During a cybersecurity attack, how would a threat actor use image files as a lure to target a vulnerability in a browser or document editing software?
The threat actor conceals malware on a USB thumb drive or memory card and tricks employees into connecting the media to a PC, laptop, or smartphone.
The threat actor conceals exploit code within an image file that targets a vulnerability in the browser or document editing software.
They may use a program file with concealed exploit code, like Trojan Horse malware, to create backdoor access.
The threat actor embeds malicious code in word processing and PDF format files to exploit vulnerabilities in document viewer or editor software.
The threat actor conceals exploit code within an image file that targets a vulnerability in the browser or document editing software.
CryptoCloud is expanding its business and is considering outsourcing its IT resources to a managed services provider (MSP) to improve efficiency and reliability. Which of the following statements about MSPs and their role in the supply chain are correct? (Select the two best options.)
Managed services provider (MSP) handle the end-to-end process of designing, manufacturing, and distributing goods and services to customers.
Managed services provider (MSP) primarily focus on providing support for IT resources such as networks, security, or web infrastructure.
Managed services provider (MSP) are only suitable for large enterprises with extensive IT infrastructure and are not recommended for smaller businesses.
Managed services provider (MSP) may introduce a complex security challenge as monitoring their employees can be difficult.
Managed services provider (MSP) primarily focus on providing support for IT resources such as networks, security, or web infrastructure.
Managed services provider (MSP) may introduce a complex security challenge as monitoring their employees can be difficult.
A systems engineer uncovers a malicious program operating under the guise of useful software and secretly records every keystroke on a corporate computer. The engineer MOST likely found what type of malicious software? (Select the two best options.)
Keylogger
Virus
Worm
Trojan
Keylogger
Trojan
A Trojan is a type of malicious software often disguised as legitimate software. Users are typically tricked into loading and executing it on their systems.
A keylogger is a surveillance technology that records and monitors users’ keystrokes. Keyloggers could be a component of a Trojan, but they can also function independently.
A technician is deploying centralized web filtering techniques across the enterprise. What stems from various factors such as the website’s Uniform Resource Locators (URL), domain, Internet Protocol (IP) address, content category, or even specific keywords within the web content?
Reputation-based filtering
Content categorization
Block rules
Uniform resource locators (URL) scanning
Block rules
An organization is transitioning to an Infrastructure as a Service (IaaS) model with a third-party vendor. What should the organization’s security officer do to ensure the security of deployed applications and data?
Implement user identity management and access controls to cloud resources
Assume that physical security of the data is the user’s responsibility
Rely entirely on the vendor’s encryption and access control mechanisms
Focus solely on securing the foundational elements of networking
Implement user identity management and access controls to cloud resources
A company has noticed increasing attacks on its employees via phishing emails and impersonation calls. These attacks have led to unauthorized access to sensitive data and a loss of customer trust. What method should the company implement to counteract these malicious efforts?
Implement the execution phase
Implement network segmentation
Strengthen password policies
Conduct social engineering awareness training
Strengthen password policies
Conduct social engineering awareness training
What component of the incident response process applies mitigation techniques and controls to remove unauthorized configuration changes from systems?
Eradication
Detection
Containment
Analysis
Eradication
A small online printing company needs to secure its internal web server with Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption. The IT administrator explores the certificate options and their implications. In the context of SSL/TLS certificate generation, which statement correctly explains the roles of Certificate Signing Request, self-signed, and third-party certificates?
The server generates a self-signed certificate to create a Certificate Signing Request, while a Certificate Authority issues third-party certificates after validating the server’s identity.
The server generates a self-signed certificate and submits it to a third-party Certificate Authority for validation but generates a Certificate Signing Request without involving a third party.
The server generates a Certificate Signing Request to create a self-signed certificate, while a Certificate Authority issues third-party certificates after validating the server’s identity.
The server generates a Certificate Signing Request (CSR) and submits it to a third-party Certificate Authority (CA) for validation but generates self-signed certificates without involving a third party.
The server generates a Certificate Signing Request (CSR) and submits it to a third-party Certificate Authority (CA) for validation but generates self-signed certificates without involving a third party.
A medium-sized organization is designing a new network infrastructure. The IT manager wants to minimize the attack surface without sacrificing connectivity. Which of the following measures would be MOST effective in achieving this goal?
Deploying network appliances in different security zones
Applying port security measures to control network access
Setting up a Software-Defined Wide Area Network (SD-WAN)
Implementing a Web Application Firewall (WAF)
Applying port security measures to control network access
What action of the incident response process removes affected components from the larger environment?
Detection
Analysis
Eradication
Containment
Containment
A medium-sized organization is undergoing an audit for its information security practices. As a security analyst, the auditor seeks to assess the organization’s use of an Acceptable Use Policy (AUP). What crucial aspect of the AUP should the auditor focus on to ensure the organization meets the standards set for information security?
The AUP includes the number of allowed password attempts before locking an account.
The AUP includes guidance for personal use of organizational resources.
The AUP includes clear consequences for noncompliance.
The AUP includes a list of approved software for each department.
The AUP includes clear consequences for noncompliance.
Any Acceptable Use Policy crucially outlines clear consequences for noncompliance, which serves to deter potential violators and provides a clear path for action when violations occur.
Upon receiving the findings from a recent inspection, a senior technician must identify the various parties needed to implement change management solutions. Based on those impacted by the change, who is a stakeholder within the change management spectrum? (Select the three best options.)
Partners
Change Advisory Board (CAB)
Project manager
Vendors
Partners
Change Advisory Board (CAB)
Vendors
Another role associated with a stakeholder includes the vendors tied to the project.
An attacker is preparing a phishing email mimicking the contents of a legitimate company email. The email will include a fake invoice to request payment for medical services and an email address that looks convincing. What can the attacker modify on the email to make it more believable?
Change the employee’s identity
Prepend “RE:” to the subject line
Ask for personal information
Increase the invoice number by 1
Prepend “RE:” to the subject line
Prepending means adding text that looks legitimately from a valid email system. For example, an attacker may add “RE:” to the subject line to make it look like a reply to a previous email thread and, thus, appear more legitimate.
An organization identifies a potential risk within a risk report that could result in a minor loss. After conducting a thorough analysis, the organization decides the cost of mitigation outweighs the potential loss. What is the company’s likely next step?
Accept the risk
Transfer the risk
Mitigate the risk
Report the risk
Accept the risk
Accepting the risk happens when an organization determines that the cost of mitigating a risk outweighs the potential loss. The organization acknowledges the potential for loss but does not take immediate action to prevent it.
Mitigation costs are higher than the potential loss. Therefore, it’s unlikely that the company would choose to mitigate the risk.
A tech director evaluates the benefits of implementing automation and orchestration into the organization after receiving approval and funding notification for the annual budget. Knowing several benefits tied to automation, what challenges exist when managing automation? (Select the three best options.)
Staff retention
Single point of failure
Technical debt
Cost
Single point of failure
Technical debt
Cost
The security manager of a highly sensitive facility is evaluating options for intrusion detection systems to detect physical movement in its secured zones. The ideal technology the facility needs should be less prone to environmental interferences and preferably not depend on physical contact. Which technology should the security manager implement?
Ultrasonic sensors
Infrared sensors
Pressure sensors
Microwave sensors
Ultrasonic sensors
A company identifies a potential security risk associated with the implementation of a new system. However, after assessing the risk, the company decides not to implement any measures to address this specific risk. Which of the following risk management strategies is the company employing?
Exemption
Avoidance
Mitigation
Transference
Avoidance
The avoid strategy means that the organization will not proceed with actions likely to trigger the risk.