Cohort 9 Day 6

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

A security engineer needs to configure an NGFW to minimize the impact of the increasing number of

various traffic types during attacks. Which of the following types of rules is the engineer the most
likely to configure?
A. Signature-based
B. Behavioral-based
C. URL-based
D. Agent-based

After an audit, an administrator discovers all users have access to confidential data on a file server.
Which of the following should the administrator use to restrict access to the data quickly?
A. Group Policy
B. Content filtering
C. Data loss prevention
D. Access control lists
An administrator needs to perform server hardening before deployment. Which of the following
steps should the administrator take? (Select two).
A. Disable default accounts.
B. Add the server to the asset inventory.
C. Remove unnecessary services.
D. Document default passwords.
E. Send server logs to the SIEM.
E. Join the server to the corporate domain

An organization would like to store customer data on a separate part of the network that is not
accessible to users on the main corporate network. Which of the following should the administrator
use to accomplish this goal?
A. Segmentation
B. Isolation
C. Patching
D. Encryption
A user is attempting to patch a critical system, but the patch fails to transfer. Which of the following
access controls is most likely inhibiting the transfer?
A. Attribute-based
B. Time of day
C. Role-based
D. Least privilege

A newly identified network access vulnerability has been found in the OS of legacy loT devices.
Which of the following would best mitigate this vulnerability quickly?
A. Insurance
B. Patching
C. Segmentation
D. Replacement
A systems administrator set up a perimeter firewall but continues to notice suspicious connections
between internal endpoints. Which of the following should be set up in order to mitigate the threat
posed by the suspicious activity?
A. Host-based firewall
B. Web application firewall
C. Access control list
D. Application allow list

A security analyst is investigating an alert that was produced by endpoint protection software. The
analyst determines this event was a false positive triggered by an employee who attempted to
download a file. Which of the following is the most likely reason the download was blocked?
A. A misconfiguration in the endpoint protection software
B. A zero-day vulnerability in the file
C. A supply chain attack on the endpoint protection vendor
D. Incorrect file permissions
A company is adding a clause to its AUP that states employees are not allowed to modify the
operating system on mobile devices. Which of the following vulnerabilities is the organization
addressing?
A. Cross-site scripting
B. Buffer overflow
C. Jailbreaking
D. Side loading

Which of the following is a primary security concern for a company setting up a BYOD program?
A. End of life
B. Buffer overflow
C. VM escape
D. Jailbreaking
After a security incident, a systems administrator asks the company to buy a NAC platform. Which of
the following attack surfaces is the systems administrator trying to protect?
A. Bluetooth
B. Wired
C. NFC
D. SCADA

Which of the following is the most common data loss path for an air-gapped network?
A. Bastion host
B. Unsecured Bluetooth
C. Unpatched OS
D. Removable devices
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer
data.
Which of the following should the administrator do first?
A. Block access to cloud storage websites.
B. Create a rule to block outgoing email attachments.
C. Apply classifications to the data.
D. Remove all user permissions from shares on the file server

Which of the following would be used to detect an employee who is emailing a customer list to a
personal account before leaving the company?
A. DLP
B. FIM
C. IDS
D. EDR

You might also like