Asked by skeeca
1. Question 1 Implementing a Security Awareness training program...
1.
Question 1
Implementing a Security Awareness training program would be an example of which type of control?
1 point
Technical control
Physical control
Administrative control
Operational control
2.
Question 2
Putting locks on a door is an example of which type of control?
1 point
Preventative
Corrective
Deterrent
Detective
3.
Question 3
How would you classify a piece of malicious code that can replicate itself and spread to new systems?
1 point
Spyware
A Trojan Horse
A virus
A worm
4.
Question 4
Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?
1 point
A phishing attack
An IP spoofing attack
A mapping attack
A denial of service (DoS) attack
5.
Question 5
Trudy intercepts a plain text message sent by Alice to Bob but in no way interferes with its delivery. Which aspect of the CIA Triad was violated?
1 point
Confidentiality
Integrity
Availability
All of the above.
6.
Question 6
A company wants to prevent employees from wasting time on social media sites. To accomplish this, a document forbidding use of these sites while at work is written and circulated and then the firewalls are updated to block access to Facebook, Twitter and other popular sites. Which two (2) types of security controls has the company just implemented? (Select 2)
1 point
Physical
Operational
Technical
Administrative
7.
Question 7
A penetration tester that gains access to a system without permission and then exploits it for personal gain is said to wear what color hat?
1 point
White
Gray
Black
Green
8.
Question 8
Trying to break an encryption key by trying every possible combination of characters is called what?
1 point
A brute force attack
A social engineering attack
A rainbow table attack
A known cyphertext attack
9.
Question 9
Which of the following describes the core goals of IT security?
1 point
The Open Web Application Security Project (OWASP) Framework.
The CIA Triad.
The Business Process Management Framework.
The Information Technology Infrastructure Library (ITIL) framework.
10.
Question 10
Which position conducts information security investigations for organizations to identify threats that could compromise the organization?
1 point
Information Security Auditor
Information Security Analyst
Information Security Architect
Vulnerability Assessor
11.
Question 11
ITIL is best described as what?
1 point
A collection of IT Service Management controls.
A collection of IT Service Management best practices.
Privacy regulations for IT systems.
A framework for the development of information systems audit procedures.
12.
Question 12
Alice sends a message to Bob that is intercepted by Trudy. Which scenario describes a confidentiality violation?
1 point
Trudy changes the message and then forwards it on.
Trudy cannot read it because it is encrypted but allows it to be delivered to Bob in its original form.
Trudy deletes the message without forwarding it.
Trudy reads the message.
13.
Question 13
In cybersecurity, Accountability is defined as what?
1 point
Being able to apply financial management to a process.
Being able to map an action to an identity.
The property of being genuine and verifiable.
The first or original copy of a document or message.
14.
Question 14
Your bank just implemented 2-factor authentication. Before you can access your account. Which two (2) pairs of factors would satisfy the "2-factor" criteria? (Select 2)
1 point
Your fingerprint scan and face scan.
Your password and fingerprint scan.
Voice recognition and face scan.
Your bank's ATM card and a PIN number.
Your password and PIN number.
15.
Question 15
Which three (3) of the following are Physical Access Controls? (Select 3)
1 point
Security guards
HoneyPots
Door locks
Fences
Firewalls
16.
Question 16
A Windows 10 user has 10 files with exactly the same name. Which statement must be true for these files?
1 point
The files must be on different hard drives.
The files must be in different directories.
The files may be on the same hard drive but must be in different partitions
The files may be in the same directory.
17.
Question 17
Which three (3) permissions can be set on a file in Linux? (Select 3)
1 point
execute
modify
view
read
run
write
18.
Question 18
Which form of Cloud computing combines both public and private clouds?
1 point
Mixed cloud
Open cloud
Binary cloud
Universal cloud
Hybrid cloud
19.
Question 19
Consolidating and virtualizing workloads should be done when?
1 point
Before moving the workloads to the cloud.
After moving the workloads to the cloud but before they are open to users.
Gradually as you generate usage metrics.
It does not matter; these steps require approximately the same amount of work no matter when you elect to do them.
20.
Question 20
Which of the following is a self-regulating standard set up by the credit card industry in the US?
1 point
PCI-DSS
NIST 800-53A
ISO27000 series
HIPAA
GDPR
21.
Question 21
Island hopping is an attack method commonly used in which scenario?
1 point
Supply Chain Infiltration.
Blocking access to a website for all users.
Compromising a corporate VIP.
Trojan Horse attacks.
22.
Question 22
What is the most common patch remediation frequency for most organizations?
1 point
As soon as they are released.
Weekly
Monthly
Annually
23.
Question 23
In Windows kernel mode, what stops a misbehaving driver from impacting other processes?
1 point
The Windows Virtual Address Manager.
Nothing.
The Windows Process Director.
Each process runs in its own dedicated virtual address space.
24.
Question 24
What is the primary authentication protocol used by Microsoft in Active Directory?
1 point
Password Authentication Protocol (PAP)
Transport Layer Security (TLS)
Kerberos
25.
Question 25
Hashing ensures which of the following?
1 point
Confidentiality
Integrity
Availability
All of the above.
26.
Question 26
Which statement is True of Hash functions?
1 point
Hashing is a reliable way to assure the integrity of a message.
Hashes are becoming easier to reverse engineer since computers are becoming more powerful.
The length of the hash string is proportional to the length of the input so the approximate message length can be derived from a hash.
Using hashing is a good way to assure the confidentiality of the messages you send.
27.
Question 27
Which of the following statements about hashing is True?
1 point
If you have two hashes that differ only by a single character, you can infer that the original messages also differed very little.
Hashing uses algorithms that are known as "one-way" functions.
A weakness of hashing is that the hash is proportional in length to the original message.
The original message can be retrieved from the hash if you have the encryption key.
28.
Question 28
Which statement about encryption is True about data in use.
1 point
Short of orchestrating a memory dump from a system crash, there is no practical way for malware to get at the data being processed, so dump logs are your only real concern.
It is vulnerable to theft and should be decrypted only for the briefest possible time while it is being operated on.
Data should always be kept encrypted since modern CPUs are fully capable of operating directly on encrypted data.
Data in active memory registers are not at risk of being stolen.
29.
Question 29
For added security you decide to protect your network by conducting both a stateless and stateful inspection of incoming packets. How can this be done?
1 point
You must install the stateful and stateless firewalls in parallel with an intelligent switch in front of them to direct the packets to one or the other as appropriate.
You must install 2 firewalls in series, so all packets pass through the stateless firewall first and then the stateless firewall.
Install a single firewall that is capable of conducting both stateless and stateful inspections.
Install a stateful firewall only. These advanced devices inspect everything a stateless firewall inspects in addition to state related factors.
30.
Question 30
Which statement best describes configuring a NAT router to use overload mapping?
1 point
The NAT router uses each computer's IP address for both internal and external communication.
Unregistered IP addresses are mapped to registered IP addresses as they are needed.
The organization will need as many registered IP addresses as it has computers that need Internet access.
Many unregistered IP addresses are mapped to a single registered IP address using different port numbers.
31.
Question 31
If a computer needs to send a message to a system that is not part of the local network, where does it send the message?
1 point
The computer's domain name.
The computer's MAC address.
The computer's IP address.
The network's default gateway address.
The network's DHCP server address.
The network's DNS server address.
32.
Question 32
In IPv4, how many of the 4 octets are used to define the network portion of the address in a Class B network?
1 point
1
2
3
4
33.
Question 33
Which three (3) of these statements comparing UDP and TCP are True? (Select 3)
1 point
TCP is connectionless.
TCP is faster than UDP.
UDP is more reliable than TCP.
TCP is more reliable than UDP.
UDP is faster than TCP.
UDP is connectionless.
34.
Question 34
Which type of firewall understands which session a packet belongs to and analyzes it accordingly?
1 point
A Session Firewall (SFW).
An Advanced Firewall (AFW).
A Next Generation Firewall (NGFW).
A Connection Firewall (CFW).
35.
Question 35
If you have to rely upon metadata to work with the data at hand, you are probably working with which type of data?
1 point
Unstructured data
Meta-structured data
Structured data
Semi-structured data
36.
Question 36
Hassan is an engineer who works a normal day shift from his company's headquarters in Austin, TX USA. Which two (2) of these activities raise the most cause for concern? (Select 2)
1 point
Hassan runs a lot of SQL queries that contain invalid syntax.
Each night Hassan logs into his account from an ISP in China.
One evening, Hassan downloads all of the files associated with the new product he is working on.
Hassan has started logging in from home for an hour or so most evenings.
37.
Question 37
Poor user input sanitation and unsafe execution of OS commands leaves a system vulnerable to which form of attack?
1 point
DLL Hijacking
OS Command Injection
Denial of Service (DoS)
SQL Injection
38.
Question 38
Which three (3) items should be included in the Planning step of a penetration test? (Select 3)
1 point
Notifying appropriate law enforcement and regulatory agencies.
Informing Need-to-know employees.
Establishing Boundaries.
Setting Objectives.
39.
Question 39
Which portion of the pentest report would cover the risk ranking, recommendations and roadmap?
1 point
Executive Summary
Recommendations for Remediation
Rules of Engagement
Technical Review
40.
Question 40
Spare workstations and servers, blank removable media, packet sniffers and protocol analyzers, all belong to which Incident Response resource category?
1 point
Incident Handler Communications and Facilities.
Incident Analysis Hardware and Software.
Incident Post-Analysis Resources.
Incident Analysis Resources.
41.
Question 41
NIST recommends considering a number of items, including a high level of testing and monitoring, during which stage of a comprehensive Containment, Eradication & Recovery strategy?
1 point
Containment
Eradication
Recovery
None of these.
42.
Question 42
Forensic analysis should always be conducted on a copy of the original data. Which two (2) types of copying are appropriate for getting data from a laptop acquired from a terminated employee, if you suspect he has deleted incriminating files? (Select 2)
1 point
A disk-to-disk backup.
A logical backup.
A disk-to-file backup.
An incremental backup.
43.
Question 43
Which of these devices collects the most information on network activity?
1 point
Packet sniffers.
Intrusion detection systems.
System Event Management systems.
Firewalls.
44.
Question 44
What scripting concept is widely used across different languages that checks if a condition is true, and if so, takes action, and if false, a different action?
1 point
Variables
Loops
if-then
Arguments
45.
Question 45
Which two (2) statements about Python are true? (Select 2)
1 point
Python code is considered easy to debug compared with other popular programming languages.
Python code is written at a very low level to better integrate with operating system functions.
Python code is considered very readable by novice programmers.
Python is not considered portable, running only on Linux and Windows machines.
46.
Question 46
In the Python statement
pi="3"
What data type is the data type of the variable pi?
1 point
float
int
str
bool
47.
Question 47
What will be printed by the following block of Python code?
def Add5(in)
out=in+5
return out
print(Add5(10))
1 point
10
5
15
Add5(10)
48.
Question 48
According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as personalizing reports to be specific to each intended recipient?
1 point
Collect
Process
Analyze
Share
49.
Question 49
According to the FireEye Mandiant's Security Effectiveness Report 2020, what fraction of security tools are deployed with default settings and thus underperform expectations?
1 point
80%
25%
50%
10%
50.
Question 50
Which is the data protection process that prevents a suspicious data request from being completed?
1 point
Blocking, masking and quarantining
Data risk analysis
Data classification
Data discovery
Answered by therealtutor
Unlock full access to Course Hero
Explore over 16 million step-by-step answers from our library
Subscribe to view answerinia
molestie consequat, ultrices ac magna. Fusce d
, consectetur adipiscing elit. Nam la
ultrices ac magna. Fusce dui lectus, con
ec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ant
ultrices ac magna. Fusce
ac, dictum vit
ipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus e
ur laoreet
facilisis. Pellentesque dap
ia pulvinar tortor nec facilisi
ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit a
usce dui
entesque dap
, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac,
o. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adip
, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia p
facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae o
itur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce d
dictum vitae odio. Donec ali
ce
ctum vitae odio. Donec a
fficitur laoreet. Nam risus a
inia pulvinar tortor n
nec facilisis. Pel
ng elit. Nam lacinia pu
facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapib
risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue v
et, consectetur adipisc
inia pulvinar tortor
, dictum vitae odio. D
ur laoreet. Nam risus ante, dapibus a molestie consequat, ultri
lestie consequat, ul
itur laoreet. Nam risus ante, dapibus a molestie
m risus ante,
facilisis. Pellentesque dapibus efficitu
facilisis.
entesque
or nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molesti
consectetur adipiscing elit. Nam lacinia pulvinar tortor nec
itur l
ffici
consectetu
itur l
risus ante, dapibus a molestie conseq