What is a technical security control?
Access control vestibule
Separation of duties
Smart card authentication
User training
What are the clues to watch for to determine if an email message is legitimate or not?
Digital Signature
Email address
Company Name
Grammar
What physical security mechanism opens a second internal door only after external door has been closed and locked?
Bollards
CCTB cameras
Security guards
What type of hardware device can capture user keystrokes and remains undetected by antivirus software?
Wi-fi royter
Key fob
Keylogger
USB thumb drive
What serves as a centralized list of risks, impacts, mitigations, and severity ratings?
Risk management framework
Risk register
Disaster recovery plan
Incident response plan
What is the correct sequence for the risk management lifecycle?
Analyze risk, treat risk, monitor risk, identify risk
identify risk, Analyze risk, treat risk, monitor risk
treat risk, monitor risk, identify risk, Analyze risk
identify risk, monitor risk, Analyze risk, treat risk
Which type of threat actor promotes an ideology?
Script kiddie
Organized crime
Hacktivist
Nation state
What is the purpose of social engineering?
Promote ideology
Denial of service
Data exfiltration
Deception
You have decided to purchase cybersecurity insurance to cover DDoS or ransomware events. Which type of risk treatment is this?
Risk acceptance
Risk avoidance
Risk mitigation
Risk transfer
How is the annualized loss expectancy (ALE) calculated?
Exposure factor × single loss expectancy
Annual rate of occurrence × single loss expectancy
Annual rate of occurrence × asset value
Exposure factor × annual rate of occurrence
Which physical security mechanism opens a second internal door only after the external door has been closed and locked?
CCTV cameras
Job rotation
Least privilege
Mandatory vacation
You have been awarded a government contract that will last two years. You must share IT systems and data with a business partner to fulfil the contract. You need to ensure specific rules are followed when linking the networks of both companies together. What must be signed by both parties?
MOA
ISA
SLA
MOU
What is an example of OSINT?
Financial records
LinkedIn profiles
Medical history
Firewall logs
What are clues to watch for to determine if an email message is legitimate or not?
Company name
Digital signature
Which type of hardware device can capture user keystrokes and remains undetected by antivirus software?
Wi-Fi router
Which Docker CLI command is used to download a container image?
docker push
docker pull
docker down
docker up
What should you do to harden a hypervisor host?
Disable unnecessary services
Place all NICs on the production VLAN
Configure a dedicated management NIC on its own VLAN
Install a RAID controller
Which Linux command can you use to display the VM IP address?
ifconfig
tracert
ping
ipconfig
You need to deploy an HTTP-based application container into the cloud. What must you do to ensure port 80 in the container is in a listening state?
Nothing
Map port 80 in the container to port 80 in the cloud
Map port 80 in the container to a public IP address
Map port 80 in the container to a virtual machine
You are deploying an on-premises virtual machine that requires a bi-directional connection to the production network. What type of network connection should you configure?
Private
Host-only
NAT
Bridged
Which benefit is derived from using application containers instead of virtual machines?
Regulatory compliance
Faster startup time
Better app performance
Increased security
You are setting up a server to run multiple virtual machine guests. You have installed the OS which is designed specifically as a hypervisor. What type of hypervisor is this?
Type B
Type 1
Type 2
Type A
Which type of virtualization allows users to run productivity applications from a full operating system remotely through thin client?
Desktop virtualization
Application virtualization
Containerized application
Operating system virtualization
What benefit does a container registry provide?
Encryption of application container images
Centralized container image repository
Application container clustering
Which security issue does virtual machine encryption address?
The decryption passphrase must be known to mount VM disks while the VM is running
A hash of the virtual machine hard disks is generated
The virtual machine is replicated to a secondary hypervisor for high availability
The decryption passphrase must be known to start the VM
Which cloud items can a network security group be associated with?
vNIC
VNet
Subnet
VPC
Which types of rules can be configured with Azure Firewall?
DNAT
Proxy
HTTP
Application
Which types of items can be stored in a cloud key vault?
Windows admin passwords
PKI certificates
Linux root passwords
Encryption keys
What is the purpose of the STAR registry?
Storage of custom application container images
Assurance of cloud provider security accreditations
Cloud provider SLA listing
Centralized cloud-based IAM
What is used to determine the order in which cloud security group rules are processed?
IP address
Priority value
UDP port number
TCP port number
Which cloud computing characteristic refers to paying for services used?
Pooled resources
Metered usage
Broad network access
Rapid elasticity
What is the benefit of VNet peering?
Enhanced security
VM connectivity using private IPs
More bandwidth
Which statement best describes encrypting stored data?
Protecting data in process
Protecting data at rest
Protecting data in archives
Protecting data in transit
Which type of cloud is owned and used by a single organization?
Public
Community
Hybrid
Which term is the most closely associated with autoscaling?
Horizontal scaling
Template
Automation
Vertical scaling
Which port is used to remotely manage Windows hosts?
80
22
3389
443
What is the most common consequence of SLA uptime requirements violations?
Service credits
Free unlimited service usage
Lawsuit
Damages awarded
You want all outbound subnet traffic to first be sent to a firewall appliance for inspection. Which IP address should you specify for the firewall?
127.0.0.0/0
Firewall public IP
Firewall private IP
0.0.0.0/0
You are configuring a DNAT rule in Azure Firewall to allow incoming SSH management of Linux VMs. Which IP addresses should you specify in the DNAT rule?
VM private IP
VM public IP
What is contained within a cloud-based virtual network?
Network security groups
Subnets
Resource groups
Route tables
You have manually deployed a cloud-based Linux virtual machine. Which type of cloud service model is this?
IaaS
SaaS
PaaS
SECaaS
Which network security protocol is normally used to enable HTTPS for websites?
SSL
IPsec
TLS
VPN
Which authentication methods can be used with Windows IPsec?
Device name
Kerberos
Certificate
User name
You need to view all user certificates for a Windows user on her Windows 10 laptop. What should you do?
View the properties of the user account in Active Directory
Use the manage-bde command
Use MMC with the certificates snapin
Use MMC with the disk management snapin
Which command line tool can be used to manage BitLocker?
certutil
cipher
manage-bde
openssl
Which block cipher mode of operation makes a block cipher a stream cipher?
OFB
ECB
CBC
GCM
How does hashing differ from encryption?
It is reversible
A key is used
It is not reversible
No keys are used
What must be done when issuing certificates from a private CA to ensure certificates will work correctly in an organization?
Enable certificate pinning on all devices
Join all devices to an Active Directory domain
Add each issued certificate to all devices
Add the private CA trusted root certificate to all devices
Which PKI items issue certificates?
Subordinate CA
Certificate revocation list
Certificate template
Root CA
Which cryptographic solution is a network appliance that can perform cryptographic operations?
HSM
TPM
BitLocker
EFS
Which command line tool is used to manage EFS file encryption?
Get-FileHash
Which PowerShell cmdlet generates a file hash?
Set-Hash
Generate-FileHash
New-FileHash
Which mechanism controls who can retrieve certificates from an Azure Key Vault?
Firewall ACL
Azure resource group RBAC roles
Azure AD conditional access policies
Vault access policy
What type of PKI certificate can be used for DNS subdomains that fall under a parent domain?
Code signing
Wildcard
Extended validation
User
You have configured and enabled a custom certificate template for your Windows certification authority, yet users are unable to use the template to acquire a PKI certificate. What is the most likely cause of the problem?
The template must be imported to Active Directory
Users are not logged into their station with elevated permissions
Users do not have the “Enroll” permission for the template
The template must first be exported
With asymmetric cryptography, which key is used to encrypt?
Secret
Pre-shared
Which type of storage area network solution uses standard network equipment and the TCP/IP protocol suite?
Cluster shared storage
FC SAN
NAS
iSCSI
You need to configure ten workgroup Windows servers with the same Windows Defender firewall settings. You must achieve this with the least amount of administrative effort. What should you do?
Create the same firewall rules on each host manually
Configure firewall settings in the domain Group Policy Object (GPO)
Mirror the servers together then create the firewall rules
Create the firewall rules on one host, export the configuration and import on other servers
Which RAID level is disk mirroring?
RAID 5
RAID 1
RAID 6
RAID 0
What makes a reverse proxy different from network address translation (NAT)?
Reverse proxying and NAT are exactly the same
NAT applies to OSI layer 7
Reverse proxying applies to OSI layer 7
Reverse proxying applies to OSI layer 4
You are configuring VPN client certificate authentication in the Microsoft Azure cloud. What must be provided for the Azure virtual network gateway?
Root certificate public key
User certificate private key
User VPN password
User VPN device MAC address
Which Linux command can be used to create a mirrored disk volume?
mdadm
grep
fdisk
How do jump boxes protect servers?
Servers do not have to be directly exposed to the Internet
Server file systems are encrypted
Server file systems are hashed
Servers have DLP policies applied
Which type of firewall is considered firewall-friendly?
L2TP/IPsec
PPTP
SSL/TLS
Which type of Azure Firewall rule allows standard packet filtering rules?
DNAT rules
Application rules
Network rules
Application rules_
Which solution can ensure users accept the terms of use before allowing Internet access?
Captive portal
MAC address filtering
Enable WPA3
Disable SSID broadcasting
How do reverse shells defeat most firewall rules?
Attacker connectivity is done through the Tor network
Connections are initiated from the compromised host
Firewalls are compromised and rules are disabled
Connections are initiated from the attacker machine
Which type of security is the result of enabling DNSSEC?
Integrity
Confidentiality
Compliance
Availability
What is used to group disk devices together in the Windows Server operating system?
GRP
Storage pool
MBR
Which standard is used for network access control?
802.15
802.1x
802.3
802.11x
Which attributes are used to determine file system permissions when using Windows Dynamic Access Control?
Active directory users only
File objects and directory objects only
Active directory users and devices only
Active directory users, devices, and file system objects
Which Microsoft Azure configuration checks where users are authenticated from?
Conditional Access policy
Azure policy
MFA
RBAC
How are HMAC-based one-time passwords encrypted?
Using a PKI certificate
Using a symmetric key
Using a public key
Using a private key
Which port does RADIUS authentication use by default?
1812
4532
636
Which tool can be used to discover RDP hosts on a network?
netstat
nmap
nc
john
Which methods are not available when configuring Google 2-Step Verification?
Voice calls
Conditional access policies
Text messages
Security keys
Which command can be used to manually refresh Group Policy on a Windows host?
mmc
gpupdate
You need to ensure Microsoft Azure cloud technicians can administer virtual machines in a specific resource group. What should you do?
Assign the Virtual Machine Contributor role to specific virtual machines
Assign the Virtual Machine Contributor role to the Azure subscription
Assign the Owner role to the resource group
Assign the Virtual Machine Contributor role to the resource group
You need to view passwords cracked by the “John the Ripper” tool. Which command should you issue?
john --viewer
john --show
john --passshow
john --crack
Which term describes sensitive medical information?
SPI
PHI
PII
GDPR
Where does Amazon Macie discover data?
Web searches
Big data analytics
SQL databases
S3 buckets
Which IT management item contains standardized configurations to ensure security and consistency?
CI
ITIL
CMDB
Which term is synonymous with wiping a hard disk?
Partitioning
Scrubbing
Formatting
Deleting
Who determines how data will be managed?
Chief information officer
Data protection officer
Data custodian
Data owner
Which data privacy standard governs how EU citizen data is handled?
PCI DSS
COPPA
HIPAA
What is the maximum number of tags that can be added to a single Azure resource?
25
50
5
10
You need to apply data labels to files on a Windows server. What should you use?
Microsoft File Server Resource Manager
Azure Backup
Azure Information Protection
Microsoft Internet Information Services
Which type of business agreement focuses on a service provider guaranteeing a level of service to a consumer?
NDA
You have created Azure data classification labels for use with Azure Information Protection. What must you create next to use the labels?
Azure App Service
AIP policy
Azure storage account
RBAC assignment
What should be done to harden IoT devices that cannot be patched?
Place on an isolated network
Issue a PKI certificate
Apply group policy
Change the default settings
You have just registered a smartphone with an MDM tool. What is the next thing that will happen on the smartphone?
Complex passwords will be enabled
Process inventory
The authentication PIN will be reset
The camera will be disabled
You are searching for vulnerable RDP hosts using the shodan.io site. Which port should you search for?
389
You need Internet access for your laptop in a remote area where wired and wireless Internet are unavailable. You have a cell phone with data enabled. What should you enable to provide Internet access for your laptop?
Biometric authentication
Jailbreaking
Tethering
Debug bridge
A smartphone technician requires full access to solve problems on a user smartphone. The phone is registered with an MDM solution that restricts smartphone access. What should the technician do?
Unregister the smartphone device from the MDM tool
Request a security code to temporarily disable the MDM security policy on the MDM server
Request a security code to temporarily disable the MDM security policy on the smartphone
Perform a factory reset of the smartphone
You need to ensure that lost or stolen phones can be located. What should you enable?
Google Play Protect
Rooting
Facial recognition
Find My Mobile
Which software development methodology is linear and depends on previous project phase deliverables?
Diamond
Agile
Waterfall
NIST
What is used to ensure blockchain integrity?
Hash of previous block for each new transaction
Hash of next block for each new transaction
Digital signature of next block for each new transaction
Digital signature of previous block for each new transaction
Which OWASP ZAP feature can send unanticipated data to a web app to observe its behaviour?
Reporting
Zapping
Fuzzing
Proxying
Which type of testing occurs while software is running?
Regression
Unit
Static
Dynamic
Which type of artificial intelligence uses neural networks?
Machine learning
Deep web
Deep learning
Which type of web application attack is most likely to result from improper input validation?Which type of web application attack is most likely to result from improper input validation?
ARP cache poisoning
Directory traversal
DDoS
Cross-site scripting
What provides real-time monitoring to ensure safety when hardware malfunctions in an industrial computing environment?
SIS
ICS
SCADA
DNP3
Which industrial computing protocol is commonly used for public utility networks, such as water and electricity?
Modbus
CIP
Which industrial control attack fed false readings for centrifuges to monitoring stations?
Code Red
Slammer
StuxNet
Michelangelo
What term is used for an industry-specific specialized computer?
PLC
RTU
Which Linux command is used to compile binaries from source code?
make
chmod
sudo
Which Metasploit command allows querying?
searchsploit
find
updatedb
search
Which type of tool is nmap?
Penetration testing
Network scanner
Patch management
Vulnerability assessment
What is the default file format for Wireshark packet capture files?
PCAP
HTML
XML
PDF
What is the name of the Amazon Web Services centralized monitoring service?
S3
CloudWatch
CloudTrail
EC2
Which Snort command line parameter can be used to test the Snort configuration?
-S
-T
-A
-U
Which port is used for Linux syslog forwarding by default?
445
514
What is the purpose of a honeypot?
To gather statistics on packets in and out
To track C&C servers
To gather forensic evidence used to convict offenders
To track malicious user activity
Which tcpdump command line parameter saves captured packets to a file?
-w
-W
-P
-s
You are writing a shell script to monitor Linux hosts. You need to use pattern matching to look for host names in specific cost centers using the format COSTCENTER3DIGITCODE-CITY. What should you do?
Enable Windows event viewer subscriptions
Add regular expressions to your script
Clear all Linux log filters
Enable Linux syslog forwarding
You have become overwhelmed with the amount of log entries on your Windows servers. You would like a convenient way to view only critical and error log events. What should you do?
Create a custom view that filters for critical and error events
Filter each log for critical and error events
Forward the logs to a SIEM system
Export each log and filter the exported results
You are planning the use of a SOAR system for incident response. Which item allows you to automate incident response?
Runbook
Heap overflow
IDS
SIEM
What is the default location and name of the Snort configuration file?
/usr/share/snort.conf
/usr/share/snort.config
/etc/snort/snort.conf
/etc/snort/snort.config
You need to filter captured Wireshark traffic so that only secured website traffic is shown. What should you filter on?
L2TP
HTTPS
SSH
What is a zombie?
A proxy anonymization network
An infected computer under malicious user control
A server that provides infected hosts with instructions
A nonresponsive computer
What is the most effective way to mitigate compromises due to users clicking on links?
Stateful firewall rules
Antivirus scanners
Spam filtering
User training and awareness
Your manager asks you to assess host vulnerabilities exposed to internal employees. What should you do?
Use Nmap against hosts
Run a pen test against hosts
Run a non-credentialed vulnerability scan
Run a credentialed vulnerability scan
Why should C programmers stay away from the gets() function?
It does not do array boundary checking
It does not support strings
It allows malicious code to be stored in a variable
It is not object oriented
Which type of testing uses red and blue teams?
Vulnerability
Penetration
Which command allows you to interact with the Metasploit Framework in Kali Linux?
msfadmin
msfconsole
ntp
Which solutions prevent stolen laptops from being compromised?
Disk encryption
Power-on password
You are using various Wi-Fi reconnaissance tools and see references to a BSSID. What is this?
The name of a connecting wireless client device
The name of the wireless network
The MAC address of a wireless access point
The MAC address of a wireless client device
In which attack phase would a malicious user use the Nmap tool?
Persist
Clear tracks
Reconnaissance
Enumerate
What do malicious users use to target many victims in an attempt to trick them into clicking a link to a fraudulent site?
Spim
Phishing campaign
Spam
Which type of network attack allows attacker access to VLAN traffic?
Cross-site request forgery
VLAN trunking
VLAN hopping
What is one possible way to detect that steganography is being used with a file?
Compression
Hashing
Encryption
You have acquired a forensic image and hash. You must now analyze the storage media contents. What should you do?
Mount the forensic copy, perform the analysis
Mount the forensic copy, create an image
Mount the original media, perform the analysis
Mount the original media, place in a Faraday bag
You need to acquire a disk image in Linux that can be read by FTK imager. Which Linux command should you use?
ldd
dd
You need to acquire evidence according to the order of volatility. In which order will you do this?
Swap file, RAM, hard disk
Hard disk, swap file, RAM
RAM, swap file, hard disk
RAM, CPU, hard disk
How is developer mode enabled on an Android device?
Install the Android Debug Bridge app
Plug a USB cable into the device
Gain root access to the device
Tap the software build number seven times
Which component prevents writing to origin storage devices when acquiring storage device images?
Switch port lock
Write-blocker
What benefits are derived from load balancing?
Higher application availability
Improved application performance
Encryption of data at rest
Encrypted network transmissions
Which type of plan is enacted during a security event?
Incident response
Business continuity
Disaster recovery
Evacuation
Which IP address do clients connect to for a load balanced application?
Forward proxy server
Reverse proxy server
Load balancer
Back-end virtual machine
What is required in Microsoft Azure to perform backups to the cloud?
Eventbus hub
Recovery vault
Storage account
Key vault
Which RAID level creates a copy of all data written to a primary disk?
1
6
3