28 Questions
Which of the following will increase cryptographic security?
High data entropy
What BEST describes zero-day exploits?
A zero-day exploit is initially undetectable, and no patch for it exists.
In order to restrict PHI documents, what should be performed FIRST?
Classification
Which attack has taken place based on the provided server output?
DNS poisoning
What type of attack is described when a user inside a company network receives a certificate mismatch warning when trying to access a website?
On-path
Which tool is effective in preventing a user from accessing unauthorized removable media?
USB data blocker
What solution would BEST meet the requirements of increased scalability and flexibility for back-end infrastructure mentioned by the Chief Security Officer?
Reverse proxy
Which social engineering technique seeks to exploit a person's sense of urgency?
A phishing email stating a cash settlement has been awarded but will expire soon
In the scenario described, which attack involves redirecting network traffic to an attacker-controlled system?
On-path
What is a cost-effective physical control to enforce a USB removable media restriction policy?
Implementing a GPO to restrict access to authorized USB removable media
What security measure can be used to physically block data exchange via USB ports?
USB data blocker
What security control can be implemented when a company suspects compromised accounts due to suspicious logins from unknown locations?
Enforce MFA when an account request reaches a risk threshold
Which action is NOT a suitable method for protecting accounts of traveling employees while avoiding blocking legitimate login requests?
Enforce VPN usage for all remote login attempts
Which method is most effective for an organization looking to share threat intelligence with peer groups?
Subscribing to threat intelligence feeds
What is the BEST way to enforce a restriction policy on USB removable media?
Employing physical locks on USB ports and restricting access
What is a common security measure taken to prevent unauthorized access through compromised accounts?
Employing anomaly detection to flag suspicious login attempts
What provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?
CVSS
In a collaborative research project where universities need to share compute and storage resources, which cloud deployment strategy would BEST meet this need?
Community
To prove that data has not been tampered with since it was collected, a forensic analyst will MOST likely use which method?
Calculate the checksum using a hashing algorithm
After a public website's credentials database was leaked, leading to compromised business accounts, what would BEST mitigate the issue?
Password history
To fingerprint a web server, what tool would a security analyst MOST likely use?
dig 192.168.0.10
What could be used to prioritize mitigation steps for known vulnerabilities in an organization?
SOAR
What type of account is MOST appropriate for a security analyst to share a file for further incident analysis?
Service
When a security analyst shares a file named host1.pcap for further incident analysis, what tool is the team member MOST likely to use to open this file?
Wireshark
If an application developer accidentally uploads a company's code-signing certificate private key to a public web server, what should the company do FIRST?
Revoke the code-signing certificate
An organization compares system settings against secure configuration guidelines. What type of control has the organization implemented?
Detective
To reduce the risk of unsanctioned high-risk SaaS applications, what is the BEST security solution recommended by the Chief Information Security Officer?
CASB
If an organization wants to block unsanctioned high-risk SaaS applications from user access, what could be an effective security measure?
VPN concentrator
Test your knowledge on cost-effective physical controls for enforcing a USB removable media restriction policy. Choose the best example among the given options.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free