| You are reviewing Web server logs after |
Detective |
Preventative |
Compensating |
| 1 |
a Web application security breach. To what type of security control
do log
|
| reviews relate? |
| After analyzing the risk associated with |
Risk acceptance |
Risk mitigation |
Risk transfer |
| working with an external organization |
| to fulfil a government contract, you |
| 2 |
|
| agreement after applying security |
| settings to the external organization. |
| What type of risk treatment is this? |
| 3 |
|
Multiply the Annual |
Multiply the Asset |
Multiply the Annual |
| Rate of Occurrence |
Rate of Occurrence |
| Value (AV) by the |
| (ARO) by the |
(ARO) by the Asset |
| Exposure Factor (EF). |
| Exposure Factor (EF). |
Value (AV). |
Rate of Occurrence
|
Rate of Occurrence |
(ALE) calculated?
|
(ARO) by the |
(ARO) by the Asset |
|
Value (AV). |
| on subjective opinions regarding threat |
the security of password hashes?
|
|
| research equipment and servers on a |
|
technique should you use?
|
| 4 |
Why is it important to install blanking |
Rack security is |
|
Visual equipment |
| panels on equipment rack spaces that |
inspection is made |
| enhanced |
|
|
easier |
| 5 |
|
Cold aisles |
Hot aisles |
Air conditioning |
focuses on pulling warm equipment
|
exhaust air away from equipment?
|
|
Which of the following constitutes multifactor
authentication (MFA)? |
Username + password |
Fingerprint scan |
Facial recognition |
| device PIN |
application using a digitally signed
|
|
| 3 |
|
Multifactor |
|
One-time password
|
generates a code for use only once?
|
|
|
authentication for a Linux host that will
|
| on the Linux server |
the Linux server |
|
|
| users in the Finance department. What |
configuring?
|
| 6 |
Which technique adds location
|
Geofencing |
Global positioning |
|
|
| system |
|
used with IEEE 802.1x network access
|
| device attempting to connect to an IEEE |
network authentication?
|
|
|
| 9 |
You are building a Web application that
|
Multifactor |
Identity federation |
SAML |
will allow users to sign in with their
|
|
authentication |
|
|
|
BAT |
PY |
PS1 |
| You are a Linux sys admin attempting to |
Use the sudo
|
Use the chmod |
Login as root |
| execute privileged commands in Linux |
| 2 |
but you keep receiving “Permission
|
|
command |
| denied” messages. What should you |
| do? |
| Which Linux command can be used to |
|
sha256sum |
ssh |
| 3 |
|
| pair? |
| You are logged into a Linux host and |
dig |
nslookup |
ipconfig |
| 4 |
|
| command should you use? |
| Which of the following Wi-Fi |
WPA3 |
RADIUS
authentication
|
|
| 1 |
|
| weakest? |
| You are planning the configuration of |
|
| Client PKI certificates Server PKI
certificate |
Enable security |
| 2 |
|
protocols that |
| should be acquired/configured? |
|
|
|
| 3 |
Which type of security flaw is not
|
Firmware |
Denial of service |
Application
|
|
| 5 |
|
Dictionary |
Brute-force |
|
|
numbers and symbols?
|
| performing normal |
|
| reverse lookup DNS |
|
| queries for IP |
remove the
|
| addresses. |
|
| that can not only detect, but also stop |
|
| 8 |
|
RAID 0 |
RAID 1 |
RAID 5 |
| so that in the event of a single disk loss, |
|
| the data. Which RAID level should you |
|
executives that travel for work. The
|
|
HSM chips and |
HSM chips and |
TPM chips and |
|
disk encryption. |
encryption. |
encryption. |
laptop. What should you do?
|
|
| 2 |
|
CFB |
ECB |
CBC |
ciphertext from the previous block to
|
be fed into the algorithm to encrypt the
|
|
| the network. Which key will be used for |
| 4 |
|
Your public key |
Sender public key |
Your private key |
|
| 5 |
Your company has numerous public-
|
Generate self-signed |
Acquire public |
Acquire a wildcard |
| facing Web sites that use the same DNS |
domain suffix. You need to use PKI to
|
| certificates for each |
certificates for each |
|
certificate |
| Web sit |
Web site |
|
|
| 6 |
TCP port numbers apply to which layer |
2 |
3 |
4 |
|
| 7 |
What is the general premise of ARP
|
Network devices |
Network devices |
Network devices |
| modify their DNS |
modify their ARP |
modify their ARP |
| cache to use the |
cache to use the |
cache to use the |
cache poisoning?
|
attacker MAC address |
attacker IP address |
attacker MAC |
| for the default |
for the default |
address for the |
| gateway. |
gateway. |
default gateway. |
| 8 |
|
Disable link auto |
MAC filtering |
Intrusion detection |
|
negotiation |
sensor |
| 9 |
|
Weighted |
Active/passive |
Round robin |
|
backend virtual machine?
|
|
| 10 |
To which OSI layer do packet filtering
|
2 |
3 |
4 |
firewalls apply?
|
|
Internet. You also need to ensure client
|
device IP addresses are not exposed to
|
|
|
|
WPA |
WPS |
WEP |
| Your hotel provides free Wi-Fi to |
Send automated |
Provide guests with |
Use RFID tags that |
| guests. The Wi-Fi network is secured. |
| You would like to provide a simple |
emails to registered |
| a printout of Wi-Fi |
contain Wi-Fi |
| 2 |
convenient way for guests to
|
guests with Wi-Fi |
| connection |
connection |
| immediately connect to the Wi-Fi |
connection |
information.
|
information. |
| network using their smartphones. What |
information. |
| should you do? |
| 3 |
|
10 feet |
30 feet |
60 feet |
| You are performing a Wi-Fi site survey |
-120 dBm |
-80 dBm |
-50 dBm |
| due to complaints about slow wireless |
| 4 |
|
| provide the best wireless network |
| speeds? |
| 5 |
|
To forcibly disconnect |
To forcibly |
To test RADIUS |
| disconnect Wi-Fi |
| Wi-Fi clients to |
| clients to prevent |
authentication |
| observe |
| their Wi-Fi |
resiliency. |
| authentication |
|
| 6 |
Which Wi-Fi EAP configuration uses both client and server PKI
certificates?
|
EAP-FAST |
EAP-TTLS |
EAP-TLS |
| hotspot you are presented with a Web |
|
authentication |
access. What is this?
|
|
sudo docker run –d – |
sudo docker run –d |
|
| container image has a small HTTP Web |
|
| 1 |
server stack configure for TCP port 443 |
4443:443 cust-dev- |
p 443:4443 cust-dev- |
–p 4443:443 cust- |
| but you want connectivity to occur |
lamp1 |
lamp1 |
dev-lamp1 |
|
Type 2 |
Type A |
command should you use?
|
| 2 |
Which type of hypervisor runs within
|
Type 1 |
|
| 3 |
|
|
Hybrid |
Community |
|
cloud tenant responsible for patching
|
| Which term describes a specialized |
PLC
|
SLA |
ICS |
| 1 |
computer interface that controls industrial devices such as
|
| manufacturing robots and centrifuges? |
|
|
| 2 |
Which smart home wireless networking
|
ICS |
PLC |
Zigbee |
protocol does not use TCP/IP?
|
|
| 4 |
|
1 mile |
3 miles |
6 miles |
|
| 5 |
|
ECC |
RSA |
MD5 |
smaller keys but provides just as much
|
crypto strength as other algorithms
|
|
| 6 |
Which term describes installing a smart |
|
Geofencing |
Registering |
|
|
| You need to ensure that DNS client |
IPsec |
DNSSEC |
PKI |
| 1 |
query responses are authentic and have not been tampered with.
What
|
| should you configure? |
| Which TCP/IP protocol is used for |
SNMP |
DNSEC |
IPsec |
| 2 |
|
| network host statistics? |
|
|
client and a server?
|
| 4 |
Which language is commonly used by
|
PowerShell |
Python |
Perl |
|
| that uses cookies. You want to prevent |
| Which HTTP response header attribute |
| What type of document is often signed |
MOU |
NDA |
ISA |
| 1 |
by pen testers before starting a pen
|
| test engagement? |
| 2 |
What are some options we can scan for possible vulernabilities
|
|
A host |
|
that may come into contact with
|
|
| the user on-boarding process to ensure |
|
| 2 |
The General Data Protection
|
It protects EU |
It protects EU |
It protects EU |
| citizens data based |
citizen's data |
| Regulation protects EU citizens data |
citizen's data based |
| on time, location, |
regardless of |
under what conditions?
|
on location |
| and data useless |
location |
| 3 |
|
Operating |
Backout plans |
Employee Results |
|
| procedures |
|
| 1 |
Which type of planning is designed to deal with security events as
they occur?
|
Disaster recovery plan |
Business continuity |
Incident response |
| plan |
plan |
department can withstand the loss of
|
|
|
|
due to cost, time or complexity. Technical controls use technology to
safeguard
|
|
as is the case with cybersecurity attack insurance. With risk
avoidance, the risk
|
| Multiply the |
Multiply the Asset |
Correct Answer: Multiple the Asset Value (AV) by
the Exposure Factor (EF). The |
|
|
| Exposure Factor (EF) |
Value (AV) by the |
|
| by the risk severity |
Exposure Factor |
where the EF is a percentage expressing how much of an asset’s value
is loss
|
| rating. |
(EF). |
due to a negative event.
|
| Single Loss |
| Loss Expectancy |
Expectancy (SLE) |
| (SLE) by the Annual |
by the Annual |
| Rate of Occurrence |
Rate of |
| (ARO). |
Occurrence |
calculate the ALE.
|
Correct Answer: A qualitative risk assessment
organizes risks by a severity or threat rating which may differ from one
organization to another.
|
|
| and percentages) to calculate the impact realized threats can have
on assets; |
projected annual cost of negative security incidents.
|
| hashes. The password length does not affect the password hash; the
hash is |
|
you know) and a private key (something you have).
|
| module |
| computer systems. Ransomware is malware that encrypts user data
files and |
Security Module (HSM) is a tamper-proof device used for
cryptographic
|
| ramming buildings. Access control vestibules (man traps) prevent a
second |
prevent physical entry to a room but do not mitigate vehicles
ramming
|
|
impossible.
|
Air flow is improved
|
|
|
|
| improved |
|
panels.
|
Blanking panels
|
Hot aisles |
|
|
categories of authentication such as something you know
(username,
|
|
| to security question |
PIN |
|
| the Windows host |
| Incorrect Answers: None of the listed options
specifies the correct location of |
collections of related permissions, to control resource access.
Discretionary
|
|
|
Correct Answer: Remote Authentication Dial-In User
Service (RADIUS) servers are centralized authentication servers that
receive authentication requests from RADIUS clients such as network
switches and Wi-Fi routers.
Correct Answer: Identity federation uses a central
trusted Identity Provider (IdP) to allow access to resources such as Web
sites.
| federation |
|
|
|
| SH |
PS1 |
Correct Answer: PS1. Microsoft PowerShell scripts
normally use a .PS1 file
|
|
privileged commands as long as they are granted this permission in
the
|
|
|
denied messages in this scenario.
|
Correct Answer: The ssh-keygen command creates an
SSH public and private key pair.
troubleshoot DNS name resolution. The name server lookup
(nslookup)
|
|
network security protocol. Remote Access Dial-in User Service
(RADIUS)
|
requests from RADIUS clients. Disabling DHCP is a hardening
technique
|
|
|
|
certificate to secure communications and normally use TCP port
443.
|
protocols that
|
|
|
Correct Answer: Zero-days are security flaws not yet
known by vendors.
|
|
Offline password attacks use an offline copy of passwords for
cracking
|
| Client devices are |
Client devices are |
|
| infected and are |
| infected and are |
| attempting to |
|
| attempting to |
| discover a |
IPv6 AAAA records to resolve FQDNs to IP addresses.
Clients querying DNS TXT |
| discover a command |
| command and |
|
| and control server. |
| control server. |
Incorrect Answers: The listed reasons are invalid in
this scenario.
|
Correct Answer: A network intrusion prevention
system can not only detect but also be configured to stop suspicious
activity.
| prevention |
| system |
|
| Intrusion detection systems only detect and report, log, or notify
of suspicious |
| improve performance. RAID 5 (disk striping with distributed parity)
writes data |
across the disks in the array, thus providing a performance
improvement in
|
|
| Order laptops with |
Order laptops |
|
encryption. A Trusted Platform Module (TPM) chip in a computer is
used to
|
secure the integrity of the machine boot process and to store disk
volume
|
|
| with TPM chips |
| TPM chips and |
| and configure |
| configure BitLocker |
| BitLocker disk |
|
| disk encryption. |
| encryption. |
|
| operations and the storage of encryption keys. Encrypting File
System (EFS) file |
|
Correct Answer: Symmetric encrypting uses a single
“secret” key for encrypting and decrypting.
SHA256 Symmetric
|
Vector (IV). Output Feedback Mode (OFB) uses a keystream of bits to
encrypt
|
| Sender private key |
Your private key |
|
|
| the sender’s public key (the sender’s private key creates the
digital signature). |
Incorrect Answers: The listed keys are not used to
verify a digital signature.
|
|
Incorrect Answers: Using self-signed or
public certificates for each Web site |
|
ensuring that the certificate request is legitimate.
|
| 7 |
4 |
|
| modify their DNS |
modify their ARP |
| MAC address for the default gateway. ARP cache poisoning
forces client traffic |
|
| gateway. |
default gateway. |
Incorrect Answers: The listed items do not properly
describe ARP cache
|
| Spanning Tree |
Spanning Tree |
poisoning.
|
|
|
| Protocol |
Protocol |
Incorrect Answers: The listed mitigations are not
designed to prevent network |
|
Least connections Round robin
|
|
| 7 |
4 |
|
headers (OSI layers 2-4).
|
Incorrect Answers: The listed layers do not
correctly represent where packet filtering firewalls fit into the OSI
model.
| server |
server |
| internal clients to get to the Internet using a single public IP
address. Network |
|
| TKIP |
WPS |
|
| contain Wi-Fi |
contain Wi-Fi
|
|
| connection |
|
|
| information. |
information. |
|
Incorrect Answers: The listed options are not as
convenient as using NFC tags.
Incorrect Answers: The listed wireless signal
strengths are sub-standard.
|
|
Incorrect Answers: The listed explanations do not
explain why
|
deauthentication is often used with Wi-Fi pen testing.
|
| Protected EAP |
EAP-TLS |
|
|
| Wi-Fi network; sometimes a user account is required (often users
must agree |
|
after the colon is the configured listening port number within the
application
|
container.
|
Correct Answer: Private clouds are owned and used by
a single organization.
Correct Answer: Infrastructure as a Service (IaaS)
includes storage, network and virtual machines. IaaS virtual machine
software patching is the
responsibility of the cloud tenant.
Incorrect Answers: Cloud Service Providers (CSPs)
host cloud services. Service Level Agreements (SLAs) guarantee cloud
service uptime. Infrastructure as a Service (IaaS) includes storage,
network and virtual machines. IaaS virtual machine software patching is
the responsibility of the cloud tenant.
Correct Answer: Programmable Logic Controllers
(PLCs) are used extensively in manufacturing and various industries such
as oil refining, electricity and water treatment.
computerized solution used for industrial process control.
Programmable Logic
|
|
|
10 Gbps |
|
|
20 miles
|
6 miles |
Correct Answer: 4G cell towers have an approximate
range of 6 miles.
|
|
| Correct Answer: Elliptic Curve
Cryptography (ECC) uses small keys to achieve |
|
ECC |
|
Correct Answer: Sideloading refers to installing
mobile device apps directly from installation files, without using an
app store.
Sideloading Sideloading
| that can be used to encrypt and authenticate network messages.
Public Key |
Transfer Protocol Secure (HTTPS) encrypts HTTP network
transmissions
|
|
| encrypt and authenticate network messages. Hyper Text Transfer
Protocol |
servers.
|