Question 1

The Chief Financial Officer (CFO) of an insurance company received an email from Ann, the company’s Chief Executive Officer (CEO), requesting a transfer of $10,000 to an account. The email states Ann is on vacation and has lost her purse, containing cash and credit cards. Which of the following social-engineering techniques is the attacker using?

Question 2

What threat hunting concept involves thinking like a malicious actor to help recognize indicators of compromise that might otherwise be covered ?

Question 3

Why is improper error handling for web applications that lead to displaying error messages considered a vulnerability that should be repaired?

Question 4

In trying to observe hacker techniques, a security administrator configures a nonproduction network to be applied as a target so that she can covertly monitor network attacks. What is this type of network named?

Question 5

What type of attack includes adding an expression or phrase such as adding “SAFE” to mail headers?

Question 6

Which of the following connection methods only works via a line-of-sight connection?

Question 7

You’re trying to increase security at your company. You are currently creating an outline of all the aspects of security that will need to be examined and acted on. Which of the following terms describes the process of improving security in a trusted OS?

Question 8

Frank has obtained over 20 hard drives as part of a forensic investigation. What main step is important to make sure that each drive is tracked and managed properly over time?

Question 9

During a conference, you show management a list of access controls used on your network. What control listed below is an example of a corrective control?

Question 10

A security administrator needs to implement a system that detects possible intrusions based upon a vendor provided list.Which of the following BEST describes this type of IDS?

Question 11

Which of the following can affect electrostatic discharge in a network operations center?

Question 12

A security administrator returning from a short vacation receives an account lock-out message when attempting to log into the computer. After getting the account unlocked the security administrator immediately notices a large amount of emails alerts pertaining to several different user accounts being locked out during the past three days. The security administrator uses system logs to determine that the lock-outs were due to a brute force attack on all accounts that has been previously logged into that machine.Which of the following can be implemented to reduce the likelihood of this attack going undetected?

Question 13

Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host?

Question 14

Which of the following could a security administrator implement to mitigate the risk of tailgating for a large organization?

Question 15

Users at a company report that a popular news website keeps taking them to a web page with derogatory content.Which of the following is this an example of?

Question 16

Elastic cloud computing environments often reuse the same physical hardware for multiple customers over time as virtual machines are instantiated and deleted.This has important implications for which of the following data security concerns?

Question 17

The system administrator notices that their application is no longer able to keep up with the large amounts of traffic their server is receiving daily. Several packets are dropped and sometimes the server is taken offline. Which of the following would be a possible solution to look into to ensure their application remains secure and available?

Question 18

A security administrator has been tasked to ensure access to all network equipment is controlled by a central server such as TACACS+.Which of the following risk mitigation strategies supports this type of implementation?

Question 19

Pete, the system administrator, has concerns regarding users losing their company provided smartphones. Petes focus is on equipment recovery. Which of the following BEST addresses his concerns?

Question 20

A technician has implemented a system in which all workstations on the network will receive security updates on the same schedule. Which of the following concepts does this illustrate?

Question 1

The Chief Financial Officer (CFO) of an insurance company received an email from Ann, the company’s Chief Executive Officer (CEO), requesting a transfer of $10,000 to an account. The email states Ann is on vacation and has lost her purse, containing cash and credit cards. Which of the following social-engineering techniques is the attacker using?

1 / 20

  • Course Set 1