1. A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that had a version installed from eight years ago. The company has decided to keep the system online anyway,as no upgrade exists form the vendor. Which of the following BEST describes the reason why the vulnerability exists?
A) Zero-day threats B) End-of-life system C) Default configuration D) Weak cipher suite
2. A company has won an important government contract. Several employees have been transferred from their existing projects to support a new contract. Some of the employees who have transferred will be working long hours and still need access to their project information to transition work to their replacements. Which of the following should be implemented to validate that the appropriate offboarding process has been followed?
A) Separation of duties B) Permission auditing C) Mandatory access control D) Time-of-day restrictions
3. A company wants to ensure confidential data from storage media is sanitized in such a way that the drive cannot be reused. Which of the following method should the technician use?
A) Overwriting B) Repartitioning C) Wiping D) Low-level formatting E) Shredding
4. A home invasion occurred recently in which an intruder compromised a home network and accessed a WiFI- enabled baby monitor while the baby's parents were sleeping. Which of the following BEST describes how the intruder accessed the monitor?
A) Social engineering B) Outdated antivirus C) WiFi signal strength D) Default configuration
5. After a merger between two companies a security analyst has been asked to ensure that the organization's systems are secured against infiltration by any former employees that were terminated during the transition. Which of the following actions are MOST appropriate to harden applications against infiltration by former employees? (Select TWO)(Select 2answers)
A) Develop and implement updated access control policies B) Monitor VPN client access C) Reduce failed login out settings D) Assess and eliminate inactive accounts E) Increase password complexity requirements F) Review and address invalid login attempts
Leave a comment