Question
click below
click below
Question
Normal Size Small Size show me how
Set1 test3
Question | Answer |
---|---|
Which aspect of security alerting and monitoring is focused on ensuring that specific software solutions, such as databases or CRM tools, are functioning securely and are not compromised by external threats? | Applications Monitorin |
Kelly Innovations LLC has implemented a firewall to secure its mission-critical financial system. Given that any downtime would result in substantial financial losses, which failure mode should the firewall be set to if it experiences a malfunction? | Fail-open |
Which of the following network technologies separates the control plane from the data plane, allowing for more flexibility and automation in network management? | Software defined networking |
Cheryl's job at Kelly Innovations LLC involves maintaining a record of all company-owned smartphones. Which of the following is MOST likely to be Cheryl's role at Kelly Innovations? | Asset Inventory Manager |
Emily, the network security administrator, noticed an unexpected surge in network traffic late at night. She suspects that this could be malicious activity. Which of the following controls should Emily rely on to detect and respond to this? | IDS/IPS |
Kevin found that the script had been modified to contain a dormant code segment set to activate at a specific date and time. Which type of malware has MOST likely infected Kevin's scripts? | Logic Bomb |
The company's new solution allows employees to log in using their face or fingerprint. What passwordless approach has LunarSoft incorporated? | Biometric authentication |
Troubled, he delved into his computer's activities but couldn't find any unusual software running. Which of the following types of malware is MOST likely responsible for capturing and transmitting Martin's password? | KEYLOGGER |
In the process of deploying a new software application within Kelly Innovations LLC, the IT team identified that a certain module wouldn't function unless another software was already installed. Which of the following BEST describes this situation? | Encountering a software dependency |
What part of a BPA for mission essential functions provides a detailed, step-by-step description of the procedural tasks performed? | Process Flow |
Nicola, an IT manager, is considering an encryption method that uses public and private keys for encryption and decryption. What type of encryption is being considered? | Asymmetric encryption |
Sasha, started conducting training sessions for the employees on security policies. She's also distributed awareness materials and set up monitoring tools to gauge the program's effectiveness. Which phase of security awareness practices is Sasha in? | Execution |
Which of the following is a form of obfuscation where data strings are replaced with a single character like an X or a * but the structure of the data string remains the same? | Data masking |
Which of the following BEST represents a primary goal when seeking evidence of internal audits from a third-party vendor? | Verification of compliance with internal security audits |
Before implementing a change in the organization's critical infrastructure, it's essential to ensure the proposed modification is assessed, reviewed, and authorized. Which process ensures that these steps are followed? | Approval Process |
You want to use a mitigation technique that can help you protect systems from various attacks by installing software that can provide antivirus, firewall, anti-malware.Which of the following mitigation techniques can help you achieve this goal? | Installation of endpoint protection |
They need a document that provides detailed instructions and requirements for the software development project that will include features the software should have, when the work must finished, and other essential details. | SOW - statement of work or Work order |
They wish to employ a method that ensures the data on these drives is completely unrecoverable. Sasha suggests hitting the drives with a hammer. Given that this is not the most effective solution, which of the following is the BEST method to use? | pulverizing with industrial machinery |
Which of the following provides short-term emergency power to a device when the input power source fails, allowing for either proper system shutdown or switching to a long-term power source? | UPS |
What is the name of the web-based attack that involves entering malicious code into user input fields that are executed by a database server? | SQL Injection Structured query language injection |
Which of the following statements is NOT true about the importance of continuous integration in relation to secure operations? | Continous Integration may slow down the dev process but it provide sfar more secure systems overall |
Which of the following statements BEST explains the Acquisition as part of the incident response activities? | Acquistition involves obtaining a clean copy of the data from a device so it can be sed as evidence |
Dion Training is concerned with protecting data in as it moves from Dion's computers to its cloud servers. Which of the following BEST describes the primary method to secure data when it is being transmitted over a network? | Using transport encryption protocols like IPSEC |
Which of the following tools is MOST known for agentless security monitoring/alerting? | Security information and event management |
Which of the following statements BEST explains the importance of the workforce multiplier? | Workforce multiplier enables organizations to rapidly scale their security capabilities using a combination of human and automated resources |
Which of the following backup methods involvesREAL-TIME replication of every transaction made within a system? | Journaling is a form of backup that involves recording all transactions in a system which can be used to restore the system to a previous state. |
Dion Training is establishing a security architecture that requires distinct levels of access, such as differentiating between employee and guest access and ensuring only authorized personnel can access sensitive data. what is this? | Security Zones |
Which of the following motivations refers to the act of threatening to expose someone's secrets unless they comply with certain demands? | Blackmail |
In the realm of systems and data management, who is primarily responsible for determining the classification of data and ensuring it aligns with organizational policies? | Data Owner |
Which of the following is MOST indicative of a voice call threat? | A caller posing as tech support to to obtain passwords |
Which of the following is MOST indicative of a voice call threat? | End-of-Life |
Further analysis revealed that these permissions weren't granted through the company's formal access control procedure. Enrique suspected an external intervention that could have allowed Jamario's account to bypass the standard role-based permissions. | Privlidge Escalation |
you have discovered that the company is currently utilizing a deprecated encryption protocol that poses a significant security threat. Which of the following is the MOST appropriate encryption protocol? | AES |
To prevent employees from accidentally accessing such media in the future, which of the following solutions would be MOST effective? | Implementing Content Categorization |
As organizations grow and expand their digital operations, how can automation and orchestration assist in maintaining security posture? | Enables consistent security standards during scaling |
Which of the following terms is used to describe the probability or frequency of a risk occurring in a given time frame? | Likelihood |
In a compliance workshop at Dion Training, a team is discussing the ramifications of not adhering to industry standards and data protection laws. Which of the following outcomes of non-adherence would result in Dion Training having to pay money? | Fines |
Which of the following objectives is primarily fulfilled by using questionnaires during vendor assessments? | to obtain detailed insights into the vendors security posture |
Which of the following types of threat actors are the least likely to have extensive knowledge of their target and hacking techniques? (Select TWO.) | script kiddie, unskilled attacker |
To ensure that critical encryption keys are available for recovery in case of emergencies, Kelly Innovations LLC has stored a copy of these keys with a trusted third party. Which cryptographic solution is Kelly Innovations LLC using? | Key escrow |
Which of the following is a type of security incident that involves unauthorized disclosure of sensitive data due to INSECURE SETTINGS IN SYSTEMS? | Misconfiguration is a type of human error that involves setting up SYSTEMS or services with incorrect or INSECURE SETTINGS |
His organization wants to implement an additional authentication method that considers his geographic location before granting access to sensitive systems. Which factor of multifactor authentication is the organization planning to use? | Somewhere you are |
She also observes that the source IP addresses for these attempts are from different countries. Which of the following indicators of malicious activity is MOST likely present in this scenario? | impossible travel |
. He wants to ensure that users can access unencrypted web pages on the server and transfer files to and from it. Jamario should ensure which of the following ports are open? (Select TWO.) | 80,21 |
Which statement BEST captures the role of the Policy Administrator within the Zero Trust paradigm? | Manages and updates security policies for access control |
Which of the following statements BEST explains the importance of E-discovery in incident response? | E-discovery requires the examining of drivers to find data that is electronically stored to use it as evidence |
A new regulation requires more exacting controls over system responses to errors. Milieu Solutions has decided to implement a solution that will shut down transactions if network errors occur. | fail-closed |
Which of the following statements regarding data retention in the disposal process is NOT true? | Data retention implies storing all data indefinitely as it might be needed at some point |
Which of the following statements BEST explains the function of an Exposure Factor in the context of vulnerability management? | An exposure factor measures the likelihood of a vulnerability being exploited |
What type of the threat actor is motivated by beliefs about politics and often targets organizations they disagree with? | Hacktivists |
Which of the following terms is used to describe a situation where a security system or tool incorrectly flags an action or event as malicious or harmful, even though it's actually benign? | False Positive |
Which of the following terms BEST describes the measurement used to describe a 7% possibility of hardware failure in the next year based on past statistical data? | Possibility |
Kelly Innovations LLC is seeking a solution to encrypt a virtual disk drive that contains archived financial data without encrypting the entire physical disk. Which encryption level would be BEST for this requirement? | Volume encryption |
Then he directed them to look at both the likelihood that an incident will occur and the potential economic, business, and resource fallout if the incident occurs to create a numerical score for each. Which of the following risk assessment method | Quantatative |
Which of the following terms refers to entities that establish and enforce security standards, regulations, and guidelines across specific sectors such as finance and healthcare? | Regulatory agencies |
What is the primary responsibility of a data custodian in the realm of data governance? | enforces security controls for the safe transport and storage of data |
When implementing a virtualization solution, which of the following considerations is essential to ensure that the virtual machines have sufficient resources to perform tasks efficiently? | COMPUTE |
Which US act requires federal agencies to develop security policies for computer systems that process confidential information? | Computer security act of 1987 |
Dion Training Solutions has partnered with several smaller companies. They set up a system allowing employees from any company to access resources from another partner company without requiring a separate username and password. This is an example of: | Federation |
State banking regulations require that all communications be secure even when traveling across unsecured networks. Which of the following will provide the Best solution to the challenge faced by Log Cabin Bank. | VPN |
Given that cloud architecture provides dynamic resource allocation, which of the following security considerations is MOST critical when dealing with the compute component? | Ensuring isolation between the instances |
They have always converted passwords to fixed length sequences, but now they will do this process more than once to increase the amount of computing power and time it will take for an attacker to decode the password. What is this method known as? | Key Stretching is repeatedly hashing |
His bosswants to purchase a storage device to save symmetric and asymmetric keys. Royston has explained that the Windows-based devices they use have this type of storage embedded in the motherboards. What is the name of the device | TPM |
Upon investigation, it is discovered that an attacker was able to exploit a vulnerability in the encryption used to protect data in transit. Which of the following is the MOST likely cause of this issue? | Cryptographic vulnerability |
To improve its endpoint security, the company has decided to implement (EDR) capabilities across its network. Which of the following choices BEST explains Dizzy Crows would implement Endpoint Detection and Response (EDR) in the given scenario? | EDR provides behavorial analysis and threat detection to detect and respond to cyber threats |
Which of the following terms refers to a list that explicitly grants access or permissions to specific entities, while all others are implicitly denied? | Allow List |
Kelly Innovations has observed that their network devices are receiving requests that require secure and private interactions, originating from unidentified sources. The IT department hasn’t identified similar requests on other parts of the network. | TLS |
Which of the following BEST describes the primary objective of an integrated penetration test? | to asses physical , software, and network layers |
Which of the following refers to a vulnerability in software that is unknown to the vendor and often exploited by malicious actors before a patch is released? | zero day |
Which system offers a consistent and standardized method for naming and referring to specific publicly known security vulnerabilities and exposures in software and systems? | CVE |
Which of the following cryptographic techniques uses the same key for both encryption and decryption processes, making it essential that the key remains secret and is shared securely among the involved parties? | AES |
Which of the following statements BEST explains the importance of considering single points of failure? | Mitigating single points of failure is crucial to maintain the availability and reliability of automated security operations |
When aiming to limit access between different parts of a network to reduce the potential impact of compromised systems, which activity is MOST directly applied? | Network segmentation |
The message accompanying the timer indicated that unless a certain amount in cryptocurrency was transferred to a specific address before the countdown ended, the decryption key would be destroyed permanently. Which form of malware is this | crypto ransom malware |
Dion Training is planning to expand its online services, including launching multiple subdomains for different courses. They want a single certificate that can secure all these subdomains. Which type of certificate should Dion Training consider? | Wildcard |
Which of the following network designs involves using air-gapping, disconnecting cables, or locking devices to prevent unauthorized access or interference? | Physical Isolation |
A healthcare organization wants to ensure that patient medical records are kept confidential when transmitted between facilities. Which of the following techniques would be the MOST effective in safeguarding this data during transmission? | SFTP provides secure data transfer, end-to-end encryption. |
An attacker uses a phone call to impersonates a bank representative in order to gather sensitive customer information. Which of the following threat vectors does this describe? | Vishing |
A security analyst is investigating a malware incident and finds that the malware has encrypted the data or files on the system and demands money for their decryption or restoration. Which of the following types of malware is this | Ransomware |
Which of the following best describes a governance model where decision-making authority is restricted to a few individuals at the top of the organizational hierarchy? | Centralized Governance |
Which of the following email security techniques specifically utilizes email certificates to authenticate and safeguard email content? | S/MIME |
A security researcher discovers a new vulnerability in an operating system . He reports the vulnerability to the vendor and the vendor releases a patch. What type of vulnerability is did the researcher find? | Zero-Day |
The market has a high risk, high reward profile, but it will be difficult to break into the current market. Henry suggests that they wait and see if the market changes and becomes easier to enter. Which risk strategy is Henry using? | Avoid |
An organization has recently decided to utilize multiple operating systems and applications on a single physical server to optimize resource usage and reduce costs. Which of the following BEST represents this approach? | Virtualization |
At Dion Training, promoting security awareness is paramount. To fortify organizational data protection, what should Dion Training do to uphold and enhance password management best practices? | Instruct users to create strong, unique passwords fr each account |
Which of the following terms specifically represents the target duration for recovering IT and business operations after a disruptive event? | RTO |
Which of the following statements BEST explains the importance of Root Cause Analysis in incident response? | Root cause analysis helps to understand how the incident occurred and how to prevent it from occuring |
Which of the following BEST describes the action taken when a file is quarantined during an alert response? | Access to the original file is denied by the user q |
Which of the following BEST describes a process used to identify differences between the current state of a system and its desired future state? | Gap analysis |
Which of the following MOST accurately describes a reason for implementing a data retention policy? | The ensure compliance with legal and regulatory |