Its CC 1
Its CC 1
In
order to gather information about the status of the system, you issue the netstat -l
command to display all of the TCP ports that are in the listing state. What does
the Listening state indicate about these ports?
2. Move each NIST incident Response Lifecycle phase from the list on the left to
the correct description on the right.
Note: You will receive partial credit for each correct answer.
4. What enables the network security team to keep track of the operating system
version, security updates, and patches on end user’s devices?
A. A DNS record.
B. A NAT rule
C. A record in the host file
D. An ACL
6. Which two private IPv4 addresses would be blocked on the internet to prevent
security and performance issues? (Choose 2)
Note: You will receive partial credit for each correct selection.
A. 203.0.113.168
B. 192.168.18.189
C. 224.0.2.172
D. 172.18.100.78
7. While conducting a risk evaluation at your company, you identify risks that are
related to the web server located in the office. The risks include hardware and
software failure as well as web service interruption caused by cyber attacks. You
recommend purchasing insurance and hiring another organization to maintain the
web server to help mitigate the risks.
A. Risk reduction
B. Risk avoidance
C. Risk acceptance
D. Risk transfer
8. Move each definition from the list on the left to the correct CIA Triad term on the
right. Note: You will receive partial credit for each correct answer.
A. Spear phishing
B. Smishing
C. Ransomware
D. Vishing
10. Your home network seems to have slowed down considerably. You look at the
home router GUI and notice that an unknown host is attached to the network.
What should you do to prevent this specific host from attaching to the network
again?
A. False negative
B. False positive
C. True negative
D. True positive
12. You are working with the senior administration team to identify potential risks.
Which phase of risk management are you in?
A. Ransomware
B. Man-in-the-middle
C. APT
D. DDoS
14. You need to allow employees to access your company’s secure network from
their homes. Which type of security should you implement?
A. SNMP
B. VPN
C. BYOD
D. IDS
15. Which data type is protected through hard disk encryption?
A. Data in process
B. Data at rest
C. Data in transit
D. Data in use
16. You need to transfer configuration files to a router across an unsecured network.
Which protocol should you use to encrypt the files in transit?
A. TFTP
B. HTTP
C. SSH
D. Telnet
17. You are monitoring the syslog server and observe that the DNS server is
sending messages with a Warning severity. What do these messages indicate
about the operation of the DNS server?
A. The DNS server is unusable due to a severe malfunction and is shutting down
B. The server has a hardware error that does not require immediate attention
C. A condition exists that will cause errors in the future if the issue is not fixed.
D. An error condition is occurring that must be addressed immedidately
18. Move each cybersecurity tool from the list on the left to the correct location on
the Vulnerability Management Process diagram on the right
Note: You will receive partial credit for each correct response.
19. You are security technician. You just completed a full scan of a Windows 10 PC.
Where should you go to view the scan result?
21. Several employees complain that the company intranet site is no longer
accepting their login information. You attempt to connect by using the URL and
notice some misspellings on the site. When you connect by using IP address the
site functions normally. What should you do?
A. Verify the accuracy of the entry for the site in the local DNS server.
B. Take the company web portal offline immediately
C. Update the web server software to the latest version
D. Restore a backup copy of the authentication database.
22. Move each worm mitigation step from the list on the left to the correct description
on the right. Note: You will receive partial credit for each correct answer.
23. Several staff members are experiencing unexplained computer crashes and
many unwanted pop-up messages. Which two actions should you take
immediately to address the problem without impacting data? ( choose 2)
Note: You will receive partial credit for each correct selection.
25. Move each cybersecurity term from the list on the left to the correct description
on the right. Note: You will receive partial credit for each correct answers.
26. You need to filter the websites that are available to employees on the company
network. Which type of device should you deploy?
A. IPS
B. Proxy server
C. IDS
D. Honeypot
27. A security analyst discovers that a hacker was able to gain root access to an
enterprise Linux server. The hacker accessed the server as a guest, used a
program to bypass the root password and then killed essential processes as the
root user. Which type of endpoint attack is this?
A. Buffer overflow
B. DDoS
C. Privilege escalation
D. Brute force
28. For each statement, select True if the statement adheres to the cybersecurity
code of ethics or False if it does not. Note: You will receive partial credit for each
correct selection:
29. Which wireless encryption technology required AES to secure home wireless
network?
A. WEP
B. WPA
C. WPA2
D. TKIP
30. Which three authentication factors are valid for use in a multifactor
authentication scenario? (choose 3)
31. Move the appropriate control measures from the list on the left to the correct
descriptions on the right. You may use each control measure once, more than
once or not at all. Note. You will receive partial for each correct answer.
32. What are two natural disasters that would cause a company to implement a
disaster recovery plan? (choose 2).
33. After an administrator installs an operating system update on a laptop, the laptop
user can no longer print to their wireless printer. What should solve the issue?
35. You are reviewing company remote access procedures and notice that telnet is
being used to connect to the corporate database server to check on inventory
levels. Which two actions should you take immediately? (choose 2).
37. Move each windows host log type from the list on the left to the correct
description on the right. Note: You will receive partial credit for each correct
answer.
38. Which two basic metrics should be taken into consideration when assigning a
severity to a vulnerability during an assessment? (Choose 2)
Note: You will receive partial credit for each correct selection
A. The likelihood that an adversary can and will exploit the vulnerability
B. The impacts that an exploit of the vulnerability will have on the organization
C. The time involved n choosing replacement software to replace older systems
D. The age of the hardware running the software that contains the vulnerability
A. Threat actors can access the databases to learn how to vary their threats to
avoid detection.
B. Publicly available database are incompatible with most security platform
C. It can take a long time for reported vulnerabilities to be investigated ang
approved for addition to the databases
D. It is costly for intelligence analysts to document and submit newly discovered
vulnerabilities.
40. Move each framework from the list on the left to the correct purpose on the right
Note: You will receive partial credit for each correct answer.
41. Which command displays both the configured DNS server information and the IP
address resolution for a URL?
A. Ping
B. Nslookup
C. Traceroute
D. Nmap
42. Customers of an online shopping store are complaining that they cannot visit the
website. As an IT technician, you restart the website. After 30 minutes, the
website crashes again. You suspect that the website has experiencing
Which type of cybersecurity threat should you investigate?
A. Spear phishing
B. Ransomware
C. Denial of service
D. Social engineering
43. You are a security analyst. You are reviewing output from the SIEM. You notice
an alert concerning malicious files detected by the IDS. After reviewing the user,
device and posture information you determine that it is a valid
What should you do next?
44. In order to do online banking, you enter a strong password and then enter the 5-
digit code sent to you on your smartphone. Which type of authentication does
this situation describe?
A. VPN
B. Multifactor
C. AAA
D. RADIUS
A. Data integrity
B. Data encryption
C. Data non-repudiation
D. Origin authentication
46. You work for a community health care organization that uses an electronic health
record (HER) system. You have implemented the physical and technical
safeguards required by HIPAA. You need to prove that the EHR system is
compliant with those safeguards. Which two approaches should you use to
verify the system is compliant? (choose 2). Note: You will receive partial credit
for each correct selection.