1. Which of the following is a control that allows a mobile application to access and manipulate information which should only be available by another application onthe same mobile device (e.g. a music application posting the name of the current song playing on the device on a social media site)?
A) Transitive trust B) Co-hosted application C) Mutually exclusive access D) Dual authentication
2. A security analyst is reviewing logs and discovers that a company-owned computer issued to an employee is generating many alerts and warnings. The analystcontinues to review the log events and discovers that a non-company-owned device from a different, unknown IP address is generating the same events. Theanalyst informs the manager of these findings, and the manager explains that these activities are already known and part of an ongoing events. Given this scenario,which of the following roles are the analyst, the employee, and the manager filling?
A) The analyst is red team.The employee is blue team.The manager is white team. B) The analyst is blue team.The employee is red team.The manager is white team. C) The analyst is white team.The employee is red team.The manager is blue team. D) The analyst is red team.The employee is white team.The manager is blue team.
3. Given the following output from a Linux machine:file2cable i eth0 -f file.pcapWhich of the following BEST describes what a security analyst is trying to accomplish?
A) The analyst is attempting to capture traffic for a PCAP file. B) The analyst is attempting to capture traffic on interface eth0. C) The analyst is attempting to replay captured data from a PCAP file. D) The analyst is attempting to use a protocol analyzer to monitor network traffic. E) The analyst is attempting to measure bandwidth utilization on interface eth0.
4. Which of the following principles describes how a security analyst should communicate during an incident?
A) The communication should come from law enforcement. B) The communication should be limited to trusted parties only. C) The communication should be limited to management only. D) The communication should be limited to security staff only.
5. The Chief Information Security Officer (CISO) has asked the security staff to identify a framework on which to base the security program. The CISO would like toachieve a certification showing the security program meets all required best practices. Which of the following would be the BEST choice?
A) ISO B) SDLC C) SANS D) OSSIM
1. Right Answer: A Explanation:
2. Right Answer: C Explanation: Reference: https://danielmiessler.com/study/red-blue-purple-teams/
Leave a comment