Welcome to your CERTIFIED IN CYBER SECURITY PROFESSIONAL - Gemini Name Email An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? Spoofing Information disclosure Repudiation Tampering None Which one of the following is not one of the three common threat modeling techniques? A. Focused on assets B. Focused on attackers C. Focused on software D. Focused on social engineering None Which one of the following elements of information is not considered personally identifiable information that would trigger most US state data breach laws? A. Student identification number B. Social Security number C. Driver’s license number D. Credit card number None Angela is an information security architect at a bank and has been assigned to ensure that transactions are secure as they traverse the network. She recommends that all transactions use TLS. What threat is she most likely attempting to stop, and what method is she using to protect against it? Man-in-the-middle, VPN Packet injection, encryption Sniffing, encryption Sniffing, TEMPEST None COBIT, Control Objectives for Information and Related Technology, is a framework for IT management and governance. Which data management role is most likely to select and apply COBIT to balance the need for security controls against business requirements? Business owners Data processors Data owners Data stewards None What term is used to describe a starting point for a minimum security standard? Outline Baseline Policy Configuration guide None When media is labelled based on the classification of the data it contains, what rule is typically applied regarding labels? The data is labeled based on its integrity requirements. The media is labeled based on the highest classification level of the data it contains. The media is labeled with all levels of classification of the data it contains. The media is labeled with the lowest level of classification of the data it contains. None The need to protect sensitive data drives what administrative process? Information classification Remanence Transmitting data Clearing None Fran’s company is considering purchasing a web-based email service from a vendor and eliminating its own email server environment as a cost-saving measure. What type of cloud computing environment is Fran’s company considering? SaaS IaaS CaaS PaaS None Michael is responsible for forensic investigations and is investigating a medium severity security incident that involved the defacement of a corporate website. The web server in question ran on a virtualization platform, and the marketing team would like to get the website up and running as quickly as possible. What would be the most reasonable next step for Michael to take? Keep the website offline until the investigation is complete. Take the virtualization platform offline as evidence. Take a snapshot of the compromised system and use that for the investigation. Ignore the incident and focus on quickly restoring the website. None Sonia recently removed an encrypted hard drive from a laptop and moved it to a new device because of a hardware failure. She is having difficulty accessing encrypted content on the drive despite the fact that she knows the user’s password. What hardware security feature is likely causing this problem? TCB TPM NIACAP RSA None If Alice wishes to send Bob an encrypted message, what key does she use to encrypt the message? Refer to the following scenario. Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority. a. Alice’s public key b. Alice’s private key c. Bob’s public key d. Bob’s private key None When Bob receives the encrypted message from Alice, what key does he use to decrypt the message? Refer to the following scenario. Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority. a. Alice’s public key b. Alice’s private key c. Bob’s public key d. Bob’s private key None Which one of the following keys would Bob not possess in this scenario? Refer to the following scenario. Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority. a. Alice’s public key b. Alice’s private key c. Bob’s public key d. Bob’s private key None Alice would also like to digitally sign the message that she sends to Bob. What key should she use to create the digital signature? Refer to the following scenario. Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority. a. Alice’s public key b. Alice’s private key c. Bob’s public key d. Bob’s private key None What name is given to the random value added to a password in an attempt to defeat rainbow table attacks? a. Hash b. Salt c. Extender d. Rebar None Ben has connected his laptop to his tablet PC using an 802.11g connection. What wireless network mode has he used to connect these devices? A. Infrastructure mode B. Wired extension mode C. Ad hoc mode D. Stand-alone mode None Gary is deploying a wireless network and wants to deploy the fastest possible wireless technology. Of the 802.11 standards listed below, which is the fastest 2.4 GHz option he has? 802.11a 802.11g 802.11n 802.11ac None What common applications are associated with each of the following TCP ports: 23, 25, 143, and 515? Telnet, SFTP, NetBIOS, and LPD SSH, SMTP, POP3, and ICMP Telnet, SMTP, IMAP, and LPD Telnet, SMTP, POP3, and X Windows None Which of the following options is not a common best practice for securing a wireless network? Turn on WPA2. Enable MAC filtering if used for a relatively small group of clients. Enable SSID broadcast. Separate the access point from the wired network using a firewall, thus treating it as external access. None What network topology is shown in the image below? A ring A bus A star A mesh None Ben has configured his network to not broadcast a SSID. Why might Ben disable SSID broadcast, and how could his SSID be discovered? Disabling SSID broadcast prevents attackers from discovering the encryption key. The SSID can be recovered from decrypted packets. Disabling SSID broadcast hides networks from unauthorized personnel. The SSID can be discovered using a wireless sniffer. Disabling SSID broadcast prevents issues with beacon frames. The SSID can be recovered by reconstructing the BSSID. Disabling SSID broadcast helps avoid SSID conflicts. The SSID can be discovered by attempting to connect to the network. None If Susan’s organization requires her to log in with her username, a PIN, a password, and a retina scan, how many distinct types of factor has she used? One Two Three Four None Which of the following items are not commonly associated with restricted interfaces? Shells Keyboards Menus Database views None During a log review, Saria discovers a series of logs that show login failures as shown here: Jan 31 11:39:12 ip-10-0-0-2 sshd[29092]: Invalid user admin from remotehost passwd=orange Jan 31 11:39:20 ip-10-0-0-2 sshd[29098]: Invalid user admin from remotehost passwd=Orang3 Jan 31 11:39:23 ip-10-0-0-2 sshd[29100]: Invalid user admin from remotehost passwd=Orange93 Jan 31 11:39:31 ip-10-0-0-2 sshd[29106]: Invalid user admin from remotehost passwd=Orangutan1 Jan 31 20:40:53 ip-10-0-0-254 sshd[30520]: Invalid user admin from remotehost passwd=Orangemonkey What type of attack has Saria discovered? A. A brute force attack B. A man-in-the-middle attack C. A dictionary attack D. A rainbow table attack None What type of attack can be prevented by using a trusted path? A. Dictionary attacks B. Brute force attacks C. Man-in-the-middle attacks D. Login spoofing None What major issue often results from decentralized access control? Access outages may occur Control is not consistent Control is too granular Training costs are high None What message logging standard is commonly used by network devices, Linux and Unix systems, and many other enterprise devices? A. Syslog B. Netlog C. Eventlog D. Remote Log Protocol (RLP) None Jim has been contracted to perform a penetration test of a bank’s primary branch. In order to make the test as real as possible, he has not been given any information about the bank other than its name and address. What type of penetration test has Jim agreed to perform? A crystal box penetration test A gray box penetration test A black box penetration test A white box penetration test None What type of testing is used to ensure that separately developed software modules properly exchange data? A. Fuzzing B. Dynamic testing C. Interface testing D. API checksums None Referring to the figure below, what technology is shown that provides fault tolerance for the database servers? A. Failover cluster B. UPS C. Tape backup D. Cold site None Joe is the security administrator for an ERP system. He is preparing to create accounts for several new employees. What default access should he give to all of the new employees as he creates the accounts? Read only Editor Administrator No access None Which one of the following is not a privileged administrative activity that should be automatically sent to a log of superuser actions? Purging log entries Restoring a system from backup Logging into a workstation Managing user accounts None Which one of the following individuals is most likely to lead a regulatory investigation? CISO CIO Government agent Private detective None Which one of the following trusted recovery types does not fail into a secure operating state? Manual recovery Automated recovery Automated recovery without undue loss Function recovery None Toni responds to the desk of a user who reports slow system activity. Upon checking outbound network connections from that system, Toni notices a large amount of social media traffic originating from the system. The user does not use social media, and when Toni checks the accounts in question, they contain strange messages that appear encrypted. What is the most likely cause of this traffic? Other users are relaying social media requests through Toni’s computer. Toni’s computer is part of a botnet. Toni is lying about her use of social media. Someone else is using Toni’s computer when she is not present. None Which of the following is a common way that attackers leverage botnets? A. Sending spam messages B. Conducting brute-force attacks C. Scanning for vulnerable systems D. All of the above None Which one of the following statements is not true about code review? Code review should be a peer-driven process that includes multiple developers. Code review may be automated. Code review occurs during the design phase. Code reviewers may expect to review several hundred lines of code per hour. None Which process is responsible for ensuring that changes to software include acceptance testing? Request control Change control Release control Configuration control None When using the SDLC, which one of these steps should, you take before the others? Functional requirements determination Control specifications development Code review Design review None 1 out of 8 Time is Up!