Set 5
Set 5
Question: 121
A small business uses kiosks on the sales floor to display product information for customers.
A security team discovers the kiosks use end-of-life operating systems. Which of the
following is the security team most likely to document as a security implication of the current
architecture?
A. Patch availability
B. Product software compatibility
C. Ease of recovery
D. Cost of replacement
Question: 122
A company is developing a critical system for the government and storing project information
on a fileshare. Which of the following describes how this data will most likely be classified?
(Select two).
A. Private
B. Confidential
C. Public
D. Operational
E. Urgent
F. Restricted
Question: 123
A. It is a false positive.
B. A rescan is required.
C. It is considered noise.
D. Compensating controls exist.
Question: 124
A security consultant needs secure, remote access to a client environment. Which of the
following should the security consultant most likely use to gain access?
A. EAP
B. DHCP
C. IPSec
D. NAT
Question: 125
Which of the following best practices gives administrators a set period to perform changes to
an operational system to ensure availability and minimize business impacts?
A. Impact analysis
B. Scheduled downtime
C. Backout plan
D. Change management boards
Question: 126
Which of the following actions could a security engineer take to ensure workstations and
servers are properly monitored for unauthorized changes and software?
Question: 127
After a security awareness training session, a user called the IT help desk and reported a
suspicious call. The suspicious caller stated that the Chief Financial Officer wanted credit
card information in order to close an invoice. Which of the following topics did the user
recognize from the training?
A. Insider threat
B. Email phishing
C. Social engineering
D. Executive whaling
Question: 128
Which of the following exercises should an organization use to improve its incident response
process?
A. Tabletop
B. Replication
C. Failover
D. Recovery
Question: 129
A. OCSP
B. CSR
C. CA
D. CRC
Question: 130
A newly identified network access vulnerability has been found in the OS of legacy loT
devices. Which of the following would best mitigate this vulnerability quickly?
A. Insurance
B. Patching
C. Segmentation
D. Replacement
Question: 131
A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the
following strategies is the bank requiring?
A. Encryption at rest
B. Masking
C. Data classification
D. Permission restrictions
Question: 132
Which of the following would be best suited for constantly changing environments?
A. RTOS
B. Containers
C. Embedded systems
D. SCADA
Question: 133
A security analyst scans a company's public network and discovers a host is running a
remote desktop that can be used to access the production network. Which of the following
changes should the security analyst recommend?
Question: 134
A. Buffer overflow
B. SQL injection
C. VM escape
D. Memory injection
Question: 135
An organization would like to store customer data on a separate part of the network that is
not accessible to users on the main corporate network. Which of the following should the
administrator use to accomplish this goal?
A. Segmentation
B. Isolation
C. Patching
D. Encryption
Question: 136
A. CVE
B. CVSS
C. CIA
D. CERT
Question: 137
A technician is opening ports on a firewall for a new system being deployed and supported
by a SaaS provider. Which of the following is a risk in the new system?
A. Default credentials
B. Non-segmented network
C. Supply chain vendor
D. Vulnerable software
Question: 138
Which of the following security concepts is the best reason for permissions on a human
resources fileshare to follow the principle of least privilege?
A. Integrity
B. Availability
C. Confidentiality
D. Non-repudiation
Question: 139
Security controls in a data center are being reviewed to ensure data is properly protected
and that human life considerations are included. Which of the following best describes how
the controls should be set up?
Which of the following is the most common data loss path for an air-gapped network?
A. Bastion host
B. Unsecured Bluetooth
C. Unpatched OS
D. Removable devices
Question: 141
Which of the following can best protect against an employee inadvertently installing malware
on a company system?
A. Host-based firewall
B. System isolation
C. Least privilege
D. Application allow list
Question: 142
An organization is struggling with scaling issues on its VPN concentrator and internet circuit
due to remote work. The organization is looking for a software solution that will allow it to
reduce traffic on the VPN and internet circuit, while still providing encrypted tunnel access to
the data center and monitoring of remote employee internet traffic. Which of the following will
help achieve these objectives?
Question: 143
A company's end users are reporting that they are unable to reach external websites. After
reviewing the performance data for the DNS severs, the analyst discovers that the CPU,
disk, and memory usage are minimal, but the network interface is flooded with inbound
traffic. Network logs show only a small number of DNS queries sent to this server. Which of
the following best describes what the security analyst is seeing?
Question: 144
A systems administrator wants to prevent users from being able to access data based on
their responsibilities. The administrator also wants to apply the required access structure via
a simplified format. Which of the following should the administrator apply to the site recovery
resource group?
A. RBAC
B. ACL
C. SAML
D. GPO
Question: 145
One of a company's vendors sent an analyst a security bulletin that recommends a BIOS
update. Which of the following vulnerability types is being addressed by the patch?
A. Virtualization
B. Firmware
C. Application
D. Operating system
Question: 146
A security analyst locates a potentially malicious video file on a server and needs to identify
both the creation date and the file's creator. Which of the following actions would most likely
give the security analyst the information required?
Question: 147
After a recent vulnerability scan, a security engineer needs to harden the routers within the
corporate network. Which of the following is the most appropriate to disable?
A. Console access
B. Routing protocols
C. VLANs
D. Web-based administration
Question: 148
Which of the following should a systems administrator use to ensure an easy deployment of
resources within the cloud provider?
A. Software as a service
B. Infrastructure as code
C. Internet of Things
D. Software-defined networking
Question: 149
A. ACL
B. DLP
C. IDS
D. IPS
Question: 150
During the onboarding process, an employee needs to create a password for an intranet
account. The password must include ten characters, numbers, and letters, and two special
characters. Once the password is created, the company will grant the employee access to
other company-owned websites based on the intranet profile. Which of the following access
management concepts is the company most likely using to safeguard intranet accounts and
grant access to multiple sites based on a user's intranet account? (Select two).
A. Federation
B. Identity proofing
C. Password complexity
D. Default password changes
E. Password manager
F. Open authentication