire a service provider, which of the following, should the administrator use | back 189 MSSP |
front 190 Under GDPR which of the following is most responsible for the protection of privacy and website user rights. | back 190 The data owner |
front 191 An organization just experienced a major Cyber attack. The attack was well, coordinated sophisticated in the highly skilled, which of the following targeted the organization. | back 191 An advanced persistant threat |
front 192 Given the following logs which of the following best describes, the type of attack that occurred. | back 192 Dictonary |
front 193 In which of the following situations would it best to be used detective control type for mitigation? | back 193 A company purchased an IPS system, but after reviewing the requirements, the appliance was supposed to monitor not blocking any traffic. |
front 194 A security at Ministry expects, an employee has been email and proprietary information to a competitor company. Policy requires the administrator to capture an exact copy the employees hard disk, which of the following should the administrator use | back 194 dd |
front 195 Company Engineers regular participate in public internet forms with other Engineers throughout the industry, which of the following tactics. Would an attacker, most likely using this scenario. | back 195 waterhole-attack |
front 196 Which of the following would be the best method for creating a detailed diagram of wireless access points and hotspots? | back 196 Footprinting |
front 197 Which of the following is the purpose of a risk register? | back 197 To identify the risk, the risk owner and the risk measures. |
front 198 A University with remote campuses which all use different service providers, loses internet connectivity across the locations after a few minutes, internet, and VOIP services are restored only to go offline again and random intervals, typically within four minutes of service being restored. Outages could throughout the day impacting, all inbound and outbound connections, and services services that are limited to local or Wi-Fi network is not impacted. But When and VOIP services are affected later that day The Edge, router manufacturer releases a cve outlining, the ability of an attacker to exploit the Sip protocol handling on devices, leading to Resource exhaustion and system reloads, which of the following best describes this type of attack. | back 198 DoS Race condition |
front 199 A security analyst is reviewing a new website that will soon be made publicly available. The analyst, sees the following URL HTTP Dev - CompTIA dot org, slash home slash show dot PHP question, mark session ID, whatever the analyst then sends an internal user, a link to the new website for testing purposes. And when the user clicks, the link the analyst is able. Browse the website without following the URL HTTP Dev site. CompTIA dot org, slash home slash show dot PHP session ID equals US which of the following application attacks is being tested. | back 199 Cross-site request forgery |
front 200 Which of the following refers to applications and systems that are used within an organization without consent or approval? | back 200 shadow IT |
front 201 A security analyst is performing a packet capture on a series of SOAP HTTP request for a security assessment, the analyst, redirect the output to a file after the capture is complete, the analyst needs to review, the file transactions quickly, and then search the entire series of requests for particular string, which of the following would be this way to accomplish this task. | back 201 head grep |
front 202 Which of the following describes applications and systems that are used within an organization without consent or approval? | back 202 Shadow It |
front 203 Which of the following would best identify and remediate and data loss event. And an Enterprise using third-party web based services or file sharing platforms? | back 203 DPL |
front 204 A company's Chief Information. Security Officer ciso recently, warned the security manager. That the company's chief executive officer is planning to publish a controversial option, article and a national newspaper, which may result in new cyber attacks. Which of the following would be best for the security manager to do in a threat mode. | back 204 Hacktivist |
front 205 A security analyst is reviewing the following attack log output, which of the following types of attacks. Does this most likely represent? | back 205 Password Spraying |
front 206 A security analyst is preparing a threat For an upcoming internal. Penetration test to the analyst, needs to identify a method for determining the tactics techniques and procedures of a threat against the organization's Network. Which of the following will the analyst most likely use to accomplish this objective. | back 206 MITTR ATTACK |
front 207 A root cause analysis reveals that a web application outage was caused by one of the company's developers. Uploading a new version of a third-party libraries that were shared among several applications, which of the following implementations would be best to prevent the issue from reoccurring. | back 207 Containerization |
front 208 A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks, which of the following methods would best protect data. | back 208 Drive encryption USB Blocker |
front 209 A network engineer notices, the VPN concentrator overload and crashes on days when there are a lot of remote workers, Senior Management has placed great importance on the availability of vpm resources for remote, rural remote workers when the security of the end users traffic, which of the following would be the best to solve this issue. | back 209 Split Tunneling |
front 210 The chief security officer CSO at a major Hospital wants to implement SSO to help improve the environment. Patient data, particularly at shared terminals. The chief risk officer cro is concerned that the training and guidance have been provided to the Frontline staff. And a risk analysis is not been performed. Which of the following is the most likely cause of the Sierras concerns. | back 210 SSO would reduce the resilience and availability of systems. If it provider goes offline. |
front 211 An organization has decided to host, its web application to database, the cloud, which of the following best describes, the security concerns for this decision. | back 211 The cloud vendor is a new attack Vector within the supply chain. |
front 212 A chief information security officer ciso needs to create a policy set that meets International standards for data privacy and sharing which of the following should the ciso read and understand before writing the policies. | back 212 GDPR |
front 213 Which of the following are the most likely vectors for the unauthorized inclusion of vulnerable code. In a software companies final software release? | back 213 Include third party libraries Vendors/Supply chain |
front 214 A security analyst sees the following log output while we're viewing, web blogs, which of the following mitigation strategies would be best to prevent an attack from this being successful. | back 214 Input Validation |
front 215 A security analyst has received an alert about being sent via email. The analyst Chief information security officer. Ciso has made it clear that pii must be handled with extreme care from which of the following did the alert most likely originated. | back 215 DPL |
front 216 A company's bank has reported that multiple corporate credit cards have been stolen over the past, several weeks. The bank has provided the names of the effect of card holders to the company's forensic team to assist with cyber incident investigation, an incident response, learns the following information. The timeline of stolen cards corresponds closely with the affected users making internet-based purchases from diverse websites via Enterprise desktop, PCS. All purchase connections are encrypted in the company. This is an SSL inspection proxy for the inspection of encrypted traffic of the hardware Network. Purchases made with corporate credit cards over the corporate Wi-Fi. Network. There is no SSL inspection, occur are unaffected, which of the following is, most likely the root cause | back 216 HTTP sessions are being downgraded to insecure Cipher Suites. |
front 217 A security analyst is performing a forensic investigation, compromised account credentials, using the Event Viewer. The analyst able to detect the following message, special privileges assigned to the new login, several of these messages did not have a valid login associated with the user before these privileges were assigned, which of the following attacks is likely being detected. | back 217 pass-the-hash |
front 218 An analyst needs to set up a method of securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload, which of the following Services would best meet the criteria. | back 218 AH |
front 219 The cyber security administrators using iptables as an Enterprise firewall, the administrator created, some rules, but the network now seems to be unresponsive all connections are being dropped by the firewall, which of the following would be the best option to remove the tables. | back 219 #iptables -F |
front 220 An organization that is located in a flood zone. Is most likely to document the concerns associated with restoration of it operations in a | back 220 disaster recovery plan |
front 221 A network administrator has been asked to design a solution to improve the company, security posture. The administrator has given the following requirements that the solution must be in line with the network, the solution must be able to block known malicious traffic. The solution must be able to stop network-based attacks, which of the following, should the network administrator Implement to best meet these requirements. | back 221 NIPS |
front 222 Forensic, examiners attempting to dump password cash in the physical memory of a live system. But keeps receiving an error message, which of the following best describes, the cause of the air. | back 222 The Examiner does not have administrative privileges to the system. |
front 223 An organization, blocks user access to command-line interpreters, but hackers still managed to invoke the interpreters using a native administrative tools, which of the following should the security team do to prevent this from happening in the future. | back 223 Disable, the built-in OS utilities as long as they are not needed for functionality. |
front 224 A cyber Security administrator needs to add disk redundancy for the critical server. The solution must have to drive failure for better fault tolerance, which of the following raids should be the administrator select. | back 224 RAID 6 |
front 225 A security analyst needs to produce a document that details how a security incident occurred. The steps that were taken for recovery and how future incidents can be avoided during which of the following stages of the response process. Will the activity taking place. | back 225 Lessons learned |
front 226 An organization's RPO for a critical system is two hours. The system is used Monday through Friday from 9 a.m. To 5 p.m. Currently the organization performs a full backup every Saturday that takes four hours to complete, which of the following additional backup. Implementations would be the best way for the analysts to meet the business requirements. | back 226 Full backups Monday, through Friday at 6 p.m. and differental back up. Hourly |
front 227 A technician needs to prevent data loss in a laboratory. The laboratory is connected to any external networks, which of the following methods would best prevent an exfiltration of data. | back 227 Drive Encryption USB locker |
front 228 A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office. Prior priority must be given to access that are currently experiencing latency and connectivity issues. Which of the following would be the best resource for determining the order of priority. | back 228 heatmap |
front 229 A user reports constant, lack and performance issues with the wireless network. When working with a local coffee shop. This is a security analyst walks the user through the installation of Wireshark and gets a five-minute pcap to analyze the analysis, observations, the following output, which of the following attacks. That is the most likely. See in the packet capture. | back 229 Evil Twin |
front 230 N/A | back 230 N/A |
front 231 Which of the following would be the best resource for a software developer, who is looking to improve secure coding practices for web applications? | back 231 OWASP |
front 232 A security engineer is reviewing log files after a third party discovered usernames and passwords for the organization's accounts. The engineer sees that there is a change in the IP address for a vendor website. One hour, earlier. This change, lasted eight hours, which of the following attacks was most likely used. | back 232 DNS Posioning |
front 233 A security analyst has been asked to investigate a situation after the soc started to receive alerts from Siem. The analysts first, looks at the domain controller, and find the following event, alerts, based on the analysis findings, which of the following attacks has been executed. | back 233 Spraying |
front 234 An attacker to exploiting a vulnerability, that does not have a patch available, which of the following attackers exploiting. | back 234 Zero-day |
front 235 A security analyst is using a recently released security advisory to review historical logs, looking for a specific activity that was outlined in The Advisory. Which of the following is the analysts doing. | back 235 threat hunting |
front 236 A security analyst needs to generate a server certificate to be used for a tow 1.1 x and secure RDP connections. The analyst is unsure. What is required to perform the task? And solicit eights help from a senior colleague, which of the following is the first steps. The senior colleague will most likely tell the analyst to perform to accomplish this task. | back 236 Generate CSR |
front 237 A forensics investigator is examining a number of unauthorized payments that were reported on the company's website. Some unusual log entries show users receiving an email for an unwanted mailing list and clicking on a link to attempt at this fun. Subscribe. One of the users reported the email to the fishing team and for Now revealed the link below which of the following will the forensic investigator most likely to determine has occurred. | back 237 CSRF |
front 238 A security engineer needs to enhance MFA access to sensitive areas in the building, a key card, and a fingerprint scan are already in use, which of the following would add additional Factor of Authentication. | back 238 Keypad PIN |
front 239 A security analyst is reviewing logs on a server and observes the following output, which of the following is a security analyst observing. | back 239 Dictonary Attack |
front 240 And employee has been charged with fraud and a suspected of using corporate assets as authorities, collect evidence, and to prevent the admissibility of evidence, which of the following four risk techniques should be used. | back 240 Chain of Custody |
front 241 A website developer is working on a new e-commerce website and has been asked to inform security expert for the most appropriate ways to store credit card numbers, to create an easy reordering process, which of the following methods will be best to accomplish this goal. Tokenizing, the credit cards in a database. | back 241 Tokenizing, the credit cards in a database. |
front 242 An Enterprise has hired an outside security firm to conduct a penetration testing on its networking applications. The Firm has only been given the documentation available to the customer of the applications, which of the following best represents this type of testing that will occur. | back 242 Grey-Box |
front 243 Users at organizations have been installing programs from the internet on their work stations without first proper authorization. The authorization maintains a portal in which users can install standardized programs. However, some users have administrative access to the workstations, to enable Legacy programs to function properly, which of the following should the Security administrator consider implementing to address this issue. | back 243 Application Whitelisting |
front 244 To secure an application. After a large data breach, and e-commerce site will be resetting. All users credentials, which of the following will best ensure. The site's users are not compromised after the reset | back 244 encrypted credentials and Transit. |
front 245 A large Enterprise has moved all of its data to the cloud behind a strong authentication and encryption a sales director recently had a laptop stolen. And later Enterprise data was found to have being a compromise database, which of the following was the most likely cause | back 245 Shadow IT |
front 246 An incident response, technician collected, a mobile device during an investigation, which of the following should the technician do to maintain chain of custody | back 246 document, the collection and require a sign off when The Possession changes. |
front 247 The website HTTP company, website.com requires user to provide personal information, including security question responses registration, which of the following would most likely cause a data breach. | back 247 Unsecure protocols |
front 248 And company has drafted an Insider threat policy that prohibits the use of external storage devices, which of the following would best protect the company from data exfiltration via remote media. | back 248 Blocking remote media devices and write capabilities, using a host-based security tool. |
front 249 N/A | back 249 N/A |
front 250 A company was recently breached part of the company. New cybersecurity strategy is to centralize the logs from all security devices, which of the following components forwards, the logs to the central resource. | back 250 log collector |
front 251 Which of the following best describes a risk reduction, technique | back 251 a security control objective cannot be met through a technical change. So the company implements a policy to train users on more secure methods of operation. |
front 252 A network administrator is setting up wireless access points in a conference room in wants to authenticate via using pki, which of the following should the administrator configure. | back 252 802.1X |
front 253 A remote user recently took a two-week vacation abroad and brought back along and corporate own laptop Upon returning to work. The user was unable to connect to the laptop via the VPN, which of the following is most likely the reason for the uses inability to connect the laptop to the VPN. | back 253 Due to foreign travel. The user's laptop was isolated from the network. |
front 254 When selecting a technical solution for identity management at architect chooses to go from an in-house to a third-party saas provider which of the following risk management strategies is an example of | back 254 Transferance |
front 255 A commercial cyber threat, intelligence organization, observe ioc, s across a variety of unrelated customers prior to releasing specific threat intelligence to other paid cars subscribers. The organization is most likely, obligated to contracts to | back 255 anonymize, any pii that is observed within the Ico data. |
front 256 A global pandemic is forcing a private organization to close some businesses units and reduce Staffing at others, which of the following would be the best to help the organization's Executives determine the next course of action. | back 256 business continuity plan |
front 257 Some laptops recently went missing from a locked storage area, that is protected by a keyless RFID enabled locks. There is no obvious damage to the physical space, the security manager, identifies who unlocked the door. However Human Resources confirm that that employee was on vacation at the time of incident, which of the following describes, the most likely occurrence. | back 257 The employees physical access card was cloned. |
front 258 A user contacts to help desk to report the following two days ago. A pop-up browser window, prompted the user for name and password after connecting to the corporates wireless SSID that has never happened before, but the user entered, the information as requested. The user was able to access the internet but not trouble accessing the department shares until the next day. The user is now getting notifications from the bank about unauthorized transactions. What's it a following attack vectors was most likely used in the scenario. | back 258 Evil Twin |
front 259 A network administrator has been alerted. The web pages are experiencing long load times after determining. This is not a routing or DNS issued. They administered a logs into the router runs the command, and receives following output, which of the following router experiencing. | back 259 resource exhaustion |
front 260 A network administrator has been asked to install an IDS to improve the security posture of an organization, which of the following controlled types is an IDS. | back 260 Detective |
front 261 A company provides mobile devices to its users to permit access to email and Enterprise applications. The company recently started allowing users select from several different vendors and different devices. When confirming the MDM, which of the following is the key security, Implement K implementation and her erogenous device approach. | back 261 Certain devices are inherently less secure than others. So compensatory controls will be needed to address the Delta between device vendors. |
front 262 A development team employs a practice of bringing all code changes from multiple team members into the same development project through automation. A tool is utilized to validate the code, and track source code through Version Control, which is the best described process. | back 262 Continuios Intergration |
front 263 An organization's developing an authentication Service for use at the entry and exit points of country borders. The service will use data feeds obtained, from passport systems passport manifest in the highly definition video, feeds from CCTV systems that are located at the ports. The service will incorporate machine learning techniques to eliminate biometric enrollment processes while still allowing authorities to defy passengers with increasingly accurate. The more frequent passengers travel. The more accurate, the server will Define identity, which of the following Biometrics, will most likely be used without the need for enrollment. | back 263 gait facial |
front 264 In the middle of a Cypress Security, a security engineer removes. The infected devices from the network and locks down. All compromised accounts in which of the following incident response phases is security engineer. Currently operating. | back 264 Containment |
front 265 A software developer needs to perform code execution tasking, Black Box, testing and non-functional testing on a new production before it gets its General release, which following is the best describes the task. The developer is conducting. | back 265 Verification |
front 266 A Security administrator has noticed unusual activity occurred between different Global instances and workloads and needs to identify the source of the unusual traffic, which of the following log sources would be best to show the source of the unusual traffic. | back 266 CASB |
front 267 A security analyst is reviewing a penetration testing report for third-party contractor. The penetration testers use the organization's new API to bypass a driver to perform privileged escalation on an organization's web servers upon looking at the API, the security analyst. Realizes the particular API call was to a legacy system running, an outdated OS, which of the following is most likely the attack type. | back 267 Shimming |
front 268 A website developer is working on a new e-commerce website that has asked an information security expert for the most appropriate way to store, the credit card numbers to create an easily reorder will process, which of the following methods would best accomplish this goal. | back 268 Tokenizing, the credit cards in the database. |
front 269 A chief security officer or CSO was notified. That a customer is able to access confidential. Internal company files on a commonly used file share service, the file share Services, the same one used by company staff as one of the appropriate approved third party applications, after further investigation the security team determines the sharing of confidential files was accidental and not malicious. However, the CSO wants to implement changes to minimize this type of incident from but does not want to impact existing business processes, which of the following would best meet the cso's objectives. | back 269 DLP |
front 270 A company has been experiencing very brief power outages from its utility company over the last few months. These outages only last for one second. Each time. The utility company is aware of the issue and is working to replace the faulty Transformer. What is the best describes? The company should use to purchase to ensure the critical servers and network devices. Stay online. | back 270 UPS |
front 271 A university is opening a facility in a location where there is an elevated risk of theft at the University wants to protect the desktops in this classroom in Labs, which of the following should the University use to best. Protect these assets deploying in the facility. | back 271 cable locks |
front 272 A company deploying a Wi-Fi access point in a public area and wants to harden the configuration to make it more secure. After performing an assessment, the analysts identifies that the access point is configured to use WPA, three AES WPS and radius which of the following should the analyst disable to enhance the access point security. | back 272 WPS |
front 273 A company needs to centralize its logs to create a Baseline and have the visibility on its security events, which of the following techniques are will accomplish this objective. | back 273 Secure information and event management. |
front 274 A company uses specifically configured workstations for any work that requires administrative, privileges, to its tier 0, and Tier 1 systems, the company follows a strict process of hardening systems immediately upon delivery, even if these strict security processes are in place and incident occurred from one of the workstations, the root cause appeared to be the SoC. Was tampered from, and replaced, which of the following most likely occurred. | back 274 A supply-chain attack |
front 275 Which of the following would be best for a technician to review, to determine the total risk and organization conveyor? When accessing a cloud first adoption strategy? | back 275 Risk Tolerance |
front 276 A multinational organization that offers web Based Services, has data centers that are located only in the United States. However, large number of customers are in Australia, Europe and China, payments for services are managed by a third party in the United Kingdom that specialize in payment gateways. The management team is concerned. The organization is not compliant with privacy laws that cover. Some of its customers which of the following platforms, should the management team follow. | back 276 Payment card, industry data, security standard. |
front 277 Which of the following terms should be included in a contract to help a company monitor, the ongoing security maturity of a new vendor? | back 277 A right to audit Clause allowing for annual security audits. |
front 278 A manufacturing company that has several one-off Legacy information system that cannot be mitigated to a newer OS due to a software compatibility issues. The OS is are still supported by the vendor, but the industrial software is no longer supported. The Chief Information security officer. Ciso. Has created a resilience plan for these systems that will allow OS patches to be installed in a non production environment.The system for Recovery, which of the following resilience techniques will provide the full capabilities. | back 278 Full Backup |
front 279 A Security administrator needs to inspect in transit files on the Enterprise Network to search for PII, Credit Card data, and classification Words, which is the following best to use. | back 279 Network DPL solution |
front 280 A Security administrator is analyzing the corporate wireless network. The network only has two access points running in channels, 1 and 11 while using airodump-ng the administrator notices. Another access points are running the same corporate essid on all available channels and with the same bssid of one of the legitimate access points. Which erf the following attacks in happening on the corporate Network? | back 280 Evil Twin |
front 281 An organization relies on, third-party video conferencing to conduct Daily Business, the recent security changes. Now require all remote workers to utilize a VPN to corporate resources, which of the following would best maintain high quality video conferencing while minimizing link latency. | back 281 Configuring QoS properly on the VPN accelerators. |
front 282 A security administrators trying to determine whether a server is vulnerable to a range of attacks after using a tool, the administrator obtains, the following output, which of the following attacks was successfully implemented based on the output. | back 282 Directory transversal |
front 283 An incident which is affecting dozens of systems involving malware that reached out to an internet, service for rules and updates. The IP address for the internet. Host appeared to be different in each case. The organization would like to determine a common IoC to support response and Recovery actions, which of the following sources of information would best support this solution. | back 283 DNS query logs |
front 284 A security analyst, notices several attacks are being blocked by the in IPS, but does not have anything on the Boron jury firewall locks. The attack seems to have been thwarted, which of the following resilience techniques was applied to the network to prevent this attack. | back 284 Defense in Depth |
front 285 A Security administrator is setting up an Siem to help monitor the notable events. Across the Enterprise, which of the following control types. Is this best represent? | back 285 Detective |
front 286 A chief executive officer CEO is dissatisfied with the level of service from the company's new service provider. The service provider is preventing the CEO from sending emails, from a work account to a personal account, which is following types of service providers is being used. | back 286 cloud service provider |
front 287 A Hospital's Administration is concerned about the potential loss of patient data that is stored on tablets. A Security administrator needs to implement controls to alert the soc. Anytime the devices are near exits, which of the following would best achieve this objective. | back 287 Geofencing |
front 288 A financial institution would like to start is customer data and could but still allow the data to be accessed and manipulated while encrypted doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned about the compilation, overheads or slow speeds, which of the following cryptic techniques would best meet this requirement. | back 288 Symmetric |
front 289 To further secure a company's email system and administrators adding public keys to DNS records in the company's domain which of the following is being used. | back 289 DNSSEC |
front 290 To further secure a company's email system and administrators adding public keys to DNS records in the company's domain which of the following is being used. An engineer is setting up a vdi environment for a Factory location and the business wants to deploy low-cost solution to enable users to shop floor to log into the vdi, environment directly. Which of the following should the engineers select to meet these requirements. | back 290 Thin Clients |
front 291 Which of the following is a risk that is specifically associated with hosting applications on a public cloud | back 291 shared tendancy |
front 292 a local coffee shop runs a small Wi-Fi hotspot for its customers to utilize WPA2. - psk the coffee shop would like to stay connected with securely trans and wants to implement WPA, three to make it Wi-Fi even more secure. Which of the following technologies will the coffee shop. Most likely have to use in place of psk. | back 292 SAE |
front 293 Several large orders of merchandise were recently. Purchased on an e-commerce companies website, the totals for each of the transactions, were negative values. Resulting in credits on the customer's account, which of the following should be implemented to prevent the similar situations in the future. | back 293 Ensure input validation is in place to prevent the use of invalid characters and values. |
front 294 And companies helpdesk receive several AV alerts. Indicating mine. Cats attempt to run on a remote system. Several years also reported that the new company flash drives. They picked up in the break room, only have 512 KB of storage, which of the following is the most likely the cause. | back 294 The GPO Blocking the flash drives is being bypassed by a malicious flash drive that was attempting to harvest plaintext credentials from memory. |
front 295 A client sent several inquiries to a project manager about a delinquent. Delivery status on some critical reports, the project manager. During the reports were previously sent via email, but then quickly generated and backdated the reports before submitting them v, a new email message, which of the following actions most likely supports an investigation for fraudulent submission. | back 295 Review the email event logs |
front 296 A network administrator is concerned about users being exposed to malicious content went accessing company. Cloud applications. The administered wants to be able to block access to sites based on the aaup. The users also be protected because many of them work from home and remote locations, provided on-site customer support, which of the following should, the administrator employee to meet these criterias. | back 296 Impliment an SWG |
front 297 Joe is security analyst. Recently formed a network discovery to a fully understanding is organizations. That electronic footprint from public perspective. Joe also ran a set of commands of receive the following output, which of the following can be determined from the organization's public presence and security posture. | back 297 Joe used Whois to produce the output The organization has adaquate information availible in public registration |
front 298 When implementing automation with IoT devices. Which of the following should be considered first? | back 298 Communication Protocols |
front 299 To mitigate the impact of a single VM being compromised by another VM on the same. Hypervisor and administrator would like to utilize a technique control to further segment the traffic which of the following solutions would best accomplish this objective. | back 299 Add more VLANS to the hypervisor network switches |
front 300 Which of the following is the most secure. But least expensive Data, Destruction method for data that is stored on hard drives. | back 300 degaussing |
front 301 Entering a secure area requires pass through two doors, both of which require someone who is already inside to initiate the axis, which of the following types of physical security. Controls. Does this describe? | back 301 Access control Vestibule |
front 302 An organization regularly scans, its infrastructure for missing, security patches, but is concerned about hackers gaining access to the scanners account, which of the following would be the best minimization this risk. | back 302 Log an alert on unusual scan account login times. |
front 303 A recent security assessment revealed that an actor exploited are vulnerable workstation within an organization that has persistent on the network for several months. The organization realizes the need to reassess a security strategically for migration risk within the perimeter which of the following solutions would best support the organization strategy. | back 303 EDR |
front 304 The human resources department of a large online retailer has recently received multiple customer complaints about the rudeness of automated chat Bots. It uses to interface in the cyst online Shoppers the system, which continuously learns. And adapts was working fine. When it was installed a few months ago, which of the following best describes the method behind the use of exploiting the system. | back 304 Tainted Training DATA |
front 305 A new vulnerability in the SMB protocol on the Windows system was recently discovered, but no patches are currently available to resolve the issue. The Security administrator is concerned. If servers in the company's DMZ will be vulnerable to external attack. However, the administrator cannot disable the service on the servers as SMB is used by another, by a number of internal systems and applications on the land which of the following TCP port. Should be blocked for all external inbound connections to the DMZ, as a workaround to protect the servers. | back 305 139 445 |
front 306 Which of the following best describes a social engineering attack that relies on an executive at a small business visiting, a fake banking website, where credit card and Account Details are harvested? | back 306 Pharming |
front 307 A company wants to modify his current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the best backup strategy to implement. | back 307 Full backups followed by differential backups. |
front 308 The spread of misinformation surrounding the outbreak of a novel virus on an election day, led to eligible voters, choosing not to take the risk of going to the voting polls. This is an example of | back 308 an influance campain |
front 309 During a security assessment, a security finds a file with overwhelming permissions from permissive, which of the following tools will allow the analyst to reduce the permissions for an existing user, and groups, and remove the set - user - ID from the file. | back 309 chmod |
front 310 After installing Windows Server, a cyber Security administrator needs to harden, it following the Securities best practices, which of the following will achieve the administrators goal. | back 310 disable guest accounts disable net bios over TCP/IP |
front 311 An organization recently, acquires an ISO 27001 certification, which of the following would most likely be considered a benefit of this certification. It is shares. | back 311 The customers at the organization meets security standards. |
front 312 A customer called a security. A company security team to report that all invoices customer has received over the last five days from the company appear to have fraudulent. Banking credentials the information into the matter, reveals the following the manager of the accounts, payable department is using the same. Password across multiple external websites and corporate accounts. One of the websites. The manager used recently experienced a data breach. The managers Corporate email account was successfully accessed in the last five days. Buy an IP address located in a foreign country, which of the following attacks is most likely been used to compromise the managers corporate account. | back 312 Credintal Stuffing |
front 313 Which of the following should a data owner require all Personnel to sign to legally, protect intellectual property? | back 313 NDA |
front 314 Which of the following distributes data among nodes, making it more difficult to manipulate the data while. Also minimizing downtime? | back 314 Hybrid Cloud |
front 315 An organization recently recovered from a data breach, during the root cause analysis. The organization determine the source of the breach, to be a personal cell phone that had been reported lost which of the following Solutions should the organization Implement to reduce the likelihood of future data breaches. | back 315 MDM |
front 316 A security engineer obtain, the following output from a threat intelligence source that recently performed an attack on the company service, which of the following best describes, this kind of attack. | back 316 Directory Traversal |
front 317 A company is concerned about is security after a red team exercise. The report shows the team was able to reach the critical service due to SMB being exposed to the internet and running NTMLV1, which of the following best explains the findings. | back 317 Open ports and services |
front 318 A Soc is implementing an Insider threat detection program. The primary concern is that all the users may be accessing confidential data without authorization, which of the following should be deployed to detect a potential Insider threat? | back 318 honeyfile |
front 319 An organization's corporate offices were destroyed due to a natural disaster. So the organization is Now setting up offices and temporary workspace which of the following whether your organization most likely consult. | back 319 the business continuity plan |
front 320 I said seems administrator needs to install the same x dot 509 certificate on multiple servers, which of the following, should the administrative use. | back 320 self signed certificate |
front 321 Which of the following is the correct order of validity from most to least volatile? | back 321 Cache memory temporary file system disk, archival media. |
front 322 A bank detects fraudulent activity on a user's account. The user confirms the transactions completed. Yesterday in the bank's website at HTTP, www.subply.com a security analyst, then examines. The users internet, usage, logs and observes. The following output, which of the following is the most likely occurred. | back 322 replay attack |
front 323 A security researcher is attempting to gather data on a web spread use of zero day exploit which of the following will the researcher most likely used to capture the data. | back 323 honeypot |
front 324 Which of the following would use a chief information, security, officer ciso, the most concern regarding newly-installed, internet, accessible 4K, surveillance cameras. | back 324 The cameras could be compromised, if not passed in a timely manner. |
front 325 A cyber Security administrator needs to add discourse undersea for a critical server. The solution must have to drive failure for the better fault, tolerance, which following raid levels? Should the administrator select? | back 325 RAID6 |
front 326 When selecting a technical solution for identity management and architect chooses to go from an in-house to a third-party saas provider which of the following risk management strategies is this an example of | back 326 Transferance |
front 327 Joe. An employee is transferring apartments in his providing copies of his files to a network share folder. That is previous team to access. Joe is granting readwrite, execution. Permissions to his manager, but given read-only access to the rest of the team, which of the following access controls is Joe using | back 327 DAC |
front 328 Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? | back 328 hashing private key |
front 329 A small business office is setting up. A wireless infrastructure with primary requirement centered around, protecting customers information, preventing unauthorized access to the business Network, which of the following would best support the offices business needs. | back 329 configuring access using WPA3 Enabling MAC filtering |
front 330 A security analyst is concerned about traffic initiating to a dark web, from the corporate land, which of the following networks. Should he analyzed monitor? | back 330 Tor |
front 331 A security analyst must determine if either SSH or telnet is being used to log into servers, which of the following, should the analysts use. | back 331 netstat |
front 332 A systems analyst is responsible for Gathering a new digital forensics chain of custody form. Which of the following should the analyst include in this document? | back 332 location of the artifact The date and Time |
front 333 A security analyst is investigating multiple hosts that are communicated to an external IP address during the hours of 2:00 a.m. To 4 o'clock a.m. The mail, where has evaded detection by traditional antivirus software, which of the following types of malware is most likely infecting, the host | back 333 Ploymorphic |
front 334 The following our logs of an accessor sexual attack, which of the following controls would best be used to prevent such a breach of data. | back 334 account lockout |
front 335 A security Engineers, installing a WAF to protect the cusp company's website from malicious web request over SSL. What following is needed to meet this objective? | back 335 a decryption certificate |
front 336 An incident response, technician collected, a mobile device during an investigation, which of the following should the technician do to maintain the chain of custody. | back 336 Document the collection and require a sign off when possession changes. |
front 337 An organization that is local in a flood zone. Is most likely to document the concerns associated with the restoration of it operations in a | back 337 disaster recovery plan |
front 338 Which of the following is the best reason to maintain a functional and effective Asset Management policy that aids in ensuring the security of an organization? | back 338 To only allow approved organization, own devices, onto the business Network. |
front 339 An attacker was easily able to log in to the company, security cameras by performing a basic online search for a set-up guide for that particular camera. Brand and model which of the following best describes the configurations, the attacker exploited. | back 339 Default Settings |
front 340 A cloud administrators configuring 5 compute instances under the same VPN Subnet in a VP c. 3 instances are required to communicate to one another, the other two must be logically isolated all other instances in a V PC which of the following must the administrative configured to meet this requirement. | back 340 Three security groups |
front 341 A user enters, a password to login to a workstation, then prompted to enter an authentication code, which of the following MFA factors or attributes are being utilized in an authentication process. | back 341 something you know something you have |
front 342 Which of the following is most likely to contain ranked and ordered information on the likelihood and potential impact of catastrophic, catastrophic events that may affect business processes and systems. While also highlighting the residual risk that need to be managed after mitigating controls have been implement | back 342 A risk Register |
front 343 A RAT, that was used to compromise an organization's bacon. Contentious was found on a user's computer. The RAT evaded, anti virus detection. It was installed by a user who has local rights to the system as part of the Remote Management toolset, which of the following recommendations would best prevent this from reoccurring. | back 343 Enforcing Application Whitelisting |
front 344 The process of passively gathering information. Poor to launching a Cyber attack is called | back 344 reconnaissance |
front 345 An attacker was easily able to log into a company. Secured camera by performing a based online search for the set-up guide, for that particular camera. Brand and model which of the following best describes the configurations, the attacker exploited. | back 345 Default settings |
front 346 A security architect at a large multinational organization is concerned about the complexities and overhead of managing multiple encryption Keys securely in a multi cloud provider environment. The security architect is looking for a solution with reduced Legacy to allow the incorporation of the organization's existing keys, that do maintain consistent, centralized control of management, regardless of data location, which of the following would be best to meet The Architects objectives. | back 346 Key Management Sevices |
front 347 An analyst is trying to identify insecure services that are running on an internal Network. After performing a port. Scan the analysts identifies that a server. Has some insecure Services enabled on default ports, which of the following best describes the services that are currently running and the secure alternatives for replacing them. | back 347 SNMPv2 SNPMv3 HTTP HTTPS Telnet SSH |
front 348 A company is setting up a web server on the internet that will utilize both encrypted and unencrypted web browser. Protocols. The security engineer runs a port scan against the server from the internet and sees the following output, which of the following steps would be best for the security engineer to do next. | back 348 block SSH access form the internet |