Jason Dion All quiz questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are in the kitchen cooking dinner while your spouse is in the other room watching the news on the television. The top story is about how hackers have been able to gain access to one of the state's election systems and tamper with the results. Unfortunately, you only heard a fraction of the story, but your spouse knows that you have been learning about hackers in your Security+ course and asks you, "Which type of hacker do you think would be able to do this?" Hacktivists Organized crime groups APTs Script Kiddies

APTs

Your company has created a baseline image for all of its workstations using Windows 10. Unfortunately, the image included a copy of Solitaire, and the CIO has created a policy to prevent anyone from playing the game on the company's computers. You have been asked to create a technical control to enforce the policy (administrative control) that was recently published. What should you implement? ​ Application whitelist Disable removable media Application blacklist Application hardening

Application blacklist

You have just walked up to the bank teller and requested to withdraw $100 from checking account #7654123 (your account). The teller asks for your name and driver's license before conducting this transaction. After she looks at your driver's license, she thanks you for your business, pulls out $100 from the cash drawer, and hands you back the license and the $100 bill. What category best describes what the bank teller just did? Accounting Authorization Authentication Availability

Authentication

Which mobile device strategy is most likely to result in the introduction of vulnerable devices to a corporate network? COPE (Company Owned/Personally Enabled CYOD (Choose Your Own Device) BYOD (Bring Your Own Device) MDM (Master Data Management

BYOD

Your smartphone begins to receive unsolicited messages while you are eating lunch at the restaurant across the street from your office. What might cause this to occur? Packet Sniffing Bluesnarfing Bluejacking Geotagging

Bluejacking

Your company's Security Operations Center (SOC) is currently detecting an ongoing DDoS attack against your network's file server. One of the cybersecurity analysts has identified forty internal workstations on the network that are conducting the attack against your network's file server. The cybersecurity analyst believes these internal workstations are infected with malware and places them into a quarantined area of the network. The analyst then submits a service desk ticket to have the workstations scanned and cleaned of the infection. What type of malware was the workstation likely a victim of based on the scenario provided? Spyware Botnet Rootkit Ransomware

Botnet

You are at the doctor's office and waiting for the physician to enter the room to examine you. You look across the room and see a pile of patient records on the physician's desk. There is no one in the room and your curiosity has gotten the better of you, so you walk across the room and start reading through the other patient records on the desk. Which tenant of security have you just violated? Authentication Confidentiality Integrity Availability

Confidentiality

Your company recently suffered a small data breach that was caused by an employee emailing themselves a copy of the current customer's names, account numbers, and credit card limits. You are determined that something like this shall never happen again. Which of the following logical security concepts should you implement to prevent a trusted insider from stealing your corporate data? ​ Firewall MDM DLP (Data Loss Prevention Strong passwords

DLP

A user reports that every time they try to access https://www.diontraining.com, they receive an error stating "Invalid or Expired Security Certificate". The technician attempts to connect to the same site from other computers on the network, and no errors or issues are observed. Which of the following settings needs to be changed on the user's workstation to fix the "Invalid or Expired Security Certificate" error? Logon times Date and time User access control UEFI boot mode

Date and time

Which of the following security controls provides Windows system administrators with an efficient way to deploy system configuration settings across a large number of devices? Patch management GPO (Group Policy Object) HIPS Anti-malware

GPO

What would administrators perform to reduce the attack surface of a system and to remove unnecessary software, services, and insecure configuration settings? Harvesting Windowing Hardening Stealthing

Hardening

You are trying to select the best device to install in order to detect an outside attacker who is trying to reach your internal network. The device should log the event, but it should not take any action to stop it. Which of the following devices would be the BEST for you to select? Proxy Authentication server IPS (Intrusion Prevention System) IDS (intrusion detection system)

IDS

The Security Operations Center Director for Dion Training received a pop-up message on his workstation that said, "You will regret firing me; just wait until Christmas!" He suspects the message came from a disgruntled former employee that may have set up a piece of software to create this pop-up on his machine. The director is now concerned that other code might be lurking within the network that could create a negative effect on Christmas. He directs his team of cybersecurity analysts to begin searching the network for this suspicious code. What type of malware should they be searching for? Worm Trojan Adware Logic Bomb

Logic Bomb

Tim, a help desk technician, receives a call from a frantic executive who states that their company-issued smartphone was stolen during their lunch meeting with a rival company's executive. Tim quickly checks the MDM administration tool and identifies that the user's smartphone is still communicating with the MDM and displays the location of the device on a map. What should Tim do next to ensure the data on the stolen device remains confidential and inaccessible to the thief? ​ Reset the device's password ​ Perform a remote wipe of the device ​ Remotely encrypt the device ​ Identify the IP address of the smartphone Question 3 of 3

Perform a remote wipe of the device

What is the lowest layer (bottom layer) of a bare-metal virtualization environment? Hypervisor Host operating System Guest Operating system Physical hardware

Physical hardware

In which type of attack does the attacker begin with a normal user account and then seeks to gain additional access rights? Privilege escalation Cross-site scripting Spear phishing Remote code execution

Privilege escalation

On your lunch break, you walked down to the coffee shop on the corner. You open your laptop and connect to their wireless network. After a few minutes of surfing the Internet, a pop-up is displayed on your screen. You close the pop-up, finish your lunch break, shut down the laptop, and put it back into your backpack. When you get back to the office, you take out the laptop and turn it on, but instead of your normal desktop background, you are greeted by a full screen image with a padlock and a message stating you have to pay 1 BTC to regain access to your personal files. What type of malware has infected your laptop? Trojan Spyware Ransomware Rootkit

Ransomware

A computer is infected with a piece of malware that has infected the Windows kernel in a effort to hide. Which type of malware MOST likely infected this computer? Ransomware Trojan Rootkit Botnet

Rootkit

You are reviewing the IDS logs and notice the following log entry :-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- (where [email protected] and password=' or 7==7') -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- What type of attack is being performed? XML injection SQL injection Header manipulation Cross-site scripting

SQL injection

A web developer wants to protect their new web application from a man-in-the-middle attack. Which of the following controls would best prevent an attacker from stealing tokens stored in cookies? Forcing the use of TLS for the web application Forcing the use of SSL for the web application Setting the secure attribute on the cookie Hashing the cookie value

Setting the secure attribute on the cookie

A user has reported that their workstation is running very slowly. A technician begins to investigate the issue and notices a lot of unknown processes running in the background. The technician determines that the user has recently downloaded a new application from the internet and may have become infected with malware. Which of the following types of infections does the workstation MOST likely have? ​ Rootkit Trojan Keylogger Ransomware

Trojan

You have been investigating how a malicious actor was able to exfiltrate confidential data from a web server to a remote host. After an in-depth forensic review, you determine that the web server's BIOS had been modified by the installation of a rootkit. After you remove the rootkit and re-flash the BIOS to a known good image, what should you do in order to prevent the malicious actor from affecting the BIOS again? Install an anti-malware application install a host-based IDS Utilize secure boot Utilize file integrity monitoring

Utilize secure boot

Which of the following vulnerabilities involves leveraging access from a single virtual machine to other machines on a hypervisor? VM escape VM migration VM sprawl VM data remnant

VM escape

You need to determine the best way to test operating system patches in a lab environment prior to deploying them to your automated patch management system. Unfortunately, your network has several different operating systems in use, but you only have one machine available to test the patches on. What is the best environment to utilize to perform the testing of the patches prior to deployment? Sandboxing Virtualization Purchase additional workstations Bypass testing and deploy patches directly into the production environment

Virtualization

Which type of threat will patches NOT effectively combat as a security control? Zero-day attacks Known Vulnerables Discovered software bugs Malware with defined indicators of compromise

Zero-day attacks


Ensembles d'études connexes

Chapter 14: The Movement to Objects

View Set

Life: (2:1) Completing the Application, Underwriting, and Delivering the Policy

View Set

Quality Control and Quality Assurance

View Set

ISDS Module 3 Computer Concepts Test

View Set

Pathophysiology: Chapter 7 Stress and Adaptation

View Set

Sports Management Final Odies Wright

View Set

EQUATIONS WITH PARENTHESES- UNIT 2

View Set

SBU2 Similarity Theorems and Postulates

View Set

Module 7: Onboarding, Training, and Developing Employees

View Set

Bio-2060 Lecture Ch.21//Lymphatic Capillaries 01

View Set