Threats Attacks and Vulnerabilities
Technologies and Tools
Architecture and Design
Identity and access management
Risk Management + Cryptography and PKI
100

A computer restarted spontaneously and displayed a banner stating that a computer was locked and its data files were encrypted. The banner demanded payment in Bitcoin.

Which type of malware attack is this?

(Spyware, Rootkit, Bot, Ransomware)

Ransomware

100

A dedicated network device that can create and manage secure encrypted pathways for remote client and site-to-site connections.

(Load balancer, VPN concentrator, Proxy)

VPN concentrator

100

The admin wants to reduce the risk from unknown vulnerability in the third party software application. What should he use?

(Encryption, Sand boxing, Fuzzing, Code signing)

Sand boxing

100

Employees use 3 different sets of credentials to access internal resources. Management wants to make this process less complex. What can they use?

(Federation, SSO, Transitive trust, secure token)

SSO

100

After an incident, Jeff finished restoring the OS and applications on a workstation from the original media. Jeff is about to begin copying the user's files back onto the hard drive.

Which incident response steps is Jeff working on now?

(Eradication, Identity, Containment, Recovery)

Recovery

200

Your network is attacked by a self replicating program. What type of malware does this indicate?

(Spyware, Rootkit, watering hole attack, worm)

Worm

200

You need to ensure that devices that connect to the network have the operating system updates and current antivirus. Devices that do not should be automatically remediated.

What can you implement?

(VLAN, NAT, DMZ, NAC)

NAC

200

All computers in your company come with TPM installed. What type of data encryption most often use keys generated from TPM?

(File encryption, Database encryption,Full disk encryption)

Full disk encryption

200

What AAA solution will provide centralized authentication for a wireless system that integrate with a directory back end.

(TACACS+, LDAP, RADIUS, MsCHAPv2)

RADIUS

200

Which of the following must be intact for evidence to be admissible in court?

(Chain of custody, order of volatility, Legal hold, preservation)

Chain of custody

300

What type of attack would be used to most quickly find password in the hashed password file?

(Brute force, Birthday, Rainbow table, Dictionary)

Rainbow table attack

300

You need to configure a firewall between the internet and your perimeter network. There's a server that host your web applications that uses TLS. 

Which port do you need to configure for incoming and outgoing traffic?

(TCP 80, TCP 990, TCP 443, UDP 80)

TCP 443

300

A company is setting up a network for a research facility. This network must be as secure as possible to prevent data loss or compromise. Only research personnel should have access to this network and they won't need any other external resources.

What should you configure?

(Air gap, Extranet, VLAN, Screened subnet)

Air gap

300

What would provide best defense from brute forcing an account.

(Account expiration, Account lockout, Password history, Password complexity)

Account lockout

300

A company wants to enhance a secondary data center. The main site is in a hurricane-affected area. Now the company wants to ensure that its business is always operational with the least amount of man hours needed. What to implement?

(Hot site, Cold site, Warm site, Cloud-based site)

Cloud-based site

400

Active reconnaissance can collect more detailed information than passive reconnaissance

(yes or No)

Yes

400

After a routine audit, a company finds that engineering documents have been leaving the network on particular port. Now they cannot block that port as it is needed. What should they implement?

(ACL, Webproxy, DLP, NAC)

DLP

400

A cloud service  that gives yo the most direct control over your environment. You are responsible for installing and maintaining the operating system ad other resources.

(PaaS,SaaS, IaaS)

IaaS

400

What describes the maximum amount of time a mission essential function can operate without the systems it depends on before significantly impacting the organization?(MTTR, MTBF, RTO, RPO)

RTO

400

A security technician is configuring an access management system to track and record user actions. Which of the following functions should the technician

configure?

(Identification, Authorization, Authentication, Accounting)

Accounting

500

What can you do to prevent an internet attacker from using a replay attack to gain access to a secure public website.

timestamp session packets

500

2 companies are combining resources and and they must transfer files through the internet in a secure manner. Which of the following protocol.

Which protocols would best meet this objectives(2)

(LDAPS, DNSSEC, SFTP, HTTPS)

SFTP, HTTPS

500

A company possess and archives extremely sensitive data on servers. Those servers need to be protected from EMP.

What ca you use?

(UPS, Shielded cable, Faraday cage, power them off)

Faraday cage

500

An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?

( False negative, true negative, False positive, true positive)

False positive

500

Which of the following are used to substantially increase the computation time required to crack a password? (Choose 2)

(Substitution cipher, BCRYPT, ECDHE, PBKDF2)

BCRYPT, PBKDF2