Practice EExam C Performance-Based Questions

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/89

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

90 Terms

1
New cards

Refer to the following firewall rules:

  • Use a secure terminal to connect to 10.1.10.88 = Allowed

  • Share the desktop on server 10.1.10.120 = Blocked

  • Synchronize the clock on a server at 10.1.10.17 = Allowed

  • View web pages on 10.1.10.120 = Allowed

  • Perform a DNS query from 10.1.10.88 to 9.9.9.9 = Blocked

  • Authenticate to an LDAP server at 10.1.10.61 = Blocked

2
New cards

Match the device to the description. Some device types will not be used.

  • Block SQL injection over an Internet connection = IPS

  • Intercept all browser requests and cache the results = Proxy server

  • Forward packets between separate VLANs = Router

  • Configure a group of redundant web servers = Load balancer

  • Evaluate the input to a browser-based application = WAF

3
New cards

Match the attack type to the characteristic:

  • A list of passwords are attempted with a known username = Brute force

  • An email link redirects a user to a site that requests login credentials = Phishing

  • The malware is designed to remain hidden on a computer system = Rootkit

  • Permissions are circumvented by adding additional code as application input = Injection

  • Data is captured and retransmitted to a server = Replay

  • A website stops responding to normal requests = DDoS

4
New cards

Match the cryptography technology to the description:

  • Different inputs create the same hash = Collision

  • Data is hidden within another media type = Steganography

  • Information is added to make a unique hash = Salting

  • Sensitive data is hidden from view = Masking

  • A different key is used for decryption than encryption = Asymmetric

  • Create a stronger key using multiple process = Key stretching

5
New cards

Add the most applicable security technologies to the following scenarios:

  • Users connecting to the network should use their corporate authentication credentials = 802.1X

  • A field service engineer uses their corporate laptop at coffee shops and hotels = VPN

  • Directly access cloud-based services from all corporate locations = SD-WAN

  • Software developers run a series of tests before deploying an application = Sandboxing

  • An administrator prevents employees from visiting known-malicious web sites = NGFW

6
New cards

A finance company is legally required to maintain seven years of tax records for all of their customers. Which of the following would be the BEST way to implement this requirement?

Create a separate daily backup archive for all applicable tax records

<p>Create a separate daily backup archive for all  applicable tax records</p>
7
New cards

A system administrator is designing a data center for an insurance company’s new public cloud and would like to automatically rotate encryption keys on a regular basis. Which of the following would provide this functionality?

Key management system

<p>Key management system</p>
8
New cards

A newly installed IPS is flagging a legitimate corporate application as malicious network traffic. Which of the following would be the BEST way to resolve this issue?

Tune the IPS alerts

<p>Tune the IPS alerts</p>
9
New cards

A security administrator has identified an internally developed application which allows modification of SQL queries through the web-based front-end. Which of the following changes would resolve this vulnerability?

Validate all application input

<p>Validate all application input</p>
10
New cards

A system administrator is implementing a fingerprint scanner to provide access to the data center. Which of the following authentication technologies would be associated with this access?

Something you are

<p>Something you are </p>
11
New cards

The IT department of a transportation company maintains an on-site inventory of chassis-based network switch interface cards. If a failure occurs, the on-site technician can replace the interface card and have the system running again in sixty minutes. Which of the following BEST describes this recovery metric?

MTTR

<p>MTTR</p>
12
New cards

A company maintains a server farm in a large data center. T hese servers are used internally and are not accessible from outside of the data center. The security team has discovered a group of servers was breached before the latest security patches were applied. Breach attempts were not logged on any other servers. Which of these threat actors would be MOST likely involved in this breach?

Insider

<p>Insider</p>
13
New cards

An organization has received a vulnerability scan report of their Internet-facing web servers. The report shows the servers have multiple Sun Java Runtime Environment ( JRE) vulnerabilities, but the server administrator has verified that JRE is not installed. Which of the following would be the BEST way to handle this report?

Ignore the JRE vulnerability alert

<p>Ignore the JRE vulnerability alert</p>
14
New cards

A user downloaded and installed a utility for compressing and decompressing files. Immediately after installing the utility, the user’s overall workstation performance degraded and it now takes twice as much time to perform any tasks on the computer. Which of the following is the BEST description of this malware infection?

Trojan

<p>Trojan</p>
15
New cards

Which of the following is the process for replacing sensitive data with a non-sensitive and functional placeholder?

Tokenization

<p>Tokenization</p>
16
New cards

A security administrator has installed a new firewall to protect a web server VLAN. The application owner requires all web server sessions communicate over an encrypted channel. Which of these rules should the security administrator include in the firewall rulebase?

Source: ANY, Destination: ANY, Protocol: TCP, Port: 443, Allow

<p>Source: ANY, Destination: ANY,   Protocol: TCP, Port: 443, Allow</p>
17
New cards

Which of these would be used to provide multi-factor authentication?

Smart card with picture ID

<p>Smart card with picture ID</p>
18
New cards

A company's network team has been asked to build an IPsec tunnel to a new business partner. Which of the following security risks would be the MOST important to consider?

Supply chain attack

<p>Supply chain attack</p>
19
New cards

A company's human resources team maintains a list of all employees participating in the corporate savings plan. A third-party financial company uses this information to manage stock investments for the employees. Which of the following would describe this financial company?

Processor

<p>Processor</p>
20
New cards

A technology company is manufacturing a military grade radar tracking system that can instantly identify any nearby unmanned aerial vehicles (UAVs). The UAV detector must be able to instantly identify and react to a vehicle without delay. Which of the following would BEST describe this tracking system?

RTOS

<p>RTOS</p>
21
New cards

An administrator is writing a script to convert an email message to a help desk ticket and assign the ticket to the correct department. Which of the following should be administrator use to complete this script?

Orchestration

<p>Orchestration</p>
22
New cards

A security administrator would like a report showing how many attackers are attempting to use a known vulnerability to gain access to a corporate web server. Which of the following should be used to gather this information?

IPS log

<p>IPS log</p>
23
New cards

During a ransomware outbreak, an organization was forced to rebuild database servers from known good backup systems. In which of the following incident response phases were these database servers brought back online?

Recovery

<p>Recovery</p>
24
New cards

A security administrator is installing a web server with a newly built operating system. Which of the following would be the best way to harden this OS?

Remove unnecessary software

<p>Remove unnecessary software</p>
25
New cards

A network IPS has created this log entry:

SQL injection

<p>SQL injection</p>
26
New cards

An incident response team would like to validate their disaster recovery plans without making any changes to the infrastructure. Which of the following would be the best course of action?

Tabletop exercise

<p>Tabletop exercise</p>
27
New cards

A system administrator has installed a new firewall between the corporate user network and the data center network. When the firewall is turned on with the default settings, users complain that the application in the data center is no longer working. Which of the following would be the BEST way to correct this application issue?

Create firewall rules that match the application traffic flow

<p>Create firewall rules that match the application  traffic flow</p>
28
New cards

Which of these would be used to provide HA for a web-based database application?

UPS

<p>UPS</p>
29
New cards

Each year, a certain number of laptops are lost or stolen and must be replaced by the company. Which of the following would describe the total cost the company spends each year on laptop replacements?

ALE

<p>ALE</p>
30
New cards

A network administrator is viewing a log file from a web server:

Input validation

<p>Input validation</p>
31
New cards

Sam would like to send an email to Jack and have Jack verify that Sam was the sender of the email. Which of these should Sam use to provide this verification?

Digitally sign with Sam’s private key

<p>Digitally sign with Sam’s private key</p>
32
New cards

The contract of a long-term temporary employee is ending. Which of these would be the MOST important part of the off-boarding process?

Archive the decryption keys associated with the user account

<p>Archive the decryption keys associated with the user account</p>
33
New cards

A cybersecurity analyst has been asked to respond to a denial of service attack against a web server, and the analyst has collected the log files and data from the server. Which of the following would allow a future analyst to verify the data as original and unaltered?

Data hashing

<p>Data hashing</p>
34
New cards

A security administrator is reviewing authentication logs. T he logs show a large number of accounts with at least three failed authentication attempts during the previous week. Which of the following would BEST explain this report data?

Spraying

<p>Spraying</p>
35
New cards

A security administrator has been asked to block all browsing to casino gaming websites. Which of the following would be the BEST way to implement this requirement?

Add a content filter rule

<p>Add a content filter rule</p>
36
New cards

A company is experiencing downtime and outages when application patches and updates are deployed during the week. Which of the following would help to resolve these issues?

Change management procedures

<p>Change management procedures</p>
37
New cards

A company is implementing a series of steps to follow when responding to a security event. Which of the following would provide this set of processes and procedures?

Playbook

<p>Playbook</p>
38
New cards

A transportation company maintains a scheduling application and a database in a virtualized cloud-based environment. Which of the following would be the BEST way to backup these services?

Snapshot

39
New cards

In an environment using discretionary access controls, which of these would control the rights and permissions associated with a file or directory?

Owner

<p>Owner</p>
40
New cards

A security administrator has installed a network-based DLP solution to determine if file transfers contain PII. Which of the following describes the data during the file transfer?

In-transit

<p>In-transit</p>
41
New cards

A medical imaging company would like to connect all remote locations together with high speed network links. The network connections must maintain high throughput rates and must always be available during working hours. In which of the following should these requirements be enforced with the network provider?

Service level agreement

<p>Service level agreement</p>
42
New cards

A company is implementing a security awareness program for their user community. Which of the following should be included for additional user guidance and training

Information on proper password management

<p>Information on proper password management</p>
43
New cards

A security administrator is preparing a phishing email as part of a periodic employee security awareness campaign. T he email is spoofed to appear as an unknown third party and asks employees to immediately click a link or their state licensing will be revoked. Which of the following should be the expected response from the users?

Report the suspicious link to the help desk

<p>Report the suspicious link to the help desk</p>
44
New cards

A security administrator would like to minimize the number of certificate status checks made by web site clients to the certificate authority. Which of the following would be the BEST option for this requirement?

OCSP stapling

<p>OCSP stapling </p>
45
New cards

A company is concerned their EDR solution will not be able to stop more advanced ransomware variants. Technicians have created a backup and restore utility to get most systems up and running less than an hour after an attack. What type of security control is associated with this restore process?

Compensating

<p>Compensating</p>
46
New cards

To upgrade an internal application, the development team provides the operations team with instructions for backing up, patching the application, and reverting the patch if needed. The operations team schedules a date for the upgrade, informs the business divisions, and tests the upgrade process after completion. Which of the following describes this process?

Change management

<p> Change management</p>
47
New cards

A company is implementing a public file-storage and cloud-based sharing service, and would like users to authenticate with an existing account on a trusted third-party web site. Which of the following should the company implement?

Federation

<p>Federation</p>
48
New cards

A system administrator is viewing this output from Microsoft’s System File Checker:

Which of the following malware types is the MOST likely cause of this output?

Rootkit

<p>Rootkit</p>
49
New cards

What type of vulnerability would be associated with this log information?

Directory traversal

<p>Directory traversal</p>
50
New cards

A developer has created an application to store password information in a database. Which of the following BEST describes a way of protecting these credentials by adding random data to the password?

Salting

<p>Salting</p>
51
New cards

Which of the following processes provides ongoing building and testing of newly written code?

Continuous integration

<p>Continuous integration</p>
52
New cards

Which of the following BEST describes a responsibility matrix?

A visual summary of cloud provider accountability

<p>A visual summary of cloud provider accountability</p>
53
New cards

A security administrator is implementing an authentication system for the company. Which of the following would be the best choice for validating login credentials for all usernames and passwords in the authentication system?

LDAP

<p>LDAP</p>
54
New cards

A technician is reviewing this information from an IPS log:

Which of the following can be associated with this log information? (Select TWO)

The source of the attack is 10.1.111.7 & The attacker sent an unusual HTTP packet to trigger the IPS

<p>The source of the attack is 10.1.111.7 &amp; The attacker sent an unusual HTTP packet to  trigger the IPS</p>
55
New cards

A company has contracted with a third-party to provide penetration testing services. The service includes a port scan of each externally-facing device. This is an example of:

Active reconnaissance

<p>Active reconnaissance</p>
56
New cards

An access point in a corporate headquarters office has the following configuration:

following configuration:

Which of the following would apply to this configuration?

Weak encryption

<p>Weak encryption</p>
57
New cards

An attacker has gained access to an application through the use of packet captures. Which of the following would be MOST likely used by the attacker?

Replay

<p>Replay</p>
58
New cards

A company is receiving complaints of slowness and disconnections to their Internet-facing web server. A network administrator monitors the Internet link and f inds excessive bandwidth utilization from thousands of different IP addresses. Which of the following would be the MOST likely reason for these performance issues?

DDoS

<p>DDoS</p>
59
New cards

A company has created an itemized list of tasks to be completed by a third-party service provider. After the services are complete, this document will be used to validate the completion of the services. Which of the following would describe this agreement type?

SOW

<p>SOW</p>
60
New cards

A company is deploying a series of internal applications to different cloud providers. Which of the following connection types should be deployed for this configuration?

SD-WAN

<p>SD-WAN</p>
61
New cards

A company is updating components within the control plane of their zero-trust implementation. Which of the following would be part of this update?

Policy engine

<p>Policy engine</p>
62
New cards

Which of the following malware types would cause a workstation to participate in a DDoS?

Bot

<p>Bot</p>
63
New cards

Which of these are used to force the preservation of data for later use in court?

Legal hold

<p>Legal hold</p>
64
New cards

A company would like to automatically monitor and report on any movement occurring in an open field at the data center. Which of the following would be the BEST choice for this task?

Microwave sensor

<p>Microwave sensor</p>
65
New cards

A company is releasing a new product, and part of the release includes the installation of load balancers to the public web site. Which of the following would best describe this process?

Capacity planning

<p> Capacity planning</p>
66
New cards

A system administrator would like to prove an email message was sent by a specific person. Which of the following describes the verification of this message source?

Non-repudiation

<p>Non-repudiation</p>
67
New cards

A security administrator has created a policy to alert if a user modifies the hosts file on their system. Which of the following behaviors does this policy address?

Risky

<p>Risky</p>
68
New cards

A company has identified a web server data breach resulting in the theft of financial records from 150 million customers. A security update to the company’s web server software was available for two months prior to the breach. Which of the following would have prevented this breach from occurring?

Patch management

<p>Patch management</p>
69
New cards

During the onboarding process, the IT department requires a list of software applications associated with the new employee's job functions. Which of the following would describe the use of this information?

Access control configuration

<p>Access control configuration</p>
70
New cards

A system administrator has identified an unexpected username on a database server, and the user has been transferring database files to an external server over the company’s Internet connection. The administrator then performed these tasks:

  • Physically disconnected the Ethernet cable on the database server

  • Disabled the unknown account

  • Configured a firewall rule to prevent file transfers from the server

Containment

<p>Containment</p>
71
New cards

Which of the following would be the MOST effective use of asymmetric encryption?

Create a shared session key

<p>Create a shared session key</p>
72
New cards

Each salesperson in a company receives a laptop with applications and data to support their sales efforts. The IT manager would like to prevent third-parties from gaining access to this information if the laptop is stolen. Which of the following would be the BEST way to protect this data?

Full disk encryption

<p>Full disk encryption</p>
73
New cards

A security administrator has compiled a list of all information stored and managed by an organization. Which of the following would best describe this list?

Data inventory

<p>Data inventory</p>
74
New cards

A security administrator would like to monitor all outbound Internet connections for malicious software. Which of the following would provide this functionality?

Forward proxy

<p>Forward proxy</p>
75
New cards

What type of security control would be associated with corporate security policies?

Managerial

<p>Managerial</p>
76
New cards

Which of the following would be the MOST significant security concern when protecting against organized crime?

Maintain reliable backup data

<p>Maintain reliable backup data</p>
77
New cards

An application team has been provided with a hardened version of Linux to use with a new application installation, and this includes installing a web service and the application code on the server. Which of the following would BEST protect the application from attacks?

Implement a secure configuration of the web service

<p>Implement a secure configuration of the   web service</p>
78
New cards

A system administrator has configured MAC filtering on their corporate access point, but access logs show unauthorized users accessing the network. Which of the following should the administrator configure to prevent future unauthorized use?

Enable WPA3 encryption

<p>Enable WPA3 encryption</p>
79
New cards

A system administrator has been tasked with performing an application upgrade, but the upgrade has been delayed due to a different scheduled installation of an outdated device driver. Which of the following issues would best describe this change management delay?

Dependency

<p>Dependency</p>
80
New cards

During an initial network connection, a supplicant communicates to an authenticator, which then sends an authentication request to an Active Directory database. Which of the following would BEST describe this authentication technology?

802.1X

<p>802.1X</p>
81
New cards

A security researcher has been notified of a potential hardware vulnerability. Which of the following should the researcher evaluate as a potential security issue?

Firmware versions

<p>Firmware versions</p>
82
New cards

Visitors to a corporate data center must enter through the main doors of the building. Which of the following security controls would be the BEST choice to successfully guide people to the front door?

Bollards & Fencing

<p> Bollards &amp; Fencing</p>
83
New cards

A company's employees are required to authenticate each time a file share, printer, or SAN imaging system is accessed. Which of the following should be used to minimize the number of employee authentication requests?

SSO

<p>SSO</p>
84
New cards

A company has recently moved from one accounting system to another, and the new system includes integration with many other divisions of the organization. Which of the following would ensure that the correct access has been provided to the proper employees in each division?

Internal self-assessment

<p>Internal self-assessment</p>
85
New cards

An attacker has circumvented a web-based application to send commands directly to a database. Which of the following would describe this attack type?

SQL injection

<p>SQL injection</p>
86
New cards

A group of business partners is using blockchain technology to monitor and track raw materials and parts as they are transferred between companies. Where would a partner find these tracking details?

Ledger

<p>Ledger</p>
87
New cards

A network technician at a bank has noticed a significant decrease in traffic to the bank's public website. After additional investigation, the technician finds that users are being directed to a web site which looks similar to the bank's site but is not under the bank's control. Flushing the local DNS cache and changing the DNS entry does not have any effect. Which of the following has most likely occurred?

Domain hijacking

<p> Domain hijacking</p>
88
New cards

A company runs two separate applications in their data center. The security administrator has been tasked with preventing all communication between these applications. Which of the following would be the BEST way to implement this security requirement?

Air gap

<p>Air gap</p>
89
New cards

A receptionist at a manufacturing company recently received an email from the CEO asking for a copy of the internal corporate employee directory. It was later determined that the email address was not sent from the CEO and the domain associated with the email address was not a corporate domain name. What type of training could help identify this type of attack in the future?

Recognizing social engineering

<p>Recognizing social engineering </p>
90
New cards

Which of the following deployment models would a company follow if they require individuals to use their personal phones for work purposes?

BYOD

<p>BYOD</p>