暗記メーカー
ログイン
CNL_CH_3
  • Son Cagrı

  • 問題数 90 • 12/16/2023

    記憶度

    完璧

    13

    覚えた

    33

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Recent changes to a company's BYOD policy require all personal mobile devices to use a two-factor authentication method that is not something you know or have. Which of the following will meet this requirement?

    Facial recognition

  • 2

    A consultant is configuring a vulnerability scanner for a large, global organization in multiple countries. The consultant will be using a service account to scan systems with administrative privileges on a weekly basis, but there is a concern that hackers could gain access to the account and pivot through the global network. Which of the following would be BEST to help mitigate this concern?

    Create different accounts for each region. limit their logon times, and alert on risky logins

  • 3

    After entering a username and password, an administrator must draw a gesture on a touch screen. Which of the following demonstrates what the administrator is providing?

    Something you can do

  • 4

    A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).

    Something you know, Something you have

  • 5

    An account was disabled after several failed and successful login connections were made from various parts of the Word at various times. A security analyst is investigating the issue. Which of the following account policies most likely triggered the action to disable the;

    Impossible travel time

  • 6

    A security engineer was assigned to implement a solution to prevent attackers from gaining access by pretending to be authorized users. Which of the following technologies meets the requirement?

    MFA

  • 7

    Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts?

    Push notifications

  • 8

    A company wants to improve end users' experiences when they login to a trusted partner website. The company does not want the users to be issued separate credentials for the partner website. Which of the following should be implemented to allow users to authenticate using their own credentials to log in to the trusted partner's website?

    Federation

  • 9

    A security analyst is tasked with defining the “something you are“ factor of the company’s MFA settings. Which of the following is BEST to use to complete the configuration?

    Vein

  • 10

    A report delivered to the Chief Information Security Officer (CISO) shows that some user credentials could be exfiltrated. The report also indicates that users tend to choose the same credentials on different systems and applications. Which of the following policies should the CISO use to prevent someone from using the exfiltrated credentials?

    MFA

  • 11

    An organization wants to implement a biometric system with the highest likelihood that an unauthorized user will be denied access. Which of the following should the organization use to compare biometric solutions?

    FAR

  • 12

    Which biometric error would allow an unauthorized user to access a system?

    False acceptance

  • 13

    The new Chief Information Security Officer at a company has asked the security team to implement stronger user account policies. The new policies require: ● Userstochooseapassworduniquetotheirlasttenpasswords ● Userstonotloginfromcertainhigh-riskcountries Which of the following should the security team implement? (Select TWO).

    Password history, Geolocation

  • 14

    An amusement park is implementing a biometric system that validates customers' fingerprints to ensure they are not sharing tickets. The park's owner values customers above all and would prefer customers' convenience over security. For this reason, which of the following features should the security team prioritize FIRST?

    Low FRR

  • 15

    The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve in the environment patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have been provided to frontline staff, and a risk analysis has not been performed. Which of the following is the MOST likely cause of the CRO’s concerns?

    SSO would reduce the resilience and availability of the system if the provider goes offline.

  • 16

    A security analyst needs to recommend a solution that will allow current Active Directory accounts and groups to be used for access controls on both network and remote-access devices. Which of the following should the analyst recommend? (Select two).

    RADIUS, Kerberos

  • 17

    Multiple business accounts were compromised a few days after a public website had its credentials database leaked on the internet No business emails were Identified in the breach, but the security team thinks that the list of passwords exposed was later used to compromise business accounts. Which of The following would mitigate the issue?

    Password history

  • 18

    A security engineer needs to Implement the following requirements: • All Layer 2 switches should leverage Active Directory for authentication. • All Layer 2 switches should use local fallback authentication if Active Directory is offline. • All Layer 2 switches are not the same and are manufactured by several vendors. Which of the following actions should the engineer take to meet these requirements? (Select TWO)

    Implement RADIUS., Configure AAA on the switch with local login as secondary.

  • 19

    An employee's company email is configured with conditional access and requires that MFA is enabled and used. An example of MFA is a phone call and:

    a password.

  • 20

    A systems integrator is installing a new access control system for a building. The new system will need to connect to the Company's AD server In order to validate current employees. Which of the following should the systems integrator configure to be the most secure?

    LDAPS

  • 21

    A security policy states that common words should not be used as passwords. A security auditor was able to perform a dictionary attack against corporate credentials. Which of the following controls was being violated?

    Password complexity

  • 22

    A company suspects that some corporate accounts were compromised. The number of suspicious logins from locations not recognized by the users is increasing. Employees who travel need their accounts protected without the nsk of blocking legitimate login requests that may be made over new sign-in properties. Which of the following security controls can be implemented?

    Enforce MFA when an account request reaches a risk threshold

  • 23

    During a recent security incident at a multinational corporation a security analyst found the following logs for an account called user: Which Of the following account policies would BEST prevent attackers from logging in as a user?

    Impossible travel time

  • 24

    A user wanted to catch up on some work over the weekend but had issues logging in to the corporate network using a VPN. On Monday, the user opened a ticket for this issue but was able to login successfully. Which of the following BEST describes the policy that is being implemented?

    Time-based logins

  • 25

    The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, incident during a pandemic or crisis, However, the CEO is concerned that some staff members may take advantage of the of the flexibility and work from high-risk countries while on holidays work to a third-party organization in another country. The Chief information Officer (CIO) believes the company can implement some basic to mitigate the majority of the risk. Which of the following would be BEST to mitigate CEO’s concern? (Select TWO).

    Geolocation, Time-of-day restrictions

  • 26

    A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of to the following access control schemes would be BEST for the company implement?

    Mandatory

  • 27

    Joe, an employee, is transferring departments and is providing copies of his files to a network share folder for his previous team to access. Joe is granting read-write-execute permissions to his manager but giving read- only access to the rest of the team. Which of the following access controls is Joe using?

    DAC

  • 28

    A security engineer has enabled two-factor authentication on all workstations. Which of the following approaches are the MOST secure? (Select TWO)

    Password and fingerprint, Password and voice

  • 29

    An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high-definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine-learning techniques to eliminate biometric enrollment processes while still allowing authorities to identify passengers with increasing accuracy over time. The more frequently passengers travel, the more accurately the service will identify them. Which of the following biometrics will MOST likely be used, without the need for enrollment? (Choose two)

    Gait, Facial

  • 30

    Which of the following BEST describes the MFA attribute that requires a callback on a predefined landline?

    Somewhere you are

  • 31

    An organization wants to implement a third factor to an existing multi- factor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?

    Fingerprints

  • 32

    A security engineer needs to enhance MFA access to sensitive areas in a building. A key card and fingerprint scan are already in use. Which of the following would add another factor of authentication?

    Keypad PIN

  • 33

    A global company is experiencing unauthorized logging due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third-party identity provider to help mitigate these attacks. Which of the following would be the BEST control for the company to require from prospective vendors?

    Multifactor authentication

  • 34

    Which of the following best describes the situation where a successfully onboarded employee who is using a fingerprint reader is denied access at the company's main gate?

    False rejection

  • 35

    The concept of connecting a user account across the systems of multiple enterprises is BEST known as:

    federation

  • 36

    The following are the logs of a successful attack.Which of the following controls would be BEST to use to prevent such a breach in the future?

    Account lockout

  • 37

    A cybersecurity analyst needs to implement secure authentication to third-party websites without users’ passwords. Which of the following would be the BEST way to achieve this objective?

    SAML (third party websites)

  • 38

    Which of the following represents a biometric FRR?

    Authorized users being denied access

  • 39

    A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the access issues?

    False rejection

  • 40

    An organization has implemented a two-step verification process to protect user access to data that is stored in the cloud. Each employee now uses an email address or mobile number to receive a code to access the data. Which of the following authentication methods did the organization implement?

    HOTP

  • 41

    A system administrator needs to implement an access control scheme that will allow an object’s access policy to be determined by its owner. Which of the following access control schemes BEST fits the requirements?

    Discretionary access control

  • 42

    A cybersecurity analyst needs to adopt controls to properly track and log user actions to an individual. Which of the following should the analyst implement?

    Non-repudiation

  • 43

    A user must introduce a password and a USB key to authenticate against a secure computer, and authentication is limited to the state in which the company resides. Which of the following authentication concepts are in use?

    Something you know, something you have, and somewhere you are

  • 44

    A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO)

    Something you know, Something you have

  • 45

    An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include: - Check-in/checkout of credentials - The ability to use but not know the password - Automated password changes - Logging of access to credentials Which of the following solutions would meet the requirements?

    A privileged access management system

  • 46

    A security engineer is reviewing the logs from a SAML application that is configured to use MFA, during this review the engineer notices a high volume of successful logins that did not require MFA from users who were traveling internationally. The application, which can be accessed without a VPN, has a policy that allows time-based tokens to be generated. Users who changed locations should be required to reauthenticate but have been Which of the following statements BEST explains the issue?

    The user’s IP address is changing between logins, but the application is not invalidating the token

  • 47

    A security analyst must enforce policies to harden an MDM infrastructure. The requirements are as follows: * Ensure mobile devices can be tracked and wiped. * Confirm mobile devices are encrypted. Which of the following should the analyst enable on all the devices to meet these requirements?

    Geolocation

  • 48

    Which of the following uses SAML for authentication?

    Federation

  • 49

    Which of the following would satisfy three-factor authentication?

    Password, retina scanner, and NFC card

  • 50

    A developer is building a new portal to deliver single-pane-of-glass management capabilities to customers with multiple firewalls. To Improve the user experience, the developer wants to implement an authentication and authorization standard that uses security tokens that contain assertions to pass user Information between nodes. Which of the following roles should the developer configure to meet these requirements? (Select TWO)

    Identity provider, Service provider

  • 51

    Which biometric error would allow an unauthorized user to access a system?

    False acceptance

  • 52

    An organization wants seamless authentication to its applications. Which of the following should the organization employ to meet this requirement?

    SSO

  • 53

    The Chief Executive Officer announced a new partnership with a strategic vendor and asked the Information Security Officer to federate user digital identities using SAML-based protocols. Which of the following will this enable?

    SSO

  • 54

    The Chief Information Security Officer has directed the security and networking team to retire the use of shared passwords on routers and switches. Which of the following choices BEST meets the requirements?

    TACACS+

  • 55

    An amusement park is implementing a biometric system that validates customers' fingerprints to ensure they are not sharing tickets. The park's owner values customers above all and would prefer customers' convenience over security. For this reason, which of the following features should the security team prioritize FIRST?

    Low FRR

  • 56

    A database administrator wants to grant access to an application that will be reading and writing data to a database. The database is shared by other applications also used by the finance department. Which of the following account types Is MOST appropriate for this purpose?

    Service

  • 57

    A company currently uses passwords for logging in to company-owned devices and wants to add a second authentication factor. Per corporate policy, users are not allowed to have smartphones at their desks. Which of the following would meet these requirements?

    Smart card

  • 58

    A company is launching a new internet platform for its clients. The company does not want to implement its own authorization solution but instead wants to rely on the authorization provided by another platform. Which of the following is the BEST approach to implement the desired solution?

    OAuth

  • 59

    Which of the following authentication methods is considered to be the LEAST secure?

    SMS

  • 60

    Per company security policy, IT staff members are required to have separate credentials to perform administrative functions using just-in-time permissions. Which of the following solutions is the company Implementing?

    Privileged access management

  • 61

    Which of the following is a physical security control that ensures only the authorized user is present when gaining access to a secured area?

    A biometric scanner

  • 62

    As part of annual audit requirements, the security team performed a review of exceptions to the company policy that allows specific users the ability to use USB storage devices on their laptops. The review yielded the following results. ● The exception process and policy have been correctly followed by the majority of users, ● A small number of users did not create tickets for the requests but were granted access, ● All access had been approved by supervisors, ● Valid requests for the access sporadically occurred across multiple departments. ● Access, in most cases, had not been removed when it was no longer needed Which of the following should the company do to ensure that appropriate access is not disrupted but unneeded access is removed in a reasonable time frame?

    Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the management team

  • 63

    A remote user recently took a two-week vacation abroad and brought along a corporate-owned laptop. Upon returning to work, the user has been unable to connect the laptop to the VPN. Which of the following is the MOST likely reason for the user's inability to connect the laptop to the VPN? (Select TWO).

    Due to foreign travel, the user's laptop was isolated from the network., The user's laptop was quarantined because it missed the latest patch update.

  • 64

    While troubleshooting a service disruption on a mission-critical server, a technician discovered the user account that was configured to run automated processes was disabled because the user's password failed to meet password complexity requirements. Which of the following would be the BEST solution to securely prevent future issues?

    Configuring a service account to run the processes

  • 65

    A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?

    Push notifications

  • 66

    To secure an application after a large data breach, an e-commerce site will be resetting all users’ credentials. Which of the following will BEST ensure the site’s users are not compromised after the reset?

    A password reuse policy

  • 67

    A worldwide manufacturing company has been experiencing email account compromised. In one incident, a user logged in from the corporate office in France, but then seconds later, the same user account attempted a login from Brazil. Which of the following account policies would BEST prevent this type of attack?

    Impossible travel time

  • 68

    The Chief Information Security Officer wants to pilot a new adaptive, user-based authentication method. The concept includes granting logical access based on physical location and proximity. Which of the following Is the BEST solution for the pilot?

    Geofencing

  • 69

    Which of the following would satisfy three-factor authentication requirements?

    Password, fingerprint scan, and physical token

  • 70

    A large enterprise has moved all its data to the cloud behind strong authentication and encryption. A sales director recently had a laptop stolen, and later enterprise data was found to have been compromised from a local database. Which of the following was the MOST likely cause?

    Shadow IT

  • 71

    A security administrator is managing administrative access to sensitive systems with the following requirements: • Common login accounts must not be used for administrative duties. • Administrative accounts must be temporal in nature. • Each administrative account must be assigned to one specific user. • Accounts must have complex passwords. • Audit trails and logging must be enabled on all systems. Which of the following solutions should the administrator deploy to meet these requirements?

    PAM

  • 72

    The compliance team requires an annual recertification of privileged and non-privileged user access. However, multiple users who left the company six months ago still have access. Which of the following would have prevented this compliance violation?

    Account audits

  • 73

    Which of the following is a valid multifactor authentication combination?

    OTP token combined with password

  • 74

    Which of the following is an example of federated access management?

    Using a popular website login to provide access to another website

  • 75

    Which of the following represents a multifactor authentication system?

    A digital certificate on a physical token that is unlocked with a secret passcode.

  • 76

    Which of the following authentication methods sends out a unique password to be used within a specific number of seconds?

    TOTP

  • 77

    A company has three technicians who share the same credentials for troubleshooting system. Every time credentials are changed, the new ones are sent by email to all three technicians. The security administrator has become aware of this situation and wants to implement a solution to mitigate the risk. Which of the following is the BEST solution for company to implement?

    Password vaults

  • 78

    Which of the following biometric authentication methods is the MOST accurate?

    Retina

  • 79

    A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen: Please use a combination of numbers, special characters, and letters in the password field. Which of the following concepts does this message describe?

    Password complexity

  • 80

    A security engineer needs to select a primary authentication source for use with a client application. The application requires the user to log in with a user id. Which of the following solutions BEST meets this requirement?

    LDAP

  • 81

    An application owner has requested access for an external application to upload data from the central internal website without providing credentials at any point. Which of the following authentication methods should be configured to allow this type of integration access?

    OAuth

  • 82

    A system administrator needs to implement an access control scheme that will allow an object’s access policy to be determined by its owner. Which of the following access control schemes BEST fits the requirements?

    Discretionary access control

  • 83

    Which of the following automation use cases would best enhance the security posture of an organization by rapidly updating permissions when employees leave a company or change job roles internally?

    Disabling access

  • 84

    A systems administrator is required to enforce MFA for corporate email account access, relying on the possession factor. Which of the following authentication methods should the systems administrator choose?(Select two).

    Time-based one-time password, Hardware token

  • 85

    Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can login to any thin client located throughout the building and see the same desktop each time. Which of the following technologies are being utilized to provide these capabilities? (Select TWO)

    VDI, RFID

  • 86

    Which of the following can best protect against an employee inadvertently installing malware on a company system?

    Least privilege

  • 87

    During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Once the password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user's intranet account? (Select two).

    Federation, Password complexity

  • 88

    An internet company has created a new collaboration application. To expand the user base, the company wants to implement an option that allows users to log in to the application with the credentials of her popular websites. Which of the following should the company implement?

    SSO

  • 89

    During a recent penetration test, a tester plugged a laptop into an Ethernet port in an unoccupied conference room and obtained a valid IP address. Which of the following would have best prevented this avenue of attack?

    Implementing 802.IX

  • 90

    A security administrator received an alert for a user account with the following log activity Which of the following best describes the trigger for the alert the administrator received?

    Impossible travel time