問題一覧
1
Steven is a Linux system administrator at an IT company. He wants to disable unnecessary services in the system, which can be exploited by the attackers. Which among the following is the correct syntax for disabling a service?
$ sudo systemctl disable [service]
2
Sam wants to implement a network-based IDS and finalizes an IDS solution that works based on pattern matching. Which type of network-based IDS is Sam implementing?
Signature-based IDS
3
Identify the virtualization level that creates a massive pool of storage areas for different virtual machines running on the hardware.
Fabric virtualization
4
Kelly is taking backups of the organization's data. Currently, she is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?
Incremental backup
5
How is an “attack” represented?
Motive (goal) + method + vulnerability
6
Sophie has been working as a Windows network administrator at an MNC over the past 7 years. She wants to check whether SMB1 is enabled or disabled. Which of the following command allows Sophie to do so?
Get-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
7
How can one identify the baseline for normal traffic?
When the SYN flag appears at the beginning and the FIN flag appears at the end of the connection
8
Albert works as a Windows system administrator at an MNC. He uses PowerShell logging to identify any suspicious scripting activity across the network. He wants to record pipeline execution details as PowerShell executes, including variable initialization and command invocations. Which PowerShell logging component records pipeline execution details as PowerShell executes?
Module logging
9
Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which it is running and communicates with the host machines for requesting resources. Identify the virtualization technique implemented by Elden’s organization.
Para virtualization
10
Which of the following data security technology can ensure information protection by obscuring specific areas of information?
Data masking
11
Which of the following refers to the data that is stored or processed by RAM, CPUs, or databases?
Data is Use
12
Fargo, head of network defense at Globadyne Tech, has discovered an undesirable process in several Linux systems, which causes machines to hang every 1 hour. Fargo would like to eliminate it; what command should he execute?
# kill -9 [PID]
13
Emmanuel works as a Windows system administrator at an MNC. He uses PowerShell to enforce the script execution policy. He wants to allow the execution of the scripts that are signed by a trusted publisher. Which of the following script execution policy setting this?
AllSigned
14
Which command list all ports available on a server?
sudo netstat -tunIp
15
To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?
Prudent policy
16
Leslie, the network administrator of Livewire Technologies, has been recommending multilayer inspection firewalls to deploy the company’s infrastructure. What layers of the TCP/IP model can it protect?
Application, TCP, and IP
17
Choose the correct order of steps to analyze the attack surface.
Visualize the attack surface->identify the indicators of exposure->simulate the attack->reduce the attack surface
18
In _______ mechanism, the system or application sends log records either on the local disk or over the network.
Push-based
19
Which among the following filter is used to detect a SYN/FIN attack?
tcp.flags==0x003
20
Which of the following attack surface increase when you keep USB ports enabled on your laptop unnecessarily?
Physical attack surface
21
Who is an IR custodian?
An individual responsible for the remediation and resolution of the incident that occurred
22
Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?
Application sandboxing
23
Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?
Path rule
24
Which of the following indicators refers to potential risk exposures that attackers can use to breach the security of an organization?
Indicators of exposure
25
In ______ method, event logs are arranged in the form of a circular buffer.
Wrapping method
26
Which among the following tools can help in identifying IoEs to evaluate human attack surface?
Amass
27
Which of the following is not part of the recommended first response steps for network defenders?
Extract relevant data from the suspected devices as early as possible
28
John is a senior network security administrator working at a multinational company. He wants to block specific syscalls from being used by container binaries. Which Linux kernel feature restricts actions within the container?
Seccomp
29
Which of the following things need to be identified during attack surface visualization?
Assets, topologies, and policies of the organization
30
Jason has set a firewall policy that allows only a specific list of network services and denies everything else. This strategy is known as a ____________.
Default deny
31
How can a WAF validate traffic before it reaches a web application?
It uses a rule-based filtering technique
32
Which of the following is an example of MAC model?
Bell-LaPadula model
33
Which of the following provides a set of voluntary recommended cyber security features to include in network-capable IoT devices?
NIST
34
Henry, head of network security at Gentech, has discovered a general report template that someone has reserved only for the CEO. Since the file has to be editable, viewable, and deletable by everyone, what permission value should he set?
777
35
Which of the following connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?
Southbound API
36
Richard has been working as a Linux system administrator at an MNC. He wants to maintain a productive and secure environment by improving the performance of the systems through Linux patch management. Richard is using Ubuntu and wants to patch the Linux systems manually. Which among the following command installs updates (new ones) for Debian-based Linux OSes?
sudo apt-get dist-upgrade
37
Based on which of the following registry key, the Windows Event log audit configurations are recorded?
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\ < Event Log >
38
Identify the type of event that is recorded when an application driver loads successfully in Windows.
Information
39
John, a network administrator, is configuring Amazon EC2 cloud service for his organization. Identify the type of cloud service modules his organization adopted.
Infrastructure-as-a-Service (IaaS)
40
Which command is used to change the permissions of a file or directory?
chmod
41
Which of the following defines the extent to which an interruption affects normal business operations and the amount of revenue lost due to that interruption?
RTO
42
Sam, a network administrator, is using Wireshark to monitor the network traffic of the organization. He wants to detect TCP packets with no flag set to check for a specific attack attempt. Which filter will he use to view the traffic?
tcp.flags==0x000
43
Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal advice to defend them against this allegation.
Attorney
44
How is a “risk” represented?
Asset + threat + vulnerability
45
Which type of attack is used to hack an IoT device and direct large amounts of network traffic toward a web server, resulting in overloading the server with connections and preventing any new connections?
DDoS
46
Which of the following is true regarding any attack surface?
Decrease in vulnerabilities decreases the attack surface
47
Which type of firewall consists of three interfaces and allows further subdivision of the systems based on specific security objectives of the organization?
Multi-homed firewall
48
John is working as a network defender at a well-reputed multinational company. He wanted to implement security that can help him identify any future attacks that can be targeted toward his organization and take appropriate security measures and actions beforehand to defend against them. Which one of the following security defense techniques should be implement?
Proactive security approach
49
Which of the following helps in viewing account activity and events for supported services made by AWS?
AWS CloudTrial
50
A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access it at any time and from any location. What is the appropriate backup method that should be implemented?
Cloud backup
51
Which of the Windows security component is responsible for controlling access of a user to Windows resources?
Security Reference Monitor (SRM)
52
If Myron, head of network defense at Cyberdyne, wants to change the default password policy settings on the company’s Linux systems, which directory should he access?
/etc/login.defs
53
Which of the following security models enable strict identity verification for every user or device attempting to access the network resources? I. Zero-trust network model - II. Castle-and-Moat model -
I only
54
How is application whitelisting different from application blacklisting?
It rejects all applications other than the allowed applications
55
Which among the following is used to limit the number of cmdlets or administrative privileges of administrator, user, or service accounts?
Just Enough Administration (EA)
56
The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol header. What mode of ESP does Jacob need to use to encrypt the IP traffic?
Jacob should utilize ESP in tunnel mode.
57
Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it diffcult to accommodate an increasing number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees. Which network topology will help the administrator solve the problem of needing to add new employees and expand?
Star
58
Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of __________ in order to setup.
Two drives
59
Identify the spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code.
DSSS
60
Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private. What encryption method did Ivan settle on?
Ivan settled on the asymmetric encryption method.
61
A US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that requires a minimum of six drives but will meet high fault tolerance and with a high speed for the data read and write operations. What RAID level will John need to choose to meet this requirement?
RAID level 50
62
Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this, Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on. What should the new employees answer?
They should tell Bryson that NICs perform on the Physical layer.
63
Which Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?
Automated Field Correlation
64
Chris is a senior network administrator. Chris wants to measure the Key Risk Indicator (KRI) to assess the organization. Why is Chris calculating the KRI for his organization? It helps Chris to:
Identifies adverse events
65
Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts administrators when a critical file is altered. What tool could Simon and his administrators implement to accomplish this?
They could use Tripwire.
66
Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the __________ implementation of a VPN.
Tunnel Mode
67
A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a __________ identified which helps measure how risky an activity is.
Key Risk Indicator
68
Andrew would like to configure IPsec in a manner that provides confidentiality for the content of packets. What component of IPsec provides this capability?
ESP
69
John has planned to update all Linux workstations in his network. The organization is using various Linux distributions including Red hat, Fedora and Debian. Which of following commands will he use to update each respective Linux distribution?
1-ii, 2-i,3-iv,4-iii
70
Which of the following type of Uninterruptible power supply (UPS) is used to supply power above 10kVA and provides an ideal electric output presentation, and its constant wear on the power components reduces the dependability?
Double conversion on-line
71
Which type of wireless network threats an attacker stakes out the area from a nearby location with a high gain amplifier drowning out the legitimate access point?
Jamming signal attack
72
What command is used to terminate certain processes in an Ubuntu system?
#kill -9 [PID]
73
John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?
IP layer
74
Which field is not included in the TCP header?
Source IP address
75
Which characteristic of an antenna refers to how directional an antennas radiation pattern is?
Directivity
76
A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other function(s) of the device? (Choose all that apply.)
Manages security keys, Assigns user addresses
77
Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other. How will they ensure the authenticity of their emails?
Dan will use his digital signature to sign his mails while Alex will use Dan's public key to verify the authenticity of the mails.
78
The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?
You should run the up2date --d -f -u command.
79
A network designer needs to submit a proposal for a company, which has just published a web portal for its clients on the internet. Such a server needs to be isolated from the internal network, placing itself in a DMZ. Faced with this need, the designer will present a proposal for a firewall with three interfaces, one for the internet network, another for the DMZ server farm and another for the internal network. What kind of topology will the designer propose?
Multi-homed firewall
80
Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements: 1. It has a parity check to store all the information about the data in multiple drives 2. Help reconstruct the data during downtime. 3. Process the data at a good speed. 4. Should not be expensive. The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?
RAID 3
81
Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?
Remediation
82
You are tasked to perform black hat vulnerability assessment for a client. You received official written permission to work with: company site, forum, Linux server with LAMP, where this site hosted. Which vulnerability assessment tool should you consider to use?
OpenVAS
83
What is the best way to describe a mesh network topology?
A network in which every computer in the network has a connection to each and every computer in the network.
84
Which of the following acts as a verifier for the certificate authority?
Registration authority
85
Michael decides to view the ________ to track employee actions on the organization's network.
Firewall Log
86
John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which of following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt? (Choose all that apply.)
tcp.flags==0x2b, tcp.options.mss_val<1460
87
If a network is at risk resulting from misconfiguration performed by unskilled and/or unqualified individuals, what type of threat is this?
Unstructured threats
88
The security network team is trying to implement a firewall capable of operating only in the session layer, monitoring the TCP inter-packet link protocol to determine when a requested session is legitimate or not. Using this type of firewall, they could be able to intercept the communication, making the external network see that the firewall is the source, and facing the user, who responds from the outside is the firewall itself. They are just limiting a requirements previous listed, because they already have a packet filtering firewall and they must add a cheap solution that meets the objective. What kind of firewall would you recommend?
Circuit Level Gateway
89
Which of the following systems includes an independent NAS Head and multiple storage arrays?
Gateway NAS System
90
James is working as a Network Administrator in a reputed company situated in California. He is monitoring his network traffic with the help of Wireshark. He wants to check and analyze the traffic against a PING sweep attack. Which of the following Wireshark filters will he use?
icmp.type==8 or icmp.type==0
91
Which NIST Incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?
Scans/ Probes/ Attempted Access
92
An attacker has access to password hashes of a windows 7 computer. Which of the following attacks can the attacker use to reveal the passwords?
Rainbow table
93
Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. What should she install to prevent piggybacking?
She should install a mantrap.
94
The network administrator wants to strengthen physical security in the organization. Specfically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of following physical security measures should the administrator use?
Mantrap
95
Which of the following types of information can be obtained through network sniffing? (Choose all that apply.)
DNS traffic, Syslog traffic, Telnet passwords
96
John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?
Router(Config-if) # IP route cache flow
97
Identify the password cracking attempt involving precomputed hash values stored as plaintext and used to crack the password.
Rainbow table
98
David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the _________ framework, as it provides a set of controls over IT and consolidates them to form a framework.
COBIT
99
James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company, schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt emails. What should James use?
James could use PGP as a free option for encrypting the company's emails.
100
Ryan works as a network security engineer at an organization the recently suffered an attack. As a countermeasure, Ryan would like to obtain more information about the attacker and chooses to deploy a honeypot into the organizations production environment called Kojoney. Using this honeypot, he would like to emulate the network vulnerability that was attacked previously. Which type of honeypot is he trying to implement?
Low interaction honeypots