ログイン

26 ) SY EX. 10 | COMPLETE
90問 • 5ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    Kyong manages the vulnerability scans for his organization. The senior director that oversees Kyong's group provides a report to the CIO on a monthly basis on operational activity, and he includes the number of open critical vulnerabilities. He would like to provide this information to his director in as simple a manner as possible each month. What should Kyong do?

    - Configure a report that provides the information to automatically send to the director's email at the proper time each month.

  • 2

    Carla is designing a vulnerability scanning workflow and has been tasked with selecting the person responsible for remediating vulnerabilities. Which one of the following people would normally be in the best position to remediate a server vulnerability?

    - System administrator

  • 3

    During a vulnerability scan, Patrick discovered that the configuration management agent installed on all of his organization's Windows servers contains a serious vulnerability. The manufacturer is aware of this issue, and a patch is available. What process should Patrick follow to correct this issue?

    - Deploy the patch in a test environment and then conduct a staged rollout in production.

  • 4

    Ben is preparing to conduct a vulnerability scan for a new client of his security consulting organization. Which one of the following steps should Ben perform first?

    - Obtain permission for the scans.

  • 5

    Katherine coordinates the remediation of security vulnerabilities in her organization and is attempting to work with a system engineer on the patching of a server to correct a moderate impact vulnerability. The engineer is refusing to patch the server because of the potential interruption to a critical business process that runs on the server. What would be the most reasonable course of action for Katherine to take?

    - Schedule the patching to occur during a regular maintenance cycle.

  • 6

    Grace ran a vulnerability scan and detected an urgent vulnerability in a public-facing web server. This vulnerability is easily exploitable and could result in the complete compromise of the server. Grace wants to follow best practices regarding change control while also mitigating this threat as quickly as possible. What would be Grace's best course of action?

    - Implement a fix immediately and document the change after the fact.

  • 7

    Joe discovered a critical vulnerability in his organization's database server and received permission from his supervisor to implement an emergency change after the close of business. He has eight hours before the planned change window. In addition to planning the technical aspects of the change, what else should Joe do to prepare for the change?

    - All of the above.

  • 8

    Sally discovered during a vulnerability scan that a system she manages has a high-priority vulnerability that requires a patch. The system is behind a firewall and there is no imminent threat, but Sally wants to get the situation resolved as quickly as possible. What would be her best course of action?

    - Initiate a high-priority change through her organization's change management process.

  • 9

    Gene runs a vulnerability scan of his organization's datacenter and produces a summary report to share with his management team. The report includes the chart shown here. When Gene's manager reads the report, she points out that the report is burying important details because it is highlighting too many unimportant issues. What should Gene do to resolve this issue?

    - Modify the sensitivity level of the scan.

  • 10

    Glenda routinely runs vulnerability scans of servers in her organization. She is having difficulty with one system administrator who refuses to correct vulnerabilities on a server used as a jump box by other IT staff. The server has had dozens of vulnerabilities for weeks and would require downtime to repair. One morning, her scan reports that all of the vulnerabilities suddenly disappeared overnight, while other systems in the same scan are reporting issues. She checks the service status dashboard, and the service appears to be running properly with no outages reported in the past week. What is the most likely cause of this result?

    - The system administrator blocked the scanner.

  • 11

    Tom is planning a series of vulnerability scans and wants to ensure that the organization is meeting its customer commitments with respect to the scans' performance impact. What two documents should Tom consult to find these obligations?

    - SLAs and MOUs

  • 12

    Zhang Wei is evaluating the success of his vulnerability management program and would like to include some metrics. Which one of the following would be the least useful metric?

    - Total number of vulnerabilities reported

  • 13

    Donna is working with a system engineer who wants to remediate vulnerabilities in a server that he manages. Of the report templates shown here, which would be most useful to the engineer?

    - Technical Report

  • 14

    Abdul received the vulnerability report shown here for a server in his organization. The server runs a legacy application that cannot easily be updated. What risks does this vulnerability present?

    - All of the above

  • 15

    William is preparing a legal agreement for his organization to purchase services from a vendor. He would like to document the requirements for system availability, including the vendor's allowable downtime for patching. What type of agreement should William use to incorporate this requirement?

    - SLA

  • 16

    Raul is replacing his organization's existing vulnerability scanner with a new product that will fulfill that functionality moving forward. As Raul begins to build the policy, he notices some conflicts in the scanning settings between different documents. Which one of the following document sources should Raul give the highest priority when resolving these conflicts?

    - Corporate policy

  • 17

    Pietro is responsible for distributing vulnerability scan reports to system engineers who will remediate the vulnerabilities. What would be the most effective and secure way for Pietro to distribute the reports?

    - Pietro should configure the reports to generate automatically and provide immediate, automated notification to administrators of the results.

  • 18

    Nitesh would like to identify any systems on his network that are not registered with his asset management system because he is concerned that they might not be remediated to his organization's current security configuration baseline. He looks at the reporting console of his vulnerability scanner and sees the options shown here. Which of the following report types would be his best likely starting point?

    - Unknown Device Report

  • 19

    Nabil is the vulnerability manager for his organization and is responsible for tracking vulnerability remediation. There is a critical vulnerability in a network device that Nabil has handed off to the device's administrator, but it has not been resolved after repeated reminders to the engineer. What should Nabil do next?

    - Escalate the issue to the network administrator's manager.

  • 20

    Maria discovered an operating system vulnerability on a system on her network. After tracing the IP address, she discovered that the vulnerability is on a proprietary search appliance installed on her network. She consulted with the responsible engineer who informed her that he has no access to the underlying operating system. What is the best course of action for Maria?

    - Contact the vendor to obtain a patch

  • 21

    Trevor is working with an application team on the remediation of a critical SQL injection vulnerability in a public-facing service. The team is concerned that deploying the fix will require several hours of downtime and will block customer transactions from completing. What is the most reasonable course of action for Trevor to suggest?

    - Schedule an emergency maintenance for an off-peak time later in the day.

  • 22

    Thomas discovers a vulnerability in a web application that is part of a proprietary system developed by a third-partv vendor, and he does not have access to the source code. Which one of the following actions can he take to mitigate the vulnerability without involving the vendor?

    - Deploy a web application firewall.

  • 23

    Walt is designing his organization's vulnerability management program and is working to identify potential inhibitors to vulnerability remediation. He has heard concern from functional leaders that remediating vulnerabilities will impact the ability of a new system to fulfill user requests. Which one of the following inhibitors does not apply to this situation?

    - Legacy systems

  • 24

    The company that Brian works for processes credit cards and is required to be compliant with PCI DSS. If Brian's company experiences a breach of card data, what type of disclosure will they be required to provide?

    - Notification to their acquiring bank

  • 25

    As Lauren prepares her organization's security practices and policies, she wants to address as many threat vectors as she can using an awareness program. Which of the following threats can be most effectively dealt with via awareness?

    - Improper usage

  • 26

    Laura wants to ensure that her team can communicate during an incident. Which of the following should the team prepare to be ready for an incident?

    - A messaging capability that can function if enterprise authentication is unavailable

  • 27

    Which of the following is not an important part of the incident response communication process?

    - Disclosure based on public feedback

  • 28

    After law enforcement was called because of potential criminal activity discovered as part of a forensic investigation, the officers on the scene seized three servers. When can Joe expect his servers to be returned?

    - Joe should not plan on a timeframe for return

  • 29

    NIST SP 800-61 identifies six outside parties that an incident response team will typically communicate with. Which of the following is not one of those parties?

    - Legal counsel

  • 30

    Ben works at a U.S. federal agency that has experienced a data breach. Under FISMA, which organization does he have to report this incident to?

    - US-CERT

  • 31

    Which of the following organizations is not typically involved in post-incident communications?

    - Developers

  • 32

    Tom is building his incident response team and is concerned about how the organization will address insider threats. Which business function would be most capable of assisting with the development of disciplinary policies?

    - Human resources

  • 33

    Craig is revising his organization's incident response plan and wants to ensure that the plan includes coordination with all relevant internal and external entities. Which one of the following stakeholders should he be most cautious about coordinating with?

    - Regulatory bodies

  • 34

    The vulnerability management action plan that was sent to Jacinda notes that a critical application that her organization uses relies on an insecure version of a software package because of a long-standing workflow requirement. Jacinda's organization's best practices state that the organization will select the most secure option that also permits business to be conducted. What should Jacinda do?

    - Change the business requirements to enable the vulnerability to be handled.

  • 35

    What section of an incident response report provides a brief, clear summary of the incident, response activities, and current state of the incident?

    - The executive summary

  • 36

    Ian wants to prepare his organization for communications with the media as part of incident related public relations. What should he recommend that his organization do to prepare?

    - Conduct media training.

  • 37

    Jason is required to notify the company that provides credit card processing services to his organization if an incident impacting credit card data occurs. What type of communications does he need to perform?

    - None of the above

  • 38

    The incident response report that Kathleen has prepared includes the following statement: "Unnecessary services including HTTP and FTP should be disabled on all devices of this type that are deployed." What incident response reporting component will most commonly include this type of statement?

    - Recommendations

  • 39

    What common score is used to help with prioritization of vulnerability remediation in many organizations?

    - CVSS

  • 40

    Olivia has been notified that a vulnerability has recurred on a server after being marked as remediated through a compensating control by an administrator. Which of the following is the most likely reason that a vulnerability may recur in this circumstance?

    - A patch has caused the compensating control to fail.

  • 41

    The incident response report that Brian is reading includes a statement that savs "Impacted systems were limited to those in the organization's AWS VPC." What part of an incident response report will typically contain this type of information?

    - The scope statement

  • 42

    Nila's incident response team has discovered evidence of an employee who may have been engaged in criminal activity while they were conducting an incident investigation. The team has suggested that law enforcement should be contacted. What significant concern should Nila raise about this potential communication?

    - Law enforcement engagement may hinder the organization's ability to respond or operate.

  • 43

    Sameer wants to establish and track a metric for his organization that will help him know if his loC monitoring processes are working well. Which of the following metrics is best suited to determining if loCs are being effectively captured and analyzed?

    - Mean time to detect

  • 44

    Sameer is continuing to improve his metrics to report to his organization's board of directors. The board has requested that he include alert volumes in his reporting. What issue should Sameer discuss with the board after receiving this request?

    - Alert volume is not an effective security metric.

  • 45

    What important incident response report section relies heavily on NTP to be successful?

    - The timeline

  • 46

    What type of agreement between two organizations is a common inhibitor to remediation because of uptime requirements?

    - An SLA

  • 47

    Valerie needs to explain CVSS score metrics to her team. Which of the following is not part of the basic metric group for CVSS scores?

    - The maturity of the exploit code

  • 48

    The scientific instrument that Chas is responsible for has multiple critical severity vulnerabilities in its operating system and services. The device cannot be patched according to instructions from the vendor who provides it. Which of the following is not an appropriate compensating control in this scenario?

    - Install vendor patches against recommendations.

  • 49

    Hui's incident response report includes log entries showing that a user logged in from another country, despite living and working in the country that the company Hui works for is located in. What incident response report section is most likely to contain this type of information?

    - The evidence section

  • 50

    Melissa is conducting a root-cause analysis. Which of the following is not a common step in RCA processes?

    - Implement compensating controls.

  • 51

    What information is typically included in a list of affected hosts in a vulnerability management report?

    - Hostname and IP address

  • 52

    Hannah wants to establish a metric that will help her organization determine if their response process completes in a timely manner. Which common metric should she select to help assess this?

    - Mean time to remediate

  • 53

    Mikayla's team has determined that a previously remediated vulnerability has re-appeared after installation of a vendor supplied patch. What type of vulnerability management issue is this?

    - Recurrence

  • 54

    Gurvinder wants to consider impact metrics like the integrity impact, availability impact, and compatibility impact of a vulnerability that is scored using CVSS. What metric group includes this information?

    - Basic

  • 55

    Which of the following is not a type of stakeholder that will frequently need to understand an organization's overall vulnerability stance or status?

    - Legal counsel

  • 56

    Which of the following CVSS scores indicates the highest impact to an organization?

    - 9.6

  • 57

    Expectations of time to remediate and time to patch by a vendor are both examples of what in a vulnerability management program?

    - Service level objectives

  • 58

    What issue is organizational governance likely to cause in a vulnerability management program?

    - It may slow down patching.

  • 59

    Jacob has initiated the incident response process in his organization. loCs have been identified, and Jacob is ready to take the next step in the process. What typically happens next?

    - Incident responders determine if it is a real incident.

  • 60

    Asha wants to reduce the alert volumes her team are dealing with due to the numbers of emails and SMS alerts they are receiving. Which of the following is most likely to help reduce the volume of alerts?

    - Tune alerting thresholds

  • 61

    What NIST standard provides information on incident handling practices?

    - NIST SP 800-61

  • 62

    Jaime want to consider critical components of public relations as part of her incident communications plan. What two topics are best aligned to this?

    - Customer and media communications

  • 63

    Annie's organization makes divisional administrators responsible for patching vulnerabilities after they are notified of them using a ticketing system. Annie has noticed that the administrators are not promptly patching systems. What should she do to most effectively address this issue?

    - Invest in an awareness and training campaign.

  • 64

    Henry's organization handles credit card data as part of their operations. What type of vulnerability management report is Henry most likely to need to run due to this?

    - PCI compliance reporting

  • 65

    Jen has discovered that many systems in her organization are being deployed with a vulnerable service active. What solution is best suited to addressing this type of issue in a large organization?

    - Configuration management

  • 66

    An incident report should indicate the individuals involved, as well as which of the following items?

    - The time frame the event or incident occurred

  • 67

    Jason has defined the problem as part of a root-cause analysis effort. What step typically comes next in RCA?

    - Collecting data about the problem

  • 68

    Mean time to respond is an example of what?

    - An incident response KPI

  • 69

    What information is gathered as part of a lessons learned exercise conducted at the end of an incident response process?

    - Both positive and negative lessons learned during the process

  • 70

    Jason wants to quickly understand the content of an incident report. What should he read?

    - The executive summary

  • 71

    What important role does criticality and impact information play in organizational use of CVSS scores?

    - It helps with prioritization.

  • 72

    Natalie has signed a service level agreement with a customer that specifies performance requirements for a service that her company provides. How is this most likely to impact her ability to remediate vulnerabilities on the underlying containerized services that provide the service?

    - It will require Natalie to ensure that the service is not disrupted when new, patched containers are deployed and vulnerable containers are disabled.

  • 73

    Angela's organization has discovered that their Windows workstations have a vulnerability that was discovered more than a year ago. What solution is best suited to handling this known vulnerability?

    - Patching

  • 74

    Jacob wants to update mitigation notes for a vulnerability on a server. Which of the following is not a common mitigation option?

    - Turning the system off

  • 75

    Which of the following is the most critical to have involved in incident escalation processes?

    - Management

  • 76

    Gurvinder's organization is required to report breaches within 24 hours of the breach being detected, regardless of how far into the investigation the organization is. What type of requirement is most likely to drive this type of communication?

    - Regulatory requirements

  • 77

    Xuan's organization uses an old, no longer updated or sold software package that has an embedded web server that it exposes on every workstation that runs the software allowing file transfer between workstations. During a vulnerability scan the web browser was highlighted as a critical vulnerability. Which of the following solutions should Xuan recommend to best resolve the issue?

    - Changing business requirements

  • 78

    Jackie is reviewing the risk scores round in a vulnerability report and notes that the risk she is reviewing scores a 1.0. What recommendation should Jackie make about the vulnerability?

    - The risk is low and should be patched in the next patch cycle.

  • 79

    Log entries are commonly found in what part of an incident response report?

    - Evidence

  • 80

    Kathleen wants to build a prioritized list of vulnerabilities for her organization. What part of the CVSS metric will help her adjust the score to best match her organization's availability requirements?

    - The environmental metric group

  • 81

    Derek is the lead of his organization's finance and accounting team and has expressed concerns about installing patches because his team relies on the service that is being patched. Derek noted that the team is at a critical time because of annual financial reports. What type of inhibitor to remediation is this?

    - A business process interruption issue

  • 82

    What part of an incident response report describes detailed ways to avoid similar issues in the future?

    - Lessons learned

  • 83

    Potential compensating controls can be found in what section of a vulnerability management report?

    - The mitigations section

  • 84

    The company that Amari works for uses an embedded system as part of a manufacturing process. The system relies on an operating system created by the machine's vendor and Amari's team has identified vulnerabilities during a network scan. What type of system should Amari identify this device as?

    - A proprietary system

  • 85

    Amari wants to ensure that her team can meet her organization's service level agreement for the embedded system that has been identified as vulnerable. Which of the following compensating controls would be the most appropriate solution to allow the system to stay online while remaining secure?

    - Place a hardware firewall between the system and the network.

  • 86

    Amari has deployed a compensating control to protect the vulnerable embedded system that she is responsible for. What step should she take next?

    - Note the compensating control and flag the device for follow-up to see if patches become available.

  • 87

    NIST provides recommendations for communication with the media as part of incident response. Which of the following is a NIST recommended preparation for working with the media?

    - Holding media practice sessions for incident responders as part of IR exercises

  • 88

    Michele's root-cause analysis has determined a number of events that contributed to the problem but were not the root cause. What has she identified?

    - Causal factors

  • 89

    What three groups of metrics make up a CVSS score?

    - The Basic Metric Group, the Temporal Metric Group, and the Environmental Metric Group

  • 90

    Which of the following questions is not typically answered as part of an incident response report?

    - With whom?

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    5 ) Network Forensics

    5 ) Network Forensics

    The R.S.S.H Delivery Company · 9問 · 9ヶ月前

    5 ) Network Forensics

    5 ) Network Forensics

    9問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    Kyong manages the vulnerability scans for his organization. The senior director that oversees Kyong's group provides a report to the CIO on a monthly basis on operational activity, and he includes the number of open critical vulnerabilities. He would like to provide this information to his director in as simple a manner as possible each month. What should Kyong do?

    - Configure a report that provides the information to automatically send to the director's email at the proper time each month.

  • 2

    Carla is designing a vulnerability scanning workflow and has been tasked with selecting the person responsible for remediating vulnerabilities. Which one of the following people would normally be in the best position to remediate a server vulnerability?

    - System administrator

  • 3

    During a vulnerability scan, Patrick discovered that the configuration management agent installed on all of his organization's Windows servers contains a serious vulnerability. The manufacturer is aware of this issue, and a patch is available. What process should Patrick follow to correct this issue?

    - Deploy the patch in a test environment and then conduct a staged rollout in production.

  • 4

    Ben is preparing to conduct a vulnerability scan for a new client of his security consulting organization. Which one of the following steps should Ben perform first?

    - Obtain permission for the scans.

  • 5

    Katherine coordinates the remediation of security vulnerabilities in her organization and is attempting to work with a system engineer on the patching of a server to correct a moderate impact vulnerability. The engineer is refusing to patch the server because of the potential interruption to a critical business process that runs on the server. What would be the most reasonable course of action for Katherine to take?

    - Schedule the patching to occur during a regular maintenance cycle.

  • 6

    Grace ran a vulnerability scan and detected an urgent vulnerability in a public-facing web server. This vulnerability is easily exploitable and could result in the complete compromise of the server. Grace wants to follow best practices regarding change control while also mitigating this threat as quickly as possible. What would be Grace's best course of action?

    - Implement a fix immediately and document the change after the fact.

  • 7

    Joe discovered a critical vulnerability in his organization's database server and received permission from his supervisor to implement an emergency change after the close of business. He has eight hours before the planned change window. In addition to planning the technical aspects of the change, what else should Joe do to prepare for the change?

    - All of the above.

  • 8

    Sally discovered during a vulnerability scan that a system she manages has a high-priority vulnerability that requires a patch. The system is behind a firewall and there is no imminent threat, but Sally wants to get the situation resolved as quickly as possible. What would be her best course of action?

    - Initiate a high-priority change through her organization's change management process.

  • 9

    Gene runs a vulnerability scan of his organization's datacenter and produces a summary report to share with his management team. The report includes the chart shown here. When Gene's manager reads the report, she points out that the report is burying important details because it is highlighting too many unimportant issues. What should Gene do to resolve this issue?

    - Modify the sensitivity level of the scan.

  • 10

    Glenda routinely runs vulnerability scans of servers in her organization. She is having difficulty with one system administrator who refuses to correct vulnerabilities on a server used as a jump box by other IT staff. The server has had dozens of vulnerabilities for weeks and would require downtime to repair. One morning, her scan reports that all of the vulnerabilities suddenly disappeared overnight, while other systems in the same scan are reporting issues. She checks the service status dashboard, and the service appears to be running properly with no outages reported in the past week. What is the most likely cause of this result?

    - The system administrator blocked the scanner.

  • 11

    Tom is planning a series of vulnerability scans and wants to ensure that the organization is meeting its customer commitments with respect to the scans' performance impact. What two documents should Tom consult to find these obligations?

    - SLAs and MOUs

  • 12

    Zhang Wei is evaluating the success of his vulnerability management program and would like to include some metrics. Which one of the following would be the least useful metric?

    - Total number of vulnerabilities reported

  • 13

    Donna is working with a system engineer who wants to remediate vulnerabilities in a server that he manages. Of the report templates shown here, which would be most useful to the engineer?

    - Technical Report

  • 14

    Abdul received the vulnerability report shown here for a server in his organization. The server runs a legacy application that cannot easily be updated. What risks does this vulnerability present?

    - All of the above

  • 15

    William is preparing a legal agreement for his organization to purchase services from a vendor. He would like to document the requirements for system availability, including the vendor's allowable downtime for patching. What type of agreement should William use to incorporate this requirement?

    - SLA

  • 16

    Raul is replacing his organization's existing vulnerability scanner with a new product that will fulfill that functionality moving forward. As Raul begins to build the policy, he notices some conflicts in the scanning settings between different documents. Which one of the following document sources should Raul give the highest priority when resolving these conflicts?

    - Corporate policy

  • 17

    Pietro is responsible for distributing vulnerability scan reports to system engineers who will remediate the vulnerabilities. What would be the most effective and secure way for Pietro to distribute the reports?

    - Pietro should configure the reports to generate automatically and provide immediate, automated notification to administrators of the results.

  • 18

    Nitesh would like to identify any systems on his network that are not registered with his asset management system because he is concerned that they might not be remediated to his organization's current security configuration baseline. He looks at the reporting console of his vulnerability scanner and sees the options shown here. Which of the following report types would be his best likely starting point?

    - Unknown Device Report

  • 19

    Nabil is the vulnerability manager for his organization and is responsible for tracking vulnerability remediation. There is a critical vulnerability in a network device that Nabil has handed off to the device's administrator, but it has not been resolved after repeated reminders to the engineer. What should Nabil do next?

    - Escalate the issue to the network administrator's manager.

  • 20

    Maria discovered an operating system vulnerability on a system on her network. After tracing the IP address, she discovered that the vulnerability is on a proprietary search appliance installed on her network. She consulted with the responsible engineer who informed her that he has no access to the underlying operating system. What is the best course of action for Maria?

    - Contact the vendor to obtain a patch

  • 21

    Trevor is working with an application team on the remediation of a critical SQL injection vulnerability in a public-facing service. The team is concerned that deploying the fix will require several hours of downtime and will block customer transactions from completing. What is the most reasonable course of action for Trevor to suggest?

    - Schedule an emergency maintenance for an off-peak time later in the day.

  • 22

    Thomas discovers a vulnerability in a web application that is part of a proprietary system developed by a third-partv vendor, and he does not have access to the source code. Which one of the following actions can he take to mitigate the vulnerability without involving the vendor?

    - Deploy a web application firewall.

  • 23

    Walt is designing his organization's vulnerability management program and is working to identify potential inhibitors to vulnerability remediation. He has heard concern from functional leaders that remediating vulnerabilities will impact the ability of a new system to fulfill user requests. Which one of the following inhibitors does not apply to this situation?

    - Legacy systems

  • 24

    The company that Brian works for processes credit cards and is required to be compliant with PCI DSS. If Brian's company experiences a breach of card data, what type of disclosure will they be required to provide?

    - Notification to their acquiring bank

  • 25

    As Lauren prepares her organization's security practices and policies, she wants to address as many threat vectors as she can using an awareness program. Which of the following threats can be most effectively dealt with via awareness?

    - Improper usage

  • 26

    Laura wants to ensure that her team can communicate during an incident. Which of the following should the team prepare to be ready for an incident?

    - A messaging capability that can function if enterprise authentication is unavailable

  • 27

    Which of the following is not an important part of the incident response communication process?

    - Disclosure based on public feedback

  • 28

    After law enforcement was called because of potential criminal activity discovered as part of a forensic investigation, the officers on the scene seized three servers. When can Joe expect his servers to be returned?

    - Joe should not plan on a timeframe for return

  • 29

    NIST SP 800-61 identifies six outside parties that an incident response team will typically communicate with. Which of the following is not one of those parties?

    - Legal counsel

  • 30

    Ben works at a U.S. federal agency that has experienced a data breach. Under FISMA, which organization does he have to report this incident to?

    - US-CERT

  • 31

    Which of the following organizations is not typically involved in post-incident communications?

    - Developers

  • 32

    Tom is building his incident response team and is concerned about how the organization will address insider threats. Which business function would be most capable of assisting with the development of disciplinary policies?

    - Human resources

  • 33

    Craig is revising his organization's incident response plan and wants to ensure that the plan includes coordination with all relevant internal and external entities. Which one of the following stakeholders should he be most cautious about coordinating with?

    - Regulatory bodies

  • 34

    The vulnerability management action plan that was sent to Jacinda notes that a critical application that her organization uses relies on an insecure version of a software package because of a long-standing workflow requirement. Jacinda's organization's best practices state that the organization will select the most secure option that also permits business to be conducted. What should Jacinda do?

    - Change the business requirements to enable the vulnerability to be handled.

  • 35

    What section of an incident response report provides a brief, clear summary of the incident, response activities, and current state of the incident?

    - The executive summary

  • 36

    Ian wants to prepare his organization for communications with the media as part of incident related public relations. What should he recommend that his organization do to prepare?

    - Conduct media training.

  • 37

    Jason is required to notify the company that provides credit card processing services to his organization if an incident impacting credit card data occurs. What type of communications does he need to perform?

    - None of the above

  • 38

    The incident response report that Kathleen has prepared includes the following statement: "Unnecessary services including HTTP and FTP should be disabled on all devices of this type that are deployed." What incident response reporting component will most commonly include this type of statement?

    - Recommendations

  • 39

    What common score is used to help with prioritization of vulnerability remediation in many organizations?

    - CVSS

  • 40

    Olivia has been notified that a vulnerability has recurred on a server after being marked as remediated through a compensating control by an administrator. Which of the following is the most likely reason that a vulnerability may recur in this circumstance?

    - A patch has caused the compensating control to fail.

  • 41

    The incident response report that Brian is reading includes a statement that savs "Impacted systems were limited to those in the organization's AWS VPC." What part of an incident response report will typically contain this type of information?

    - The scope statement

  • 42

    Nila's incident response team has discovered evidence of an employee who may have been engaged in criminal activity while they were conducting an incident investigation. The team has suggested that law enforcement should be contacted. What significant concern should Nila raise about this potential communication?

    - Law enforcement engagement may hinder the organization's ability to respond or operate.

  • 43

    Sameer wants to establish and track a metric for his organization that will help him know if his loC monitoring processes are working well. Which of the following metrics is best suited to determining if loCs are being effectively captured and analyzed?

    - Mean time to detect

  • 44

    Sameer is continuing to improve his metrics to report to his organization's board of directors. The board has requested that he include alert volumes in his reporting. What issue should Sameer discuss with the board after receiving this request?

    - Alert volume is not an effective security metric.

  • 45

    What important incident response report section relies heavily on NTP to be successful?

    - The timeline

  • 46

    What type of agreement between two organizations is a common inhibitor to remediation because of uptime requirements?

    - An SLA

  • 47

    Valerie needs to explain CVSS score metrics to her team. Which of the following is not part of the basic metric group for CVSS scores?

    - The maturity of the exploit code

  • 48

    The scientific instrument that Chas is responsible for has multiple critical severity vulnerabilities in its operating system and services. The device cannot be patched according to instructions from the vendor who provides it. Which of the following is not an appropriate compensating control in this scenario?

    - Install vendor patches against recommendations.

  • 49

    Hui's incident response report includes log entries showing that a user logged in from another country, despite living and working in the country that the company Hui works for is located in. What incident response report section is most likely to contain this type of information?

    - The evidence section

  • 50

    Melissa is conducting a root-cause analysis. Which of the following is not a common step in RCA processes?

    - Implement compensating controls.

  • 51

    What information is typically included in a list of affected hosts in a vulnerability management report?

    - Hostname and IP address

  • 52

    Hannah wants to establish a metric that will help her organization determine if their response process completes in a timely manner. Which common metric should she select to help assess this?

    - Mean time to remediate

  • 53

    Mikayla's team has determined that a previously remediated vulnerability has re-appeared after installation of a vendor supplied patch. What type of vulnerability management issue is this?

    - Recurrence

  • 54

    Gurvinder wants to consider impact metrics like the integrity impact, availability impact, and compatibility impact of a vulnerability that is scored using CVSS. What metric group includes this information?

    - Basic

  • 55

    Which of the following is not a type of stakeholder that will frequently need to understand an organization's overall vulnerability stance or status?

    - Legal counsel

  • 56

    Which of the following CVSS scores indicates the highest impact to an organization?

    - 9.6

  • 57

    Expectations of time to remediate and time to patch by a vendor are both examples of what in a vulnerability management program?

    - Service level objectives

  • 58

    What issue is organizational governance likely to cause in a vulnerability management program?

    - It may slow down patching.

  • 59

    Jacob has initiated the incident response process in his organization. loCs have been identified, and Jacob is ready to take the next step in the process. What typically happens next?

    - Incident responders determine if it is a real incident.

  • 60

    Asha wants to reduce the alert volumes her team are dealing with due to the numbers of emails and SMS alerts they are receiving. Which of the following is most likely to help reduce the volume of alerts?

    - Tune alerting thresholds

  • 61

    What NIST standard provides information on incident handling practices?

    - NIST SP 800-61

  • 62

    Jaime want to consider critical components of public relations as part of her incident communications plan. What two topics are best aligned to this?

    - Customer and media communications

  • 63

    Annie's organization makes divisional administrators responsible for patching vulnerabilities after they are notified of them using a ticketing system. Annie has noticed that the administrators are not promptly patching systems. What should she do to most effectively address this issue?

    - Invest in an awareness and training campaign.

  • 64

    Henry's organization handles credit card data as part of their operations. What type of vulnerability management report is Henry most likely to need to run due to this?

    - PCI compliance reporting

  • 65

    Jen has discovered that many systems in her organization are being deployed with a vulnerable service active. What solution is best suited to addressing this type of issue in a large organization?

    - Configuration management

  • 66

    An incident report should indicate the individuals involved, as well as which of the following items?

    - The time frame the event or incident occurred

  • 67

    Jason has defined the problem as part of a root-cause analysis effort. What step typically comes next in RCA?

    - Collecting data about the problem

  • 68

    Mean time to respond is an example of what?

    - An incident response KPI

  • 69

    What information is gathered as part of a lessons learned exercise conducted at the end of an incident response process?

    - Both positive and negative lessons learned during the process

  • 70

    Jason wants to quickly understand the content of an incident report. What should he read?

    - The executive summary

  • 71

    What important role does criticality and impact information play in organizational use of CVSS scores?

    - It helps with prioritization.

  • 72

    Natalie has signed a service level agreement with a customer that specifies performance requirements for a service that her company provides. How is this most likely to impact her ability to remediate vulnerabilities on the underlying containerized services that provide the service?

    - It will require Natalie to ensure that the service is not disrupted when new, patched containers are deployed and vulnerable containers are disabled.

  • 73

    Angela's organization has discovered that their Windows workstations have a vulnerability that was discovered more than a year ago. What solution is best suited to handling this known vulnerability?

    - Patching

  • 74

    Jacob wants to update mitigation notes for a vulnerability on a server. Which of the following is not a common mitigation option?

    - Turning the system off

  • 75

    Which of the following is the most critical to have involved in incident escalation processes?

    - Management

  • 76

    Gurvinder's organization is required to report breaches within 24 hours of the breach being detected, regardless of how far into the investigation the organization is. What type of requirement is most likely to drive this type of communication?

    - Regulatory requirements

  • 77

    Xuan's organization uses an old, no longer updated or sold software package that has an embedded web server that it exposes on every workstation that runs the software allowing file transfer between workstations. During a vulnerability scan the web browser was highlighted as a critical vulnerability. Which of the following solutions should Xuan recommend to best resolve the issue?

    - Changing business requirements

  • 78

    Jackie is reviewing the risk scores round in a vulnerability report and notes that the risk she is reviewing scores a 1.0. What recommendation should Jackie make about the vulnerability?

    - The risk is low and should be patched in the next patch cycle.

  • 79

    Log entries are commonly found in what part of an incident response report?

    - Evidence

  • 80

    Kathleen wants to build a prioritized list of vulnerabilities for her organization. What part of the CVSS metric will help her adjust the score to best match her organization's availability requirements?

    - The environmental metric group

  • 81

    Derek is the lead of his organization's finance and accounting team and has expressed concerns about installing patches because his team relies on the service that is being patched. Derek noted that the team is at a critical time because of annual financial reports. What type of inhibitor to remediation is this?

    - A business process interruption issue

  • 82

    What part of an incident response report describes detailed ways to avoid similar issues in the future?

    - Lessons learned

  • 83

    Potential compensating controls can be found in what section of a vulnerability management report?

    - The mitigations section

  • 84

    The company that Amari works for uses an embedded system as part of a manufacturing process. The system relies on an operating system created by the machine's vendor and Amari's team has identified vulnerabilities during a network scan. What type of system should Amari identify this device as?

    - A proprietary system

  • 85

    Amari wants to ensure that her team can meet her organization's service level agreement for the embedded system that has been identified as vulnerable. Which of the following compensating controls would be the most appropriate solution to allow the system to stay online while remaining secure?

    - Place a hardware firewall between the system and the network.

  • 86

    Amari has deployed a compensating control to protect the vulnerable embedded system that she is responsible for. What step should she take next?

    - Note the compensating control and flag the device for follow-up to see if patches become available.

  • 87

    NIST provides recommendations for communication with the media as part of incident response. Which of the following is a NIST recommended preparation for working with the media?

    - Holding media practice sessions for incident responders as part of IR exercises

  • 88

    Michele's root-cause analysis has determined a number of events that contributed to the problem but were not the root cause. What has she identified?

    - Causal factors

  • 89

    What three groups of metrics make up a CVSS score?

    - The Basic Metric Group, the Temporal Metric Group, and the Environmental Metric Group

  • 90

    Which of the following questions is not typically answered as part of an incident response report?

    - With whom?