Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Brendan wants to implement a hardware based RAID system in his network. He is thinking of choosing a suitable RAM type for the architectural setup in the system. The type he is interested in provides access times of

up to 20 ns. Which type of RAM will he select for his RAID system?

A.

NVRAM

B.

SDRAM

C.

NAND flash memory

D.

SRAM

Full Access
Question # 5

Rosa is working as a network defender at Linda Systems. Recently, the company migrated from Windows to MacOS. Rosa wants to view the security related logs of her system, where con she find these logs?

A.

/private/var/log

B.

/var/log/cups/access-log

C.

/Library/Logs/Sync

D.

/Library/Logs

Full Access
Question # 6

A stateful multilayer inspection firewall combines the aspects of Application level gateway, Circuit level gateway and Packet filtering firewall. On which layers of the OSI model, does the Stateful

multilayer inspection firewall works?

A.

Network, Session & Application

B.

Physical & application

C.

Session & network

D.

Physical, session & application

Full Access
Question # 7

Which of the following is a data destruction technique that protects the sensitivity of information against a laboratory attack where an unauthorized individual uses signal processing recovery tools in a laboratory environment to recover the information?

A.

Purging

B.

Destroying

C.

Clearing

D.

Disposal

Full Access
Question # 8

The company has implemented a backup plan. James is working as a network administrator for the company and is taking full backups of the data every time a backup is initiated. Alex who is a senior security manager

talks to him about using a differential backup instead and asks him to implement this once a full backup of the data is completed. What is/are the reason(s) Alex is suggesting that James use a differential backup?

(Select all that apply)

A.

Less storage space is required

B.

Father restoration

C.

Slower than a full backup

D.

Faster than a full backup

E.

Less expensive than full backup

Full Access
Question # 9

According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows

Authentication. What needs to happen to force this server to use Windows Authentication?

A.

Edit the ADLIN file.

B.

Edit the shadow file.

C.

Remove the /var/bin/localauth.conf file.

D.

Edit the PAM file to enforce Windows Authentication

Full Access
Question # 10

Which technique is used in RAID level 0 where the data is split into blocks and written evenly across multiple disks?

A.

Disk mirroring

B.

Disk stripping

C.

Data splitting

D.

Disk partition

Full Access
Question # 11

Which type of antenna is based on the principle of a satellite dish and can pick up Wi-Fi signals from a distance of ten miles of more?

A.

Yagi antenna

B.

Directional antenna

C.

Omnidirectional antenna

D.

Parabolic Grid antenna

Full Access
Question # 12

Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal

advice to defend them against this allegation.

A.

Evidence Manager

B.

Incident Handler

C.

Attorney

D.

PR Specialist

Full Access
Question # 13

Which encryption algorithm h used by WPA5 encryption?

A.

RC4.TKIP

B.

RC4

C.

AES-GCMP 256

D.

AES-CCMP

Full Access
Question # 14

Identity the correct order for a successful black hat operation.

A.

Reconnaissance. Scanning, Gaining Access. Maintaining Access, and Covering Tracks

B.

Scanning, Reconnaissance, Gaining Access. Maintaining Access and Covering Tracks

C.

Reconnaissance. Gaming Access, Scanning. Maintaining Access, and Covering Tracks

D.

Reconnaissance, Scanning, Gaining Access, Covering Tracks, and Maintaining Access

Full Access
Question # 15

You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region. You suspect a DoS incident on the network. What will be your

first reaction as a first responder?

A.

Avoid Fear, Uncertainty and Doubt

B.

Communicate the incident

C.

Make an initial assessment

D.

Disable Virus Protection

Full Access
Question # 16

What is composite signature-based analysis?

A.

Multiple packet analysis is required to detect attack signatures

B.

Attack signatures are contained in packet headers

C.

Attack signatures are contained in packet payloads

D.

Single Packet analysis is enough to identify attack signatures

Full Access
Question # 17

George was conducting a recovery drill test as a part of his network operation. Recovery drill tests are conducted on the______________.

A.

Archived data

B.

Deleted data

C.

Data in transit

D.

Backup data

Full Access
Question # 18

On which of the following OSI layers does the Pretty Good Privacy (PGP) work?

A.

Application

B.

Data Link

C.

Network

D.

Transport

Full Access
Question # 19

Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the

network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this

type of server called?

A.

Bastion host

B.

Edge transport server

C.

SOCKS hsot

D.

Session layer firewall

Full Access
Question # 20

Which command list all ports available on a server?

A.

sudo apt netstate -Is tunlp

B.

sudo ntstat -Is tunlp

C.

sudo apt nst -tunlp

D.

sudo netstat -tunlp

Full Access
Question # 21

You are tasked to perform black hat vulnerability assessment for a client. You received official written permission to work with: company site, forum, Linux server with LAMP, where this site is hosted.

Which vulnerability assessment tool should you consider using?

A.

OpenVAS

B.

hping

C.

wireshark

D.

dnsbrute

Full Access
Question # 22

Which of the following connects the SDN application layer and SDN controller and allows communication between the network services and business applications?

A.

Eastbound API

B.

Westbound API

C.

Northbound API

D.

Southbound API

Full Access
Question # 23

Which of the following is an example of Indicators of Attack?

A.

Malware

B.

Signatures

C.

Exploits

D.

Remote code execution

Full Access
Question # 24

Which of the following attack signature analysis techniques are implemented to examine the header information and conclude that a packet has been altered?

A.

Context-based signature analysis

B.

Content-based signature analysis

C.

Atomic signature-based analysis

D.

Composite signature-based analysis

Full Access
Question # 25

Which RAID level system provides very good data performance but does not offer fault tolerance and data redundancy?

A.

PAID level 3

B.

RAID level 5

C.

RAID level 1

D.

RAID level 0

Full Access
Question # 26

Identify the minimum number of drives required to setup RAID level 5.

A.

Multiple

B.

3

C.

4

D.

2

Full Access
Question # 27

John is the Vice-President of a BPO. He wants to implement a policy allowing employees to use and manage devices purchased by the organization but restrict the use of the device for business use only. Which among the following policies does John want to implement?

A.

COBO policy

B.

CYOD policy

C.

BYOD policy

D.

COPE policy

Full Access
Question # 28

Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know

of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out

SYN packets to an IP range. A number of IPs responds with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her

intrusion detection system will log the traffic. What type of scan is Cindy attempting here?

A.

The type of scan she is usinq is called a NULL scan.

B.

Cindy is using a half-open scan to find live hosts on her network.

C.

Cindy is attempting to find live hosts on her company's network by using a XMAS scan.

D.

She is utilizing a RST scan to find live hosts that are listening on her network.

Full Access
Question # 29

A local bank wants to protect their cardholder data. Which standard should the bark comply with in order to ensure security of this data?

A.

GDPR

B.

HIPAA

C.

SOX

D.

PCI DSS

Full Access
Question # 30

A company has the right to monitor the activities of their employees on different information systems according to the _______policy.

A.

Information system

B.

User access control

C.

Internet usage

D.

Confidential data

Full Access
Question # 31

The mechanism works on the basis of a client-server model.

A.

Network-based

B.

Pull-based

C.

Push-based

D.

Host-based

Full Access
Question # 32

Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control

measures for their files and folders. Which access control did Ross implement?

A.

Discretionary access control

B.

Mandatory access control

C.

Non-discretionary access control

D.

Role-based access control

Full Access
Question # 33

The network admin decides to assign a class B IP address to a host in the network. Identify which of the following addresses fall within a class B IP address range.

A.

255.255.255.0

B.

18.12.4.1

C.

172.168.12.4

D.

169.254.254.254

Full Access
Question # 34

Which of the following entities is responsible for cloud security?

A.

Cloud provider

B.

Cloud consumer

C.

Cloud broker

D.

Both cloud consumer and provider

Full Access
Question # 35

Alex is administrating the firewall in the organization's network. What command will he use to check the ports applications open?

A.

Netstat -an

B.

Netstat -o

C.

Netstat -a

D.

Netstat -ao

Full Access
Question # 36

How is an “attack” represented?

A.

Motive (goal) + method

B.

Motive (goal) + method + vulnerability

C.

Asset + Threat + Vulnerability

D.

Asset + Threat

Full Access
Question # 37

Choose the correct order of steps to analyze the attack surface.

A.

Identify the indicators of exposure->visualize the attack surface->simulate the attack->reduce the attack surface

B.

Visualize the attack surface->simulate the attack->identify the indicators of exposure->reduce the attack surface

C.

Identify the indicators of exposure->simulate the attack->visualize the attack surface->reduce the attack surface

D.

Visualize the attack surface->identify the indicators of exposure->simulate the attack->reduce the attack surface

Full Access
Question # 38

The GMT enterprise is working on their internet and web usage policies. GMT would like to control

internet bandwidth consumption by employees. Which group of policies would this belong to?

A.

Enterprise Information Security Policy

B.

System Specific Security Policy

C.

Network Services Specific Security Policy

D.

Issue Specific Security Policy

Full Access
Question # 39

An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both

detect and stop malicious traffic?

A.

promiscuous mode

B.

passive mode

C.

firewall mode

D.

inline mode

Full Access
Question # 40

What should a network administrator perform to execute/test the untrusted or untested programs or code from untrusted or unverified third-parties without risking the host system or OS?

A.

Application Whitelisting

B.

Application Blacklisting

C.

Deployment of WAFs

D.

Application Sandboxing

Full Access
Question # 41

Who acts as an intermediary to provide connectivity and transport services between cloud consumers and providers?

A.

Cloud Auditor

B.

Cloud Broker

C.

Cloud Carrier

D.

Cloud Consultant

Full Access
Question # 42

Ryan is a network security administrator, who wants to implement local security policies for privileges granted to users and groups, system security audit settings, user authentication, and want to

send security audit messages to the Event Log. Which Windows security component fulfills Ryan’s requirement?

A.

Security Reference Monitor (SRM)

B.

The Security Account Manager (SAM)

C.

The Local Security Authority Subsystem (LSASS)

D.

WinLogon and NetLogon

Full Access
Question # 43

Which of the following indicators refers to potential risk exposures that attackers can use to breach the security of an organization?

A.

Indicators of attack

B.

Key risk indicators

C.

Indicators of exposure

D.

Indicators of compromise

Full Access
Question # 44

You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from certain region. You suspect a DoS incident on the network.

What will be your first reaction as a first responder?

A.

Disable Virus Protection

B.

Make an initial assessment

C.

Communicate the incident

D.

Avoid Fear, Uncertainty and Doubt

Full Access
Question # 45

USB ports enabled on a laptop is an example of____

A.

System Attack Surface

B.

Network Attack Surface

C.

Physical Attack Surface

D.

Software attack Surface

Full Access
Question # 46

Identify the firewall technology that monitors the TCP handshake between the packets to determine whether a requested session is legitimate.

A.

Packet Filtering Firewall

B.

Stateful Multilayer Inspection

C.

Circuit Level Gateway

D.

Network Address Translation

Full Access
Question # 47

Which of the following wireless encryption provides enhanced password protection, secured IoT connections, and encompasses stronger encryption techniques?

A.

WEP

B.

WPA

C.

WPA2

D.

WPA3

Full Access
Question # 48

If a network is at risk from unskilled individuals, what type of threat is this?

A.

External Threats

B.

Structured Threats

C.

Unstructured Threats

D.

Internal Threats

Full Access
Question # 49

Which RAID level does not provide data redundancy?

A.

RAID level 0

B.

RAID level 1

C.

RAID level 50

D.

RAID level 10

Full Access
Question # 50

In MacOS, how can the user implement disk encryption?

A.

By enabling BitLocker feature

B.

By executing dm-crypt command

C.

By turning on Device Encryption feature

D.

By enabling FileVault feature

Full Access
Question # 51

Which of the following data security technology can ensure information protection by obscuring specific areas of information?

A.

Data encryption

B.

Data hashing

C.

Data masking

D.

Data retention

Full Access
Question # 52

Steven is a Linux system administrator at an IT company. He wants to disable unnecessary services in the system, which can be exploited by the attackers. Which among the following is the correct syntax for

disabling a service?

A.

$ sudo system-ctl disable [service]

B.

$ sudo systemctl disable [service]

C.

$ sudo system.ctl disable [service]

D.

$ sudo system ctl disable [service]

Full Access
Question # 53

An attacker has access to password hashes of a Windows 7 computer. Which of the following attacks can the attacker use to reveal the passwords?

A.

Brute force

B.

XSS

C.

Dictionary attacks

D.

Rainbow table

Full Access
Question # 54

-----------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

A.

802.15.4

B.

802.15

C.

802.12

D.

802.16

Full Access
Question # 55

Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized

traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching

through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts

administrators when a critical file is altered. What tool could Simon and his administrators implement to accomplish this?

A.

Snort is the best tool for their situation

B.

They can implement Wireshark

C.

They could use Tripwire

D.

They need to use Nessus

Full Access
Question # 56

Your company is planning to use an uninterruptible power supply (UPS) to avoid damage from power fluctuations. As a network administrator, you need to suggest an appropriate UPS solution suitable for specific resources or conditions. Match the type of UPS with the use and advantage:

A.

1-v,2-iv,3-iii,4-i

B.

1-v,2-iii,3-i,4-ii

C.

1-iii,2-iv,3-v,4-iv

D.

1-i,2-iv,3-ii,4-v

Full Access
Question # 57

In _______ mechanism, the system or application sends log records either on the local disk or over the network.

A.

Network-based

B.

Pull-based

C.

Push-based

D.

Host-based

Full Access
Question # 58

The SNMP contains various commands that reduce the burden on the network administrators.

Which of the following commands is used by SNMP agents to notify SNMP managers about an event occurring in the network?

A.

SET

B.

TRAPS

C.

INFORM

D.

RESPONSE

Full Access
Question # 59

On which layer of the OSI model does the packet filtering firewalls work?

A.

Network Layer

B.

Application Layer

C.

Session Layer

D.

Physical Layer

Full Access
Question # 60

A network administrator is monitoring the network traffic with Wireshark. Which of the following filters will she use to view the packets moving without setting a flag to detect TCP Null Scan attempts?

A.

TCRflags==0x000

B.

Tcp.flags==0X029

C.

Tcp.dstport==7

D.

Tcp.flags==0x003

Full Access
Question # 61

Which of the following intrusion detection techniques observes the network for abnormal usage patterns by determining the performance parameters for regular activities and monitoring for actions

beyond the normal parameters?

A.

Signature/Pattern matching

B.

Stateful protocol analysis

C.

None of these

D.

Statistical anomaly detection

Full Access
Question # 62

Which of the following provides enhanced password protection, secured loT connections, and encompasses stronger encryption techniques?

A.

WPA3

B.

WEP

C.

WPA

D.

WPA2

Full Access
Question # 63

Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?

A.

Application sandboxing

B.

Deployment of WAFS

C.

Application whitelisting

D.

Application blacklisting

Full Access
Question # 64

An insider in Hexagon, a leading IT company in USA, was testing a packet crafting tool. This tool

generated a lot of malformed TCP/IP packets which crashed the main server’s operating system leading

to restricting the employees’ accesses. Which attack did the insider use in the above situation?

A.

DoS attack

B.

Session Hijacking

C.

Man-in-the-Middle

D.

Cross-Site-Scripting

Full Access
Question # 65

Which policies exist only on AWS IAM identity (user, group, or role)?

A.

Inline Policies

B.

Customer-Managed Policies

C.

Power-user AWS managed policies

D.

Full access AWS managed policie

Full Access
Question # 66

Tom works as a network administrator in a multinational organization having branches across North America and Europe. Tom wants to implement a storage technology that can provide centralized data storage and

provide free data backup on the server. He should be able to perform data backup and recovery more efficiently with the selected technology. Which of the following storage technologies best suits Tom's requirements?

A.

DAS

B.

PAS

C.

RAID

D.

NAS

Full Access
Question # 67

An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?

A.

Install a CCTV with cameras pointing to the entrance doors and the street

B.

Use fences in the entrance doors

C.

Use lights in all the entrance doors and along the company's perimeter

D.

Use an IDS in the entrance doors and install some of them near the corners

Full Access
Question # 68

Which category of suspicious traffic signatures includes SYN flood attempts?

A.

Informational

B.

Denial of Service

C.

Reconnaissance

D.

Unauthorized access

Full Access
Question # 69

Identity the method involved in purging technique of data destruction.

A.

Incineration

B.

Overwriting

C.

Degaussing

D.

Wiping

Full Access
Question # 70

Who offers formal experienced testimony in court?

A.

Incident analyzer

B.

Evidence documenter

C.

Expert witness

D.

Attorney

Full Access
Question # 71

How can organizations obtain information about threats through human intelligence?

A.

By extracting information from security blogs and forums

B.

By discovering vulnerabilities through exploration, understanding malware behavior through malware processing, etc.

C.

From the data of past incidents and network monitoring

D.

From attackers through the dark web and honeypots

Full Access
Question # 72

Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of

incident in the plan. Unsuccessful scans and probes are at what severity level?

A.

High severity level

B.

Extreme severity level

C.

Mid severity level

D.

Low severity level

Full Access
Question # 73

Which of the following filters can be used to detect UDP scan attempts using Wireshark?

A.

icmp.type==3 and icmp.code==3

B.

icmp.type==13

C.

icmp.type==8 or icmp.type==0

D.

icmp.type==15

Full Access
Question # 74

Which among the following tools can help in identifying IoEs to evaluate human attack surface?

A.

securiCAD

B.

Amass

C.

Skybox

D.

SET

Full Access
Question # 75

An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS. They are not able to

recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed?

A.

Location 2

B.

Location 3

C.

Location 4

D.

Location 1

Full Access
Question # 76

You are responsible for network functions and logical security throughout the corporation. Your company has over 250 servers running Windows Server 2012, 5000 workstations running Windows 10, and 200 mobile

users working from laptops on Windows 8. Last week 10 of your company's laptops were stolen from a salesman, while at a conference in Barcelona. These laptops contained proprietary company information. While

doing a damage assessment, a news story leaks about a blog post containing information about the stolen laptops and the sensitive information. What built-in Windows feature could you have implemented to protect the

sensitive information on these laptops?

A.

You should have used 3DES.

B.

You should have implemented the Distributed File System (DFS).

C.

If you would have implemented Pretty Good Privacy (PGP).

D.

You could have implemented the Encrypted File System (EFS)

Full Access
Question # 77

Xenon is a leading real estate firm located in Australia. Recently, the company had decided a bid

amount for a prestigious construction project and was sure of being awarded the project. Unfortunately,

the company lost the tender to one of its competitors. A few days later, while performing a network

scan, the network admin identified that somebody had captured the confidential e-mails conversions

related to the tender. Upon further investigation, the admin discovered that one of the switch ports was

left open and an employee had plugged into the network using an Ethernet cable.

Which attack did the employee perform in the above situation?

A.

Network Sniffing

B.

Password Attack

C.

Social Engineering Attack

D.

Man-in-the-Middle Attack

Full Access
Question # 78

Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and

warning signs.

A.

Administrative control

B.

Physical control

C.

Technical control

D.

Environmental control

Full Access
Question # 79

Which of the following Wireshark filters can a network administrator use to view the packets without any flags set in order to detect TCP Null Scan attempts?

A.

TCP.flags==0x000

B.

tcp.flags==0X029

C.

tcp.flags==0x003

D.

tcp.dstport==7

Full Access
Question # 80

The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and

you are now working on updating the Red Hat computers. What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all

currently installed packages?

A.

You should run the up2date -d -f -u command

B.

You should run the up2data -u command

C.

You should run the WSUS -d -f -u command.

D.

You should type the sysupdate -d command

Full Access
Question # 81

Which mobile-use approach allows an organization’s employees to use devices that they are comfortable with and best fits their preferences and work purposes?

A.

BYOD

B.

COPE

C.

COBO

D.

CYOD

Full Access
Question # 82

Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of a:

A.

Cloud to service attack surface

B.

User to service attack surface

C.

User to cloud attack surface

D.

Cloud to user attack surface

Full Access
Question # 83

Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the--------------------------authentication technique to satisfy the

management request.

A.

Two-factor Authentication

B.

Smart Card Authentication

C.

Single-sign-on

D.

Biometric

Full Access
Question # 84

How is the chip-level security of an IoT device achieved?

A.

By closing insecure network services

B.

By turning off the device when not needed or not in use

C.

By encrypting the JTAG interface

D.

By changing the password of the router

Full Access
Question # 85

Martin is a professional hacker. He is performing reconnaissance on an organization to hack a few

target systems. As a part of this method, he needs to determine what hosts are available on the

network, what services those hosts are offering, what operating systems they are running, what type of

packet filters/firewalls, etc. To obtain such information, Martin decided to use automated tools.

Which of the following tool must be employed by Martin?

A.

Burp Suite

B.

FOCA

C.

Nmap

D.

Zendio

Full Access
Question # 86

Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private. What encryption method did Ivan settle

on?

A.

Ivan settled on the private encryption method.

B.

Ivan settled on the symmetric encryption method.

C.

Ivan settled on the asymmetric encryption method

D.

Ivan settled on the hashing encryption method

Full Access
Question # 87

What is the IT security team responsible for effectively managing the security of the organization’s IT infrastructure, called?

A.

Grey Team

B.

Red Team

C.

Blue Team

D.

Yellow Team

Full Access
Question # 88

Which of the following type of UPS is used to supply power above 10kVA and provides an ideal electric output presentation, and its constant wear on the power components reduces the

dependability?

A.

Stand by On-line hybrid

B.

Line Interactive

C.

Double conversion on-line

D.

Stand by Ferro

Full Access
Question # 89

If an organization has decided to consume PaaS Cloud service model, then identify the organization's responsibility that they need to look after based on shared responsibility model.

A.

Data, interfaces, application, etc.

B.

Data, interfaces, application, middleware, OS, VM, virtual network, etc.

C.

Data, interfaces, application, middleware, OS, VM, virtual network, hypervisors, processing and memory, data storage, network interfaces, facilities and data centers, etc.

D.

Data, interfaces, etc.

Full Access
Question # 90

Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works.

The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators. Because of this, Fred's supervisor wants to implement

tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed on all computers throughout the company and

monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. What type of solution does Fred's boss want to implement?

A.

Fred's boss wants a NIDS implementation.

B.

Fred's boss wants Fred to monitor a NIPS system.

C.

Fred's boss wants to implement a HIPS solution.

D.

Fred's boss wants to implement a HIDS solution.

Full Access
Question # 91

Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?

A.

Preventative

B.

Reactive

C.

Retrospective

D.

Defense-in-depth

Full Access
Question # 92

Peter works as a network administrator at an IT company. He wants to avoid exploitation of the cloud, particularly Azure services. Which of the following is a group of PowerShell scripts designed to help the network administrator understand how attacks happen and help them protect the cloud?

A.

MicroBurst

B.

POSH -Sysmon

C.

SecurityPolicyDsc

D.

Sysmon

Full Access
Question # 93

Which of the following NIST incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?

A.

Scans/Probes/Attempted Access

B.

Malicious code

C.

Improper usage

D.

Denial-of-Service

Full Access
Question # 94

How is the chip-level security of an loT device achieved?

A.

Encrypting JTAC interface

B.

Keeping the device on a that network

C.

Closing insecure network services

D.

Changing the password of the router

Full Access
Question # 95

Harry has successfully completed the vulnerability scanning process and found serious vulnerabilities exist in the organization's network. Identify the vulnerability management phases through which he will proceed to

ensure all the detected vulnerabilities are addressed and eradicated. (Select all that apply)

A.

Mitigation

B.

Assessment

C.

Verification

D.

Remediation

Full Access
Question # 96

Which type of risk treatment process Includes not allowing the use of laptops in an organization to ensure its security?

A.

Risk avoidance

B.

Mitigate the risk

C.

Eliminate the risk

D.

Reduce the risk

Full Access
Question # 97

Identify the Password Attack Technique in which the adversary attacks cryptographic hash functions based on the probability, that if a hashing process is used for creating a key, then the same is

used for other keys?

A.

Dictionary Attack

B.

Brute Forcing Attack

C.

Hybrid Attack

D.

Birthday Attack

Full Access
Question # 98

Which of the following is NOT an AWS Shared Responsibility Model devised by AWS?

A.

Shared Responsibility Model for Container Services

B.

Shared Responsibility Model for Infrastructure Services

C.

Shared Responsibility Model for Abstract Services

D.

Shared Responsibility Model for Storage Services

Full Access
Question # 99

Under which of the following acts can an international financial institution be prosecuted if it fails to maintain the privacy of its customer’s information?

A.

GLBA

B.

FISMA

C.

DMCA

D.

SOX

Full Access
Question # 100

John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on

an interface?

A.

Router(Config-if) # IP route - cache flow

B.

Router# Netmon enable

C.

Router IP route

D.

Router# netflow enable

Full Access
Question # 101

During a security awareness program, management was explaining the various reasons which create threats to network security. Which could be a possible threat to network security?

A.

Configuring automatic OS updates

B.

Having a web server in the internal network

C.

Implementing VPN

D.

Patch management

Full Access
Question # 102

John, who works as a team lead in Zen Technologies, found that his team members were accessing social networking sites, shopping sites and watching movies during office hours. He approached the

network admin to block such websites. What kind of network security device can be used to implement John’s decision?

A.

Firewall

B.

Internet Content Filter

C.

Proxy server

D.

Network Protocol Analyzer

Full Access
Question # 103

A popular e-commerce company has recently received a lot of complaints from its customers. Most

of the complaints are about the customers being redirected to some other website when trying to

access the e-com site, leading to all their systems being compromised and corrupted. Upon

investigation, the network admin of the firm discovered that some adversary had manipulated the

company’s IP address in the domain name server’s cache. What is such an attack called?

A.

DNS Poisoning

B.

DNS Application

C.

DNS Attacked by DDoS

D.

DNS Hijacking

Full Access
Question # 104

Implementing access control mechanisms, such as a firewall, to protect the network is an example of which of the following network defense approach?

A.

Proactive approach

B.

Retrospective approach

C.

Preventive approach

D.

Reactive approach

Full Access
Question # 105

Jeanne is working as a network administrator in an IT company. She wants to control/limit container

access to CPU, memory, swap, block IO (rates), network. Which Linux kernel feature allows Jeanne to

manage, restrict, and audit groups of the process?

A.

Cgroups

B.

LSMs

C.

Seccomp

D.

Userns

Full Access
Question # 106

Which of the following refers to the clues, artifacts, or evidence that indicate a potential intrusion or malicious activity in an organization's infrastructure?

A.

Indicators of attack

B.

Indicators of compromise

C.

Key risk indicators

D.

Indicators of exposure

Full Access
Question # 107

How is a “risk” represented?

A.

Asset + threat

B.

Motive (goal) + method

C.

Asset + threat + vulnerability

D.

Motive (goal) + method + vulnerability

Full Access
Question # 108

Albert works as a Windows system administrator at an MNC. He uses PowerShell logging to identify any suspicious scripting activity across the network. He wants to record pipeline execution details as

PowerShell executes, including variable initialization and command invocations. Which PowerShell logging component records pipeline execution details as PowerShell executes?

A.

Module logging

B.

Script block logging

C.

Event logging

D.

Transcript logging

Full Access