Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Security+ > SY0-701

SY0-701 CompTIA Security+ Exam 2025 Question and Answers

Question # 4

An incident response specialist must stop a malicious attack from expanding to other parts of an organization. Which of the following should the incident response specialist perform first?

A.

Eradication

B.

Recovery

C.

Containment

D.

Simulation

Full Access
Question # 5

A security analyst is reviewing logs and discovers the following:

Which of the following should be used lo best mitigate this type of attack?

A.

Input sanitization

B.

Secure cookies

C.

Static code analysis

D.

Sandboxing

Full Access
Question # 6

Which of the following would be the greatest concern for a company that is aware of the consequences of non-compliance with government regulations?

A.

Right to be forgotten

B.

Sanctions

C.

External compliance reporting

D.

Attestation

Full Access
Question # 7

Which of the following would most likely be used by attackers to perform credential harvesting?

A.

Social engineering

B.

Supply chain compromise

C.

Third-party software

D.

Rainbow table

Full Access
Question # 8

A security manager is implementing MFA and patch management. Which of the following would best describe the control type and category? (Select two).

A.

Physical

B.

Managerial

C.

Detective

D.

Administrator

E.

Preventative

F.

Technical

Full Access
Question # 9

Which of the following are the best methods for hardening end user devices? (Select two)

A.

Full disk encryption

B.

Group-level permissions

C.

Account lockout

D.

Endpoint protection

E.

Proxy server

F.

Segmentation

Full Access
Question # 10

A new employee can select a particular make and model of an employee workstation from a preapproved list. Which of the following is this an example of?

A.

MDM

B.

CYOD

C.

PED

D.

COPE

Full Access
Question # 11

Which of the following is a compensating control for providing user access to a high-risk website?

A.

Enabling threat prevention features on the firewall

B.

Configuring a SIEM tool to capture all web traffic

C.

Setting firewall rules to allow traffic from any port to that destination

D.

Blocking that website on the endpoint protection software

Full Access
Question # 12

Which of the following is the most common data loss path for an air-gapped network?

A.

Bastion host

B.

Unsecured Bluetooth

C.

Unpatched OS

D.

Removable devices

Full Access
Question # 13

Two companies are in the process of merging. The companies need to decide how to standardize their information security programs. Which of the following would best align the security programs?

A.

Shared deployment of CIS baselines

B.

Joint cybersecurity best practices

C.

Both companies following the same CSF

D.

Assessment of controls in a vulnerability report

Full Access
Question # 14

A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?

A.

Send out periodic security reminders.

B.

Update the content of new hire documentation.

C.

Modify the content of recurring training.D Implement a phishing campaign

Full Access
Question # 15

A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

A.

SSO

B.

LEAP

C.

MFA

D.

PEAP

Full Access
Question # 16

An employee fell for a phishing scam, which allowed an attacker to gain access to a company PC. The attacker scraped the PC’s memory to find other credentials. Without cracking these credentials, the attacker used them to move laterally through the corporate network. Which of the following describes this type of attack?

A.

Privilege escalation

B.

Buffer overflow

C.

SQL injection

D.

Pass-the-hash

Full Access
Question # 17

A security analyst wants to better understand the behavior of users and devices in order to gain visibility into potential malicious activities. The analyst needs a control to detect when actions deviate from a common baseline Which of the following should the analyst use?

A.

Intrusion prevention system

B.

Sandbox

C.

Endpoint detection and response

D.

Antivirus

Full Access
Question # 18

An organization's web servers host an online ordering system. The organization discovers that the servers are vulnerable to a malicious JavaScript injection, which could allow attackers to access customer payment information. Which of the following mitigation strategies would be most effective for preventing an attack on the organization's web servers? (Select two).

A.

Regularly updating server software and patches

B.

Implementing strong password policies

C.

Encrypting sensitive data at rest and in transit

D.

Utilizing a web-application firewall

E.

Performing regular vulnerability scans

F.

Removing payment information from the servers

Full Access
Question # 19

A security administrator needs to reduce the attack surface in the company's data centers. Which of the following should the security administrator do to complete this task?

A.

Implement a honeynet.

B.

Define Group Policy on the servers.

C.

Configure the servers for high availability.

D.

Upgrade end-of-support operating systems.

Full Access
Question # 20

A company's website is www. Company. com Attackers purchased the domain wwww. company.com Which of the following types of attacks describes this example?

A.

Typosquatting

B.

Brand Impersonation

C.

On-path

D.

Watering-hole

Full Access
Question # 21

A security analyst is reviewing logs to identify the destination of command-and-control traffic originating from a compromised device within the on-premises network. Which of the following is the best log to review?

A.

IDS

B.

Antivirus

C.

Firewall

D.

Application

Full Access
Question # 22

Which of the following would enable a data center to remain operational through a multiday power outage?

A.

Generator

B.

Uninterruptible power supply

C.

Replication

D.

Parallel processing

Full Access
Question # 23

Which of the following would most likely be deployed to obtain and analyze attacker activity and techniques?

A.

Firewall

B.

IDS

C.

Honeypot

D.

Layer 3 switch

Full Access
Question # 24

A government worker secretly copies classified files that contain defense tactics information to an external drive. The government worker then gives the external drive to a corrupt organization. Which of the following best describes the motivation of the worker?

A.

Espionage

B.

Data exfiltration

C.

Financial gain

D.

Blackmail

Full Access
Question # 25

A forensic engineer determines that the root cause of a compromise is a SQL injection attack. Which of the following should the engineer review to identify the command used by the threat actor?

A.

Metadata

B.

Application log

C.

System log

D.

Netflow log

Full Access
Question # 26

A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?

A.

Clustering servers

B.

Geographic dispersion

C.

Load balancers

D.

Off-site backups

Full Access
Question # 27

While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable.

Which of the following actions would prevent this issue?

A.

Documenting the new policy in a change request and submitting the request to change management

B.

Testing the policy in a non-production environment before enabling the policy in the production network

C.

Disabling any intrusion prevention signatures on the 'deny any* policy prior to enabling the new policy

D.

Including an 'allow any1 policy above the 'deny any* policy

Full Access
Question # 28

A company is implementing a vendor's security tool in the cloud. The security director does not want to manage users and passwords specific to this tool but would rather utilize the company's standard user directory. Which of the following should the company implement?

A.

802.1X

B.

SAML

C.

RADIUS

D.

CHAP

Full Access
Question # 29

A company is planning a disaster recovery site and needs to ensure that a single natural disaster would not result in the complete loss of regulated backup data. Which of the following should the company consider?

A.

Geographic dispersion

B.

Platform diversity

C.

Hot site

D.

Load balancing

Full Access
Question # 30

An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using?

A.

Smishing

B.

Disinformation

C.

Impersonating

D.

Whaling

Full Access
Question # 31

Which of the following metrics impacts the backup schedule as part of the BIA?

A.

RTO

B.

RPO

C.

MTTR

D.

MTBF

Full Access
Question # 32

A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data. Which of the following should the administrator do first?

A.

Block access to cloud storage websites.

B.

Create a rule to block outgoing email attachments.

C.

Apply classifications to the data.

D.

Remove all user permissions from shares on the file server.

Full Access
Question # 33

Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?

A.

ARO

B.

RTO

C.

RPO

D.

ALE

E.

SLE

Full Access
Question # 34

A systems administrator needs to encrypt all data on employee laptops. Which of the following encryption levels should be implemented?

A.

Volume

B.

Partition

C.

Full disk

D.

File

Full Access
Question # 35

As part of new compliance audit requirements, multiple servers need to be segmented on different networks and should be reachable only from authorized internal systems. Which of the following would meet the requirements?

A.

Configure firewall rules to block external access to Internal resources.

B.

Set up a WAP to allow internal access from public networks.

C.

Implement a new IPSec tunnel from internal resources.

D.

Deploy an Internal Jump server to access resources.

Full Access
Question # 36

Which of the following alert types is the most likely to be ignored over time?

A.

True positive

B.

True negative

C.

False positive

D.

False negative

Full Access
Question # 37

A company is changing its mobile device policy. The company has the following requirements:

Company-owned devices

Ability to harden the devices

Reduced security risk

Compatibility with company resources

Which of the following would best meet these requirements?

A.

BYOD

B.

CYOD

C.

COPE

D.

COBO

Full Access
Question # 38

Which of the following is used to validate a certificate when it is presented to a user?

A.

OCSP

B.

CSR

C.

CA

D.

CRC

Full Access
Question # 39

A cybersecurity incident response team at a large company receives notification that malware is present on several corporate desktops No known Indicators of compromise have been found on the network. Which of the following should the team do first to secure the environment?

A.

Contain the Impacted hosts

B.

Add the malware to the application blocklist.

C.

Segment the core database server.

D.

Implement firewall rules to block outbound beaconing

Full Access
Question # 40

A company wants to ensure employees are allowed to copy files from a virtual desktop during the workday but are restricted during non-working hours. Which of the following security measures should the company set up?

A.

Digital rights management

B.

Role-based access control

C.

Time-based access control

D.

Network access control

Full Access
Question # 41

During a penetration test in a hypervisor, the security engineer is able to inject a malicious payload and access the host filesystem. Which of the following best describes this vulnerability?

A.

VM escape

B.

Cross-site scripting

C.

Malicious update

D.

SQL injection

Full Access
Question # 42

Which of the following are the best for hardening end-user devices? (Selecttwo)

A.

Full disk encryption

B.

Group-level permissions

C.

Account lockout

D.

Endpoint protection

E.

Proxy server

F.

Segmentation

Full Access
Question # 43

While a school district is performing state testing, a security analyst notices all internet services are unavailable. The analyst discovers that ARP poisoning is occurring on the network and then terminates access for the host. Which of the following is most likely responsible for this malicious activity?

A.

Unskilled attacker

B.

Shadow IT

C.

Credential stuffing

D.

DMARC failure

Full Access
Question # 44

A company is in the process of migrating to cloud-based services. The company's IT department has limited resources for migration and ongoing support. Which of the following best meets the company's needs?

A.

IPS

B.

WAF

C.

SASE

D.

IAM

Full Access
Question # 45

Which of the following techniques would identify whether data has been modified in transit?

A.

Hashing

B.

Tokenization

C.

Masking

D.

Encryption

Full Access
Question # 46

Which of the following Is a common, passive reconnaissance technique employed by penetration testers in the early phases of an engagement?

A.

Open-source intelligence

B.

Port scanning

C.

Pivoting

D.

Exploit validation

Full Access
Question # 47

A company's marketing department collects, modifies, and stores sensitive customer data. The infrastructure team is responsible for securing the data while in transit and at rest. Which of the following data roles describes the customer?

A.

Processor

B.

Custodian

C.

Subject

D.

Owner

Full Access
Question # 48

Which of the following activities uses OSINT?

A.

Social engineering testing

B.

Data analysis of logs

C.

Collecting evidence of malicious activity

D.

Producing IOC for malicious artifacts

Full Access
Question # 49

After multiple phishing simul-ations, the Chief Security Officer announces a new program that incentivizes employees to not click phishing links in the upcoming quarter. Which of the following security awareness execution techniques does this represent?

A.

Computer-based training

B.

Insider threat awareness

C.

SOAR playbook

D.

Gamification

Full Access
Question # 50

Which of the following receives logs from various devices and services, and then presents alerts?

A.

SIEM

B.

SCADA

C.

SNMP

D.

SCAP

Full Access
Question # 51

During a SQL update of a database, a temporary field that was created was replaced by an attacker in order to allow access to the system. Which of the following best describes this type of vulnerability?

A.

Race condition

B.

Memory injection

C.

Malicious update

D.

Side loading

Full Access
Question # 52

An IT administrator needs to ensure data retention standards are implemented on an enterprise application. Which of the following describes the administrator's role?

A.

Processor

B.

Custodian

C.

Privacy officer

D.

Owner

Full Access
Question # 53

Which of the following tasks is typically included in the BIA process?

A.

Estimating the recovery time of systems

B.

Identifying the communication strategy

C.

Evaluating the risk management plan

D.

Establishing the backup and recovery procedures

E.

Developing the incident response plan

Full Access
Question # 54

Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?

A.

Availability

B.

Confidentiality

C.

Integrity

D.

Non-repudiation

Full Access
Question # 55

Which of the following should a security operations center use to improve its incident response procedure?

A.

Playbooks

B.

Frameworks

C.

Baselines

D.

Benchmarks

Full Access
Question # 56

Which of the following should an organization use to protect its environment from external attacks conducted by an unauthorized hacker?

A.

ACL

B.

IDS

C.

HIDS

D.

NIPS

Full Access
Question # 57

Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?

A.

Hacktivist

B.

Whistleblower

C.

Organized crime

D.

Unskilled attacker

Full Access
Question # 58

Which of the following would most likely prevent exploitation of an end-of-life, business-critical system?

A.

Monitoring

B.

Isolation

C.

Decommissioning

D.

Encryption

Full Access
Question # 59

A program manager wants to ensure contract employees can only use the company’s computers Monday through Friday from 9 a.m. to 5 p.m. Which of the following would best enforce this access control?

A.

Creating a GPO for all contract employees and setting time-of-day log-in restrictions

B.

Creating a discretionary access policy and setting rule-based access for contract employees

C.

Implementing an OAuth server and then setting least privilege for contract employees

D.

Implementing SAML with federation to the contract employees' authentication server

Full Access
Question # 60

The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?

A.

Hot site

B.

Cold site

C.

Failover site

D.

Warm site

Full Access
Question # 61

A Chief Information Security Officer (CISO) has developed information security policies that relate to the software development methodology. Which of the following would the CISO most likely include in the organization's documentation?

A.

Peer review requirements

B.

Multifactor authentication

C.

Branch protection tests

D.

Secrets management configurations

Full Access
Question # 62

A company is adding a clause to its AUP that states employees are not allowed to modify the operating system on mobile devices. Which of the following vulnerabilities is the organization addressing?

A.

Cross-site scripting

B.

Buffer overflow

C.

Jailbreaking

D.

Side loading

Full Access
Question # 63

A company plans to secure its systems by:

Preventing users from sending sensitive data over corporate email

Restricting access to potentially harmful websites

Which of the following features should the company set up? (Select two).

A.

DLP software

B.

DNS filtering

C.

File integrity monitoring

D.

Stateful firewall

E.

Guardralls

F.

Antivirus signatures

Full Access
Question # 64

Which of the following is required for an organization to properly manage its restore process in the event of system failure?

A.

IRP

B.

DRP

C.

RPO

D.

SDLC

Full Access
Question # 65

An employee from the accounting department logs in to a website. A desktop application automatically downloads on the employee's computer. Which of the following has occurred?

A.

XSS

B.

Watering hole

C.

Typosquatting

D.

Buffer overflow

Full Access
Question # 66

Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated:

“I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address.”

Which of the following are the best responses to this situation? (Choose two).

A.

Cancel current employee recognition gift cards.

B.

Add a smishing exercise to the annual company training.

C.

Issue a general email warning to the company.

D.

Have the CEO change phone numbers.

E.

Conduct a forensic investigation on the CEO's phone.

F.

Implement mobile device management.

Full Access
Question # 67

A systems administrator wants to use a technical solution to explicitly define file permissions for the entire team. Which of the following should the administrator implement?

A.

ACL

B.

Monitoring

C.

Isolation

D.

HIPS

Full Access
Question # 68

An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25. Which of the following firewall ACLs will accomplish this goal?

A.

Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53Access list outbound deny 10.50.10.25/32 0.0.0.0/0 port 53

B.

Access list outbound permit 0.0.0.0/0 10.50.10.25/32 port 53Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53

C.

Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53

D.

Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53

Full Access
Question # 69

Which of the following describes effective change management procedures?

A.

Approving the change after a successful deployment

B.

Having a backout plan when a patch fails

C.

Using a spreadsheet for tracking changes

D.

Using an automatic change control bypass for security updates

Full Access
Question # 70

Which of the following is the most important element when defining effective security governance?

A.

Discovering and documenting external considerations

B.

Developing procedures for employee onboarding and offboarding

C.

Assigning roles and responsibilities for owners, controllers, and custodians

D.

Defining and monitoring change management procedures

Full Access
Question # 71

A few weeks after deploying additional email servers, a company begins to receive complaints that messages are going into recipients’ spam folders. Which of the following needs to be updated?

A.

CNAME

B.

SMTP

C.

DLP

D.

SPF

Full Access
Question # 72

A government official receives a blank envelope containing photos and a note instructing the official to wire a large sum of money by midnight to prevent the photos from being leaked on the Internet. Which of the following best describes the threat actor's intent?

A.

Organized crime

B.

Philosophical beliefs

C.

Espionage

D.

Blackmail

Full Access
Question # 73

Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?

A.

Remote access points should fail closed.

B.

Logging controls should fail open.

C.

Safety controls should fail open.

D.

Logical security controls should fail closed.

Full Access
Question # 74

Malware spread across a company's network after an employee visited a compromised industry blog. Which of the following best describes this type of attack?

A.

Impersonation

B.

Disinformation

C.

Watering-hole

D.

Smishing

Full Access
Question # 75

An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?

A.

RDP server

B.

Jump server

C.

Proxy server

D.

Hypervisor

Full Access
Question # 76

Which of the following technologies can achieve microsegmentation?

A.

Next-generation firewalls

B.

Software-defined networking

C.

Embedded systems

D.

Air-gapped

Full Access
Question # 77

A legacy device is being decommissioned and is no longer receiving updates or patches. Which of the following describes this scenario?

A.

End of business

B.

End of testing

C.

End of support

D.

End of life

Full Access
Question # 78

Which of the following would a security administrator use to comply with a secure baseline during a patch update?

A.

Information security policy

B.

Service-level expectations

C.

Standard operating procedure

D.

Test result report

Full Access
Question # 79

A vendor salesperson is a personal friend of a company’s Chief Financial Officer (CFO). The company recently made a large purchase from the vendor, which was directly approved by the CFO. Which of the following best describes this situation?

A.

Rules of engagement

B.

Conflict of interest

C.

Due diligence

D.

Contractual impact

E.

Reputational damage

Full Access
Question # 80

Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

A.

Public key infrastructure

B.

Open public ledger

C.

Public key encryption

D.

Key escrow

Full Access
Question # 81

A company uses its backups to recover from a ransomware attack. Which of the following best guarantees that the backups are not infected?

A.

Immutability

B.

Destruction

C.

Sanitization

D.

Retention

Full Access
Question # 82

Which of the following best explains a concern with OS-based vulnerabilities?

A.

An exploit would give an attacker access to system functions that span multiple applications.

B.

The OS vendor's patch cycle is not frequent enough to mitigate the large number of threats.

C.

Most users trust the core operating system features and may not notice if the system has been compromised.

D.

Exploitation of an operating system vulnerability is typically easier than any other vulnerability.

Full Access
Question # 83

While reviewing a recent compromise, a forensics team discovers that there are hard-coded credentials in the database connection strings. Which of the following assessment types should be performed during software development to prevent this from reoccurring?

A.

Vulnerability scan

B.

Penetration test

C.

Static analysis

D.

Quality assurance

Full Access
Question # 84

Which of the following is used to protect a computer from viruses, malware, and Trojans being installed and moving laterally across the network?

A.

IDS

B.

ACL

C.

EDR

D.

NAC

Full Access
Question # 85

Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?

A.

Destruction

B.

Certification

C.

Retention

D.

Sanitization

Full Access
Question # 86

An administrator needs to perform server hardening before deployment. Which of the following steps should the administrator take? (Select two).

A.

Disable default accounts.

B.

Add the server to the asset inventory.

C.

Remove unnecessary services.

D.

Document default passwords.

E.

Send server logs to the SIEM.

F.

Join the server to the corporate domain.

Full Access
Question # 87

A company is working with a vendor to perform a penetration test Which of the following includes an estimate about the number of hours required to complete the engagement?

A.

SOW

B.

BPA

C.

SLA

D.

NDA

Full Access
Question # 88

A vendor needs to remotely and securely transfer files from one server to another using the command line. Which of the following protocols should be Implemented to allow for this type of access? (Select two).

A.

SSH

B.

SNMP

C.

RDP

D.

S/MIME

E.

SMTP

F.

SFTP

Full Access
Question # 89

Which of the following must be considered when designing a high-availability network? (Choose two).

A.

Ease of recovery

B.

Ability to patch

C.

Physical isolation

D.

Responsiveness

E.

Attack surface

F.

Extensible authentication

Full Access
Question # 90

The Chief Information Security Officer wants to discuss options for a disaster recovery site that allows the business to resume operations as quickly as possible. Which of the following solutions meets this requirement?

A.

Hot site

B.

Cold site

C.

Geographic dispersion

D.

Warm site

Full Access
Question # 91

An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a “page not found” error message. Which of the following types of social engineering attacks occurred?

A.

Brand impersonation

B.

Pretexting

C.

Typosquatting

D.

Phishing

Full Access
Question # 92

A manufacturing organization receives the results from a penetration test. According to the results, legacy devices that are critical to continued business function display vulnerabilities. The devices have minimal vendor support and should be segmented and monitored closely. Which of the following devices were most likely identified?

A.

Workstations

B.

Embedded systems

C.

Core router

D.

DNS server

Full Access
Question # 93

An organization wants a third-party vendor to do a penetration test that targets a specific device. The organization has provided basic information about the device. Which of the following best describes this kind of penetration test?

A.

Partially known environment

B.

Unknown environment

C.

Integrated

D.

Known environment

Full Access
Question # 94

Which of the following best protects sensitive data in transit across a geographically dispersed Infrastructure?

A.

Encryption

B.

Masking

C.

Tokenization

D.

Obfuscation

Full Access
Question # 95

An administrator has identified and fingerprinted specific files that will generate an alert if an attempt is made to email these files outside of the organization. Which of the following best describes the tool the administrator is using?

A.

DLP

B.

SNMP traps

C.

SCAP

D.

IPS

Full Access
Question # 96

Which of the following is the main consideration when a legacy system that is a critical part of a company's infrastructure cannot be replaced?

A.

Resource provisioning

B.

Cost

C.

Single point of failure

D.

Complexity

Full Access
Question # 97

An IT manager is increasing the security capabilities of an organization after a data classification initiative determined that sensitive data could be exfiltrated from the environment. Which of the following solutions would mitigate the risk?

A.

XDR

B.

SPF

C.

DLP

D.

DMARC

Full Access
Question # 98

Which of the following describes the category of data that is most impacted when it is lost?

A.

Confidential

B.

Public

C.

Private

D.

Critical

Full Access
Question # 99

A company is currently utilizing usernames and passwords, and it wants to integrate an MFA method that is seamless, can Integrate easily into a user's workflow, and can utilize employee-owned devices. Which of the following will meet these requirements?

A.

Push notifications

B.

Phone call

C.

Smart card

D.

Offline backup codes

Full Access
Question # 100

An organization has issues with deleted network share data and improper permissions. Which solution helps track and remediate these?

A.

DLP

B.

EDR

C.

FIM

D.

ACL

Full Access
Question # 101

An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?

A.

Data in use

B.

Data in transit

C.

Geographic restrictions

D.

Data sovereignty

Full Access
Question # 102

Which of the following should be used to select a label for a file based on the file's value, sensitivity, or applicable regulations?

A.

Verification

B.

Certification

C.

Classification

D.

Inventory

Full Access
Question # 103

Company A jointly develops a product with Company B, which is located in a different country. Company A finds out that their intellectual property is being shared with unauthorized companies. Which of the following has been breached?

A.

SLA

B.

AUP

C.

SOW

D.

MOA

Full Access
Question # 104

An external security assessment report indicates a high click rate on suspicious emails. The Chief Intelligence Security Officer (CISO) must reduce this behavior. Which of the following should the CISO do first?

A.

Update the acceptable use policy.

B.

Deploy a password management solution.

C.

Issue warning letters to affected users.

D.

Implement a phishing awareness campaign.

Full Access
Question # 105

An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?

A.

Compromise

B.

Retention

C.

Analysis

D.

Transfer

E.

Inventory

Full Access
Question # 106

An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?

A.

Multifactor authentication

B.

Permissions assignment

C.

Access management

D.

Password complexity

Full Access
Question # 107

A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?

A.

Threshold

B.

Appetite

C.

Tolerance

D.

Register

Full Access
Question # 108

Which of the following activities should be performed first to compile a list of vulnerabilities in an environment?

A.

Automated scanning

B.

Penetration testing

C.

Threat hunting

D.

Log aggregation

E.

Adversarial emulation

Full Access
Question # 109

A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?

A.

Memory injection

B.

Race condition

C.

Side loading

D.

SQL injection

Full Access
Question # 110

A company installed cameras and added signs to alert visitors that they are being recorded. Which of the following controls did the company implement? (Select two).

A.

Directive

B.

Deterrent

C.

Preventive

D.

Detective

E.

Corrective

F.

Technical

Full Access
Question # 111

A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?

A.

Air gap the system.

B.

Move the system to a different network segment.

C.

Create a change control request.

D.

Apply the patch to the system.

Full Access
Question # 112

Which of the following is a use of CVSS?

A.

To determine the cost associated with patching systems

B.

To identify unused ports and services that should be closed

C.

To analyze code for defects that could be exploited

D.

To prioritize the remediation of vulnerabilities

Full Access
Question # 113

A university employee logged on to the academic server and attempted to guess the system administrators' log-in credentials. Which of the following security measures should the university have implemented to detect the employee's attempts to gain access to the administrators' accounts?

A.

Two-factor authentication

B.

Firewall

C.

Intrusion prevention system

D.

User activity logs

Full Access
Question # 114

A software developer released a new application and is distributing application files via the developer’s website. Which of the following should the developer post on the website to allow users to verify the integrity of the downloaded files?

A.

Hashes

B.

Certificates

C.

Algorithms

D.

Salting

Full Access
Question # 115

In which of the following will unencrypted PLC management traffic most likely be found?

A.

SDN

B.

IoT

C.

VPN

D.

SCADA

Full Access
Question # 116

Which of the following describes a situation where a user is authorized before being authenticated?

A.

Privilege escalation

B.

Race condition

C.

Tailgating

D.

Impersonation

Full Access
Question # 117

Which of the following best describe a penetration test that resembles an actual external attach?

A.

Known environment

B.

Partially known environment

C.

Bug bounty

D.

Unknown environment

Full Access
Question # 118

An employee clicked a malicious link in an email and downloaded malware onto the company's computer network. The malicious program exfiltrated thousands of customer records. Which of the following should the company implement to prevent this in the future?

A.

User awareness training

B.

Network monitoring

C.

Endpoint protection

D.

Data loss prevention

Full Access
Question # 119

A company decides to purchase an insurance policy. Which of the following risk management strategies is this company implementing?

A.

Mitigate

B.

Accept

C.

Avoid

D.

Transfer

Full Access
Question # 120

Which of the following is a technical security control?

A.

Security guard

B.

Policy

C.

Fence

D.

Firewall

Full Access
Question # 121

A company is expanding its threat surface program and allowing individuals to security test the company’s internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?

A.

Open-source intelligence

B.

Bug bounty

C.

Red team

D.

Penetration testing

Full Access
Question # 122

Which of the following could potentially be introduced at the time of side loading?

A.

User impersonation

B.

Rootkit

C.

On-path attack

D.

Buffer overflow

Full Access
Question # 123

An important patch for a critical application has just been released, and a systems administrator is identifying all of the systems requiring the patch. Which of the following must be maintained in order to ensure that all systems requiring the patch are updated?

A.

Asset inventory

B.

Network enumeration

C.

Data certification

D.

Procurement process

Full Access
Question # 124

A new corporate policy requires all staff to use multifactor authentication to access company resources. Which of the following can be utilized to set up this form of identity and access management? (Select two)

A.

Authentication tokens

B.

Least privilege

C.

Biometrics

D.

LDAP

E.

Password vaulting

F.

SAML

Full Access
Question # 125

An engineer needs to ensure that a script has not been modified before it is launched. Which of the following best provides this functionality?

A.

Masking

B.

Obfuscation

C.

Hashing

D.

Encryption

Full Access
Question # 126

The private key for a website was stolen, and a new certificate has been issued. Which of the following needs to be updated next?

A.

SCEP

B.

CRL

C.

OCSP

D.

CSR

Full Access
Question # 127

A systems administrator receives the following alert from a file integrity monitoring tool:

The hash of the cmd.exe file has changed.

The systems administrator checks the OS logs and notices that no patches were applied in the last two months. Which of the following most likely occurred?

A.

The end user changed the file permissions.

B.

A cryptographic collision was detected.

C.

A snapshot of the file system was taken.

D.

A rootkit was deployed.

Full Access
Question # 128

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

A.

Bluetooth

B.

Wired

C.

NFC

D.

SCADA

Full Access
Question # 129

An attacker submits a request containing unexpected characters in an attempt to gain unauthorized access to information within the underlying systems. Which of the following best describes this attack?

A.

Side loading

B.

Target of evaluation

C.

Resource reuse

D.

SQL injection

Full Access
Question # 130

Which of the following examples would be best mitigated by input sanitization?

A.

B.

nmap - 10.11.1.130

C.

Email message: "Click this link to get your free gift card."

D.

Browser message: "Your connection is not private."

Full Access
Question # 131

A security analyst is concerned malicious actors are lurking in an environment but has not received any alerts regarding suspicious activity. Which of the following should the analyst conduct to further investigate the presence of these actors?

A.

Threat hunting

B.

Digital forensics

C.

Vulnerability scanning

D.

E-discovery

Full Access
Question # 132

A company wants to protect a specialized legacy platform that controls the physical flow of gas inside of pipes. Which of the following environments does the company need to secure to best achieve this goal?

A.

IaaS

B.

SCADA

C.

SDN

D.

IoT

Full Access
Question # 133

Which of the following is a common source of unintentional corporate credential leakage in cloud environments?

A.

Code repositories

B.

Dark web

C.

Threat feeds

D.

State actors

E.

Vulnerability databases

Full Access
Question # 134

An IT team rolls out a new management application that uses a randomly generated MFA token sent to the administrator’s phone. Despite this new MFA precaution, there is a security breach of the same software. Which of the following describes this kind of attack?

A.

Smishing

B.

Typosquatting

C.

Espionage

D.

Pretexting

Full Access
Question # 135

Which of the following types of vulnerabilities involves attacking a system to access adjacent hosts?

A.

VM escape

B.

Side loading

C.

Remote code execution

D.

Resource exhaustion

Full Access
Question # 136

A company suffered a critical incident where 30GB of data was exfiltrated from the corporate network. Which of the following actions is the most efficient way to identify where the system data was exfiltrated from and where it was sent?

A.

Analyze firewall and network logs for large amounts of outbound traffic to external IP addresses or domains.

B.

Analyze IPS and IDS logs to find the IP addresses used by the attacker for reconnaissance scans.

C.

Analyze endpoint and application logs to see whether file-sharing programs were running.

D.

Analyze external vulnerability scans to identify exploitable systems.

Full Access
Question # 137

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?

A.

To track the status of patching installations

B.

To find shadow IT cloud deployments

C.

To continuously the monitor hardware inventory

D.

To hunt for active attackers in the network

Full Access
Question # 138

Prior to implementing a design change, the change must go through multiple steps to ensure that it does not cause any security issues. Which of the following is most likely to be one of those steps?

A.

Management review

B.

Load testing

C.

Maintenance notifications

D.

Procedure updates

Full Access
Question # 139

A company is using a legacy FTP server to transfer financial data to a third party. The legacy system does not support SFTP, so a compensating control is needed to protect the sensitive, financial data in transit. Which of the following would be the most appropriate for the company to use?

A.

Telnet connection

B.

SSH tunneling

C.

Patch installation

D.

Full disk encryption

Full Access
Question # 140

A security analyst needs to propose a remediation plan 'or each item in a risk register. The item with the highest priority requires employees to have separate logins for SaaS solutions and different password complexity requirements for each solution. Which of the following implementation plans will most likely resolve this security issue?

A.

Creating a unified password complexity standard

B.

Integrating each SaaS solution with the Identity provider

C.

Securing access to each SaaS by using a single wildcard certificate

D.

Configuring geofencing on each SaaS solution

Full Access
Question # 141

Which of the following should be used to aggregate log data in order to create alerts and detect anomalous activity?

A.

SIEM

B.

WAF

C.

Network taps

D.

IDS

Full Access
Question # 142

A systems administrator notices that one of the systems critical for processing customer transactions is running an end-of-life operating system. Which of the following techniques would increase enterprise security?

A.

Installing HIDS on the system

B.

Placing the system in an isolated VLAN

C.

Decommissioning the system

D.

Encrypting the system's hard drive

Full Access
Question # 143

Attackers created a new domain name that looks similar to a popular file-sharing website. Which of the following threat vectors is being used?

A.

Watering-hole attack

B.

Brand impersonation

C.

Phishing

D.

Typosquatting

Full Access
Question # 144

Which of the following risk management strategies should an enterprise adopt first if a legacy application is critical to business operations and there are preventative controls that are not yet implemented?

A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

Full Access
Question # 145

Which of the following best describes a common use of OSINT?

A.

Monitoring internal systems and network traffic to detect abnormal behavior

B.

Installing and configuring security patches to fix known vulnerabilities

C.

Collecting information from public platforms to find possible security exposures

D.

Encrypting sensitive company data and storing it securely in the cloud

Full Access
Question # 146

A network security analyst monitors the network’s IDS, which has flagged unusual activity. The IDS has detected multiple login attempts to a database server within a short period. These attempts come from various IP addresses that are not normally recognized by the network’s usual traffic patterns. Each attempt uses the same username and password. Based on the following log output (corrected formatting for readability):

2025-04-10 14:22:01.4532 — Source IP: 192.168.15.101 — Status: Failed — User: JDoe — Action: Login Attempt

2025-04-10 14:22:02.1122 — Source IP: 192.168.15.102 — Status: Failed — User: JDoe — Action: Login Attempt

2025-04-10 14:22:02.7835 — Source IP: 192.168.15.103 — Status: Failed — User: JDoe — Action: Login Attempt

2025-04-10 14:22:03.5637 — Source IP: 192.168.15.104 — Status: Failed — User: JDoe — Action: Login Attempt

2025-04-10 14:22:04.9474 — Source IP: 192.168.15.105 — Status: Failed — User: JDoe — Action: Login Attempt

2025-04-10 14:22:05.5673 — Source IP: 192.168.15.106 — Status: Failed — User: JDoe — Action: Login Attempt

2025-04-10 14:22:06.1573 — Source IP: 192.168.15.107 — Status: Failed — User: JDoe — Action: Login Attempt

2025-04-10 14:22:07.7462 — Source IP: 192.168.15.108 — Status: Failed — User: JDoe — Action: Login Attempt

Which of the following types of network attacks is most likely occurring?

A.

Cross-site scripting

B.

Credential replay

C.

Distributed denial of service

D.

SQL injection

Full Access
Question # 147

A penetration tester begins an engagement by performing port and service scans against the client environment according to the rules of engagement. Which of the following reconnaissance types is the tester performing?

A.

Active

B.

Passive

C.

Defensive

D.

Offensive

Full Access
Question # 148

Which of the following is a type of vulnerability that involves inserting scripts into web-based applications in order to take control of the client's web browser?

A.

SQL injection

B.

Cross-site scripting

C.

Zero-day exploit

D.

On-path attack

Full Access
Question # 149

A security engineer is implementing FDE for all laptops in an organization. Which of the following are the most important for the engineer to consider as part of the planning process? (Select two).

A.

Key escrow

B.

TPM presence

C.

Digital signatures

D.

Data tokenization

E.

Public key management

F.

Certificate authority linking

Full Access
Question # 150

A penetration test identifies that an SMBvl Is enabled on multiple servers across an organization. The organization wants to remediate this vulnerability in the most efficient way possible. Which of the following should the organization use for this purpose?

A.

GPO

B.

ACL

C.

SFTP

D.

DLP

Full Access
Question # 151

A recent black-box penetration test of http://example.com discovered that external

website vulnerabilities exist, such as directory traversals, cross-site scripting, cross-site forgery, and insecure protocols.

You are tasked with reducing the attack space and enabling secure protocols.

INSTRUCTIONS

Part 1

Use the drop-down menus to select the appropriate technologies for each location to implement a secure and resilient web architecture. Not all technologies will be used, and technologies may be used multiple times.

Part 2

Use the drop-down menus to select the appropriate command snippets from the drop-down menus. Each command section must be filled.

Full Access
Question # 152

Which of the following definitions best describes the concept of log co-relation?

A.

Combining relevant logs from multiple sources into ono location

B.

Searching end processing, data to identify patterns of malicious activity

C.

Making a record of the events that occur in the system

D.

Analyzing the log files of the system components

Full Access
Question # 153

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?

A.

To track the status of patch installations

B.

To find shadow IT cloud deployments

C.

To continuously monitor hardware inventory

D.

To hunt for active attackers in the network

Full Access
Question # 154

A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company's network. Which of the following should be configured on the existing network infrastructure to best prevent this activity?

A.

Port security

B.

Web application firewall

C.

Transport layer security

D.

Virtual private network

Full Access
Question # 155

A network administrator wants to ensure that network traffic is highly secure while in transit. Which of the following actions best describes the actions the network administrator should take?

A.

Ensure that NAC is enforced on all network segments, and confirm that firewalls have updated policies to block unauthorized traffic.

B.

Ensure only TLS and other encrypted protocols are selected for use on the network, and only permit authorized traffic via secure protocols.

C.

Configure the perimeter IPS to block inbound HTTPS directory traversal traffic, and verify that signatures are updated on a daily basis.

D.

Ensure the EDR software monitors for unauthorized applications that could be used by threat actors, and configure alerts for the security team.

Full Access
Question # 156

An administrator investigating an incident is concerned about the downtime of a critical server due to a failed drive. Which of the following would the administrator use to estimate the time needed to fix the issue?

A.

MTTR

B.

MTBF

C.

RTO

D.

RPO

Full Access
Question # 157

A security engineer is working to address the growing risks that shadow IT services are introducing to the organization. The organization has taken a cloud-first approach end does not have an on-premises IT infrastructure. Which of the following would best secure the organization?

A.

Upgrading to a next-generation firewall

B.

Deploying an appropriate in-line CASB solution

C.

Conducting user training on software policies

D.

Configuring double key encryption in SaaS platforms

Full Access
Question # 158

Which of the following phases of the incident response process attempts to minimize disruption?

A.

Recovery

B.

Containment

C.

Preparation

D.

Analysis

Full Access
Question # 159

A security analyst developed a script to automate a trivial and repeatable task. Which of the following best describes the benefits of ensuring other team members understand how the script works?

A.

To reduce implementation cost

B.

To identify complexity

C.

To remediate technical debt

D.

To prevent a single point of failure

Full Access
Question # 160

A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?

A.

SPF

B.

GPO

C.

NAC

D.

FIM

Full Access
Question # 161

A small business uses kiosks on the sales floor to display product information for customers. A security team discovers the kiosks use end-of-life operating systems. Which of the following is the security team most likely to document as a security implication of the current architecture?

A.

Patch availability

B.

Product software compatibility

C.

Ease of recovery

D.

Cost of replacement

Full Access
Question # 162

Which of the following would be the best way to handle a critical business application that is running on a legacy server?

A.

Segmentation

B.

Isolation

C.

Hardening

D.

Decommissioning

Full Access
Question # 163

Which of the following architecture models ensures that critical systems are physically isolated from the network to prevent access from users with remote access privileges?

A.

Segmentation

B.

Virtualized

C.

Air-gapped

D.

Serverless

Full Access
Question # 164

Which of the following scenarios describes a possible business email compromise attack?

A.

An employee receives a gift card request in an email that has an executive's name in the display field of the email.

B.

Employees who open an email attachment receive messages demanding payment in order to access files.

C.

A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.

D.

An employee receives an email with a link to a phishing site that is designed to look like the company's email portal.

Full Access
Question # 165

A security team receives reports about high latency and complete network unavailability throughout most of the office building. Flow logs from the campus switches show high traffic on TCP 445. Which of the following is most likely the root cause of this incident?

A.

Buffer overflow

B.

NTP amplification attack

C.

Worm

D.

Kerberoasting attack

Full Access
Question # 166

Which of the following techniques would attract the attention of a malicious attacker in an insider threat scenario?

A.

Creating a false text file in /docs/salaries

B.

Setting weak passwords in /etc/shadow

C.

Scheduling vulnerable jobs in /etc/crontab

D.

Adding a fake account to /etc/passwd

Full Access
Question # 167

Which of the following explains how regular patching helps mitigate risks when securing an enterprise environment?

A.

It improves server performance by reducing software bugs.

B.

It addresses known software vulnerabilities before they are exploited.

C.

It eliminates the need for firewalls and intrusion detection.

D.

It removes the need for antivirus tools.

Full Access
Question # 168

A security administrator recently reset local passwords and the following values were recorded in the system:

Which of the following in the security administrator most likely protecting against?

A.

Account sharing

B.

Weak password complexity

C.

Pass-the-hash attacks

D.

Password compromise

Full Access
Question # 169

The Chief Information Security Officer (CISO) has determined the company is non-compliant with local data privacy regulations. The CISO needs to justify the budget request for more resources. Which of the following should the CISO present to the board as the direct consequence of non-compliance?

A.

Fines

B.

Reputational damage

C.

Sanctions

D.

Contractual implications

Full Access
Question # 170

Which of the following types of vulnerabilities is primarily caused by improper use and management of cryptographic certificates?

A.

Misconfiguration

B.

Resource reuse

C.

Insecure key storage

D.

Weak cipher suites

Full Access
Question # 171

Which of the following are the best security controls for controlling on-premises access? (Select two.)

A.

Swipe card

B.

Picture ID

C.

Phone authentication application

D.

Biometric scanner

E.

Camera

F.

Memorable

Full Access
Question # 172

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an modem and prioritize the sequence for performing forensic analysis?

A.

Order of volatility

B.

Preservation of event logs

C.

Chain of custody

D.

Compliance with legal hold

Full Access
Question # 173

The Chief Information Security Officer (CISO) at a large company would like to gain an understanding of how the company's security policies compare to the requirements imposed by external regulators. Which of the following should the CISO use?

A.

Penetration test

B.

Internal audit

C.

Attestation

D.

External examination

Full Access
Question # 174

Which of the following is an example of a certificate that is generated by an internal source?

A.

Digital signature

B.

Asymmetric key

C.

Self-signed

D.

Symmetric key

Full Access
Question # 175

A security architect wants to prevent employees from receiving malicious attachments by email. Which of the following functions should the chosen solution do?

A.

Apply IP address reputation data.

B.

Tap and monitor the email feed.

C.

Scan email traffic inline.

D.

Check SPF records.

Full Access
Question # 176

A financial institution would like to store its customer data m the cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution Is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would best meet the requirement?

A.

Asymmetric

B.

Symmetric

C.

Homomorphic

D.

Ephemeral

Full Access
Question # 177

Which of the following types of identification methods can be performed on a deployed application during runtime?

A.

Dynamic analysis

B.

Code review

C.

Package monitoring

D.

Bug bounty

Full Access
Question # 178

A company wants to improve the availability of its application with a solution that requires minimal effort in the event a server needs to be replaced or added. Which of the following would be the best solution to meet these objectives?

A.

Load balancing

B.

Fault tolerance

C.

Proxy servers

D.

Replication

Full Access
Question # 179

A bank set up a new server that contains customers' Pll. Which of the following should the bank use to make sure the sensitive data is not modified?

A.

Full disk encryption

B.

Network access control

C.

File integrity monitoring

D.

User behavior analytics

Full Access
Question # 180

An organization is required to provide assurance that its controls are properly designed and operating effectively. Which of the following reports will best achieve the objective?

A.

Red teaming

B.

Penetration testing

C.

Independent audit

D.

Vulnerability assessment

Full Access
Question # 181

A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?

A.

Concurrent session usage

B.

Secure DNS cryptographic downgrade

C.

On-path resource consumption

D.

Reflected denial of service

Full Access
Question # 182

Which of the following is the most effective way to protect an application server running software that is no longer supported from network threats?

A.

Air gap

B.

Barricade

C.

Port security

D.

Screen subnet

Full Access
Question # 183

A company implemented an MDM policy 10 mitigate risks after repealed instances of employees losing company-provided mobile phones. In several cases. The lost phones were used maliciously to perform social engineering attacks against other employees. Which of the following MDM features should be configured to best address this issue? (Select two).

A.

Screen locks

B.

Remote wipe

C.

Full device encryption

D.

Push notifications

E.

Application management

F.

Geolocation

Full Access
Question # 184

An organization recently updated its security policy to include the following statement:

Regular expressions are included in source code to remove special characters such as $, |, ;. &, `, and ? from variables set by forms in a web application.

Which of the following best explains the security technique the organization adopted by making this addition to the policy?

A.

Identify embedded keys

B.

Code debugging

C.

Input validation

D.

Static code analysis

Full Access
Question # 185

One of a company's vendors sent an analyst a security bulletin that recommends a BIOS update. Which of the following vulnerability types is being addressed by the patch?

A.

Virtualization

B.

Firmware

C.

Application

D.

Operating system

Full Access
Question # 186

A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize?

A.

Serverless architecture

B.

Thin clients

C.

Private cloud

D.

Virtual machines

Full Access
Question # 187

A systems administrator just purchased multiple network devices. Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?

A.

Install endpoint protection

B.

Disable ports/protocols

C.

Change default passwords

D.

Remove unnecessary software

Full Access
Question # 188

Which of the following describes the reason root cause analysis should be conducted as part of incident response?

A.

To gather loCs for the investigation

B.

To discover which systems have been affected

C.

To eradicate any trace of malware on the network

D.

To prevent future incidents of the same nature

Full Access
Question # 189

A security analyst must prevent remote users from accessing malicious URLs. The sites need to be checked inline for reputation, content, or categorization. Which of the following technologies will help secure the enterprise?

A.

VPN

B.

SASE

C.

IDS

D.

SD-WAN

Full Access
Question # 190

After a recent ransomware attack on a company's system, an administrator reviewed the log files. Which of the following control types did the administrator use?

A.

Compensating

B.

Detective

C.

Preventive

D.

Corrective

Full Access
Question # 191

A security administrator is reissuing a former employee's laptop. Which of the following is the best combination of data handling activities for the administrator to perform? (Select two).

A.

Data retention

B.

Certification

C.

Tokenization

D.

Classification

E.

Sanitization

F.

Enumeration

Full Access
Question # 192

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

A.

VM escape

B.

SQL injection

C.

Buffer overflow

D.

Race condition

Full Access
Question # 193

Which of the following would help ensure a security analyst is able to accurately measure the overall risk to an organization when a new vulnerability is disclosed?

A.

A full inventory of all hardware and software

B.

Documentation of system classifications

C.

A list of system owners and their departments

D.

Third-party risk assessment documentation

Full Access
Question # 194

An administrator at a small business notices an increase in support calls from employees who receive a blocked page message after trying to navigate to a spoofed website. Which of the following should the administrator do?

A.

Deploy multifactor authentication.

B.

Decrease the level of the web filter settings

C.

Implement security awareness training.

D.

Update the acceptable use policy

Full Access
Question # 195

Which of the following is the best way to secure an on-site data center against intrusion from an insider?

A.

Bollards

B.

Access badge

C.

Motion sensor

D.

Video surveillance

Full Access
Question # 196

Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

A.

Encrypted

B.

Intellectual property

C.

Critical

D.

Data in transit

Full Access
Question # 197

A security report shows that during a two-week test period. 80% of employees unwittingly disclosed their SSO credentials when accessing an external website. The organization purposelycreated the website to simulate a cost-free password complexity test. Which of the following would best help reduce the number of visits to similar websites in the future?

A.

Block all outbound traffic from the intranet.

B.

Introduce a campaign to recognize phishing attempts.

C.

Restrict internet access for the employees who disclosed credentials.

D.

Implement a deny list of websites.

Full Access
Question # 198

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)

A.

If a security incident occurs on the device, the correct employee can be notified.

B.

The security team will be able to send user awareness training to the appropriate device.

C.

Users can be mapped to their devices when configuring software MFA tokens.

D.

User-based firewall policies can be correctly targeted to the appropriate laptops.

E.

When conducting penetration testing, the security team will be able to target the desired laptops.

F.

Company data can be accounted for when the employee leaves the organization.

Full Access
Question # 199

Which of the following is an example of a false negative vulnerability detection in a scan report?

A.

A vulnerability that does not actually exist

B.

A vulnerability that has already been remediated

C.

A result that shows no known vulnerability

D.

A zero-day vulnerability with a known remediation

Full Access
Question # 200

Which of the following can automate vulnerability management?

A.

CVE

B.

SCAP

C.

OSINT

D.

CVSS

Full Access
Question # 201

A systems administrator receives a text message from an unknown number claiming to be the Chief Executive Officer of the company. The message states an emergency situation requires a password reset. Which of the following threat vectors is being used?

A.

Typosquatting

B.

Smishing

C.

Pretexting

D.

Impersonation

Full Access
Question # 202

An organization would like to calculate the time needed to resolve a hardware issue with a server. Which of the following risk management processes describes this example?

A.

Recovery point objective

B.

Mean time between failures

C.

Recovery time objective

D.

Mean time to repair  

Full Access
Question # 203

A malicious update was distributed to a common software platform and disabled services at many organizations. Which of the following best describes this type of vulnerability?

A.

DDoS attack

B.

Rogue employee

C.

Insider threat

D.

Supply chain

Full Access
Question # 204

The management team notices that new accounts that are set up manually do not always have correct access or permissions.

Which of the following automation techniques should a systems administrator use to streamline account creation?

A.

Guard rail script

B.

Ticketing workflow

C.

Escalation script

D.

User provisioning script

Full Access
Question # 205

Which of the following strategies most effectively protects sensitive data at rest in a database?

A.

Hashing

B.

Masking

C.

Tokenization

D.

Obfuscation

Full Access
Question # 206

A systems administrator needs to ensure the secure communication of sensitive data within the organization's private cloud. Which of the following is the best choice for the administrator to implement?

A.

IPSec

B.

SHA-1

C.

RSA

D.

TGT

Full Access
Question # 207

A security manager needs an automated solution that will take immediate action to protect an organization against inbound malicious traffic. Which of the following is the best solution?

A.

UEM

B.

IPS

C.

WAF

D.

VPN

Full Access
Question # 208

Which of the following is the most likely to be included as an element of communication in a security awareness program?

A.

Reporting phishing attempts or other suspicious activities

B.

Detecting insider threats using anomalous behavior recognition

C.

Verifying information when modifying wire transfer data

D.

Performing social engineering as part of third-party penetration testing

Full Access
Question # 209

An organization plans to expand its operations internationally and needs to keep data at the new location secure. The organization wants to use the most secure architecture model possible. Which of the following models offers the highest level of security?

A.

Cloud-based

B.

Peer-to-peer

C.

On-premises

D.

Hybrid

Full Access
Question # 210

Which of the following is the first step to take when creating an anomaly detection process?

A.

Selecting events

B.

Building a baseline

C.

Selecting logging options

D.

Creating an event log

Full Access
Question # 211

Which of the following should be deployed on an externally facing web server in order to establish an encrypted connection?

A.

Public key

B.

Private Key

C.

Asymmetric key

D.

Symmetric key

Full Access
Question # 212

Which of the following environments utilizes a subset of customer data and is most likely to be used to assess the impacts of major system upgrades and demonstrate system features?

A.

Development

B.

Test

C.

Production

D.

Staging

Full Access
Question # 213

An accountant is transferring information to a bank over FTP. Which of the following mitigations should the accountant use to protect the confidentiality of the data?

A.

Tokenization

B.

Data masking

C.

Encryption

D.

Obfuscation

Full Access
Question # 214

A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message. Which of the following should the analyst do?

A.

Place posters around the office to raise awareness of common phishing activities.

B.

Implement email security filters to prevent phishing emails from being delivered

C.

Update the EDR policies to block automatic execution of downloaded programs.

D.

Create additional training for users to recognize the signs of phishing attempts.

Full Access
Question # 215

Which of the following security concepts is accomplished with the installation of a RADIUS server?

A.

CIA

B.

AA

C.

ACL

D.

PEM

Full Access
Question # 216

An accounting employee recently used software that was not approved by the company. Which of the following risks does this most likely represent?

A.

Unskilled attacker

B.

Hacktivist

C.

Shadow IT

D.

Supply chain

Full Access
Question # 217

A company is developing a critical system for the government and storing project information on a fileshare. Which of the following describes how this data will most likely be classified? (Select two).

A.

Private

B.

Confidential

C.

Public

D.

Operational

E.

Urgent

F.

Restricted

Full Access
Question # 218

A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?

A.

Data masking

B.

Encryption

C.

Geolocation policy

D.

Data sovereignty regulation

Full Access
Question # 219

Various company stakeholders meet to discuss roles and responsibilities in the event of a security breach that would affect offshore offices. Which of the following is this an example of?

A.

Tabletop exercise

B.

Penetration test

C.

Geographic dispersion

D.

Incident response

Full Access
Question # 220

An employee clicks a malicious link in an email that appears to be from the company's Chief Executive Officer. The employee's computer is infected with ransomware that encrypts the company's files. Which of the following is the most effective way for the company to prevent similar incidents in the future?

A.

Security awareness training

B.

Database encryption

C.

Segmentation

D.

Reporting suspicious emails

Full Access
Question # 221

Which of the following data types best describes an AI tool developed by a company to automate the ticketing system under a specific contract?

A.

Classified

B.

Regulated information

C.

Open source

D.

Intellectual property

Full Access
Question # 222

An administrator is installing an SSL certificate on a new system. During testing, errors indicate that the certificate is not trusted. The administrator has verified with the issuing CA and has validated the private key. Which of the following should the administrator check for next?

A.

If the wildcard certificate is configured

B.

If the certificate signing request is valid

C.

If the root certificate is installed

D.

If the public key is configured

Full Access
Question # 223

Which of the following is an example of memory injection?

A.

Two processes access the same variable, allowing one to cause a privilege escalation.

B.

A process receives an unexpected amount of data, which causes malicious code to be executed.

C.

Malicious code is copied to the allocated space of an already running process.

D.

An executable is overwritten on the disk, and malicious code runs the next time it is executed.

Full Access
Question # 224

During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Oncethe password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user's intranet account? (Select two).

A.

Federation

B.

Identity proofing

C.

Password complexity

D.

Default password changes

E.

Password manager

F.

Open authentication

Full Access
Question # 225

A company receives an alert that a widely used network device vendor has been banned by the government. What will general counsel most likely be concerned with during hardware refresh?

A.

Sanctions

B.

Data sovereignty

C.

Cost of replacement

D.

Loss of license

Full Access
Question # 226

Which of the following can best contribute to prioritizing patch applications?

A.

CVSS

B.

SCAP

C.

OSINT

D.

CVE

Full Access
Question # 227

During a routine audit, an analyst discovers that a department at a high school uses a simul-ation program that was not properly vetted before deployment.

Which of the following threats is this an example of?

A.

Espionage

B.

Data exfiltration

C.

Shadow IT

D.

Zero-day

Full Access
Question # 228

Which of the following is a qualitative approach to risk analysis?

A.

Including the MTTR and MTBF as part of the risk assessment

B.

Tracking and documenting network risks using a risk register

C.

Assigning a level of high, medium, or low to the risk rating

D.

Using ALE and ARO to help determine whether a risk should be mitigated

Full Access