Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following tools can help to detect suspicious or unauthorized changes to critical system configuration files?

A.

Tripwire

B.

Logstash

C.

Nessus

D.

Netcat

E.

Ifconfig

Full Access
Question # 5

Network infrastructure has been scanned and the identified issues have been remediated. What is the next step in the vulnerability assessment process?

A.

Generating reports

B.

Establishing scope

C.

Conducting an audit

D.

Assessing exposures

Full Access
Question # 6

Where are log entries written for auditd in Linux?

A.

/etc/audit/audit.rules

B.

/var/log/audit/messages

C.

/var/log/audit/audit.log

D.

/var/log/audit.log

E.

/etc/audit/audit.conf

Full Access
Question # 7

A government organization responsible for critical infrastructure is being attacked and files on the server been deleted. Which of the following are the most immediate communications that should be made regarding the incident? (Choose two.)

A.

Notifying law enforcement

B.

Notifying the media

C.

Notifying a national compute emergency response team (CERT) or cybersecurity incident response team (CSIRT)

D.

Notifying the relevant vendor

E.

Notifying a mitigation expert

Full Access
Question # 8

What are three examples of incident response? (Choose three.)

A.

Dealing with systems that are suspected to be used to commit a crime

B.

Collecting data from computer media

C.

Dealing with systems suspected to be the victim of a crime

D.

Analyzing a system

E.

Threat Modeling

Full Access
Question # 9

A security administrator needs to review events from different systems located worldwide. Which of the

following is MOST important to ensure that logs can be effectively correlated?

A.

Logs should be synchronized to their local time zone.

B.

Logs should be synchronized to a common, predefined time source.

C.

Logs should contain the username of the user performing the action.

D.

Logs should include the physical location of the action performed.

Full Access
Question # 10

Windows Server 2016 log files can be found in which of the following locations?

A.

C:\Windows\System\winevt\Logs

B.

C:\Windows\winevt\System32\Logs

C.

C:\Windows\System32\winevt\Logs

D.

C:\Windows\winevt\System\Logs

Full Access
Question # 11

Which of the following does the command nmap –open 10.10.10.3 do?

A.

Execute a scan on a single host, returning only open ports.

B.

Execute a scan on a subnet, returning detailed information on open ports.

C.

Execute a scan on a subnet, returning all hosts with open ports.

D.

Execute a scan on a single host, returning open services.

Full Access
Question # 12

When tracing an attack to the point of origin, which of the following items is critical data to map layer 2 switching?

A.

DNS cache

B.

ARP cache

C.

CAM table

D.

NAT table

Full Access
Question # 13

After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?

A.

Covert channels

B.

File sharing services

C.

Steganography

D.

Rogue service

Full Access
Question # 14

During recovery from an incident, which three options should a company focus on? (Choose three.)

A.

Evaluating the success of the current incident response plan

B.

Ensuring proper notifications have been made

C.

Providing details of the breach to media

D.

Identifying the responsible parties

E.

Restoring system and network connectivity

F.

Determining the financial impact of the breach

Full Access
Question # 15

During which of the following attack phases might a request sent to port 1433 over a whole company network be seen within a log?

A.

Reconnaissance

B.

Scanning

C.

Gaining access

D.

Persistence

Full Access
Question # 16

Which of the following is the BEST way to prevent social engineering attacks?

A.

Implementing strong physical security.

B.

Training users on a regular basis.

C.

Implementing two-factor access control.

D Implementing strict policies and procedures

Full Access
Question # 17

Which concept involves having more than one person required to complete a task?

A.

Separation of duties

B.

Mandatory access control

C.

Discretionary access control

D.

Least privilege

Full Access
Question # 18

What kind of measures and controls are implemented when employees get assigned personal, unique badges when they join the organization, and they remain valid until the employee's last day of work?

A.

Human resources security

B.

Communications security

C.

Physical security

D.

Operations security

Full Access
Question # 19

How does encryption work to protect information on remote workers' computers?

A.

It is difficult to set up, so an unskilled attacker won't be able to figure it out.

B.

Without the proper key, an attacker won't be able to unscramble the encrypted information.

C.

Using encryption requires advanced training in mathematics, which is beyond the capabilities of most attackers.

D.

Information can be encrypted but it can never be decrypted leaving an attacker unable to read the information

Full Access
Question # 20

An administrator believes that a system on VLAN 12 is Address Resolution Protocol (ARP) poisoning clients on the network. The administrator attaches a system to VLAN 12 and uses Wireshark to capture traffic. After

reviewing the capture file, the administrator finds no evidence of ARP poisoning. Which of the following actions should the administrator take next?

A.

Clear the ARP cache on their system.

B.

Enable port mirroring on the switch.

C.

Filter Wireshark to only show ARP traffic.

D.

Configure the network adapter to promiscuous mode.

Full Access
Question # 21

Which common source of vulnerability should be addressed to BEST mitigate against URL redirection attacks?

A.

Application

B.

Users

C.

Network infrastructure

D.

Configuration files

Full Access
Question # 22

ABC Company uses technical compliance tests to verify that its IT systems are configured according to organizational information security policies, standards, and guidelines. Which two tools and controls can ABC Company use to verify that its IT systems are configured accordingly? (Choose two.)

A.

Implementing Automated Key Management Procedures

B.

Implementing Automated Human Resource Procedures

C.

Performing Vulnerability Assessments and Penetration Testing

D.

Implementing Baseline Configuration Security Controls

Full Access
Question # 23

Which of the following are common areas of vulnerabilities in a network switch? (Choose two.)

A.

Default port state

B.

Default credentials

C.

Default protocols

D.

Default encryption

E.

Default IP address

Full Access
Question # 24

A security operations center (SOC) analyst observed an unusually high number of login failures on a particular database server. The analyst wants to gather supporting evidence before escalating the observation to management. Which of the following expressions will provide login failure data for 11/24/2015?

A.

grep 20151124 security_log | grep –c “login failure”

B.

grep 20150124 security_log | grep “login_failure”

C.

grep 20151124 security_log | grep “login”

D.

grep 20151124 security_log | grep –c “login”

Full Access
Question # 25

A security analyst has discovered that an application has failed to run. Which of the following is the tool MOST

likely used by the analyst for the initial discovery?

A.

syslog

B.

MSConfig

C.

Event Viewer

D.

Process Monitor

Full Access
Question # 26

Which of the following tools can be used as an intrusion detection system (IDS)? (Choose three.)

A.

Bro

B.

Wireshark/tshark

C.

Metasploit

D.

Suricata

E.

Snort

Full Access
Question # 27

Which part of a proactive approach to system security is responsible for identifying all possible threats to a system to be categorized and analyzed?

A.

Threat assessment

B.

Threat intelligence

C.

Threat modeling

D.

Threat hunting

Full Access
Question # 28

Which answer option is a tactic of social engineering in which an attacker engages in an attack performed by phone?

A.

Smishing

B.

Pretexting

C.

Vishing

D.

Phishing

Full Access
Question # 29

When performing an investigation, a security analyst needs to extract information from text files in a Windows operating system. Which of the following commands should the security analyst use?

A.

findstr

B.

grep

C.

awk

D.

sigverif

Full Access
Question # 30

Which of the following describes United States federal government cybersecurity policies and guidelines?

A.

NIST

B.

ANSI

C.

NERC

D.

GDPR

Full Access
Question # 31

After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?

A.

Stealth scanning

B.

Xmas scanning

C.

FINS scanning

D.

Port scanning

Full Access
Question # 32

According to SANS, when should an incident retrospective be performed?

A.

After law enforcement has identified the perpetrators of the attack.

B.

Within six months following the end of the incident.

C.

No later than two weeks from the end of the incident.

D.

Immediately concluding eradication of the root cause

Full Access
Question # 33

Which asset would be the MOST desirable for a financially motivated attacker to obtain from a health insurance company?

A.

Transaction logs

B.

Intellectual property

C.

PII/PHI

D.

Network architecture

Full Access
Question # 34

Which of the following security best practices should a web developer reference when developing a new web- based application?

A.

Control Objectives for Information and Related Technology (COBIT)

B.

Risk Management Framework (RMF)

C.

World Wide Web Consortium (W3C)

D.

Open Web Application Security Project (OWASP)

Full Access
Question # 35

Which of the following plans helps IT security staff detect, respond to, and recover from a cyber attack?

A.

Data Recovery Plan

B.

Incident Response Plan

C.

Disaster Recovery Plan

D.

Business Impact Plan

Full Access
Question # 36

Which of the following regulations is most applicable to a public utility provider operating in the United States?

A.

GDPR

B.

NERC

C.

FISMA

D.

HIPAA

Full Access
Question # 37

A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following

would be the BEST action to take to plan for this kind of attack in the future?

A.

Scanning email server for vulnerabilities

B.

Conducting security awareness training

C.

Hardening the Microsoft Exchange Server

D.

Auditing account password complexity

Full Access
Question # 38

Which of the following methods are used by attackers to find new ransomware victims? (Choose two.)

A.

Web crawling

B.

Distributed denial of service (DDoS) attack

C.

Password guessing

D.

Phishing

E.

Brute force attack

Full Access
Question # 39

Which of the following types of digital evidence is considered the MOST volatile?

A.

Data on a hard disk

B.

Temporary file space

C.

Swap file

D.

Random access memory

Full Access
Question # 40

Which of the following can increase an attack surface?

A.

Old or unused code

B.

Vulnerability scanning

C.

Mapping of an attack surface

D.

Penetration scanning

Full Access
Question # 41

Which of the following digital forensic goals is being provided with hashing and time-stamping of the electronic evidence?

A.

Confidentiality

B.

Encryption

C.

Integrity

D.

Availability

E.

Chain of custody

Full Access
Question # 42

Organizations considered “covered entities” are required to adhere to which compliance requirement?

A.

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

B.

Payment Card Industry Data Security Standard (PCI DSS)

C.

Sarbanes-Oxley Act (SOX)

D.

International Organization for Standardization (ISO) 27001

Full Access
Question # 43

Which of the following would MOST likely make a Windows workstation on a corporate network vulnerable to remote exploitation?

A.

Disabling Windows Updates

B.

Disabling Windows Firewall

C.

Enabling Remote Registry

D.

Enabling Remote Desktop

Full Access
Question # 44

An organization wants to deploy a network security tool to alert them but not block malicious activity and network traffic. Which of the following tools would BEST meet the organization's needs?

A.

IPS

B.

IDS

C.

Firewall

D.

EDR

Full Access
Question # 45

According to Payment Card Industry Data Security Standard (PCI DSS) compliance requirements, an organization must retain logs for what length of time?

A.

3 months

B.

6 months

C.

1 year

D.

5 years

Full Access
Question # 46

Which three answer options are password attack methods and techniques? (Choose three.)

A.

Cross-Site Scripting attack

B.

Brute force attack

C.

Man-in-the-middle attack

D.

Hybrid attack

E.

Dictionary attack

Full Access
Question # 47

In which of the following attack phases would an attacker use Shodan?

A.

Scanning

B.

Reconnaissance

C.

Gaining access

D.

Persistence

Full Access
Question # 48

A security administrator is investigating a compromised host. Which of the following commands could the investigator use to display executing processes in real time?

A.

ps

B.

top

C.

nice

D.

pstree

Full Access
Question # 49

During a malware-driven distributed denial of service attack, a security researcher found excessive requests to a name server referring to the same domain name and host name encoded in hexadecimal. The malware author used which type of command and control?

A.

Internet Relay Chat (IRC)

B.

Dnscat2

C.

Custom channel

D.

File Transfer Protocol (FTP)

Full Access
Question # 50

Which of the following is a social engineering tactic in which an attacker engages in temptation or promise of a good or service?

A.

Vishing

B.

Baiting

C.

Phishing

D.

Pretexting

Full Access
Question # 51

An incident responder was asked to analyze malicious traffic. Which of the following tools would be BEST for this?

A.

Hex editor

B.

tcpdump

C.

Wireshark

D.

Snort

Full Access
Question # 52

A digital forensics investigation requires analysis of a compromised system's physical memory. Which of the following tools should the forensics analyst use to complete this task?

A.

Autopsy

B.

FTK

C.

Volatility

D.

Wire shark

E.

CAINE

Full Access
Question # 53

When reviewing log files from a recent incident, the response team discovers that most of the network-based indicators are IP-based. It would be helpful to the response team if they could resolve those IP-based indicators to hostnames. Which of the following is BEST suited for this task?

A.

DNS

B.

RIP

C.

WINS

D.

NTP

E.

NFS

Full Access
Question # 54

As part of an organization’s regular maintenance activities, a security engineer visits the Internet Storm Center advisory page to obtain the latest list of blacklisted host/network addresses. The security engineer does this to perform which of the following activities?

A.

Update the latest proxy access list

B.

Monitor the organization’s network for suspicious traffic

C.

Monitor the organization’s sensitive databases

D.

Update access control list (ACL) rules for network devices

Full Access