❔Performing gap analysis forces systems into compliance.
✅False
True
❔When should gap analysis be performed? (Select all that apply)
when decommissioning legacy hardware
✅when first adopting a framework
✅when meeting a new industry or legal compliance requirement
✅after significant time has past
❔What is the purpose of a gap analysis?
evaluating the level of compliance to a regulation or contractual obligation
determining the probability and likelihood of a threat causing harm to an asset
✅discovering the differences between the intended or expected configuration of a system and its actual operating configuration
exploring the source code of a open source application for flaws and vulnerabilities
❔Which of the following statements is false in regard to gap analysis?
Security template selection should be specific to its product version and build number
Some variations from a baseline may be more secure
✅A single security template is sufficient to analyze all systems
Some variations from a baseline are less secure
❔File access controls are classed as preventive in terms of functionality. What category of security control are file permissions?
✅Technical
Physical
Operational
Managerial
What is the goal of directive controls?
Prohibition
Tracking
✅Compliance
Defense
What are the dual purposes of corrective controls? (Select two)
Record evidence of user and event activities
✅Address an unwanted or less secure state or event
Provide guidance on proper user behavior
✅Return the system to a normal and generally secure condition
❔What is the primary purpose of detective controls?
Give instructions
Restore a system back to preferred condition
✅Record information about activities
Compensate for a failed control
Stop unwanted activity from succeeding
Persuade a perpetrator to go elsewhere
❔What is the primary purpose of directive controls?
Restore a system back to preferred condition
Record information about activities
Compensate for a failed control
Stop unwanted activity from succeeding
Persuade a perpetrator to go elsewhere
✅ Give instructions
❔What nmap parameter option performs a scan which displays service identification?
✅-sV
–banner
-sS
-oS
What are two primary response options to the discovery of an open port hosting an insecure service?
Perform a vulnerability scan
Require more complex passwords
✅Close the exposed port
✅Configure service encryption
Apply updates to the OS
❔Which security framework does SET use to set up listeners?
✅Metasploit
Arachni
Maltego
SMTP binder
❔What is the primary limitation or restriction in compromising a victim through a SET-crafted email and related exploit script/payload?
NAT traversal
✅Client-side security blocking execution
Server keyword filtering
Firewall blocking email messages with attachments
❔Which of the following are true in regard to using SET? (Select all that apply)
SET payloads are allow-listed in most security filters
SET emails must be from a trusted email domain
✅SET can send messages to a single address or a large group of addresses
✅SET can send attachments or hyperlinks to malicious scripts or payloads
✅SET emails can use spoofed source addresses
✅SET demonstrates the power of combining technology with social engineering
❔Where can a user encrypt a file in Windows? (select all that apply)
✅Command Prompt
Z-shell
✅File Explorer
✅PowerShell
❔A DRA can be defined or established after a file is encrypted, and they can still recover access to the plaintext file if needed?
True
✅False
❔The EFSRA.PFX file, which was imported into the system before the DRA was able to restore the plaintext version of the files, contains what?
✅The private key of the DRA
The symmetric key encrypting the file
The asymmetric key encrypting the storage device
The public key of the DRA
❔What is the purpose of calculating a hash of files?
Maintaining availability
✅Detecting integrity violations
Confirming authorization
Blocking disclosure
❔What is the primary reason to avoid the use of MD5?
Its algorithm is publicly viewable
Risk of brute force attack
Ease of key discovery
✅Propensity for collisions
❔What is the benefit of performing a malware evaluation via a hash value rather than uploading a file?
Maintaining SCAP compliance
✅ Not disclosing the suspect file publicly
Detecting new threats
More accurate results
❔If a portion of the scanning engines of an online threat analysis service detect a threat related to a submitted hash or file, is that suspicious object necessarily malicious?
✅ No
Yes
❔What security measure is a password spraying attack attempting to avoid or bypass?
✅Account lockout
Complexity requirements
Maximum password age
Minimum password length
❔What is password spraying?
Extracting password hashes for user accounts
✅Trying a known password against many user accounts
Trying numerous combinations of characters to discover a password
Guessing a password for a user account
❔What aspects of a target’s password are a defense against brute force password cracking? (Select all that apply)
using well-known algorithms
✅longer length
ease to pronounce
✅increased complexity
greater age