Cryptography & VPNs
Malware & Attacks
Security Policies & Controls
Network Defense & Architecture
Incident Response & Forensics
100

Which data type is protected through the use of an IPsec VPN?

Data in transit.

100

What type of malware attack uses unsafe websites and suspicious emails to entice users to give away personal information?

Phishing

100

If the IT team discovers employees are visiting inappropriate websites, which security policy governs user behavior and should be addressed first?

 Acceptable Use Policy

100

In the security onion analogy for defense-in-depth, what does the outer layer of the onion represent?

The firewall as the first line of defense

100

What procedure should be strictly avoided by first responders in a digital forensics investigation?

Rebooting the affected system

200

Which of the following wireless protocols utilize the Advanced Encryption Standard (AES)? 

  • WPA2
  • EAP
  • WEP
  • TKIP
  • WPA

WPA2 and WPA.

200

What type of attack disrupts services by overwhelming network devices with bogus traffic?

DDoS (Distributed Denial of Service)

200

 If a company requires employees to report any observed or suspected security issues, which control type has been implemented?

Administrative controls

200

What tool is used to intentionally lure an attacker so that an administrator can capture, log, and analyze the behavior of the attack?

Honeypot

200

When making copies of data from a compromised machine, what must be done to ensure it is an exact duplicate?

Perform a cyclic redundancy check using a checksum or hashing algorithm

300

What is a primary difference between symmetric and asymmetric encryption algorithms?

Symmetric encryption algorithms use pre-shared keys while asymmetric algorithms use different keys to encrypt and decrypt data.

300

What technology would be an appropriate solution to generate alerts on malware that has made it through the network perimeter?

Host intrusion detection system (HIDS)

300

An administrator with top security clearance finds they cannot access certain confidential documents. What security concept is at play?

The principle of least privilege

300

Which tool is integrated into the Security Onion platform and displays full packet captures for analysis?

Wireshark

300

What is the simplest type of exercise used for training employees and testing an organization’s disaster recovery plan?

A tabletop exercise

400

What is a major drawback of using a single-root PKI topology?

It is difficult to scale to a large environment.

400

Which open-source malware analysis tool can run locally on a network to analyze malware samples?

Cuckoo Sandbox

400

Which control type should an organization use to bring a system back to its normal state after an event?

Corrective controls

400

In a small business wireless router configuration, how can an internal server be made accessible by outside hosts while keeping traffic isolated?

By configuring a DMZ Host

400

In which phase of the NIST Incident Response Life Cycle are the tools and assets required to investigate incidents acquired and deployed?

Preparation

500

What vital function does the Diffie-Hellman algorithm provide to IPsec VPNs?

It allows two parties to establish a shared secret key over an unsecured channel.

500

Which type of DNS attack involves a threat actor creating multiple bogus sub-domains under a legitimate parent domain?

DNS Domain Shadowing attacks

500

A consulting company is helping an organization address specific operational conditions that require detailed directions. Which type of cybersecurity policy are they developing?

Issue specific policy

500

When configuring a zone-pair between a private and public security zone on a router, what must be entered to specify which traffic is allowed across the zones?

A service policy-map

500

What are three key actions taken during the Detection & Analysis phase of the NIST Incident Response Life Cycle?

Determining the type/extent of the incident, performing initial analysis on the incident's scope/origin, and notifying appropriate stakeholders