Classify the following traffic flows as ALLOWED or BLOCKED through the firewall:
ALLOWED
BLOCKED
Use a secure terminal to connect to 10.1.10.88
Share the desktop on server 10.1.10.120
Perform a DNS query from 10.1.10.88 to 9.9.9.9
View web pages on 10.1.10.120
Authenticate to an LDAP server at 10.1.10.61
Synchronize the clock on a server at 10.1.10.17
1 point
1
Question 2
2.
Match the device to the description. Some device types will not be used.
WAF
MDM
Proxy Server
Router
Load balancer
Jump server
Sensor
IPS
Block SQL injection over an Internet connection
Intercept all browser requests and cache the results
Forward packets between separate VLANs
Configure a group of redundant web servers
Evaluate the in put to a browser-based application
1 point
1
Question 3
3.
Match the attack type to the characteristic:
Phishing
Rootkit
Brute force
Injection
Replay
DDoS
A website stops responding to normal requests
Data is captured and retransmitted to a server
The malware is designed to remain hidden on a computer system
A list of passwords are attempted with a known username
An email link redirects a user to a site that requests login credentials
Permissions are circumvented by adding additional code as application input
1 point
1
Question 4
4.
Match the cryptography technology to the description:
Salting
Asymmetric
Collision
Key stretching
Masking
Steganography
Create a stronger key using multiple processes
Data is hidden within another media type
Different inputs create the same hash
Sensitive data is hidden from view
A different key is used for decryption than encryption
Information is added to make a unique hash
1 point
1
Question 5
5.
Add the most applicable security technologies to the following scenarios:
Sandboxing
NGFW
SD-WAN
VPN
802.1X
A field service engineer uses their corporate laptop at coffee shops and hotels
Software developers run a series of tests before deploying an application
An administrator prevents employees from visiting known-malicious websites
Directly access cloud-based services from all corporate locations
Users connecting to the network should use their corporate authentication credentials
1 point
1
Question 6
6.
A finance company is legally required to maintain seven years of tax records for all of their customers.
Which of the following would be the BEST way to implement this requirement?
1 point
1
Question 7
7.
A system administrator is designing a data center for an insurance company’s new public cloud and would like to automatically rotate encryption keys on a regular basis.
Which of the following would provide this functionality?
1 point
1
Question 8
8.
1 point
1
Question 9
9.
A newly installed IPS is flagging a legitimate corporate application as malicious network traffic.
Which of the following would be the BEST way to resolve this issue?
1 point
1
Question 10
10.
A security administrator has identified an internally developed application which allows modification of SQL queries through the web-based frontend.
Which of the following changes would resolve this vulnerability?
1 point
1
Question 11
11.
A system administrator is implementing a fingerprint scanner to provide access to the data center.
Which of the following authentication technologies would be associated with this access?
1 point
1
Question 12
12.
The IT department of a transportation company maintains an on-site inventory of chassis-based network switch interface cards. If a failure occurs, the on-site technician can replace the interface card and have the system running again in sixty minutes.
Which of the following BEST describes this recovery metric?
1 point
1
Question 13
13.
A company maintains a server farm in a large data center. These servers are used internally and are not accessible from outside of the data center. The security team has discovered a group of servers was breached before the latest security patches were applied. Breach attempts were not logged on any other servers.
Which of these threat actors would be MOST likely involved in this breach?
1 point
1
Question 14
14.
An organization has received a vulnerability scan report of their Internet-facing web servers. The report shows the servers have multiple Sun Java Runtime Environment (JRE) vulnerabilities, but the server administrator has verified that JRE is not installed.
Which of the following would be the BEST way to handle this report?
1 point
1
Question 15
15.
A user downloaded and installed a utility for compressing and decompressing files. Immediately after installing the utility, the user’s overall workstation performance degraded and it now takes twice as much time to perform any tasks on the computer.
Which of the following is the BEST description of this malware infection?
1 point
1
Question 16
16.
Which of the following is the process for replacing sensitive data with a non-sensitive and functional placeholder?
1 point
1
Question 17
17.
A security administrator has installed a new firewall to protect a web server VLAN. The application owner requires all web server sessions communicate over an encrypted channel.
Which rule should the security administrator add to the firewall rulebase?
1 point
1
Question 18
18.
Which of these would be used to provide multi-factor authentication?
1 point
1
Question 19
19.
A company's network team has been asked to build an IPsec tunnel to a new business partner.
Which of the following security risks would be the MOST important to consider?
1 point
1
Question 20
20.
A company's human resources team maintains a list of all employees participating in the corporate savings plan. A third-party financial company uses this information to manage stock investments for the employees.
Which of the following would describe this financial company?
1 point
1
Question 21
21.
A technology company is manufacturing a military-grade radar tracking system designed to identify any nearby unmanned aerial vehicles (UAVs). The UAV detector must be able to instantly identify and react to a vehicle without delay.
Which of the following would BEST describe this tracking system?
1 point
1
Question 22
22.
An administrator is writing a script to convert an email message to a help desk ticket and assign the ticket to the correct department.
Which of the following should be administrator use to complete this script?
1 point
1
Question 23
23.
A security administrator would like a report showing how many attackers are attempting to use a known vulnerability to gain access to a corporate web server.
Which of the following should be used to gather this information?
1 point
1
Question 24
24.
During a ransomware outbreak, an organization was forced to rebuild database servers from known good backup systems.
In which of the following incident response phases were these database servers brought back online?
1 point
1
Question 25
25.
A security administrator is installing a web server with a newly built operating system.
Which of the following would be the best way to harden this OS?
1 point
1
Question 26
26.
A network IPS has created this log entry:
Frame 4: 937 bytes on wire (7496 bits), 937 bytes captured Ethernet II, Src: HewlettP_82:d8:31, Dst: Cisco_a1:b0:d1 Internet Protocol Version 4, Src: 172.16.22.7, Dst: 10.8.122.244 Transmission Control Protocol, Src Port: 3863, Dst Port: 1433 Application Data: SELECT * FROM users WHERE username='x' or 'x'='x' AND password='x' or 'x'='x'
Which of the following would describe this log entry?
1 point
1
Question 27
27.
An incident response team would like to validate their disaster recovery plans without making any changes to the infrastructure.
Which of the following would be the best course of action?
1 point
1
Question 28
28.
A system administrator has installed a new firewall between the corporate user network and the data center network. When the firewall is turned on with the default settings, users complain the application in the data center is no longer working.
Which of the following would be the BEST way to correct this application issue?
1 point
1
Question 29
29.
Which of these would be used to provide HA for a web-based database application?
1 point
1
Question 30
30.
Each year, a certain number of laptops are lost or stolen and must be replaced by the company.
Which of the following would describe the total cost the company spends each year on laptop replacements?
1 point
1
Question 31
31.
A network administrator is viewing a log file from a web server:
https://www.example.com/?s=/Index/think/ app/invokefunction&function=call_user_func_ array&vars[0]=md5&vars[1][0]=__HelloThinkPHP
Which of the following would be the BEST way to prevent this attack?
1 point
1
Question 32
32.
Sam would like to send an email to Jack and have Jack verify that Sam was the sender of the email.
Which of these should Sam use to provide this verification?
1 point
1
Question 33
33.
The contract of a long-term temporary employee is ending. Which of these would be the MOST important part of the off-boarding process?
1 point
1
Question 34
34.
A cybersecurity analyst has been asked to respond to a denial of service attack against a web server, and the analyst has collected the log files and data from the server.
Which of the following would allow a future analyst to verify the data as original and unaltered?
1 point
1
Question 35
35.
A security administrator is reviewing authentication logs. The logs show a large number of accounts with at least three failed authentication attempts during the previous week.
Which of the following would BEST explain this report data?
1 point
1
Question 36
36.
A security administrator has been asked to block all browsing to casino gaming websites.
Which of the following would be the BEST way to implement this requirement?
1 point
1
Question 37
37.
A company is experiencing downtime and outages when application patches and updates are deployed during the week.
Which of the following would help to resolve these issues?
1 point
1
Question 38
38.
A company is implementing a series of steps to follow when responding to a security event.
Which of the following would provide this set of processes and procedures?
1 point
1
Question 39
39.
A transportation company maintains a scheduling application and a database in a virtualized cloud-based environment.
Which of the following would be the BEST way to backup these services?
1 point
1
Question 40
40.
In an environment using discretionary access controls, which of these would control the rights and permissions associated with a file or directory?
1 point
1
Question 41
41.
A security administrator has installed a network-based DLP solution to determine if file transfers contain PII.
Which of the following describes the data during the file transfer?
1 point
1
Question 42
42.
A medical imaging company would like to connect all remote locations together with high speed network links. The network connections must maintain high throughput rates and must always be available during working hours.
In which of the following should these requirements be enforced with the network provider?
1 point
1
Question 43
43.
A company is implementing a security awareness program for their user community. Which of the following should be included for additional user guidance and training?
1 point
1
Question 44
44.
A security administrator is preparing a phishing email as part of a periodic employee security awareness campaign. The email is spoofed to appear as an unknown third-party and asks employees to immediately click a link or their state licensing will be revoked.
Which of the following should be the expected response from the users?
1 point
1
Question 45
45.
A security administrator would like to minimize the number of certificate status checks made by web site clients to the certificate authority.
Which of the following would be the BEST option for this requirement?
1 point
1
Question 46
46.
A company is concerned their EDR solution will not be able to stop more advanced ransomware variants. Technicians have created a backup and restore utility to get most systems up and running less than an hour after an attack.
What type of security control is associated with this restore process?
1 point
1
Question 47
47.
To upgrade an internal application, the development team provides the operations team with instructions for backing up, patching the application, and reverting the patch if needed. The operations team schedules a date for the upgrade, informs the business divisions, and tests the upgrade process after completion.
Which of the following describes this process?
1 point
1
Question 48
48.
A company is implementing a public file-storage and cloud-based sharing service, and would like users to authenticate with an existing account on a trusted third-party web site.
Which of the following should the company implement?
1 point
1
Question 49
49.
A system administrator is viewing this output from a file integrity monitoring report:
15:43:01 - Repairing corrupted file C:\Windows\System32\kernel32.dll 15:43:03 - Repairing corrupted file C:\Windows\System32\netapi32.dll 15:43:07 - Repairing corrupted file C:\Windows\System32\user32.dll 15:43:43 - Repair complete
Which of the following malware types is the MOST likely cause of this output?
1 point
1
Question 50
50.
What type of vulnerability would be associated with this log information?
GET http://example.com/show.asp?view=../../Windows/ system.ini HTTP/1.1
1 point
1
Question 51
51.
A developer has created an application to store password information in a database.
Which of the following BEST describes a way of protecting these credentials by adding random data to the password?
1 point
1
Question 52
52.
Which of the following processes provides ongoing building and testing of newly written code?
1 point
1
Question 53
53.
Which of the following BEST describes a responsibility matrix?
1 point
1
Question 54
54.
A security administrator is implementing an authentication system for the company.
Which of the following would be the best choice for validating login credentials for all usernames and passwords in the authentication system?
1 point
1
Question 55
55.
A technician is reviewing this information from an IPS log:
MAIN_IPS: 22June2023 09:02:50 reject 10.1.111.7 Alert: HTTP Suspicious Webdav OPTIONS Method Request; Host: Server Severity: medium; Performance Impact:3; Category: info-leak; Packet capture; disable Proto:tcp; dst:192.168.11.1; src:10.1.111.7
Which of the following can be associated with this log information? (Select TWO)
1 point
1
Question 56
56.
A company has contracted with a third-party to provide penetration testing services. The service includes a port scan of each externally-facing device. This is an example of:
1 point
1
Question 57
57.
An access point in a corporate headquarters office has the following configuration:
IP address: 10.1.10.1 Subnet mask: 255.255.255.0 DHCPv4 Server: Enabled SSID: Wireless Wireless Mode: 802.11n Security Mode: WEP-PSK Frequency band: 2.4 GHz Software revision: 2.1 MAC Address: 60:3D:26:71:FF:AA IPv4 Firewall: Enabled
Which of the following would apply to this configuration?
1 point
1
Question 58
58.
An attacker has gained access to an application through the use of packet captures.
Which of the following would be MOST likely used by the attacker?
1 point
1
Question 59
59.
A company is receiving complaints of slowness and disconnections to their Internet-facing web server. A network administrator monitors the Internet link and finds excessive bandwidth utilization from thousands of different IP addresses.
Which of the following would be the MOST likely reason for these performance issues?
1 point
1
Question 60
60.
A company has created an itemized list of tasks to be completed by a third-party service provider. After the services are complete, this document will be used to validate the completion of the services.
Which of the following would describe this agreement type?
1 point
1
Question 61
61.
A company is deploying a series of internal applications to different cloud providers.
Which of the following connection types should be deployed for this configuration?
1 point
1
Question 62
62.
A company is updating components within the control plane of their zero-trust implementation. Which of the following would be part of this update?
1 point
1
Question 63
63.
Which of the following malware types would cause a workstation to participate in a DDoS?
1 point
1
Question 64
64.
Which of these are used to force the preservation of data for later use in court?
1 point
1
Question 65
65.
A company would like to automatically monitor and report on any movement occurring in an open field at the data center.
Which of the following would be the BEST choice for this task?
1 point
1
Question 66
66.
A company is releasing a new product, and part of the release includes the installation of load balancers to the public web site.
Which of the following would best describe this process?
1 point
1
Question 67
67.
A system administrator would like to prove an email message was sent by a specific person.
Which of the following describes the verification of this message source?
1 point
1
Question 68
68.
A security administrator has created a policy to alert if a user modifies the hosts file on their system.
Which of the following behaviors does this policy address?
1 point
1
Question 69
69.
A company has identified a web server data breach resulting in the theft of financial records from 150 million customers. A security update to the company’s web server software was available for two months prior to the breach.
Which of the following would have prevented this breach from occurring?
1 point
1
Question 70
70.
During the onboarding process, the IT department requires a list of software applications associated with the new employee's job functions.
Which of the following would describe the use of this information?
1 point
1
Question 71
71.
A system administrator has identified an unexpected username on a database server, and the user has been transferring database files to an external server over the company’s Internet connection. The administrator then performed these tasks:
• Physically disconnected the Ethernet cable on the database server
• Disabled the unknown account
• Configured a firewall rule to prevent file transfers from the server
Which of the following would BEST describe this part of the incident response process?
1 point
1
Question 72
72.
Which of the following would be the MOST effective use of asymmetric encryption?
1 point
1
Question 73
73.
Each salesperson in a company receives a laptop with applications and data to support their sales efforts. The IT manager would like to prevent third-parties from gaining access to this information if the laptop is stolen.
Which of the following would be the BEST way to protect this data?
1 point
1
Question 74
74.
A security administrator has compiled a list of all information stored and managed by an organization.
Which of the following would best describe this list?
1 point
1
Question 75
75.
A security administrator would like to monitor all outbound Internet connections for malicious software.
Which of the following would provide this functionality?
1 point
1
Question 76
76.
What type of security control would be associated with corporate security policies?
1 point
1
Question 77
77.
Which of the following would be the MOST significant security concern when protecting against organized crime?
1 point
1
Question 78
78.
An application team has been provided with a hardened version of Linux to use with a new application installation, and this includes installing a web service and the application code on the server.
Which of the following would BEST protect the application from attacks?
1 point
1
Question 79
79.
A system administrator has configured MAC filtering on their corporate access point, but access logs show unauthorized users accessing the network.
Which of the following should the administrator configure to prevent future unauthorized use?
1 point
1
Question 80
80.
A system administrator has been tasked with performing an application upgrade, but the upgrade has been delayed due to a different scheduled installation of an outdated device driver.
Which of the following issues would best describe this change management delay?
1 point
1
Question 81
81.
During an initial network connection, a supplicant communicates to an authenticator, which then sends an authentication request to an Active Directory database.
Which of the following would BEST describe this authentication technology?
1 point
1
Question 82
82.
A security researcher has been notified of a potential hardware vulnerability.
Which of the following should the researcher evaluate as a potential security issue?
1 point
1
Question 83
83.
Visitors to a corporate data center must enter through the main doors of the building.
Which of the following security controls would be the BEST choice to successfully guide people to the front door? (Select TWO)
1 point
1
Question 84
84.
A company's employees are required to authenticate each time a file share, printer, or SAN imaging system is accessed.
Which of the following should be used to minimize the number of employee authentication requests?
1 point
1
Question 85
85.
A company has recently moved from one accounting system to another, and the new system includes integration with many other divisions of the organization.
Which of the following would ensure that the correct access has been provided to the proper employees in each division?
1 point
1
Question 86
86.
An attacker has circumvented a web-based application to send commands directly to a database.
Which of the following would describe this attack type?
1 point
1
Question 87
87.
A group of business partners is using blockchain technology to monitor and track raw materials and parts as they are transferred between companies.
Where would a partner find these tracking details?
1 point
1
Question 88
88.
A network technician at a bank has noticed a significant decrease in traffic to the bank's public website. After additional investigation, the technician finds that users are being directed to a web site which looks similar to the bank's site but is not under the bank's control. Flushing the local DNS cache and changing the DNS entry does not have any effect.
Which of the following has most likely occurred?
1 point
1
Question 89
89.
A company runs two separate applications in their data center. The security administrator has been tasked with preventing all communication between these applications.
Which of the following would be the BEST way to implement this security requirement?
1 point
1
Question 90
90.
A receptionist at a manufacturing company recently received an email from the CEO asking for a copy of the internal corporate employee directory. It was later determined that the email address was not sent from the CEO and the domain associated with the email address was not a corporate domain name.
What type of training could help identify this type of attack in the future?
1 point
1
Question 91
91.
Which of the following deployment models would a company follow if they require individuals to use their personal phones for work purposes?