42. Users are complaining about intermittent connectivity with a web server. After examining the logs, You identify a large volume of connection attempts from Public IP addresses. You realize these connections attempts are overloading the servers, preventing it from responding to other connections. Which of the following is most likely occurring?
DDos Attack
DNS poisoning Attack
Replay Attack
ARP poisioning attack
20. Bart recently hooked up a switch incorrectly causing a switch loop problem, Which took down part of an organization's network. Management wants to implement a solution that will prevent this from occurring in the future. Which of the following is the best choice?
Flood guard
SNMPv3
SRTP
RSTP
10. Developers are planning to develop an application using Role-Based access control. Which of the following would they most likely include in their planning?
88.Which of the following controls is designed to provide power to electronic equipment during a period of momentary power failure?
A listings of labels reflecting classification levels
A listing of rules that the application must be able to trigger
A listing of owners
A matrix of functions matched with required privileges
88. Dual power supplies
UPS
Generator
Solar power
67. Administrators have noticed a significant amount of OSCP traffic sent to an intermediate CA. They want to reduce this traffic. Which of the following is the best choice to meet this need?
Pinning
Stapling
Digital Signatures
Hashing
55. Fileserver1 hosts several files accessed by users in your organization, and its important that they can always access these files. Management wants to implement a solution to increase cyber security resilience. Which of the following is the lowest cost solution to meet this requirement?
Active/Active Load balancing
Active/ Passive Load balancing
RAID
Warm site
45. A Software Development process merges code changes from developers working on a project several times a day. It uses automation to validate the code and tracks changes using the version control processes. Which of the following best describes this process?
Continuous Integration
Continuous Validation
Continuous Delivery
Continuous Monitoring
18. Your organization hosts a web server accessed by employees within the network, via the internet . Management wants to increase its security. You are tasked with separating all web facing traffic from internal network traffic. which of the following best provides the solution?
Screened Subnet
VLAN
Firewall
WAF
89. Which of the following types of disaster recovery tests has the greatest potential to disrupt normal business operations?
Failover
Stimulation
Parallel processing
Walkthrough
58.The backup policy for an organization states that the amount of time needed to perform backups should be minimized. Which of the following backups would best meet this need?
Full backups on Sundays and on all other days on the week
Full backups on Sundays and differential backups on other days
Full backups on Sundays and incremental backups on every other day
Differential backs on Sundays and incremental backups every other say of the week.
12. The Maple Organization is creating a help desk team to assist employees with account issues. Members of this team need to create and modify user accounts and occasionally reset their passwords. Which of the following is the best way to accomplish this goal?
Give each help desk employee appropriate privileges individually
Add each member of the help desk team to the administrator group within the domain
Add members of the help desk team to a security group that has the appropriate privileges
Assign attributes to members of the help desk team and give these attributes appropriate privileges
48. You recently completed an vulnerability scan on your network. It reported that several severs are missing key operating system patches. However, after checking the servers, you've verified that the servers have these patches installed. Which the following best describes this?
False Negative
Misconfiguration on servers
False Positive
Non credential scan
85. What standard allows vulnerability scanners to more easily communicate with other security tools to facilitate automation?
SCAP
CVE
CVSS
OSI
11. Your organization has implemented a system that stores user credentials in a central database. users log on once with their credential. They can then access other systems in the organization without logging on again. Which of the following does this describe?
Fedaeration
SAML
SSO
OAuth
76. Management wants to implement a mobile device development model to overcome theses problems while still allowing employees to use own devices. Which of the following is the best choice?
CYOD
BYOD
COPE
IAAS
64. As an Administrator, you receive an antivirus alert from a server in your network indicating one of the files has a hash of known malware, The file was pushed to the server from the organization's path management system and is scheduled t be applied to the server the next morning. Which of the following indicates what most likely occurred.
The file was infected after it was pushed to the server
The file was embedded with Crypto malware before it was pushed to the server
The file was listed in the patch management system's blocklist
The file was infected when the patch management system downloaded it.
44. After investigating a significant data breach, your company decided that the attack originated from internally developed applications. The attacker did not have to log on. Which of the following would prevent this type of attack?
Static Code Analysis
Backdoor
DDos Protection
Keylogger
14.Lisa is responsible for managing and monitoring network devices, such as routers, and switches. Which of the following protocols is she most likely to use?
NAT
DNSSEC
SNMPv3
SRTP
16. Your organization landed a contract with the federal government. Developers are fine tuning an application that will process sensitive data. The contract mandates that all computers using the application must be isolated. Which of the following would best meet tis need?
Create a bastion host in a screened subnet
implement a boundary firewall
Create n air gapped network
Implement an IPS
70. Bart recently resigned and left your organization. Later, IT personal determined that he deleted several files and folders on a severs share after he left the organization. Further , they determined that he did so during the weekend while the organization was closed. which of the following account management practices would have best prevented his actions?
Onboarding
Time of day restrictions
Account audit
Offboarding
78.Your organization hosts a web application that sells digital products. Customers can also post comments . Management suspects attackers are looking or vulnerabilities that they can exploit. which of the following would best test the cybersecurity resilience of this application
Fuzzing
Input Validation
Error handling
Anti- Malware
82. A Forensic expert is preparing to analyze a hard drive. Which of the following should the expert do first?
Capture an image
Identify the order of Volatility
Copy the contents of the memory
Create a chain of custody document
19.Developers recently configured a new service on a server called GCGA1. GCA1 is in a Screened subnet and accessed by employees in the internal network, and others via the internet. Network administrators modified firewall rules to access the service. Testing shows the service works when accessed from the internal systems. However it does not work when accessed from the internet. Which of the following is most likely configured wrong?
The new service
An ACL
The GCA1
AVLAN
90.Ericka would like to restrict the devices that can connect to her wired network by requiring that they authenticate. What technology can best help achieve this goal?
90.TLS
WEP
802.1X
WPA3
74. A hard drive was left unattended for 12 hours and then the image of the drive was captured. Legal personnel stated that the analysis results would not be admissible in court. What is most likely the reason for the lack of admissibility?
Witnesses were not not identified
a chain of custody was not maintained
An order of volatility was no maintained
A hard drive analysis was not complete
50. IT Administrators create a VPN for employees to use while working from home. The VPN is configured to provide AAA services. Which of the following would be presented to the AAA system for identification?
57. Compu=Global-Hyper=Mega=Net hosts a website selling digital products. Marketing personnel have launched several successful sales. The server has been overwhelmed, resulting on slow responses from the server, and lost sites. Management wants to implement a solution that will provide cybersecurity resilience. Which of the following is the best choice?
50.Password
permissions
username
tunneling certificates
hardware token
57.Managed PDU
Certificates
web application firewall
load balancing