Practice Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

inadequate buffer overflow protections

A drone manufacturer employs a real-time operating system (RTOS) to ensure timely task executions. While optimizing for real-time performance, which of the following security concerns might arise?

Limited security update capabilities

A power plant utilizes a specialized system to manage and monitor its daily operations, including machinery and sensor feedback. While these systems offer centralized control, what security concern is most associated with them?

Code Signing

A software development company regularly releases software updates to its global customer base. Recently, some customers reported receiving unauthorized and potentially malicious software updates. The company wants to implement a security technique to ensure the authenticity and integrity of its software updates when delivered to customers.

Supply chain

A tech company discovers that the firmware in some of their devices contains a hidden backdoor. Upon investigation, it's determined that the compromised firmware came from an overseas supplier they contracted with. The backdoor gave attackers remote access to devices without user knowledge. What type of attack vector has the company fallen victim to?

Reviewing event logs

After remedying a previously identified vulnerability in their systems, Kelly Innovations LLC wants to ensure that the remediation steps were successful. Which of the following the the BEST method that involves examining related system and network logs to enhance the vulnerability report validation process?

An attacker gained access, created the unauthorized account, and removed logs.

Alex, a network administrator, reviews logs from the company's main database server. He finds that every night at 3 AM, a backup process runs which generates a series of logs. However, on scanning through last week's data, he finds that logs from two nights are missing entirely. On further investigation, Alex discovers a new, unauthorized user account was created on one of those nights. What might Alex reasonably infer from these observations?

Automates the provisioning of account credentials.

An HR department for a large corporation is looking to streamline the onboarding process for new employees. How can scripting contribute to this goal in terms of system access?

Risk Tolerance

An investment firm allows a fluctuation of up to 10% in the value of its high-risk investment portfolio compared to the expected return on investment, but immediate action is required if this threshold is exceeded. This 10% fluctuation represents an example of:

The physical location of the user accessing the application

As a security analyst, you are reviewing application logs while investigating a suspected breach. Which of the following pieces of information is NOT typically documented in the application log data?

Installing the cable in a conduit buried underground

As part of a new building initiative, Dion Training Solutions plans to connect two office buildings via a direct physical link. Which measure will BEST protect the physical infrastructure connectivity?

Application rollback

At Kelly Innovations Corp., Sarah noticed that their core business application, which tracks customer orders, was not updating inventory levels accurately. A recent update seemed to have introduced a bug. Which of the following would offer the BEST solution?

Data Controller

At Kelly Innovations LLC, Susan has been entrusted with determining the purposes and means of processing personal data for the organization's new marketing campaign. She decides what data to collect, how long it will be retained, and with whom it will be shared. Which of the following BEST describes the role Susan is playing?

Certificate of Sanitization

Before disposing of old computers at Kelly Innovations LLC, Sasha receives a document that confirms all data has been securely removed. What is this document known as?

Inline

Clumsy Contraptions Engineering is seeking to change its security footing. In the past, they have found that too many pieces of malicious software have gotten past the system. Their Chief Security Officer believes they need a device which will actively evaluate traffic and reject or modify packets according to policies the company sets. What type of device is the CSO suggesting?

SD-WAN (Software-defined wide area network)

Dion Training Solutions is aiming to optimize their wide-area network (WAN) while ensuring advanced network management and performance optimization. They are considering a solution that can be deployed both on-premises and in the cloud. Which of the following technologies would BEST match their requirements?

Layer 7

Dion Training Solutions needs a network appliance capable of filtering traffic based on URL, HTTP headers, and specific web application functionalities. At which layer of the OSI model would this appliance primarily operate?

Attempting to access files outside of intended directories.

Dion Training has recently implemented a new web portal for their customers. During a routine security review, the IT team notices that some suspicious activities have been logged. An unknown user attempted to access the system with a strange pattern: when requesting a particular user file, instead of the usual URL structure ( /users/[username]/profile ) the system registered requests like ( /users/../admin/config ). Within a short span of time, several such patterns were identified, each trying to reach different sensitive files and directories. Given this information, which of the following types of attack is the user MOST likely attempting?

To test employees ability to recognize and report phishing attempts.

Dion Training is conducting a security awareness training program for its employees to enhance their cybersecurity knowledge. As part of this program, they have planned and executed phishing campaigns. Which of the following BEST describes the primary objective of phishing campaigns conducted during security awareness training?

Evidence of internal audits

Dion Training is considering a collaboration with a new IT service vendor. To ensure compliance and adherence to industry standards, Dion Training wishes to see verifiable evaluations of the vendor's security controls and practices. Which of the following would provide Dion Training with insights into the vendor's own internal evaluations of their security measures?

Simultaneous CEO logins from distant locations.

During a network investigation, Aiden, a cybersecurity analyst, identifies two key irregularities: The CEO, who tends to work late, logged in from both Paris and Tokyo within five minutes, and there's an unexpected surge in emails from the HR department outside of recruitment season. Which of the following should the analyst be MOST concerned about based on these observations?

Turning off all unused services and closing unnecessary ports

Enrique, the head of IT at Dion Training, is tasked with ensuring all deployed company systems adhere to a set of standardized configurations. He wants to reduce the attack surface as much as possible. Which of the following techniques would BEST reduce the organization's attack surface?

Centralized governance

Florence is the CEO of a company. She has the final say over all decisions made regarding the business, IT, accounting, and other departments. What type of governance does Florence's company have?

Web application firewall (WAF)

For ensuring the security of an HTTP application like WordPress or Magento against threats like SQL injection or cross-site scripting, which monitoring tool or method would be MOST appropriate?

Digital signatures

Georgina, a lawyer, needs to send a contract to their client for signature. She want to ensure that their client cannot later deny signing the contract. Which of the following methods can they use to prevent them from denying that they have signed contracts?

uninterruptible power supply (UPS)

Given the need for resilience and the ability to recover in a security architecture, which of the following devices ensures uninterrupted operation during a power outage?

reputational damage

Horizon Security, a cybersecurity training company, experienced a data breach due to a vendor's negligence. This breach led to a significant loss of sensitive customer information and damage to the company's reputation. What type of consequence is Horizon MOST likely to face?

$1,500

If a company's server has an estimated Single Loss Expectancy (SLE) of $15,000 due to an operational failure, and the Annual Rate of Occurrence (ARO) of these failures is expected to be 0.1 times per year, what is the Annual Loss Expectancy (ALE)?

Complexity

In regards to automation and orchestration, which of the following terms accurately captures the challenges faced when dealing with a system characterized by its intricate web of interconnected components and varied functionalities, potentially hindering seamless integration, effortless management, and straightforward comprehension?

Critical

Jamario, a security analyst at Dion Training, has just completed a vulnerability assessment on a company's internal web application. One of the vulnerabilities detected has a high likelihood of being exploited and, if successful, could expose sensitive customer data. Based on severity and potential impact, how should this vulnerability be classified?

Key exchange

Kelly Innovations Corp, an IT company, is implementing a process of encryption where two parties establish a shared secret for communication purposes. Which of the following MOST describes this process?

Disabling unnecessary services and protocols

Kelly Innovations LLC is redesigning its network infrastructure to support its expanding R&D team. Which of the following strategies will MOST effectively lessen the attack surface?

Layer 4

Kelly Innovations LLC wants to implement a network appliance that focuses on filtering traffic based on source and destination IP addresses, and port numbers. Which layer of the OSI model is this appliance primarily operating at?

Increased responsibility for physical security

Kelly Innovations decides to manage its IT infrastructure within its physical location, retaining full control over its hardware, software, and data. Which of the following security implications is MOST directly associated with this approach?

Risk Assessments

Lexicon, an AI company, wants to implement a security measure to identify and evaluate potential threats to their systems and networks. Which of the following is an example of a managerial security control that the company could implement?

802.1x

Reed & Jamario Security Services has recommended your company use a port based system to prevent unauthorized users and devices. Which of the following are they recommending?

it might not detect zero-day exploits.

Reed, a cybersecurity specialist at Dion Training Solutions, is optimizing the company's IPS. He notes that while signature-based detection is highly effective against known threats, it has some limitations. Which of the following BEST describes a limitation of signature-based detection in an IPS?

DAC (Discretionary Access Control)

Reginald, an IT Manager, is the owner of a file on a server and wants to grant his colleagues access to the file. He is the only one who can decide who is allowed access to the file and what actions they can perform on it. Which authorization model is being used in this scenario?

The signatures require tuning.

Susan, a security analyst at Kelly Innovations LLC, is reviewing alerts from the IPS. She recognizes a pattern of false positives from signature-based detections. Which of the following is the MOST likely cause for false positives in signature-based detection systems?

Risk Threshold

The executive team at a software development firm decides that any project with a potential financial impact greater than $500,000 due to a security incident will require an immediate review and intervention. This financial impact figure represents which of the following in risk management?

Layer 7 Firewall

To improve security at their law firm, Norah, a security analyst wants to implement a system that will selectively block or allow traffic based on the nature of the communication. Which firewall type would be MOST effective for this purpose?

Buffer overflow

Travid is evaluating an attack that has occurred on his organization's system. He sees that the attacker entered a lot of data into the the area of memory in the API that temporarily stores user input. What type of attack did Travid discover?

Frequency

What element of backup strategy involves making data copies regularly at set intervals?

Public Key

What is the name of a cryptographic key that can be freely distributed and used by others to encrypt messages?

Sanitization involves erasing data so it cannot be recovered; destruction is total physical demolition of the asset.

What is the primary difference between sanitization and destruction in the disposal process?

To ensure that the vendor's practices align with the organization's requirements

What is the purpose of a security analyst doing due diligence in the vendor selection process?

Risk tolerance

What term refers to an organization's predetermined level of acceptable risk exposure?

Partition encryption

What type of encryption only affects a section of a storage device?

Implementation of end-to-end encrypted email

When a legal organization routinely communicates with clients via email containing sensitive case details, which strategy would be the MOST effective to secure the communications?

Trapdoor function

When considering the RSA algorithm, which description BEST captures its underlying mathematical property used for public key cryptography?

Session management

When considering user interactions with a web service, which of the following are the security measures that involve the secure creation and transfer of identifiers as well as enforcing inactivity limits to prevent unauthorized access?

Reduced response time to security incidents

When evaluating the introduction of automated systems in a security operations center (SOC), which of the following is a prominent time-related benefit that security professionals might expect?

Public Key

When sending an encrypted message to Dion Training, a client would use which of the following to ensure only Dion Training can decrypt and read the message?

ECC (Elliptic curve cryptography)

Which asymmetric encryption technique provides a comparable level of security with shorter key lengths, making it efficient for cryptographic operations?

Criminal syndicate

Which group is MOST likely to possess the funding and resources to recruit top talent, including skilled strategists, designers, coders, and hackers?

Using a passphrase to generate a pairwise master key (PMK)

Which method accurately demonstrates the authentication process used in WPA2 Personal mode?

Disabling ports

Which mitigation technique involves shutting off specific entry and exit points in a system to prevent potential vulnerabilities or unauthorized access?

Monitoring

Which mitigation technique involves the use of tools like Nagios or Splunk to continuously observe and check the operation of a system or network?

Script Kiddie

Which of the following BEST describes a threat actor who primarily depends on commonly found tools, often easily accessible from the web or dark web?

laC

Which of the following BEST describes an approach where the foundational systems are set up and overseen using scripts and automated instruments instead of hands-on methods?

Decentralized Governance

Which of the following BEST describes an organizational structure that allows for autonomous decision-making in separate departments or sectors within the company?

Reduces repetitive and mundane tasks.

Which of the following BEST describes how automation and orchestration in cybersecurity operations influence employee satisfaction and retention?

It emphasizes the integration of security in software creation and maintenance.

Which of the following BEST describes the Software Development Life Cycle (SDLC) in application security?

Verify the legitimacy of the software vendor

Which of the following BEST describes the initial step to ensure a secure procurement process at Dion Training?

To provide historical insights into security incidents for future investigations

Which of the following BEST describes the primary purpose of archiving as a method to bolster security monitoring?

Defining the boundaries and limitations during the assessment

Which of the following BEST describes the primary purpose of establishing rules of engagement when conducting a security assessment for a third-party vendor?

Agent based NACs use additional software to authenticate users, while Agentless NACs use network level protocols to authenticate users.

Which of the following BEST explains the difference between an Agent-based and Agentless NAC?

Resi

Which of the following characteristics of a cloud architecture model describes a model that can quickly recover from failures due to adverse conditions?

Installation of endpoint protection

Which of the following hardening techniques can help protect systems or devices from attacks by installing software like a firewall or antivirus directly on user devices to report and block potential attacks?

End-of-life vulnerability

Which of the following hardware issues that results from products that are no longer being made or supported, but are still usable?

Ownership

Which of the following is an aspect of asset management that ensures that each IT asset is clearly associated with a specific individual or department, providing clarity on responsibilities and access rights?

Application allow list

Which of the following mitigation techniques can help enforce compliance with security standards and policies on a system or network by designating programs that are allowed to run and blocking all other programs from being run?

Host-based Firewall

Which of the following mitigation techniques can help protect a device from unauthorized network traffic solely by using software that can control network traffic based on predefined rules and policies?

Data exfiltration

Which of the following motivations refers to any act of stealing information from a system or network?

Port 1433

Which of the following ports, if left open and unmonitored, might allow database queries from unauthorized external sources?

Patching is the process of identifying and fixing security vulnerabilities in software, firmware, and operating systems to prevent potential exploits

Which of the following statements BEST explains the importance of Patching in the context of vulnerability management?

Enforcing baselines helps to standardize configurations across systems, enabling efficient automation and reducing the risk of security incidents.

Which of the following statements BEST explains the importance of enforcing baselines when automating and orchestrating secure operations?

Environmental variables refer to the unique characteristics of an organization's infrastructure that can affect vulnerability assessments and risk analysis

Which of the following statements BEST explains the importance of environmental variables in regard to vulnerability management?

Log aggregation increases the complexity of managing and interpreting security logs

Which of the following statements is NOT true about the importance of log aggregation?

Attestation

Which of the following terms BEST describes the validation of the accuracy and thoroughness of compliance-related reports?

encryption algorithm

Which of the following terms emphasizes the mathematical structure used to scramble data so that only a specific key can unscramble it?

Key risk indicators

Which of the following terms refers to critical predictive metric that organizations monitor to foresee potential risks and their impact on operations?

National legal implications

Which of the following terms refers to the specific laws and regulations set by a country's government that dictate how the personal data of its citizens should be collected, stored, and processed?

Shadow IT

Which of the following threats is MOST likely to accidentally cause harm to the system?

Time-of-check (TOC)

Which of the following vulnerabilities BEST describes a situation where a threat actor can manipulate data after it has been verified by an application, but before the application uses it for a specific operation?

Insecure interfaces and APIs

Which of the following vulnerabilities is unique to cloud computing environments, posing risks related to unauthorized access and data manipulation?

MTBF (Mean time between failures)

Which term is defined as the average operational period between the occurrence of two consecutive failures in a system or component?

It maintains the integrity of digital evidence over time.

While performing a digital investigation, which of the following statements BEST describes the role of preservation of evidence?

Compromised availability leading to operational disruptions.

Why might an organization be particularly concerned about introducing automation tools that become single points of failure during secure operations?

implementing a central OAuth authorization server to handle user authentication and issue access tokens to third-party applications

You are a cybersecurity analyst working for a software development company that develops mobile applications. The company wants to implement a secure and standardized method for users to grant third-party applications access to their account data without sharing their credentials. As a cybersecurity analyst, you recommend implementing OAuth for this purpose. Which of the following approaches would be the MOST effective way to implement OAuth in the given scenario?

Shadow IT

You are a security analyst at Dion Training and you discover that an unauthorized device has been connected to the company's network. As you investigate, you discover that the device was added so the employee could play video games during her breaks. What type of threat actor are you dealing with?


संबंधित स्टडी सेट्स

RD Exam- Principles of Normal Nutrition

View Set

Public Facility Management - Chapter 7

View Set

CIS 240 Chapter 8: Subnetting IP Networks

View Set

Mental health study questions: Townsend

View Set

Decimal Expanded Form and Comparing

View Set

Cognitive Psychology Ch8 Everyday Memory and Memory Errors

View Set

PSY 2012 GENERAL PSYCHOLOGY QUIZ 12

View Set