A computer restarted spontaneously and displayed a banner stating that a computer was locked and its data files were encrypted. The banner demanded payment in Bitcoin.
Which type of malware attack is this?
(Spyware, Rootkit, Bot, Ransomware)
Ransomware
A dedicated network device that can create and manage secure encrypted pathways for remote client and site-to-site connections.
(Load balancer, VPN concentrator, Proxy)
VPN concentrator
The admin wants to reduce the risk from unknown vulnerability in the third party software application. What should he use?
(Encryption, Sand boxing, Fuzzing, Code signing)
Sand boxing
Employees use 3 different sets of credentials to access internal resources. Management wants to make this process less complex. What can they use?
(Federation, SSO, Transitive trust, secure token)
SSO
After an incident, Jeff finished restoring the OS and applications on a workstation from the original media. Jeff is about to begin copying the user's files back onto the hard drive.
Which incident response steps is Jeff working on now?
(Eradication, Identity, Containment, Recovery)
Recovery
Your network is attacked by a self replicating program. What type of malware does this indicate?
(Spyware, Rootkit, watering hole attack, worm)
Worm
You need to ensure that devices that connect to the network have the operating system updates and current antivirus. Devices that do not should be automatically remediated.
What can you implement?
(VLAN, NAT, DMZ, NAC)
NAC
All computers in your company come with TPM installed. What type of data encryption most often use keys generated from TPM?
(File encryption, Database encryption,Full disk encryption)
Full disk encryption
What AAA solution will provide centralized authentication for a wireless system that integrate with a directory back end.
(TACACS+, LDAP, RADIUS, MsCHAPv2)
RADIUS
Which of the following must be intact for evidence to be admissible in court?
(Chain of custody, order of volatility, Legal hold, preservation)
Chain of custody
What type of attack would be used to most quickly find password in the hashed password file?
(Brute force, Birthday, Rainbow table, Dictionary)
Rainbow table attack
You need to configure a firewall between the internet and your perimeter network. There's a server that host your web applications that uses TLS.
Which port do you need to configure for incoming and outgoing traffic?
(TCP 80, TCP 990, TCP 443, UDP 80)
TCP 443
A company is setting up a network for a research facility. This network must be as secure as possible to prevent data loss or compromise. Only research personnel should have access to this network and they won't need any other external resources.
What should you configure?
(Air gap, Extranet, VLAN, Screened subnet)
Air gap
What would provide best defense from brute forcing an account.
(Account expiration, Account lockout, Password history, Password complexity)
Account lockout
A company wants to enhance a secondary data center. The main site is in a hurricane-affected area. Now the company wants to ensure that its business is always operational with the least amount of man hours needed. What to implement?
(Hot site, Cold site, Warm site, Cloud-based site)
Cloud-based site
Active reconnaissance can collect more detailed information than passive reconnaissance
(yes or No)
Yes
After a routine audit, a company finds that engineering documents have been leaving the network on particular port. Now they cannot block that port as it is needed. What should they implement?
(ACL, Webproxy, DLP, NAC)
DLP
A cloud service that gives yo the most direct control over your environment. You are responsible for installing and maintaining the operating system ad other resources.
(PaaS,SaaS, IaaS)
IaaS
What describes the maximum amount of time a mission essential function can operate without the systems it depends on before significantly impacting the organization?(MTTR, MTBF, RTO, RPO)
RTO
A security technician is configuring an access management system to track and record user actions. Which of the following functions should the technician
configure?
(Identification, Authorization, Authentication, Accounting)
Accounting
What can you do to prevent an internet attacker from using a replay attack to gain access to a secure public website.
timestamp session packets
2 companies are combining resources and and they must transfer files through the internet in a secure manner. Which of the following protocol.
Which protocols would best meet this objectives(2)
(LDAPS, DNSSEC, SFTP, HTTPS)
SFTP, HTTPS
A company possess and archives extremely sensitive data on servers. Those servers need to be protected from EMP.
What ca you use?
(UPS, Shielded cable, Faraday cage, power them off)
Faraday cage
An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?
( False negative, true negative, False positive, true positive)
False positive
Which of the following are used to substantially increase the computation time required to crack a password? (Choose 2)
(Substitution cipher, BCRYPT, ECDHE, PBKDF2)
BCRYPT, PBKDF2