Summary

This document is a collection of cybersecurity exam questions. The questions cover a range of topics, including vulnerability scanning, data breaches, and security policies. The document includes multiple-choice questions and is intended for a cybersecurity-related course or study.

Full Transcript

\[ { "id": "A6", "question": "A company has hired a third-party to gather information about the company's servers and data. This third-party will not have direct access to the company's internal network, but they can gather information from any other source. Which of the following would BEST describ...

\[ { "id": "A6", "question": "A company has hired a third-party to gather information about the company's servers and data. This third-party will not have direct access to the company's internal network, but they can gather information from any other source. Which of the following would BEST describe this approach?", "options": { "A": "Vulnerability scanning", "B": "Passive reconnaissance", "C": "Supply chain analysis", "D": "Regulatory audit" } }, { "id": "A7", "question": "A company's email server has received an email from a third-party, but the origination server does not match the list of authorized devices. Which of the following would determine the disposition of this message?", "options": { "A": "SPF", "B": "NAC", "C": "DMARC", "D": "DKIM" } }, { "id": "A8", "question": "Which of these threat actors would be MOST likely to attack systems for direct financial gain?", "options": { "A": "Organized crime", "B": "Hacktivist", "C": "Nation state", "D": "Shadow IT" } }, { "id": "A9", "question": "A security administrator has examined a server recently compromised by an attacker, and has determined the system was exploited due to a known operating system vulnerability. Which of the following would BEST describe this finding? Answer: 33 The Details: 43 Quick Answer: 33 The Details: 44 Quick Answer: 33 The Details: 45 Quick Answer: 33 The Details: 46 6 Practice Exam A - QuestionsA10. A city is building an ambulance service network for emergency medical dispatching. Which of the following should have the highest priority?", "options": { "A": "Integration costs", "B": "Patch availability", "C": "System availability", "D": "Power usage" } }, { "id": "A11", "question": "A system administrator receives a text alert when access rights are changed on a database containing private customer information. Which of the following would describe this alert?", "options": { "A": "Maintenance window", "B": "Attestation and acknowledgment", "C": "Automation", "D": "External audit" } }, { "id": "A12", "question": "A security administrator is concerned about the potential for data exfiltration using external storage drives. Which of the following would be the BEST way to prevent this method of data exfiltration? to block the use of removable media host-based firewall logs removable media Answer: 33 The Details: 47 Quick Answer: 33 The Details: 48 Quick Answer: 33 The Details: 49 7 Practice Exam A - QuestionsA13. A company creates a standard set of government reports each calendar quarter. Which of the following would describe this type of data?", "options": { "A": "Data in use", "B": "Obfuscated", "C": "Trade secrets", "D": "Regulated" } }, { "id": "A14", "question": "An insurance company has created a set of policies to handle data breaches. The security team has been given this set of requirements based on these policies: Access records from all devices must be saved and archived Any data access outside of normal working hours must be immediately reported Data access must only occur inside of the country Access logs and audit reports must be created from a single database Which of the following should be implemented by the security team to meet these requirements? (Select THREE) GPS location during the onboarding process that access data accounts authentication serverQuick Answer: 33 The Details: 50 Quick Answer: 33 The Details: 51 8 Practice Exam A - QuestionsA15. A security engineer is viewing this record from the firewall logs: UTC 04/05/2023 03:09:15809 AV Gateway Alert 136.127.92.171 80 -\> 10.16.10.14 60818 Gateway Anti-Virus Alert: XPACK.A\_7854 (Trojan) blocked. Which of the following can be observed from this log information?", "options": { "A": "The victim's IP address is 136.127.92.171", "B": "A download was blocked from a web server", "C": "A botnet DDoS attack was blocked", "D": "The Trojan was blocked, but the file was not", "E": "Consolidate all logs on a SIEM", "F": "Archive the encryption keys of all disabled", "G": "Enable time-of-day restrictions on the" } }, { "id": "A16", "question": "A user connects to a third-party website and receives this message: Your connection is not private. NET::ERR\_CERT\_INVALID Which of the following attacks would be the MOST likely reason for this message?", "options": { "A": "Brute force", "B": "DoS", "C": "On-path", "D": "Deauthentication" } }, { "id": "A17", "question": "Which of the following would be the BEST way to provide a website login using existing credentials from a third-party site? Answer: 33 The Details: 53 Quick Answer: 33 The Details: 54 Quick Answer: 33 The Details: 55 9 Practice Exam A - QuestionsA18. A system administrator is working on a contract that will specify a minimum required uptime for a set of Internet- facing firewalls. The administrator needs to know how often the firewall hardware is expected to fail between repairs. Which of the following would BEST describe this information?", "options": { "A": "MTBF", "B": "RTO", "C": "MTTR", "D": "RPO" } }, { "id": "A19", "question": "An attacker calls into a company's help desk and pretends to be the director of the company's manufacturing department. The attacker states that they have forgotten their password and they need to have the password reset quickly for an important meeting. What kind of attack would BEST describe this phone call?", "options": { "A": "Social engineering", "B": "Supply chain", "C": "Watering hole", "D": "On-path" } }, { "id": "A20", "question": "Two companies have been working together for a number of months, and they would now like to qualify their partnership with a broad formal agreement between both organizations. Which of the following would describe this agreement? Answer: 33 The Details: 56 Quick Answer: 33 The Details: 57 Quick Answer: 33 The Details: 58 10 Practice Exam A - QuestionsA21. Which of the following would explain why a company would automatically add a digital signature to each outgoing email message?", "options": { "A": "Confidentiality", "B": "Integrity", "C": "Authentication", "D": "Availability" } }, { "id": "A22", "question": "The embedded OS in a company's time clock appliance is configured to reset the file system and reboot when a file system error occurs. On one of the time clocks, this file system error occurs during the startup process and causes the system to constantly reboot. Which of the following BEST describes this issue?", "options": { "A": "Memory injection", "B": "Resource consumption", "C": "Race condition", "D": "Malicious update" } }, { "id": "A23", "question": "A recent audit has found that existing password policies do not include any restrictions on password attempts, and users are not required to periodically change their passwords. Which of the following would correct these policy issues? (Select TWO) Answer: 33 The Details: 59 Quick Answer: 33 The Details: 60 Quick Answer: 33 The Details: 61 11 Practice Exam A - QuestionsA24. What kind of security control is associated with a login banner?", "options": { "A": "Preventive", "B": "Deterrent", "C": "Corrective", "D": "Detective", "E": "Compensating", "F": "Directive" } }, { "id": "A25", "question": "An internal audit has discovered four servers that have not been updated in over a year, and it will take two weeks to test and deploy the latest patches. Which of the following would be the best way to quickly respond to this situation in the meantime?", "options": { "A": "Purchase cybersecurity insurance", "B": "Implement an exception for all data center services", "C": "Move the servers to a protected segment", "D": "Hire a third-party to perform an extensive audit" } }, { "id": "A26", "question": "A business manager is documenting a set of steps for processing orders if the primary Internet connection fails. Which of these would BEST describe these steps?", "options": { "A": "Platform diversity", "B": "Continuity of operations", "C": "Cold site recovery", "D": "Tabletop exercise" } }, { "id": "A27", "question": "A company would like to examine the credentials of each individual entering the data center building. Which of the following would BEST facilitate this requirement? Answer: 33 The Details: 62 Quick Answer: 33 The Details: 63 Quick Answer: 33 The Details: 64 Quick Answer: 33 The Details: 65 12 Practice Exam A - QuestionsA28. A company stores some employee information in encrypted form, but other public details are stored as plaintext. Which of the following would BEST describe this encryption strategy?", "options": { "A": "Full-disk", "B": "Record", "C": "Asymmetric", "D": "Key escrow" } }, { "id": "A29", "question": "A company would like to minimize database corruption if power is lost to a server. Which of the following would be the BEST strategy to follow?", "options": { "A": "Encryption", "B": "Off-site backups", "C": "Journaling", "D": "Replication" } }, { "id": "A30", "question": "A company is creating a security policy for corporate mobile devices: All mobile devices must be automatically locked after a predefined time period. The location of each device needs to be traceable. All of the user's information should be completely separate from company data. Which of the following would be the BEST way to establish these security policy rules? Answer: 33 The Details: 66 Quick Answer: 33 The Details: 67 Quick Answer: 33 The Details: 68 13 Practice Exam A - QuestionsA31. A security engineer runs a monthly vulnerability scan. The scan doesn't list any vulnerabilities for Windows servers, but a significant vulnerability was announced last week and none of the servers are patched yet. Which of the following best describes this result?", "options": { "A": "Exploit", "B": "Compensating controls", "C": "Zero-day attack", "D": "False negative" } }, { "id": "A32", "question": "An IT help desk is using automation to improve the response time for security events. Which of the following use cases would apply to this process?", "options": { "A": "Escalation", "B": "Guard rails", "C": "Continuous integration", "D": "Resource provisioning" } }, { "id": "A33", "question": "A network administrator would like each user to authenticate with their corporate username and password when connecting to the company's wireless network. Which of the following should the network administrator configure on the wireless access points?", "options": { "A": "WPA3", "B": "802.1X", "C": "PSK", "D": "MFA" } }, { "id": "A34", "question": "A company's VPN service performs a posture assessment during the login process. Which of the following mitigation techniques would this describe? Answer: 33 The Details: 69 Quick Answer: 33 The Details: 70 Quick Answer: 33 The Details: 71 Quick Answer: 33 The Details: 72 14 Practice Exam A - QuestionsA35. A user has assigned individual rights and permissions to a file on their network drive. The user adds three additional individuals to have read-only access to the file. Which of the following would describe this access control model?", "options": { "A": "Discretionary", "B": "Mandatory", "C": "Attribute-based", "D": "Role-based" } }, { "id": "A36", "question": "A remote user has received a text message with a link to login and confirm their upcoming work schedule. Which of the following would BEST describe this attack?", "options": { "A": "Brute force", "B": "Watering hole", "C": "Typosquatting", "D": "Smishing" } }, { "id": "A37", "question": "A company is formalizing the design and deployment process used by their application programmers. Which of the following policies would apply?", "options": { "A": "Business continuity", "B": "Acceptable use policy", "C": "Incident response", "D": "Development lifecycle" } }, { "id": "A38", "question": "A security administrator has copied a suspected malware executable from a user's computer and is running the program in a sandbox. Which of the following would describe this part of the incident response process? Answer: 33 The Details: 73 Quick Answer: 33 The Details: 74 Quick Answer: 33 The Details: 75 Quick Answer: 33 The Details: 76 15 Practice Exam A - QuestionsA39. A server administrator at a bank has noticed a decrease in the number of visitors to the bank's website. Additional research shows that users are being directed to a different IP address than the bank's web server. Which of the following would MOST likely describe this attack?", "options": { "A": "Deauthentication", "B": "DDoS", "C": "Buffer overflow", "D": "DNS poisoning" } }, { "id": "A40", "question": "Which of the following considerations are MOST commonly associated with a hybrid cloud model?", "options": { "A": "Microservice outages", "B": "IoT support", "C": "Network protection mismatches", "D": "Containerization backups" } }, { "id": "A41", "question": "A company hires a large number of seasonal employees, and their system access should normally be disabled when the employee leaves the company. The security administrator would like to verify that their systems cannot be accessed by any of the former employees. Which of the following would be the BEST way to provide this verification? administrator access for a 24-hour periodQuick Answer: 33 The Details: 77 Quick Answer: 33 The Details: 78 Quick Answer: 33 The Details: 79 16 Practice Exam A - QuestionsA42. Which of the following is used to describe how cautious an organization might be to taking a specific risk?", "options": { "A": "Risk appetite", "B": "Risk register", "C": "Risk transfer", "D": "Risk reporting" } }, { "id": "A43", "question": "A technician is applying a series of patches to fifty web servers during a scheduled maintenance window. After patching and rebooting the first server, the web service fails with a critical error. Which of the following should the technician do NEXT? the change", "options": { "A": "Contact the stakeholders regarding the outage", "B": "Follow the steps listed in the backout plan", "C": "Test the upgrade process in the lab", "D": "Evaluate the impact analysis associated with" } }, { "id": "A44", "question": "An attacker has discovered a way to disable a server by sending specially crafted packets from many remote devices to the operating system. When the packet is received, the system crashes and must be rebooted to restore normal operations. Which of the following would BEST describe this attack?", "options": { "A": "Privilege escalation", "B": "SQL injection", "C": "Replay attack", "D": "DDoS" } }, { "id": "A45", "question": "A data breach has occurred in a large insurance company. A security administrator is building new servers and security systems to get all of the financial systems back online. Which part of the incident response process would BEST describe these actions? Answer: 33 The Details: 80 Quick Answer: 33 The Details: 81 Quick Answer: 33 The Details: 82 Quick Answer: 33 The Details: 83 17 Practice Exam A - QuestionsA46. A network team has installed new access points to support an application launch. In less than 24 hours, the wireless network was attacked and private company information was accessed. Which of the following would be the MOST likely reason for this breach?", "options": { "A": "Race condition", "B": "Jailbreaking", "C": "Impersonation", "D": "Misconfiguration" } }, { "id": "A47", "question": "An organization has identified a significant vulnerability in an Internet-facing firewall. The firewall company has stated the firewall is no longer available for sale and there are no plans to create a patch for this vulnerability. Which of the following would BEST describe this issue?", "options": { "A": "End-of-life", "B": "Improper input handling", "C": "Improper key management", "D": "Incompatible OS" } }, { "id": "A48", "question": "A company has decided to perform a disaster recovery exercise during an annual meeting with the IT directors and senior directors. A simulated disaster will be presented, and the participants will discuss the logistics and processes required to resolve the disaster. Which of the following would BEST describe this exercise? Answer: 33 The Details: 84 Quick Answer: 33 The Details: 85 Quick Answer: 33 The Details: 86 18 Practice Exam A - QuestionsA49. A security administrator needs to block users from visiting websites hosting malicious software. Which of the following would be the BEST way to control this access?", "options": { "A": "Honeynet", "B": "Data masking", "C": "DNS filtering", "D": "Data loss prevention" } }, { "id": "A50", "question": "A system administrator has been called to a system with a malware infection. As part of the incident response process, the administrator has imaged the operating system to a known-good version. Which of these incident response steps is the administrator following?", "options": { "A": "Lessons learned", "B": "Recovery", "C": "Detection", "D": "Containment" } }, { "id": "A51", "question": "A company has placed a SCADA system on a segmented network with limited access from the rest of the corporate network. Which of the following would describe this process? Answer: 33 The Details: 87 Quick Answer: 33 The Details: 88 Quick Answer: 33 The Details: 89 19 Practice Exam A - QuestionsA52. An administrator is viewing the following security log: Dec 30 08:40:03 web01 Failed password for root from 10.101.88.230 port 26244 ssh2 Dec 30 08:40:05 web01 Failed password for root from 10.101.88.230 port 26244 ssh2 Dec 30 08:40:09 web01 445 more authentication failures; rhost=10.101.88.230 user=root Which of the following would describe this attack?", "options": { "A": "Spraying", "B": "Downgrade", "C": "Brute force", "D": "DDoS" } }, { "id": "A53", "question": "During a morning login process, a user's laptop was moved to a private VLAN and a series of updates were automatically installed. Which of the following would describe this process?", "options": { "A": "Account lockout", "B": "Configuration enforcement", "C": "Decommissioning", "D": "Sideloading" } }, { "id": "A54", "question": "Which of the following describes two-factor authentication? smart cardQuick Answer: 33 The Details: 90 Quick Answer: 33 The Details: 91 Quick Answer: 33 The Details: 92 20 Practice Exam A - QuestionsA55. A company is deploying a new application to all employees in the field. Some of the problems associated with this roll out include: The company does not have a way to manage the devices in the field Team members have many different kinds of mobile devices The same device needs to be used for both corporate and private use Which of the following deployment models would address these concerns?", "options": { "A": "CYOD", "B": "SSO", "C": "COPE", "D": "BYOD" } }, { "id": "A56", "question": "An organization is installing a UPS for their new data center. Which of the following would BEST describe this control type?", "options": { "A": "Compensating", "B": "Directive", "C": "Deterrent", "D": "Detective" } }, { "id": "A57", "question": "A manufacturing company would like to track the progress of parts used on an assembly line. Which of the following technologies would be the BEST choice for this task? Answer: 33 The Details: 93 Quick Answer: 33 The Details: 94 Quick Answer: 33 The Details: 95 21 Practice Exam A - QuestionsA58. A company's website has been compromised and the website content has been replaced with a political message. Which of the following threat actors would be the MOST likely culprit?", "options": { "A": "Insider", "B": "Organized crime", "C": "Shadow IT", "D": "Hacktivist" } }, { "id": "A59", "question": "A Linux administrator is downloading an updated version of her Linux distribution. The download site shows a link to the ISO and a SHA256 hash value. Which of these would describe the use of this hash value? the file transfer after download distribution site any malware", "options": { "A": "Verifies that the file was not corrupted during", "B": "Provides a key for decrypting the ISO", "C": "Authenticates the site as an official ISO", "D": "Confirms that the file does not contain" } }, { "id": "A60", "question": "A company's security policy requires that login access should only be available if a person is physically within the same building as the server. Which of the following would be the BEST way to provide this requirement? Answer: 33 The Details: 96 Quick Answer: 33 The Details: 97 Quick Answer: 33 The Details: 98 22 Practice Exam A - QuestionsA61. A development team has installed a new application and database to a cloud service. After running a vulnerability scanner on the application instance, a security administrator finds the database is available for anyone to query without providing any authentication. Which of these vulnerabilities is MOST associated with this issue?", "options": { "A": "Legacy software", "B": "Open permissions", "C": "Race condition", "D": "Malicious update" } }, { "id": "A62", "question": "Employees of an organization have received an email with a link offering a cash bonus for completing an internal training course. Which of the following would BEST describe this email?", "options": { "A": "Watering hole attack", "B": "Cross-site scripting", "C": "Zero-day", "D": "Phishing campaign" } }, { "id": "A63", "question": "Which of the following risk management strategies would include the purchase and installation of an NGFW?", "options": { "A": "Transfer", "B": "Mitigate", "C": "Accept", "D": "Avoid" } }, { "id": "A64", "question": "An organization is implementing a security model where all application requests must be validated at a policy enforcement point. Which of the following would BEST describe this model? Answer: 33 The Details: 99 Quick Answer: 33 The Details: 100 Quick Answer: 33 The Details: 101 Quick Answer: 33 The Details: 102 23 Practice Exam A - QuestionsA65. A company is installing a new application in a public cloud. Which of the following determines the assignment of data security in this cloud infrastructure?", "options": { "A": "Playbook", "B": "Audit committee", "C": "Responsibility matrix", "D": "Right-to-audit clause" } }, { "id": "A66", "question": "When decommissioning a device, a company documents the type and size of storage drive, the amount of RAM, and any installed adapter cards. Which of the following describes this process?", "options": { "A": "Destruction", "B": "Sanitization", "C": "Certification", "D": "Enumeration" } }, { "id": "A67", "question": "An attacker has sent more information than expected in a single API call, and this has allowed the execution of arbitrary code. Which of the following would BEST describe this attack?", "options": { "A": "Buffer overflow", "B": "Replay attack", "C": "Cross-site scripting", "D": "DDoS" } }, { "id": "A68", "question": "A company encourages users to encrypt all of their confidential materials on a central server. The organization would like to enable key escrow as a backup option. Which of these keys should the organization place into escrow? Answer: 33 The Details: 103 Quick Answer: 33 The Details: 104 Quick Answer: 33 The Details: 105 Quick Answer: 33 The Details: 106 24 Practice Exam A - QuestionsA69. A company is in the process of configuring and enabling host-based firewalls on all user devices. Which of the following threats is the company addressing?", "options": { "A": "Default credentials", "B": "Vishing", "C": "Instant messaging", "D": "On-path" } }, { "id": "A70", "question": "A manufacturing company would like to use an existing router to separate a corporate network from a manufacturing floor. Both networks use the same physical switch, and the company does not want to install any additional hardware. Which of the following would be the BEST choice for this segmentation? manufacturing floor with a VPN and the manufacturing floor", "options": { "A": "Connect the corporate network and the", "B": "Build an air gapped manufacturing floor network", "C": "Use host-based firewalls on each device", "D": "Create separate VLANs for the corporate network" } }, { "id": "A71", "question": "An organization needs to provide a remote access solution for a newly deployed cloud-based application. This application is designed to be used by mobile field service technicians. Which of the following would be the best option for this requirement? Answer: 33 The Details: 107 Quick Answer: 33 The Details: 108 Quick Answer: 33 The Details: 109 25 Practice Exam A - QuestionsA72. A company is implementing a quarterly security awareness campaign. Which of the following would MOST likely be part of this campaign?", "options": { "A": "Suspicious message reports from users", "B": "An itemized statement of work", "C": "An IaC configuration file", "D": "An acceptable use policy document" } }, { "id": "A73", "question": "A recent report shows the return of a vulnerability that was previously patched four months ago. After researching this issue, the security team has found a recent patch has reintroduced this vulnerability on the servers. Which of the following should the security administrator implement to prevent this issue from occurring in the future?", "options": { "A": "Containerization", "B": "Data masking", "C": "802.1X", "D": "Change management" } }, { "id": "A74", "question": "A security manager would like to ensure that unique hashes are used with an application login process. Which of the following would be the BEST way to add random data when generating a set of stored password hashes?", "options": { "A": "Salting", "B": "Obfuscation", "C": "Key stretching", "D": "Digital signature" } }, { "id": "A75", "question": "Which cryptographic method is used to add trust to a digital certificate? Answer: 33 The Details: 110 Quick Answer: 33 The Details: 111 Quick Answer: 33 The Details: 112 Quick Answer: 33 The Details: 113 26 Practice Exam A - QuestionsA76. A company is using SCAP as part of their security monitoring processes. Which of the following would BEST describe this implementation? phishing attempts security issues center visitors", "options": { "A": "Train the user community to better identify", "B": "Present the results of an internal audit to the board", "C": "Automate the validation and patching of", "D": "Identify and document authorized data" } }, { "id": "A77", "question": "An organization maintains a large database of customer information for sales tracking and customer support. Which person in the organization would be responsible for managing the access rights to this data?", "options": { "A": "Data processor", "B": "Data owner", "C": "Data subject", "D": "Data custodian" } }, { "id": "A78", "question": "An organization's content management system currently labels files and documents as "Public" and "Restricted." On a recent update, a new classification type of "Private" was added. Which of the following would be the MOST likely reason for this addition? Answer: 33 The Details: 114 Quick Answer: 33 The Details: 115 Quick Answer: 33 The Details: 116 27 Practice Exam A - QuestionsA79. A corporate security team would like to consolidate and protect the private keys across all of their web servers. Which of these would be the BEST way to securely store these keys?","options": {"A":"Integrate an HSM","B":"Implement full disk encryption on the web servers","C":"Use a TPM","D":"Upgrade the web servers to use a UEFI BIOS\" } }, { "id": "A80", "question": "A security technician is reviewing this security log from an IPS: Which of the following can be determined from this log information? (Select TWO) User Agent header client port number", "options": { "A": "The alert was generated from a malformed", "B": "The alert was generated from an embedded script", "C": "The attacker's IP address is 222.43.112.74", "D": "The attacker's IP address is 64.235.145.35", "E": "The alert was generated due to an invalid" } }, { "id": "A81", "question": \"Which of the following describes a monetary loss if one event occurs? Cross-Site Scripting in JSON Data 222.43.112.74:3332 -\> 64.235.145.35:80 URL/index.html - Method POST - Query String \"-\" User Agent: curl/7.21.3 (i386-redhat-linux-gnu) libcurl/7.21.3 NSS/3.13.1.0 zlib/1.2.5 libidn/1.19 libssh2/1.2.7 Detail: token=\" \"Quick Answer: 33 The Details: 117 Quick Answer: 33 The Details: 118 Quick Answer: 33 The Details: 119 28 Practice Exam A - QuestionsA82. A user with restricted access has typed this text in a search field of an internal web-based application: USER77' OR '1'='1 After submitting this search request, all database records are displayed on the screen. Which of the following would BEST describe this search?","options": {"A":"Cross-site scripting","B":"Buffer overflow","C":"SQL injection","D":"SSL stripping\" } }, { "id": "A83", "question": "A user has opened a helpdesk ticket complaining of poor system performance, excessive pop up messages, and the cursor moving without anyone touching the mouse. This issue began after they opened a spreadsheet from a vendor containing part numbers and pricing information. Which of the following is MOST likely the cause of this user's issues?", "options": { "A": "On-path", "B": "Worm", "C": "Trojan horse", "D": "Logic bomb" } }, { "id": "A84", "question": "A web-based manufacturing company processes monthly charges to credit card information saved in the customer's profile. All of the customer information is encrypted and protected with additional authentication factors. Which of the following would be the justification for these security controls? Answer: 33 The Details: 120 Quick Answer: 33 The Details: 121 Quick Answer: 33 The Details: 122 29 Practice Exam A - QuestionsA85. A security manager has created a report showing intermittent network communication from certain workstations on the internal network to one external IP address. These traffic patterns occur at random times during the day. Which of the following would be the MOST likely reason for these traffic patterns?", "options": { "A": "On-path attack", "B": "Keylogger", "C": "Replay attack", "D": "Brute force" } }, { "id": "A86", "question": "The security policies in a manufacturing company prohibit the transmission of customer information. However, a security administrator has received an alert that credit card numbers were transmitted as an email attachment. Which of the following was the MOST likely source of this alert message?", "options": { "A": "IPS", "B": "DLP", "C": "RADIUS", "D": "IPsec" } }, { "id": "A87", "question": "A security administrator has configured a virtual machine in a screened subnet with a guest login account and no password. Which of the following would be the MOST likely reason for this configuration? potential attackers remote users party programming projectsQuick Answer: 33 The Details: 123 Quick Answer: 33 The Details: 124 Quick Answer: 33 The Details: 125 30 Practice Exam A - QuestionsA88. A security administrator is configuring a DNS server with a SPF record. Which of the following would be the reason for this configuration? encrypted tunnel marked as spam", "options": { "A": "Transmit all outgoing email over an", "B": "List all servers authorized to send emails", "C": "Digitally sign all outgoing email messages", "D": "Obtain disposition instructions for emails" } }, { "id": "A89", "question": "A company would like to securely deploy applications without the overhead of installing a virtual machine for each system. Which of the following would be the BEST way to deploy these applications?", "options": { "A": "Containerization", "B": "IoT", "C": "Proxy", "D": "RTOS" } }, { "id": "A90", "question": "A company has just purchased a new application server, and the security director wants to determine if the system is secure. The system is currently installed in a test environment and will not be available to users until the roll out to production next week. Which of the following would be the BEST way to determine if any part of the system can be exploited? Answer: 33 The Details: 126 Quick Answer: 33 The Details: 127 Quick Answer: 33 The Details: 128", "options": { "A": "Tabletop exercise", "B": "Vulnerability scanner", "C": "DDoS", "D": "Penetration testQuick" } } \]

Use Quizgecko on...
Browser
Browser