No student devices needed. Know more
20 questions
A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?
Discretionary
Rule-based
Role-based
Mandatory
The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?
Install a NIDS device at the boundary.
Segment the network with firewalls.
Update all antivirus signatures daily.
Implement application blacklisting.
A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office. Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?
Nmap
Heat Map
Network DIagrams
Wireshark
An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?
Incident Response
COmmunications
Disaster Recovery
Data Retention
A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?
Mobile device management
Full-device encryption
Remote wipe
Biometrics
A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?
Predictability
Key STretching
Salting
Hashing
When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of?
Acceptance
Mitigation
Avoidance
Transference
Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?
Investigation
Containment
Recovery
Lessons Learned
Which of the following disaster recovery tests is The LEAST time-consuming for the disaster recovery team?
Tabletop
Parallel
Full Interruption
Simulation
An organization suffered an outage and a critical system took 90 minutes to come back online. Though there was no data loss during the outage, the expectation was that the critical system would be available again within 60 minutes Which of the following is the 60-minute expectation an example of:
MTBF
RPO
MTTR
RTO
A company's Chief Information Office (CIO) is meeting with the Chief Information Security Officer (CISO) to plan some activities to enhance the skill levels of the company's developers. Which of the following would be MOST suitable for training the developers'?
A capture-the-flag competition
Phishing simulation
Physical security training
Configuration training
Which of the following is the purpose of a risk register?
To define the level or risk using probability and likelihood
To register the risk with the required regulatory agencies
To identify the risk, the risk owner, and the risk measures
To formally log the type of risk mitigation strategy the organization is using
A security administrator suspects there may be unnecessary services running on a server. Which of the following tools will the administrator MOST likely use to confirm the suspicions?
Nmap
Wireshark
Autopsy
DNSEnum
A host was infected with malware. During the incident response, Joe, a user, reported that he did not receive any emails with links, but he had been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?
DNS logs
Web server logs
SIP traffic logs
SNMP logs
Joe, an employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm Joe’s identity before sending him the prize. Which of the following BEST describes this type of email?
Spear phishing
Whaling
Phishing
Vishing
A security analyst is using a recently released security advisory to review historical logs, looking for the specific activity that was outlined in the advisory. Which of the following is the analyst doing?
A packet capture
User behavior analysis
Threat hunting
Credentialed vulnerability scanning
An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?
Date of birth
Fingerprints
PIN
TPM
A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?
Code signing
Fuzzing
Manual code review
Dynamic code analysis
A Chief Information Security Officer (CISO) is concerned about the organization's ability to continue business operation in the event of a prolonged DDoS attack on its local datacenter that consumes database resources. Which of the following will the CISO MOST likely recommend to mitigate this risk?
Upgrade the bandwidth available into the datacenter
Implement a hot-site failover location
Switch to a complete SaaS offering to customers
Implement a challenge response test on all end-user queries
A network administrator would like to configure a site-to-site VPN utilizing iPSec. The administrator wants the tunnel to be established with data integrity encryption, authentication and anti- replay functions Which of the following should the administrator use when configuring the VPN?
AH
EDR
ESP
DNSSEC
Explore all questions with a free account