Cyber Security Operation

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

When referring to the three steps in the establishment of proper privileges, AAA stands for ?

Authentication,Authorization,Accounting

____________________are a form of operating system virtualization; they are a packaged-up combination of code and dependencies that help applications run quickly in different computing environments. A. Rootkits B. Scripts C. Zones D. Containers

D. Containers

___________refers to a process by which the user escalates their privilege level, bypassing the operating system's controls and limitations A. Segmentation B. BYOD C. Off‑boarding D. Jailbreaking

D. Jailbreaking

A ___________ is a more formal, larger software update that can address several or many software problems. A. Script B. Log C. hotfix D. patch

D. patch

Which term refers to a network connection used to interconnect virtual private clouds and on-premises networks? Question 2 A.certificate repository B.digital sandbox C.captive portal D.transit gateway

D.transit gateway

Application blacklisting is essentially noting which applications should be allowed to run on the machine. Question 4 True False

False

Bollards obscure vision, just as a wall or fence might. Question 6 True False

False

Service pack is the term for a small software update designed to address a specific problem, such as a buffer overflow in an application that exposes the system to attacks. Question 5 True False

False

Telnet uses TCP port 25. Question 9 Answer True False

False

The most common tools for an attacker to use against wireless technology are reception-based programs. Question 2 True False

True

What flag does nmap use to enable operating system identification? Question 1 a.-O b.-id c.-osscan d.-os

a.-O

Organizations like Anonymous, which target governments and businesses for political reasons, are examples of what type of threat actor? Question 7 a.Hacktivists b.Military assets c.Organized crime d.Nation-state actors

a.Hacktivists

Which party in a federated identity service model makes assertions about identities to service providers? Question 8. a.IDPs b.CDUs c.RPs d.Aps

a.IDPs

What organizations did the U.S. government help create to help share knowledge between organizations in specific verticals? Question 9 a.ISACs b.CERTs c.SANS d.DHS

a.ISACs

Which one of the CVSS metrics would contain information about the type of account access that an attacker must have to execute an attack? Question 1 a.PR b.C c.AV d.AC

a.PR

Valerie wants to use a graphical interface to control nmap and wants to display her scans as a visual map to help her understand her target networks. What tool from the following list should she use? Question 2 a.Zenmap b.wmap c.nmap-gs d.Angry IP Scanner

a.Zenmap

Murali wants to scan a network using nmap and has run a scan without any flags without discovering all of the hosts that he thinks should show. What scan flag can he use to scan without performing host discovery that will also determine if services are open on the systems? Question 4 a.-PS b.-Pn c.-sn d.-sL

b.-Pn

Naomi wants to make her applications portable and easy to move to new environments without the overhead of a full operating system. What type of solution should she select? Question 9 a.A SASE solution b.Containerization c.Virtualization d.An x86 architecture

b.Containerization

Which type of organization is the most likely to face a regulatory requirement to conduct vulnerability scans? Question 1 a.Bank b.Government agency c.Hospital d.Doctor's office

b.Government agency

Which one of the following industry standards describes a standard approach for setting up an information security management system? Question 2 a.ISO 27002 b.ISO 27001 c.CIS d.OWASP

b.ISO 27001

Tom is reviewing a vulnerability scan report and finds that one of the servers on his network suffers from an internal IP address disclosure vulnerability. What technology is likely in use on this network that resulted in this vulnerability? Question 8 a.SSH b.NAT c.TLS d.VPN

b.NAT

Which of the following threat actors typically has the greatest access to resources? Question 5 a.Insider threats b.Nation-state actors c.Hacktivists d.Organized crime

b.Nation-state actors

Jen's organization wants to ensure that administrator credentials are not used improperly. What type of solution should Jen recommend to address this requirement? Question 5 a.PKI b.PAM c.SAML d.CASB

b.PAM

What Windows tool provides detailed information, including information about USB host controllers, memory usage, and disk transfers? Question 10 a.Resmon b.Perfmon c.Statmon d.Winmon

b.Perfmon

Susan wants to start performing intelligence gathering. Which of the following options is frequently conducted in the requirements gathering stage? Question 10 a.Review of current data handling standards b.Review of security breaches or compromises your organization has faced c.Review of current vulnerability scans d.Review of threat intelligence feeds for new threats

b.Review of security breaches or compromises your organization has faced

What can the MAC address of a rogue device tell you? Question 1 a.The TTL of the device b.The manufacturer of the device c.Its operating system version d.What type of rogue it is

b.The manufacturer of the device

Which one of the following metrics is not included in the calculation of the CVSS exploitability score? Question 3 a.Privileges required b.Vulnerability age c.Attack complexity d.Attack vector

b.Vulnerability age

Which one of the following operating systems should be avoided on production networks? Question 10 a.Ubuntu 22 b.Windows Server 2008 R2 c.Red Hat Enterprise Linux 9 d.Debian Linux 11

b.Windows Server 2008 R2

What design concept requires that each action requested be verified and validated before it is allowed to occur? Question 6 a.Extended validation network b.Zero trust c.Trust but verify d.Secure access service edge

b.Zero trust

Which of the following Linux commands will show you how much disk space is in use? Question 4 a.top b.df c.ps d.lsof

b.df

Tonya is configuring vulnerability scans for a system that is subject to the PCI DSS compliance standard. What is the minimum frequency with which she must conduct scans? Question 4 a.Weekly b.Monthly c.Quarterly d.Daily

c.Quarterly

Renee is configuring her vulnerability management solution to perform credentialed scans of servers on her network. What type of account should she provide to the scanner? Question 6 a.Domain administrator b.Local administrator c.Read-only d.Root

c.Read-only

Which one of the following is not an example of a vulnerability scanning tool? Question 10 a.Nikto b.Nessus c.Snort d.OpenVAS

c.Snort

What command-line tool can be used to determine the path that traffic takes to a remote system? Question 10 a.routeview b.Whois c.traceroute d.nslookup

c.traceroute

What is the most recent version of CVSS that is currently available? Question 2 a.3.2 b.2.0 c.2.5 d.3.1

d.3.1

What federal law requires the use of vulnerability scanning on information systems operated by federal government agencies? Question 9 a.GLBA b.FERPA c.HIPAA d.FISMA

d.FISMA

Cameron wants to check if a file matches a known-good original. What technique can he use to do so? Question 7 a.Check the file size and creation date. b.Use strings to compare the file content. c.Decrypt both the file and the original to compare them. d.Hash both the file and the original and compare the hashes.

d.Hash both the file and the original and compare the hashes.

Bethany is the vulnerability management specialist for a large retail organization. She completed her last PCI DSS compliance scan in March. In April, the organization upgraded their point-of-sale system, and Bethany is preparing to conduct new scans. When must she complete the new scan? Question 7 a.June. b.No scans are required. c.December. d.Immediately.

d.Immediately.

What information is used to identify network segments and topology when conducting an nmap scan? Question 6 a.Port numbers b.IP addresses c.Hostnames d.Time to live

d.Time to live

Which protection ring has the highest privilege level and acts directly with the physical hardware? Question 7 A.Ring 0 B.Ring 1 C.Ring 2 D.Ring

A.Ring 0

Which access control type would you use to grant permissions based on the sensitivity of the information contained in the objects? Question 6: A.mandatory access control B.Discretionary access control C.role-based access control D.rule-based access control

A.mandatory access control

What component or practice is the foundation of system security? Question 1 A.operating system B.password selection C.securing the firewall D.hardening applications

A.operating system

Which option is a short- to medium-range, low-power wireless protocol typically used for mobile phones, laptops, printers, and audio devices? Question 7 A.WPA2 B.Bluetooth C.WEP D.802.11n

B.Bluetooth

Which network security standard was created to provide users with an easy method of configuring wireless networks? Question 6 A.Wireless Transport Layer Security (WTLS) B.Wi-Fi Protected Setup (WPS) C.Protected EAP (PEAP) D.Wireless Application Protocol (WAP)

B.Wi-Fi Protected Setup (WPS)

What term refers to the process of establishing a system's operational state? Question 3 A.hardening B.baselining C.securing D.controlling

B.baselining

Which type of computing brings processing closer to the edge of the network, which optimizes web applications and IoT devices? Question 9 A.implicit B.edge C.recovery D.hybrid

B.edge

Which term refers to the disturbance on an electrical circuit caused by that circuit's reception of electromagnetic radiation? Question 5 A.convergence B.electromagnetic interference C.sunspots D.TEMPEST

B.electromagnetic interference

A(n) ____________ is a low-level program that allows multiple operating systems to run concurrently on a single host computer. A.cipher B.hypervisor C.subnet D. escrow

B.hypervisor

Which type of attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time? Question 3 A.denial of service B.replay C.evil twin D.man-in-the-middle

B.replay

_______________refers to any media used to boot a computer into an operating system (OS) that is not the native (OS) on its hard drive.

Bootdisk

which protocol provides for multiple-rate Ethernet over 2.4GHz spread-spectrum wireless. ? A. WAPW B. TLS C. 802.11b D. 804.11b

C. 802.11b

Stealing a computer, using a bootdisk to erase all data on the drives, or simply unplugging computers are all effective __________________________ attacks. A. Road Apple B. Man-in-the-middle C. Denial-of-service(DOS) D. Eavesdropping

C. Denial-of-service(DOS)

______________________are the three types of accounting records in TACACS+?. A. START,STOP AND DELETE B. Availibility,accounting and confidentiality C. START,STOP AND UPDATE D. Availibility , Integrity and confidentiality

C. START,STOP AND UPDATE

The traditional ROM-BIOS has been replaced with________ Question 9 A. ELAM B. BootSecure Boot C. Unified Extensible Firmware Interface (UEFI) D. Trusted Machine Platform

C. Unified Extensible Firmware Interface (UEFI)

In a Linux system, permissions are modified using the ______ command. A.tracert B.ifconfig C.chmod D.ipconfig

C.chmod

Which term refers to a set of wireless technologies that enables smartphones and other devices to establish radio communication when they are within close proximity to each other? Question 1: A.orthogonal frequency division band (OFDB) B.direct-sequence spread spectrum (DSSS) C.near field communication (NFC) D.802.11i

C.near field communication (NFC)

Which account is used to run processes that do not require human intervention to start/stop/administer? Question 4Se A.shared B.guest C.service D.privileged

C.service

what refers to a specific technique of using an HTTP client to handle authentication on a wireless network ?

Captive portal

Due to technological advances, which new category of shared "secrets" for authentication has emerged based on how users perform an action? Question 2 : A."What users know" B."What users have" C."What users are" D."What users do"

D."What users do"

Which access control type allows a company to restrict employee logon hours? Question 7 A.mandatory access control B.discretionary access control C.role-based access control D.rule-based access control

D.rule-based access control

Which term refers to the quarantine or isolation of a system from its surroundings? Question 8 A.demilitarized zoning B.read-only domain controller pruning C.egress filtering D.sandboxing

D.sandboxing

The presence of what element activates a photoelectric fire detector? Question 1 A.heat B.infrared energy C.lasers D.smoke

D.smoke

If your organization is highly sensitive to sharing resources, you might want to consider the use of a public cloud to reduce exposure and increase your control over security, processing, and handling of data. Question 8 True False

False

Split-tunnel is a form of VPN where all traffic is routed via the VPN. Question 5 True False

False

The primary reason that spread-spectrum technology is used in 802.11 protocols is to provide security. Question 10 True False

False

Tom wants to set an appropriate logging level for his Cisco networking equipment while he's troubleshooting. What log level should he set? Question 1 a.7 b.3 c.5 d.1

a.7

Jason is writing a report about a potential security vulnerability in a software product and wishes to use standardized product names to ensure that other security analysts understand the report. Which SCAP component can Jason turn to for assistance? Question 3 a.CPE b.OVAL c.CVSS d.CVE

a.CPE

Which one of the following is not a common source of information that may be correlated with vulnerability scan results? Question 9 a.Database tables b.Logs c.Configuration management system d.SIEM

a.Database tables

Tara recently analyzed the results of a vulnerability scan report and found that a vulnerability reported by the scanner did not exist because the system was actually patched as specified. What type of error occurred? Question 6 a.False positive b.True positive c.True negative d.False negative

a.False positive

Adam is conducting software testing by reviewing the source code of the application. What type of code testing is Adam conducting? Question 1 a.Static code analysis b.Dynamic code analysis c.Mutation testing d.Fuzzing

a.Static code analysis

After running an nmap scan, Geoff sees ports 80 and 443 open on a system he scanned. What reasonable guess can he make about the system based on this result? Question 5 a.The system is running a web server. b.The system is running a database server. c.The system is a Windows system. d.The system is a Linux system.

a.The system is running a web server.

Ric's organization wants to implement zero trust. What concern should Ric raise about zero trust implementations? Question 7 a.They can be complex to implement. b.Zero trust is not compatible with modern software-defined networks. c.Zero trust does not support TLS inspection. d.They are likely to prevent users from accomplishing their jobs.

a.They can be complex to implement.

Laura wants to conduct a search for hosts using Recon-ng but wants to leverage a search engine with API access to acquire existing data. What module should she use? Question 7 a.recon/domains-hosts/shodan_hostname b.recon/companies-multi/whois_miner c.import/list d.import/nmap

a.recon/domains-hosts/shodan_hostname

Jason gathers threat intelligence that tells him that an adversary his organization considers a threat likes to use USB key drops to compromise their targets. What is this an example of? Question 4 a.A probability assessment b.A possible attack vector c.His organization's attack surface d.An example of adversary capability

b.A possible attack vector

What type of assessment is particularly useful for identifying insider threats? Question 3 a.Habitual b.Behavioral c.IOCs d.Instinctual

b.Behavioral

How can Jim most effectively locate a wireless rogue access point that is causing complaints from employees in his building? Question 2 a.Nmap b.Signal strength and triangulation c.Connecting to the rogue AP d.NAC

b.Signal strength and triangulation

Felix want to gather threat intelligence about an organized crime threat actor. Where is he most likely to find information published by the threat actor ? Question 2 a.Social media b.The dark web c.Blogs d.Government bulletins

b.The dark web

Susan runs an nmap scan using the following command:nmap -O -Pn 192.168.1.0/255What information will she see about the hosts she scans? Question 9 a.The hostname and service ports b.The hostname, service ports, and operating system c.The hostname, uptime, and logged-in user d.The hostname and operating system

b.The hostname, service ports, and operating system

As part of her job, Danielle sets an alarm to notify her team via email if her Windows server uses 80 percent of its memory and to send a text message if it reaches 90 percent utilization. What is this setting called? Question 9 a.Page monitoring b.Perfmon calibration c.A monitoring threshold d.A preset notification level

c.A monitoring threshold

Tuan wants to gather additional information about a domain that he has entered in Maltego. What functionality is used to perform server-based actions in Maltego? Question 8 a.A worker b.A query c.A transform d.A scan

c.A transform

Bill would like to run an internal vulnerability scan on a system for PCI DSS compliance purposes. Who is authorized to complete one of these scans? Question 5 a.Any employee of the organization b.An approved scanning vendor c.Any qualified individual d.A PCI DSS service provider

c.Any qualified individual

What term describes a system sending heartbeat traffic to a botnet command-and-control server? Question 5 a.Zombie ping b.CNCstatus c.Beaconing d.CNClog

c.Beaconing

Which of the following measures is not commonly used to assess threat intelligence? Question 6 a.Accuracy b.Relevance c.Detail d.Timeliness

c.Detail

What type of network information should you capture to be able to provide a report about how much traffic systems in your network sent to remote systems? Question 6 a.Resmon data b.Syslog data c.Flow data d.WMI data

c.Flow data

Chris is reviewing a file that is part of an exploit package. He notes that there is a file that has content with curly brackets ({}) around statements. What file type from the following list he most likely reviewing? Question 3 a.Plain text b.XML c.JSON d.HTML

c.JSON

Kevin recently identified a new software vulnerability and computed its CVSS base score as 6.5. Which risk category would this vulnerability fall into? Question 4 a.Critical b.High c.Medium d.Low

c.Medium

Michelle has a security token that her company issues to her. What type of authentication factor does she have? Question 2 a.Inherence b.Knowledge c.Possession d.Biometric

c.Possession

Bharath wants to make changes to the Windows Registry. What tool should he select? Question 4 a.notepad.exe b.regwiz.msc c.regedit d.secpol.msc

c.regedit

Nandita has encountered an attacker who appears to be using a commonly available exploit package to attack her organization. The package seems to have been run with default configurations against her entire public-facing Internet presence from a single system. What type of threat actor is she most likely facing? Question 8 a.An APT b.A hacktivist c.A nation-state actor d.A script kiddie

d.A script kiddie

What tool can administrators use to help identify the systems present on a network prior to conducting vulnerability scans? Question 8 a.Web application assessment b.Router c.DLP d.Asset inventory

d.Asset inventory

Which one of the following values for the confidentiality, integrity, or availability CVSS metric would indicate the potential for total compromise of a system? Question 7 a.M b.N c.L d.H

d.H

Which one of the following values for the CVSS attack complexity metric would indicate that the specified attack is simplest to exploit? Question 5 a.Medium b.Severe c.High d.Low

d.Low

Which of the following technologies is best suited to prevent wired rogue devices from connecting to a network? Question 8 a.Port security b.PRTG c.NTP d.NAC

d.NAC

Which of the following is not a common use of network segmentation? Question 3 a.Decreasing attack surfaces b.Increasing the efficiency of a network c.Decreasing attack surfaces d.Reducing availability

d.Reducing availability

Juan's organization uses LDAP to allow users to log into a variety of services without having to type in their username and password again. What type of service is in use? Question 10 a.MFA b.EDR c.ZeroAuth d.SSO

d.SSO

Which of the following activities follows threat data analysis in the threat intelligence cycle? Question 1 a.Threat data collection b.Gathering feedback c.Threat data review d.Threat intelligence dissemination

d.Threat intelligence dissemination

Megan wants to use the Metasploit Framework to conduct a web application vulnerability scan. What module from the following list is best suited to her needs? Question 3 a.nmap b.Angry IP c.smb_login d.wmap

d.wmap

____________is a method of establishing the authenticity of specific objects, such as an individual's public key or downloaded software. A. Certificates B. Tokens C. multifactor authentication D. mutual authentication

A. Certificates

____________can be deployed on a system before a modification and then again after that modification to analyze the changes to various system properties as a result of the modification. A. Security Compliance Manager B. Windows Defender C. Attack Surface Analyzer

A. Security Compliance Manager

Several different wireless bands are in common use today, the most common of which is the Wi-Fi series, referring to the 802.11 Wireless LAN standards certified by the_____________________ A. Wi-Fi Alliance B. ACM C. ITU D. IEEE

A. Wi-Fi Alliance


Kaugnay na mga set ng pag-aaral

Chapter 55: Care of Patients with Stomach Disorders

View Set

Ecology Concept 4- Community and Ecosystem Ecology

View Set

Ch 47 Laboratory materials and procedures study guide DA105

View Set