Join the discussion
Question 1/260
Which of the following Is a common, passive reconnaissance technique employed by penetration testers in the early phases of an engagement?
Correct Answer: B
Add Comments
- Other Question (260q)
- Q1. Which of the following Is a common, passive reconnaissance technique employed by penetrati...
- Q2. During the onboarding process, an employee needs to create a password for an intranet acco...
- Q3. Which of the following can be used to identify potential attacker activities without affec...
- Q4. An analyst is evaluating the implementation of Zero Trust principles within the data plane...
- Q5. A systems administrator is auditing all company servers to ensure. They meet the minimum s...
- Q6. Which of the following data protection strategies can be used to confirm file integrity?...
- Q7. You are security administrator investigating a potential infection on a network. Click on ...
- Q8. Which of the following is the most effective way to protect an application server running ...
- Q9. An IT administrator needs to ensure data retention standards are implemented on an enterpr...
- Q10. Which of the following must be considered when designing a high-availability network? (Cho...
- Q11. A business received a small grant to migrate its infrastructure to an off-premises solutio...
- Q12. A legal department must maintain a backup from all devices that have been shredded and rec...
- Q13. A security engineer configured a remote access VPN. The remote access VPN allows end users...
- Q14. A systems administrator creates a script that validates OS version, patch levels, and inst...
- Q15. An accountant is transferring information to a bank over FTP. Which of the following mitig...
- Q16. A security administrator is addressing an issue with a legacy system that communicates dat...
- Q17. Which of the following is best used to detect fraud by assigning employees to different ro...
- Q18. Which of the following phases of an incident response involves generating reports?...
- Q19. Which of the following describes a security alerting and monitoring tool that collects sys...
- Q20. Which of the following would be the greatest concern for a company that is aware of the co...
- Q21. An IT manager is putting together a documented plan describing how the organization will k...
- Q22. Which of the following security concepts is being followed when implementing a product tha...
- Q23. A program manager wants to ensure contract employees can only use the company's computers ...
- Q24. A company recently decided to allow employees to work remotely. The company wants to prote...
- Q25. Which of the following best represents an application that does not have an on-premises re...
- Q26. Which of the following should be used to aggregate log data in order to create alerts and ...
- Q27. An organization recently updated its security policy to include the following statement: R...
- Q28. Which of the following is the final step of the modem response process?...
- Q29. Which of the following is a compensating control for providing user access to a high-risk ...
- Q30. A customer of a large company receives a phone call from someone claiming to work for the ...
- Q31. Several employees received a fraudulent text message from someone claiming to be the Chief...
- Q32. A company's website is www. Company. com Attackers purchased the domain wwww. company.com ...
- Q33. A systems administrator discovers a system that is no longer receiving support from the ve...
- Q34. A security analyst and the management team are reviewing the organizational performance of...
- Q35. Which of the following alert types is the most likely to be ignored over time?...
- Q36. Which of the following would best explain why a security analyst is running daily vulnerab...
- Q37. A company is redesigning its infrastructure and wants to reduce the number of physical ser...
- Q38. An engineer moved to another team and is unable to access the new team's shared folders wh...
- Q39. Which of the following would be the best ways to ensure only authorized personnel can acce...
- Q40. Which of the following best describe a penetration test that resembles an actual external ...
- Q41. Which of the following would be best suited for constantly changing environments?...
- Q42. A penetration test identifies that an SMBvl Is enabled on multiple servers across an organ...
- Q43. While a user reviews their email, a host gets infected by malware from an external hard dr...
- Q44. A security analyst receives alerts about an internal system sending a large amount of unus...
- Q45. The security operations center is researching an event concerning a suspicious IP address ...
- Q46. A company is utilizing an offshore team to help support the finance department. The compan...
- Q47. A security administrator needs a method to secure data in an environment that includes som...
- Q48. A company relies on open-source software libraries to build the software used by its custo...
- Q49. An organization is evaluating new regulatory requirements associated with the implementati...
- Q50. Which of the following is the most likely outcome if a large bank fails an internal PCI DS...
- Q51. Which of the following is die most important security concern when using legacy systems to...
- Q52. Which of the following is the most likely to be used to document risks, responsible partie...
- Q53. A company is developing a business continuity strategy and needs to determine how many sta...
- Q54. A company is aware of a given security risk related to a specific market segment. The busi...
- Q55. A network administrator wants to ensure that network traffic is highly secure while in tra...
- Q56. An organization experiences a cybersecurity incident involving a command-and-control serve...
- Q57. Which of the following tasks is typically included in the BIA process?...
- Q58. A security analyst reviews domain activity logs and notices the following: (Exhibit) Which...
- Q59. An administrator assists the legal and compliance team with ensuring information about cus...
- Q60. Which of the following exercises should an organization use to improve its incident respon...
- Q61. A security engineer is working to address the growing risks that shadow IT services are in...
- Q62. The Chief Information Security Officer of an organization needs to ensure recovery from ra...
- Q63. A company plans to secure its systems by: Preventing users from sending sensitive data ove...
- Q64. Which of the following would be the best way to test resiliency in the event of a primary ...
- Q65. Which of the following security concepts is the best reason for permissions on a human res...
- Q66. A user is attempting to patch a critical system, but the patch fails to transfer. Which of...
- Q67. After creating a contract for IT contractors, the human resources department changed sever...
- Q68. Which of the following control types is AUP an example of?...
- Q69. A company implemented an MDM policy 10 mitigate risks after repealed instances of employee...
- Q70. A security analyst is prioritizing vulnerability scan results using a risk-based approach....
- Q71. A company requires hard drives to be securely wiped before sending decommissioned systems ...
- Q72. A software developer would like to ensure. The source code cannot be reverse engineered or...
- Q73. An employee receives a text message that appears to have been sent by the payroll departme...
- Q74. A cybersecurity incident response team at a large company receives notification that malwa...
- Q75. A company is working with a vendor to perform a penetration test Which of the following in...
- Q76. A systems administrator is working on a solution with the following requirements: * Provid...
- Q77. Which of the following is a reason why a forensic specialist would create a plan to preser...
- Q78. A company identified the potential for malicious insiders to harm the organization. Which ...
- Q79. During an investigation, an incident response team attempts to understand the source of an...
- Q80. An IT manager informs the entire help desk staff that only the IT manager and the help des...
- Q81. A company is discarding a classified storage array and hires an outside vendor to complete...
- Q82. An employee clicks a malicious link in an email that appears to be from the company's Chie...
- Q83. An organization plans to expand its operations internationally and needs to keep data at t...
- Q84. Which of the following is most likely associated with introducing vulnerabilities on a cor...
- Q85. A company is considering an expansion of access controls for an application that contracto...
- Q86. The Chief Information Officer (CIO) asked a vendor to provide documentation detailing the ...
- Q87. Which of the following explains why an attacker cannot easily decrypt passwords using a ra...
- Q88. Which of the following is a feature of a next-generation SIEM system?...
- Q89. A security engineer would like to enhance the use of automation and orchestration within t...
- Q90. A malicious update was distributed to a common software platform and disabled services at ...
- Q91. A systems administrator receives a text message from an unknown number claiming to be the ...
- Q92. A security administrator is reissuing a former employee's laptop. Which of the following i...
- Q93. A company wants to track modifications to the code used to build new virtual servers. Whic...
- Q94. A company wants to ensure employees are allowed to copy files from a virtual desktop durin...
- Q95. Which of the following are the best for hardening end-user devices? (Selecttwo)...
- Q96. A company prevented direct access from the database administrators' workstations to the ne...
- Q97. The Chief Information Security Officer (CISO) at a large company would like to gain an und...
- Q98. A systems administrator is redesigning now devices will perform network authentication. Th...
- Q99. Malware spread across a company's network after an employee visited a compromised industry...
- Q100. An employee in the accounting department receives an email containing a demand for payment...
- Q101. A new vulnerability enables a type of malware that allows the unauthorized movement of dat...
- Q102. A security officer is implementing a security awareness program and is placing security-th...
- Q103. Which of the following is the first step to secure a newly deployed server?...
- Q104. An organization would like to calculate the time needed to resolve a hardware issue with a...
- Q105. Which of the following is the best way to consistently determine on a daily basis whether ...
- Q106. A newly identified network access vulnerability has been found in the OS of legacy loT dev...
- Q107. Which of the following allows an exploit to go undetected by the operating system?...
- Q108. Which of the following is the best way to provide secure remote access for employees while...
- Q109. An organization is adopting cloud services at a rapid pace and now has multiple SaaS appli...
- Q110. An important patch for a critical application has just been released, and a systems admini...
- Q111. While considering the organization's cloud-adoption strategy, the Chief Information Securi...
- Q112. The management team notices that new accounts that are set up manually do not always have ...
- Q113. Which of the following describes the reason root cause analysis should be conducted as par...
- Q114. Which of the following is the best way to secure an on-site data center against intrusion ...
- Q115. An administrator wants to automate an account permissions update for a large number of acc...
- Q116. Which of the following is a common data removal option for companies that want to wipe sen...
- Q117. Which of the following security control types does an acceptable use policy best represent...
- Q118. A security report shows that during a two-week test period. 80% of employees unwittingly d...
- Q119. After reviewing the following vulnerability scanning report: Server:192.168.14.6 Service: ...
- Q120. Which of the following must be considered when designing a high-availability network? (Sel...
- Q121. Which of the following most accurately describes the order in which a security engineer sh...
- Q122. A healthcare organization wants to provide a web application that allows individuals to di...
- Q123. Visitors to a secured facility are required to check in with a photo ID and enter the faci...
- Q124. Which of the following vulnerabilities is exploited when an attacker overwrites a register...
- Q125. Which of the following is prevented by proper data sanitization?...
- Q126. Which of the following architectures is most suitable to provide redundancy for critical b...
- Q127. A systems administrator receives an alert that a company's internal file server is very sl...
- Q128. An analyst is reviewing an incident in which a user clicked on a link in a phishing email....
- Q129. Which of the following describes the process of concealing code or text inside a graphical...
- Q130. Which of the following is a possible consequence of a VM escape?...
- Q131. Which of the following is a preventive physical security control?...
- Q132. An enterprise is trying to limit outbound DNS traffic originating from its internal networ...
- Q133. A penetration tester begins an engagement by performing port and service scans against the...
- Q134. An organization would like to store customer data on a separate part of the network that i...
- Q135. A security team is reviewing the findings in a report that was delivered after a third par...
- Q136. Which of the following security concepts is accomplished with the installation of a RADIUS...
- Q137. Which of the following actors attacking an organization is the most likely to be motivated...
- Q138. Which of the following would enable a data center to remain operational through a multiday...
- Q139. A company has begun labeling all laptops with asset inventory stickers and associating the...
- Q140. Which of the following would a systems administrator follow when upgrading the firmware of...
- Q141. Which of the following should a security operations center use to improve its incident res...
- Q142. An organization is looking to optimize its environment and reduce the number of patches ne...
- Q143. A business uses Wi-Fi with content filleting enabled. An employee noticed a coworker acces...
- Q144. Which of the following is the most relevant reason a DPO would develop a data inventory?...
- Q145. In a rush to meet an end-of-year business goal, the IT department was told to implement a ...
- Q146. A new security regulation was announced that will take effect in the coming year. A compan...
- Q147. A systems administrator notices that the research and development department is not using ...
- Q148. An organization is developing a security program that conveys the responsibilities associa...
- Q149. A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the ...
- Q150. A software developer wishes to implement an application security technique that will provi...
- Q151. Which of the following teams combines both offensive and defensive testing techniques to p...
- Q152. A U.S.-based cloud-hosting provider wants to expand its data centers to new international ...
- Q153. An organization recently started hosting a new service that customers access through a web...
- Q154. Two companies are in the process of merging. The companies need to decide how to standardi...
- Q155. An administrator has configured a quarantine subnet for all guest devices that connect to ...
- Q156. Users at a company are reporting they are unable to access the URL for a new retail websit...
- Q157. Which of the following has been implemented when a host-based firewall on a legacy Linux s...
- Q158. Which of the following cryptographic solutions protects data at rest?...
- Q159. Which of the following provides the details about the terms of a test with a third-party p...
- Q160. One of a company's vendors sent an analyst a security bulletin that recommends a BIOS upda...
- Q161. A network manager wants to protect the company's VPN by implementing multifactor authentic...
- Q162. Which of the following types of identification methods can be performed on a deployed appl...
- Q163. A company is required to use certified hardware when building networks. Which of the follo...
- Q164. A data administrator is configuring authentication for a SaaS application and would like t...
- Q165. Which of the following actions could a security engineer take to ensure workstations and s...
- Q166. Which of the following data states applies to data that is being actively processed by a d...
- Q167. A company wants to reduce the time and expense associated with code deployment. Which of t...
- Q168. A company has a website in a server cluster. One server is experiencing very high usage, w...
- Q169. An attacker posing as the Chief Executive Officer calls an employee and instructs the empl...
- Q170. Which of the following is an algorithm performed to verify that data has not been modified...
- Q171. Which of the following describes the category of data that is most impacted when it is los...
- Q172. Which of the following security concepts is accomplished when granting access after an ind...
- Q173. A company discovered its data was advertised for sale on the dark web. During the initial ...
- Q174. Which of the following allows a systems administrator to tune permissions for a file?...
- Q175. Which of the following threat actors is the most likely to be hired by a foreign governmen...
- Q176. A certificate authority needs to post information about expired certificates. Which of the...
- Q177. When trying to access an internal website, an employee reports that a prompt displays, sta...
- Q178. Which of the following organizational documents is most often used to establish and commun...
- Q179. For which of the following reasons would a systems administrator leverage a 3DES hash from...
- Q180. The security team at a large global company needs to reduce the cost of storing data used ...
- Q181. A company's Chief Information Security Officer (CISO) wants to enhance the capabilities of...
- Q182. A security consultant needs secure, remote access to a client environment. Which of the fo...
- Q183. Which of the following would be the most appropriate way to protect data in transit?...
- Q184. After an audit, an administrator discovers all users have access to confidential data on a...
- Q185. A spoofed identity was detected for a digital certificate. Which of the following are the ...
- Q186. Which of the following definitions best describes the concept of log co-relation?...
- Q187. The marketing department set up its own project management software without telling the ap...
- Q188. An organization implemented cloud-managed IP cameras to monitor building entry points and ...
- Q189. A systems administrator is creating a script that would save time and prevent human error ...
- Q190. Which of the following is a common source of unintentional corporate credential leakage in...
- Q191. A recent penetration test identified that an attacker could flood the MAC address table of...
- Q192. An employee emailed a new systems administrator a malicious web link and convinced the adm...
- Q193. An organization has too many variations of a single operating system and needs to standard...
- Q194. Various stakeholders are meeting to discuss their hypothetical roles and responsibilities ...
- Q195. Which of the following topics would most likely be included within an organization's SDLC?...
- Q196. A security engineer is implementing FDE for all laptops in an organization. Which of the f...
- Q197. An administrator is installing an SSL certificate on a new system. During testing, errors ...
- Q198. Which of the following security measures is required when using a cloud-based platform for...
- Q199. A systems administrator is changing the password policy within an enterprise environment a...
- Q200. A bank set up a new server that contains customers' Pll. Which of the following should the...
- Q201. The local administrator account for a company's VPN appliance was unexpectedly used to log...
- Q202. Which of the following describes the maximum allowance of accepted risk?...
- Q203. A company hired a consultant to perform an offensive security assessment covering penetrat...
- Q204. Which of the following agreements defines response time, escalation, and performance metri...
- Q205. An organization needs to monitor its users' activities to prevent insider threats. Which o...
- Q206. Which of the following is used to add extra complexity before using a one-way data transfo...
- Q207. Which of the following can best protect against an employee inadvertently installing malwa...
- Q208. A website user is locked out of an account after clicking an email link and visiting a dif...
- Q209. After a recent ransomware attack on a company's system, an administrator reviewed the log ...
- Q210. A company with a high-availability website is looking to harden its controls at any cost. ...
- Q211. A company's legal department drafted sensitive documents in a SaaS application and wants t...
- Q212. Security controls in a data center are being reviewed to ensure data is properly protected...
- Q213. Which of the following cryptographic methods is preferred for securing communications with...
- Q214. Which of the following can be used to compromise a system that is running an RTOS?...
- Q215. An organization disabled unneeded services and placed a firewall in front of a business-cr...
- Q216. Which of the following describes an executive team that is meeting in a board room and tes...
- Q217. A company needs to provide administrative access to internal resources while minimizing th...
- Q218. An administrator discovers that some files on a database server were recently encrypted. T...
- Q219. A company plans to secure its systems by: Preventing users from sending sensitive data ove...
- Q220. Which of the following best describe why a process would require a two-person integrity se...
- Q221. During a penetration test, a vendor attempts to enter an unauthorized area using an access...
- Q222. A legacy device is being decommissioned and is no longer receiving updates or patches. Whi...
- Q223. Which of the following is required for an organization to properly manage its restore proc...
- Q224. Which of the following actions best addresses a vulnerability found on a company's web ser...
- Q225. A company is concerned about weather events causing damage to the server room and downtime...
- Q226. During a recent company safety stand-down, the cyber-awareness team gave a presentation on...
- Q227. An employee clicked a malicious link in an email and downloaded malware onto the company's...
- Q228. Which of the following should a security team do first before a new web server goes live?...
- Q229. The help desk receives multiple calls that machines with an outdated OS version are runnin...
- Q230. Which of the following steps in the risk management process involves establishing the scop...
- Q231. A security analyst scans a company's public network and discovers a host is running a remo...
- Q232. Which of the following factors are the most important to address when formulating a traini...
- Q233. Which of the following is the primary purpose of a service that tracks log-ins and time sp...
- Q234. A company has yearly engagements with a service provider. The general terms and conditions...
- Q235. A security administrator is deploying a DLP solution to prevent the exfiltration of sensit...
- Q236. An administrator was notified that a user logged in remotely after hours and copied large ...
- Q237. Which of the following activities uses OSINT?
- Q238. A company must ensure sensitive data at rest is rendered unreadable. Which of the followin...
- Q239. During a security incident, the security operations team identified sustained network traf...
- Q240. An administrator must replace an expired SSL certificate. Which of the following does the ...
- Q241. Which of the following strategies should an organization use to efficiently manage and ana...
- Q242. A company is changing its mobile device policy. The company has the following requirements...
- Q243. A security analyst receives an alert that there was an attempt to download known malware. ...
- Q244. Which of the following involves an attempt to take advantage of database misconfigurations...
- Q245. An administrator notices that several users are logging in from suspicious IP addresses. A...
- Q246. An employee used a company's billing system to issue fraudulent checks. The administrator ...
- Q247. A security administrator observed the following in a web server log while investigating an...
- Q248. Which of the following activities should a systems administrator perform to quarantine a p...
- Q249. Which of the following is the most likely to be included as an element of communication in...
- Q250. A database administrator is updating the company's SQL database, which stores credit card ...
- Q251. An organization is building a new backup data center with cost-benefit as the primary requ...
- Q252. A client demands at least 99.99% uptime from a service provider's hosted security services...
- Q253. A systems administrator works for a local hospital and needs to ensure patient data is pro...
- Q254. Executives at a company are concerned about employees accessing systems and information ab...
- Q255. Which of the following is a hardware-specific vulnerability?...
- Q256. A security analyst is assessing several company firewalls. Which of the following cools wo...
- Q257. A security analyst needs to propose a remediation plan 'or each item in a risk register. T...
- Q258. Which of the following agreement types defines the time frame in which a vendor needs to r...
- Q259. Which of the following is the stage in an investigation when forensic images are obtained?...
- Q260. After a recent vulnerability scan, a security engineer needs to harden the routers within ...
