CASP+ Study

Beschreibung

Covers all objectives of the CASP+
Buddy Armstrong
Quiz von Buddy Armstrong, aktualisiert more than 1 year ago
Buddy Armstrong
Erstellt von Buddy Armstrong vor mehr als ein Jahr
31
0

Zusammenfassung der Ressource

Frage 1

Frage
What is a technical security control?
Antworten
  • Access control vestibule
  • Separation of duties
  • Smart card authentication
  • User training

Frage 2

Frage
What are the clues to watch for to determine if an email message is legitimate or not?
Antworten
  • Digital Signature
  • Email address
  • Company Name
  • Grammar

Frage 3

Frage
What physical security mechanism opens a second internal door only after external door has been closed and locked?
Antworten
  • Bollards
  • CCTB cameras
  • Access control vestibule
  • Security guards

Frage 4

Frage
What type of hardware device can capture user keystrokes and remains undetected by antivirus software?
Antworten
  • Wi-fi royter
  • Key fob
  • Keylogger
  • USB thumb drive

Frage 5

Frage
What serves as a centralized list of risks, impacts, mitigations, and severity ratings?
Antworten
  • Risk management framework
  • Risk register
  • Disaster recovery plan
  • Incident response plan

Frage 6

Frage
What is the correct sequence for the risk management lifecycle?
Antworten
  • Analyze risk, treat risk, monitor risk, identify risk
  • identify risk, Analyze risk, treat risk, monitor risk
  • treat risk, monitor risk, identify risk, Analyze risk
  • identify risk, monitor risk, Analyze risk, treat risk

Frage 7

Frage
Which type of threat actor promotes an ideology?
Antworten
  • Script kiddie
  • Organized crime
  • Hacktivist
  • Nation state

Frage 8

Frage
What is the purpose of social engineering?
Antworten
  • Promote ideology
  • Denial of service
  • Data exfiltration
  • Deception

Frage 9

Frage
You have decided to purchase cybersecurity insurance to cover DDoS or ransomware events. Which type of risk treatment is this?
Antworten
  • Risk acceptance
  • Risk avoidance
  • Risk mitigation
  • Risk transfer

Frage 10

Frage
How is the annualized loss expectancy (ALE) calculated?
Antworten
  • Exposure factor × single loss expectancy
  • Annual rate of occurrence × single loss expectancy
  • Annual rate of occurrence × asset value
  • Exposure factor × annual rate of occurrence

Frage 11

Frage
Which physical security mechanism opens a second internal door only after the external door has been closed and locked?
Antworten
  • CCTV cameras
  • Access control vestibule
  • Security guards
  • Bollards

Frage 12

Frage
Separation of duties
Antworten
  • Separation of duties
  • Job rotation
  • Least privilege
  • Mandatory vacation

Frage 13

Frage
You have been awarded a government contract that will last two years. You must share IT systems and data with a business partner to fulfil the contract. You need to ensure specific rules are followed when linking the networks of both companies together. What must be signed by both parties?
Antworten
  • MOA
  • ISA
  • SLA
  • MOU

Frage 14

Frage
What is an example of OSINT?
Antworten
  • Financial records
  • LinkedIn profiles
  • Medical history
  • Firewall logs

Frage 15

Frage
What are clues to watch for to determine if an email message is legitimate or not?
Antworten
  • Grammar
  • Company name
  • Email address
  • Digital signature

Frage 16

Frage
Which type of hardware device can capture user keystrokes and remains undetected by antivirus software?
Antworten
  • Key fob
  • USB thumb drive
  • Keylogger
  • Wi-Fi router

Frage 17

Frage
Which Docker CLI command is used to download a container image?
Antworten
  • docker push
  • docker pull
  • docker down
  • docker up

Frage 18

Frage
What should you do to harden a hypervisor host?
Antworten
  • Disable unnecessary services
  • Place all NICs on the production VLAN
  • Configure a dedicated management NIC on its own VLAN
  • Install a RAID controller

Frage 19

Frage
Which Linux command can you use to display the VM IP address?
Antworten
  • ifconfig
  • tracert
  • ping
  • ipconfig

Frage 20

Frage
You need to deploy an HTTP-based application container into the cloud. What must you do to ensure port 80 in the container is in a listening state?
Antworten
  • Nothing
  • Map port 80 in the container to port 80 in the cloud
  • Map port 80 in the container to a public IP address
  • Map port 80 in the container to a virtual machine

Frage 21

Frage
You are deploying an on-premises virtual machine that requires a bi-directional connection to the production network. What type of network connection should you configure?
Antworten
  • Private
  • Host-only
  • NAT
  • Bridged

Frage 22

Frage
Which benefit is derived from using application containers instead of virtual machines?
Antworten
  • Regulatory compliance
  • Faster startup time
  • Better app performance
  • Increased security

Frage 23

Frage
You are setting up a server to run multiple virtual machine guests. You have installed the OS which is designed specifically as a hypervisor. What type of hypervisor is this?
Antworten
  • Type B
  • Type 1
  • Type 2
  • Type A

Frage 24

Frage
Which type of virtualization allows users to run productivity applications from a full operating system remotely through thin client?
Antworten
  • Desktop virtualization
  • Application virtualization
  • Containerized application
  • Operating system virtualization

Frage 25

Frage
What benefit does a container registry provide?
Antworten
  • Regulatory compliance
  • Encryption of application container images
  • Centralized container image repository
  • Application container clustering

Frage 26

Frage
Which security issue does virtual machine encryption address?
Antworten
  • The decryption passphrase must be known to mount VM disks while the VM is running
  • A hash of the virtual machine hard disks is generated
  • The virtual machine is replicated to a secondary hypervisor for high availability
  • The decryption passphrase must be known to start the VM

Frage 27

Frage
Which cloud items can a network security group be associated with?
Antworten
  • vNIC
  • VNet
  • Subnet
  • VPC

Frage 28

Frage
Which types of rules can be configured with Azure Firewall?
Antworten
  • DNAT
  • Proxy
  • HTTP
  • Application

Frage 29

Frage
Which types of items can be stored in a cloud key vault?
Antworten
  • Windows admin passwords
  • PKI certificates
  • Linux root passwords
  • Encryption keys

Frage 30

Frage
What is the purpose of the STAR registry?
Antworten
  • Storage of custom application container images
  • Assurance of cloud provider security accreditations
  • Cloud provider SLA listing
  • Centralized cloud-based IAM

Frage 31

Frage
What is used to determine the order in which cloud security group rules are processed?
Antworten
  • IP address
  • Priority value
  • UDP port number
  • TCP port number

Frage 32

Frage
Which cloud computing characteristic refers to paying for services used?
Antworten
  • Pooled resources
  • Metered usage
  • Broad network access
  • Rapid elasticity

Frage 33

Frage
What is the benefit of VNet peering?
Antworten
  • Enhanced security
  • VM connectivity using private IPs
  • Regulatory compliance
  • More bandwidth

Frage 34

Frage
Which statement best describes encrypting stored data?
Antworten
  • Protecting data in process
  • Protecting data at rest
  • Protecting data in archives
  • Protecting data in transit

Frage 35

Frage
Which type of cloud is owned and used by a single organization?
Antworten
  • Private
  • Public
  • Community
  • Hybrid

Frage 36

Frage
Which term is the most closely associated with autoscaling?
Antworten
  • Horizontal scaling
  • Template
  • Automation
  • Vertical scaling

Frage 37

Frage
Which port is used to remotely manage Windows hosts?
Antworten
  • 80
  • 22
  • 3389
  • 443

Frage 38

Frage
What is the most common consequence of SLA uptime requirements violations?
Antworten
  • Service credits
  • Free unlimited service usage
  • Lawsuit
  • Damages awarded

Frage 39

Frage
You want all outbound subnet traffic to first be sent to a firewall appliance for inspection. Which IP address should you specify for the firewall?
Antworten
  • 127.0.0.0/0
  • Firewall public IP
  • Firewall private IP
  • 0.0.0.0/0

Frage 40

Frage
You are configuring a DNAT rule in Azure Firewall to allow incoming SSH management of Linux VMs. Which IP addresses should you specify in the DNAT rule?
Antworten
  • Firewall private IP
  • VM private IP
  • Firewall public IP
  • VM public IP

Frage 41

Frage
What is contained within a cloud-based virtual network?
Antworten
  • Network security groups
  • Subnets
  • Resource groups
  • Route tables

Frage 42

Frage
You have manually deployed a cloud-based Linux virtual machine. Which type of cloud service model is this?
Antworten
  • IaaS
  • SaaS
  • PaaS
  • SECaaS

Frage 43

Frage
Which network security protocol is normally used to enable HTTPS for websites?
Antworten
  • SSL
  • IPsec
  • TLS
  • VPN

Frage 44

Frage
Which authentication methods can be used with Windows IPsec?
Antworten
  • Device name
  • Kerberos
  • Certificate
  • User name

Frage 45

Frage
You need to view all user certificates for a Windows user on her Windows 10 laptop. What should you do?
Antworten
  • View the properties of the user account in Active Directory
  • Use the manage-bde command
  • Use MMC with the certificates snapin
  • Use MMC with the disk management snapin

Frage 46

Frage
Which command line tool can be used to manage BitLocker?
Antworten
  • certutil
  • cipher
  • manage-bde
  • openssl

Frage 47

Frage
Which block cipher mode of operation makes a block cipher a stream cipher?
Antworten
  • OFB
  • ECB
  • CBC
  • GCM

Frage 48

Frage
How does hashing differ from encryption?
Antworten
  • It is reversible
  • A key is used
  • It is not reversible
  • No keys are used

Frage 49

Frage
What must be done when issuing certificates from a private CA to ensure certificates will work correctly in an organization?
Antworten
  • Enable certificate pinning on all devices
  • Join all devices to an Active Directory domain
  • Add each issued certificate to all devices
  • Add the private CA trusted root certificate to all devices

Frage 50

Frage
Which PKI items issue certificates?
Antworten
  • Subordinate CA
  • Certificate revocation list
  • Certificate template
  • Root CA

Frage 51

Frage
Which cryptographic solution is a network appliance that can perform cryptographic operations?
Antworten
  • HSM
  • TPM
  • BitLocker
  • EFS

Frage 52

Frage
Which command line tool is used to manage EFS file encryption?
Antworten
  • cipher
  • Get-FileHash
  • certutil
  • openssl

Frage 53

Frage
Which PowerShell cmdlet generates a file hash?
Antworten
  • Set-Hash
  • Get-FileHash
  • Generate-FileHash
  • New-FileHash

Frage 54

Frage
Which mechanism controls who can retrieve certificates from an Azure Key Vault?
Antworten
  • Firewall ACL
  • Azure resource group RBAC roles
  • Azure AD conditional access policies
  • Vault access policy

Frage 55

Frage
What type of PKI certificate can be used for DNS subdomains that fall under a parent domain?
Antworten
  • Code signing
  • Wildcard
  • Extended validation
  • User

Frage 56

Frage
You have configured and enabled a custom certificate template for your Windows certification authority, yet users are unable to use the template to acquire a PKI certificate. What is the most likely cause of the problem?
Antworten
  • The template must be imported to Active Directory
  • Users are not logged into their station with elevated permissions
  • Users do not have the “Enroll” permission for the template
  • The template must first be exported

Frage 57

Frage
With asymmetric cryptography, which key is used to encrypt?
Antworten
  • Public
  • Secret
  • Private
  • Pre-shared

Frage 58

Frage
Which type of storage area network solution uses standard network equipment and the TCP/IP protocol suite?
Antworten
  • Cluster shared storage
  • FC SAN
  • NAS
  • iSCSI

Frage 59

Frage
You need to configure ten workgroup Windows servers with the same Windows Defender firewall settings. You must achieve this with the least amount of administrative effort. What should you do?
Antworten
  • Create the same firewall rules on each host manually
  • Configure firewall settings in the domain Group Policy Object (GPO)
  • Mirror the servers together then create the firewall rules
  • Create the firewall rules on one host, export the configuration and import on other servers

Frage 60

Frage
Which RAID level is disk mirroring?
Antworten
  • RAID 5
  • RAID 1
  • RAID 6
  • RAID 0

Frage 61

Frage
What makes a reverse proxy different from network address translation (NAT)?
Antworten
  • Reverse proxying and NAT are exactly the same
  • NAT applies to OSI layer 7
  • Reverse proxying applies to OSI layer 7
  • Reverse proxying applies to OSI layer 4

Frage 62

Frage
You are configuring VPN client certificate authentication in the Microsoft Azure cloud. What must be provided for the Azure virtual network gateway?
Antworten
  • Root certificate public key
  • User certificate private key
  • User VPN password
  • User VPN device MAC address

Frage 63

Frage
Which Linux command can be used to create a mirrored disk volume?
Antworten
  • mdadm
  • grep
  • fdisk
  • ifconfig

Frage 64

Frage
How do jump boxes protect servers?
Antworten
  • Servers do not have to be directly exposed to the Internet
  • Server file systems are encrypted
  • Server file systems are hashed
  • Servers have DLP policies applied

Frage 65

Frage
Which type of firewall is considered firewall-friendly?
Antworten
  • NAT
  • L2TP/IPsec
  • PPTP
  • SSL/TLS

Frage 66

Frage
Which type of Azure Firewall rule allows standard packet filtering rules?
Antworten
  • DNAT rules
  • Application rules
  • Network rules
  • Application rules_

Frage 67

Frage
Which solution can ensure users accept the terms of use before allowing Internet access?
Antworten
  • Captive portal
  • MAC address filtering
  • Enable WPA3
  • Disable SSID broadcasting

Frage 68

Frage
How do reverse shells defeat most firewall rules?
Antworten
  • Attacker connectivity is done through the Tor network
  • Connections are initiated from the compromised host
  • Firewalls are compromised and rules are disabled
  • Connections are initiated from the attacker machine

Frage 69

Frage
Which type of security is the result of enabling DNSSEC?
Antworten
  • Integrity
  • Confidentiality
  • Compliance
  • Availability

Frage 70

Frage
What is used to group disk devices together in the Windows Server operating system?
Antworten
  • GRP
  • RAID 1
  • Storage pool
  • MBR

Frage 71

Frage
Which standard is used for network access control?
Antworten
  • 802.15
  • 802.1x
  • 802.3
  • 802.11x

Frage 72

Frage
Which attributes are used to determine file system permissions when using Windows Dynamic Access Control?
Antworten
  • Active directory users only
  • File objects and directory objects only
  • Active directory users and devices only
  • Active directory users, devices, and file system objects

Frage 73

Frage
Which Microsoft Azure configuration checks where users are authenticated from?
Antworten
  • Conditional Access policy
  • Azure policy
  • MFA
  • RBAC

Frage 74

Frage
How are HMAC-based one-time passwords encrypted?
Antworten
  • Using a PKI certificate
  • Using a symmetric key
  • Using a public key
  • Using a private key

Frage 75

Frage
Which port does RADIUS authentication use by default?
Antworten
  • 1812
  • 4532
  • 3389
  • 636

Frage 76

Frage
Which tool can be used to discover RDP hosts on a network?
Antworten
  • netstat
  • nmap
  • nc
  • john

Frage 77

Frage
Which methods are not available when configuring Google 2-Step Verification?
Antworten
  • Voice calls
  • Conditional access policies
  • Text messages
  • Security keys

Frage 78

Frage
Which command can be used to manually refresh Group Policy on a Windows host?
Antworten
  • certutil
  • mmc
  • cipher
  • gpupdate

Frage 79

Frage
You need to ensure Microsoft Azure cloud technicians can administer virtual machines in a specific resource group. What should you do?
Antworten
  • Assign the Virtual Machine Contributor role to specific virtual machines
  • Assign the Virtual Machine Contributor role to the Azure subscription
  • Assign the Owner role to the resource group
  • Assign the Virtual Machine Contributor role to the resource group

Frage 80

Frage
You need to view passwords cracked by the “John the Ripper” tool. Which command should you issue?
Antworten
  • john --viewer
  • john --show
  • john --passshow
  • john --crack

Frage 81

Frage
Which term describes sensitive medical information?
Antworten
  • SPI
  • PHI
  • PII
  • GDPR

Frage 82

Frage
Where does Amazon Macie discover data?
Antworten
  • Web searches
  • Big data analytics
  • SQL databases
  • S3 buckets

Frage 83

Frage
Which IT management item contains standardized configurations to ensure security and consistency?
Antworten
  • GDPR
  • CI
  • ITIL
  • CMDB

Frage 84

Frage
Which term is synonymous with wiping a hard disk?
Antworten
  • Partitioning
  • Scrubbing
  • Formatting
  • Deleting

Frage 85

Frage
Who determines how data will be managed?
Antworten
  • Chief information officer
  • Data protection officer
  • Data custodian
  • Data owner

Frage 86

Frage
Which data privacy standard governs how EU citizen data is handled?
Antworten
  • PCI DSS
  • GDPR
  • COPPA
  • HIPAA

Frage 87

Frage
What is the maximum number of tags that can be added to a single Azure resource?
Antworten
  • 25
  • 50
  • 5
  • 10

Frage 88

Frage
You need to apply data labels to files on a Windows server. What should you use?
Antworten
  • Microsoft File Server Resource Manager
  • Azure Backup
  • Azure Information Protection
  • Microsoft Internet Information Services

Frage 89

Frage
Which type of business agreement focuses on a service provider guaranteeing a level of service to a consumer?
Antworten
  • SLA
  • MOU
  • MOA
  • NDA

Frage 90

Frage
You have created Azure data classification labels for use with Azure Information Protection. What must you create next to use the labels?
Antworten
  • Azure App Service
  • AIP policy
  • Azure storage account
  • RBAC assignment

Frage 91

Frage
What should be done to harden IoT devices that cannot be patched?
Antworten
  • Place on an isolated network
  • Issue a PKI certificate
  • Apply group policy
  • Change the default settings

Frage 92

Frage
You have just registered a smartphone with an MDM tool. What is the next thing that will happen on the smartphone?
Antworten
  • Complex passwords will be enabled
  • Process inventory
  • The authentication PIN will be reset
  • The camera will be disabled

Frage 93

Frage
You are searching for vulnerable RDP hosts using the shodan.io site. Which port should you search for?
Antworten
  • 25
  • 3389
  • 389
  • 22

Frage 94

Frage
You need Internet access for your laptop in a remote area where wired and wireless Internet are unavailable. You have a cell phone with data enabled. What should you enable to provide Internet access for your laptop?
Antworten
  • Biometric authentication
  • Jailbreaking
  • Tethering
  • Debug bridge

Frage 95

Frage
A smartphone technician requires full access to solve problems on a user smartphone. The phone is registered with an MDM solution that restricts smartphone access. What should the technician do?
Antworten
  • Unregister the smartphone device from the MDM tool
  • Request a security code to temporarily disable the MDM security policy on the MDM server
  • Request a security code to temporarily disable the MDM security policy on the smartphone
  • Perform a factory reset of the smartphone

Frage 96

Frage
You need to ensure that lost or stolen phones can be located. What should you enable?
Antworten
  • Google Play Protect
  • Rooting
  • Facial recognition
  • Find My Mobile

Frage 97

Frage
Which software development methodology is linear and depends on previous project phase deliverables?
Antworten
  • Diamond
  • Agile
  • Waterfall
  • NIST

Frage 98

Frage
What is used to ensure blockchain integrity?
Antworten
  • Hash of previous block for each new transaction
  • Hash of next block for each new transaction
  • Digital signature of next block for each new transaction
  • Digital signature of previous block for each new transaction

Frage 99

Frage
Which OWASP ZAP feature can send unanticipated data to a web app to observe its behaviour?
Antworten
  • Reporting
  • Zapping
  • Fuzzing
  • Proxying

Frage 100

Frage
Which type of testing occurs while software is running?
Antworten
  • Regression
  • Unit
  • Static
  • Dynamic

Frage 101

Frage
Which type of artificial intelligence uses neural networks?
Antworten
  • Machine learning
  • Big data analytics
  • Deep web
  • Deep learning

Frage 102

Frage
Which type of web application attack is most likely to result from improper input validation?Which type of web application attack is most likely to result from improper input validation?
Antworten
  • ARP cache poisoning
  • Directory traversal
  • DDoS
  • Cross-site scripting

Frage 103

Frage
What provides real-time monitoring to ensure safety when hardware malfunctions in an industrial computing environment?
Antworten
  • SIS
  • ICS
  • SCADA
  • DNP3

Frage 104

Frage
Which industrial computing protocol is commonly used for public utility networks, such as water and electricity?
Antworten
  • Modbus
  • ICS
  • DNP3
  • CIP

Frage 105

Frage
Which industrial control attack fed false readings for centrifuges to monitoring stations?
Antworten
  • Code Red
  • Slammer
  • StuxNet
  • Michelangelo

Frage 106

Frage
What term is used for an industry-specific specialized computer?
Antworten
  • PLC
  • Modbus
  • SCADA
  • RTU

Frage 107

Frage
Which Linux command is used to compile binaries from source code?
Antworten
  • make
  • grep
  • chmod
  • sudo

Frage 108

Frage
Which Metasploit command allows querying?
Antworten
  • searchsploit
  • find
  • updatedb
  • search

Frage 109

Frage
Which type of tool is nmap?
Antworten
  • Penetration testing
  • Network scanner
  • Patch management
  • Vulnerability assessment

Frage 110

Frage
What is the default file format for Wireshark packet capture files?
Antworten
  • PCAP
  • HTML
  • XML
  • PDF

Frage 111

Frage
What is the name of the Amazon Web Services centralized monitoring service?
Antworten
  • S3
  • CloudWatch
  • CloudTrail
  • EC2

Frage 112

Frage
Which Snort command line parameter can be used to test the Snort configuration?
Antworten
  • -S
  • -T
  • -A
  • -U

Frage 113

Frage
Which port is used for Linux syslog forwarding by default?
Antworten
  • 389
  • 445
  • 514
  • 25

Frage 114

Frage
What is the purpose of a honeypot?
Antworten
  • To gather statistics on packets in and out
  • To track C&C servers
  • To gather forensic evidence used to convict offenders
  • To track malicious user activity

Frage 115

Frage
Which tcpdump command line parameter saves captured packets to a file?
Antworten
  • -w
  • -W
  • -P
  • -s

Frage 116

Frage
You are writing a shell script to monitor Linux hosts. You need to use pattern matching to look for host names in specific cost centers using the format COSTCENTER3DIGITCODE-CITY. What should you do?
Antworten
  • Enable Windows event viewer subscriptions
  • Add regular expressions to your script
  • Clear all Linux log filters
  • Enable Linux syslog forwarding

Frage 117

Frage
You have become overwhelmed with the amount of log entries on your Windows servers. You would like a convenient way to view only critical and error log events. What should you do?
Antworten
  • Create a custom view that filters for critical and error events
  • Filter each log for critical and error events
  • Forward the logs to a SIEM system
  • Export each log and filter the exported results

Frage 118

Frage
You are planning the use of a SOAR system for incident response. Which item allows you to automate incident response?
Antworten
  • Runbook
  • Heap overflow
  • IDS
  • SIEM

Frage 119

Frage
What is the default location and name of the Snort configuration file?
Antworten
  • /usr/share/snort.conf
  • /usr/share/snort.config
  • /etc/snort/snort.conf
  • /etc/snort/snort.config

Frage 120

Frage
You need to filter captured Wireshark traffic so that only secured website traffic is shown. What should you filter on?
Antworten
  • L2TP
  • IPsec
  • HTTPS
  • SSH

Frage 121

Frage
What is a zombie?
Antworten
  • A proxy anonymization network
  • An infected computer under malicious user control
  • A server that provides infected hosts with instructions
  • A nonresponsive computer

Frage 122

Frage
What is the most effective way to mitigate compromises due to users clicking on links?
Antworten
  • Stateful firewall rules
  • Antivirus scanners
  • Spam filtering
  • User training and awareness

Frage 123

Frage
Your manager asks you to assess host vulnerabilities exposed to internal employees. What should you do?
Antworten
  • Use Nmap against hosts
  • Run a pen test against hosts
  • Run a non-credentialed vulnerability scan
  • Run a credentialed vulnerability scan

Frage 124

Frage
Why should C programmers stay away from the gets() function?
Antworten
  • It does not do array boundary checking
  • It does not support strings
  • It allows malicious code to be stored in a variable
  • It is not object oriented

Frage 125

Frage
Which type of testing uses red and blue teams?
Antworten
  • Vulnerability
  • Regression
  • Penetration
  • Unit

Frage 126

Frage
Which command allows you to interact with the Metasploit Framework in Kali Linux?
Antworten
  • msfadmin
  • msfconsole
  • ntp
  • searchsploit

Frage 127

Frage
Which solutions prevent stolen laptops from being compromised?
Antworten
  • Patch management
  • Biometric authentication
  • Disk encryption
  • Power-on password

Frage 128

Frage
You are using various Wi-Fi reconnaissance tools and see references to a BSSID. What is this?
Antworten
  • The name of a connecting wireless client device
  • The name of the wireless network
  • The MAC address of a wireless access point
  • The MAC address of a wireless client device

Frage 129

Frage
In which attack phase would a malicious user use the Nmap tool?
Antworten
  • Persist
  • Clear tracks
  • Reconnaissance
  • Enumerate

Frage 130

Frage
What do malicious users use to target many victims in an attempt to trick them into clicking a link to a fraudulent site?
Antworten
  • Spim
  • DDoS
  • Phishing campaign
  • Spam

Frage 131

Frage
Which type of network attack allows attacker access to VLAN traffic?
Antworten
  • Cross-site request forgery
  • VLAN trunking
  • DDoS
  • VLAN hopping

Frage 132

Frage
What is one possible way to detect that steganography is being used with a file?
Antworten
  • Compression
  • Digital signature
  • Hashing
  • Encryption

Frage 133

Frage
You have acquired a forensic image and hash. You must now analyze the storage media contents. What should you do?
Antworten
  • Mount the forensic copy, perform the analysis
  • Mount the forensic copy, create an image
  • Mount the original media, perform the analysis
  • Mount the original media, place in a Faraday bag

Frage 134

Frage
You need to acquire a disk image in Linux that can be read by FTK imager. Which Linux command should you use?
Antworten
  • grep
  • chmod
  • ldd
  • dd

Frage 135

Frage
You need to acquire evidence according to the order of volatility. In which order will you do this?
Antworten
  • Swap file, RAM, hard disk
  • Hard disk, swap file, RAM
  • RAM, swap file, hard disk
  • RAM, CPU, hard disk

Frage 136

Frage
How is developer mode enabled on an Android device?
Antworten
  • Install the Android Debug Bridge app
  • Plug a USB cable into the device
  • Gain root access to the device
  • Tap the software build number seven times

Frage 137

Frage
Which component prevents writing to origin storage devices when acquiring storage device images?
Antworten
  • Switch port lock
  • HSM
  • TPM
  • Write-blocker

Frage 138

Frage
What benefits are derived from load balancing?
Antworten
  • Higher application availability
  • Improved application performance
  • Encryption of data at rest
  • Encrypted network transmissions

Frage 139

Frage
Which type of plan is enacted during a security event?
Antworten
  • Incident response
  • Business continuity
  • Disaster recovery
  • Evacuation

Frage 140

Frage
Which IP address do clients connect to for a load balanced application?
Antworten
  • Forward proxy server
  • Reverse proxy server
  • Load balancer
  • Back-end virtual machine

Frage 141

Frage
What is required in Microsoft Azure to perform backups to the cloud?
Antworten
  • Eventbus hub
  • Recovery vault
  • Storage account
  • Key vault

Frage 142

Frage
Which RAID level creates a copy of all data written to a primary disk?
Antworten
  • 1
  • 6
  • 3
  • 5
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt