Which of the following is used to add extra complexity before using a one-way data transformation algorithm?
What is Salting?
Which of the following tools would work best to prevent the exposure of PII outside of an organization?
What is DLP?
A network administrator needs to set up a file server to allow user access. The organization uses DHCP to assign IP addresses. Which of the following is the best solution for the administrator to set up?
A. A separate scope for the file server using a /32 subnet
B. A reservation for the server based on the MAC address
C. A static IP address within the DHCP IP range
D. A SLAAC for the server
B. A reservation for the server based on the MAC address
Clue:
This technique involves tricking users into clicking malicious links or opening attachments.
What is Phishing (T1566)?
Clue:
This type of SIEM alert indicates multiple failed logins followed by a successful one.
What is a Brute Force / Credential Stuffing attempt?
Which of the following scenarios describes a possible business email compromise attack?
A. An employee receives a gift card request in an email that has an executive's name in the display field of the email.
B. Employees who open an email attachment receive messages demanding payment in order to access the file
C. A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.
C. A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.
A security analyst recently joined the team and is trying to determine which scripting language is being used in a production script to determine if it is malicious. Given the following script:
Which scripting languages was used in the script?
What is Powershell?
Which of the following technologies are X. 509 certificates most commonly associated with?
A. MFA
B. LDAP
C. VLAN tagging
D.PKI
D.PKI
Clue:
Attackers exploit vulnerabilities in internet-facing apps using this technique.
What is Exploit Public-Facing Application (T1190)?
Clue:
This Fortinet service uses global threat intelligence to categorize websites and enforce web filtering policies.
What is FortiGuard?
An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users' passwords. What should the administrator implement to prevent this type of attack from succeeding in the future?
What is Multifactor authentication?
A company's user accounts have been compromised. Users are also reporting that the company's internal portal is sometimes only accessible through HTTP, other times; it is accessible through HTTPS. Which of the following most likely describes the observed activity?
An on-path attack is being performed by someone with internal access that forces users into port 80
A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following technologies would facilitate this process?
A. Captive portal
B. Enterprise authentication
C. Ad hoc network
D. WPA3
A. Captive portal
Clue:
This technique involves compromising software updates or vendors to gain access to targets.
What is Supply Chain Compromise (T1195)?
Clue:
A user logs in from California and then 5 minutes later from Eastern Europe—this indicates this type of anomaly.
What is Impossible Travel?
Which of the following vulnerabilities is associated with installing software outside of a manufacturer's approved software repository?
What is Side loading?
Which of the following will most likely ensure that mission-critical services are available in the event of an incident?
A. Business continuity plan
B. Vulnerability management plan
C. Disaster recovery plan
D. Asset management plan
A. Business continuity plan
Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?
A. Crash cart
B. Jump box
C. Secure Shell
D. Out-of-band management
D. Out-of-band management
Clue:
Attackers gain access through a trusted third party like an MSP or vendor.
What is Trusted Relationship (T1199)?
Clue:
This intelligence type includes IOCs like hashes, IPs, and domains.
What is Tactical Intelligence?
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?
What is SSO?
The Chief Information Security Officer wants to eliminate and reduce shadow IT in the enterprise. Several high-risk cloud applications are used that increase the risk to the organization. Which of the following solutions will assist in reducing the risk?
A. Configure MFA with strict access
B. Enable SSO to the cloud applications
C. Deploy a CASB and enable policy enforcement
D. Deploy an API gateway
C. Deploy a CASB and enable policy enforcement
Which of the following is a cost-effective advantage of a split-tunnel VPN?
A. Web traffic is filtered through a web filler.
B. More bandwidth is required on the company's internet connection.
C. Cloud-based traffic flows outside of the company's network.
D. Monitoring detects insecure machines on the company's network.
C. Cloud-based traffic flows outside of the company's network.
Clue:
This technique involves attackers registering or hijacking domains that resemble legitimate ones to gain initial access.
What is Compromise Infrastructure (T1584)
Clue:
A FortiAnalyzer alert showing abnormal VPN logins outside business hours would fall under this MITRE tactic.
What is Initial Access?