Cyber Security Operation
When referring to the three steps in the establishment of proper privileges, AAA stands for ?
Authentication,Authorization,Accounting
____________________are a form of operating system virtualization; they are a packaged-up combination of code and dependencies that help applications run quickly in different computing environments. A. Rootkits B. Scripts C. Zones D. Containers
D. Containers
___________refers to a process by which the user escalates their privilege level, bypassing the operating system's controls and limitations A. Segmentation B. BYOD C. Off‑boarding D. Jailbreaking
D. Jailbreaking
A ___________ is a more formal, larger software update that can address several or many software problems. A. Script B. Log C. hotfix D. patch
D. patch
Which term refers to a network connection used to interconnect virtual private clouds and on-premises networks? Question 2 A.certificate repository B.digital sandbox C.captive portal D.transit gateway
D.transit gateway
Application blacklisting is essentially noting which applications should be allowed to run on the machine. Question 4 True False
False
Bollards obscure vision, just as a wall or fence might. Question 6 True False
False
Service pack is the term for a small software update designed to address a specific problem, such as a buffer overflow in an application that exposes the system to attacks. Question 5 True False
False
Telnet uses TCP port 25. Question 9 Answer True False
False
The most common tools for an attacker to use against wireless technology are reception-based programs. Question 2 True False
True
What flag does nmap use to enable operating system identification? Question 1 a.-O b.-id c.-osscan d.-os
a.-O
Organizations like Anonymous, which target governments and businesses for political reasons, are examples of what type of threat actor? Question 7 a.Hacktivists b.Military assets c.Organized crime d.Nation-state actors
a.Hacktivists
Which party in a federated identity service model makes assertions about identities to service providers? Question 8. a.IDPs b.CDUs c.RPs d.Aps
a.IDPs
What organizations did the U.S. government help create to help share knowledge between organizations in specific verticals? Question 9 a.ISACs b.CERTs c.SANS d.DHS
a.ISACs
Which one of the CVSS metrics would contain information about the type of account access that an attacker must have to execute an attack? Question 1 a.PR b.C c.AV d.AC
a.PR
Valerie wants to use a graphical interface to control nmap and wants to display her scans as a visual map to help her understand her target networks. What tool from the following list should she use? Question 2 a.Zenmap b.wmap c.nmap-gs d.Angry IP Scanner
a.Zenmap
Murali wants to scan a network using nmap and has run a scan without any flags without discovering all of the hosts that he thinks should show. What scan flag can he use to scan without performing host discovery that will also determine if services are open on the systems? Question 4 a.-PS b.-Pn c.-sn d.-sL
b.-Pn
Naomi wants to make her applications portable and easy to move to new environments without the overhead of a full operating system. What type of solution should she select? Question 9 a.A SASE solution b.Containerization c.Virtualization d.An x86 architecture
b.Containerization
Which type of organization is the most likely to face a regulatory requirement to conduct vulnerability scans? Question 1 a.Bank b.Government agency c.Hospital d.Doctor's office
b.Government agency
Which one of the following industry standards describes a standard approach for setting up an information security management system? Question 2 a.ISO 27002 b.ISO 27001 c.CIS d.OWASP
b.ISO 27001
Tom is reviewing a vulnerability scan report and finds that one of the servers on his network suffers from an internal IP address disclosure vulnerability. What technology is likely in use on this network that resulted in this vulnerability? Question 8 a.SSH b.NAT c.TLS d.VPN
b.NAT
Which of the following threat actors typically has the greatest access to resources? Question 5 a.Insider threats b.Nation-state actors c.Hacktivists d.Organized crime
b.Nation-state actors
Jen's organization wants to ensure that administrator credentials are not used improperly. What type of solution should Jen recommend to address this requirement? Question 5 a.PKI b.PAM c.SAML d.CASB
b.PAM
What Windows tool provides detailed information, including information about USB host controllers, memory usage, and disk transfers? Question 10 a.Resmon b.Perfmon c.Statmon d.Winmon
b.Perfmon
Susan wants to start performing intelligence gathering. Which of the following options is frequently conducted in the requirements gathering stage? Question 10 a.Review of current data handling standards b.Review of security breaches or compromises your organization has faced c.Review of current vulnerability scans d.Review of threat intelligence feeds for new threats
b.Review of security breaches or compromises your organization has faced
What can the MAC address of a rogue device tell you? Question 1 a.The TTL of the device b.The manufacturer of the device c.Its operating system version d.What type of rogue it is
b.The manufacturer of the device
Which one of the following metrics is not included in the calculation of the CVSS exploitability score? Question 3 a.Privileges required b.Vulnerability age c.Attack complexity d.Attack vector
b.Vulnerability age
Which one of the following operating systems should be avoided on production networks? Question 10 a.Ubuntu 22 b.Windows Server 2008 R2 c.Red Hat Enterprise Linux 9 d.Debian Linux 11
b.Windows Server 2008 R2
What design concept requires that each action requested be verified and validated before it is allowed to occur? Question 6 a.Extended validation network b.Zero trust c.Trust but verify d.Secure access service edge
b.Zero trust
Which of the following Linux commands will show you how much disk space is in use? Question 4 a.top b.df c.ps d.lsof
b.df
Tonya is configuring vulnerability scans for a system that is subject to the PCI DSS compliance standard. What is the minimum frequency with which she must conduct scans? Question 4 a.Weekly b.Monthly c.Quarterly d.Daily
c.Quarterly
Renee is configuring her vulnerability management solution to perform credentialed scans of servers on her network. What type of account should she provide to the scanner? Question 6 a.Domain administrator b.Local administrator c.Read-only d.Root
c.Read-only
Which one of the following is not an example of a vulnerability scanning tool? Question 10 a.Nikto b.Nessus c.Snort d.OpenVAS
c.Snort
What command-line tool can be used to determine the path that traffic takes to a remote system? Question 10 a.routeview b.Whois c.traceroute d.nslookup
c.traceroute
What is the most recent version of CVSS that is currently available? Question 2 a.3.2 b.2.0 c.2.5 d.3.1
d.3.1
What federal law requires the use of vulnerability scanning on information systems operated by federal government agencies? Question 9 a.GLBA b.FERPA c.HIPAA d.FISMA
d.FISMA
Cameron wants to check if a file matches a known-good original. What technique can he use to do so? Question 7 a.Check the file size and creation date. b.Use strings to compare the file content. c.Decrypt both the file and the original to compare them. d.Hash both the file and the original and compare the hashes.
d.Hash both the file and the original and compare the hashes.
Bethany is the vulnerability management specialist for a large retail organization. She completed her last PCI DSS compliance scan in March. In April, the organization upgraded their point-of-sale system, and Bethany is preparing to conduct new scans. When must she complete the new scan? Question 7 a.June. b.No scans are required. c.December. d.Immediately.
d.Immediately.
What information is used to identify network segments and topology when conducting an nmap scan? Question 6 a.Port numbers b.IP addresses c.Hostnames d.Time to live
d.Time to live
Which protection ring has the highest privilege level and acts directly with the physical hardware? Question 7 A.Ring 0 B.Ring 1 C.Ring 2 D.Ring
A.Ring 0
Which access control type would you use to grant permissions based on the sensitivity of the information contained in the objects? Question 6: A.mandatory access control B.Discretionary access control C.role-based access control D.rule-based access control
A.mandatory access control
What component or practice is the foundation of system security? Question 1 A.operating system B.password selection C.securing the firewall D.hardening applications
A.operating system
Which option is a short- to medium-range, low-power wireless protocol typically used for mobile phones, laptops, printers, and audio devices? Question 7 A.WPA2 B.Bluetooth C.WEP D.802.11n
B.Bluetooth
Which network security standard was created to provide users with an easy method of configuring wireless networks? Question 6 A.Wireless Transport Layer Security (WTLS) B.Wi-Fi Protected Setup (WPS) C.Protected EAP (PEAP) D.Wireless Application Protocol (WAP)
B.Wi-Fi Protected Setup (WPS)
What term refers to the process of establishing a system's operational state? Question 3 A.hardening B.baselining C.securing D.controlling
B.baselining
Which type of computing brings processing closer to the edge of the network, which optimizes web applications and IoT devices? Question 9 A.implicit B.edge C.recovery D.hybrid
B.edge
Which term refers to the disturbance on an electrical circuit caused by that circuit's reception of electromagnetic radiation? Question 5 A.convergence B.electromagnetic interference C.sunspots D.TEMPEST
B.electromagnetic interference
A(n) ____________ is a low-level program that allows multiple operating systems to run concurrently on a single host computer. A.cipher B.hypervisor C.subnet D. escrow
B.hypervisor
Which type of attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time? Question 3 A.denial of service B.replay C.evil twin D.man-in-the-middle
B.replay
_______________refers to any media used to boot a computer into an operating system (OS) that is not the native (OS) on its hard drive.
Bootdisk
which protocol provides for multiple-rate Ethernet over 2.4GHz spread-spectrum wireless. ? A. WAPW B. TLS C. 802.11b D. 804.11b
C. 802.11b
Stealing a computer, using a bootdisk to erase all data on the drives, or simply unplugging computers are all effective __________________________ attacks. A. Road Apple B. Man-in-the-middle C. Denial-of-service(DOS) D. Eavesdropping
C. Denial-of-service(DOS)
______________________are the three types of accounting records in TACACS+?. A. START,STOP AND DELETE B. Availibility,accounting and confidentiality C. START,STOP AND UPDATE D. Availibility , Integrity and confidentiality
C. START,STOP AND UPDATE
The traditional ROM-BIOS has been replaced with________ Question 9 A. ELAM B. BootSecure Boot C. Unified Extensible Firmware Interface (UEFI) D. Trusted Machine Platform
C. Unified Extensible Firmware Interface (UEFI)
In a Linux system, permissions are modified using the ______ command. A.tracert B.ifconfig C.chmod D.ipconfig
C.chmod
Which term refers to a set of wireless technologies that enables smartphones and other devices to establish radio communication when they are within close proximity to each other? Question 1: A.orthogonal frequency division band (OFDB) B.direct-sequence spread spectrum (DSSS) C.near field communication (NFC) D.802.11i
C.near field communication (NFC)
Which account is used to run processes that do not require human intervention to start/stop/administer? Question 4Se A.shared B.guest C.service D.privileged
C.service
what refers to a specific technique of using an HTTP client to handle authentication on a wireless network ?
Captive portal
Due to technological advances, which new category of shared "secrets" for authentication has emerged based on how users perform an action? Question 2 : A."What users know" B."What users have" C."What users are" D."What users do"
D."What users do"
Which access control type allows a company to restrict employee logon hours? Question 7 A.mandatory access control B.discretionary access control C.role-based access control D.rule-based access control
D.rule-based access control
Which term refers to the quarantine or isolation of a system from its surroundings? Question 8 A.demilitarized zoning B.read-only domain controller pruning C.egress filtering D.sandboxing
D.sandboxing
The presence of what element activates a photoelectric fire detector? Question 1 A.heat B.infrared energy C.lasers D.smoke
D.smoke
If your organization is highly sensitive to sharing resources, you might want to consider the use of a public cloud to reduce exposure and increase your control over security, processing, and handling of data. Question 8 True False
False
Split-tunnel is a form of VPN where all traffic is routed via the VPN. Question 5 True False
False
The primary reason that spread-spectrum technology is used in 802.11 protocols is to provide security. Question 10 True False
False
Tom wants to set an appropriate logging level for his Cisco networking equipment while he's troubleshooting. What log level should he set? Question 1 a.7 b.3 c.5 d.1
a.7
Jason is writing a report about a potential security vulnerability in a software product and wishes to use standardized product names to ensure that other security analysts understand the report. Which SCAP component can Jason turn to for assistance? Question 3 a.CPE b.OVAL c.CVSS d.CVE
a.CPE
Which one of the following is not a common source of information that may be correlated with vulnerability scan results? Question 9 a.Database tables b.Logs c.Configuration management system d.SIEM
a.Database tables
Tara recently analyzed the results of a vulnerability scan report and found that a vulnerability reported by the scanner did not exist because the system was actually patched as specified. What type of error occurred? Question 6 a.False positive b.True positive c.True negative d.False negative
a.False positive
Adam is conducting software testing by reviewing the source code of the application. What type of code testing is Adam conducting? Question 1 a.Static code analysis b.Dynamic code analysis c.Mutation testing d.Fuzzing
a.Static code analysis
After running an nmap scan, Geoff sees ports 80 and 443 open on a system he scanned. What reasonable guess can he make about the system based on this result? Question 5 a.The system is running a web server. b.The system is running a database server. c.The system is a Windows system. d.The system is a Linux system.
a.The system is running a web server.
Ric's organization wants to implement zero trust. What concern should Ric raise about zero trust implementations? Question 7 a.They can be complex to implement. b.Zero trust is not compatible with modern software-defined networks. c.Zero trust does not support TLS inspection. d.They are likely to prevent users from accomplishing their jobs.
a.They can be complex to implement.
Laura wants to conduct a search for hosts using Recon-ng but wants to leverage a search engine with API access to acquire existing data. What module should she use? Question 7 a.recon/domains-hosts/shodan_hostname b.recon/companies-multi/whois_miner c.import/list d.import/nmap
a.recon/domains-hosts/shodan_hostname
Jason gathers threat intelligence that tells him that an adversary his organization considers a threat likes to use USB key drops to compromise their targets. What is this an example of? Question 4 a.A probability assessment b.A possible attack vector c.His organization's attack surface d.An example of adversary capability
b.A possible attack vector
What type of assessment is particularly useful for identifying insider threats? Question 3 a.Habitual b.Behavioral c.IOCs d.Instinctual
b.Behavioral
How can Jim most effectively locate a wireless rogue access point that is causing complaints from employees in his building? Question 2 a.Nmap b.Signal strength and triangulation c.Connecting to the rogue AP d.NAC
b.Signal strength and triangulation
Felix want to gather threat intelligence about an organized crime threat actor. Where is he most likely to find information published by the threat actor ? Question 2 a.Social media b.The dark web c.Blogs d.Government bulletins
b.The dark web
Susan runs an nmap scan using the following command:nmap -O -Pn 192.168.1.0/255What information will she see about the hosts she scans? Question 9 a.The hostname and service ports b.The hostname, service ports, and operating system c.The hostname, uptime, and logged-in user d.The hostname and operating system
b.The hostname, service ports, and operating system
As part of her job, Danielle sets an alarm to notify her team via email if her Windows server uses 80 percent of its memory and to send a text message if it reaches 90 percent utilization. What is this setting called? Question 9 a.Page monitoring b.Perfmon calibration c.A monitoring threshold d.A preset notification level
c.A monitoring threshold
Tuan wants to gather additional information about a domain that he has entered in Maltego. What functionality is used to perform server-based actions in Maltego? Question 8 a.A worker b.A query c.A transform d.A scan
c.A transform
Bill would like to run an internal vulnerability scan on a system for PCI DSS compliance purposes. Who is authorized to complete one of these scans? Question 5 a.Any employee of the organization b.An approved scanning vendor c.Any qualified individual d.A PCI DSS service provider
c.Any qualified individual
What term describes a system sending heartbeat traffic to a botnet command-and-control server? Question 5 a.Zombie ping b.CNCstatus c.Beaconing d.CNClog
c.Beaconing
Which of the following measures is not commonly used to assess threat intelligence? Question 6 a.Accuracy b.Relevance c.Detail d.Timeliness
c.Detail
What type of network information should you capture to be able to provide a report about how much traffic systems in your network sent to remote systems? Question 6 a.Resmon data b.Syslog data c.Flow data d.WMI data
c.Flow data
Chris is reviewing a file that is part of an exploit package. He notes that there is a file that has content with curly brackets ({}) around statements. What file type from the following list he most likely reviewing? Question 3 a.Plain text b.XML c.JSON d.HTML
c.JSON
Kevin recently identified a new software vulnerability and computed its CVSS base score as 6.5. Which risk category would this vulnerability fall into? Question 4 a.Critical b.High c.Medium d.Low
c.Medium
Michelle has a security token that her company issues to her. What type of authentication factor does she have? Question 2 a.Inherence b.Knowledge c.Possession d.Biometric
c.Possession
Bharath wants to make changes to the Windows Registry. What tool should he select? Question 4 a.notepad.exe b.regwiz.msc c.regedit d.secpol.msc
c.regedit
Nandita has encountered an attacker who appears to be using a commonly available exploit package to attack her organization. The package seems to have been run with default configurations against her entire public-facing Internet presence from a single system. What type of threat actor is she most likely facing? Question 8 a.An APT b.A hacktivist c.A nation-state actor d.A script kiddie
d.A script kiddie
What tool can administrators use to help identify the systems present on a network prior to conducting vulnerability scans? Question 8 a.Web application assessment b.Router c.DLP d.Asset inventory
d.Asset inventory
Which one of the following values for the confidentiality, integrity, or availability CVSS metric would indicate the potential for total compromise of a system? Question 7 a.M b.N c.L d.H
d.H
Which one of the following values for the CVSS attack complexity metric would indicate that the specified attack is simplest to exploit? Question 5 a.Medium b.Severe c.High d.Low
d.Low
Which of the following technologies is best suited to prevent wired rogue devices from connecting to a network? Question 8 a.Port security b.PRTG c.NTP d.NAC
d.NAC
Which of the following is not a common use of network segmentation? Question 3 a.Decreasing attack surfaces b.Increasing the efficiency of a network c.Decreasing attack surfaces d.Reducing availability
d.Reducing availability
Juan's organization uses LDAP to allow users to log into a variety of services without having to type in their username and password again. What type of service is in use? Question 10 a.MFA b.EDR c.ZeroAuth d.SSO
d.SSO
Which of the following activities follows threat data analysis in the threat intelligence cycle? Question 1 a.Threat data collection b.Gathering feedback c.Threat data review d.Threat intelligence dissemination
d.Threat intelligence dissemination
Megan wants to use the Metasploit Framework to conduct a web application vulnerability scan. What module from the following list is best suited to her needs? Question 3 a.nmap b.Angry IP c.smb_login d.wmap
d.wmap
____________is a method of establishing the authenticity of specific objects, such as an individual's public key or downloaded software. A. Certificates B. Tokens C. multifactor authentication D. mutual authentication
A. Certificates
____________can be deployed on a system before a modification and then again after that modification to analyze the changes to various system properties as a result of the modification. A. Security Compliance Manager B. Windows Defender C. Attack Surface Analyzer
A. Security Compliance Manager
Several different wireless bands are in common use today, the most common of which is the Wi-Fi series, referring to the 802.11 Wireless LAN standards certified by the_____________________ A. Wi-Fi Alliance B. ACM C. ITU D. IEEE
A. Wi-Fi Alliance
