Organization suffers multiple breaches due to pretexting attacks. What is the best option for dealing with this issue?
1. Terminate, bring your own device programs.
2. Deploy secure baselines on critical systems.
3. Require all retired backup media to be sanitized.
4. Implement a security awareness training program.
Following a breach, an organization implements awareness training to help users identify the risks associated with removable media. Which of the following attacks will this training help mitigate?
Side loading.
Steganography
Injection.
Baiting
Baiting enter this training will help mitigate baiting attacks. In a baiting attack. An attacker leaves a malware infected removable storage device in a conspicuous location. The premise of a baiting attack is that someone will find the device and be curious enough to attached to their computer.
An organization has implemented anti-fishing security controls. However, users continue to fall for phishing scams which results in lost data. A security contractor recommends that the organization implement an administrative control. Which of the following controls should the organization consider as part of this recommendation?
Awareness training.
Email encryption.
Multi-factor authentication.
Data loss prevention.
The organization should consider awareness training awareness. Training is used to instruct end users on how to perform their job duty securely as it relates to fishing. Awareness training could include phishing campaigns that mimic popular attack methods.
What is the best matching role for each data responsibility?
Entity responsible for technical control of data including availability, security, scalability, technical standards and backup and restore.
Entity who collects or creates the data and is legally responsible and accountable for the data and its protection.
Entity responsible for protecting the rights and privacy of the data subject and controlling the procedures and purpose of data use .
Entity that works with data under the direction of responsible party but does not control the data or its use.
Data custodian. The data custodian is entity responsible for technical control of data including availability, security, scalability, technical standards and backup and restore.
Data owner. Data owner is entity who collects or creates the data and is legally responsible and accountable for the data and its protection.
Data controller. Data controller is the entity responsible for protecting the rights and privacy of the data’s subject and controlling the procedures and purpose of data use.
Data processor. Data processor is the entity that works with a data under the direction of a responsible party but does not control the data or its use.
During a risk assessment, potentially sensitive data is discovered on a file server. Which entity is responsible for determining the risk associated with leaving this data in its current storage location?
1. Data Custodian.
2. Data Subject.
3. Data Owner.
4. Data Steward.
Which activity is specifically designed to emulate an attack who has some knowledge of an internal network, servers, or applications?
1. Red teaming.
2. White-box testing.
3. Blue teaming.
4. Grey-box testing.
During which phase of a penetration test is the tester most likely to use OSINT?
1. Analysis.
2. Reconnaissance.
3. Maintaining access.
4. Gaining access.
Why would an organization use Security Content Automation Protocol (SCAP)?
1. To determine if system configurations are consistent and secure.
2. To determine if data is being exfiltrated accidentally or intentionally.
3. To aggregate and correlate system logs from organizational servers.
4. To facilitate single sign-on (SSO) for on-premises and cloud resources.
What is the MOST likely consequence of non-compliance with GDPR?
1. BPA Violation.
2. SLA Breach.
3. Reputational Damage.
4. Fines.
Following a breach investigation, a company is found negligent and in violation of due care requirements by a cybersecurity insurer. What BEST explains this finding?
1. Missing attestation documentation from third-party auditors.
2. A lack of reasonable cybersecurity policies and procedures.
3. Failure to honor customer requests to have their data deleted.
4. Failure to perform comprehensive vendor risk assessments.
A company is required to complete a SOC 2 Type 2 audit as part of external compliance reporting. How does this differ from a SOC 2 Type 1 audit?
1. A Type 2 audit covers a particular time frame.
2. A Type 2 audit is focused on financial controls.
3. A Type 2 audit does not inspect physical controls.
4. A Type 2 audit is considered a point-in-time audit.
What is a requirement of General Data Protection Regulation (GDPR)?
1. The right to be forgotten.
2. Supply chain analysis.
3. Evidence of internal audits.
4. Acceptable use policies.
Which method can be used to implement a managerial control for an educational institution that stores sensitive information about students?
1. Implement MFA on all servers holding sensitive information.
2. Implement full-disk encryption on servers holding sensitive information.
3. Perform a risk assessment for servers holding sensitive information.
4. Require users who access sensitive information remotely to use a VPN.
Which of the following tasks is MOST likely performed by a third-party as part of compliance monitoring for an organization?
1. Due care.
2. Continuous monitoring.
3. Cyber attestation.
4. Data inventory.
A honeypot is BEST described what type of control?
1. Detective.
2. Compensating.
3. Preventive.
4. Directive.
A company’s internal network has experienced several attempted attacks from the internet. The administrator needs to collect as much information about the attackers and their attack methods as possible. The administrator should minimize the risk to the internal network.
1. Honeynet.
2. DMZ.
3. Extranet.
4. VLAN.
A company is designing a data processing application that will support various levels of context and location-sensitive levels of access. Sensitive data is replaced in the database with a non-sensitive data equivalent that has no exploitable meaning or value. The database value is securely mapped to the actual data, which is stored in a separate location. What is this an example of?
1. Encryption.
2. Tokenization.
3. Data masking.
4. De-identification.
A company is preparing to deploy several new computers that have the most recent version of TPM hardware installed.
What is the significance of TPM being installed in the computers?
1. The TPM will work with encryption to generate keys that require a TPM and system platform measurements for decryption.
2. The TPM will require to configure full disk encryption after you install each computer’s operating system.
3. The TPM will encrypt the hard disks so that they will be encrypted before the computers are set up.
4. The TPM will check to ensure that the operating system you install on the computers is configured for multifactor authentication.
Which of the following best describes a digital signature?
1. A message hash encrypted with the sender’s private key.
2. A message hash encrypted with the recipient’s private key.
3. A message hash encrypted with the recipient’s public key.
4. A message hash encrypted with the sender’s public key.
To protect sensitive PHI, an organization plans to substitute random characters for original data, while maintaining the data’s format. Which of the following technologies or methods should they use?
1. Encryption.
2. Hashing.
3. Tokenization.
4. Masking.
A company is configuring a secure web server. What must be submitted to a CA when requesting an SSL certificate?
1. CSR.
2. CRL.
3. OID.
4. OCSP.
Which key is used to encrypt data in an asymmetric encryption system?
1. The sender’s public key.
2. The recipient’s private key.
3. The sender’s private key.
4. The recipient’s public key.
In order to increase security, an organization that stores PHI has decided to implement tokenization of sensitive data. What should the organization do with the original data that was tokenized?
1. Store the data in an encrypted file or database.
2. Mask the data and store with the token.
3. Hash the data and store it offline.
4. Discard the data because it is no longer needed.
What is a limitation of using a CRL to determine if a certificate is valid?
1. A CRL does not provide for real-time updates.
2. A CRL cannot be used to block access.
3. A CRL does not allow for manual revocation of certificates.
4. A CRL is not recognized in most PKI deployments.