Implementing Polices to mitigate Risks
Implementing Polices to mitigate Risks
Implementing Polices to mitigate Risks
Implementing Polices to mitigate Risks
Implementing Polices to mitigate Risks
3790000

42. Users are complaining about intermittent connectivity with a web server. After examining the logs, You identify a large volume  of connection  attempts from Public IP addresses. You realize these connections  attempts are overloading the servers, preventing it from responding to other connections. Which of the following is most likely occurring?

DDos Attack 

DNS poisoning Attack 

Replay Attack 

ARP poisioning attack

3790000

20. Bart recently hooked up a switch incorrectly causing a switch loop problem, Which took down part of an organization's network. Management wants to implement a solution that will prevent this from occurring in the future. Which of the following is the best choice? 

Flood guard 

SNMPv3

SRTP

RSTP

3790000

10. Developers are planning to develop an application using Role-Based access control. Which of the following would they most likely include in their planning?

 88.Which of the following controls is designed to provide power to electronic equipment  during a period of momentary power failure?

A listings of labels reflecting classification levels 

A listing of rules that the application must be able to trigger 

A listing of owners 

A matrix of functions matched with required privileges

88. Dual power supplies 

UPS

Generator

 Solar power 

3790000

67. Administrators have noticed a significant amount of OSCP traffic sent to an intermediate CA. They want to reduce this traffic. Which of the following is the best  choice to meet this need?

Pinning 

Stapling 

Digital Signatures 

Hashing


3790000

55. Fileserver1 hosts several files accessed by users in your organization, and its important that they can always access these files. Management wants to implement a solution to increase cyber security resilience. Which of the following is the lowest cost solution to meet this requirement?

Active/Active Load balancing 

 Active/ Passive Load balancing

RAID

Warm site 

55095000

45. A Software Development process merges code changes from developers working on a project several times a day.  It uses automation to validate the code and tracks changes using the version control processes. Which of the following best describes this process?

Continuous Integration

Continuous Validation

Continuous Delivery 

Continuous Monitoring

55095000

18. Your organization hosts a web server accessed by employees within the network, via the internet . Management wants to increase its security. You are tasked with separating all web facing traffic from internal network traffic. which of the following best provides the solution?

Screened Subnet

VLAN 

Firewall 

WAF


55095000

89. Which of the following types of disaster recovery tests has the greatest potential to disrupt normal business operations?

Failover 

Stimulation 

Parallel processing 

Walkthrough


55095000

58.The backup policy for an organization states that the amount of time needed to perform backups should be minimized. Which of the following backups would best meet this need?

Full backups on Sundays and on all other days on the week

Full backups on Sundays and differential backups on other days 

Full backups on Sundays and incremental backups on every other day 

Differential backs on Sundays and incremental backups every other say of the week.

55095000

12. The Maple Organization is creating a help desk team to assist employees with account issues. Members of this team need to create and modify user accounts and occasionally reset their passwords. Which of the following is the best way to accomplish this goal?

Give each help desk employee appropriate privileges  individually

Add each member of the help desk team to the administrator group within the domain 

Add members of the help desk team to a security group  that has the appropriate privileges 

Assign attributes to members of the help desk team and give these attributes appropriate privileges 

250042000

48. You recently completed an vulnerability scan on your network. It reported that several  severs are missing key operating system patches. However, after checking the servers, you've verified that the servers have these patches installed. Which the following best describes this?

False Negative  

Misconfiguration on servers

 False Positive 

 Non credential scan 

250042000

85. What standard allows vulnerability scanners to more easily communicate with other security tools to facilitate automation?

SCAP

CVE

CVSS

OSI

250042000

11. Your organization has implemented a system that stores user credentials in a central database. users log on once with their credential. They can then access other systems in the organization without logging on again. Which of the following does this describe?


Fedaeration

SAML

SSO

OAuth

250042000

76. Management wants to implement a mobile device development model to overcome theses problems while still allowing employees to use own devices. Which of the following is the best choice?

CYOD

 BYOD

 COPE

IAAS

250042000

64. As an Administrator, you receive an antivirus alert from a server in your network indicating one of the files has a hash of known malware, The file was pushed to the server from the organization's path management system and is scheduled t be applied to the server  the next morning. Which of the following indicates what most likely occurred. 


The file was infected after it was pushed to the server 

The file was embedded with Crypto malware before it was pushed to the server

 The file was listed in the patch management system's blocklist

The file was infected when the patch management system downloaded it.

500079000

44. After investigating a significant data breach, your company decided that the attack originated from internally developed applications. The attacker did not have to log on. Which of the following would prevent this type of attack?

Static Code Analysis

Backdoor

DDos Protection

Keylogger

500079000

14.Lisa is responsible for managing and monitoring network devices, such as routers, and switches. Which of the following protocols is she most likely to use?

NAT 

DNSSEC 

SNMPv3

SRTP

500079000

16. Your organization landed a contract with the federal government. Developers are fine tuning an application that will process sensitive data. The contract mandates that all computers using the application must be isolated. Which of the following would best meet tis need? 

Create a bastion host in a screened subnet 

 implement a boundary firewall

Create n air gapped network 

Implement an IPS

500079000

70. Bart recently resigned and left your organization. Later, IT personal determined that he deleted several files and folders on a severs share after he left the organization. Further , they determined that he did so during the weekend while the organization was closed. which of the following account management practices would have best prevented his actions? 

Onboarding 

Time of day restrictions

Account audit 

Offboarding

500079000

78.Your organization hosts a web application that sells digital products. Customers can also post comments . Management suspects attackers are looking or vulnerabilities that they can exploit. which of the following would best test the cybersecurity resilience of this application 

Fuzzing

Input Validation

Error handling 

Anti- Malware

2147483647

82. A Forensic expert is preparing to analyze a hard drive. Which of the following should the expert do first?

Capture an image 

Identify the order of Volatility 

Copy the contents of the memory

Create a chain of custody document

2147483647

19.Developers recently configured a new service on a server called GCGA1. GCA1 is in a Screened subnet and accessed by employees in the internal network, and others via the internet. Network administrators modified firewall rules to access the service. Testing shows the service works when accessed from the internal systems. However it does not work when accessed from the internet. Which of the following is most likely configured wrong? 

The new service 

An ACL

The GCA1

AVLAN


2147483647

90.Ericka would like to restrict the devices that can connect to her wired network by requiring that they authenticate. What technology can best help achieve this goal?


90.TLS 

WEP 

802.1X

WPA3

2147483647

74. A hard drive was left unattended for 12 hours and then the image of the drive was captured. Legal personnel stated that the analysis results would not be admissible in court. What is most likely the reason for the lack of admissibility?


Witnesses were not not identified

a chain of custody was not maintained 

An order of volatility was no maintained

A hard drive analysis was not complete  

2147483647

50. IT Administrators create a VPN for employees to use while working from home. The VPN is configured to provide AAA services. Which of the following would be presented to the AAA system for identification?

57. Compu=Global-Hyper=Mega=Net hosts a website selling digital products. Marketing personnel have launched several successful sales. The server has been overwhelmed, resulting on slow responses from the server, and lost sites. Management wants to implement a solution that will provide cybersecurity resilience. Which of the following is the best choice?



50.Password

permissions 

username

tunneling certificates

hardware token 

 57.Managed PDU

Certificates

web application firewall

 load balancing 

M
e
n
u