Course Hero Logo
Question
Answered

1. Question 1 Implementing a Security Awareness training program...

1.

Question 1

Implementing a Security Awareness training program would be an example of which type of control?

1 point


Technical control


Physical control


Administrative control


Operational control

2.

Question 2

Putting locks on a door is an example of which type of control?

1 point


Preventative


Corrective


Deterrent


Detective

3.

Question 3

How would you classify a piece of malicious code that can replicate itself and spread to new systems?

1 point


Spyware


A Trojan Horse


A virus


A worm

4.

Question 4

Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?

1 point


A phishing attack


An IP spoofing attack


A mapping attack


A denial of service (DoS) attack

5.

Question 5

Trudy intercepts a plain text message sent by Alice to Bob but in no way interferes with its delivery. Which aspect of the CIA Triad was violated?

1 point


Confidentiality


Integrity


Availability


All of the above.

6.

Question 6

A company wants to prevent employees from wasting time on social media sites. To accomplish this, a document forbidding use of these sites while at work is written and circulated and then the firewalls are updated to block access to Facebook, Twitter and other popular sites. Which two (2) types of security controls has the company just implemented? (Select 2)

1 point


Physical


Operational


Technical


Administrative

7.

Question 7

A penetration tester that gains access to a system without permission and then exploits it for personal gain is said to wear what color hat?

1 point


White


Gray


Black


Green

8.

Question 8

Trying to break an encryption key by trying every possible combination of characters is called what?

1 point


A brute force attack


A social engineering attack


A rainbow table attack


A known cyphertext attack

9.

Question 9

Which of the following describes the core goals of IT security?

1 point


The Open Web Application Security Project (OWASP) Framework.


The CIA Triad.


The Business Process Management Framework.


The Information Technology Infrastructure Library (ITIL) framework.

10.

Question 10

Which position conducts information security investigations for organizations to identify threats that could compromise the organization?

1 point


Information Security Auditor


Information Security Analyst


Information Security Architect


Vulnerability Assessor

11.

Question 11

ITIL is best described as what?

1 point


A collection of IT Service Management controls.


A collection of IT Service Management best practices.


Privacy regulations for IT systems.


A framework for the development of information systems audit procedures.

12.

Question 12

Alice sends a message to Bob that is intercepted by Trudy. Which scenario describes a confidentiality violation?

1 point


Trudy changes the message and then forwards it on.


Trudy cannot read it because it is encrypted but allows it to be delivered to Bob in its original form.


Trudy deletes the message without forwarding it.


Trudy reads the message.

13.

Question 13

In cybersecurity, Accountability is defined as what?

1 point


Being able to apply financial management to a process.


Being able to map an action to an identity.


The property of being genuine and verifiable.


The first or original copy of a document or message.

14.

Question 14

Your bank just implemented 2-factor authentication. Before you can access your account. Which two (2) pairs of factors would satisfy the "2-factor" criteria? (Select 2)

1 point


Your fingerprint scan and face scan.


Your password and fingerprint scan.


Voice recognition and face scan.


Your bank's ATM card and a PIN number.


Your password and PIN number.

15.

Question 15

Which three (3) of the following are Physical Access Controls? (Select 3)

1 point


Security guards


HoneyPots


Door locks


Fences


Firewalls

16.

Question 16

A Windows 10 user has 10 files with exactly the same name. Which statement must be true for these files?

1 point


The files must be on different hard drives.


The files must be in different directories.


The files may be on the same hard drive but must be in different partitions


The files may be in the same directory.

17.

Question 17

Which three (3) permissions can be set on a file in Linux? (Select 3)

1 point


execute


modify


view


read


run


write

18.

Question 18

Which form of Cloud computing combines both public and private clouds?

1 point


Mixed cloud


Open cloud


Binary cloud


Universal cloud


Hybrid cloud

19.

Question 19

Consolidating and virtualizing workloads should be done when?

1 point


Before moving the workloads to the cloud.


After moving the workloads to the cloud but before they are open to users.


Gradually as you generate usage metrics.


It does not matter; these steps require approximately the same amount of work no matter when you elect to do them.

20.

Question 20

Which of the following is a self-regulating standard set up by the credit card industry in the US?

1 point


PCI-DSS


NIST 800-53A


ISO27000 series


HIPAA


GDPR

21.

Question 21

Island hopping is an attack method commonly used in which scenario?

1 point


Supply Chain Infiltration.


Blocking access to a website for all users.


Compromising a corporate VIP.


Trojan Horse attacks.

22.

Question 22

What is the most common patch remediation frequency for most organizations?

1 point


As soon as they are released.


Weekly


Monthly


Annually

23.

Question 23

In Windows kernel mode, what stops a misbehaving driver from impacting other processes?

1 point


The Windows Virtual Address Manager.


Nothing.


The Windows Process Director.


Each process runs in its own dedicated virtual address space.

24.

Question 24

What is the primary authentication protocol used by Microsoft in Active Directory?

1 point


Password Authentication Protocol (PAP)


Transport Layer Security (TLS)


Kerberos

25.

Question 25

Hashing ensures which of the following?

1 point


Confidentiality


Integrity


Availability


All of the above.

26.

Question 26

Which statement is True of Hash functions?

1 point


Hashing is a reliable way to assure the integrity of a message.


Hashes are becoming easier to reverse engineer since computers are becoming more powerful.


The length of the hash string is proportional to the length of the input so the approximate message length can be derived from a hash.


Using hashing is a good way to assure the confidentiality of the messages you send.

27.

Question 27

Which of the following statements about hashing is True?

1 point


If you have two hashes that differ only by a single character, you can infer that the original messages also differed very little.


Hashing uses algorithms that are known as "one-way" functions.


A weakness of hashing is that the hash is proportional in length to the original message.


The original message can be retrieved from the hash if you have the encryption key.

28.

Question 28

Which statement about encryption is True about data in use.

1 point


Short of orchestrating a memory dump from a system crash, there is no practical way for malware to get at the data being processed, so dump logs are your only real concern.


It is vulnerable to theft and should be decrypted only for the briefest possible time while it is being operated on.


Data should always be kept encrypted since modern CPUs are fully capable of operating directly on encrypted data.


Data in active memory registers are not at risk of being stolen.

29.

Question 29

For added security you decide to protect your network by conducting both a stateless and stateful inspection of incoming packets. How can this be done?

1 point


You must install the stateful and stateless firewalls in parallel with an intelligent switch in front of them to direct the packets to one or the other as appropriate.


You must install 2 firewalls in series, so all packets pass through the stateless firewall first and then the stateless firewall.


Install a single firewall that is capable of conducting both stateless and stateful inspections.


Install a stateful firewall only. These advanced devices inspect everything a stateless firewall inspects in addition to state related factors.

30.

Question 30

Which statement best describes configuring a NAT router to use overload mapping?

1 point


The NAT router uses each computer's IP address for both internal and external communication.


Unregistered IP addresses are mapped to registered IP addresses as they are needed.


The organization will need as many registered IP addresses as it has computers that need Internet access.


Many unregistered IP addresses are mapped to a single registered IP address using different port numbers.

31.

Question 31

If a computer needs to send a message to a system that is not part of the local network, where does it send the message?

1 point


The computer's domain name.


The computer's MAC address.


The computer's IP address.


The network's default gateway address.


The network's DHCP server address.


The network's DNS server address.

32.

Question 32

In IPv4, how many of the 4 octets are used to define the network portion of the address in a Class B network?

1 point


1


2


3


4

33.

Question 33

Which three (3) of these statements comparing UDP and TCP are True? (Select 3)

1 point


TCP is connectionless.


TCP is faster than UDP.


UDP is more reliable than TCP.


TCP is more reliable than UDP.


UDP is faster than TCP.


UDP is connectionless.

34.

Question 34

Which type of firewall understands which session a packet belongs to and analyzes it accordingly?

1 point


A Session Firewall (SFW).


An Advanced Firewall (AFW).


A Next Generation Firewall (NGFW).


A Connection Firewall (CFW).

35.

Question 35

If you have to rely upon metadata to work with the data at hand, you are probably working with which type of data?

1 point


Unstructured data


Meta-structured data


Structured data


Semi-structured data

36.

Question 36

Hassan is an engineer who works a normal day shift from his company's headquarters in Austin, TX USA. Which two (2) of these activities raise the most cause for concern? (Select 2)

1 point


Hassan runs a lot of SQL queries that contain invalid syntax.


Each night Hassan logs into his account from an ISP in China.


One evening, Hassan downloads all of the files associated with the new product he is working on.


Hassan has started logging in from home for an hour or so most evenings.

37.

Question 37

Poor user input sanitation and unsafe execution of OS commands leaves a system vulnerable to which form of attack?

1 point


DLL Hijacking


OS Command Injection


Denial of Service (DoS)


SQL Injection

38.

Question 38

Which three (3) items should be included in the Planning step of a penetration test? (Select 3)

1 point


Notifying appropriate law enforcement and regulatory agencies.


Informing Need-to-know employees.


Establishing Boundaries.


Setting Objectives.

39.

Question 39

Which portion of the pentest report would cover the risk ranking, recommendations and roadmap?

1 point


Executive Summary


Recommendations for Remediation


Rules of Engagement


Technical Review

40.

Question 40

Spare workstations and servers, blank removable media, packet sniffers and protocol analyzers, all belong to which Incident Response resource category?

1 point


Incident Handler Communications and Facilities.


Incident Analysis Hardware and Software.


Incident Post-Analysis Resources.


Incident Analysis Resources.

41.

Question 41

NIST recommends considering a number of items, including a high level of testing and monitoring, during which stage of a comprehensive Containment, Eradication & Recovery strategy?

1 point


Containment


Eradication


Recovery


None of these.

42.

Question 42

Forensic analysis should always be conducted on a copy of the original data. Which two (2) types of copying are appropriate for getting data from a laptop acquired from a terminated employee, if you suspect he has deleted incriminating files? (Select 2)

1 point


A disk-to-disk backup.


A logical backup.


A disk-to-file backup.


An incremental backup.

43.

Question 43

Which of these devices collects the most information on network activity?

1 point


Packet sniffers.


Intrusion detection systems.


System Event Management systems.


Firewalls.

44.

Question 44

What scripting concept is widely used across different languages that checks if a condition is true, and if so, takes action, and if false, a different action?

1 point


Variables


Loops


if-then


Arguments

45.

Question 45

Which two (2) statements about Python are true? (Select 2)

1 point


Python code is considered easy to debug compared with other popular programming languages.


Python code is written at a very low level to better integrate with operating system functions.


Python code is considered very readable by novice programmers.


Python is not considered portable, running only on Linux and Windows machines.

46.

Question 46

In the Python statement

pi="3"

What data type is the data type of the variable pi?

1 point


float


int


str


bool

47.

Question 47

What will be printed by the following block of Python code?

def Add5(in)

out=in+5

return out

print(Add5(10))

1 point


10


5


15


Add5(10)

48.

Question 48

According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as personalizing reports to be specific to each intended recipient?

1 point


Collect


Process


Analyze


Share

49.

Question 49

According to the FireEye Mandiant's Security Effectiveness Report 2020, what fraction of security tools are deployed with default settings and thus underperform expectations?

1 point


80%


25%


50%


10%

50.

Question 50

Which is the data protection process that prevents a suspicious data request from being completed?

1 point


Blocking, masking and quarantining


Data risk analysis


Data classification


Data discovery

Answer & Explanation
Verified Solved by verified expert
<p>ce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat</p> Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer

inia

molestie consequat, ultrices ac magna. Fusce d

, consectetur adipiscing elit. Nam la

ultrices ac magna. Fusce dui lectus, con

ec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ant

ultrices ac magna. Fusce

ac, dictum vit

ipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus e

ur laoreet

facilisis. Pellentesque dap

ia pulvinar tortor nec facilisi

ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit a

usce dui

entesque dap

, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac,

o. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adip

, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia p

facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae o

itur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce d

dictum vitae odio. Donec ali

ce

ctum vitae odio. Donec a

fficitur laoreet. Nam risus a

inia pulvinar tortor n

nec facilisis. Pel

ng elit. Nam lacinia pu

facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapib

risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue v

et, consectetur adipisc

inia pulvinar tortor

, dictum vitae odio. D

ur laoreet. Nam risus ante, dapibus a molestie consequat, ultri

lestie consequat, ul

itur laoreet. Nam risus ante, dapibus a molestie

m risus ante,

facilisis. Pellentesque dapibus efficitu

facilisis.

entesque

or nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molesti

consectetur adipiscing elit. Nam lacinia pulvinar tortor nec

itur l

ffici

consectetu

itur l

risus ante, dapibus a molestie conseq

Student reviews
100% (2 ratings)