問題一覧
1
Recent changes to a company's BYOD policy require all personal mobile devices to use a two-factor authentication method that is not something you know or have. Which of the following will meet this requirement?
Facial recognition
2
A consultant is configuring a vulnerability scanner for a large, global organization in multiple countries. The consultant will be using a service account to scan systems with administrative privileges on a weekly basis, but there is a concern that hackers could gain access to the account and pivot through the global network. Which of the following would be BEST to help mitigate this concern?
Create different accounts for each region. limit their logon times, and alert on risky logins
3
After entering a username and password, an administrator must draw a gesture on a touch screen. Which of the following demonstrates what the administrator is providing?
Something you can do
4
A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).
Something you know, Something you have
5
An account was disabled after several failed and successful login connections were made from various parts of the Word at various times. A security analyst is investigating the issue. Which of the following account policies most likely triggered the action to disable the;
Impossible travel time
6
A security engineer was assigned to implement a solution to prevent attackers from gaining access by pretending to be authorized users. Which of the following technologies meets the requirement?
MFA
7
Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts?
Push notifications
8
A company wants to improve end users' experiences when they login to a trusted partner website. The company does not want the users to be issued separate credentials for the partner website. Which of the following should be implemented to allow users to authenticate using their own credentials to log in to the trusted partner's website?
Federation
9
A security analyst is tasked with defining the “something you are“ factor of the company’s MFA settings. Which of the following is BEST to use to complete the configuration?
Vein
10
A report delivered to the Chief Information Security Officer (CISO) shows that some user credentials could be exfiltrated. The report also indicates that users tend to choose the same credentials on different systems and applications. Which of the following policies should the CISO use to prevent someone from using the exfiltrated credentials?
MFA
11
An organization wants to implement a biometric system with the highest likelihood that an unauthorized user will be denied access. Which of the following should the organization use to compare biometric solutions?
FAR
12
Which biometric error would allow an unauthorized user to access a system?
False acceptance
13
The new Chief Information Security Officer at a company has asked the security team to implement stronger user account policies. The new policies require: ● Userstochooseapassworduniquetotheirlasttenpasswords ● Userstonotloginfromcertainhigh-riskcountries Which of the following should the security team implement? (Select TWO).
Password history, Geolocation
14
An amusement park is implementing a biometric system that validates customers' fingerprints to ensure they are not sharing tickets. The park's owner values customers above all and would prefer customers' convenience over security. For this reason, which of the following features should the security team prioritize FIRST?
Low FRR
15
The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve in the environment patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have been provided to frontline staff, and a risk analysis has not been performed. Which of the following is the MOST likely cause of the CRO’s concerns?
SSO would reduce the resilience and availability of the system if the provider goes offline.
16
A security analyst needs to recommend a solution that will allow current Active Directory accounts and groups to be used for access controls on both network and remote-access devices. Which of the following should the analyst recommend? (Select two).
RADIUS, Kerberos
17
Multiple business accounts were compromised a few days after a public website had its credentials database leaked on the internet No business emails were Identified in the breach, but the security team thinks that the list of passwords exposed was later used to compromise business accounts. Which of The following would mitigate the issue?
Password history
18
A security engineer needs to Implement the following requirements: • All Layer 2 switches should leverage Active Directory for authentication. • All Layer 2 switches should use local fallback authentication if Active Directory is offline. • All Layer 2 switches are not the same and are manufactured by several vendors. Which of the following actions should the engineer take to meet these requirements? (Select TWO)
Implement RADIUS., Configure AAA on the switch with local login as secondary.
19
An employee's company email is configured with conditional access and requires that MFA is enabled and used. An example of MFA is a phone call and:
a password.
20
A systems integrator is installing a new access control system for a building. The new system will need to connect to the Company's AD server In order to validate current employees. Which of the following should the systems integrator configure to be the most secure?
LDAPS
21
A security policy states that common words should not be used as passwords. A security auditor was able to perform a dictionary attack against corporate credentials. Which of the following controls was being violated?
Password complexity
22
A company suspects that some corporate accounts were compromised. The number of suspicious logins from locations not recognized by the users is increasing. Employees who travel need their accounts protected without the nsk of blocking legitimate login requests that may be made over new sign-in properties. Which of the following security controls can be implemented?
Enforce MFA when an account request reaches a risk threshold
23
During a recent security incident at a multinational corporation a security analyst found the following logs for an account called user: Which Of the following account policies would BEST prevent attackers from logging in as a user?
Impossible travel time
24
A user wanted to catch up on some work over the weekend but had issues logging in to the corporate network using a VPN. On Monday, the user opened a ticket for this issue but was able to login successfully. Which of the following BEST describes the policy that is being implemented?
Time-based logins
25
The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, incident during a pandemic or crisis, However, the CEO is concerned that some staff members may take advantage of the of the flexibility and work from high-risk countries while on holidays work to a third-party organization in another country. The Chief information Officer (CIO) believes the company can implement some basic to mitigate the majority of the risk. Which of the following would be BEST to mitigate CEO’s concern? (Select TWO).
Geolocation, Time-of-day restrictions
26
A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of to the following access control schemes would be BEST for the company implement?
Mandatory
27
Joe, an employee, is transferring departments and is providing copies of his files to a network share folder for his previous team to access. Joe is granting read-write-execute permissions to his manager but giving read- only access to the rest of the team. Which of the following access controls is Joe using?
DAC
28
A security engineer has enabled two-factor authentication on all workstations. Which of the following approaches are the MOST secure? (Select TWO)
Password and fingerprint, Password and voice
29
An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high-definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine-learning techniques to eliminate biometric enrollment processes while still allowing authorities to identify passengers with increasing accuracy over time. The more frequently passengers travel, the more accurately the service will identify them. Which of the following biometrics will MOST likely be used, without the need for enrollment? (Choose two)
Gait, Facial
30
Which of the following BEST describes the MFA attribute that requires a callback on a predefined landline?
Somewhere you are
31
An organization wants to implement a third factor to an existing multi- factor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?
Fingerprints
32
A security engineer needs to enhance MFA access to sensitive areas in a building. A key card and fingerprint scan are already in use. Which of the following would add another factor of authentication?
Keypad PIN
33
A global company is experiencing unauthorized logging due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third-party identity provider to help mitigate these attacks. Which of the following would be the BEST control for the company to require from prospective vendors?
Multifactor authentication
34
Which of the following best describes the situation where a successfully onboarded employee who is using a fingerprint reader is denied access at the company's main gate?
False rejection
35
The concept of connecting a user account across the systems of multiple enterprises is BEST known as:
federation
36
The following are the logs of a successful attack.Which of the following controls would be BEST to use to prevent such a breach in the future?
Account lockout
37
A cybersecurity analyst needs to implement secure authentication to third-party websites without users’ passwords. Which of the following would be the BEST way to achieve this objective?
SAML (third party websites)
38
Which of the following represents a biometric FRR?
Authorized users being denied access
39
A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the access issues?
False rejection
40
An organization has implemented a two-step verification process to protect user access to data that is stored in the cloud. Each employee now uses an email address or mobile number to receive a code to access the data. Which of the following authentication methods did the organization implement?
HOTP
41
A system administrator needs to implement an access control scheme that will allow an object’s access policy to be determined by its owner. Which of the following access control schemes BEST fits the requirements?
Discretionary access control
42
A cybersecurity analyst needs to adopt controls to properly track and log user actions to an individual. Which of the following should the analyst implement?
Non-repudiation
43
A user must introduce a password and a USB key to authenticate against a secure computer, and authentication is limited to the state in which the company resides. Which of the following authentication concepts are in use?
Something you know, something you have, and somewhere you are
44
A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO)
Something you know, Something you have
45
An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include: - Check-in/checkout of credentials - The ability to use but not know the password - Automated password changes - Logging of access to credentials Which of the following solutions would meet the requirements?
A privileged access management system
46
A security engineer is reviewing the logs from a SAML application that is configured to use MFA, during this review the engineer notices a high volume of successful logins that did not require MFA from users who were traveling internationally. The application, which can be accessed without a VPN, has a policy that allows time-based tokens to be generated. Users who changed locations should be required to reauthenticate but have been Which of the following statements BEST explains the issue?
The user’s IP address is changing between logins, but the application is not invalidating the token
47
A security analyst must enforce policies to harden an MDM infrastructure. The requirements are as follows: * Ensure mobile devices can be tracked and wiped. * Confirm mobile devices are encrypted. Which of the following should the analyst enable on all the devices to meet these requirements?
Geolocation
48
Which of the following uses SAML for authentication?
Federation
49
Which of the following would satisfy three-factor authentication?
Password, retina scanner, and NFC card
50
A developer is building a new portal to deliver single-pane-of-glass management capabilities to customers with multiple firewalls. To Improve the user experience, the developer wants to implement an authentication and authorization standard that uses security tokens that contain assertions to pass user Information between nodes. Which of the following roles should the developer configure to meet these requirements? (Select TWO)
Identity provider, Service provider
51
Which biometric error would allow an unauthorized user to access a system?
False acceptance
52
An organization wants seamless authentication to its applications. Which of the following should the organization employ to meet this requirement?
SSO
53
The Chief Executive Officer announced a new partnership with a strategic vendor and asked the Information Security Officer to federate user digital identities using SAML-based protocols. Which of the following will this enable?
SSO
54
The Chief Information Security Officer has directed the security and networking team to retire the use of shared passwords on routers and switches. Which of the following choices BEST meets the requirements?
TACACS+
55
An amusement park is implementing a biometric system that validates customers' fingerprints to ensure they are not sharing tickets. The park's owner values customers above all and would prefer customers' convenience over security. For this reason, which of the following features should the security team prioritize FIRST?
Low FRR
56
A database administrator wants to grant access to an application that will be reading and writing data to a database. The database is shared by other applications also used by the finance department. Which of the following account types Is MOST appropriate for this purpose?
Service
57
A company currently uses passwords for logging in to company-owned devices and wants to add a second authentication factor. Per corporate policy, users are not allowed to have smartphones at their desks. Which of the following would meet these requirements?
Smart card
58
A company is launching a new internet platform for its clients. The company does not want to implement its own authorization solution but instead wants to rely on the authorization provided by another platform. Which of the following is the BEST approach to implement the desired solution?
OAuth
59
Which of the following authentication methods is considered to be the LEAST secure?
SMS
60
Per company security policy, IT staff members are required to have separate credentials to perform administrative functions using just-in-time permissions. Which of the following solutions is the company Implementing?
Privileged access management
61
Which of the following is a physical security control that ensures only the authorized user is present when gaining access to a secured area?
A biometric scanner
62
As part of annual audit requirements, the security team performed a review of exceptions to the company policy that allows specific users the ability to use USB storage devices on their laptops. The review yielded the following results. ● The exception process and policy have been correctly followed by the majority of users, ● A small number of users did not create tickets for the requests but were granted access, ● All access had been approved by supervisors, ● Valid requests for the access sporadically occurred across multiple departments. ● Access, in most cases, had not been removed when it was no longer needed Which of the following should the company do to ensure that appropriate access is not disrupted but unneeded access is removed in a reasonable time frame?
Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the management team
63
A remote user recently took a two-week vacation abroad and brought along a corporate-owned laptop. Upon returning to work, the user has been unable to connect the laptop to the VPN. Which of the following is the MOST likely reason for the user's inability to connect the laptop to the VPN? (Select TWO).
Due to foreign travel, the user's laptop was isolated from the network., The user's laptop was quarantined because it missed the latest patch update.
64
While troubleshooting a service disruption on a mission-critical server, a technician discovered the user account that was configured to run automated processes was disabled because the user's password failed to meet password complexity requirements. Which of the following would be the BEST solution to securely prevent future issues?
Configuring a service account to run the processes
65
A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?
Push notifications
66
To secure an application after a large data breach, an e-commerce site will be resetting all users’ credentials. Which of the following will BEST ensure the site’s users are not compromised after the reset?
A password reuse policy
67
A worldwide manufacturing company has been experiencing email account compromised. In one incident, a user logged in from the corporate office in France, but then seconds later, the same user account attempted a login from Brazil. Which of the following account policies would BEST prevent this type of attack?
Impossible travel time
68
The Chief Information Security Officer wants to pilot a new adaptive, user-based authentication method. The concept includes granting logical access based on physical location and proximity. Which of the following Is the BEST solution for the pilot?
Geofencing
69
Which of the following would satisfy three-factor authentication requirements?
Password, fingerprint scan, and physical token
70
A large enterprise has moved all its data to the cloud behind strong authentication and encryption. A sales director recently had a laptop stolen, and later enterprise data was found to have been compromised from a local database. Which of the following was the MOST likely cause?
Shadow IT
71
A security administrator is managing administrative access to sensitive systems with the following requirements: • Common login accounts must not be used for administrative duties. • Administrative accounts must be temporal in nature. • Each administrative account must be assigned to one specific user. • Accounts must have complex passwords. • Audit trails and logging must be enabled on all systems. Which of the following solutions should the administrator deploy to meet these requirements?
PAM
72
The compliance team requires an annual recertification of privileged and non-privileged user access. However, multiple users who left the company six months ago still have access. Which of the following would have prevented this compliance violation?
Account audits
73
Which of the following is a valid multifactor authentication combination?
OTP token combined with password
74
Which of the following is an example of federated access management?
Using a popular website login to provide access to another website
75
Which of the following represents a multifactor authentication system?
A digital certificate on a physical token that is unlocked with a secret passcode.
76
Which of the following authentication methods sends out a unique password to be used within a specific number of seconds?
TOTP
77
A company has three technicians who share the same credentials for troubleshooting system. Every time credentials are changed, the new ones are sent by email to all three technicians. The security administrator has become aware of this situation and wants to implement a solution to mitigate the risk. Which of the following is the BEST solution for company to implement?
Password vaults
78
Which of the following biometric authentication methods is the MOST accurate?
Retina
79
A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen: Please use a combination of numbers, special characters, and letters in the password field. Which of the following concepts does this message describe?
Password complexity
80
A security engineer needs to select a primary authentication source for use with a client application. The application requires the user to log in with a user id. Which of the following solutions BEST meets this requirement?
LDAP
81
An application owner has requested access for an external application to upload data from the central internal website without providing credentials at any point. Which of the following authentication methods should be configured to allow this type of integration access?
OAuth
82
A system administrator needs to implement an access control scheme that will allow an object’s access policy to be determined by its owner. Which of the following access control schemes BEST fits the requirements?
Discretionary access control
83
Which of the following automation use cases would best enhance the security posture of an organization by rapidly updating permissions when employees leave a company or change job roles internally?
Disabling access
84
A systems administrator is required to enforce MFA for corporate email account access, relying on the possession factor. Which of the following authentication methods should the systems administrator choose?(Select two).
Time-based one-time password, Hardware token
85
Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can login to any thin client located throughout the building and see the same desktop each time. Which of the following technologies are being utilized to provide these capabilities? (Select TWO)
VDI, RFID
86
Which of the following can best protect against an employee inadvertently installing malware on a company system?
Least privilege
87
During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Once the password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user's intranet account? (Select two).
Federation, Password complexity
88
An internet company has created a new collaboration application. To expand the user base, the company wants to implement an option that allows users to log in to the application with the credentials of her popular websites. Which of the following should the company implement?
SSO
89
During a recent penetration test, a tester plugged a laptop into an Ethernet port in an unoccupied conference room and obtained a valid IP address. Which of the following would have best prevented this avenue of attack?
Implementing 802.IX
90
A security administrator received an alert for a user account with the following log activity Which of the following best describes the trigger for the alert the administrator received?
Impossible travel time