1. An analyst is preparing for a technical security compliance check on all Apache servers. Which of the following will be the BEST to use?
A) Untidy B) Cain & Abel C) Nagios D) CIS benchmark E) OWASP
2. A cybersecurity analyst is hired to review the security posture of a company. The cybersecurity analyst notices a very high network bandwidth consumption due toSYN floods from a small number of IP addresses.Which of the following would be the BEST action to take to support incident response?
A) Apply ingress filters at the routers. B) Increase the companys bandwidth. C) Block all SYN packets. D) Install a packet capturing tool.
3. A threat intelligence analyst who works for an oil and gas company has received the following email from a superior:We will be connecting our IT network with our ICS. Our IT security has historically been top of the line, and this convergence will make the ICS easier to manageand troubleshoot. Can you please perform a risk/vulnerability assessment on this decision?Which of the following is MOST accurate regarding ICS in this scenario?
A) Combined networks decrease efficiency B) Convergence decreases attack vectors C) IT networks cannot be connected to ICS infrastructure D) Integrating increases the attack surface
4. As part of the SDLC, software developers are testing the security of a new web application by inputting large amounts of random data. Which of the following typesof testing is being performed?
A) Fuzzing B) Input validation C) Regression testing D) Stress testing
5. An organization is requesting the development of a disaster recovery plan. The organization has grown and so has its infrastructure. Documentation, policies, andprocedures do not exist. Which of the following steps should be taken to assist in the development of the disaster recovery plan?
A) Conduct a risk assessment. B) Develop a data retention policy. C) Identify assets. D) Execute vulnerability scanning.
Leave a comment