DumpsFinal PDF
DumpsFinal PDF
DumpsFinal PDF
air-gapped network?
A. Bastion host
B. Unsecured Bluetooth
C. Unpatched OS
D. Removable devices
Answer1: D
Answer2: D
A. Infrastructure as code
B. Software as a service
C. Software-defined networking
D. Internet of Things
Answer3: C
1
Q4: Security controls in a data center are being reviewed to ensure
data is properly protected and that human life considerations are
included. Which of the following best describes how the controls
should be set up?
Answer4: D
Answer5: B
Q6: Which of the following would be the best resource for a software
developer who is looking to improve secure coding practices for web
applications?
Answer6: C
2
Q7: A website visitor is required to provide property formatted
information in a specific field on a website form. Which of the
following security measures is most likely used for this mandate?
A. Code signing
B. Form submission
C. Input validation
D. SQL injection
Answer7: C
A. Wildcard creation
B. DNS filtering Certificate Signing Request
C. CSR generation Generating a CSR is like asking for a digital ID card for your website. It
contains your website's info and a public key.
D. Domain validation
Answer8: C
A. Capacity planning
B. Redundancy
C. Geographic dispersion
D. Tabletop Exercise
Answer9: A
3
Q10: An applications security engineer is working to address issues
stemming from situations where necessary approvals and testing
were not done before code was introduced unto the production
environment. Which of the following would be the most appropriate
for the engineer to configure
Answer10: D
A. Avoid
B. Accept
C. Remediate
D. Transfer
Answer12: B
4
(Public Key Infrastructure)
a high-security ID system for the digital world. It uses pairs of keys: one public, like
your ID card, and one private, like a secret key. It's used for secure online
communication, encryption, and digital signatures to prove identity and keep data
safe.
The company wants to purchase one SSL certificate that will work
for all the existing applications and any future applications that
follow the same naming conventions, such as store company.com.
Which of the following certificate types would BEST meet the
requirements?
A. Extended validation
B. Wildcard
C. SAN
D. Self-signed
Answer12: B
Answer13: A
5
Q14: Which of the following cloud models provides clients with
servers, storage, and networks but nothing else?
A. SaaS
B. PaaS
C. DaaS
D. laaS
Answer14: D
Answer15: B
Answer16: A
6
Q17: A network engineer is troubleshooting wireless network
connectivity issues that were reported by users. The issues are
occurring only in the sections of the building that is closest to the
parking lot. Users are intermittently experiencing slow speeds when
accessing websites and are unable to connect to network drives. The
issues appear to increase when laptop users return desks after using
their devices in other areas of the building. There have also been
reports of users being required to enter their credentials on web
pages in order to gain access for them.
Answer17: A
Q18: Which of the following will provide the BEST physical security
countermeasures to stop intruders? (Select TWO)
A. Sensors
B. Mantraps
C. Signage
D. Lighting
E. Alarms
F. Fencing
Answer18: BF
7
Q19: Which of the following types of controls is a turnstile?
A. Corrective
A turnstile is like a rotating gate you pass through to enter
B. Detective a place, like a stadium or subway. It only lets one person
through at a time, making sure people enter one by one
C. Technical and can't go back. It's a way to control who gets in and
D. Physical out.
Answer19: D
A. Geafencing
MDM is a tool that helps organizations manage and secure
B. Full0device encryption mobile devices, like smartphones and tablets, used by
C. Network usage rules employees. It ensures data protection, controls device
settings, and enforces security policies.
D. Remote control
E. Containerization
F. Application whitelisting
Answer20: BC
8
Q21: A security analyst is reviewing logs on a server and observes the
following output:
A. A dictionary attack
B. A password-spraying attack
C. A rainbow table attack
D. A keylogger attack
Answer21: A
Which of the following cloud models would BEST meet the needs of
the organization?
A. laaS
B. MaaS
C. SaaS
D. PaaS
Answer22: C
9
Q23: A user enters a password to log in to a workstation and is then
prompted to enter an authentication code. Which of the following
MFA factors or attributes are being utilized in the authentication
process? (Select TWO)
Answer23: AE
Answer24: C
10
Q25: A user reports constant lag and performance issues with the
wireless network when working at a local coffee shop. A security
analyst walks the user through an installation of wireshark and get a
five-minute pcap to analyze. The analyst observes the following
output:
Which of the Following attacks does the analyst MOST likely see in
this packet capture?
A. Session replay
attack is a type of wireless network attack that involves creating
B. Evil twin a rogue wireless access point (AP) with the same SSID
C. ARP poisoning (Service Set Identifier) as a legitimate wireless network.
D. Bluejacking
Answer25: B
A. RAID 5
B. RAID 2
C. RAID 0+1
D. Raid 6
Answer26: A
11
Q27: An enterprise has hired an outside security firm to conduct
penetration testing on its network and application. The firm has only
been given the documentation to the customers of the applications.
Which of the Following BEST represents the type of testing that will
occur?
A. Bug Bounty
B. Black-box
C. White-box
D. Gray-box
Answer27: C
Q28: The IT department's on-site developer has been with the team
for many years. Each time an application is released, the security
team is able to identify multiple vulnerabilities . Which of the
Following Would BEST help the team ensure the application is ready
to be released to production?
Answer28: C
12
Q29: A retail executive recently accepted a job with a major
competitor. The following week, a security analyst reviews the
security logs and identifies successful logon attempts to access the
departed executive's accounts . Which of the Following security
practices would have addressed the issue?
A. A non-disclosure agreement
B. Least privilege
C. An Acceptable use policy
D. Ofboarding
Answer29: D
Q30: A cybersecurity analyst reviews the log files from a web server
and sees a series of files that indicates a directory-traversal attack
has occurred. Which of the Following is the analyst MOST likely
Seeing?
Answer30: A
13
Q31: An organization is concerned that is hosted web servers are not
running the most updated version of the software. Which of the
following would work BEST to help identify potential
vulnerabilities?
Answer31: D
Answer32: B
14
Q33: A Chief Information Security Officer (CISO) needs to create a
policy set the meets international standards for data privacy and
sharing. Which of the Following should the CISO read and
understand before writing the policies?
A. PCI DSS
B. NIST
C. ISO 31000
D. GDPR General Data Protection Regulation (GDPR)
Answer33: D
A. isolation
B. Firewall whitelisting
C. Containment
D. Segmentation
Answer34: D
15
severity
A. CVSS
B. CVE
C. SIEM
D. SOAR
Answer35: A
Q36: A network administrator has been alerted that web pages are
experiencing long load times. After determining it is not a routing or
DNS issue, the administrator logs in to the router, runs a command ,
and receives the following output:
A. Resource exhaustion
B. Memory leak
C. Buffer overflow
D. DDoS attack
Answer36: A
16
Multifactor Authentication
A. Email Tokens
B. Hardware authentications
C. Push notifications
D. One-time passwords
Answer37: C
17
A. An attacker was able to bypass application whitelisting by emailing
a spreadsheet attachment with an embedded PowerShell in the file
B. An attacker was able to install malware to the CAasdf234 folder
and use it to gam administrator nights and launch Outlook
C. An attacker was able to move laterally from PC1 to PC2 using a
pass-the-hash attack
D. An attacker was able to phish user credentials successfully from an
Outlook user profile
Answer38: C
A. Security
B. Application
C. Syslog
D. Dump
Answer39: D
A. # iptables –t mangle -X
B. # iptables -Z
C. # iptables –P INPUT –j DROP
D. # iptables -F
Answer40: C
18
Q41: Which of the following is MOST likely to contain ranked and
ordered information the likelihood and potential impact of
catastrophic events that may affect business processes and systems,
while also highlighting the residual risk that need to be managed
after migrating controls have been implemented?
Answer41: C
A. A supply-chain attack
B. Misconfigured BIOS
C. A downgrade attack
D. A logic bomb
E. Fileless malware
Answer42: A
19
Q43: A manufacturing company has several one-off legacy
information systems that cannot be migrated to newer OS due to
software compatibility issues. The Oss are still supported by the
vendor, but the industrial software is no longer supported. The Chief
Information Security Officer (CISO) has created a resiliency plan for
these that will allow OS patches to be installed in a non-production
environment, while also creating backups of the systems for recovery.
A. RAID 1+5
B. Virtual machines
C. Redundancy
D. Full backups
Answer43: D
A. Geofencing
B. Geolocation
C. Impossible travel time
D. Network location
Answer44: A
20
Q45: An analyst is trying to identify insecure services that are
running on the internal network After performing a port scan, the
analyst identifies that a server has some insecure services enabled on
default ports. Which of the following BEST describes the services
that are currently running and the secure alternatives for replacing
them? (Select THREE)
A. SNMPv1, SNMPv2
B. Telnet, SSH
C. Login, rlogin
D. HTTP, HTTPS
E. SNMPv2, SNMPV3
F. TLS, SSL
G. POP, IMAP
H. TFTP, FTP
I. SFTP, FTPS
Answer45: BDE
Q46: A user received an SMS on a mobile phone that asked for bank
details. Which of the following social-engineering techniques was
used in this case?
A. Smishing
B. SPIM
C. Spear phishing
D. Vishing
Answer46: A
21
Q47: While reviewing pcap data, a network security analyst is able to
locate plaintext username and passwords being sent from
workstations to network switches . Which of the following is the
security analyst MOST likely observing?
A. An SSH connection
B. A Telnet session
C. SNMP traps
D. SFTP traffic
Answer47: B
A. Enable TLSv2 encryption on the web server.TLSv2 (Transport Layer Security version 2)
B. Configure NAT on the core router. NAT (Network Address Translation)
C. Configure BGP on the core router.
D. Enable 3DES encryption on the web server.
E. Configure VLANS on the core router.
F. Enable AES encryption on the web server.
Answer48: DE
22
Q49: A company wants to modify its current backup strategy to
minimize the number of backups that would need to be restored in
case of data loss. Which of the following would be the BEST backup
strategy to implement?
Answer49: D
A. chflage
B. chmod
C. ls
D. setuid
E. lsof
Answer50: B
23
Q51: A security administrator needs to inspect in-transit files on the
enterprise network to search for Pll, Credit Card data, and
classification words. Which of the following would be the BEST to
use?
A. EDR Solution
B. IDS Solution
C. Network DLP solution
D. HIPS software solution
Answer51: C
A. Multifactor authentication.
B. A remote access policy.
C. federation
D. single sign-on
Answer52: C
A. BPA
B. SLA Service Level Agreement
C. MOU
D. NDA
Answer53: B
24
Q54: Ann, a customer, received a notification from her mortgage
company stating her Pll may be shared with partners, affiliates, and
associates to maintain day-today business operations. Which of the
following documents did the Ann receive?
Answer54: C
A. Brute-force
type of cyberattack where an attacker uses stolen username and
B. Credential stuffing password combinations (credentials) to gain unauthorized access to
C. Remote access Trojan multiple online accounts.
D. Dictionary
E. Password spraying
Answer55: B
25
Q56: Which of the following terms should ne included in a contract
to help a company monitor the ongoing security maturity of a new
vendor?
Answer56: D
A. AIS
B. Tor
C. IoC
D. SFTP
Answer57: B
Q58: Which of the following is the BEST method for ensuring non-
repudiation?
A. Digital certificate
B. SSH key
C. SSO
D. Token
Answer58: A
26
Q59: A large financial services firm recently released information
regarding a security breach within its corporate network that began
several years before. During the time frame in which the breach
occurred, indicators show an attacker gained administrative access to
the network through a file downloaded from a social media site and
subsequently installed it without the user's knowledge. Since the
compromise, the attacker was able to take command and control of
the computer systems anonymously while obtaining sensitive
corporate and personal employee information. Which of the
following methods did the attacker MOST likely use to gain Access?
A. A fileless virus
B. A logic bomb
C. A bot
D. A RAT "Remote Access Trojan." It is a type of malicious software or malware that allows an
attacker to gain unauthorized access and control over a computer or network from a
remote location.
Answer59: C
A. CBT
B. AUP
C. NDA
D. MOU
Answer60: C
27
Q61: Recent changes to a company's BYOD policy require all
personal mobile devices to use a two-factor authentication method
that is not something you know or have . which of the following will
meet this requirement?
A. PKI certificate
B. Smart card
C. Six-digit PIN
D. Facial recognition Something you are
Answer61: C
A. An ACL
B. A VLAN
C. A DMZ
D. A VPN
Answer62: A
GET index.php?page=..2f..2..2f..2f..2f..2f..2f..2f..2fpasswd
GET index.php?page=..2f..2f..2f..2f..2f..2..2f..2f..2..2fetc2fpasswd
GET index.php?page=..2f..2..2f..2f..2f..2f..2f..2..2f..2f..2fetc2fpasswd
28
A. API
B. Request forgery
C. SQL injection
D. Directory traversal
Answer63: B
Answer64: B
Mimikatz is a hacking tool used to steal passwords and access accounts on Windows computers. It
can also help attackers gain more control over a compromised system
Q65: A company’s help desk received several AV alerts indicating
Mimikatz attempted to fun on the remote systems. Several users also
reported that the new company flash drives they picked up in the
break room only have 512KB of storage . Which of the following is
MOST likely the cause?
A. The new flash drives are incorrectly partitioned and the systems are
automatically trying to use an unapproved application to repartition
the drives
B. The new flash drives need a driver that is being blocked by the AV
software because the flash drives are not on the application’s allow
list , temporarily restricting the drives to 512KB of storage
29
C. The GPO prevents the use of flash drives, which triggers a false
positive AV indication and restricts the drives to only 512KB
storage.
D. The GPO blocking the flash drives is being bypassed by a
malicious flash drive that is attempting to harvest plaintext
credentials from memory
Answer65: D Group Policy Object. It is a feature in Windows that allows network administrators to
manage and enforce various settings and configurations for multiple computers and
users within a network.
Answer66: D
Answer67: A
30
Q68: An information security officer at a credit card transaction
company is conducting a framework-mapping exercise with the
internal controls The company recently established a new office in
Europe. To which of the following frameworks should the security
officer map the existing controls? (Select TWO)
A. PCI DSS Payment Card Industry Data Security Standard. It is a set of security standards and
guidelines developed to ensure the secure handling of payment card information,
B. ISO such as credit card data.
C. SOC
D. GDPR General Data Protection Regulation. It is a comprehensive data protection and
privacy regulation enacted by the European Union.
E. NIST
F. CSA
Answer68: AD
Answer69: C
31
Q70: A external forensics investigator has been hired to investigate a
data breach at a large enterprise with numerous assets. It is known
that the breach started in the DMZ and moved to the sensitive
information generating multiple logs as the attacker traversed
through the network. Which of the following will BEST assist with
this investigation?
Answer70: C
A. DNS poisoning
B. jamming
C. bluesnarfing
D. DDoS
E. Evil twin
Answer71: E
32
Q72: Which of the following is an example of risk avoidance ?
Answer72: B
A. FTP
B. FIM File Integrity Monitoring: FIM is a security practice and technology used to monitor and detect
changes to files and systems on a computer or network. It's designed to ensure the integrity
C. IPS of critical files and configurations.
D. Antivirus
Answer73: B
B. Notarized requestor
C. Service provider
D. Tokenized resource
E. Identity processor
Answer74: AD
33
Q75: Which of the following would be used to find the MOST
common web-application vulnerabilities?
A. MITRE ATT&CK
B. Cyber Kill Chain
C. OWASP
D. SDLC
Answer75: C
A. Password reuse
B. SSO
C. Account audits
D. AUP
Answer76: C
A. Elasticity
B. Stored procedures
C. Continuous integration
D. Functional testing
Answer77: C
34
Q78: A company wants to deploy decoy system alongside production
system in order to entice threat actors and to learn more about
attackers. Which of the following BEST describes these systems?
A. Neural network
B. Virtual machines
C. Honeypots
D. DNS sinkholes
Answer78: C
Answer79: A
A. Hashing
B. Snapshots
C. Event logs
D. Encryption
Answer80: A
35
Q81: law enforcement officials sent a company a notification that
states electronically stored information and paper documents can't
be destroyed which of the following explains this process?
A. Accountability
B. Data breach notification
C. Legal hold legal process that requires an organization to preserve and retain all
relevant documents and information, including electronic records, emails
D. Chain of custody
Answer81: D
A. Configure SNMPv3
B. Configure SNMPv1
C. Configure the default community string
D. Configure SNMPv2c
Answer82: A
A. Encryption
B. Pseudo-anonymization
C. Data masking
D. Tokenization
Answer83: B
36
Q83: two organizations are discussing a possible merger Both
organization' Chief financial of officers would like to safely share
payroll data with each other to determine if the pay scale for
different roles and similar at both organizations. which of the
following techniques would be best to protect employee data while
allowing the companies to successfully share this informations ?
A. Encryption
B. Pseudo-anonymization
C. Data masking
D. Tokenization
Answer83: B
A. Walk-through
B. Purple team
C. Read team
D. TAXII
MITRE (Adversarial Tactics, Techniques, and Common Knowledge), is a
E. MITER ATT&CK knowledge base and framework that provides detailed information on the
tactics, techniques, and procedures (TTPs) that cyber adversaries use
Answer84: C when conducting cyberattacks.
37
Q85: Which of the following would MOST be identified by a
credentialed scan but would be missed by an uncredentialed scan?
Answer85: B
A. cat/logfiles/messages|tail-500 www.comptia.com
B. grep -500 /logfiles/messages | cat www.comptia.com
C. head – 500 www.comptia.com
D. tail -500/logfiles/messages | grep ww.comptia.com
Answer86: D
38
Q87: The Chief information Security Officer directed a risk
reduction in Shadow IT and created a policy requiring all
unsanctioned high-risk SaaS applications to be blocked from user
access. Which of the following is the BEST security solution to reduce
this risk?
Cloud Access Security Broker. It's a security solution or service that helps
A. CASB organizations secure their data and applications when they're in the cloud.
B. VPN concentrator
C. MFA
D. VPC endpoint
Answer87: A
A. Guards
B. Access control vestibules vestibule or mantrap, is a physical security measure used in
buildings and facilities to control access and enhance security.
C. MAC filtering
D. Zero Trust segmentation
E. Network access control
F. Bollards
Answer88: DE
39
Q89: Which of the following is the GREATEST security concern
when outsourcing code development to third-party contractors for an
internet-facing application?
A. Quality assurance
B. Elevated privileges
C. Unknown backdoor
D. Intellectual property theft
Answer89: C
40
Q90: An organization has hired a red team to simulate attacks on its
security posture. Which of the following will the blue team do after
detecting an IoC? Indicators of Compromise (IoC) are pieces of evidence or artifacts that suggest a
security breach has occurred or is currently happening within a computer network or
system.
A. Contact forensics on the compromised system.
B. Conduct passive reconnaissance to gather information.
C. Reimage the impacted workstations.
D. Activate runbooks for incident response.
Runbooks: guidelines that outline how to respond to specific incidents.
Answer90: D
A. The last full backup that was conducted seven days ago
B. The baseline OS configuration
C. The last known-good configuration stored by the operating system
D. The last incremental backup that was conducted 72 hours ago
Answer91: C
A. Tailgating
B. Credential harvesting
F - B NOT C
C. SPIM
D. Hopping
E. Phishing
F. Vishing
Answer92: CF
41
Support
Q93: Which of the following components can be used to consolidate and
forward inbound internet traffic to multiple cloud environments though a
single firewall?
A. DNS sinkhole
B. Edge computing
C. Cloud hot site
D. Transit gateway
Answer93: D
A. PCI DSS
B. ISO
C. GDPR
D. NIST
Answer94: D
Q95: A security analyst receives an alert from the company's SIEM that
anomalous activity is coming from a local Source IP address of
192.168.34.26. The Chief Information Security Officer asks the analyst to
block the originating source. Several days later, another employee opens
an internal ticket stating that vulnerability scans are no longer being
performed properly. The IP address the employee provides is
192.168.4.26. Which of the following describes this type of alert?
A. True positive
B. False positive
C. True negative
D. False negative
Answer95: B
42
Q96: A company has installed badge readers for building access but is
finding unauthorized individuals roaming the hallways. Which of the
following is the MOST likely cause?
A. Phishing
B. Identity fraud
C. Tailgating a social engineering technique where an unauthorized
person gains physical access to a restricted area or facility
D. Shoulder surfing by closely following an authorized person through a
secure entry point, such as a door or gate
Answer96: C
A. Hashing
High data entropy means the data is very random and
B. High data entropy unpredictable, while low data entropy means it's more orderly
C. Longer key longevity and predictable.
D. Algorithms that require less computing power
Answer97: B
Q98: A large retail store’s network was breached recently, and this news
was made public. The store did not lose any intellectual property, and no
customer information was stolen. Although no fines were incurred as a
result, the store lost revenue after breach. Which of the following is the
MOST likely reason for this issue?
A. Reputation damage
B. Leadership changes
C. Employee training
D. Identity theft
Answer98: A
43
Q99: A security analyst wants to fingerprint a web server. Which of the
following tools will the security analyst MOST likely use to accomplish
this task?
A. ping 192.168.0.10
B. curl –head http://192.168.0.10
C. nmap –pl-65535 192.168.0.10
D. dig 192.168.0.10
Answer99: B
A. CASB
B. CMS
C. VPC
D. SWG
Answer100: A
44
Q101: Security analysts notice a server login from a user who has been
on vacation for two weeks. The Analysts confirm that the user did not log
in to the system while on vacation. After reviewing packet capture logs,
the analysts notice the following:
Username: ….smithJA….
Password: 944d3697d8880ed40lb5ba2e77811
Q102: A company wants the ability to restrict web access and monitor the
websites that employees visit. Which of the following would BEST meet
these requirements?
A. Internet proxy
B. WAF
C. VPN
D. Firewall
Answer102: A
45
Q103: An administrator is configuring a firewall rule set for a subnet to
only access DHCP, web pages, and SFTP, and to specifically block FTP.
Which of the following would BEST accomplish this goal?
46
D. [Permission Source Destination Port]
Allow: Any Any 80
Allow: Any Any 443
Deny: Any Any 67
Allow: Any Any 68
Allow: Any Any 22
Allow: Any Any 21
Allow: Any Any
Answer103: C
47
A. EDR
B. NGFW
C. DLP
D. HIPS
Answer105: A
A. High availability
B. Dynamic resource allocation
C. Segmentation
D. Container security
Answer106: B
Answer107: A
48
Q108: A company wants to build a new website to sell products online.
The website will host a storefront application that will allow visitors to
add products to a shopping cart and pay for the products using a credit
card. Which of the following protocols would be the MOST secure to
implement?
A. SNMP
B. SFTP
C. SSL
D. TLS
Answer108: D
A. Screened subnet
B. VLAN
C. VPN
D. WAF
Answer109: B
49
Q110: A security analyst is evaluating the risks of authorizing multiple
security solutions to collect data from the company's cloud environment.
Which of the following is an immediate consequence of these
integrations?
Answer110: C
Answer111: D
Mobile Device Management. It's a system that helps organizations control and secure
mobile devices (like smartphones and tablets) used by employees. MDM software
allows a company to enforce policies, manage apps, and protect data on these devices.
50
Q112: A large bank with two geographically dispersed data centers is
concerned about major power disruptions at both locations. Every day
each location experiences very brief outages that last for a few seconds.
However, during the summer a high risk of intentional brownouts that last
up to an hour exists, particularly at one of the locations near an industrial
smelter. Which of the following is the BEST solution to reduce the risk of
data loss?
A. Generator
B. Dual supply
C. PDU
D. Daily backups
Answer112: A
A. GDPR guidance
B. CIS benchmarks help organizations improve their security posture by
providing specific and actionable recommendations for
C. ISO 27001 standards various operating systems, applications, and devices
D. Regional regulations
Answer113: B
51
Q114: As part of the building process for a web application, the
compliance team requires that all PKI certificates are rotated annually and
can only contain wildcards at the secondary subdomain level. Which of
the following certificate properties will meet these requirements?
Answer114: D
A. Domain hijacking
B. DNS poisoning or DNS spoofing, is a malicious attack on the Domain Name
C. On-path System (DNS), which is responsible for translating domain names
(e.g., www.example.com) into IP addresses used for routing traffic
D. Evil twin on the internet.
Answer115: B
52
Q116: An organization is repairing the damage after an incident. Which
of the following controls is being implemented?
A. Detective
B. Corrective
C. Compensating
D. Preventive
Answer116: B
Q117: To reduce and limit software and infrastructure costs, the Chief
Information Officer has requested to move email services to the cloud.
The cloud provider and the organization must have security controls to
protect sensitive data. Which of the following cloud services would
BEST accommodate the request?
A. PaaS
B. SaaS
C. DaaS
D. laaS
Answer117: B
A. Corrective
B. Detective
C. Deterrent
D. Compensating
Answer118: C
53
Q119: The new Chief Information Security Officer at a company has
asked the security team to implement stronger user account policies. The
new policies require:
Users to choose a password unique to their last ten passwords
Users to not log in from certain high-risk countries
A. Geotagging
B. Geolocation
C. Password reuse
D. Password complexity
E. Password history
F. Geofencing
Answer119: EF
Answer120: A
54
Q121: Which of the following supplies non-repudiation during a
forensics investigation?
Answer121: E
Q122: The help desk has received calls from users in multiple locations
who are unable to access core network services. The network team has
identified and turned off the network switches using remote commands.
Which of the following actions should the network team take NEXT?
Answer122: D
55
Q123: A research company discovered that an unauthorized piece of
software has been detected on a small number of machines in its lab. The
researchers collaborate with other machines using port 445 and, on the
Internet, using port 443. The unauthorized software is starting to be seen
on additional machines outside of the lab and is making outbound
communications using HTTPS and SMB. The security team has been
instructed to resolve the problem as issue as possible while causing
minimal disruption to the researchers. Which of the following contains
the BEST course of action in this scenario?
Answer123: C
A. Data tokenization
B. Data masking
C. Data purge
D. Data encryption
Answer124: A
56
Q125: The local administrator account for a company's VPN appliance
was unexpectedly used to log in to the remote management interface.
Which of the following would have prevented this from happening?
Answer125: B
A. Antivirus
B. Segmentation
C. Application allow list
D. Patching
E. IDS
F. Jump server
Answer126: BD
57
Q127: A company's help desk has received calls about the wireless
network being down and users being unable to connect to it. The network
administrator says all access points are up and running. One of the help
desk technicians notices the affected users are working in a building near
the parking lot. Which of the following is the most likely reason for the
outage?
A. The APs in the affected area have been unplugged from the
network.
B. A user has set up a rogue access point near the building.
C. Someone near the building is jamming the signal.
D. Someone set up an evil twin access point in the affected area.
Answer127: C
A. SQL injection
B. Cross-site scripting
C. DNS poisoning
D. Certificate forgery
Answer128: B
58
Q129: A security assessment found that several embedded systems are
running unsecure protocols. These Systems were purchased two years ago
and the company that developed them is no longer in business Which of
the following constraints BEST describes the reason the findings cannot
be remediated?
A. Unavailable patch
B. Inability to authenticate
C. Lack of computing power
D. Implied trust
Answer129: A
Q130: Several users have opened tickets with the help desk. The help
desk has reassigned the tickets to a security analyst for further review.
The security analyst reviews the following metrics:
Which of the following is MOST likely the result of the security analyst's
review?
Answer130: A
59
Q131: A company is adopting a BYOD policy and is looking for a
comprehensive solution to protect company information on user devices.
Which of the following solutions would BEST support the policy?
Answer131: D
A. Fileless virus
B. Tainted training data
C. Improper algorithms security
D. Cyptomalware
Answer132: B
Answer133: D
60
Q134: An employee receives a text message that appears to have been
sent by the payroll department and is asking for credential verification.
Which of the following social engineering techniques are being
attempted? (Select Two).
A. Typosquatting
B. Misinformation
C. Impersonation
D. Phishing
E. Smishing
F. Vishing
Answer134: DE
A. DIP
B. IDS
C. IPS
D. ACL
Answer135: C
61
Q136: A company performed an assessment of its security posture and
found a lack of controls to adequately protect from exploitation legacy
systems at manufacturing sites. Which of the following controls should
be set up for this type of environment? (Select two)
A. Jump server
B. Antivirus
C. IDS
D. Segmentation
E. Patching
F. Application allow list
Answer136: DE
Q137: A company's help desk has received calls about the wireless
network being down and users being unable to connect to it. The network
administrator says all access points are up and running. One of the help
desk technicians notices the affected users are working in a building near
the parking lot. Which of the following is the most likely reason for the
outage?
Answer137: A
62
Q138: A user's login credentials were recently compromised During the
investigation, the security analyst determined the user input credentials
into a pop-up window when prompted to confirm the username and
password. However the trusted website does not use a pop-up for entering
user credentials. Which of the following attacks occurred?
A. DNS poisoning
B. Certificate forgery
C. SQL injection
D. Cross-site scripting
Answer138: D
A. Firmware
B. Virtualization
C. Operating system
D. Application
Answer139: A
A. A jump server
B. A stateful firewall server
C. A reverse proxy server
D. A forward proxy server
Answer140: A
63
Q141: A company is discarding a classified storage array and hires an
outside vendor to complete the disposal. Which of the following should
the company request from the vendor?
A. Inventory list
B. Proof of ownership
C. Certification
D. Classification
Answer141: C
Answer142: B
Answer143: A
64
Q144: Which of the following risk management strategies should an
enterprise adopt first if a legacy application is critical to operations?
A. Mitigate
B. Transfer
C. Avoid
D. Accept
Answer144: D
A. ISO 27000
B. GDPR
C. PCIDSS
D. NIST 800-53
Answer145: D
A. Honeypot
B. Blocklist
C. Machine learning
D. DNS sinkhole
Answer146: A
65
Q147: An engineer is setting up a VDI environment for a factory
location, and the business wants to deploy a low-cost solution to enable
users on the shop floor to log in the VDI environment directly. Which of
the following should the engineer select to meet these requirements?
A. Containers
B. Laptops
C. Workstations
D. Thin clients
Answer147: D
A. DLP
B. SED
C. TPM
D. HSM
Answer148: B
66
A. A replay attack is being conducted against the application.
B. A credentialed vulnerability scanner attack is testing several CVEs
against the application.
C. A service account password may have been changed, resulting in
continuous failed logins within the application.
D. An injection attack is being conducted against a user authentication
system.
Answer149: C
A. Cameras
B. Visitor logs
C. Badges
D. Locks
Answer150: C
A. Site-to-site
B. Full tunnel
C. Always On
D. Remote access
Answer151: A
67
Q152: An application owner reports suspicious activity on an internal
financial application from various internal users within the past 14 days.
- Financial transactions were occurring during irregular time frames and
outside of business hours by unauthorized users.
- Internal users in question were changing their passwords frequently
during that time period.
- A jump box that several domain administrator users use to connect to
remote devices was recently compromised.
- The authentication method used in the environment is NTLM.
Which of the following types of attacks is MOST likely being used to
gain unauthorized access?
A. Directory traversal
B. Pass-the-hash
C. Brute-force
D. Replay
Answer152: D
A. Community
B. Private
C. Hybrid
D. Public
Answer153: A
68
Q154: A security engineer needs to recommend a solution to defend
against malicious actors misusing protocols and being allowed through
network defenses. Which of the following will the engineer MOST likely
recommend?
A. An IDS
B. A content filter
C. A WAF
D. A next-generation firewall
Answer154: D
A. Enforcing encryption
B. Applying MDM software
C. Removing administrative permissions
D. Deploying GPOs
Answer155: B
69
A. Geolocation
B. Geotagging
C. Time-of-day restrictions
D. Tokens
E. Certificates
F. Role-based access controls
Answer156: AB
A. Communication protocols
B. Z-Wave compatibility
C. Network range
D. Zigbee configuration
Answer157: A
A. Input validation
B. Obfuscation
C. Error handling
D. Username lockout
Answer158: B
70
Q159: A company recently suffered a breach in which an attacker was
able to access the internal mail servers and directly access several user
inboxes. A large number of email messages were later posted online.
Which of the following would BEST prevent email contents from being
released should another breach occur?
Answer159: A
Q160: A security analyst discovers that one of the web APIs is being
abused by an unknown third party. Logs indicate that the third party is
attempting to manipulate the parameters being passed to the API
endpoint. Which of the following solutions would BEST help to protect
against the attack?
A. NIDS
B. SIEM
C. DLP
D. WAF
Answer160: D
71
Q161: A security analyst was asked to evaluate a potential attack that
occurred on a publicly accessible section of the company's website. The
malicious actor posted an entry in an attempt to trick users into clicking
the following:
https://www.cOmptla.com/contact-
us/3Fname%3D%3Cscript%3Ealert(document. cookie)
%3C%2Fscript%3E
A. SOLi
B. Session replay
C. XSS
D. DLL injection
Answer161: C
Which of the following would be BEST for the security manager to use in
a threat model?
A. Hacktivists
B. White-hat hackers
C. Script kiddies
D. Insider threats
Answer162: A
72
Q163: An organization is outlining data stewardship roles and
responsibilities. Which of the following employee roles would determine
the purpose of data and how to process it?
A. Data controller
B. Data custodian
C. Data protection officer
D. Data processor
Answer163: A
Answer164: B
Answer165: D
73
Q166: A company prevented direct access from the database
administrators' workstations to the network segment that contains
database servers. Which of the following should a database administrator
use to access the database servers?
A. HSM
B. Load balancer
C. Jump server
D. RADIUS
Answer166: C
Answer167: C
Q168: a business development team reports that files are missing from
the database system and the server log-in screens are showing a lock
symbol that requires users to contact an email address to access the
system and data. Which of the following attacks is the company facing?
A. Rootkit
B. Spyware
C. Bloatware
D. Ransomware
Answer168: D
74
Q169: An organization is building a new backup data center with cost-
benefit as the primary requirement and RTO and RPO values around two
days. Which of the following types of sites is the best for this scenario?
A. Warm
B. Real-time recovery
C. Hot
D. Cold
Answer169: B
Q170: A user would like to install software and features that are not
available with a mobile device's default software. Which of the following
would all the user to install unauthorized software and enable new
features?
A. Jailbreaking
B. Side loading
C. Cross-site scripting
D. SQLi
Answer170: A
A. Cloud provider
B. Client
C. DBA
D. Third-party vendor
Answer171: B
75
Q172: Which of the following is the BEST reason to maintain a
functional and effective asset management policy that aids in ensuring the
security of an organization?
Answer172: D
A. DLP
B. VPC
C. CASB
D. ACL
Answer173: A
76
Q174: During an incident, an EDR system detects an increase in the
number of encrypted outbound connections from multiple hosts. A
firewall is also reporting an increase in outbound connections that use
random high ports. An analyst plans to review the correlated logs to find
the source of the incident. Which of the following tools will BEST assist
the analyst?
A. A NGFW
B. A SIEM
C. The Windows Event Viewer
D. A vulnerability scanner
Answer174: B
Answer175: D
77
Q176: Which of the following BEST reduces the security risks introduced
when running systems that have expired vendor support and lack an
immediate replacement?
Answer176: A
Q177: A company recently experienced a data breach and the source was
determined to be an executive who was charging a phone in a public area.
Which of the following would MOST likely have prevented this breach?
A. A device pin
B. A USB data blocker
C. A firewall
D. Biometrics
Answer177: B
A. Domain hijacking
B. On-path attack
C. Protocol poisoning
D. Bluejacking
Answer178: C
78
Q179: A company is auditing the manner in which its European
customers’ personal information is handled. Which of the following
should the company consult?
A. NIST
B. ISO
C. PCI DSS
D. GDPR
Answer179: D
A. 445
B. 135
C. 143
D. 161
E. 443
F. 139
Answer180: AF
79
Q181: A dynamic application vulnerability scan identified code injection
could be performed using a web form. Which of the following will be
BEST remediation to prevent this vulnerability?
Answer181: A
A. Homomorphic
B. Symmetric
C. Asymmetric
D. Ephemeral
Answer182: A
80
A. LDAPS
B. S/MIME
C. SRTP
D. SSH
Answer183: A
Answer184: D
Q185: The manager who is responsible for a data set has asked a security
engineer to apply encryption to the data on a hard disk. The security
engineer is an example of a:
A. Data custodian
B. Data owner
C. Data processor
D. Data controller
Answer185: A
81
Q186: Which of the following technologies is used to actively monitor
for specific file types being transmitted on the network?
A. Honeynets
B. Data loss prevention
C. Tcpreplay
D. File integrity monitoring
Answer186: D
A. MDM
B. User training
C. CASB Or DLP if its shown as an option
D. EDR
Answer187: D
82
Q188: An analyst is working on an email security incident in which the
target opened an attachment containing a worm. The analyst wants to
implement mitigation techniques to prevent further spread. Which of the
following is the BEST course of action for the analyst to take?
Answer188: A
Answer189: D
A. Supply chain
B. Cryptographer downgrade
C. Side channel
D. Malware
Answer190: D
83
Q191: Which of the following environments utilizes dummy data and is
MOST likely to be installed locally on a system that allows code to be
assessed directly and modified easily with each build?
A. Development
B. Staging
C. Production
D. Test
Answer191: D
A. Privilege escalation
B. Buffer overflow
C. Pharming
D. Persistence
Answer192: A
Answer193: D
84
Q194: If a current private key is compromised, which of the following
would ensure it cannot be used to decrypt all historical data?
Answer194: A
Answer195: B
A. Typo squatting
B. A watering-hole attack
C. A spear-phishing attack
D. A phishing attack
Answer196: B
85
Q197: A security analyst discovers several .jpg photos from a cellular
phone during a forensics investigation involving a compromised system.
The analyst runs a forensics tool to gather file metadata. Which of the
following would be part of the images if all the metadata is still intact?
Answer197: B
A. Phishing
B. Whaling
C. Vishing
D. Spear phishing
Answer198: A
86
Q199: A well-known organization has been experiencing attacks from
APIs. The organization is concerned that custom malware is being
created and emailed into the company or installed on USB sticks that are
dropped in parking lots. Which of the following is the BEST defense
against this scenario?
Answer199: C
A. COPE
B. CYOD
C. BYOD
D. VDI
Answer200: C
87
Q201: A security administrator is trying to determine whether a server is
vulnerable to a range of attacks. After using a tool, the administrator
obtains the following output:
A. Memory leak
B. SQL injection
C. Directory traversal
D. Race conditions
Answer201: C
Answer202: D
88
Q203: A financial analyst is expecting an email containing sensitive
information from a client when the email arrives the analyst receives an
error and is unable to open the encrypted message. which of the following
is the MOST likely causes of the issue?
Answer203: B
A. Zero day
B. Legacy operating system
C. Supply chain
D. Weak configuration
Answer204: A
A. Script kiddie
B. Hacktivist
C. Business competitor
D. Criminal syndicate
E. Disgruntled employee
Answer205: B
89
Q206: which of the following is the correct order of volatility from
MOST to LEAST volatile?
Answer206: D
A. FIM
HSM (Hardware Security Module): designed to provide a high level of
B. HSM security and tamper resistance for cryptographic operations and key
C. CA management
D. DLP
Answer207: A
A. MFA
B. Password history
C. Time-based logins
D. Lockout
Answer208: B
90
Q209: A user downloaded an extension for a browser and the user's
device later become infected the analyst who is investigating the incident
saw various logs where the attacker was hiding activity by deleting data
the following was observed running
A. Python
B. Macros
C. Bash
D. PowerShell
Answer209: D
A. Buffer overflow
B. Firmware version
C. SQL injection
D. Cross-site scripting
Answer012: B
A. Phone call
B. Email
C. Text message
D. Instant message
Answer211: B
91
Q212: Which of the following examples would be best mitigated by input
sanitization?
A. Email messages: “Click this link to get your free gift card.”
B. Browser messages: “your connection is not private.”
C. nmap -p- 10.11.1.130
D. <script> alert(“Warning!”); </script>
Answer212: B
Answer213: C
A. Encryption
B. Data masking
C. Geolocation policy
D. Data sovereignty regulation
Answer214: C
92
Q215: A security analyst is scanning a company's public network and
discovers a host is running a remote desktop that can be used to access
the production Network. Which of the following changes should the
security analyst recommend?
Answer215: A
Q216: An IT manager informs the entire help disk stuff that only the IT
manager and the help desk lead will have access to the administrator
Console of the help desk software which of the following security
techniques in the IT manager setting up?
A. Configuration enforcement
B. Employee monitonng
C. Hardening
D. Least privilege
Answer216: D
A. Smishing
B. disinformation
C. impersonation
D. Watering-hole
Answer217: D
93
Q218: Which of the following strategies shifts risks that are not covered
in an organization's risk strategy?
A. Risk acceptance
B. Risk mitigation
C. Risk avoidance
D. Risk transference
Answer218: A
A. Decentralization
B. Software-defined networking
C. Scalability
D. High availability
Answer219: D
A. Deterrent
B. Compensating
C. Directive
D. Corrective
Answer220: D
94
Q221: A company is planning to install a guest wireless network so
visitors will be able to access the Internet. The stakeholders want the
network to be easy to connect to so time is not wasted during meetings.
The WAPs are configured so that power levels and antennas cover only
the conference rooms where visitors will attend meetings. Which of the
following would BEST protect the company's Internal wireless network
against visitors accessing company resources?
A. Decrease the power levels of the access points for the guest
wireless network.
B. Change the password for the guest wireless network every month.
C. Enable WPA2 using 802.1X for logging on to the guest wireless
network.
D. Configure the guest wireless network to be on a separate VLAN
from the company's internal wireless network.
Answer221: D
Which of the following types of attacks is being attempted and how can it
be mitigated?
Answer222: C
95
Q223: Which of the following threat vectors would appear to be the most
legitimate when used by a malicious actor to impersonate a company?
A. Phone call
B. Text message
C. Instant message
D. Email
Answer223: D
Answer224: C
A. Reporting
B. Alerting
C. Scanning
D. Archiving
Answer225: C
96
Q226: A security administrator is setting up a SIEM to help monitor for
notable events across the enterprise. Which of the following control types
does this BEST represent?
A. Detective
B. Compensating
C. Corrective
D. Preventive
Answer226: A
A. Ask for the caller's name, verify the person's identity in the email
directory, and provide the requested information over the phone.
B. Direct the caller to stop by the help desk in person and hang up
declining any further requests from the caller.
C. Request the caller send an email for identity verification and
provide the requested information via email to the caller.
D. Write down the phone number of the caller if possible, the name of
the person requesting the information, hang up, and notify the
organization's cybersecurity officer.
Answer227: D
97
Q228: A host was infected with malware. During the incident response,
Joe, a user, reported that he did not receive any emails with links, but he
had been browsing the Internet all day. Which of the following would
MOST likely show where the malware originated?
Answer228: D
Answer229: B
Q230: A bakery has a secret recipe that it wants to protect. Which of the
following objectives should be added to the company's security
awareness training?
A. Phishing awareness
B. Risk analysis
C. Insider threat detection
D. Business continuity planning
Answer230: C
98
Q231: Which of the following teams combines both offensive and
defensive testing techniques to protect an organization's critical systems?
A. Yellow
B. Red
C. Purple
D. Blue
Answer231: C
Answer232: B
A. Privacy
B. Availability
C. Integrity
D. Confidentiality
Answer233: C
99
Q234: An endpoint protection application contains critical elements that
are used to protect a system from infection. Which of the following must
be updated before completing a weekly endpoint check?
A. Policy engine
B. Policy updates
C. Policy definitions
D. Policy signatures
Answer234: D
A. Database
B. Partition
C. Full disk
D. Asymmetric
Answer235: C
Q236: Which of the following describes the reason root cause analysis
should be conducted as part of incident response?
Answer236: B
100
Q237: During onboarding process, an employee needs to create a
password for an intranet account. The password must include ten
characters, numbers, and letters, and two special characters. Once the
passwords is created, the company will grant the employee access to
other company-owned websites based on the interanet profile. Which of
the following access management concepts is the company most likely
using to safeguard intranet accounts and grant access to multiple sites
based on a user's intranet account? (Select TWO)
A. Identity proofing
B. Default password changes
C. Federation
D. Password manager
E. Open authentication
F. Password complexity
Answer237: ACD
A. Ease of recovery
B. Ability to patch
C. Extensible authentication
D. Physical isolation
E. Attack surface
F. Responsiveness
Answer238: ADF
101
Q239: An audit report indicates multiple suspicious attempts to access
company resources were made. These attempts were not detected by the
company. Which of the following would be the best solution to
implement on the company's network?
A. Jump server
B. Intrusion prevention system
C. Proxy server
D. Security zones
Answer239: D
A. Phishing
B. Typosquatting
C. Smishing
D. Social engineering
Answer240: A
A. Directive
B. Corrective
C. Detective
D. Deterrent
Answer241: C
102
Q242: An attacker posing as the Chief Executive Officer calls an
employee and instructs the employee to buy gift cards. Which of the
following techniques is attacker using?
A. Impersonating
B. Phishing
C. Smishing
D. Vishing
Answer242: A
Answer243: A
A. Tertiary
B. Cold
C. Hot
D. Warm
Answer244: C
103
Q245: A threat actor used a sophisticated attack to breach a well-know
ride-sharing company. The threat actor posted media that this action was
in response to the company's treatment of its drivers. Which of the
following best describes this type of threat actor?
A. Nation-state
B. Organized crime
C. Hacktivist
D. Shadow IT
Answer245: C
Q246: An organization is concerned that its hosted web servers are not
running the most updated version of the software. Which of the following
would work best to help identify potential vulnerabilities?
Answer246: A
A. Red
B. Blue
C. Purple
D. White
Answer247: B
104
Q248: Which of the following requirements apply to a CYOD policy?
(Select Two)
Answer248: DF
105
Q249: Select the appropriate attack and remediation from each drop-
down list to label the corresponding attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the
simulation, please click the Reset All button.
106
Answer249:
107
Q250: A systems administrator needs to install a new wireless network
for authenticated guest access. The wireless network should support
802.1X using the most secure encryption and protocol available.
INSTRUCTIONS
Perform the following steps:
1. Configure the RADIUS server.
2. Configure the WiFi controller.
3. Preconfigure the client for an incoming guest.
108
MM
Answer250:
109
Q251: Leveraging the information supplied below, complete the CSR for
the server to set up TLS (HTTPS)
• Hostname: ws01
• Domain: comptia.org
• IPv4: 10.1.9.50
• IPV4: 10.2.10.50
• Root: home.aspx
• DNS CNAME: homesite
INSTRUCTIONS
Drag the various data points to the correct locations within the CSR.
Extension criteria belong in the left-hand column and values belong in the
corresponding row in the right-hand column.
110
Answer251:
INSTRUCTIONS
Please click on the below items on the network diagram and configure
them accordingly:
- WAP
- DHCP Server
- AAA Server
- Wireless Controller
- LDAP Server
If at any time you would like to bring back the initial state of the
simulation, please click the Reset All button.
111
112
Answer252:
113
Q253: An attack has occurred against a company.
INSTRUCTIONS
You have been tasked to do the following:
- Identify the type of attack that is occurring on the network by clicking
on the attacker's tablet and reviewing the output.
- Identify which compensating controls a developer should implement
on the assets, in order to reduce the effectiveness of future attacks by
dragging them to the correct server.
All objects will be used, but not all placeholders may be filled. Objects
may only be used once.
If at any time you would like to bring back the initial state of the
simulation, please click the Reset All button.
114
Answer253:
INSTRUCTIONS
Click on each firewall to do the following:
1. Deny cleartext web traffic.
2. Ensure secure management protocols are used.
3. Resolve issues at the DR site.
The ruleset order cannot be modified due to outside constraints.
If at any time you would like to bring back the initial state of the
simulation, please click the Reset All button.
115
116
117
118
119
Answer254:
A. RAT
B. SQL injection
C. Backdoor
D. Logic bomb
E. Rootkit
Answer255: D
120
Q256: An incident has occurred in the production environment.
A. Rootkit
B. RAT
C. Logic bomb
D. SQL injection
E. Backdoor
Answer256: A
121
122
123
124
125
126
127
Answer257:
128
Q258: A data owner has been tasked with assigning proper data
classifications and destruction methods for various types of data
contained within the environment.
Answer258:
129
Q259: A security engineer is setting up passwordless authentication for
the first time.
Use the minimum set of commands to set this up and verify that it
works. Commands cannot be reused.
If at any time you would like to bring back the initial state of the
simulation, please click the Reset All button.
2. ssh-copy-id -i /.ssh/id_rsa.pub
user@server (copy the
public-key to user@server)
3. ssh -i ~/.ssh/id_rsa
user@server (login to remote
host with private-key)
Answer259:
130
Q260: You are a security administrator investigating a potential infection
on a network.
INSTRUCTIONS
Click on each host and firewall. Review all logs to determine which host
originated the infection and then identify if each remaining host is clean
or infected. If at any time you would like to bring back the initial state of
the simulation, please click the Reset All button.
131
132
133
Answer260:
134
Q245: Which of the following requirements apply to a CYOD policy?
(Select Two)
Answer245: DF
A. Access logging.
B. Data sovereignty.
C. Permission restriction.
D. File integrity monitoring.
Answer246: C
A. Accept
B. Avoid
C. Mitigate
D. Transfer
Answer247: D
vxfg
105
Q248: Which of the following describes the ability of code to target a
hypervisor from inside a guest OS?
A. Fog computing
B. VM escape
C. Software defined networking
D. Image forgery
E. Container breakout
Answer248: B
A. Heat map
B. Input validation
C. Site survey
D. Embedded systems
Answer249: A
1
Q250: a company requires hard drive to be securely wiped before sending
decommissioned systems to recycling. Which of the following describes
this policy?
A. Enumeration
B. Destruction
C. Inventory
D. Sanitization
Answer250: D
A. CVE
B. CIA
C. CVSS
Answer251: C
A. Legal
B. Training
C. Playbook
D. Policies
Answer252: C
2
Q253: which of the following the best way to block unknown programs
from executing?
Answer253: A
A. Legal hold
B. E-discovery
C. Chain of custody
D. Preservation
Answer254: D
A. Zero trust
B. IAM
C. Policy automation
D. PKI
Answer255: A
3
Q256: while troubleshooting a firwall configuration, a techicin determines
that “deny any” policy should be added to the bottom of the ACL. The
technician updates the policy , but the new policy causes several company
servers to become unreachable. Which of the following actions would
prevent this issue?
A. Documenting the new policy in a change request and submitting the request to
change management
B. Including an “allow any” policy above the “deny any” policy
C. Disabiling any intrusion prevention signature on the “deny any” policy prior to
enabling the new policy.
D. Testing the policy in a non-production environment before enableing the policy
in the production network.
Answer256: B
A. A service desk employee receives an email from the HR director asking for log-
in credentials to a cloud administrator account
B. An employee receives a gift card request in an email that has executive name in
the display field of the email.
C. An employee receives an email with a link to a phishing site that is designed to
look like the company email.
D. Employee who open an email attachment receives a message demanding
payment in order to access files.
Answer257: A
A. MSA
4
B. BPA
C. SOW Statement of Work
D. MOU
Answer258: C
A. Microservices
B. API gateway
C. Services
D. Virtualization
Answer259: A
Q260: an analyst concerned about data leaks and wants to restrict access to
internet services to authorized users onl. The analyst also wants to control
the action s of each user can perform on each service. which of the
following would be the best Technology for the analyst ti consider
implementing?
A. VPC
B. Content filtering
C. DLP
D. CASB
Answer260: D
5
Q261: an analyst concerned about data leaks and wants to restrict access to
internet services to authorized users onl. The analyst also wants to control
the action s of each user can perform on each service. which of the
following would be the best Technology for the analyst ti consider
implementing?
A. VPC
B. Content filtering
C. DLP
D. CASB
Answer261: D
A. Compensating controls
B. Exception
C. Segmentation
D. Risk transfer.
Answer262: C
A. EDR
B. NAC Network Access Control
C. XDR
D. DMARC
Answer263: B
6
Q264: An organization would like to store customer date on a
separate part of the network that is not accessible to users on the main
corporate network. Which of the following should the administrator use
to accomplish this goal?
A. Patching
B. Isolation
C. Segmentation
D. Encryption
Answer264: C
A. Permissions assignment
B. Access management
C. Password history
D. Multifactor authentication
Answer265:D
7
Q266: Which of the following has been implemented when host-
based firewall on legacy linux system allows connections from only
specific internal IP addresses?
A. Network segmentation
B. SNMP traps
C. Transfer risk
D. Compensating control
Answer266:D
A. Group policy
B. File integrity mentoring
C. User behavior analytic
D. End point detection and response.
Answer267:B
Answer268:A
8
Q269: A system administrator receives the following alert from a
file integrity mentoring tool:
The hash of the cmd.exe file has changed
The system administrator checks the OS logs and notices that no
patches were applies in the last two months. Which of the following
most likely occurred?
Answer269:B
A. network
B. authentication
C. application
D. error
E. firewall
F. system.
Answer270:BF
Answer271:B
9
Q272: Which of the following agreements defines response time,
escalation points, and performance metrics?
A. NDA
B. MOA
C. SLA Service Level Agreement
D. BPA
Answer272:C
A. Jump server
B. WAF
C. NGFW Next-Generation Firewall
D. Proxy server.
Answer273:C
A. Encryption at rest
B. Permission restriction
C. Masking
D. Data classification
Answer274:A
10
Q275: A chief information security officer (CISO) wants to explicity reise
awareness about the increase of ransomware as a service in a report to the
management team. Which of the following best describes the threat
actor in the CISO’s report ?
A. Hacktivist
B. Incider threat
C. Nation state
D. Organized crime
Answer275:D
A. MTBF
B. RIO
C. ARO Annualized Rate of Occurrence
D. MTTR
Answer276:C
Answer277:A
11
Q278: a security administrator needs a method to secure data in an
environment that includes some form of checks so that the administrator
can track any changes. which of the following should administrator set up
to achieve this goal?
A. SPF
B. GPO
C. NAC
D. FIM File Integrity Monitoring
Answer278:D
Answer279:A
Answer280:A
12
Q281: A company reduced the area utilized in its data center by
creating a virtual networking through automation and by creating
provision routes and rules through scripting. which of the following
does this example describe ?
A. SaaS
B. Containers
C. MSSP
D. IaC (Infrastructure as Code)
Answer281:D
A. PaaS
B. Tursted platform module
C. IaaS
D. HSMaas Hardware Security Module as a Service
Answer282:D
13
Q283: A company has decided to move its operations to the cloud. It
wants to utilize technology that will prevents user from downloading
company application for personal use, restrict data that is uploaded
and have visibility into which application are being used across the
company. which of the following solutions will best meet these
requirments ?
A. An NG SWG
B. CASB
C. Application whitlisting
D. An NGFW
Answer283:B
A. Hoaxes
B. Credentials harvesting
C. Identity fraud
D. SPIMS
Answer284:A
14
Q285: An organization chief information security officer is creating a
position that will be responsible for implementation technical controls
to protect data, including ensuring backups are properly maintained.
which of the following roles would most likely include these
responsibilities ?
A. Data owner
B. Back up administrator
C. Data protection officer
D. Internal auditor
E. Data custodian
Answer285:D
Answer286:D
15
Q287: A recent malware outbreak across a subnet included successful
Endpoints rootkit installation on many PCs, ensuring persistence by rendering
remediation effort ineffective. which of the following would best
detect the presence of a toolkit in the future ?
A. FDE
B. DLP
C. EDR
D. NIDS
Answer287:C
Answer288:A
16
Q289: A recent security breach exploted a software vulnerabilityies in
the firewall and within the network management solution. which of
the following most likely be used to identify when breach occurred
though each device ?
Answer289:A
A. Wirsharck
B. NMAP
C. Autopay
D. DNSEnum
Answer290:B
17
Q291:A company deployed a WIFI access point in public area and
wants to harden the configuration to make it more secure. After
performoing an assment an analyst identifies that the access point is
configured to use WPA3, AES, WPS, and RADIUS. which of the
following should the analyst disable to enhance the access point
security ?
A. WPS
B. WPA3
C. AES
D. RADIUS
Answer291:A
A. Pivoting Pivooooooooot!!!!
B. Presistance
C. Privillge escalation
D. Footprinting
Answer292:A
18
Q293:Historaclly a company has had issues with users plugging in
personally owned removable device into cooprate computers. As a
result the threat of malware incidents is almost constant. which of the
following would best help prevent the mALWARE FROM BRING
INSTALLED ON THE COMPUTERS?
A. EDR
B. AUP
C. DLP
D. NGFW
Answer293:A
Answer294:D
19
Q295:A following a prolonged datacenter outage that affected web-
based sales a company has decided to move its operation to private
clous solution. The security team has received the following
requirements:
1. There must be visibility into how teams are using cloud-based
services
2. The company must be able to identify when data related to
payment cards is being sent to the cloud
3. Data must be available regardless of the end user’s geographic
location
4. Administrator need single pane-of-glass view into traffic and
trends
which of the following should the security analyst recommend ?
Answer295:D
A. Vulnerability database
B. The dark web
C. Automated information sharing
D. Open source intelligence
Answer296:B
20
Q297: which of the following best describes when an organization
utilize a ready to use application from cloud provider ?
A. PaaS
B. XaaS
C. IaaS
D. SaaS
Answer297:D
A. Operational
B. Physical
C. Detective
D. Technical
Answer298:A
21
Q299:During a recent company safety stand-down the cyber
awareness team gave presentation on the importance of cyber
hygiene. One topic the team covered was best practice for printing
centers . which of the following describes an attack method that
relates to printing centers?
A. Whaling
B. Credential harvesting
C. Dumpster diving
D. Prepending
Answer299:C
Answer300:A
22
Q301: which of the following is most likely associated with
introducing vulnerabilities on a corporate network by the deployment
of unapproved software?
A. Hachtivist
B. Script kiddies
C. Competitors
D. Shadoe IT Shadow IT
Answer301:D
A. FTPS
B. SSH
C. HTTPS
D. LDAPS
Answer302:B
23
Q303: which of the following is most effective way to protect an
application server running software that is no longer supported from
network threats?
A. Air gap
B. Barricade
C. Port security
D. Screened subnet
Answer303:D
A. Salting
B. Quantum communication
C. Hashing
D. Prefect forword secrecy
Answer304:A
24
Q305: During an investigation, events from two affected servers in
the same subnetwork occurred at the same time:
Server 1: 192.168.10.1 [01/Apr/2021:06:00:00 PST] SAN access
denied for user ‘admin’
Server 2: 192.168.10.1 [01/Apr/2021:06:01:01 CST] SAN access
denied for user ‘admin’
Which of the following should be consistently configured to prevent
the issue seen in the logs?
A. MFA
B. TOTP
C. NTP (Network Time Protocol)
D. Geolocation
Answer305:C
A. MaaS
B. SaaS
C. PaaS
D. IaaS
Answer306:D
25
Q307: Which of the following ensures an organization can continue
to do business with minimal interruption in the event of a major
disaster?
A. Communication plan
B. Business recovery plan
C. Incident response plan
D. Continuity of operation plan
Answer307:D
Answer308:D
26
Q309: Which of the following involves embedding malware in
routers procured from third-part vendor?
Answer309:D
Answer310:D
27
Answer311:B
Answer312:B
Answer313:C
28
Answer314:C
Q315: which of the following are the most likely vectors for the
unauthorized or unintentional inclusion of vulnerable code in software
company’s final software release? (select two)
A. Weak passwords
B. Vendors/supply chain
C. Use of penteration-testing utilities
D. Included third-party libraries
E. Outdated anti-malware software
F. Certificate mismatch
G. Unsecure protocols if included
Answer315:AF
Answer316:BF
29
A. Deploying a captive portal to capture visitors’ MAC addresses and names
B. Creating a unique PSK for every visitor when they arrive at the reception
area
C. Implementing a new SSID for every event hosted by the college that has
visitors
D. Requiring all new, on-site visitors to configure their devices to use WPS
Answer317:A
Answer318:C
30
Answer319:B
Answer320:A
Answer321:CE
Q322: A security analyst has been tasked with ensuring all programs
that are deployed into the enterprise have been assessed in the runtime
environment. Any critical issues found in the program must be sent
back to the developer for verification and remediation. which of the
following BEST describes the type of assessment taking place?
A. Manual code review
B. Dynamic code analysis
31
C. Fuzzing
D. Input validsation
Answer322:B
Answer323:A
32
33