Advanced Cybersecurity Midterm Practice

0.0(0)
studied byStudied by 1 person
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/371

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

372 Terms

1
New cards
Confidentiality, Integrity, Availability (CIA)
What are often indented as the 3 main goals of security?
2
New cards
Implementing a dedicated Computer Incident Response Team (CIRT)
A large multination corporation has recently experience a significant data breach. The breach was ducted by an external cybersecurity firm, and the corporation's IT department was unable to prevent or detect the breach in its early stages. The CEO wants to ensure that such a breach does not happen again and is considering several option to enhance the company's security posture. What options would be the MOST effective in preventing and detecting future data breeches?
3
New cards
Confidentiality
A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. What security risk is MOST pressing?
4
New cards
Adopting a Development and Operations (DevOps) approach
You are the Chief Information Security Officer (CISO) at a tech company. Your company if facing issues with silos between the development and operations teams, leading to inefficiencies and security vulnerabilities. What approach should you adopt to encourage and integrate security considerations at every stage of software development and deployment?
5
New cards
Integrity
Your computer system is a participant in an asymmetric cryptographic system. You've create a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted has to your message as a digital signature before sending it to the other user?
6
New cards
Managerial controls
What is method of implementation security controls?
7
New cards
Attack scale and velocity
What security challenges refers to the rapid and broad spread of an attack, often affecting a large number of computers in relatively short amount of time?
8
New cards
Establishing a Security Operations Officer (SOC)
You are Chief Information Security Officer (CISO) at a larger corporation. Your company is expanding rapidly and the complexity of managing security across different business function is increasing. You need a dedicated team to monitor and protect critical information assets across the organization. What would be the MOST effect solution?
9
New cards
Sophisticated attack
You are the head of the cybersecurity team at a large corporation. You notice an increase in network traffic that appears to be legitimate but is causing a slowdown in hour systems. Upon further inspection, you find that the traffic patterns very each time, making it difficult to distinguish form normal traffic. What security challenge are you MOST likely facing?
10
New cards
Technical control
You are the Chief Information Officer (CISO) at a large corporation. You have been tasked with implementing a new security control to protect sensitive customer data. The control must be able to automatically detect and prevent unauthorized access to the data. What control should you implement?
11
New cards
Partial control solution that is implemented when a control cannot fully meet a requirement
What BEST describes compensating controls?
12
New cards
Corrective
A company moved its office supplies to another room and instituted a new security system for entry. The company implemented this after a recent server outage. What category of security control BEST describes the function of this recent implementation?
13
New cards
Installation of surveillance camera
The chief security office (CSO) at a financial organization wants to implement additional detective security controls?
14
New cards
Deterrent
What type of control is used to discourage malicious actors from attempting to breach a network?
15
New cards
User awareness and training programs
The security operations manager of a multinational corporation focuses on enhancing directive operational controls. What should the manager implement?
16
New cards
Managerial
What type of control makes use of policies, DPRs, and BCPs?
17
New cards
Operational
An acceptable use policy requires the system to encrypt confidential information while in transit. All employees must use secure email when exchanging proprietary information with external venders. What describes this type of acceptable use policy?
18
New cards
Physical
After a recent server outage, the company discovered that an employee accidentally unplugged the power cable form the server while grabbing some office supplies from the nearby shelf?
19
New cards
An advanced network appliance
What is an example of preventative control type?
20
New cards
Hacktivist
A prominent multinational corporation has experience an unexpected spike in unauthorized network traffic aimed at its web servers. Upon investigation, the corporation discovers that the goal of this traffic was to disrupt its online services rather than gain unauthorized access or steal data. The attack started shortly after the corporation made a controversial policy decision that sparked a public backlash. What type of threat actor is MOST likely responsible?
21
New cards
Insider
The IT manager in your organization proposes taking steps to deflect a potential threat actor. The proposal including the following: Create and follow onboarding and off-boarding procedures, Employ the principal of least privilege, Have appropriate physical security controls in place. What type of threat actor do these steps guard against?
22
New cards
Nation-state
What threat actor is MOST likely to engage in cyber espionage with strategic or political motivations?
23
New cards
Political
A multinational corporation recently fell victim to a series of cyberattacks, disrupting services and leading to significant financial losses. After an investigation, the corporation found that these attacks were part of a systematic campaign to undermine the corporation's market position. The highly sophisticated attacks suggest the involvement of a well-resourced entity with specific strategic objectives. What motivation BEST describes this scenario?
24
New cards
Shadow IT
The IT department at a large corporation noticed an unfamiliar software application running on its network. Upon investigation, they discovered that a team in the marketing department started using a new cloud-based project management tool to improve their workflow efficiency. The team did consult with the IT department before implementing this tool. In the context of cybersecurity threats, what does this situation BEST exemplify?
25
New cards
1) Exploitation,
2) Staging,
3) Exploitation,
4) Reconnaissance,
5) Breaching,
6) Escalating privileges
Match the general attack strategy with the appropriate descriptions:
1. Stealing information.
2. Preparing a computer to perform additional tasks in the attack.
3. Crashing systems.
4. Gathering system hardware information.
5. Penetrating system defenses to gain unauthorized access.
6. Configuring additional rights to do more than breach the system.
26
New cards
Reconnaissance
In which phase of an attack does the attacker gather information about the target?
27
New cards
Isolating the unsupported apps from other systems to reduce the attack surface
CloudSecure is facing a cybersecurity challenge where some of its critical software applications are no longer supported by vendors, making them vulnerable to potential exploits. The IT team is exploring various strategies to mitigate the risk posed by these unsupported apps. What is the MOST effect approach to enhance the security posture?
28
New cards
Supply chain and Removable media
A group of hackers has been monitoring recent orders from a company involving new laptops and Universal Serial Bus (USB) thumb drives. The group infiltrated the shipping company and added malicious USB thumb drives to the order. The target company received the order without any concerns. What 2 vectors made this attack successful?
29
New cards
Vendor management
As a cybersecurity analyst, you are tasked with reducing the supply chain attack surface in you organization. What area should you focus on to MOST effectively mitigate this risk?
30
New cards
Development phase
Ron, a hacker, wants to get access to a prestigious law firm he has been watching for a while. June, an administrative assistant at the law firm, is having lunch at the food court around the corner from her office. What phase of social engineering process is Ron in?
31
New cards
Exploration phase (Isolate the employee's system and conduct a through security scan)
You are a cybersecurity analyst at a large corporation. You notice that a particular employee has been receiving emails from an unknown sender who claims to be a new colleague from a different department. The sender has been engaging in a friendly conversation, asking about the employees role, and subtly inquiring about certain company processes. Recently, the sender asked the employee to open an attachment that supposedly contains a funny meme. What phase of the social engineering process does this scenario represent and what should be your immediate action?
32
New cards
A call from a threat actor posing as a remote sales representative to obtain the login credentials to a remote access server from the help desk
What is an example of a social engineering attack?
33
New cards
Phishing
An employee receives an email from an unknown sender claiming to be from the IT department. The email states that there is a login issue on the network and that the user needs to run the file to resolve the problem. The executable file prompts the user to input a network password, which the threat actor records. What social engineering technique is the threat actor using in this scenario?
34
New cards
Pretexting
The cybersecurity manager of a large organization is investigating a recent security branch that occurred during office hours. Investigory research shows that the suspect convinced the janitor to let them inside the building because they had forgotten their badge at home. Once inside, the suspect pulled the fire alarm and accessed the building's network room amongst the chaos. The intruder then attached a monitoring device to a network port before escaping unnoticed. What is the social engineering technique the threat actor employees in this scenario?
35
New cards
Typosquatting
Employees at CloudCom receive a suspicious email claiming to be from "CloudCom Support," informing employees that their passwords need to be reset urgently due to a security breach. THise mail include a link to login page that looks identical to CloudCom's official site. What type of social engineering attack does this scenario exemplify?
36
New cards
Vishing
What is the term for a phishing attack conducted through a voice channel, such as a phone call?
37
New cards
Vishing
A representative at a company reports receiving numerous unsolicited phone calls seeking banking information for a credit report. What social engineering variant is the finance director experiencing
?
38
New cards
Watering hole
What is a passive computer attack technique in which an attacker anticipates or observes the websites an organization uses often and infects them with malware?
39
New cards
Whaling
An attack that targets senior executives and high-profile victims is referred to as what?
40
New cards
Bloatware
What type of malware is software installed alongside a package selected by the user or bundled with a new computer system?
41
New cards
To encrypt files on the infected system and demand a ransom for the decryption key
What is the primary function of crypto-ransomware?
42
New cards
Fileless malware
Which virus operates only in memory and usually exploits a trusted application like PowerShell to circumvent traditional endpoint security solutions?
43
New cards
A program that performs a malicious activity at a specific time or after a triggering event
What describes a logic bomb?
44
New cards
Ransomware
What is a type of malware that prevents the system from being used until the victim pays the attacker money?
45
New cards
Remote Access Trojan (RAT)
What kind of malware provides an attacker with administrative control over a target computer though a backdoor?
46
New cards
1) Requires administrator-level privileges for installation,
2) Resides below regular antivirus software detection
What are 2 characters of a rookit?
47
New cards
It monitors the actions you take on your machine and sends the information back to its originated source
What BEST describes spyware?
48
New cards
1) Educate users about malware,
2) Schedule regular full-system scans
You have installed antivirus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day. What else should you do to protect your systems from malware (2 things)?
49
New cards
Web filters
To prevent malware infection in your network system, you decide that it's critical to prevent malware attacks, such as ransomware and phishing, by restricting access to sties that might be malicious. What BEST represents this type of prevention technique?
50
New cards
Policy-driven access control
A corporation's IT department is integrating a new framework that permits, ascertains, and applies various resources in accordance with established company policies?
51
New cards
Gap analysis
After implementing the National Institute of Standards and Technology (NIST) Cybersecurity Framework, the chief information security officer (CISO) is processing the company's security posture to identify deficiencies from the framework's recommendations?
52
New cards
Balance your focus between the control and data planes, ensuring both are optimized for security and efficiency.
You are a cybersecurity expert implementing a zero trust model in a large organization. You are tasked with designing the control and data planes. Which of the follow strategies should you prioritize and why?
53
New cards
Explicit allow, implicit deny
You want to implement an access control list in which only the users you specifically authorize have access to the resource. Anyone not on the list should be prevented from having access?
54
New cards
Need to know
Which of the following principles is implemented in a mandatory access control model to determine object access by classification level?
55
New cards
Prevent conflicts of interest
What is the primary purpose of separation of duties?
56
New cards
Attribute-based access control (ABAC)
Which access control model is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the object?
57
New cards
Discretionary access control (DAC)
You have a system that allows the owner of a file to identify users and their permissions to the file. Which type of access control model is implemented?
58
New cards
Role-based access control (RBAC)
You have implanted an access control method that only allows users who are managers to access specific data?
59
New cards
Router access control lists that allow or deny traffic based on the characteristics of an IP packet
Which of the following is an example of rule-based access control?
60
New cards
Photo ID and Smart Card
Which of the following are examples of something you have authentication controls? (Pick 2)
61
New cards
Username
Which of the following identification and authentication factors are often well known or easily discovered by others on the same network or system?
62
New cards
Password
Which of the following is the MOST common form of authentication?
63
New cards
Password-less authentication
A leading online retail company wants to improve user experience and security for its customers. The security team aims to eliminate the need for users to remember or input complex passwords, reducing the risk of password breaches. Instead, they propose a solution where users can access their accounts.... through verified email or via a push notification on a trusted device. Which authentication method is the team planning to implement? (not involve traditional passwords, fingerprint scans, or multiple validation steps)
64
New cards
Security keys
The IT security team at a large tech company is strengthening its authentication methods to protect sensitive company data and systems. The team considered implemenetiaing various security measure and understood that each authentication method has distinct features and benefits. However, they must choose the MOST suitable option that aligns with the organization's security requirements and user convenience. Which authentication method utilizes a physical device or software to generate secure, unique codes and offers convenience and strong security?
65
New cards
Somewhere you are
After finding a corporate phone unattended in a local mall, an organization decides to enhance its multi-factor authentication procedures (MFA). What MFA philosophy applies a location-based factor for authentication?
66
New cards
Federation
Your financial planning company if forming a partnership with a real estate property management company. One of the requirements is that your company open up its directory services to the property management company to create and access user accounts. Which of the following authentication methods will you be implementing?
67
New cards
Lightweight Directory Access Protocol (LDAP)
You are a network administrator for large multinational corporation. The corporation has offices in multiple countries and uses various software products from different vendors. The CEO wants implement a system that stores information about users, computers, security groups/roles, and services, and allow for interoperability between different venders' products. Which directory service would you recommend?
68
New cards
The point where the number of false positives matches the number of false negatives in a biometric system
Which of the following defines the crossover error rate for evaluation biometric systems?
69
New cards
Fingerprint recognition
You are a security consultant tasked with implementing a biometric authentication system for a small business. The business owner wants a system that is cost-effective, non-intrusive, and relatively simple for employees to use. Which biometric authentication method would you recommend?
70
New cards
User ACL
Which security mechanism uses a unique list that meets the following specifications:
*The list is embedded directly in the object itself
*The list defines which subjects have access to certain objects
*The list specifies the level or type of access allowed to certain objects
71
New cards
Authorization
What is the process of controlling access to resources such as computers, files, or printers called?
72
New cards
Group
Which of the following objects identifies a set of users with similar access needs?
73
New cards
Permissions
Which of the following identifies the type of access that is allowed or denied for an object?
74
New cards
SACL
Which of the following is used by Microsoft for auditing in order to identify past actions performed by users on an object?
75
New cards
Security
Which type of group can be used for controlling access to objects?
76
New cards
Have Marcus log off and log back in
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers Group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do?
77
New cards
Access token
Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?
78
New cards
She is still a member of the Project management group, which has been denied permission to this system. Deny permissions always override Allow permissions
Lori, who has been a member of the Project Management group, was recently promoted to manager of the team. She has been added as a member of the Managers group. Several days after being promoted, Lori needs to have performance reviews with the team she manages. However, she cannot access the performance management system. As a member of the Managers group, she should have the Allow permission to access this system. What is MOST likely preventing her from accessing this system?
79
New cards
User rights
Which of the following is a privilege or action that can be taken on a system?
80
New cards
Active Directory
What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information? (SA)
81
New cards
1) Organizational unit,
2) Domain,
3) Forest,
4) Object
5) Tree
Match each Active Directory term on the left with its corresponding definition on the right:
1) Logical organization of resources,
2) Collection of network resources,
3) Collection of related domain trees,
4) Network resource in the directory,
5) Group of related domains
82
New cards
A domain controller is a server that holds a copy of the Active Directory database that can be written to and is responsible for copying changes to Active Directory between the domain controllers
Which of the following BEST describes the domain controller component of Active Directory?
83
New cards
Domains with the same contiguous DNS namespaces should be grouped into a tree, and all trees should be grouped into a forest
A large multinational corporation has multiple domains that share the same contiguous DNS namespaces, as well as domains with different DNS namespaces. The IT department is tasked with organizing these domains. Which of the following options best describes how the domains should be grouped?
84
New cards
1) Generic containers are used go organize Active Directory objects,
2) Generic contains are created by default
Which of the following statements correctly describe the characteristics of generic containers in Active Directory? (pick 2)
85
New cards
Create a GPO computer policy for the computers in the Development OU
You want to ensure that all users in the Development OU have a common set of network communication security settings applied. Which action should you take?
86
New cards
The GPO linked to the user's organizational unit is applied last, so this setting takes precedence
The Hide Programs and Features page setting is configured for a specific user as follows:
After logging in, the user is able to see the Programs and Features page. Why does this happen?
87
New cards
LSDOU
Which of the following is the correct acronym to remember the order in which Group Policy Objects (GPOs) are applied?
88
New cards
Local Group Policy, GPO linked to site, GPO linked to domain, GPO linked to organizational unit (highest to lowest)
Group Policy Objects (GPOs) are applied in which of the following orders?
89
New cards
Create a GPO user policy for the Administrators ou
You manage an Active Directory domain. All users in the domain have a standard set of internet options configured by a GPO linked to the domain, but you want users in the Administrators OU to have a different set of internet options. What should you do?
90
New cards
1) Minimum password length
2) Account lockout threshold
You are configuring the Local Security Policy of a Windows system. You want to require users to create passwords that are at least 10 characters in length. You also want to prevent login after 3 unsuccessful login attempts? (pick 2)
91
New cards
1) Minimum password age,
2) Enforce password history
You are configuring the Local Security Policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again. Which policies should you configure? (pick 2)
92
New cards
Implementing multi factor authentication (MFA) for all systems
You are the IT security manager for a rapidly growing tech company. The company has been using simple password authentication for all systems. However, with the increasing number of employees and the sensitivity of the data being handled, you decide it's time to harden the authentication methods. Which of the following steps would be the MOST effect in achieving this goa.?
93
New cards
Password expiration
The IT department at a small company is revamping its password policies to bolster security. The company wants to ensure employees follow best practices for creating and managing passwords. The department aims to promote a secure environment by implementing password expiration policies. Which method for password management is BEST to promote a secure environment by requiring users to change their passwords after a certain period?
94
New cards
Users cannot change the password for 10 days
You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration?
95
New cards
1) Shared accounts can lead to accountability issues,
2) Shared accounts can compromise the principle of least privilege
You are the IT security manger for a large corporation. The company has been using shared accounts for certain systems due to ease of access and convenience. However, you are considering implementing a policy to prohibit the use of shared accounts. Which of the following are valid reasons for thsi decision? (pick 2)
96
New cards
Configure day/time restrictions in user accounts
You have hired ten new temporary employees to be with the company for 3 months. How can you make sure that these users can only log on during regular business hours?
97
New cards
1) Exploits vulnerabilities in a card's protocol or encryption methods,
2) Captures transmission data produced by a card as it is used,
3) Deliberately induces malfunctions in a card,
4) Access the chip's surface directly to observe, manipulate, and interfere with a circuit
Match each smart card attack on the left with the appropriate description on the right.
1) Software attacks,
2) Eavesdropping,
3) Default generation,
4) Microprobing,
98
New cards
Both a contact and contactless smart card, because he used the card both by inserting it into a reader and by waving it near a reader
John, a security analyst, is using a smart card to gain access to a secure server room. He simply waves his card near the card reader and the door unlocks. Later, he uses the same card to log into his computer by inserting it into a card reader. Based on this information, is John using a contact or contactless smart card?
99
New cards
Public Key Infrastructure (PKI)
Which technology is primarily used by smart cards to store digital signatures, cryptographic keys, and identification codes?
100
New cards
user mod -L joer
You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company. Which command canyon use to disable this account?