1. An analyst is observing unusual network traffic from a workstation. The workstation is communicating with a known malicious site over an encrypted tunnel. A fullantivirus scan with an updated antivirus signature file does not show any sign of infection. Which of the following has occurred on the workstation?
A) Zero-day attack B) Cookie stealing C) Known malware attack D) Session hijack
2. As part of the SDLC, software developers are testing the security of a new web application by inputting large amounts of random data. Which of the following typesof testing is being performed?
A) Regression testing B) Input validation C) Fuzzing D) Stress testing
3. A system administrator recently deployed and verified the installation of a critical patch issued by the companys primary OS vendor. This patch was supposed toremedy a vulnerability that would allow an adversary to remotely execute code from over the network. However, the administrator just ran a vulnerabilityassessment of networked systems, and each of them still reported having the same vulnerability. Which of the following is the MOST likely explanation for this?
A) The administrator did not wait long enough after applying the patch to run the assessment. B) The patch did not remediate the vulnerability. C) The administrator entered the wrong IP range for the assessment. D) The vulnerability assessment returned false positives.
4. A security analyst is performing a review of Active Directory and discovers two new user accounts in the accounting department. Neither of the users has elevatedpermissions, but accounts in the group are given access to the companys sensitive financial management application by default. Which of the following is theBEST course of action?
A) Confirm the accounts are valid and ensure role-based permissions are appropriate B) Remove the accounts access privileges to the sensitive application C) Monitor the outbound traffic from the application for signs of data exfiltration D) Disable the user accounts E) Follow the incident response plan for the introduction of new accounts
5. Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)(Select 2answers)
A) Patching B) Disabling unused services C) NIDS D) Firewalling E) Segmentation
Leave a comment