Sybex Practice Test 01

Sybex Practice Test 01

Assessment

Flashcard

Information Technology (IT)

Professional Development

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

42 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What is the most likely cause of a sudden drop to zero in network flow on a particular segment? Options: A denial-of-service attack, A link failure, High bandwidth consumption, Beaconing

Back

A link failure

Answer explanation

The sudden drop to zero is most likely to be an example of link failure. A denial-of-service

attack could result in this type of drop but is less likely for most organizations. High bandwidth

consumption and beaconing both show different traffic patterns than shown in this example.

2.

FLASHCARD QUESTION

Front

Which one of the following should be Saanvi's highest priority for patching during the recovery process after a security incident? Windows systems, Systems involved in the incident, Linux systems, Web servers

Back

Systems involved in the incident

Answer explanation

During an incident recovery effort, patching priority should be placed on systems that

were directly involved in the incident. This is one component of remediating known issues

that were actively exploited.

3.

FLASHCARD QUESTION

Front

Susan’s organization suffered from a major breach attributed to an advanced persistent threat (APT) using exploits of zero-day vulnerabilities. Which of the following is the least appropriate solution for Susan to recommend to help prevent future attacks of this type? Heuristic attack detection methods, Signature-based attack detection methods, Segmentation, Leverage threat intelligence

Back

Signature-based attack detection methods

Answer explanation

Signature-based attack detection methods rely on knowing what an attack or malware looks like. Zero-day attacks are unlikely to have an existing signature, making them a poor choice to prevent them. Heuristic (behavior) detection methods can indicate compromises despite the lack of signatures for the specific exploit. Building a well-designed and segmented network can limit the impact of compromises or even prevent them. Leveraging threat intelligence

to understand new attacks and countermeasures is an important part of defense against zero-day attacks.

4.

FLASHCARD QUESTION

Front

During his investigation of a Windows system, Eric discovered that files were deleted and he wants to determine whether a specific file previously existed on the computer. Which of the following is the least likely to be a potential location to discover evidence supporting that theory? Windows registry, Master File Table, INDX files, Event logs

Back

Event logs

Answer explanation

The Windows registry, Master File Tables, and INDX files all contain information about files, often including removed or deleted files. Event logs are far less likely to contain information about a specific file location.

5.

FLASHCARD QUESTION

Front

As part of her SOC analyst duties, Emily is tasked with monitoring intrusion detection systems that cover her employer’s corporate headquarters network. During her shift, Emily’s IDS alarms report that a network scan has occurred from a system with IP address 10.0.11.19 on the organization’s WPA3 Enterprise wireless network aimed at systems in the finance division. What data source should she check first?

Back

Wireless authentication logs

Answer explanation

Since Emily’s organization uses WPA3 Enterprise, users must authenticate to use the wireless network. Associating the scan with an authenticated user will help incident responders identify the device that conducted the scan.

6.

FLASHCARD QUESTION

Front

Casey’s incident response process leads her to a production server that must stay online for her company’s business to remain operational. What method should she use to capture the data she needs?

Back

Live image to an external drive.

Answer explanation

Normally, forensic images are collected from systems that are offline to ensure that a complete copy is made. In cases like this where keeping the system online is more important than the completeness of the forensic image, a live image to an external drive using a portable

forensic tool such as FTK Imager Lite, dd, or similar is the correct choice.

7.

FLASHCARD QUESTION

Front

What does the Nmap response “filtered” mean in port scan results?

Back

Nmap cannot tell whether the port is open or closed.

Answer explanation

When Nmap returns a response of “filtered,” it indicates that Nmap cannot tell whether

the port is open or closed. Filtered results are often the result of a firewall or other network

device, but a response of filtered does not indicate that a firewall or IPS was detected.

When Nmap returns a “closed” result, it means that there is no application listening at

that moment.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?