Question 1 On the way into a secure building, an unknown individual strikes up a conversation with an employee. The empl
Posted: Sun Jul 03, 2022 9:58 am
Question 1On the way into a secure building, an unknown individual strikes upa conversation with an employee. The employee scans the requiredbadge at the door while the unknown individual holds the door open.seemingly out of courtesy. for the employee. Which of the followingsocial engineering techniques is being utilized?
A. Shoulder surfingB. Watering-hole attackC. TailgatingD. Impersonation
Question 2
Users are presented with a banner upon each login to aworkstation. The banner mentions that users are not entitled to anyreasonable expectation of privacy and access is for authorizedpersonnel only. In order to proceed past that banner. users must click the OKbutton. Which of the following is this an example of?
A. AUPB. NDAC. SLAD. MOU
Question 3
A user reports falling for a phishing email to an analyst. Whichof the following system logs would the analyst checkFIRST? A. DNSB. Message gatewayC. NetworkD. Authentication
Question 4
A company discovered that terabytes of data have beenexfiltrated over the past year after an employee clicked on anemail link. The threat continued to evolve and remain undetecteduntil a security analyst noticed an abnormal amount of externalconnections when the employee was not working. Which of thefollowing is the MOST likely threat actor?A. Shadow ITB. Script kiddiesC. APTD. Insider threat
Question 5
An internet company has created a new collaboration application.To expand the user base. the company wants to implement an optionthat allows users to log in to the application with the credentialsof other popular websites. Which of the following should thecompany implement? A. SSOB. CHAPC. 802.1XD. OpenID
Question 6
A company has a flat network that is deployed in the cloud.Security policy states that all production and development serversmust be segmented.Which of the following should be used to design the network to meetthe security requirements? A. VPNB. VLANC. Screened subnetD. WAF
A. Shoulder surfingB. Watering-hole attackC. TailgatingD. Impersonation
Question 2
Users are presented with a banner upon each login to aworkstation. The banner mentions that users are not entitled to anyreasonable expectation of privacy and access is for authorizedpersonnel only. In order to proceed past that banner. users must click the OKbutton. Which of the following is this an example of?
A. AUPB. NDAC. SLAD. MOU
Question 3
A user reports falling for a phishing email to an analyst. Whichof the following system logs would the analyst checkFIRST? A. DNSB. Message gatewayC. NetworkD. Authentication
Question 4
A company discovered that terabytes of data have beenexfiltrated over the past year after an employee clicked on anemail link. The threat continued to evolve and remain undetecteduntil a security analyst noticed an abnormal amount of externalconnections when the employee was not working. Which of thefollowing is the MOST likely threat actor?A. Shadow ITB. Script kiddiesC. APTD. Insider threat
Question 5
An internet company has created a new collaboration application.To expand the user base. the company wants to implement an optionthat allows users to log in to the application with the credentialsof other popular websites. Which of the following should thecompany implement? A. SSOB. CHAPC. 802.1XD. OpenID
Question 6
A company has a flat network that is deployed in the cloud.Security policy states that all production and development serversmust be segmented.Which of the following should be used to design the network to meetthe security requirements? A. VPNB. VLANC. Screened subnetD. WAF