問題一覧
1
A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other function(s) of the device? (Choose all that apply.)
Manages security keys, Assigns user addresses
2
In _______ mechanism, the system or application sends log records either on the local disk or over the network.
Push-based
3
Fargo, head of network defense at Globadyne Tech, has discovered an undesirable process in several Linux systems, which causes machines to hang every 1 hour. Fargo would like to eliminate it; what command should he execute?
# kill -9 [PID]
4
If Myron, head of network defense at Cyberdyne, wants to change the default password policy settings on the company’s Linux systems, which directory should he access?
/etc/login.defs
5
How can one identify the baseline for normal traffic?
When the SYN flag appears at the beginning and the FIN flag appears at the end of the connection
6
Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the __________ implementation of a VPN.
Tunnel Mode
7
Which of the following data security technology can ensure information protection by obscuring specific areas of information?
Data masking
8
An attacker has access to password hashes of a windows 7 computer. Which of the following attacks can the attacker use to reveal the passwords?
Rainbow table
9
Sophie has been working as a Windows network administrator at an MNC over the past 7 years. She wants to check whether SMB1 is enabled or disabled. Which of the following command allows Sophie to do so?
Get-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
10
The network administrator wants to strengthen physical security in the organization. Specfically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of following physical security measures should the administrator use?
Mantrap
11
Choose the correct order of steps to analyze the attack surface.
Visualize the attack surface->identify the indicators of exposure->simulate the attack->reduce the attack surface
12
Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other. How will they ensure the authenticity of their emails?
Dan will use his digital signature to sign his mails while Alex will use Dan's public key to verify the authenticity of the mails.
13
Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it diffcult to accommodate an increasing number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees. Which network topology will help the administrator solve the problem of needing to add new employees and expand?
Star
14
Which of the following indicators refers to potential risk exposures that attackers can use to breach the security of an organization?
Indicators of exposure
15
You are tasked to perform black hat vulnerability assessment for a client. You received official written permission to work with: company site, forum, Linux server with LAMP, where this site hosted. Which vulnerability assessment tool should you consider to use?
OpenVAS
16
To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?
Prudent policy
17
Henry, head of network security at Gentech, has discovered a general report template that someone has reserved only for the CEO. Since the file has to be editable, viewable, and deletable by everyone, what permission value should he set?
777
18
A network designer needs to submit a proposal for a company, which has just published a web portal for its clients on the internet. Such a server needs to be isolated from the internal network, placing itself in a DMZ. Faced with this need, the designer will present a proposal for a firewall with three interfaces, one for the internet network, another for the DMZ server farm and another for the internal network. What kind of topology will the designer propose?
Multi-homed firewall
19
Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts administrators when a critical file is altered. What tool could Simon and his administrators implement to accomplish this?
They could use Tripwire.
20
Chris is a senior network administrator. Chris wants to measure the Key Risk Indicator (KRI) to assess the organization. Why is Chris calculating the KRI for his organization? It helps Chris to:
Identifies adverse events
21
David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the _________ framework, as it provides a set of controls over IT and consolidates them to form a framework.
COBIT
22
What is the best way to describe a mesh network topology?
A network in which every computer in the network has a connection to each and every computer in the network.
23
Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?
Remediation
24
Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this, Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on. What should the new employees answer?
They should tell Bryson that NICs perform on the Physical layer.
25
Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements: 1. It has a parity check to store all the information about the data in multiple drives 2. Help reconstruct the data during downtime. 3. Process the data at a good speed. 4. Should not be expensive. The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?
RAID 3
26
The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol header. What mode of ESP does Jacob need to use to encrypt the IP traffic?
Jacob should utilize ESP in tunnel mode.
27
Which of the following is not part of the recommended first response steps for network defenders?
Extract relevant data from the suspected devices as early as possible
28
Sam, a network administrator, is using Wireshark to monitor the network traffic of the organization. He wants to detect TCP packets with no flag set to check for a specific attack attempt. Which filter will he use to view the traffic?
tcp.flags==0x000
29
Which of the following defines the extent to which an interruption affects normal business operations and the amount of revenue lost due to that interruption?
RTO
30
How is a “risk” represented?
Asset + threat + vulnerability
31
Which of the following helps in viewing account activity and events for supported services made by AWS?
AWS CloudTrial
32
Which NIST Incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?
Scans/ Probes/ Attempted Access
33
John, a network administrator, is configuring Amazon EC2 cloud service for his organization. Identify the type of cloud service modules his organization adopted.
Infrastructure-as-a-Service (IaaS)
34
Which of the following security models enable strict identity verification for every user or device attempting to access the network resources? I. Zero-trust network model - II. Castle-and-Moat model -
I only
35
James is working as a Network Administrator in a reputed company situated in California. He is monitoring his network traffic with the help of Wireshark. He wants to check and analyze the traffic against a PING sweep attack. Which of the following Wireshark filters will he use?
icmp.type==8 or icmp.type==0
36
What command is used to terminate certain processes in an Ubuntu system?
#kill -9 [PID]
37
Which of the following acts as a verifier for the certificate authority?
Registration authority
38
Ryan works as a network security engineer at an organization the recently suffered an attack. As a countermeasure, Ryan would like to obtain more information about the attacker and chooses to deploy a honeypot into the organizations production environment called Kojoney. Using this honeypot, he would like to emulate the network vulnerability that was attacked previously. Which type of honeypot is he trying to implement?
Low interaction honeypots
39
Which among the following filter is used to detect a SYN/FIN attack?
tcp.flags==0x003
40
Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?
Application sandboxing
41
A US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that requires a minimum of six drives but will meet high fault tolerance and with a high speed for the data read and write operations. What RAID level will John need to choose to meet this requirement?
RAID level 50
42
Identify the password cracking attempt involving precomputed hash values stored as plaintext and used to crack the password.
Rainbow table
43
Which type of attack is used to hack an IoT device and direct large amounts of network traffic toward a web server, resulting in overloading the server with connections and preventing any new connections?
DDoS
44
How is application whitelisting different from application blacklisting?
It rejects all applications other than the allowed applications
45
Kelly is taking backups of the organization's data. Currently, she is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?
Incremental backup
46
Which of the following refers to the data that is stored or processed by RAM, CPUs, or databases?
Data is Use
47
Which of the following attack surface increase when you keep USB ports enabled on your laptop unnecessarily?
Physical attack surface
48
If a network is at risk resulting from misconfiguration performed by unskilled and/or unqualified individuals, what type of threat is this?
Unstructured threats
49
Which among the following tools can help in identifying IoEs to evaluate human attack surface?
Amass
50
Which of the following provides a set of voluntary recommended cyber security features to include in network-capable IoT devices?
NIST
51
Which characteristic of an antenna refers to how directional an antennas radiation pattern is?
Directivity
52
A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a __________ identified which helps measure how risky an activity is.
Key Risk Indicator
53
Jason has set a firewall policy that allows only a specific list of network services and denies everything else. This strategy is known as a ____________.
Default deny
54
Steven is a Linux system administrator at an IT company. He wants to disable unnecessary services in the system, which can be exploited by the attackers. Which among the following is the correct syntax for disabling a service?
$ sudo systemctl disable [service]
55
Michael decides to view the ________ to track employee actions on the organization's network.
Firewall Log
56
John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which of following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt? (Choose all that apply.)
tcp.flags==0x2b, tcp.options.mss_val<1460
57
John is working as a network defender at a well-reputed multinational company. He wanted to implement security that can help him identify any future attacks that can be targeted toward his organization and take appropriate security measures and actions beforehand to defend against them. Which one of the following security defense techniques should be implement?
Proactive security approach
58
Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of __________ in order to setup.
Two drives
59
Which of the following things need to be identified during attack surface visualization?
Assets, topologies, and policies of the organization
60
Which type of wireless network threats an attacker stakes out the area from a nearby location with a high gain amplifier drowning out the legitimate access point?
Jamming signal attack
61
Which type of firewall consists of three interfaces and allows further subdivision of the systems based on specific security objectives of the organization?
Multi-homed firewall
62
Richard has been working as a Linux system administrator at an MNC. He wants to maintain a productive and secure environment by improving the performance of the systems through Linux patch management. Richard is using Ubuntu and wants to patch the Linux systems manually. Which among the following command installs updates (new ones) for Debian-based Linux OSes?
sudo apt-get dist-upgrade
63
John is a senior network security administrator working at a multinational company. He wants to block specific syscalls from being used by container binaries. Which Linux kernel feature restricts actions within the container?
Seccomp
64
Who is an IR custodian?
An individual responsible for the remediation and resolution of the incident that occurred
65
Which command is used to change the permissions of a file or directory?
chmod
66
John has planned to update all Linux workstations in his network. The organization is using various Linux distributions including Red hat, Fedora and Debian. Which of following commands will he use to update each respective Linux distribution?
1-ii, 2-i,3-iv,4-iii
67
How can a WAF validate traffic before it reaches a web application?
It uses a rule-based filtering technique
68
Which of the following systems includes an independent NAS Head and multiple storage arrays?
Gateway NAS System
69
Based on which of the following registry key, the Windows Event log audit configurations are recorded?
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\ < Event Log >
70
Which Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?
Automated Field Correlation
71
Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private. What encryption method did Ivan settle on?
Ivan settled on the asymmetric encryption method.
72
Leslie, the network administrator of Livewire Technologies, has been recommending multilayer inspection firewalls to deploy the company’s infrastructure. What layers of the TCP/IP model can it protect?
Application, TCP, and IP
73
Andrew would like to configure IPsec in a manner that provides confidentiality for the content of packets. What component of IPsec provides this capability?
ESP
74
Which field is not included in the TCP header?
Source IP address
75
Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal advice to defend them against this allegation.
Attorney
76
How is an “attack” represented?
Motive (goal) + method + vulnerability
77
Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which it is running and communicates with the host machines for requesting resources. Identify the virtualization technique implemented by Elden’s organization.
Para virtualization
78
Which of the following is an example of MAC model?
Bell-LaPadula model
79
Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. What should she install to prevent piggybacking?
She should install a mantrap.
80
Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?
Path rule
81
Which of the following types of information can be obtained through network sniffing? (Choose all that apply.)
DNS traffic, Syslog traffic, Telnet passwords
82
A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access it at any time and from any location. What is the appropriate backup method that should be implemented?
Cloud backup
83
Which of the following connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?
Southbound API
84
The security network team is trying to implement a firewall capable of operating only in the session layer, monitoring the TCP inter-packet link protocol to determine when a requested session is legitimate or not. Using this type of firewall, they could be able to intercept the communication, making the external network see that the firewall is the source, and facing the user, who responds from the outside is the firewall itself. They are just limiting a requirements previous listed, because they already have a packet filtering firewall and they must add a cheap solution that meets the objective. What kind of firewall would you recommend?
Circuit Level Gateway
85
John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?
Router(Config-if) # IP route cache flow
86
Which among the following is used to limit the number of cmdlets or administrative privileges of administrator, user, or service accounts?
Just Enough Administration (EA)
87
Identify the virtualization level that creates a massive pool of storage areas for different virtual machines running on the hardware.
Fabric virtualization
88
Sam wants to implement a network-based IDS and finalizes an IDS solution that works based on pattern matching. Which type of network-based IDS is Sam implementing?
Signature-based IDS
89
Emmanuel works as a Windows system administrator at an MNC. He uses PowerShell to enforce the script execution policy. He wants to allow the execution of the scripts that are signed by a trusted publisher. Which of the following script execution policy setting this?
AllSigned
90
Which command list all ports available on a server?
sudo netstat -tunIp
91
Identify the type of event that is recorded when an application driver loads successfully in Windows.
Information
92
Albert works as a Windows system administrator at an MNC. He uses PowerShell logging to identify any suspicious scripting activity across the network. He wants to record pipeline execution details as PowerShell executes, including variable initialization and command invocations. Which PowerShell logging component records pipeline execution details as PowerShell executes?
Module logging
93
Which of the following is true regarding any attack surface?
Decrease in vulnerabilities decreases the attack surface
94
Which of the following type of Uninterruptible power supply (UPS) is used to supply power above 10kVA and provides an ideal electric output presentation, and its constant wear on the power components reduces the dependability?
Double conversion on-line
95
John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?
IP layer
96
Identify the spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code.
DSSS
97
Which of the Windows security component is responsible for controlling access of a user to Windows resources?
Security Reference Monitor (SRM)
98
James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company, schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt emails. What should James use?
James could use PGP as a free option for encrypting the company's emails.
99
The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?
You should run the up2date --d -f -u command.
100
In ______ method, event logs are arranged in the form of a circular buffer.
Wrapping method