10/248 questions · Unlock full access
Q1

A cybersecurity technician at a financial services firm is tasked with implementing a technical control to prevent unauthorized devices from connecting to the corporate wired network. The solution must automatically assess the security posture of any device attempting to connect and place non-compliant devices into a quarantined VLAN for remediation. Which of the following technologies is best suited to meet these requirements?

Q2

A technician is analyzing a packet capture from a host experiencing slow network performance. They observe a large number of TCP packets with the SYN flag set being sent to a single server port, but very few corresponding SYN/ACK replies. The source IP addresses of these packets are varied and appear to be spoofed. What type of network event is most likely occurring?

Q3

A retail company is upgrading its in-store Wi-Fi network. The security team has mandated the use of the most current and secure wireless encryption protocol available to protect customer data. Which protocol should the network technician implement?

Q4Multiple answers

During a forensic investigation of a compromised web server, a digital forensics specialist creates a bit-for-bit copy of the server's hard drive. To ensure the integrity of this copy, the specialist calculates a unique value for both the original drive and the image file. What is this value called, and which of the following algorithms is commonly used to generate it? (Select TWO).

Q5

A software development team is building a new e-commerce application. The security team mandates that all sensitive data, such as credit card numbers, must be protected while stored in the database. The same key will be used for both encrypting and decrypting this data. Which type of cryptography should be implemented?

Q6

A developer is writing code for a web application's login page. To prevent a common web vulnerability, the developer ensures that the application's response to a failed login attempt is identical whether the username is valid or invalid. Which specific attack is this practice designed to mitigate?

Q7

True or False: In a cloud Infrastructure as a Service (IaaS) model, the cloud provider is responsible for patching the operating systems of the virtual machines deployed by the customer.

Q8

A security analyst is reviewing firewall logs and notices a large volume of inbound traffic from a known malicious IP address has been blocked. The firewall rule that blocked the traffic was automatically created earlier that day. Which security technology MOST likely provided the threat data and instructed the firewall to create the rule?

Q9

A hospital is deploying a new network of IoT medical devices (infusion pumps) that must communicate with a central server. These devices have limited processing power and do not support enterprise-grade authentication protocols like 802.1X. The security technician needs to secure the wireless network for these devices while preventing unauthorized connections. Which of the following is the most appropriate security measure in this scenario?

Q10

A company's incident response plan is based on the NIST framework. A security analyst has just finished isolating several compromised systems from the network to prevent the spread of a malware infection. According to the NIST incident response lifecycle, what is the IMMEDIATE next phase?