Podcast
Questions and Answers
Which of the following vulnerabilities directly affects the hardware of a system?
Which of the following vulnerabilities directly affects the hardware of a system?
- Firmware version (correct)
- SQL injection
- Cross-site scripting
- Buffer overflow
A technician is troubleshooting a firewall configuration and decides to add a 'deny any' policy to the bottom of the ACL. This causes several company servers to become unreachable. What should the technician have done to prevent this issue?
A technician is troubleshooting a firewall configuration and decides to add a 'deny any' policy to the bottom of the ACL. This causes several company servers to become unreachable. What should the technician have done to prevent this issue?
- Tested the policy in a non-production environment before enabling it in the production network. (correct)
- Documented the new policy in a change request and submitted it to change management.
- Included an 'allow any' policy above the 'deny any' policy.
- Disabled any intrusion prevention signatures on the 'deny any' policy prior to enabling the new policy.
An organization wants to build a new backup data center with the primary goal of minimizing cost, an RTO of two days, and an RPO of around two days. Which type of backup site is most appropriate for this scenario?
An organization wants to build a new backup data center with the primary goal of minimizing cost, an RTO of two days, and an RPO of around two days. Which type of backup site is most appropriate for this scenario?
- Warm (correct)
- Hot
- Real-time recovery
- Cold
Which of the following statements is TRUE regarding data sovereignty regulations?
Which of the following statements is TRUE regarding data sovereignty regulations?
Which of the following security techniques is most effective in mitigating the risk of a SQL injection attack?
Which of the following security techniques is most effective in mitigating the risk of a SQL injection attack?
Which threat actor is MOST likely to be employed by a nation-state to target infrastructure in another country?
Which threat actor is MOST likely to be employed by a nation-state to target infrastructure in another country?
What is the purpose of adding a unique, random value to a password before hashing?
What is the purpose of adding a unique, random value to a password before hashing?
An employee enters their login information into a fake website after clicking a link in an email. What type of social engineering attack is this?
An employee enters their login information into a fake website after clicking a link in an email. What type of social engineering attack is this?
If an organization wants only the device with IP $10.50.10.25$ to send DNS requests, which firewall access control list (ACL) is correct?
If an organization wants only the device with IP $10.50.10.25$ to send DNS requests, which firewall access control list (ACL) is correct?
A company wants to use existing domain credentials for its new SaaS application, what security mechanism would be MOST suitable?
A company wants to use existing domain credentials for its new SaaS application, what security mechanism would be MOST suitable?
Which scenario BEST exemplifies a Business Email Compromise (BEC) attack?
Which scenario BEST exemplifies a Business Email Compromise (BEC) attack?
A company implements a system that requires multiple methods for authentication. Which technology describes the authentication system?
A company implements a system that requires multiple methods for authentication. Which technology describes the authentication system?
Which of the following describes an attack where a user is redirected to a malicious website by a similar-looking URL?
Which of the following describes an attack where a user is redirected to a malicious website by a similar-looking URL?
An employee receives an email seemingly from an executive requesting gift cards. Which social engineering tactic is most directly exemplified by this?
An employee receives an email seemingly from an executive requesting gift cards. Which social engineering tactic is most directly exemplified by this?
A database administrator requires access to database servers on a separate network segment. What is the recommended secure method?
A database administrator requires access to database servers on a separate network segment. What is the recommended secure method?
A company's internet-facing website was compromised though a buffer overflow. Which of the following security measures is best suited to protect against similar attacks in the future?
A company's internet-facing website was compromised though a buffer overflow. Which of the following security measures is best suited to protect against similar attacks in the future?
Users are logging in from suspicious IP addresses. After user interviews and password resets, what should the administrator implement to prevent this in the future?
Users are logging in from suspicious IP addresses. After user interviews and password resets, what should the administrator implement to prevent this in the future?
A text message requests credential verification from what appears to be the payroll department. What two social engineering techniques are being demonstrated?
A text message requests credential verification from what appears to be the payroll department. What two social engineering techniques are being demonstrated?
Following a smishing attack where the CEO was impersonated, which two actions should the company take?
Following a smishing attack where the CEO was impersonated, which two actions should the company take?
A company requires certified hardware. How can the risk of counterfeit hardware be best addressed?
A company requires certified hardware. How can the risk of counterfeit hardware be best addressed?
What document outlines the parameters and limitations of a third-party penetration test?
What document outlines the parameters and limitations of a third-party penetration test?
A penetration tester is actively scanning ports and services. Which type of reconnaissance is being used?
A penetration tester is actively scanning ports and services. Which type of reconnaissance is being used?
Which of the following plans is required for an organization to properly manage its restore process after a system failure?
Which of the following plans is required for an organization to properly manage its restore process after a system failure?
Installing software outside of a manufacturer's approved repository is associated with which risk?
Installing software outside of a manufacturer's approved repository is associated with which risk?
Multiple failed login attempts from different source IPs are occurring. What attack type is most likely in progress?
Multiple failed login attempts from different source IPs are occurring. What attack type is most likely in progress?
In the context of a Zero Trust data plane, what should an analyst prioritize when evaluating security?
In the context of a Zero Trust data plane, what should an analyst prioritize when evaluating security?
An engineer needs a security solution to prevent unauthorized access to internal company resources. Which is the best recommendation?
An engineer needs a security solution to prevent unauthorized access to internal company resources. Which is the best recommendation?
An attacker compromises an internal system, then pivots to gain access to a critical database server. Which security concept was most directly violated?
An attacker compromises an internal system, then pivots to gain access to a critical database server. Which security concept was most directly violated?
A security analyst identifies an attempted connection to a non-encrypted website. Which string would a web filter use to block these connections?
A security analyst identifies an attempted connection to a non-encrypted website. Which string would a web filter use to block these connections?
A security team needs to block network traffic from a specific IP address (10.1.4.9). Which of the following access list configurations will accomplish this?
A security team needs to block network traffic from a specific IP address (10.1.4.9). Which of the following access list configurations will accomplish this?
Which security measure provides the most secure administrative access with minimal traffic through the security boundary?
Which security measure provides the most secure administrative access with minimal traffic through the security boundary?
To investigate a potential security incident involving an employee's laptop, which log source would provide details of the executable running on the machine?
To investigate a potential security incident involving an employee's laptop, which log source would provide details of the executable running on the machine?
A security team learns of a new attack method, but SIEM alerts are not yet configured. Which action should be taken to identify this new behavior?
A security team learns of a new attack method, but SIEM alerts are not yet configured. Which action should be taken to identify this new behavior?
Purchasing cyber insurance is a strategy to deal with risks identified in the risk register. Which risk management strategy does this represent?
Purchasing cyber insurance is a strategy to deal with risks identified in the risk register. Which risk management strategy does this represent?
Which of the following encryption methods would a security administrator use to encrypt the data stored on employees' laptops?
Which of the following encryption methods would a security administrator use to encrypt the data stored on employees' laptops?
What type of security control does an acceptable use policy represent?
What type of security control does an acceptable use policy represent?
An IT manager limits access to the help desk software's administrative console. What security principle is being applied?
An IT manager limits access to the help desk software's administrative console. What security principle is being applied?
Which document is most likely to contain risks, responsible parties, and risk thresholds?
Which document is most likely to contain risks, responsible parties, and risk thresholds?
What procedure should a security administrator follow when setting up new firewall rules?
What procedure should a security administrator follow when setting up new firewall rules?
A company allows external security testing on its application in exchange for compensation. What type of program is being set up?
A company allows external security testing on its application in exchange for compensation. What type of program is being set up?
Which threat actor is the most likely to utilize substantial financial resources when targeting systems in different countries?
Which threat actor is the most likely to utilize substantial financial resources when targeting systems in different countries?
Which method enables the manipulation of data by running commands through user input fields?
Which method enables the manipulation of data by running commands through user input fields?
What type of data would be considered the primary focus for employees in a research and development unit?
What type of data would be considered the primary focus for employees in a research and development unit?
What security benefit is provided by labeling laptops with asset inventory stickers and associating them with employee IDs?
What security benefit is provided by labeling laptops with asset inventory stickers and associating them with employee IDs?
What is the most effective method to enhance situational awareness among users transitioning back to office work?
What is the most effective method to enhance situational awareness among users transitioning back to office work?
Which visualization method is most suitable for presenting quarterly incident reports to the board of directors?
Which visualization method is most suitable for presenting quarterly incident reports to the board of directors?
If a file integrity monitoring tool reports a hash change for cmd.exe but no patches were applied, what most likely occurred?
If a file integrity monitoring tool reports a hash change for cmd.exe but no patches were applied, what most likely occurred?
In an IaaS cloud model, which party holds the responsibility for securing the company’s database?
In an IaaS cloud model, which party holds the responsibility for securing the company’s database?
Which document should a security company provide when asked for information on a project’s scope, cost, and time frame?
Which document should a security company provide when asked for information on a project’s scope, cost, and time frame?
What application security technique is recommended to mitigate cross-site scripting vulnerabilities?
What application security technique is recommended to mitigate cross-site scripting vulnerabilities?
What must be prioritized when designing a high-availability network?
What must be prioritized when designing a high-availability network?
What is the first step a technician should take before applying high-priority patches to a system?
What is the first step a technician should take before applying high-priority patches to a system?
Why is root cause analysis important in the incident response process?
Why is root cause analysis important in the incident response process?
What is the likely consequence for a large bank that fails an internal PCI DSS compliance assessment?
What is the likely consequence for a large bank that fails an internal PCI DSS compliance assessment?
What is the purpose of capacity planning in business continuity strategies?
What is the purpose of capacity planning in business continuity strategies?
Which method is most effective for a company to restrict access to sensitive documents created in a SaaS application?
Which method is most effective for a company to restrict access to sensitive documents created in a SaaS application?
Flashcards
What type of threat actor is most likely hired by a foreign government for cyberattacks?
What type of threat actor is most likely hired by a foreign government for cyberattacks?
A type of threat actor who is often hired by governments to conduct cyberattacks against other nations. They are highly skilled and often have access to advanced resources and tools.
What is added to data before hashing to increase its security?
What is added to data before hashing to increase its security?
A technique used to enhance the security of one-way hashing algorithms by adding a random value to the input data before hashing. This makes it more challenging for attackers to reverse the hash and obtain the original data.
What type of attack uses a fake website to steal login information?
What type of attack uses a fake website to steal login information?
A type of social engineering attack where attackers create fake websites that closely resemble legitimate online services to trick victims into providing their login credentials and other sensitive information.
How to create an ACL to limit outbound DNS traffic to a specific IP address?
How to create an ACL to limit outbound DNS traffic to a specific IP address?
Signup and view all the flashcards
What is used to reduce the number of credentials employees need to manage?
What is used to reduce the number of credentials employees need to manage?
Signup and view all the flashcards
What is a possible scenario for a business email compromise attack?
What is a possible scenario for a business email compromise attack?
Signup and view all the flashcards
Hardware-specific vulnerability
Hardware-specific vulnerability
Signup and view all the flashcards
SQL injection
SQL injection
Signup and view all the flashcards
Cold site
Cold site
Signup and view all the flashcards
Warm site
Warm site
Signup and view all the flashcards
Deny any policy
Deny any policy
Signup and view all the flashcards
What is a hypervisor?
What is a hypervisor?
Signup and view all the flashcards
How do you block access to non-encrypted websites using a web filter?
How do you block access to non-encrypted websites using a web filter?
Signup and view all the flashcards
How do you block access to the corporate network from a specific IP address?
How do you block access to the corporate network from a specific IP address?
Signup and view all the flashcards
What is a bastion host and how does it help with security?
What is a bastion host and how does it help with security?
Signup and view all the flashcards
Why are endpoint logs significant for security investigations?
Why are endpoint logs significant for security investigations?
Signup and view all the flashcards
What is the purpose of threat hunting?
What is the purpose of threat hunting?
Signup and view all the flashcards
How does cyber insurance help with risk management?
How does cyber insurance help with risk management?
Signup and view all the flashcards
What is full disk encryption and why is it important for laptop security?
What is full disk encryption and why is it important for laptop security?
Signup and view all the flashcards
What is an acceptable use policy (AUP) and what type of security control is it considered?
What is an acceptable use policy (AUP) and what type of security control is it considered?
Signup and view all the flashcards
What is the principle of least privilege?
What is the principle of least privilege?
Signup and view all the flashcards
What is a risk register?
What is a risk register?
Signup and view all the flashcards
Why is change management important when setting up new firewall rules?
Why is change management important when setting up new firewall rules?
Signup and view all the flashcards
What is a bug bounty program?
What is a bug bounty program?
Signup and view all the flashcards
What are nation-state actors in cyber security?
What are nation-state actors in cyber security?
Signup and view all the flashcards
Explain the concept of SQL injection.
Explain the concept of SQL injection.
Signup and view all the flashcards
Labeling laptops with asset stickers and employee IDs
Labeling laptops with asset stickers and employee IDs
Signup and view all the flashcards
Best practice for improving user awareness
Best practice for improving user awareness
Signup and view all the flashcards
Presenting security incident data to the board
Presenting security incident data to the board
Signup and view all the flashcards
Identifying a rootkit infection
Identifying a rootkit infection
Signup and view all the flashcards
Who is responsible for database security in an IaaS model?
Who is responsible for database security in an IaaS model?
Signup and view all the flashcards
Document outlining project scope and deliverables
Document outlining project scope and deliverables
Signup and view all the flashcards
Preventing Cross-Site Scripting (XSS) attacks
Preventing Cross-Site Scripting (XSS) attacks
Signup and view all the flashcards
Key considerations in designing a high-availability network
Key considerations in designing a high-availability network
Signup and view all the flashcards
First step before applying a high-priority patch to a production system
First step before applying a high-priority patch to a production system
Signup and view all the flashcards
Importance of root cause analysis in incident response
Importance of root cause analysis in incident response
Signup and view all the flashcards
Potential outcome of failing a PCI DSS compliance assessment
Potential outcome of failing a PCI DSS compliance assessment
Signup and view all the flashcards
Identifying the required staff for business continuity
Identifying the required staff for business continuity
Signup and view all the flashcards
Limiting access based on location
Limiting access based on location
Signup and view all the flashcards
What is phishing?
What is phishing?
Signup and view all the flashcards
What is a jump server?
What is a jump server?
Signup and view all the flashcards
What is a WAF?
What is a WAF?
Signup and view all the flashcards
What is multi-factor authentication?
What is multi-factor authentication?
Signup and view all the flashcards
What is smishing?
What is smishing?
Signup and view all the flashcards
What is impersonation?
What is impersonation?
Signup and view all the flashcards
Why is supply chain analysis important?
Why is supply chain analysis important?
Signup and view all the flashcards
What is a rules of engagement document?
What is a rules of engagement document?
Signup and view all the flashcards
What is 'active' reconnaissance?
What is 'active' reconnaissance?
Signup and view all the flashcards
What is a disaster recovery plan?
What is a disaster recovery plan?
Signup and view all the flashcards
What is side-loading?
What is side-loading?
Signup and view all the flashcards
What is password spraying?
What is password spraying?
Signup and view all the flashcards
What is subject role in Zero Trust?
What is subject role in Zero Trust?
Signup and view all the flashcards
How does a jump server work?
How does a jump server work?
Signup and view all the flashcards
Study Notes
Threat Actor Analysis
- Organized crime is the most likely threat actor to be hired by a foreign government to attack critical systems in other countries (83% community vote).
Data Transformation
- Salting is used to add complexity before one-way data transformation algorithms (89% community vote).
Social Engineering Attacks
- Phishing is the most likely social engineering attack in which an employee clicks a link in an email, enters login information, and receives a "page not found" error (84% community vote).
Firewall ACLs
- To allow outbound DNS requests from a specific IP address (10.50.10.25), a firewall rule should permit that IP address and deny all others (93% community vote).
Single Sign-On (SSO)
- SSO is the method to reduce employee credentials by using domain credentials to access SaaS applications (100% community vote).
Business Email Compromise (BEC)
- A BEC attack occurs when an employee receives an email from the HR director requesting login credentials to a cloud administrator account (61% community vote).
Jump Server
- A jump server is used for database administrators to access database servers when direct access is restricted (100% community vote).
Web Application Firewall (WAF)
- A WAF is the best solution to protect against buffer overflow attacks on internet-facing websites (74% community vote).
Multi-Factor Authentication (MFA)
- MFA is used to prevent unauthorized logins from suspicious IP addresses (100% community vote).
Social Engineering Techniques
- Impersonation and smishing are common social engineering techniques used to gain credentials, often via text messages (92% community vote).
Employee Recognition Gift Card Phishing
- Cancel gift cards, add smishing exercises to security training and issue general email warnings are best responses to gift card phishing attempts (97% community vote).
Counterfeit Hardware
- Thorough supply chain analysis is the best approach to mitigate risks associated with procuring counterfeit hardware (78% community vote).
Rules of Engagement
- Rules of engagement document the terms of a penetration test with a third-party tester (95% community vote).
Reconnaissance Types
- Active reconnaissance involves port and service scans during penetration testing (100% community vote).
Disaster Recovery Plan (DRP)
- DRP details procedures for recovering from a system failure (97% community vote).
Side Loading
- Side loading is installing software outside a manufacturer's approved software repository (100% community vote).
Password Spraying Attack
- A password spraying attack involves attempting to log in to accounts using a limited set of common passwords (100% community vote).
Zero Trust Principles
- Subject role is the most relevant factor for evaluating Zero Trust principles in the data plane (41% community vote)
Jump Server
- A jump server is the best solution for minimizing traffic allowed through the security boundary for administrative access to internal resources (85% community vote)
Endpoint Logs
- Endpoint logs should be used as a data source for investigations into potential malicious network traffic from employee laptops (93% community vote).
Threat Hunting
- Conducting threat hunting is the best way to identify new, unknown behaviors in SIEM logs before alerts are configured (100% community vote).
Risk Transfer
- Purchasing cyber insurance represents a risk transfer strategy to address items in the risk register (80% community vote).
Full Disk Encryption
- Full disk encryption is the optimal technique for securing data on employee laptops (100% community vote).
Preventive Controls
- Acceptable use policies are preventive security controls (92% community vote).
Least Privilege
- Implementing least privilege means limiting access to only necessary resources for employees (100% community vote).
Risk Register
- A risk register documents risks, responsible parties, and thresholds (100% community vote).
Change Management
- Adhering to change management procedures is crucial when setting up firewall rules (100% community vote).
Bug Bounty Programs
- Bug bounty programs compensate researchers for discovering vulnerabilities in a company’s applications (100% community vote).
Nation-State Actors
- Nation-state actors are most likely to use substantial financial resources to attack critical systems in other countries (100% community vote).
SQL Injection
- SQL injection attacks use input fields to run commands that view or manipulate data (100% community vote).
Intellectual Property
- Intellectual property is the type of company data employees in research and development are most likely to use (100% community vote).
Asset Inventory
- Labeling laptops with asset stickers and associating them with employee IDs improves incident response, security awareness, and record keeping (50% community vote)
Security Training
- Modifying recurring training to include information about employee transition from remote to in-office work is the best way to improve situational and environmental awareness (100% community vote).
Dashboard
- Dashboards are used to present incident data to the board of directors for summary (100% community vote).
Rootkits
- A change in a system file's hash, without corresponding OS patch application, likely indicates rootkit deployment (100% community vote).
Shared Responsibility Model – IaaS
- The client is responsible for securing resources in an IaaS cloud environment (89% community vote).
Statement of Work (SOW)
- A Statement of Work (SOW) details a project, cost, and timeframe for a client (96% community vote).
Input Validation
- Implementing input validation is recommended to prevent cross-site scripting vulnerabilities in web applications (100% community vote).
High Availability
- Ease of recovery and responsiveness are crucial for designing a high-availability network (76% community vote).
Change Control
- Creating a change control request is the first step before applying a high-priority patch to a production system (100% community vote).
Incident Response – Root Cause Analysis
- Conducting root cause analysis in incident response aims to prevent future similar incidents (100% community vote).
PCI DSS Compliance
- Failing a PCI DSS compliance assessment may result in an audit finding, not just fines or sanctions (67% community vote).
Capacity Planning
- Capacity planning determines the staffing required to sustain business operations after a disruption (100% community vote).
Geolocation Policy
- Implementing a geolocation policy is the most effective way to control access to sensitive documents in a SaaS application based on country of origin (100% community vote).
Firmware
- Firmware version is a hardware-specific vulnerability (100% community vote).
Firewall Testing
- Testing firewall policies in a non-production environment before implementation is crucial to avoid disrupting production systems (73% community vote)
Warm Data Center
- A warm data center is best for cost-focused backups with an RTO and RPO of around two days (78% community vote)
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on various cybersecurity vulnerabilities, hardware security issues, and mitigation techniques for common attacks like SQL injection. This quiz also covers data sovereignty regulations and backup strategies for data centers. Challenge yourself and see how well you understand the complexities of cybersecurity