Category 1-5
Category 6-10
Category 11-15
Category 16-20
Category 21-25
100

After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should the network security manager consult FIRST to determine a priority list for forensic review? 

A. The vulnerability scan output 

B. The IDS logs

C. The full packet capture data 

D. The SIEM alert

Correct Answer: A. the vulnerability scan output

100

A consultant is configuring a vulnerability scanner for a large, global organization in multiple countries. The consultant will be using a service account to scan systems with administrative privileges on a weekly basis, but there is a concern that hackers could gain access to account to the account and pivot through the global network. Which of the following would be BEST to help mitigate this concern? 

A. Create consultant accounts for each region, each configured with push MFA notifications. 

B. Create one global administrator account and enforce Kerberos authentication 

C. Create different accounts for each region. limit their logon times, and alert on risky logins 

D. Create a guest account for each region. remember the last ten passwords, and

Correct answer: C. Create different accounts for each region. limit their logon times, and alert on risky logins

100

An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy? 

A. The theft of portable electronic devices 

B. Geotagging in the metadata of images 

C. Bluesnarfing of mobile devices 

D. Data exfiltration over a mobile hotspot

Correct answer: D. Data exfiltration over a mobile hotspot

100

A startup company is using multiple SaaS and IaaS platform to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms? 

A. SIEM 

B. DLP 

C. CAS

D. SWG 

Correct answer: C. CAS

100

A security analyst is reviewing a new website that will soon be made publicly available. The analyst sees the following in the URL: 

http://dev-site.comptia.org/home/show.php?sessionID=77276554&loc=us 

The analyst then sends an internal user a link to the new website for testing purposes, and when the user clicks the link, the analyst is able to browse the website with the following URL: 

http://dev-site.comptia.org/home/show.php?sessionID=98988475&loc=us 

Which of the following application attacks is being tested? 

A. Pass-the-hash 

B. Session replay 

C. Object deference 

D. Cross-site request forgery

Correct answer: B. Session replay

200

Which of the following algorithms has the SMALLEST key size?

A. DES

B. Twofish

C. RSA

D. AES 

Correct Answer: B. Twofish

200

Which of the following policies would help an organization identify and mitigate potential single points of failure in the company’s IT/security operations? 

A. Least privilege 

B. Awareness training 

C. Separation of duties 

D. Mandatory vacation

Correct answer: C. Separation of duties

200

An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody? 

A. Document the collection and require a sign-off when possession changes. 

B. Lock the device in a safe or other secure location to prevent theft or alteration. 

C. Place the device in a Faraday cage to prevent corruption of the data. 

D. Record the collection in a blockchain-protected public ledger.

Correct answer: A. Document the collection and require a sign-off when possession changes

200

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data? 

A. Data encryption 

B. Data masking 

C. Data deduplication 

D. Data minimization

Correct answer: B. Data masking

200

A Chief Executive Officer's (CEO) personal information was stolen in a social engineering attack. Which of the following sources would reveal if the CEO's personal information is for sale? 

A. Automated information sharing 

B. Open-source intelligence 

C. The dark web 

D. Vulnerability database

Correct answer: C. The dark web

300

Which of the following describes the BEST approach for deploying application patches? 

A. Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.

B. Test the patches in a staging environment, develop against them in the development environment, and then apply them to the production systems 

C. Test the patches m a test environment apply them to the production systems and then apply them to a staging environment 

D. Apply the patches to the production systems apply them in a staging environment, and then test all of them in a testing environment.

Correct Answer: A. Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems. 

300

A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened? 

A. A malicious USB was introduced by an unsuspecting employee. 

B. The ICS firmware was outdated 

C. A local machine has a RAT installed. 

D. The HVAC was connected to the maintenance vendor

Correct Answer: A. A malicious USB was introduced by an unsuspecting employee.

300

A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the company, its facilities, its data, and its staff. Which of the following describes what the manager is doing? 

A. Developing an incident response plan

B. Building a disaster recovery plan 

C. Conducting a tabletop exercise 

D. Running a simulation exercise

Correct answer: C. Conducting a tabletop exercise

300

Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers? 

A. Red team 

B. While team 

C. Blue team 

D. Purple team

Correct answer: A. Red team

300

A security analyst Is hardening a Linux workstation and must ensure It has public keys forwarded to remote systems for secure login Which of the following steps should the analyst perform to meet these requirements? (Select TWO). 

A. Forward the keys using ssh-copy-id. 

B. Forward the keys using scp. 

C. Forward the keys using ash -i. 

D. Forward the keys using openssl -s. 

E. Forward the keys using ssh-keyger

Correct answer: A & D

A. Forward the keys using ssh-copy-id

D. Forward the keys using openssl -s

400

An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing? 

A. Incident response 

B. Communications 

C. Disaster recovery 

D. Data retention

The correct answer: C. Disaster recovery

400

A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach? 

A. The most common set of MDM configurations will become the effective set of enterprise mobile security controls. 

B. All devices will need to support SCEP-based enrollment; therefore, the heterogeneity of the chosen architecture may unnecessarily expose private keys to adversaries.

C. Certain devices are inherently less secure than others, so compensatory controls will be needed to address the delta between device vendors. 

D. MDMs typically will not support heterogeneous deployment environments, so multiple MDMs will need to be installed and configured

Correct answer: C. Certain devices are inherently less secure than others, so compensatory controls will be needed to address the delta between device vendors. 

400

Which of the following are requirements that must be configured for PCI DSS compliance? (Select TWO). 

A. Testing security systems and processes regularly

B. Installing and maintaining a web proxy to protect cardholder data 

C. Assigning a unique ID to each person with computer access 

D. Encrypting transmission of cardholder data across private networks 

E. Benchmarking security awareness training for contractors 

F. Using vendor-supplied default passwords for system passwords

Correct answers: B & D

B. Installing and maintaining a web proxy to protect cardholder data

D. Encrypting a unique ID to each person with computer access

400

Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement? 

A. An SLA 

B. AnNDA 

C. ABPA 

D. AnMOU

Correct answer: D. AnMOU

400

Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO.) 

A. Alarms 

B. Signage 

C. Lighting 

D. Mantraps 

E. Fencing 

F. Sensors

Correct answers: D & E

D. Mantraps

E. Fencing

500

Some laptops recently went missing from a locked storage area that is protected by keyless RFID-enabled locks. There is no obvious damage to the physical space. The security manager identifies who unlocked the door, however, human resources confirms the employee was on vacation at the time of the incident. Which of the following describes what MOST likely occurred? 

A. The employee's physical access card was cloned.

B. The employee is colluding with human resources

C. The employee's biometrics were harvested 

D. A criminal used lock picking

Correct answer: A. The employee's physical access card was cloned

500

A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks. Which of the following methods would BEST prevent data? (Select TWO) 

A. VPN 

B. Drive encryption

C. Network firewall 

D. File-level encryption 

E. USB blocker 

F. MFA  

Correct answers: B & E

B. Drive encryption

E. USB blocker

500

An attacker is trying to gain access by installing malware on a website that is known to be visited by the target victims. Which of the following is the attacker MOST likely attempting? 

A. A spear-phishing attack 

B. A watering-hole attack 

C. Typo squatting 

D. A phishing attack

Correct answer: B. A watering-hole attack

500

A security analyst is looking for a solution to help communicate to the leadership team the seventy levels of the organization’s vulnerabilities. Which of the following would BEST meet this need? 

A. CVE 

B. SIEM 

C. SOAR 

D. CVSS 

Correct answer: D. CVSS

500

A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring? 

A. Containment 

B. Identification 

C. Recovery 

D. Preparation

Correct answer: B. Identification