0% found this document useful (0 votes)
13 views

Set 5

The document contains 150 multiple choice questions about various cybersecurity topics such as vulnerability scanning, incident response exercises, encryption, access control methods, and more.

Uploaded by

Iqbal Mazlan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Set 5

The document contains 150 multiple choice questions about various cybersecurity topics such as vulnerability scanning, incident response exercises, encryption, access control methods, and more.

Uploaded by

Iqbal Mazlan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Set 5

Question: 121

A small business uses kiosks on the sales floor to display product information for customers.
A security team discovers the kiosks use end-of-life operating systems. Which of the
following is the security team most likely to document as a security implication of the current
architecture?

A. Patch availability
B. Product software compatibility
C. Ease of recovery
D. Cost of replacement

Question: 122

A company is developing a critical system for the government and storing project information
on a fileshare. Which of the following describes how this data will most likely be classified?
(Select two).

A. Private
B. Confidential
C. Public
D. Operational
E. Urgent
F. Restricted

Question: 123

After reviewing the following vulnerability scanning report: Server:192.168.14.6 Service:


Telnet Port: 23 Protocol: TCP Status: Open Severity: High Vulnerability: Use of an insecure
network protocol A security analyst performs the following test:

nmap -p 23 192.168.14.6 —script telnet-encryption PORT STATE SERVICE REASON


23/tcp open telnet syn-ack I telnet encryption: | _ Telnet server supports encryption Which of
the following would the security analyst conclude for this reported vulnerability?

A. It is a false positive.
B. A rescan is required.
C. It is considered noise.
D. Compensating controls exist.

Question: 124

A security consultant needs secure, remote access to a client environment. Which of the
following should the security consultant most likely use to gain access?

A. EAP
B. DHCP
C. IPSec
D. NAT

Question: 125

Which of the following best practices gives administrators a set period to perform changes to
an operational system to ensure availability and minimize business impacts?

A. Impact analysis
B. Scheduled downtime
C. Backout plan
D. Change management boards

Question: 126

Which of the following actions could a security engineer take to ensure workstations and
servers are properly monitored for unauthorized changes and software?

A. Configure all systems to log scheduled tasks.


B. Collect and monitor all traffic exiting the network.
C. Block traffic based on known malicious signatures.
D. Install endpoint management software on all systems.

Question: 127

After a security awareness training session, a user called the IT help desk and reported a
suspicious call. The suspicious caller stated that the Chief Financial Officer wanted credit
card information in order to close an invoice. Which of the following topics did the user
recognize from the training?

A. Insider threat
B. Email phishing
C. Social engineering
D. Executive whaling

Question: 128

Which of the following exercises should an organization use to improve its incident response
process?

A. Tabletop
B. Replication
C. Failover
D. Recovery

Question: 129

Which of the following is used to validate a certificate when it is presented to a user?

A. OCSP
B. CSR
C. CA
D. CRC

Question: 130

A newly identified network access vulnerability has been found in the OS of legacy loT
devices. Which of the following would best mitigate this vulnerability quickly?

A. Insurance
B. Patching
C. Segmentation
D. Replacement

Question: 131

A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the
following strategies is the bank requiring?

A. Encryption at rest
B. Masking
C. Data classification
D. Permission restrictions

Question: 132

Which of the following would be best suited for constantly changing environments?

A. RTOS
B. Containers
C. Embedded systems
D. SCADA

Question: 133

A security analyst scans a company's public network and discovers a host is running a
remote desktop that can be used to access the production network. Which of the following
changes should the security analyst recommend?

A. Changing the remote desktop port to a non-standard number


B. Setting up a VPN and placing the jump server inside the firewall
C. Using a proxy for web connections from the remote desktop server
D. Connecting the remote server to the domain and increasing the password length

Question: 134

Which of the following involves an attempt to take advantage of database misconfigurations?

A. Buffer overflow
B. SQL injection
C. VM escape
D. Memory injection
Question: 135

An organization would like to store customer data on a separate part of the network that is
not accessible to users on the main corporate network. Which of the following should the
administrator use to accomplish this goal?

A. Segmentation
B. Isolation
C. Patching
D. Encryption

Question: 136

Which of the following is used to quantitatively measure the criticality of a vulnerability?

A. CVE
B. CVSS
C. CIA
D. CERT

Question: 137

A technician is opening ports on a firewall for a new system being deployed and supported
by a SaaS provider. Which of the following is a risk in the new system?

A. Default credentials
B. Non-segmented network
C. Supply chain vendor
D. Vulnerable software

Question: 138

Which of the following security concepts is the best reason for permissions on a human
resources fileshare to follow the principle of least privilege?

A. Integrity
B. Availability
C. Confidentiality
D. Non-repudiation

Question: 139

Security controls in a data center are being reviewed to ensure data is properly protected
and that human life considerations are included. Which of the following best describes how
the controls should be set up?

A. Remote access points should fail closed.


B. Logging controls should fail open.
C. Safety controls should fail open.
D. Logical security controls should fail closed.
Question: 140

Which of the following is the most common data loss path for an air-gapped network?

A. Bastion host
B. Unsecured Bluetooth
C. Unpatched OS
D. Removable devices

Question: 141

Which of the following can best protect against an employee inadvertently installing malware
on a company system?

A. Host-based firewall
B. System isolation
C. Least privilege
D. Application allow list

Question: 142

An organization is struggling with scaling issues on its VPN concentrator and internet circuit
due to remote work. The organization is looking for a software solution that will allow it to
reduce traffic on the VPN and internet circuit, while still providing encrypted tunnel access to
the data center and monitoring of remote employee internet traffic. Which of the following will
help achieve these objectives?

A. Deploying a SASE solution to remote employees


B. Building a load-balanced VPN solution with redundant internet
C. Purchasing a low-cost SD-WAN solution for VPN traffic
D. Using a cloud provider to create additional VPN concentrators

Question: 143

A company's end users are reporting that they are unable to reach external websites. After
reviewing the performance data for the DNS severs, the analyst discovers that the CPU,
disk, and memory usage are minimal, but the network interface is flooded with inbound
traffic. Network logs show only a small number of DNS queries sent to this server. Which of
the following best describes what the security analyst is seeing?

A. Concurrent session usage


B. Secure DNS cryptographic downgrade
C. On-path resource consumption
D. Reflected denial of service

Question: 144

A systems administrator wants to prevent users from being able to access data based on
their responsibilities. The administrator also wants to apply the required access structure via
a simplified format. Which of the following should the administrator apply to the site recovery
resource group?
A. RBAC
B. ACL
C. SAML
D. GPO

Question: 145

One of a company's vendors sent an analyst a security bulletin that recommends a BIOS
update. Which of the following vulnerability types is being addressed by the patch?

A. Virtualization
B. Firmware
C. Application
D. Operating system

Question: 146

A security analyst locates a potentially malicious video file on a server and needs to identify
both the creation date and the file's creator. Which of the following actions would most likely
give the security analyst the information required?

A. Obtain the file's SHA-256 hash.


B. Use hexdump on the file's contents.
C. Check endpoint logs.
D. Query the file's metadata.

Question: 147

After a recent vulnerability scan, a security engineer needs to harden the routers within the
corporate network. Which of the following is the most appropriate to disable?

A. Console access
B. Routing protocols
C. VLANs
D. Web-based administration

Question: 148

Which of the following should a systems administrator use to ensure an easy deployment of
resources within the cloud provider?

A. Software as a service
B. Infrastructure as code
C. Internet of Things
D. Software-defined networking

Question: 149

An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older


browser versions with well-known exploits. Which of the following security solutions should
be configured to best provide the ability to monitor and block these known signature-based
attacks?

A. ACL
B. DLP
C. IDS
D. IPS

Question: 150

During the onboarding process, an employee needs to create a password for an intranet
account. The password must include ten characters, numbers, and letters, and two special
characters. Once the password is created, the company will grant the employee access to
other company-owned websites based on the intranet profile. Which of the following access
management concepts is the company most likely using to safeguard intranet accounts and
grant access to multiple sites based on a user's intranet account? (Select two).

A. Federation
B. Identity proofing
C. Password complexity
D. Default password changes
E. Password manager
F. Open authentication

You might also like