cybersecurity midterm
In a security review meeting, you proposed a demilitarized zone for one of your company's data centers. You were then asked to explain the objective of having a DMZ in the data centers. Which of the following should be your answer? a. A DMZ will separate the secure facilities from unknown and potentially hostile outsiders. b. A DMZ will allow employees to relax between working hours and be more vigilant while working. c. A DMZ will open up a discussion about enterprise strategies to a broader employee base. d. A DMZ will monitor network traffic so that the cybersecurity team can focus on other threats.
A DMZ will separate the secure facilities from unknown and potentially hostile outsiders.
Which of the following best describes a faraday cage? a. A Faraday cage is used to dispose of electronic waste. b. A Faraday cage is an enclosure used to block electromagnetic fields. c. A Faraday cage blocks suspicious packets from entering an electronic device. d. A Faraday cage is used to charge the electronic devices.
A Faraday cage is an enclosure used to block electromagnetic fields.
Which of the following statements correctly describes the disadvantage of a hardware-based keylogger? a. A hardware-based keylogger can easily be detected in a network by an antivirus. b. A hardware-based keylogger can be detected by an antivirus when it scans for ports. c. A hardware-based keylogger must be physically installed and removed without detection. d. A hardware-based keylogger's data can be easily erased by the antimalware software installed in the device.
A hardware-based keylogger must be physically installed and removed without detection.
Which of the following best describes a mantrap? a. A mantrap separates threat actors from defenders. b. A mantrap cools a server room by trapping body heat. c. A mantrap is a small space with two separate sets of interlocking doors. d. A mantrap is a challenge given to cybersecurity experts.
A mantrap is a small space with two separate sets of interlocking doors.
Wilson has requested your help to suggest an encryption method that will provide the highest security against attacks. Which encryption process should you suggest? a. AES b. RC4 c. Blowfish d. 3DES
AES
Which of the following can be used to mitigate a limitation of public sharing centers in OSINT? a. AIS b. KRI c. HTTPS d. TTP
AIS
What are the primary features of a security information event management (SIEM) tool? a. Aggregation, correlation, event deduplication, time synchronization, and alerting b. Filtering, alerting, packet dropping, packet capturing, and traffic analyzing c. Bandwidth monitoring, alerting, and volume measuring d. Aggregation, deep packet investigation, and policy creation
Aggregation, correlation, event deduplication, time synchronization, and alerting
Which of the following devices is similar to Raspberry Pi? a. FPGA b. Arduino c. SoC d. Real-time operating system
Arduino
Which of the following is a major objective of packet analysis? a. Assess and secure networks b. Ensure physical security c. Calculate employee work hours d. Estimate network cost
Assess and secure networks
Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key? a. Public b. Ephemeral c. Symmetric d. Asymmetric
Asymmetric
Which of the following is an external perimeter defense method? a. Barrier b. Electronic lock c. Demilitarized zone (DMZ) d. Fire suppression
Barrier
Which of the following best describes bash? a. Bash is a physical security measure. b. Bash is computer hardware. c. Bash is a network assessment tool. d. Bash is a command language interpreter.
Bash is a command language interpreter.
Which penetration testing consultants are not given any knowledge of the network nor any elevated privileges? a. Gray box b. White box c. Black box d. Bug bounty
Black box
Japan's cybercrime control center noticed that around 200,000 Tokyo computers are infected by bots, and all these bots are remotely controlled by a single attacker. What is this attacker referred to as? a. Zombie b. Payload c. Bot herder d. Botnet
Bot herder
Jane, an IT security expert whose services are sought by XYZ Company, has recommended implementing CTR mode in the network. What is one requirement that needs to be fulfilled for computers to communicate when the CTR mode is implemented? a. Both sender and receiver should have access to a counter. b. Sender should have access to a counter. c. Receiver should have access to a counter. d. Neither sender nor receiver need access to a counter.
Both sender and receiver should have access to a counter.
Star Technology is working on a project that needs a communication mode specializing in encryption, where only authorized parties should understand the information. The company also requires accuracy, completeness, and reliability of data throughout the project. The company has contacted you for an ideal cipher mode solution without using a counter. Which mode should you suggest? a. GCM b. HTTPS c. CBC d. CTR
CBC
In which of the following mobile device connectivity methods are transmitters connected through a mobile telecommunication switching office (MTSO) that controls all of the transmitters in the cellular network and serves as the link between the cellular network and the wired telephone world? a. Wi-Fi b. Cellular c. Infrared d. Bluetooth
Cellular
Zyan works for ABC Technology. The enterprise wants to provide smartphones to all its employees. They can choose from a limited list of approved mobile devices. But they need to pay for the device themselves. The company will pay them a monthly stipend. Which deployment method should Zyan suggest to meet his company's needs? a. Virtual desktop infrastructure (VDI) b. Choose your own device (CYOD) c. Corporate-owned personally enabled (COPE) d. Corporate-owned device (COD)
Choose your own device (CYOD)
In an interview, the interviewer introduced the following scenario:An enterprise is hosting all its computing resources on a cloud platform, and you need to identify which vulnerability is most likely to occur.Which of the following should you choose? a. Physical access vulnerability b. Configuration vulnerability c. Zero-day vulnerability d. Third-party vulnerability
Configuration vulnerability
Your company recently purchased routers with new and updated features and deployed them in the highly secure enterprise network without changing the default settings. A few days later, the enterprise network suffered a data breach, and you are assigned to prepare a report on the data breach. Which of the following vulnerabilities should you identify as the source of the breach? a. Platform vulnerability b. Configuration vulnerability c. Third-party vulnerability d. Zero-day vulnerability
Configuration vulnerability
Which of the following is a state of data, where data is transmitted across a network? a. Data in processing b. Data at rest c. Data in transit d. 3DES
Data in transit
You are a security expert asked to protect the webservers hosted in your building from exposure to anyone other than server admins. Which of the following physical security method should you implement to achieve this? a. Protected cable distribution b. Demilitarized zones c. Vault d. Faraday cage
Demilitarized zones
John receives an encrypted document using asymmetric cryptography from Alex. Which process should Alex use along with asymmetric cryptography so that John can be sure that the received document is real, from Alex, and unaltered? a. Elliptic curve cryptography b. Digital signature algorithm c. Rivest-Shamir-Alderman d. Symmetric cryptography
Digital signature algorithm
A company has multiple CAs and intermediate CAs issuing digital certificates in different departments, with no one cross-checking their work. Which PKI trust model should the company use? a. Hierarchical trust model b. Bridge trust model c. Web of trust model d. Distributed trust model
Distributed trust model
What is meant by "the chain of trust" in boot security? a. Each step in the boot sequence relies on the confirmation of the hardware root of trust. b. Each step in the boot sequence relies on the confirmation from the previous boot sequence step. c. Each step in the boot sequence relies on the operating system logs of the previous boot sequence for boot security. d. Each step in the boot sequence follows its own process independently, trusting the previous sequence step.
Each step in the boot sequence relies on the confirmation from the previous boot sequence step.
Which of the following is the most common method for delivering malware? a. Removable media b. Social media c. Email d. Identity theft
You are a cyber forensic expert wanting to protect devices retrieved from a crime scene from being remotely wiped of evidence. Which of the following physical security equipment should you use so that inbound and outbound signals cannot be sent or received? a. Cable locks b. Protected cable distribution c. Faraday bags d. Mantraps
Faraday bags
Which encryption method in BitLocker prevents attackers from accessing data by booting from another OS or placing the hard drive in another computer? a. Filesystem cryptography b. Blockchain c. GNU privacy guard d. Full disk encryption
Full disk encryption
You have been asked to implement a block cipher mode of operation that requires both the sender and receiver of the message to have access to a synchronous counter that adds an AAD to the transmission. Which operating block cipher mode should you use? a. ECB b. GCM c. CBC d. CTR
GCM
Which of the following penetration testing consultants have limited knowledge of the network and some elevated privileges? a. Gray box b. White box c. Black box d. Bug bounty
Gray box
Which of the following is considered an industry-specific cybersecurity regulation? a. Health Insurance Portability and Accountability Act of 1996 (HIPAA) b. Sarbanes-Oxley Act of 2002 (SOX) c. Personal Information Protection and Electronic Documents Act (PIPEDA) d. Gramm-Leach-Bliley Act (GLB)
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Which of the following protocols is embedded in a computer's operating system or communication hardware to secure internet communications? a. IPsec b. SSH c. TLS d. SRTP
IPsec
XYZ University wants to set up a VPN network to connect to the internet and ensure that all their data is safe. They have asked you to recommend the correct communication protocol to use. Which of the following protocols should you recommend and why? a. IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties. b. HTTPS, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties. c. TLS, because it is used to secure communications between a browser and a web server. This ensures data is safe in communications across the network. d. SSH, because it is used to secure communications between a browser and a web server. This ensures data is safe in communications across the network.
IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.
Threat actors focused on financial gain often attack which of the following main target categories? a. Product lists b. Individual users c. Social media assets d. REST services
Individual users
A company monitors the network activity of the organization and stores the logs in a database. You have been asked to identify whether there are any malicious activities in the network. Which of the following can denote the upper and lower bounds of their various network activities? a. KRI b. TTP c. OSI model d. Threat maps
KRI
Which of the following computing platforms is highly vulnerable to attacks? a. On-premises b. Cloud c. Legacy d. Hybrid
Legacy
Alice, a vulnerability assessment engineer at a bank, is told to find all the vulnerabilities on an internet-facing web application server running on port HTTPS. When she finishes the vulnerability scan, she finds several different vulnerabilities at different levels. How should she proceed? a. Only look at the highest priority vulnerability b. Look at the priority and the accuracy of the vulnerability c. Only look at the accuracy of the vulnerability d. Escalate the situation to a higher analyst
Look at the priority and the accuracy of the vulnerability
Which of the following tools allow a mobile device to be managed remotely by an organization and typically involve a server sending out management commands to mobile devices? a. SIEM b. MDM c. Threat hunting d. DLP
MDM
In an interview, you are given the following scenario:David sent a message to Tina saying, "There is no school today!" For some reason, the message showed up on Tina's device as, "Come to the school ASAP!" You (the candidate) are asked to name the type of attack that would cause this situation.Which of the following should you identify? a. MITM b. DDoS c. Macro attack d. DNS hijacking
MITM
Dan uses his personal laptop for writing the script for an upcoming high-budget, highly anticipated movie. To keep the script private, he decided not to connect his laptop to any network and updated his system with the latest virus definitions and security patches. Which of the following is Dan's laptop still vulnerable to? a. Malicious USB b. DDoS c. DNS poisoning d. Cross-site scripting
Malicious USB
Spectrum Technologies uses SHA-256 to share confidential information. The enterprise reported a breach of confidential data by a threat actor. You are asked to verify the cause of the attack that occurred despite implementing secure cryptography in communication. Which type of attack should you consider first, and why? a. Known ciphertext attack; the attacker can create the cryptographic keys from ciphertext because of the SHA-256 algorithm. b. Downgrade attack; SHA-256 is vulnerable to downgrades in the operating system to earlier versions, allowing threat actors to easily attack. c. Misconfiguration attack; the company should have configured a higher security hash algorithm rather than using the less-secure SHA-256. d. Collision attacks; the threat actor has created a malicious file with the same digest using SHA-256.
Misconfiguration attack; the company should have configured a higher security hash algorithm rather than using the less-secure SHA-256.
Keily is a vulnerability assessment engineer. She is told to find surface vulnerabilities on all internet-facing web servers in the network. Which of the following are surface vulnerabilities that she should initially chase? a. Missing patches, lack of OS hardening, network design flaw, lack of application hardening, weak passwords, and misconfigurations b. Lack of OS hardening, network design flaw, lack of application hardening, weak passwords, misconfigurations, and SQL Injections c. Lack of OS hardening, network design flaw, lack of application hardening, misconfigurations, and brute force d. Lack of OS hardening, network design flaw, weak passwords, and misconfigurations
Missing patches, lack of OS hardening, network design flaw, lack of application hardening, weak passwords, and misconfigurations
Which of the following tools can be used to scan 16 IP addresses for vulnerabilities? a. Nessus Essentials b. Nessus c. QualysGuard d. App Scan
Nessus Essentials
Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an action? a. Confidentiality b. Nonrepudiation c. Obfuscation d. Authentication
Nonrepudiation
Sheena wants to make sure that her browser activity is safe and prevent others from intercepting her data as it is transmitted over the browser. What should Sheena do to achieve this objective? Fill all her forms through hidden fields only Send a secure cookie over the browser to the server Only visit websites that are hosted over HTTPS or HSTS Make sure that the content security policy is in place
Only visit websites that are hosted over HTTPS or HSTS
Which of the following uses hardware encryption technology to secure stored data and ensures the inseparability of SEDs among vendors? a. Pad b. Key c. Opal d. Qubits
Opal
You are a security administrator asked to create a certificate signing request (CSR) to secure your enterprise's website. Which of the following tools should you use to accomplish this? a. Cuckoo b. sn1per c. OpenSSL d. Nessus
OpenSSL
Which of the following compliance standards was introduced to provide a minimum degree of security to organizations who handle customer information such as debit card and credit card details daily? a. PCIDSS b. SOX c. FISMA d. GLB
PCIDSS
Which of the following is defined as a structure for governing all the elements involved in digital certificate management? a. PKI b. Web of trust model c. M-of-N control d. CA
PKI
Which of the following is used to create a sequence of numbers whose output is close to a random number? a. GnuPG b. RSA c. DSA d. PRNG
PRNG
John is a project manager with an IT firm, and his current project of developing an ERP application is in the development stage. Currently, the application is not yet mature or stable enough to be placed in a test environment. Which of the following secure coding review techniques is applicable for his project? a. Perform static code analysis b. Perform dynamic code analysis c. Perform a structured manual analysis of code d. Perform a static binary code analysis
Perform static code analysis
Which of the following is a social engineering method that attempts to influence the subject before the event occurs? a. Spear phishing b. Redirection c. Prepending d. Watering hole
Prepending
Khalid joins a security team where he is assigned an SOC developer role and has to build different teams under SOC. Which of the following teams should he build to deal with providing real-time feedback related to security incidents and threat detections, which can then be utilized to facilitate better prioritization of threats and a mature way of detecting threats? a. Red team b. Blue team c. Purple team d. White team
Purple team
Kainat is asked to suggest a cipher in which the entire alphabet is rotated (as in, A=N, B=O), making it difficult to identify.Which cipher should she suggest? a. 3DES b. ROT13 c. XOR d. AES
ROT13
What does ransomware do to an endpoint device? a. Ransomware infects the endpoint devices and launches attacks on the infected endpoint and other devices connected to the network. b. Ransomware attacks the endpoint device without the consent of the user or the device, discreetly collecting and transmitting information, causing harm to the end user. c. Ransomware gets accidentally installed in the endpoint device as software along with other programs during the installation process. This happens when the user's installation and download options are overlooked, thus affecting the user application adversely. d. Ransomware attacks the endpoint device holding it hostage by preventing it from functioning unless the user fulfills the ransom payment demanded.
Ransomware attacks the endpoint device holding it hostage by preventing it from functioning unless the user fulfills the ransom payment demanded.
Fatima is responsible for conducting business transactions for XYZ Company, and she only had the stored private key. She is on leave and currently unavailable, and the organization needs to complete an urgent business transaction. Which of the following methods should enable the organization to access Fatima's private key and digital certificate? a. Escrow b. Recovery c. Revocation d. Renewal
Recovery
Which of the following digital certificates are self-signed and do not depend on the higher-level certificate authority (CA) for authentication? a. Intermediate digital certificates b. Domain digital certificates c. Root digital certificates d. User digital certificates
Root digital certificates
Which type of malware can hide its agenda inside other processes, making it undetectable, and what is it usually used for? a. RAT, an executable program that gives unauthorized remote access to a user's computer b. Trojan, an executable program that pretends to perform a harmless activity while doing something malicious c. Rootkit, a malware that uses the lower layers of the operating system or undocumented functions to make alterations to the operating system's processes d. Backdoor, which gives access to a computer, program, or service that overrides any normal security protections
Rootkit, a malware that uses the lower layers of the operating system or undocumented functions to make alterations to the operating system's processes
Which of the following devices can perform cryptographic erase? a. SED b. HSM c. TPM d. USB device encryption
SED
Which of the following protocols can be used as a tool for secure network backups? a. SSL b. TLS c. SSH d. HTTPS
SSH
What is the name of the process where a website validates user input before the application uses the input? a. Tokening b. Sanitizing c. Authorizing d. Eliminating
Sanitizing
A cyber analyst needs to quickly do a vulnerability scan on an enterprise network with many devices. Which approach should the analyst take? a. Scan all devices, each for a very short time b. Scan the most important devices for as long as it takes for each device c. Scan only infrastructure devices for a very short time d. Scan all endpoint devices
Scan the most important devices for as long as it takes for each device
What is meant by "infrastructure as code" in SecDevOps? a. SecDevOps method of managing software and hardware using principles of developing code b. SecDevOps method of managing the infrastructure as a service c. SecDevOps method of managing the infrastructure as a software d. SecDevOps method of managing code as infrastructure
SecDevOps method of managing software and hardware using principles of developing code
Which of the following sets consists of only the core features of a mobile or computing device? a. Small form factor, mobile operating system, wireless data network interface for internet access, global positioning system (GPS), local non-removable data storage b. Small form factor, mobile operating system, wireless data network interface for internet access, app stores, local non-removable data storage c. Small form factor, mobile operating system, wireless data network interface internet access, app stores, removable storage media d. Small form factor, mobile operating system, microphone and/or digital camera, app stores, local non-removable data storage
Small form factor, mobile operating system, wireless data network interface for internet access, app stores, local non-removable data storage
Which of the following sets consists of only the core features of a mobile or computing device? a. Small form factor, mobile operating system, wireless data network interface for internet access, global positioning system (GPS), local non-removable data storage b. Small form factor, mobile operating system, wireless data network interface for internet access, app stores, local nonremovable data storage c. Small form factor, mobile operating system, wireless data network interface internet access, app stores, removable storage media d. Small form factor, mobile operating system, microphone and/or digital camera, app stores, local non-removable data storage
Small form factor, mobile operating system, wireless data network interface for internet access, app stores, local nonremovable data storage
Which algorithm encrypts and decrypts data using the same key? a. Hash algorithm b. Symmetric cryptographic algorithm c. Rivest-Shamir-Adleman algorithm d. Asymmetric cryptographic algorithm
Symmetric cryptographic algorithm
Which of the following protocols are used to secure HTTP? a. TLS and SSH b. TLS and SSL c. TLS and SRTP d. SSH and SSL
TLS and SSL
Which of the following are categories of vulnerabilities in mobile device connections that can also be exploited by threat actors? a. Tethering, USB-on-the-go (OTG), malicious USB cable, location tracking b. Tethering, USB-on-the-go (OTG), malicious USB cable, hotspots c. Tethering, USB-on-the-go (OTG), limited updates, hotspots d. Limited updates, USB-on-the-go (OTG), malicious USB cable, hotspots
Tethering, USB-on-the-go (OTG), malicious USB cable, hotspots
Which of the following describes the action of an SQL injection into a database server? a. The SQL injection inserts specially created extensible markup language to manipulate the database taking control of the database giving control to the attacker to manipulate the database. b. The SQL injection inserts specially created structured query language statements to manipulate the database server, giving control of the database to the attacker, who can then manipulate the database. c. The SQL injection inserts code into the DLL running process, causing the program to function differently than intended. d. The SQL injection is specially created code inserted into a legitimate program, which then lies dormant unless a special logical event triggers it.
The SQL injection inserts specially created structured query language statements to manipulate the database server, giving control of the database to the attacker, who can then manipulate the database.
Natasha, a network security administrator for an online travel portal, noticed that her website was the victim of an SQL injection. She decided to study the SQL queries to find which one made this vulnerability in the database, and she noticed the following SQL code piece executed on the database: 'whatever' AND email IS NULL; What has been accessed by the attacker running this SQL injection? a. The attacker accessed the data of specific users. b. The attacker accessed the entirety of email address data from all users in the database. c. The attacker has used the SQL injection to delete the table in the database. d. The attacker has determined the names of different types of fields in the database.
The attacker has determined the names of different types of fields in the database.
A few computers at a high-security software firm location have been compromised. The threat actor took user videos, confidential information like bank account IDs and passwords, email IDs and passwords, and computer screenshots. These confidential data have been shared every three hours from the computers to the threat actor. Which of the following is correct, based on the evaluation of the above observation? a. This is a software keylogger attack, as it is sharing the information every three hours to the attacker. b. This is a hardware keylogger attack; it is only periodically sharing the information and is a manual transfer of information by a human agent. c. This is a software keylogger attack, as screenshots, video captures, and keystrokes have been routinely monitored and periodically shared. d. This is a hardware keylogger attack, as video capture functionality and periodic transfer of data are not possible with a software keylogger.
This is a software keylogger attack, as screenshots, video captures, and keystrokes have been routinely monitored and periodically shared.
Zeda Corporation provides online training solutions to global customers. To provide e-learning solutions, it integrates with multiple vendor platforms. This ensures seamless transfer to multiple operators' solutions through sign on. Joe, an IT security administrator, noticed that a threat actor has attacked the platform and stolen the user data. The source of this vulnerability was identified as one of the integrated external applications.What type of attack is this? a. This is an API attack. b. This is a device driver manipulation attack. c. This is a backdoor attack. d. This is an AI attack.
This is an API attack
Which of the following best describes trusted location in MS Office? a. Trusted location is used to lock important files. b. Trusted location allows you to run macros-enabled files with no security restrictions. c. Trusted location allows you to prevent infected files from damaging the system. d. Trusted location is the place where operating system files are stored.
Trusted location allows you to run macros-enabled files with no security restrictions.
Which encryption is a chip on the motherboard of a computer that provides cryptographic services? a. Trusted platform module b. Hardware security module c. Self-encrypting hard disk drives d. File and File system cryptography
Trusted platform module
Samira is developing a virtual private chat application for ABC Consulting. The following are requirements provided by the organization while making the application: 1. All the communications should happen within the same network, host-to-host. 2. The information shared through this app should be kept confidential. Hence, the whole IP packet should be encrypted, giving access to only authorized personnel. 3. There should be a private network for host-to-host communication Which of the following modes should Sara consider for encryption in this project? a. Transport mode b. Tunnel mode c. GCM mode d. Counter mode
Tunnel mode
Which of following is a characteristic of electronic code book (ECB) mode? a. Only one character is processed at a time. b. It requires access to a synchronous counter for both the sender and receiver of the message. c. Each block of plaintext is XORed with the previous block of ciphertext before being encrypted, making it susceptible to attacks. d. Two identical plaintext blocks are encrypted into two identical ciphertext blocks, making them susceptible to attacks.
Two identical plaintext blocks are encrypted into two identical ciphertext blocks, making them susceptible to attacks.
Several websites use URLs similar to one of the most globally popular websites, attempting to attract traffic if a user misspells the popular website's URL. What is this social engineering technique called? a. Pharming b. Spam c. Tailgating d. Typo squatting
Typo squatting
Which of the following vulnerabilities involves connecting a flash drive infected with malware to a mobile device? a. Tethering b. USB-on-the-go (OTG) c. Malicious USB cable d. Hotspots
USB-on-the-go (OTG)
Which of the following provides confidentiality services? a. Unauthentication mode b. Authentication mode c. Stream cipher mode d. Transport mode
Unauthentication mode
Kelly is asked to choose a mobile management tool that provides a single management interface for all applications, content, and device management. Which of the following is the best one-step solution? a. Mobile content management (MCM) tool b. Mobile device management (MDM) tool c. Unified environment management (UEM) tool d. Mobile application management (MAM) tool
Unified environment management (UEM) tool
A vulnerability assessment engineer performed vulnerability scanning on active directory servers and discovered that the active directory server is using a lower version of Kerberos. To alert management to the risk behind using a lower version of Kerberos, he needs to explain what an attacker can do to leverage the vulnerabilities in it. Which of the following actions can the attacker perform after exploiting vulnerabilities in Kerberos? a. Use DLL injection b. Use privilege escalation c. Use a lateral movement d. Use a vertical movement
Use privilege escalation
Maze must establish a communication channel between two data centers. After conducting a study, she came up with the idea of establishing a wired connection between them since they have to communicate in unencrypted form. Considering the security requirements, Maze proposed using an alarmed carrier PDS over a hardened carrier PDS. Why would Maze make this suggestion in her proposal? a. Network speeds would be slowed too much if they used a hardened carrier PDS. b. Using a hardened carrier PDS would require someone to conduct periodic visual inspections. c. Using a hardened carrier PDS would restrict their ability to transfer large amounts of data. d. Data transmission between buildings wouldn't be possible if they used a hardened carrier PDS.
Using a hardened carrier PDS would require someone to conduct periodic visual inspections.
What is the most accurate explanation of sentiment analysis, and what kind of a tool or product can be utilized to perform this operation? a. Using text analysis techniques and IBM QRadar to interpret and classify emotions (positive, negative, and neutral) within text data b. Using Cisco Firepower for computationally identifying and categorizing opinions, usually expressed in response to textual data, to determine the writer's attitude toward a particular topic c. Using SIEM for combining many logs into one record based on IP addresses, usernames, and port numbers d. Using Wireshark for detecting hidden and persistent threats from a network
Using text analysis techniques and IBM QRadar to interpret and classify emotions (positive, negative, and neutral) within text data
Anola is the security administrator in XYZ consulting. She is asked to suggest a deployment method where the data is stored in a completely secure, centralized server and accessed by authorized employees using their own devices. Which deployment should Anola choose? a. Virtual desktop infrastructure (VDI) b. Choose your own device (CYOD) c. Corporate-owned personally-enabled (COPE) d. Corporate-owned device (COD)
Virtual desktop infrastructure (VDI)
Attackers have taken over a site commonly used by an enterprise's leadership team to order new raw materials. The site is also visited by leadership at several other enterprises, so infecting this site will allow for attacks on many organizations.Which type of malicious activity is this? a. Spear phishing b. Hoax c. Watering hole d. Vishing
Watering hole
Attackers have taken over a site commonly used by an enterprise's leadership team to order new raw materials. The site is also visited by leadership at several other enterprises, so taking this site will allow for attacks on many organizations.Which type of malicious activity is this? a. Spear phishing b. Hoax c. Watering hole d. Vishing
Watering hole
Which of the following is NOT an attack on cryptography? Algorithm attack Collision attack Watering hole attack Birthday attack
Watering hole attack
What is the inbuild application available to prevent threat actors from modifying the registry in a Windows 10 operating system? a. Windows 10 tamper protection b. Window 10 user interface c. Windows 10 registry editor d. Windows 10 command prompt
Windows 10 tamper protection
Which of the following is a standard format for digital certificates? a. JPG b. .cer c. MPEG-4 Part 14 d. X.509
X.509
Your enterprise is hosting a web app that has limited security. As a security administrator, you are asked to take appropriate measures to restrict threat actors from hijacking users' sessions. Which of the following is the most appropriate action for you to take? a. You should implement cryptography using OpenSSL. b. You should encrypt the session ID displayed on the URL. c. You should provide each user a unique static session ID. d. You should mention "log off after visit" on the web app.
You should implement cryptography using OpenSSL.
A new e-commerce startup with global operations is looking for a method to manage its supply-chain data for production. Instead of using bar codes, scanners, paper forms, and individual databases, making the system difficult to use, which method should be used to quickly track shipments? a. File and file system cryptography b. USB device encryption c. Full disk encryption d. Blockchain
blockchain
Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to verify and sign digital certificates for the company. They are looking for an option where, even in the absence of a CA, other CAs can issue the certificates. Additionally, they are also looking for CAs who will overlook other CAs in different locations. In such a scenario, which PKI trust model should they use? a. Distributed trust model b. Bridge trust mode c. Hierarchical trust model d. Web of trust model
bridge trust model
Photoplethysmography uses which type of light to measure heart rate on a wearable device? a. Red b. Green c. Infrared d. Ultraviolet
green
A source computer's ability to reach a specified destination computer can be tested using which of the following? a. curl b. ping c. ipconfig d. ifconfig
ping
What is a variation of a common social engineering attack targeting a specific user? a. Spear phishing b. Redirection c. Spam d. Watering holes
spear phishing
Which encryption is a chip on the motherboard of a computer that provides cryptographic services? a. Trusted platform module b. Hardware security module c. Self-encrypting hard disk drives d. File and File system cryptography
trusted platform module