New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA CS0-001 Dumps Questions Answers

Page: 1 / 17
Total 455 questions

CompTIA CSA+ Certification Exam Questions and Answers

Question 1

A software patch has been released to remove vulnerabilities from company’s software. A security analyst has been tasked with testing the software to ensure the vulnerabilities have been remediated and the application is still functioning properly. Which of the following tests should be performed NEXT?

Options:

A.

Fuzzing

B.

User acceptance testing

C.

Regression testing

D.

Penetration testing

Buy Now
Question 2

Which of the following actions should occur to address any open issues while closing an incident involving various departments within the network?

Options:

A.

Incident response plan

B.

Lessons learned report

C.

Reverse engineering process

D.

Chain of custody documentation

Question 3

A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?

Options:

A.

TCP

B.

SMTP

C.

ICMP

D.

ARP

Question 4

An administrator has been investigating the way in which an actor had been exfiltrating confidential data from a web server to a foreign host. After a thorough forensic review, the administrator determined the server’s BIOS had been modified by rootkit installation. After removing the rootkit and flashing the BIOS to a known good state, which of the following would BEST protect against future adversary access to the BIOS, in case another rootkit is installed?

Options:

A.

Anti-malware application

B.

Host-based IDS

C.

TPM data sealing

D.

File integrity monitoring

Question 5

The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local intranet. The CTO would like the capability to monitor all traffic to and from the gateway, as well as the capability to block certain content. Which of the following recommendations would meet the needs of the organization?

Options:

A.

Recommend setup of IP filtering on both the internal and external interfaces of the gateway router.

B.

Recommend installation of an IDS on the internal interface and a firewall on the external interface of the gateway router.

C.

Recommend installation of a firewall on the internal interface and a NIDS on the external interface of the gateway router.

D.

Recommend installation of an IPS on both the internal and external interfaces of the gateway router.

Question 6

A cybersecurity analyst has received a report that multiple systems are experiencing slowness as a result of a DDoS attack. Which of the following would be the BEST action for the cybersecurity analyst to perform?

Options:

A.

Continue monitoring critical systems.

B.

Shut down all server interfaces.

C.

Inform management of the incident.

D.

Inform users regarding the affected systems.

Question 7

An analyst has initiated an assessment of an organization’s security posture. As a part of this review, the analyst would like to determine how much information about the organization is exposed externally. Which of the following techniques would BEST help the analyst accomplish this goal? (Select two.)

Options:

A.

Fingerprinting

B.

DNS query log reviews

C.

Banner grabbing

D.

Internet searches

E.

Intranet portal reviews

F.

Sourcing social network sites

G.

Technical control audits

Question 8

An incident response report indicates a virus was introduced through a remote host that was connected to corporate resources. A cybersecurity analyst has been asked for a recommendation to solve this issue. Which of the following should be applied?

Options:

A.

MAC

B.

TAP

C.

NAC

D.

ACL

Question 9

A cybersecurity analyst traced the source of an attack to compromised user credentials. Log analysis revealed that the attacker successfully authenticated from an unauthorized foreign country. Management asked the security analyst to research and implement a solution to help mitigate attacks based on compromised passwords. Which of the following should the analyst implement?

Options:

A.

Self-service password reset

B.

Single sign-on

C.

Context-based authentication

D.

Password complexity

Question 10

A university wants to increase the security posture of its network by implementing vulnerability scans of both centrally managed and student/employee laptops. The solution should be able to scale, provide minimum false positives and high accuracy of results, and be centrally managed through an enterprise console. Which of the following scanning topologies is BEST suited for this environment?

Options:

A.

A passive scanning engine located at the core of the network infrastructure

B.

A combination of cloud-based and server-based scanning engines

C.

A combination of server-based and agent-based scanning engines

D.

An active scanning engine installed on the enterprise console

Question 11

You suspect that multiple unrelated security events have occurred on several nodes on a corporate network. You must review all logs and correlate events when necessary to discover each security event by clicking on each node. Only select corrective actions if the logs shown a security event that needs remediation. Drag and drop the appropriate corrective actions to mitigate the specific security event occurring on each affected device.

Instructions:

The Web Server, Database Server, IDS, Development PC, Accounting PC and Marketing PC are clickable. Some actions may not be required and each actions can only be used once per node. The corrective action order is not important. If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

Options:

Question 12

Which of the following best practices is used to identify areas in the network that may be vulnerable to penetration testing from known external sources?

Options:

A.

Blue team training exercises

B.

Technical control reviews

C.

White team training exercises

D.

Operational control reviews

Question 13

After analyzing and correlating activity from multiple sensors, the security analyst has determined a group from a high-risk country is responsible for a sophisticated breach of the company network and continuous administration of targeted attacks for the past three months. Until now, the attacks went unnoticed. This is an example of:

Options:

A.

privilege escalation.

B.

advanced persistent threat.

C.

malicious insider threat.

D.

spear phishing.

Question 14

A cybersecurity analyst has received an alert that well-known “call home” messages are continuously observed by network sensors at the network boundary. The proxy firewall successfully drops the messages. After determining the alert was a true positive, which of the following represents the MOST likely cause?

Options:

A.

Attackers are running reconnaissance on company resources.

B.

An outside command and control system is attempting to reach an infected system.

C.

An insider is trying to exfiltrate information to a remote network.

D.

Malware is running on a company system.

Question 15

A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indication weaknesses in the infrastructure.

The scope of activity as described in the statement of work is an example of:

Options:

A.

session hijacking

B.

vulnerability scanning

C.

social engineering

D.

penetration testing

E.

friendly DoS

Question 16

Which of the following represent the reasoning behind careful selection of the timelines and time-of-day boundaries for an authorized penetration test? (Select TWO).

Options:

A.

To schedule personnel resources required for test activities

B.

To determine frequency of team communication and reporting

C.

To mitigate unintended impacts to operations

D.

To avoid conflicts with real intrusions that may occur

E.

To ensure tests have measurable impact to operations

Question 17

A security professional is analyzing the results of a network utilization report. The report includes the following information:

Which of the following servers needs further investigation?

Options:

A.

hr.dbprod.01

B.

R&D.file.srvr.01

C.

mrktg.file.srvr.02

D.

web.srvr.03

Question 18

An organization has recently recovered from an incident where a managed switch had been accessed and reconfigured without authorization by an insider. The incident response team is working on developing a lessons learned report with recommendations. Which of the following recommendations will BEST prevent the same attack from occurring in the future?

Options:

A.

Remove and replace the managed switch with an unmanaged one.

B.

Implement a separate logical network segment for management interfaces.

C.

Install and configure NAC services to allow only authorized devices to connect to the network.

D.

Analyze normal behavior on the network and configure the IDS to alert on deviations from normal.

Question 19

A cybersecurity analyst is completing an organization’s vulnerability report and wants it to reflect assets accurately. Which of the following items should be in the report?

Options:

A.

Processor utilization

B.

Virtual hosts

C.

Organizational governance

D.

Log disposition

E.

Asset isolation

Question 20

Which of the following BEST describes the offensive participants in a tabletop exercise?

Options:

A.

Red team

B.

Blue team

C.

System administrators

D.

Security analysts

E.

Operations team

Question 21

After running a packet analyzer on the network, a security analyst has noticed the following output:

Which of the following is occurring?

Options:

A.

A ping sweep

B.

A port scan

C.

A network map

D.

A service discovery

Question 22

A security analyst suspects that a workstation may be beaconing to a command and control server. Inspect the logs from the company’s web proxy server and the firewall to determine the best course of action to take in order to neutralize the threat with minimum impact to the organization.

Instructions:

Modify the firewall ACL, using the Firewall ACL form to mitigate the issue.

If at any time you would like to bring back the initial state of the simulation, please select the Reset All button.

Options:

Question 23

An alert has been distributed throughout the information security community regarding a critical Apache vulnerability. Which of the following courses of action would ONLY identify the known vulnerability?

Options:

A.

Perform an unauthenticated vulnerability scan on all servers in the environment.

B.

Perform a scan for the specific vulnerability on all web servers.

C.

Perform a web vulnerability scan on all servers in the environment.

D.

Perform an authenticated scan on all web servers in the environment.

Question 24

A security analyst is performing a stealth black-box audit of the local WiFi network and is running a wireless sniffer to capture local WiFi network traffic from a specific wireless access point. The SSID is not appearing in the sniffing logs of the local wireless network traffic. Which of the following is the best action that should be performed NEXT to determine the SSID?

Options:

A.

Set up a fake wireless access point

B.

Power down the wireless access point

C.

Deauthorize users of that access point

D.

Spoof the MAC addresses of adjacent access points

Question 25

A datacenter manager just received an SMS alert that a server cage was accessed using an authorized code. The manager does not recall receiving a notification by email for any scheduled maintenance on servers In the cage. Which of the following Is the FIRST step the manager should take?

Options:

A.

Check the change management logs at the earliest convenience to determine if the change was authorized.

B.

Remote access the server and change the password to prevent the Intruder from accessing the system.

C.

Request a firewall administrator to Implement an ACL to contain any potential damage.

D.

Call the security guard to investigate the situation.

Question 26

A cybersecurity analyst wants to use ICMP ECHO_REQUEST on a machine while using Nmap. Which of the following is the correct command to accomplish this?

Options:

A.

$ nmap –PE 192.168.1.7

B.

$ ping --PE 192.168.1.7

C.

$ nmap --traceroute 192.168.1.7

D.

$ nmap –PO 192.168.1.7

Question 27

The Chief Information Security Officer (CISO) asks a security analyst to write a new SIEM search rule to determine if any credit card numbers are being written to log files. The CISO and security analyst suspect the following log snippet contains real customer card data:

Which of the following expressions would find potential credit card numbers in a format that matches the log snippet?

Options:

A.

^[0-9](16)$

B.

(0-9) x 16

C.

“1234-5678”

D.

“04*”

Question 28

A security analyst was asked to join an outage call for a critical web application. The web middleware support team determined the web server is running and having no trouble processing requests; however, some investigation has revealed firewall denies to the web server that began around 1.00 a.m. that morning. An emergency change was made to enable the access, but management has asked for a root cause determination. Which of the following would be the BEST next step?

Options:

A.

Install a packet analyzer near the web server to capture sample traffic to find anomalies.

B.

Block all traffic to the web server with an ACL.

C.

Use a port scanner to determine all listening ports on the web server.

D.

Search the logging servers for any rule changes.

Question 29

A company has received several reports that some or its user accounts were compromised, and Its website Is flagged as Insecure by major search engines. The security analyst reviews the relevant application logs to determine where the problem might be located:

Given the above log Information, which of the following would be the BEST recommendation for the security analyst to give?

Options:

A.

The networking team should update the WAF to block directory traversal.

B.

The development team should implement input sanitation on all web forms.

C.

The server administration team should scan for malware on the server.

D.

The security team should update the IPS to prevent network enumeration.

Question 30

Which of the following describes why it is important for an organization’s incident response team and legal department to meet and discuss communication processes during the incident response process?

Options:

A.

To comply with existing organization policies and procedures on interacting with internal and external parties

B.

To ensure all parties know their roles and effective lines of communication are established

C.

To identify which group will communicate details to law enforcement in the event of a security incident

D.

To predetermine what details should or should not be shared with internal or external parties in the event of an incident

Question 31

An excerpt from the process list of a known compromised host is shown below:

Which of the following would be the MOST plausible scenario describing what happened?

Options:

A.

The user opened an infected PDF file from a personal webmail account.

B.

The user Installed an infected version of Mozilla Firefox from a flash drive.

C.

An attacker used mimikatz to steal Kerberos tokens from the lsass.exe process.

D.

An Insider Is running a PowerShell script to steal user credentials.

Question 32

A security team is implementing a new vulnerability management program in an environment that has a historically poor security posture. The team is aware of issues patch management in the environment and expects a large number of findings. Which of the following would be the MOST efficient way to increase the security posture of the organization in the shortest amount of time?

Options:

A.

Create an SLA stating that remediation actions must occur within 30 days of discovery for all levels of vulnerabilities.

B.

Incorporate prioritization levels into the remediation process and address critical findings first.

C.

Create classification criteria for data residing on different servers and provide remediation only for servers housing sensitive data.

D.

Implement a change control policy that allows the security team to quickly deploy patches in the production environment to reduce the risk of any vulnerabilities found.

Question 33

During a recent audit, there were a lot of findings similar to and including the following:

Which of the following would be the BEST way to remediate these findings and minimize similar findings in the future?

Options:

A.

Use an automated patch management solution.

B.

Remove the affected software programs from the servers.

C.

Run Microsoft Baseline Security Analyzer on all of the servers.

D.

Schedule regular vulnerability scans for all servers on the network.

Question 34

A malicious hacker wants to gather guest credentials on a hotel 802.11 network. Which of the following tools is the malicious hacker going to use to gain access to information found on the hotel network?

Options:

A.

Nikto

B.

Aircrak-ng

C.

Nessus

D.

tcpdump

Question 35

Policy allows scanning of vulnerabilities during production hours, but production servers have been crashing lately due to unauthorized scans performed by junior technicians. Which of the following is the BEST solution to avoid production server downtime due to these types of scans?

Options:

A.

Transition from centralized to agent-based scans.

B.

Require vulnerability scans be performed by trained personnel.

C.

Configure daily-automated detailed vulnerability reports.

D.

Implement sandboxing to analyze the results of each scan.

E.

Scan only as required for regulatory compliance.

Question 36

A cybersecurity analyst was asked to review several results of web vulnerability scan logs.

Given the following snippet of code:

Which of the following BEST describes the situation and recommendations to be made?

Options:

A.

The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The code should include the domain name. Recommend the entry be updated with the domain name.

B.

The security analyst has discovered an embedded iframe that is hidden from users accessing the web page. This code is correct. This is a design preference, and no vulnerabilities are present.

C.

The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. The link is hidden and suspicious. Recommend the entry be removed from the web page.

D.

The security analyst has discovered an embedded iframe pointing to source IP 65.240.22.1 network. Recommend making the iframe visible. Fixing the code will correct the issue.

Question 37

An organization wants to perform network scans to Identify active hosts and vulnerabilities. Management places the highest priority on scans that mimic how an attack would progress. Iftime and resources allow, subsequent scans can be performed using different techniques and methods. Which of the following scan types and sequences would BEST suit the organization's requirements?

Options:

A.

Norvcredentialed scans followed by credentialed scans

B.

Credentialed scans followed by compliance scans

C.

Compliance scans followed by credentialed scans

D.

Compliance scans followed by non-credentialed scans

Question 38

A cyber incident response team finds a vulnerability on a company website that allowed an attacker to inject malicious code into its web application. There have been numerous unsuspecting users visiting the infected page, and the malicious code executed on the victim’s browser has led to stolen cookies, hijacked sessions, malware execution, and bypassed access control. Which of the following exploits is the attacker conducting on the company’s website?

Options:

A.

Logic bomb

B.

Rootkit

C.

Privilege escalation

D.

Cross-site scripting

Question 39

A company uses a managed IDS system, and a security analyst has noticed a large volume of brute force password attacks originating from a single IP address. The analyst put in a ticket with the IDS provider, but no action was taken for 24 hours, and the attacks continued. Which of the following would be the BEST approach for the scenario described?

Options:

A.

Draft a new MOU to include response incentive fees.

B.

Reengineer the BPA to meet the organization’s needs.

C.

Modify the SLA to support organizational requirements.

D.

Implement an MOA to improve vendor responsiveness.

Question 40

The Chief Information Security Officer (CISO) has asked the security analyst to examine abnormally high processor utilization on a key server. The output below is from the company’s research and development (R&D) server.

Which of the following actions should the security analyst take FIRST?

Options:

A.

Initiate an investigation

B.

Isolate the R&D server

C.

Reimage the server

D.

Determine availability

Question 41

A security analyst Is reviewing the overnight authentication activity and sees the following set of logs from last evening:

Which of the following should the analyst do NEXT?

Options:

A.

Ask the help desk to contact Diane Mayfair for a password reset.

B.

Fallow up with the Chief Financial Officer (CFO) regarding his login issues

C.

Check lays for activities by the dmeyfair account

D.

Contact Doug Smith lo set up an account in the system.

Question 42

The board of directors made the decision to adopt a cloud-first strategy. The current security infrastructure was designed for on-premise implementation. A critical application that is subject to the Federal Information Security Management Act (FISMA) of 2002 compliance has been identified as a candidate for a hybrid cloud deployment model. Which of the following should be conducted FIRST?

Options:

A.

Develop a request for proposal.

B.

Perform a risk assessment.

C.

Review current security controls.

D.

Review the SLA for FISMA compliance.

Question 43

Risk management wants IT to implement a solution that will permit an analyst to intercept, execute, and analyze potentially malicious files that are downloaded from the Internet.

Which of the following would BEST provide this solution?

Options:

A.

File fingerprinting

B.

Decomposition of malware

C.

Risk evaluation

D.

Sandboxing

Question 44

An organization subscribes to multiple third-party security intelligence feeds. It receives a notification from one of these feeds indicating a zero-day malware attack is impacting the SQL server prior to SP 2. The notification also indicates that infected systems attempt to communicate to external IP addresses on port 2718 to download additional payload. After consulting with the organization’s database administrator, it is determined that there are several SQL servers that are still on SP 1, and none of the SQL servers would normally communicate over port 2718. Which of the following is the BEST mitigation step to implement until the SQL servers can be upgraded to SP 2 with minimal impact to the network?

Options:

A.

Create alert rules on the IDS for all outbound traffic on port 2718 from the IP addresses if the SQL servers running SQL SP 1

B.

On the organization’s firewalls, create a new rule that blocks outbound traffic on port 2718 from the IP addresses of the servers running SQL SP 1

C.

Place all the SQL servers running SP 1 on a separate subnet On the firewalls, create a new rule blocking connections to destination addresses external to the organization’s network

D.

On the SQL servers running SP 1, install vulnerability scanning software

Question 45

An organization has two environments: development and production. Development is where applications are developed with unit testing. The development environment has many configuration differences from the production environment. All applications are hosted on virtual machines. Vulnerability scans are performed against all systems before and after any application or configuration changes to any environment. Lately, vulnerability remediation activity has caused production applications to crash and behave unpredictably. Which of the following changes should be made to the current vulnerability management process?

Options:

A.

Create a third environment between development and production that mirrors production and tests all changes before deployment to the users

B.

Refine testing in the development environment to include fuzzing and user acceptance testing so applications are more stable before they migrate to production

C.

Create a second production environment by cloning the virtual machines, and if any stability problems occur, migrate users to the alternate production environment

D.

Refine testing in the production environment to include more exhaustive application stability testing while continuing to maintain the robust vulnerability remediation activities

Question 46

An analyst received a forensically sound copy of an employee’s hard drive. The employee’s manager suspects inappropriate images may have been deleted from the hard drive. Which of the following could help the analyst recover the deleted evidence?

Options:

A.

File hashing utility

B.

File timestamps

C.

File carving tool

D.

File analysis tool

Question 47

A company invested ten percent of its entire annual budget in security technologies. The Chief Information Officer (CIO) is convinced that, without this investment, the company will risk being the next victim of the same cyber attack its competitor experienced three months ago. However, despite this investment, users are sharing their usernames and passwords with their coworkers to get their jobs done. Which of the following will eliminate the risk introduced by this practice?

Options:

A.

Invest in and implement a solution to ensure non-repudiation

B.

Force a daily password change

C.

Send an email asking users not to share their credentials

D.

Run a report on all users sharing their credentials and alert their managers of further actions

Question 48

A security analyst is reviewing logs and discovers that a company-owned computer issued to an employee is generating many alerts and warnings. The analyst continues to review the log events and discovers that a non-company-owned device from a different, unknown IP address is generating the same events. The analyst informs the manager of these findings, and the manager explains that these activities are already known and part of an ongoing events. Given this scenario, which of the following roles are the analyst, the employee, and the manager filling?

Options:

A.

The analyst is red team.The employee is blue team.The manager is white team.

B.

The analyst is white team.The employee is red team.The manager is blue team.

C.

The analyst is red team.The employee is white team.The manager is blue team.

D.

The analyst is blue team.The employee is red team.The manager is white team.

Question 49

While reviewing proxy logs, the security analyst noticed a suspicious traffic pattern. Several internal hosts were observed communicating with an external IP address over port 80 constantly. An incident was declared, and an investigation was launched. After interviewing the affected users, the analyst determined the activity started right after deploying a new graphic design suite. Based on this information, which of the following actions would be the appropriate NEXT step in the investigation?

Options:

A.

Update all antivirus and anti-malware products, as well as all other host-based security software on the servers the affected users authenticate to.

B.

Perform a network scan and identify rogue devices that may be generating the observed traffic. Remove those devices from the network.

C.

Identify what the destination IP address is and who owns it, and look at running processes on the affected hosts to determine if the activity is malicious or not.

D.

Ask desktop support personnel to reimage all affected workstations and reinstall the graphic design suite. Run a virus scan to identify if any viruses are present.

Question 50

A company has decided to process credit card transactions directly. Which of the following would meet the requirements for scanning this type of data?

Options:

A.

Quarterly

B.

Yearly

C.

Bi-annually

D.

Monthly

Question 51

An organization is attempting to harden its web servers and reduce the information that might be disclosed by potential attackers. A security analyst is reviewing vulnerability scan results from a recent web server scan.

Portions of the scan results are shown below:

Which of the following lines indicates information disclosure about the host that needs to be remediated?

Options:

A.

Response: С:\Documents\MarySmith\mailingList.pdf

B.

Finding#5144322

C.

First Time Detected 10 Nov 2015 09:00 GMT-0600

Question 52

The primary difference in concern between remediating identified vulnerabilities found in general-purpose IT network servers and that of SCADA systems is that:

Options:

A.

change and configuration management processes do not address SCADA systems.

B.

doing so has a greater chance of causing operational impact in SCADA systems.

C.

SCADA systems cannot be rebooted to have changes to take effect.

D.

patch installation on SCADA systems cannot be verified.

Question 53

The director of software development is concerned with recent web application security incidents, including the successful breach of a back-end database server. The director would like to work with the security team to implement a standardized way to design, build, and test web applications and the services that support them. Which of the following meets the criteria?

Options:

A.

OWASP

B.

SANS

C.

PHP

D.

Ajax

Question 54

A company has been a victim of multiple volumetric DoS attacks. Packet analysis of the offending traffic shows the following:

Which of the following mitigation techniques is MOST effective against the above attack?

Options:

A.

The company should contact the upstream ISP and ask that RFC1918 traffic be dropped.

B.

The company should implement a network-based sinkhole to drop all traffic coming from 192.168.1.1 at their gateway router.

C.

The company should implement the following ACL at their gateway firewall:DENY IP HOST 192.168.1.1 170.43.30.0/24.

D.

The company should enable the DoS resource starvation protection feature of the gateway NIPS.

Question 55

As part of the SDLC, software developers are testing the security of a new web application by inputting large amounts of random data. Which of the following types of testing is being performed?

Options:

A.

Fuzzing

B.

Regression testing

C.

Stress testing

D.

Input validation

Question 56

Which of the following countermeasures should the security administrator apply to MOST effectively mitigate Bootkit-level infections of the organization's workstation devices?

Options:

A.

Remove local administrator privileges.

B.

Configure a BIOS-level password on the device.

C.

Install a secondary virus protection application.

D.

Enforce a system state recovery after each device reboot.

Question 57

A threat intelligence analyst who works for a financial services firm received this report:

“There has been an effective waterhole campaign residing at This domain is delivering ransomware. This ransomware variant has been called “LockMaster” by researchers due to its ability to overwrite the MBR, but this term is not a malware signature. Please execute a defensive operation regarding this attack vector.”

The analyst ran a query and has assessed that this traffic has been seen on the network. Which of the following actions should the analyst do NEXT? (Select TWO).

Options:

A.

Advise the firewall engineer to implement a block on the domain

B.

Visit the domain and begin a threat assessment

C.

Produce a threat intelligence message to be disseminated to the company

D.

Advise the security architects to enable full-disk encryption to protect the MBR

E.

Advise the security analysts to add an alert in the SIEM on the string “LockMaster”

F.

Format the MBR as a precaution

Question 58

A zero-day crypto-worm is quickly spreading through the internal network on port 25 and exploiting a software vulnerability found within the email servers.

Which of the following countermeasures needs to be implemented as soon as possible to mitigate the worm from continuing to spread?

Options:

A.

Implement a traffic sinkhole.

B.

Block all known port/services.

C.

Isolate impacted servers.

D.

Patch affected systems.

Question 59

An analyst has noticed unusual activities in the SIEM to a .cn domain name. Which of the following should the analyst use to identify the content of the traffic?

Options:

A.

Log review

B.

Service discovery

C.

Packet capture

D.

DNS harvesting

Question 60

A cybersecurity consultant is reviewing the following output from a vulnerability scan against a newly installed MS SQL Server 2012 that is slated to go into production in one week:

Based on the above information, which of the following should the system administrator do? (Select TWO).

Options:

A.

Verify the vulnerability using penetration testing tools or proof-of-concept exploits.

B.

Review the references to determine if the vulnerability can be remotely exploited.

C.

Mark the result as a false positive so it will show in subsequent scans.

D.

Configure a network-based ACL at the perimeter firewall to protect the MS SQL port.

E.

Implement the proposed solution by installing Microsoft patch Q316333.

Question 61

A company has several internal-only, web-based applications on the internal network. Remote employees are allowed to connect to the internal corporate network with a company-supplied VPN client. During a project to upgrade the internal application, contractors were hired to work on a database server and were given copies of the VPN client so they could work remotely. A week later, a security analyst discovered an internal web-server had been compromised by malware that originated from one of the contractor’s laptops. Which of the following changes should be made to BEST counter the threat presented in this scenario?

Options:

A.

Create a restricted network segment for contractors, and set up a jump box for the contractors to use to access internal resources.

B.

Deploy a web application firewall in the DMZ to stop Internet-based attacks on the web server.

C.

Deploy an application layer firewall with network access control lists at the perimeter, and then create alerts for suspicious Layer 7 traffic.

D.

Require the contractors to bring their laptops on site when accessing the internal network instead of using the VPN from a remote location.

E.

Implement NAC to check for updated anti-malware signatures and location-based rules for PCs connecting to the internal network.

Question 62

A company has received the results of an external vulnerability scan from its approved scanning vendor. The company is required to remediate these vulnerabilities for clients within 72 hours of acknowledgement of the scan results.

Which of the following contract breaches would result if this remediation is not provided for clients within the time frame?

Options:

A.

Service level agreement

B.

Regulatory compliance

C.

Memorandum of understanding

D.

Organizational governance

Question 63

An organization uses Common Vulnerability Scoring System (CVSS) scores to prioritize remediation of vulnerabilities.

Management wants to modify the priorities based on a difficulty factor so that vulnerabilities with lower CVSS scores may get a higher priority if they are easier to implement with less risk to system functionality. Management also wants to quantify the priority. Which of the following would achieve management’s objective?

Options:

A.

(CVSS Score) * Difficulty = PriorityWhere Difficulty is a range from 0.1 to 1.0 with 1.0 being easiest and lowest risk to implement

B.

(CVSS Score) * Difficulty = PriorityWhere Difficulty is a range from 1 to 5 with 1 being easiest and lowest risk to implement

C.

(CVSS Score) / Difficulty = PriorityWhere Difficulty is a range from 1 to 10 with 10 being easiest and lowest risk to implement

D.

((CVSS Score) * 2) / Difficulty = PriorityWhere CVSS Score is weighted and Difficulty is a range from 1 to 5 with 5 being easiest and lowest risk to implement

Question 64

The Chief Information Security Officer (CISO) has asked the security staff to identify a framework on which to base the security program. The CISO would like to achieve a certification showing the security program meets all required best practices. Which of the following would be the BEST choice?

Options:

A.

OSSIM

B.

SDLC

C.

SANS

D.

ISO

Question 65

A recently issued audit report highlighted exceptions related to end-user handling of sensitive data and access credentials. A security manager is addressing the findings. Which of the following activities should be implemented?

Options:

A.

Update the password policy

B.

Increase training requirements

C.

Deploy a single sign-on platform

D.

Deploy Group Policy Objects

Question 66

An analyst was testing the latest version of an internally developed CRM system. The analyst created a basic user account. Using a few tools in Kali’s latest distribution, the analyst was able to access configuration files, change permissions on folders and groups, and delete and create new system objects. Which of the following techniques did the analyst use to perform these unauthorized activities?

Options:

A.

Impersonation

B.

Privilege escalation

C.

Directory traversal

D.

Input injection

Question 67

A cybersecurity analyst is reviewing log data and sees the output below:

Which of the following technologies MOST likely generated this log?

Options:

A.

Stateful inspection firewall

B.

Network-based intrusion detection system

C.

Web application firewall

D.

Host-based intrusion detection system

Question 68

A security analyst has noticed that a particular server has consumed over 1TB of bandwidth over the course of the month. It has port 3333 open; however, there have not been any alerts or notices regarding the server or its activities. Which of the following did the analyst discover?

Options:

A.

APT

B.

DDoS

C.

Zero day

D.

False positive

Page: 1 / 17
Total 455 questions