What are the three main types of Multi-Factor Authentication (MFA)?
Something you know, Something you have, Something you are.
Which GUI Windows tool would you use if you wanted to compare a server's configuration against an INF template to determine whether or not it was configured properly?
Thee Security Configuration and Analysis snap-in
You are an Intrusion Detection Analyst and the system has alerted you to an Event of Interest (EOI) that appears to be activity generated by a worm. You investigate and find that the network traffic was normal. How would this type of alert be categorized?
False Positive
Amazon Cognito uses which of the following for authenticating access requests from an Identity provider?
Shared access signatures
User Pools
Managed Policies
Security Groups
User Pools
This process reviews a complete incident and ensures that all gaps are identified and corrected.
Remediation
Which data loss prevention strategy is focused on preventing accidental data deletion?
Redundancy
Cloud infrastructure
Backup
Access Control
Access Control
What action involves validating the vulnerabilities in a network environment that are able to be exploited by an attacker?
Penetration Testing
What authentication method allows a network authenticcated user to bypass the login screens of other applications?
Single Sign On (SSO)
Which of the following is supported for multi-factor authentication on Microsoft Azure AD?
Retinal scan
SMS PIN
RSA Token
Smart Card
SMS PIN
An attacker maps open and closed ports on a perimeter packet filtering firewall by sending unsolicited packets with the ACK flag set. What should the firewall's response be for open ports?
RST ACK
(when an attack sends a packet with only the ACK flag set to a host on a network protected by a packet filtering firewall, the response is typically a RST ACK since the firewall has no record of an outgoing SYN packet from the internal host.)
How often by default does Windows Group Policy check for updated policies?
Every 90-120 minutes
What Windows native scripting language has additional logging capabilities to record the actions and activities in an operational transaction log?
Powershell
How are digital signatures created?
By encrypting a hash with the use of a private key
True or False. The Azure cloud service, Windows Virtual Desktop, requires an RDP Client?
True
What should an organization do if it believes one of its private keys has been compromised?
Revoke the certificate through Certificate Authority.
What is a common capability of Mobile Device Management (MDM)?
Remotely updating and installing applications.
What is the purpose of Image Steganography's Pre-Scale Image option?
Increases the size of the carrier file
(The pre-scale image option is needed when the carrier file image is too small to include all of the content to be hidden.)
What virtualization component is responsible for the emulation of physical hardware?
Hypervisor
A _______ is a set of rules to allow or deny traffic into a cloud VM or subnet.
Network Security Group (NSG)
Aserver that was compromised has been remediated. Who decides when to put it back into production?
System owner
(The final decision to bring a system back online rests in the hands of the system owner/ administrator. all others can only give advice.)
What policy limits how long someone holds a specific position/job?
Rotation of duties
How could a network administrator use the nmap tool for configuration management on his internal system?
By establishing a known baseline of running systems and their open ports
A file is classified as "Secret" and can only be accessed by a user that has "Clearance level B". Which type of access control is this?
Mandatory Access Control
What is necessary for the receiver to verify a digital signature?
Sender's public key
What type of technology is responsible for protecting the integrity of the network by examining network traffic flows to detect and prevent malicious activity?
Intrusion Prevention System (IPS)