問題一覧
1
A external forensics investigator has been hired to investigate a data breacid to the sensitive with numerous assets. It is known that the breach started in the DMZ and moved to the sensitve information, generating multiple logs as the attacker traversed through the etwork. Which of the following will BEST assist with this investigation?
Check the SIEM to review the correlated logs.
2
The human resources department of a large online retailer has received multiple customer complaints about the rudeness of the automated chatbots It uses to interface and assist online shoppers. The system, which continuously learns and adapts, was working fine when it was installed a few months ago. Which of the following BEST describes the method being used to exploit the system?
Tainted training data
3
Joe a security analyst, recently performed a network discovery to fully understand his organization's electronic footprint from a "public" perspective. Joe ran a set of commands and received the following output:
The organization had adequate information available in public registration., Joe used Who is to produce this output.
4
Which of the following is MOST likely to contain ranked and ordered intormation on tne likell and potential impact of catastrophic events that may affect business processes and systems, while also highlighting the residual risks that need to be managed after mitigating controls have been implemented?
A risk register
5
A network engineer at a company with a web server is building a new web environment with the following requirements: - Only one web server at a time can service requests. - the primary web server fails, a failover needs to occur to ensure the secondary web server becomes the primary. Which of the following load-balancing options BEST fits the requirements?
Active-passive
6
QUESTION 306 A university is opening a facility in a location where there is an elevated risk of theft The university wants to protect the desktops in its classrooms and labs. Which of the following should the university use to BEST protect these assets deployed in the facility?
Cable locks
7
A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Choose two.)
The provenance of the artifacts, The date and time
8
A company is setting up a web server on the Internet that will utilize both encrypted and unencrypted web-browsing protocols. A security engineer runs a port scan against the server from the Internet and sees the following output:
Block SSH access from the internet.
9
Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?
To keep all software and hardware fully patched for known vulnerabilities
10
An attacker was easily able to log in to a company's security camera by performing a baste online search for a setup guide for that particular camera brand and model. Which of the following BEST describes the configurations the attacker exploited?
Default settings
11
A cioud administrator is configuring five compute instances under the same subnet in a VPC. Three instances are required to communicate with one another, and the other two must he logically isolated from all other instances in the VPC. Which of the following must the administrator configure to meet this requirement?
Two security groups
12
An analvst is trying to identify insecure services that are running on the internal network. After performing a port scan the analyst identifies that a server has some insecure services enabled on default ports. Which of the following BEST describes the services that are currently running and the secure alternatives for replacing them (Select THREE)
SNMPV2 SNMPV3, Telnet SSH, HTTP, HTTPS
13
An attacker was easily able to log in to a company's security camera by performing a basic online search for a setup guide for that particular camera brand and model. Which of the following BEST describes the configurations the attacker exploited?
Default settings
14
A security architect at a large, multinational organization is concerned about the complexity and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location. Which of the following would BEST meet the architect's objectives?
Key Management Service
15
A security operations analyst is using the company's SIEM solution to correlate alerts, Which of the following stages of the incident response process is this an example of?
ldentification
16
A company uses specially configured workstations tor any work that requires administrator privileges to its Tier 0 and Tier 1 systems. The company follows a strict process to harden systems immediately upon delivery. Even with these strict security measures in place, an incident Occurred from one of the workstations. The root cause appears to be that the SoC was tampered with or replaced. Which of the following MOST likely occurred?
A supply-chain attack
17
A hospital's administration is concerned about a potential loss of patient data that is stored on tablets. A security administrator needs to implement controls to alert the SOC any time the devices are near exits. Which of the following would BEST achieve this objective?
Geofencing
18
A SOC is implementing an in sider-threat-detection program. The primary concern is that users may be accessing confidential data without authorization. Which of the following shoud be deployed to detecta potential insider threat?
A honeyfile
19
A desktop support technician recently installed a new document-scanning software program on a computer However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?
The software was not added to the application whitelist.
20
A company has been experiencing very brief power outages from its utlitiy company over the last few months. These outages only last for one second each time. The utility company is aware of the issue and is working to replace a faulty transformer. Which of the following BEST describes what the company should purchase to ensure its critical servers and network devices stay online?
A UPS
21
After a phishing scam for a user's credentials, the red team was able to craft a payload to deploy on a server. The attack allowed the installation of malicious software that initiates a new remote session. Which of the following types of attacks has occurred?
Privilege escalation
22
A security analyst notices several attacks are being blocked by the NIPS but does not see anything on the boundary firewall logs. The attack seems to have been thwarted. Which of the following resiliency techniques was applied to the network to prevent this attack?
Defense in depth
23
A network administrator at a large organization Is reviewing methods to improve the security of the wired LAN Any security improvement must be centrally managed and allow corporate-owned devices to have access to the intranet but limit others to Internet access only. Which of the following should the administrator recommend?
802.1X utilizing the current PKI infrastructure
24
An organization is having difficulty correlating events from its individual AV. EDR. DLP. SWG. WAF. MOM. HIPS, and CASB systems. Which of the following is the BEST way to improve the situation?
Utilize a SIEM to centralize togs and dashboards.
25
An attacker is attempting, to harvest user credentials on a client's website. A security analyst notices multiple attempts of random usernames and passwords. When the analyst types in a random username and password, the logon screen displays the following message: -The username you entered does not exist.- Which of the following should the analyst recommend be enabled?
Username lockout
26
A security analyst needs to implement security features across smartphones, laptops, and tablets. Which of the following would be the MOST effective across heterogeneous platforms?
Applying MDM sofware
27
The cost of removable media and the security risks of transporting data have become too great for a laboratory. The laboratory has decided to interconnect with partner laboratories to make data transfers easier and more secure. The Chief Security Officer (CSO) has several concerns about proprietary data being exposed once the interconnections are established. Which of the following security features should the network administrator implement to prevent unwanted data exposure to users in partner laboratories?
VLAN zoning with a file-transfer server in an external-facing zone
28
An organization's corporate offices were destroyed due to a natural disaster, so the organization is now setting up offices in a temporary work space. Which of the following will the organization MOST likely consult?
The disaster recovery plan
29
An organization recently recovered from a data breach. During the root cause analysis, the organization determined the source of the breach to be a personal cell phone that had been reported lost. Which of the following solutions should the organization implement to reduce the likelihood of future data breaches?
MDM
30
An organization relies on third-party video conferencing to conduct daily business. Recent security changes now require all remote workers to utilize a VPN to corporate resources. Which of the following would BEST maintain high-quality video conferencing while minimizing latency when connected to the VPN?
Configuring QoS properly on the VPN accelerators
31
A company just developed a new web application for a government agency. The application must be assessed and authorized prior to being deployed. Which of the following is required to assess the vulnerabilities resident in the application?
Static code analysis
32
A user must introduce a password and a USB key to authenticate against a secure computer, and authentication is limited to the state in which the company resides. Which of the following authentication concepts are in use?
Something you know, something you have, and somewhere you are
33
Image
Replay attack
34
A company's help desk received several AV alerts indicating Mimikatz attempted to run on the remote systems. Several users also reported that the new company flash drives they picked up in the break room only have 512KB of storage. Which of the following is MOST likely the cause?
The new flash drives need a driver that is being blocked by the AV software because the flash drives are not on the application's allow list, temporarily restricting the drives to 512KB of storage.
35
A security analyst is reviewing a penetration-testing report from a third-party contractor. The penetration testers used the organization's new APl to bypass a driver to perform privilege escalation on the organization's web servers. Upon looking at the API, the security analyst realizes the particular APl call was to a legacy system running an outdated OS. Which of the following is the MOST likely attack type?
Shimming
36
Which of the following utilize a subset of real data and are MOST likely to be used to assess the features and functions of a system and how it interacts or performs from an end user's perspective against defined test cases? (Choose two.)
Test, UAT
37
A network administrator is concerned about users being exposed to malicious content when accessing company cloud applications. The administrator wants to be able to block access to sites based on the AUP. The users must also be protected because many of them work from home or at remote locations, providing on-site customer support. Which of the following should the administrator employ to meet these criteria?
Implement an SWG.
38
An information security officer at a credit card transaction company is conducting a framework- mapping exercise with the internal controls. The company recently established a new office in Europe. To which of the following frameworks should the security officer map the existing controls? (Choose two.)
PCI DSS, GDPR
39
Several large orders of merchandise were recently purchased on an e-commerce company's website. The totals for each of the transactions were negative values, resulting in credits on the customers' accounts. Which of the following should be implemented to prevent similar situations in the future?
Ensure input validation is in place to prevent the use of invalid characters and values.
40
To mitigate the impact of a single VM being compromised by another VM on the same hypervisor, an admínistrator would like to utilize a technical control to further segregate the traffic. Which of the following solutions would BEST accomplish this objective?
Install a hypervisor firewall to filter east-west traffic.
41
A nationwide company is experiencing unauthorized logins at all hours of the day. The logins appear to originate from countries in which the company has no employees. Which of the following controls should the company consider using as part of its lAM strategy? (Choose two.)
Geofencing , Time-based logins
42
An furnished organization office has ro expanded its operations by opening a remote ofice, The new office is fully furnished with office resources to support up to 50 employees working on ay 9 Which of the following VPN solutions would BEST Support the new office?
Site-to-site
43
A security analyst has been reading about a newly discovered cyber attack from a known threat actor. Which of the following would BEST support the analyst's review of the tactics, techniques, and protocols the threat actor was observed using in previous campaigns?
The MITRE ATT&CK framework
44
Which of the following is the correct order of volatility from MOST to LEAST volatile?
Cache, memory, temporary filesystems, disk, archival media
45
After installing a Windows server, a cybersecurity administrator needs to harden it, following security best practices. Which of the following will achieve the administrator's goal? (Choose two.)
Disabling guest accounts, Disabling NetBlOS over TCP/IP
46
Accompany deployed a WIF access point in a public area and wants to harden the configuration to make it more secure. After performing an assessment, an analyst identifies that the access point is configured to use WPA3, AES, WPS, and RADIUS. Which of the following should the analyst disable to enhance the access point security?
WPS
47
Which of the following distributes data among nodes, making it more difficult to manipulate the data while also minimizing downtime?
Fog computing
48
A500 is implementing an insider threat detection program, The primary concern is that users ey be accessing confidential data without authorization. Which of the fallowing should be deployed to detect a potential insider threat?
A honeyfile
49
A security assessment found that several embedded systems are running unsecure protocols. These Systems were purchased two years ago and the company that developed them is no longer in business. Which of the following constraints BEST describes the reason the findings cannot be remediated?
Unavailable patch
50
A security analyst needs to find real-time data on the latest malware and loCs. Which of the following would BEST describes the solution the analyst should pursue?
Threat feeds
51
A web server has been compromised due to a ransomware attack. Further investigation reveals the ransomware has been in the server for the past 72 hours. The systems administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?
The last full backup that was conducted seven days ago
52
Which of the following would cause a Chief Information Security Officer (CISO) the MOST concern regarding newly installed Internet-accessible 4K surveillance cameras?
An inability to monitor 100%, of every facility could expose the company to unnecessary risk.
53
A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would BEST meet the requirement?
Homomorphic
54
A major political party experienced a server breach. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?
State actors
55
Which of the following often operates in a client-server architecture to act as a service repository, providing enterprise consumers access to structured threat intelligence data?
STIX
56
Image
Denial of servíce
57
Which of the following woulda European company interested in implementing a technical, hands- on set of security standards MOST Iikely choose?
GDPR
58
A security researcher is attempting to gather data on the widespread use of a Zero-day exploit. Which of the following will the researcher MOST likely use to capture this data?
A honeypot
59
An engineer is setting up a VDl environment for a factory location, and the business wants to deploy a low-cost solution to enable users on the shop floor to log in to the VDl environment directly. Which of the following should the engineer select to meet these requirements?
Thin clients
60
A security analyst is reviewing the following command-line output:
MAC address cloning
61
imagine
Physically check each system.
62
Which of the following should a data owner require all personnel to sign to legally protect intellectual property?
An NDA
63
A security administrator needs to inspect in-transit files on the enterprise network to search for Pll, credit card data, and classification words. Which of the following would be the BEST to use?
Network DLP solution
64
A security analyst must determine if either SSH or Telnet is being used to log in to servers. Which of the following should the analyst use?
netstat
65
A security administrator is trying to determine whether a server is vulnerable to a range of attacks. After using a tool, the administrator obtains the following output: HTTP/1.0 200 OK Content-Type: text/html Server: Apache root:s9fyf983#:0:1:System Operator:/:/bin/bash daemon :*:1:1::/tmp: userl:filsu3FE: 183:100:user: /home/users/uscrl: /bin/bash Which of the following attacks was successfully implemented based on the output?
Directory traversal
66
An organization's finance department is implementing a policy to protect against collusion. Which of the following control types and corresponding procedures should the organization implement to fulfill this policy's requirement? (Choose two.)
Mandatory vacations, Job rotation
67
A security analyst is investigating a vulnerability in which a default file permission was set incorrectly. The company uses non-credentialed scanning for vulnerability management. Which of the following tools can the analyst use to verify the permissions?
Is
68
A Chief Security Officer (CSO) is concerned about the volume and integrity of sensitive information that is exchanged between the organization and a third party through emal. The CSO is particularly concerned about an unauthorized party who is intercepting intormation that is in transit between the two organizations. Which of the following would address the CSO’s concerns?
DKIM
69
Which of the following BEST describes the MFA attribute that requires a callback on a predefined landline?
Something you can do
70
A multinational organization that offers web-based services has datacenters that are located only in the United States; however, a large number of its customers are in Australia, Europe, and China. Payments for services are managed by a third party in the United Kingdom that specializes in payment gateways. The management team is concerned the organization ís not compliant with privacy laws that cover some of its customers. Which of the following frameworks should the management team follow?
Payment Card Industry Data Security Standard
71
A remote user recently took a two-week vacation abroad and brought along a corporate-owned laptop. Upon returning to work, the user has been unable to connect the laptop to the VPN. Which of the following is the MOST likely reason for the user's inability to connect the laptop to the VPN? (Choose two.)
Due to foreign travel, the user's laptop was isolated from the network., The user's laptop was quarantined because it missed the latest patch update.
72
The concept of connecting a user account across the systems of multiple enterprises is BEST known as:
federation.
73
A Chief Executive Officer (CEO) is dissatisfied with the level of service from the company's new service provider. The service provider is preventing the CEO. from sending email froma work account to a personal account. Which of the following types of service providers is being used?
Managed security service provider
74
Entering a secure area requires passing through two doors, both of which require someone who is already inside to initiate access. Which of the following types of physical security controls does this describe?
Access control vestibule
75
The lessons-learned analysis from a recent incident reveals that an administrative office worker received a call from someone claiming to be from technical support. The caller convinced the office worker to visit a website, and then download and install a program masquerading as an antivirus package. The program was actually a backdoor that an attacker could later use to remote control the worker's PC. Which of the following would be BEST to help prevent this type of attack in the future?
Application whitelisting
76
A security administrator has noticed unusual activity occurring between different global instances and workloads and needs to identify the source of the unusual traffic. Which of the following log sources would be BEST to show the source of the unusual traffic?
CASB
77
A manufacturing company has several one-off legacy information systens that cannot be migrated to a newer OS due to software compatibility issues. The Oss are still supported by the vendor, but the industrial software is no longer supported. The Chief Information Security Officer(CISO) has created a resiliency plan for these systems that will allow OS patches to be installed in a non-production environment, while also creating backups of the systems for recovery. Which of the following resiliency techniques will provide these capabilities?
Full backups
78
Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?
A right-to-audit clause allowing for annual security audits
79
QUESTION 384 An incident, which is affecting dozens of systems, involves malware that reaches out to an Internet service for rules and updates. The IP addresses for the Internet host appear to be different in each case. The organization would like to determine a common loC to support response and recovery actions. Which of the following sources of information would BEST support this solution?
DNS query logs
80
Which of the following represents a biometric FRR?
Authorized users being denied access
81
A web server administrator has redundant servers and needs to ensure failover to the secondary server when the primary server goes down. Which of the following should the administrator implement to avoid disruption?
High availability
82
Which of the following is a cryptographic concept that operates on a fixed length of bits?
Block cipher
83
QUESTION 388 An organization regularly scans its infrastructure for missing security patches but is concerned about hackers gaining access to the scanner's account. Which of the following would be BEST to minimize this risk?
Log and alert on unusual scanner account logon times.
84
The new Chief Executive Officer (CEO) of a large company has announced a partnership with a vendor that will provide multiple collaboration applications to make remote work easier. The company has a geographically dispersed staff located in numerous remote offices in different cOuntries. The company's IT administrators are concerned about network traffic and load if all users simultaneously download the application. Which of the following would work BEST to allow each geographic region to download the software without negatively impacting the corporate network?
Deploy all applications simultaneously.
85
A Chief Security Officer (CSO) was notified that a customer was able to access confidential internal company files on a commonly used file-sharing service. The file-sharing service is the same one used by company staff as one of its approved third-party applications. After further investigation, the security team determines the sharing of confidential files was accidental and not malicious. However, the CSO wants to implement changes to minimize this type of incident from reoccurring but does not want to impact existing business processes. Which of the following would BEST meet the CSO's objectives?
DLP
86
Which of the following is a reason why an organization would define an AUP?
To define the set of rules and behaviors for users of the organization's IT systems
87
A security analyst needs to perform periodic vulnerably scans on production systems. Which of the following scan types would produce the BEST vulnerability scan report?
Credentialed
88
To further secure a company's email system, an administrator is adding public keys to DNS records in the company's domain Which of the following is being used?
DNSSEC
89
An.. that has a large number of mobile devices is exploring enhanced security controls to manage unauthorized access if a device is lost or stolen. Specifically, if mobile devices are more than 3mi (4 8km) from the building, the management team would like to have the security team alerted and server resources restricted on those devices. Which of the following controls should the organization implement?
Geofencing
90
A customer called a company's security team to report that all invoices the customer has received over the last five days from the company appear to have fraudulent banking details. An investigation into the matter reveals the following: - The manager of the accounts payable department is using the same password across multiple external websites and the corporate account. - One of the websites the manager used recently experienced a data breach. - The manager's corporate email account was successfully accessed in the last five days by an IP address located in a foreign country Which of the following attacks has MOST likely been used to compromise the manager's corporate account?
Credential stuffing
91
An organization has implemented a two-step verification process to protect user access to data that 6 stored in the could. Each employee now uses an email address of mobile number a code to access the data. Which of the following authentication methods did the organization implement?
HOTP
92
A company Is concerned about is security after a red-team exercise. The report shows the team was able to reach the critical servers due to the SMB being exposed to the Internet and running NTLMV1, Which of the following BEST explains the findings?
Open ports and services
93
Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?
Risk tolerance
94
A network manager is concerned that business may be negatively impacted if the firewall in its datacenter goes offline. The manager would like to Implement a high availability pair to:
remove the single point of failure
95
A recent security assessment revealed that an actor exploited a vulnerable workstation within an organization and has persisted on the network for several months. The organization realizes the need to reassess its security strategy for mitigating risks within the perimeter. Which of the following solutions would BEST support the organization's strategy?
UTM
96
A security analyst is concerned about traffic initiated to the dark web form the corporate LAN. Which of the following networks should the analyst monitor?
Tor
97
A global company is experiencing unauthorized logging due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third-party identity provider to help mitigate these attacks. Which of the following would be the BEST Control for the company to require from prospective vendors'?
Multifactor authentication
98
A systems administrator needs to install the same X.509 certificate on multiple servers. Which of the following should the administrator use?
A self-signed certificate
99
An organization plans to transition the intrusion detection and prevention techniques on a critical subnet to an anomaly-based system. Which of the following does the organization need to determine for this to be successful?
The baseline
100
A small business ofice is setting up a wireless infrastructure with primary requirements centered around protecting customer information and preventing unauthorized access to the business network. Which of the following would BEST support the office's business needs? (Select TWO)
Configuring access using WPA3, Enabling MAC filtering