You are reviewing Web server logs after |
Detective |
Preventative |
Compensating |
1 |
a Web application security breach. To what type of security control
do log
|
reviews relate? |
After analyzing the risk associated with |
Risk acceptance |
Risk mitigation |
Risk transfer |
working with an external organization |
to fulfil a government contract, you |
2 |
|
agreement after applying security |
settings to the external organization. |
What type of risk treatment is this? |
3 |
|
Multiply the Annual |
Multiply the Asset |
Multiply the Annual |
Rate of Occurrence |
Rate of Occurrence |
Value (AV) by the |
(ARO) by the |
(ARO) by the Asset |
Exposure Factor (EF). |
Exposure Factor (EF). |
Value (AV). |
Rate of Occurrence
|
Rate of Occurrence |
(ALE) calculated?
|
(ARO) by the |
(ARO) by the Asset |
|
Value (AV). |
on subjective opinions regarding threat |
the security of password hashes?
|
|
research equipment and servers on a |
|
technique should you use?
|
4 |
Why is it important to install blanking |
Rack security is |
|
Visual equipment |
panels on equipment rack spaces that |
inspection is made |
enhanced |
|
|
easier |
5 |
|
Cold aisles |
Hot aisles |
Air conditioning |
focuses on pulling warm equipment
|
exhaust air away from equipment?
|
|
Which of the following constitutes multifactor
authentication (MFA)? |
Username + password |
Fingerprint scan |
Facial recognition |
device PIN |
application using a digitally signed
|
|
3 |
|
Multifactor |
|
One-time password
|
generates a code for use only once?
|
|
|
authentication for a Linux host that will
|
on the Linux server |
the Linux server |
|
|
users in the Finance department. What |
configuring?
|
6 |
Which technique adds location
|
Geofencing |
Global positioning |
|
|
system |
|
used with IEEE 802.1x network access
|
device attempting to connect to an IEEE |
network authentication?
|
|
|
9 |
You are building a Web application that
|
Multifactor |
Identity federation |
SAML |
will allow users to sign in with their
|
|
authentication |
|
|
|
BAT |
PY |
PS1 |
You are a Linux sys admin attempting to |
Use the sudo
|
Use the chmod |
Login as root |
execute privileged commands in Linux |
2 |
but you keep receiving “Permission
|
|
command |
denied” messages. What should you |
do? |
Which Linux command can be used to |
|
sha256sum |
ssh |
3 |
|
pair? |
You are logged into a Linux host and |
dig |
nslookup |
ipconfig |
4 |
|
command should you use? |
Which of the following Wi-Fi |
WPA3 |
RADIUS
authentication
|
|
1 |
|
weakest? |
You are planning the configuration of |
|
Client PKI certificates Server PKI
certificate |
Enable security |
2 |
|
protocols that |
should be acquired/configured? |
|
|
|
3 |
Which type of security flaw is not
|
Firmware |
Denial of service |
Application
|
|
5 |
|
Dictionary |
Brute-force |
|
|
numbers and symbols?
|
performing normal |
|
reverse lookup DNS |
|
queries for IP |
remove the
|
addresses. |
|
that can not only detect, but also stop |
|
8 |
|
RAID 0 |
RAID 1 |
RAID 5 |
so that in the event of a single disk loss, |
|
the data. Which RAID level should you |
|
executives that travel for work. The
|
|
HSM chips and |
HSM chips and |
TPM chips and |
|
disk encryption. |
encryption. |
encryption. |
laptop. What should you do?
|
|
2 |
|
CFB |
ECB |
CBC |
ciphertext from the previous block to
|
be fed into the algorithm to encrypt the
|
|
the network. Which key will be used for |
4 |
|
Your public key |
Sender public key |
Your private key |
|
5 |
Your company has numerous public-
|
Generate self-signed |
Acquire public |
Acquire a wildcard |
facing Web sites that use the same DNS |
domain suffix. You need to use PKI to
|
certificates for each |
certificates for each |
|
certificate |
Web sit |
Web site |
|
|
6 |
TCP port numbers apply to which layer |
2 |
3 |
4 |
|
7 |
What is the general premise of ARP
|
Network devices |
Network devices |
Network devices |
modify their DNS |
modify their ARP |
modify their ARP |
cache to use the |
cache to use the |
cache to use the |
cache poisoning?
|
attacker MAC address |
attacker IP address |
attacker MAC |
for the default |
for the default |
address for the |
gateway. |
gateway. |
default gateway. |
8 |
|
Disable link auto |
MAC filtering |
Intrusion detection |
|
negotiation |
sensor |
9 |
|
Weighted |
Active/passive |
Round robin |
|
backend virtual machine?
|
|
10 |
To which OSI layer do packet filtering
|
2 |
3 |
4 |
firewalls apply?
|
|
Internet. You also need to ensure client
|
device IP addresses are not exposed to
|
|
|
|
WPA |
WPS |
WEP |
Your hotel provides free Wi-Fi to |
Send automated |
Provide guests with |
Use RFID tags that |
guests. The Wi-Fi network is secured. |
You would like to provide a simple |
emails to registered |
a printout of Wi-Fi |
contain Wi-Fi |
2 |
convenient way for guests to
|
guests with Wi-Fi |
connection |
connection |
immediately connect to the Wi-Fi |
connection |
information.
|
information. |
network using their smartphones. What |
information. |
should you do? |
3 |
|
10 feet |
30 feet |
60 feet |
You are performing a Wi-Fi site survey |
-120 dBm |
-80 dBm |
-50 dBm |
due to complaints about slow wireless |
4 |
|
provide the best wireless network |
speeds? |
5 |
|
To forcibly disconnect |
To forcibly |
To test RADIUS |
disconnect Wi-Fi |
Wi-Fi clients to |
clients to prevent |
authentication |
observe |
their Wi-Fi |
resiliency. |
authentication |
|
6 |
Which Wi-Fi EAP configuration uses both client and server PKI
certificates?
|
EAP-FAST |
EAP-TTLS |
EAP-TLS |
hotspot you are presented with a Web |
|
authentication |
access. What is this?
|
|
sudo docker run –d – |
sudo docker run –d |
|
container image has a small HTTP Web |
|
1 |
server stack configure for TCP port 443 |
4443:443 cust-dev- |
p 443:4443 cust-dev- |
–p 4443:443 cust- |
but you want connectivity to occur |
lamp1 |
lamp1 |
dev-lamp1 |
|
Type 2 |
Type A |
command should you use?
|
2 |
Which type of hypervisor runs within
|
Type 1 |
|
3 |
|
|
Hybrid |
Community |
|
cloud tenant responsible for patching
|
Which term describes a specialized |
PLC
|
SLA |
ICS |
1 |
computer interface that controls industrial devices such as
|
manufacturing robots and centrifuges? |
|
|
2 |
Which smart home wireless networking
|
ICS |
PLC |
Zigbee |
protocol does not use TCP/IP?
|
|
4 |
|
1 mile |
3 miles |
6 miles |
|
5 |
|
ECC |
RSA |
MD5 |
smaller keys but provides just as much
|
crypto strength as other algorithms
|
|
6 |
Which term describes installing a smart |
|
Geofencing |
Registering |
|
|
You need to ensure that DNS client |
IPsec |
DNSSEC |
PKI |
1 |
query responses are authentic and have not been tampered with.
What
|
should you configure? |
Which TCP/IP protocol is used for |
SNMP |
DNSEC |
IPsec |
2 |
|
network host statistics? |
|
|
client and a server?
|
4 |
Which language is commonly used by
|
PowerShell |
Python |
Perl |
|
that uses cookies. You want to prevent |
Which HTTP response header attribute |
What type of document is often signed |
MOU |
NDA |
ISA |
1 |
by pen testers before starting a pen
|
test engagement? |
2 |
What are some options we can scan for possible vulernabilities
|
|
A host |
|
that may come into contact with
|
|
the user on-boarding process to ensure |
|
2 |
The General Data Protection
|
It protects EU |
It protects EU |
It protects EU |
citizens data based |
citizen's data |
Regulation protects EU citizens data |
citizen's data based |
on time, location, |
regardless of |
under what conditions?
|
on location |
and data useless |
location |
3 |
|
Operating |
Backout plans |
Employee Results |
|
procedures |
|
1 |
Which type of planning is designed to deal with security events as
they occur?
|
Disaster recovery plan |
Business continuity |
Incident response |
plan |
plan |
department can withstand the loss of
|
|
|
|
due to cost, time or complexity. Technical controls use technology to
safeguard
|
|
as is the case with cybersecurity attack insurance. With risk
avoidance, the risk
|
Multiply the |
Multiply the Asset |
Correct Answer: Multiple the Asset Value (AV) by
the Exposure Factor (EF). The |
|
|
Exposure Factor (EF) |
Value (AV) by the |
|
by the risk severity |
Exposure Factor |
where the EF is a percentage expressing how much of an asset’s value
is loss
|
rating. |
(EF). |
due to a negative event.
|
Single Loss |
Loss Expectancy |
Expectancy (SLE) |
(SLE) by the Annual |
by the Annual |
Rate of Occurrence |
Rate of |
(ARO). |
Occurrence |
calculate the ALE.
|
Correct Answer: A qualitative risk assessment
organizes risks by a severity or threat rating which may differ from one
organization to another.
|
|
and percentages) to calculate the impact realized threats can have
on assets; |
projected annual cost of negative security incidents.
|
hashes. The password length does not affect the password hash; the
hash is |
|
you know) and a private key (something you have).
|
module |
computer systems. Ransomware is malware that encrypts user data
files and |
Security Module (HSM) is a tamper-proof device used for
cryptographic
|
ramming buildings. Access control vestibules (man traps) prevent a
second |
prevent physical entry to a room but do not mitigate vehicles
ramming
|
|
impossible.
|
Air flow is improved
|
|
|
|
improved |
|
panels.
|
Blanking panels
|
Hot aisles |
|
|
categories of authentication such as something you know
(username,
|
|
to security question |
PIN |
|
the Windows host |
Incorrect Answers: None of the listed options
specifies the correct location of |
collections of related permissions, to control resource access.
Discretionary
|
|
|
Correct Answer: Remote Authentication Dial-In User
Service (RADIUS) servers are centralized authentication servers that
receive authentication requests from RADIUS clients such as network
switches and Wi-Fi routers.
Correct Answer: Identity federation uses a central
trusted Identity Provider (IdP) to allow access to resources such as Web
sites.
federation |
|
|
|
SH |
PS1 |
Correct Answer: PS1. Microsoft PowerShell scripts
normally use a .PS1 file
|
|
privileged commands as long as they are granted this permission in
the
|
|
|
denied messages in this scenario.
|
Correct Answer: The ssh-keygen command creates an
SSH public and private key pair.
troubleshoot DNS name resolution. The name server lookup
(nslookup)
|
|
network security protocol. Remote Access Dial-in User Service
(RADIUS)
|
requests from RADIUS clients. Disabling DHCP is a hardening
technique
|
|
|
|
certificate to secure communications and normally use TCP port
443.
|
protocols that
|
|
|
Correct Answer: Zero-days are security flaws not yet
known by vendors.
|
|
Offline password attacks use an offline copy of passwords for
cracking
|
Client devices are |
Client devices are |
|
infected and are |
infected and are |
attempting to |
|
attempting to |
discover a |
IPv6 AAAA records to resolve FQDNs to IP addresses.
Clients querying DNS TXT |
discover a command |
command and |
|
and control server. |
control server. |
Incorrect Answers: The listed reasons are invalid in
this scenario.
|
Correct Answer: A network intrusion prevention
system can not only detect but also be configured to stop suspicious
activity.
prevention |
system |
|
Intrusion detection systems only detect and report, log, or notify
of suspicious |
improve performance. RAID 5 (disk striping with distributed parity)
writes data |
across the disks in the array, thus providing a performance
improvement in
|
|
Order laptops with |
Order laptops |
|
encryption. A Trusted Platform Module (TPM) chip in a computer is
used to
|
secure the integrity of the machine boot process and to store disk
volume
|
|
with TPM chips |
TPM chips and |
and configure |
configure BitLocker |
BitLocker disk |
|
disk encryption. |
encryption. |
|
operations and the storage of encryption keys. Encrypting File
System (EFS) file |
|
Correct Answer: Symmetric encrypting uses a single
“secret” key for encrypting and decrypting.
SHA256 Symmetric
|
Vector (IV). Output Feedback Mode (OFB) uses a keystream of bits to
encrypt
|
Sender private key |
Your private key |
|
|
the sender’s public key (the sender’s private key creates the
digital signature). |
Incorrect Answers: The listed keys are not used to
verify a digital signature.
|
|
Incorrect Answers: Using self-signed or
public certificates for each Web site |
|
ensuring that the certificate request is legitimate.
|
7 |
4 |
|
modify their DNS |
modify their ARP |
MAC address for the default gateway. ARP cache poisoning
forces client traffic |
|
gateway. |
default gateway. |
Incorrect Answers: The listed items do not properly
describe ARP cache
|
Spanning Tree |
Spanning Tree |
poisoning.
|
|
|
Protocol |
Protocol |
Incorrect Answers: The listed mitigations are not
designed to prevent network |
|
Least connections Round robin
|
|
7 |
4 |
|
headers (OSI layers 2-4).
|
Incorrect Answers: The listed layers do not
correctly represent where packet filtering firewalls fit into the OSI
model.
server |
server |
internal clients to get to the Internet using a single public IP
address. Network |
|
TKIP |
WPS |
|
contain Wi-Fi |
contain Wi-Fi
|
|
connection |
|
|
information. |
information. |
|
Incorrect Answers: The listed options are not as
convenient as using NFC tags.
Incorrect Answers: The listed wireless signal
strengths are sub-standard.
|
|
Incorrect Answers: The listed explanations do not
explain why
|
deauthentication is often used with Wi-Fi pen testing.
|
Protected EAP |
EAP-TLS |
|
|
Wi-Fi network; sometimes a user account is required (often users
must agree |
|
after the colon is the configured listening port number within the
application
|
container.
|
Correct Answer: Private clouds are owned and used by
a single organization.
Correct Answer: Infrastructure as a Service (IaaS)
includes storage, network and virtual machines. IaaS virtual machine
software patching is the
responsibility of the cloud tenant.
Incorrect Answers: Cloud Service Providers (CSPs)
host cloud services. Service Level Agreements (SLAs) guarantee cloud
service uptime. Infrastructure as a Service (IaaS) includes storage,
network and virtual machines. IaaS virtual machine software patching is
the responsibility of the cloud tenant.
Correct Answer: Programmable Logic Controllers
(PLCs) are used extensively in manufacturing and various industries such
as oil refining, electricity and water treatment.
computerized solution used for industrial process control.
Programmable Logic
|
|
|
10 Gbps |
|
|
20 miles
|
6 miles |
Correct Answer: 4G cell towers have an approximate
range of 6 miles.
|
|
Correct Answer: Elliptic Curve
Cryptography (ECC) uses small keys to achieve |
|
ECC |
|
Correct Answer: Sideloading refers to installing
mobile device apps directly from installation files, without using an
app store.
Sideloading Sideloading
that can be used to encrypt and authenticate network messages.
Public Key |
Transfer Protocol Secure (HTTPS) encrypts HTTP network
transmissions
|
|
encrypt and authenticate network messages. Hyper Text Transfer
Protocol |
servers.
|