4 - 5859317947117341942 1 1
4 - 5859317947117341942 1 1
air-gapped network?
A. Bastion host
B. Unsecured Bluetooth
C. Unpatched OS
D. Removable devices
Answer1: D
Answer2: D
A. Infrastructure as code
B. Software as a service
C. Software-defined networking
D. Internet of Things
Answer3: C
1
Q4: Security controls in a data center are being reviewed to ensure
data is properly protected and that human life considerations are
included. Which of the following best describes how the controls
should be set up?
Answer4: D
Answer5: B
Q6: Which of the following would be the best resource for a software
developer who is looking to improve secure coding practices for web
applications?
A. NIST CSF
B. Third-party libraries
C. OWASP
D. Vulnerability scan results
Answer6: C
2
Q7: A website visitor is required to provide property formatted
information in a specific field on a website form. Which of the
following security measures is most likely used for this mandate?
A. Code signing
B. Form submission
C. Input validation
D. SQL injection
Answer7: C
A. Wildcard creation
B. DNS filtering
C. CSR generation
D. Domain validation
Answer8: C
A. Capacity planning
B. Redundancy
C. Geographic dispersion
D. Tabletop Exercise
Answer9: A
3
Q10: An applications security engineer is working to address issues
stemming from situations where necessary approvals and testing
were not done before code was introduced unto the production
environment. Which of the following would be the most appropriate
for the engineer to configure
Answer10: D
A. Avoid
B. Accept
C. Remediate
D. Transfer
Answer12: B
4
Q12: A company wants to deploy PKI on its Internet-facing website.
The applications that are currently deployed are:
The company wants to purchase one SSL certificate that will work
for all the existing applications and any future applications that
follow the same naming conventions, such as store company.com.
Which of the following certificate types would BEST meet the
requirements?
A. Extended validation
B. Wildcard
C. SAN
D. Self-signed
Answer12: B
Answer13: A
5
Q14: Which of the following cloud models provides clients with
servers, storage, and networks but nothing else?
A. SaaS
B. PaaS
C. DaaS
D. laaS
Answer14: D
Answer15: B
Answer16: A
6
Q17: A network engineer is troubleshooting wireless network
connectivity issues that were reported by users. The issues are
occurring only in the sections of the building that is closest to the
parking lot. Users are intermittently experiencing slow speeds when
accessing websites and are unable to connect to network drives. The
issues appear to increase when laptop users return desks after using
their devices in other areas of the building. There have also been
reports of users being required to enter their credentials on web
pages in order to gain access for them.
Answer17: A
Q18: Which of the following will provide the BEST physical security
countermeasures to stop intruders? (Select TWO)
A. Sensors
B. Mantraps
C. Signage
D. Lighting
E. Alarms
F. Fencing
Answer18: BF
7
Q19: Which of the following types of controls is a turnstile?
A. Corrective
B. Detective
C. Technical
D. Physical
Answer19: D
A. Geafencing
B. Full0device encryption
C. Network usage rules
D. Remote control
E. Containerization
F. Application whitelisting
Answer20: BC
8
Q21: A security analyst is reviewing logs on a server and observes the
following output:
A. A dictionary attack
B. A password-spraying attack
C. A rainbow table attack
D. A keylogger attack
Answer21: A
Which of the following cloud models would BEST meet the needs of
the organization?
A. laaS
B. MaaS
C. SaaS
D. PaaS
Answer22: C
9
Q23: A user enters a password to log in to a workstation and is then
prompted to enter an authentication code. Which of the following
MFA factors or attributes are being utilized in the authentication
process? (Select TWO)
Answer23: AE
Answer24: C
10
Q25: A user reports constant lag and performance issues with the
wireless network when working at a local coffee shop. A security
analyst walks the user through an installation of wireshark and get a
five-minute pcap to analyze. The analyst observes the following
output:
Which of the Following attacks does the analyst MOST likely see in
this packet capture?
A. Session replay
B. Evil twin
C. ARP poisoning
D. Bluejacking
Answer25: B
A. RAID 5
B. RAID 2
C. RAID 0+1
D. Raid 6
Answer26: A
11
Q27: An enterprise has hired an outside security firm to conduct
penetration testing on its network and application. The firm has only
been given the documentation to the customers of the applications.
Which of the Following BEST represents the type of testing that will
occur?
A. Bug Bounty
B. Black-box
C. White-box
D. Gray-box
Answer27: C
Q28: The IT department's on-site developer has been with the team
for many years. Each time an application is released, the security
team is able to identify multiple vulnerabilities . Which of the
Following Would BEST help the team ensure the application is ready
to be released to production?
Answer28: C
12
Q29: A retail executive recently accepted a job with a major
competitor. The following week, a security analyst reviews the
security logs and identifies successful logon attempts to access the
departed executive's accounts . Which of the Following security
practices would have addressed the issue?
A. A non-disclosure agreement
B. Least privilege
C. An Acceptable use policy
D. Ofboarding
Answer29: D
Q30: A cybersecurity analyst reviews the log files from a web server
and sees a series of files that indicates a directory-traversal attack
has occurred. Which of the Following is the analyst MOST likely
Seeing?
Answer30: A
13
Q31: An organization is concerned that is hosted web servers are not
running the most updated version of the software. Which of the
following would work BEST to help identify potential
vulnerabilities?
Answer31: D
Answer32: B
14
Q33: A Chief Information Security Officer (CISO) needs to create a
policy set the meets international standards for data privacy and
sharing. Which of the Following should the CISO read and
understand before writing the policies?
A. PCI DSS
B. NIST
C. ISO 31000
D. GDPR
Answer33: D
A. isolation
B. Firewall whitelisting
C. Containment
D. Segmentation
Answer34: D
15
severity
A. CVSS
B. CVE
C. SIEM
D. SOAR
Answer35: A
Q36: A network administrator has been alerted that web pages are
experiencing long load times. After determining it is not a routing or
DNS issue, the administrator logs in to the router, runs a command ,
and receives the following output:
A. Resource exhaustion
B. Memory leak
C. Buffer overflow
D. DDoS attack
Answer36: A
16
Q37: A company is implementing MFA for all applications that store
data. The IT manager wants MFA to be non-disruptive and user
friendly. Which of the Following technologies should the IT manager
use implementing MFA?
A. Email Tokens
B. Hardware authentications
C. Push notifications
D. One-time passwords
Answer37: C
17
A. An attacker was able to bypass application whitelisting by emailing
a spreadsheet attachment with an embedded PowerShell in the file
B. An attacker was able to install malware to the CAasdf234 folder
and use it to gam administrator nights and launch Outlook
C. An attacker was able to move laterally from PC1 to PC2 using a
pass-the-hash attack
D. An attacker was able to phish user credentials successfully from an
Outlook user profile
Answer38: C
A. Security
B. Application
C. Syslog
D. Dump
Answer39: D
A. # iptables –t mangle -X
B. # iptables -Z
C. # iptables –P INPUT –j DROP
D. # iptables -F
Answer40: C
18
Q41: Which of the following is MOST likely to contain ranked and
ordered information the likelihood and potential impact of
catastrophic events that may affect business processes and systems,
while also highlighting the residual risk that need to be managed
after migrating controls have been implemented?
Answer41: C
A. A supply-chain attack
B. Misconfigured BIOS
C. A downgrade attack
D. A logic bomb
E. Fileless malware
Answer42: A
19
Q43: A manufacturing company has several one-off legacy
information systems that cannot be migrated to newer OS due to
software compatibility issues. The Oss are still supported by the
vendor, but the industrial software is no longer supported. The Chief
Information Security Officer (CISO) has created a resiliency plan for
these that will allow OS patches to be installed in a non-production
environment, while also creating backups of the systems for recovery.
A. RAID 1+5
B. Virtual machines
C. Redundancy
D. Full backups
Answer43: D
A. Geofencing
B. Geolocation
C. Impossible travel time
D. Network location
Answer44: A
20
Q45: An analyst is trying to identify insecure services that are
running on the internal network After performing a port scan, the
analyst identifies that a server has some insecure services enabled on
default ports. Which of the following BEST describes the services
that are currently running and the secure alternatives for replacing
them? (Select THREE)
A. SNMPv1, SNMPv2
B. Telnet, SSH
C. Login, rlogin
D. HTTP, HTTPS
E. SNMPv2, SNMPV3
F. TLS, SSL
G. POP, IMAP
H. TFTP, FTP
I. SFTP, FTPS
Answer45: BDE
Q46: A user received an SMS on a mobile phone that asked for bank
details. Which of the following social-engineering techniques was
used in this case?
A. Smishing
B. SPIM
C. Spear phishing
D. Vishing
Answer46: A
21
Q47: While reviewing pcap data, a network security analyst is able to
locate plaintext username and passwords being sent from
workstations to network switches . Which of the following is the
security analyst MOST likely observing?
A. An SSH connection
B. A Telnet session
C. SNMP traps
D. SFTP traffic
Answer47: B
Answer48: DE
22
Q49: A company wants to modify its current backup strategy to
minimize the number of backups that would need to be restored in
case of data loss. Which of the following would be the BEST backup
strategy to implement?
Answer49: D
A. chflage
B. chmod
C. ls
D. setuid
E. lsof
Answer50: B
23
Q51: A security administrator needs to inspect in-transit files on the
enterprise network to search for Pll, Credit Card data, and
classification words. Which of the following would be the BEST to
use?
A. EDR Solution
B. IDS Solution
C. Network DLP solution
D. HIPS software solution
Answer51: C
A. Multifactor authentication.
B. A remote access policy.
C. federation
D. single sign-on
Answer52: C
A. BPA
B. SLA
C. MOU
D. NDA
Answer53: B
24
Q54: Ann, a customer, received a notification from her mortgage
company stating her Pll may be shared with partners, affiliates, and
associates to maintain day-today business operations. Which of the
following documents did the Ann receive?
Answer54: C
A. Brute-force
B. Credential stuffing
C. Remote access Trojan
D. Dictionary
E. Password spraying
Answer55: B
25
Q56: Which of the following terms should ne included in a contract
to help a company monitor the ongoing security maturity of a new
vendor?
Answer56: D
A. AIS
B. Tor
C. IoC
D. SFTP
Answer57: B
Q58: Which of the following is the BEST method for ensuring non-
repudiation?
A. Digital certificate
B. SSH key
C. SSO
D. Token
Answer58: A
26
Q59: A large financial services firm recently released information
regarding a security breach within its corporate network that began
several years before. During the time frame in which the breach
occurred, indicators show an attacker gained administrative access to
the network through a file downloaded from a social media site and
subsequently installed it without the user's knowledge. Since the
compromise, the attacker was able to take command and control of
the computer systems anonymously while obtaining sensitive
corporate and personal employee information. Which of the
following methods did the attacker MOST likely use to gain Access?
A. A fileless virus
B. A logic bomb
C. A bot
D. A RAT
Answer59: C
A. CBT
B. AUP
C. NDA
D. MOU
Answer60: C
27
Q61: Recent changes to a company's BYOD policy require all
personal mobile devices to use a two-factor authentication method
that is not something you know or have . which of the following will
meet this requirement?
A. PKI certificate
B. Smart card
C. Six-digit PIN
D. Facial recognition
Answer61: C
A. An ACL
B. A VLAN
C. A DMZ
D. A VPN
Answer62: A
GET index.php?page=..2f..2..2f..2f..2f..2f..2f..2f..2fpasswd
GET index.php?page=..2f..2f..2f..2f..2f..2..2f..2f..2..2fetc2fpasswd
GET index.php?page=..2f..2..2f..2f..2f..2f..2f..2..2f..2f..2fetc2fpasswd
28
A. API
B. Request forgery
C. SQL injection
D. Directory traversal
Answer63: B
Answer64: B
A. The new flash drives are incorrectly partitioned and the systems are
automatically trying to use an unapproved application to repartition
the drives
B. The new flash drives need a driver that is being blocked by the AV
software because the flash drives are not on the application’s allow
list , temporarily restricting the drives to 512KB of storage
29
C. The GPO prevents the use of flash drives, which triggers a false
positive AV indication and restricts the drives to only 512KB
storage.
D. The GPO blocking the flash drives is being bypassed by a
malicious flash drive that is attempting to harvest plaintext
credentials from memory
Answer65: D
Answer66: D
Answer67: A
30
Q68: An information security officer at a credit card transaction
company is conducting a framework-mapping exercise with the
internal controls The company recently established a new office in
Europe. To which of the following frameworks should the security
officer map the existing controls? (Select TWO)
A. PCI DSS
B. ISO
C. SOC
D. GDPR
E. NIST
F. CSA
Answer68: AD
Answer69: C
31
Q70: A external forensics investigator has been hired to investigate a
data breach at a large enterprise with numerous assets. It is known
that the breach started in the DMZ and moved to the sensitive
information generating multiple logs as the attacker traversed
through the network. Which of the following will BEST assist with
this investigation?
Answer70: C
A. DNS poisoning
B. jamming
C. bluesnarfing
D. DDoS
E. Evil twin
Answer71: E
32
Q72: Which of the following is an example of risk avoidance ?
Answer72: B
A. FTP
B. FIM
C. IPS
D. Antivirus
Answer73: B
A. Identity provider
B. Notarized requestor
C. Service provider
D. Tokenized resource
E. Identity processor
Answer74: AD
33
Q75: Which of the following would be used to find the MOST
common web-application vulnerabilities?
A. MITRE ATT&CK
B. Cyber Kill Chain
C. OWASP
D. SDLC
Answer75: C
A. Password reuse
B. SSO
C. Account audits
D. AUP
Answer76: C
A. Elasticity
B. Stored procedures
C. Continuous integration
D. Functional testing
Answer77: C
34
Q78: A company wants to deploy decoy system alongside production
system in order to entice threat actors and to learn more about
attackers. Which of the following BEST describes these systems?
A. Neural network
B. Virtual machines
C. Honeypots
D. DNS sinkholes
Answer78: C
Answer79: A
A. Hashing
B. Snapshots
C. Event logs
D. Encryption
Answer80: A
35
Q81: law enforcement officials sent a company a notification that
states electronically stored information and paper documents can't
be destroyed which of the following explains this process?
A. Accountability
B. Data breach notification
C. Legal hold
D. Chain of custody
Answer81: D
A. Configure SNMPv3
B. Configure SNMPv1
C. Configure the default community string
D. Configure SNMPv2c
Answer82: A
A. Encryption
B. Pseudo-anonymization
C. Data masking
D. Tokenization
Answer83: B
36
Q83: two organizations are discussing a possible merger Both
organization' Chief financial of officers would like to safely share
payroll data with each other to determine if the pay scale for
different roles and similar at both organizations. which of the
following techniques would be best to protect employee data while
allowing the companies to successfully share this informations ?
A. Encryption
B. Pseudo-anonymization
C. Data masking
D. Tokenization
Answer83: B
A. Walk-through
B. Purple team
C. Read team
D. TAXII
E. MITER ATT&CK
Answer84: C
37
Q85: Which of the following would MOST be identified by a
credentialed scan but would be missed by an uncredentialed scan?
Answer85: B
A. cat/logfiles/messages|tail-500 www.comptia.com
B. grep -500 /logfiles/messages | cat www.comptia.com
C. head – 500 www.comptia.com
D. tail -500/logfiles/messages | grep ww.comptia.com
Answer86: D
38
Q87: The Chief information Security Officer directed a risk
reduction in Shadow IT and created a policy requiring all
unsanctioned high-risk SaaS applications to be blocked from user
access. Which of the following is the BEST security solution to reduce
this risk?
A. CASB
B. VPN concentrator
C. MFA
D. VPC endpoint
Answer87: A
A. Guards
B. Access control vestibules
C. MAC filtering
D. Zero Trust segmentation
E. Network access control
F. Bollards
Answer88: DE
39
Q89: Which of the following is the GREATEST security concern
when outsourcing code development to third-party contractors for an
internet-facing application?
A. Quality assurance
B. Elevated privileges
C. Unknown backdoor
D. Intellectual property theft
Answer89: C
40
Q90: An organization has hired a red team to simulate attacks on its
security posture. Which of the following will the blue team do after
detecting an IoC?
Answer90: D
A. The last full backup that was conducted seven days ago
B. The baseline OS configuration
C. The last known-good configuration stored by the operating system
D. The last incremental backup that was conducted 72 hours ago
Answer91: C
A. Tailgating
B. Credential harvesting
F - B NOT C
C. SPIM
D. Hopping
E. Phishing
F. Vishing
Answer92: CF
41
Q93: Which of the following components can be used to consolidate and
forward inbound internet traffic to multiple cloud environments though a
single firewall?
A. DNS sinkhole
B. Edge computing
C. Cloud hot site
D. Transit gateway
Answer93: D
A. PCI DSS
B. ISO
C. GDPR
D. NIST
Answer94: D
Q95: A security analyst receives an alert from the company's SIEM that
anomalous activity is coming from a local Source IP address of
192.168.34.26. The Chief Information Security Officer asks the analyst to
block the originating source. Several days later, another employee opens
an internal ticket stating that vulnerability scans are no longer being
performed properly. The IP address the employee provides is
192.168.4.26. Which of the following describes this type of alert?
A. True positive
B. False positive
C. True negative
D. False negative
Answer95: B
42
Q96: A company has installed badge readers for building access but is
finding unauthorized individuals roaming the hallways. Which of the
following is the MOST likely cause?
A. Phishing
B. Identity fraud
C. Tailgating
D. Shoulder surfing
Answer96: C
A. Hashing
B. High data entropy
C. Longer key longevity
D. Algorithms that require less computing power
Answer97: B
Q98: A large retail store’s network was breached recently, and this news
was made public. The store did not lose any intellectual property, and no
customer information was stolen. Although no fines were incurred as a
result, the store lost revenue after breach. Which of the following is the
MOST likely reason for this issue?
A. Reputation damage
B. Leadership changes
C. Employee training
D. Identity theft
Answer98: A
43
Q99: A security analyst wants to fingerprint a web server. Which of the
following tools will the security analyst MOST likely use to accomplish
this task?
A. ping 192.168.0.10
B. curl –head http://192.168.0.10
C. nmap –pl-65535 192.168.0.10
D. dig 192.168.0.10
Answer99: B
A. CASB
B. CMS
C. VPC
D. SWG
Answer100: A
44
Q101: Security analysts notice a server login from a user who has been
on vacation for two weeks. The Analysts confirm that the user did not log
in to the system while on vacation. After reviewing packet capture logs,
the analysts notice the following:
Username: ….smithJA….
Password: 944d3697d8880ed40lb5ba2e77811
Answer101: B
Q102: A company wants the ability to restrict web access and monitor the
websites that employees visit. Which of the following would BEST meet
these requirements?
A. Internet proxy
B. WAF
C. VPN
D. Firewall
Answer102: A
45
Q103: An administrator is configuring a firewall rule set for a subnet to
only access DHCP, web pages, and SFTP, and to specifically block FTP.
Which of the following would BEST accomplish this goal?
46
D. [Permission Source Destination Port]
Allow: Any Any 80
Allow: Any Any 443
Deny: Any Any 67
Allow: Any Any 68
Allow: Any Any 22
Allow: Any Any 21
Allow: Any Any
Answer103: C
Answer104: B
47
A. EDR
B. NGFW
C. DLP
D. HIPS
Answer105: A
A. High availability
B. Dynamic resource allocation
C. Segmentation
D. Container security
Answer106: B
A. Collision
B. Prepending
C. Cryptornalware
D. Phishing
Answer107: A
48
Q108: A company wants to build a new website to sell products online.
The website will host a storefront application that will allow visitors to
add products to a shopping cart and pay for the products using a credit
card. Which of the following protocols would be the MOST secure to
implement?
A. SNMP
B. SFTP
C. SSL
D. TLS
Answer108: D
A. Screened subnet
B. VLAN
C. VPN
D. WAF
Answer109: B
49
Q110: A security analyst is evaluating the risks of authorizing multiple
security solutions to collect data from the company's cloud environment.
Which of the following is an immediate consequence of these
integrations?
Answer110: C
Answer111: D
50
Q112: A large bank with two geographically dispersed data centers is
concerned about major power disruptions at both locations. Every day
each location experiences very brief outages that last for a few seconds.
However, during the summer a high risk of intentional brownouts that last
up to an hour exists, particularly at one of the locations near an industrial
smelter. Which of the following is the BEST solution to reduce the risk of
data loss?
A. Generator
B. Dual supply
C. PDU
D. Daily backups
Answer112: A
A. GDPR guidance
B. CIS benchmarks
C. ISO 27001 standards
D. Regional regulations
Answer113: B
51
Q114: As part of the building process for a web application, the
compliance team requires that all PKI certificates are rotated annually and
can only contain wildcards at the secondary subdomain level. Which of
the following certificate properties will meet these requirements?
Answer114: D
A. Domain hijacking
B. DNS poisoning
C. On-path
D. Evil twin
Answer115: B
52
Q116: An organization is repairing the damage after an incident. Which
of the following controls is being implemented?
A. Detective
B. Corrective
C. Compensating
D. Preventive
Answer116: B
Q117: To reduce and limit software and infrastructure costs, the Chief
Information Officer has requested to move email services to the cloud.
The cloud provider and the organization must have security controls to
protect sensitive data. Which of the following cloud services would
BEST accommodate the request?
A. PaaS
B. SaaS
C. DaaS
D. laaS
Answer117: B
A. Corrective
B. Detective
C. Deterrent
D. Compensating
Answer118: C
53
Q119: The new Chief Information Security Officer at a company has
asked the security team to implement stronger user account policies. The
new policies require:
Users to choose a password unique to their last ten passwords
Users to not log in from certain high-risk countries
A. Geotagging
B. Geolocation
C. Password reuse
D. Password complexity
E. Password history
F. Geofencing
Answer119: EF
Answer120: A
54
Q121: Which of the following supplies non-repudiation during a
forensics investigation?
Answer121: E
Q122: The help desk has received calls from users in multiple locations
who are unable to access core network services. The network team has
identified and turned off the network switches using remote commands.
Which of the following actions should the network team take NEXT?
Answer122: D
55
Q123: A research company discovered that an unauthorized piece of
software has been detected on a small number of machines in its lab. The
researchers collaborate with other machines using port 445 and, on the
Internet, using port 443. The unauthorized software is starting to be seen
on additional machines outside of the lab and is making outbound
communications using HTTPS and SMB. The security team has been
instructed to resolve the problem as issue as possible while causing
minimal disruption to the researchers. Which of the following contains
the BEST course of action in this scenario?
Answer123: C
A. Data tokenization
B. Data masking
C. Data purge
D. Data encryption
Answer124: A
56
Q125: The local administrator account for a company's VPN appliance
was unexpectedly used to log in to the remote management interface.
Which of the following would have prevented this from happening?
Answer125: B
A. Antivirus
B. Segmentation
C. Application allow list
D. Patching
E. IDS
F. Jump server
Answer126: BD
57
Q127: A company's help desk has received calls about the wireless
network being down and users being unable to connect to it. The network
administrator says all access points are up and running. One of the help
desk technicians notices the affected users are working in a building near
the parking lot. Which of the following is the most likely reason for the
outage?
A. The APs in the affected area have been unplugged from the
network.
B. A user has set up a rogue access point near the building.
C. Someone near the building is jamming the signal.
D. Someone set up an evil twin access point in the affected area.
Answer127: C
A. SQL injection
B. Cross-site scripting
C. DNS poisoning
D. Certificate forgery
Answer128: B
58
Q129: A security assessment found that several embedded systems are
running unsecure protocols. These Systems were purchased two years ago
and the company that developed them is no longer in business Which of
the following constraints BEST describes the reason the findings cannot
be remediated?
A. Unavailable patch
B. Inability to authenticate
C. Lack of computing power
D. Implied trust
Answer129: A
Q130: Several users have opened tickets with the help desk. The help
desk has reassigned the tickets to a security analyst for further review.
The security analyst reviews the following metrics:
Which of the following is MOST likely the result of the security analyst's
review?
Answer130: A
59
Q131: A company is adopting a BYOD policy and is looking for a
comprehensive solution to protect company information on user devices.
Which of the following solutions would BEST support the policy?
Answer131: D
A. Fileless virus
B. Tainted training data
C. Improper algorithms security
D. Cyptomalware
Answer132: B
Answer133: D
60
Q134: An employee receives a text message that appears to have been
sent by the payroll department and is asking for credential verification.
Which of the following social engineering techniques are being
attempted? (Select Two).
A. Typosquatting
B. Misinformation
C. Impersonation
D. Phishing
E. Smishing
F. Vishing
Answer134: DE
A. DIP
B. IDS
C. IPS
D. ACL
Answer135: C
61
Q136: A company performed an assessment of its security posture and
found a lack of controls to adequately protect from exploitation legacy
systems at manufacturing sites. Which of the following controls should
be set up for this type of environment? (Select two)
A. Jump server
B. Antivirus
C. IDS
D. Segmentation
E. Patching
F. Application allow list
Answer136: DE
Q137: A company's help desk has received calls about the wireless
network being down and users being unable to connect to it. The network
administrator says all access points are up and running. One of the help
desk technicians notices the affected users are working in a building near
the parking lot. Which of the following is the most likely reason for the
outage?
Answer137: A
62
Q138: A user's login credentials were recently compromised During the
investigation, the security analyst determined the user input credentials
into a pop-up window when prompted to confirm the username and
password. However the trusted website does not use a pop-up for entering
user credentials. Which of the following attacks occurred?
A. DNS poisoning
B. Certificate forgery
C. SQL injection
D. Cross-site scripting
Answer138: D
A. Firmware
B. Virtualization
C. Operating system
D. Application
Answer139: A
A. A jump server
B. A stateful firewall server
C. A reverse proxy server
D. A forward proxy server
Answer140: A
63
Q141: A company is discarding a classified storage array and hires an
outside vendor to complete the disposal. Which of the following should
the company request from the vendor?
A. Inventory list
B. Proof of ownership
C. Certification
D. Classification
Answer141: C
Answer142: B
Answer143: A
64
Q144: Which of the following risk management strategies should an
enterprise adopt first if a legacy application is critical to operations?
A. Mitigate
B. Transfer
C. Avoid
D. Accept
Answer144: D
A. ISO 27000
B. GDPR
C. PCIDSS
D. NIST 800-53
Answer145: D
A. Honeypot
B. Blocklist
C. Machine learning
D. DNS sinkhole
Answer146: A
65
Q147: An engineer is setting up a VDI environment for a factory
location, and the business wants to deploy a low-cost solution to enable
users on the shop floor to log in the VDI environment directly. Which of
the following should the engineer select to meet these requirements?
A. Containers
B. Laptops
C. Workstations
D. Thin clients
Answer147: D
A. DLP
B. SED
C. TPM
D. HSM
Answer148: B
66
A. A replay attack is being conducted against the application.
B. A credentialed vulnerability scanner attack is testing several CVEs
against the application.
C. A service account password may have been changed, resulting in
continuous failed logins within the application.
D. An injection attack is being conducted against a user authentication
system.
Answer149: C
A. Cameras
B. Visitor logs
C. Badges
D. Locks
Answer150: C
A. Site-to-site
B. Full tunnel
C. Always On
D. Remote access
Answer151: A
67
Q152: An application owner reports suspicious activity on an internal
financial application from various internal users within the past 14 days.
- Financial transactions were occurring during irregular time frames and
outside of business hours by unauthorized users.
- Internal users in question were changing their passwords frequently
during that time period.
- A jump box that several domain administrator users use to connect to
remote devices was recently compromised.
- The authentication method used in the environment is NTLM.
Which of the following types of attacks is MOST likely being used to
gain unauthorized access?
A. Directory traversal
B. Pass-the-hash
C. Brute-force
D. Replay
Answer152: D
A. Community
B. Private
C. Hybrid
D. Public
Answer153: A
68
Q154: A security engineer needs to recommend a solution to defend
against malicious actors misusing protocols and being allowed through
network defenses. Which of the following will the engineer MOST likely
recommend?
A. An IDS
B. A content filter
C. A WAF
D. A next-generation firewall
Answer154: D
A. Enforcing encryption
B. Applying MDM software
C. Removing administrative permissions
D. Deploying GPOs
Answer155: B
69
A. Geolocation
B. Geotagging
C. Time-of-day restrictions
D. Tokens
E. Certificates
F. Role-based access controls
Answer156: AB
A. Communication protocols
B. Z-Wave compatibility
C. Network range
D. Zigbee configuration
Answer157: A
A. Input validation
B. Obfuscation
C. Error handling
D. Username lockout
Answer158: B
70
Q159: A company recently suffered a breach in which an attacker was
able to access the internal mail servers and directly access several user
inboxes. A large number of email messages were later posted online.
Which of the following would BEST prevent email contents from being
released should another breach occur?
Answer159: A
Q160: A security analyst discovers that one of the web APIs is being
abused by an unknown third party. Logs indicate that the third party is
attempting to manipulate the parameters being passed to the API
endpoint. Which of the following solutions would BEST help to protect
against the attack?
A. NIDS
B. SIEM
C. DLP
D. WAF
Answer160: D
71
Q161: A security analyst was asked to evaluate a potential attack that
occurred on a publicly accessible section of the company's website. The
malicious actor posted an entry in an attempt to trick users into clicking
the following:
https://www.cOmptla.com/contact-
us/3Fname%3D%3Cscript%3Ealert(document. cookie)
%3C%2Fscript%3E
A. SOLi
B. Session replay
C. XSS
D. DLL injection
Answer161: C
Which of the following would be BEST for the security manager to use in
a threat model?
A. Hacktivists
B. White-hat hackers
C. Script kiddies
D. Insider threats
Answer162: A
72
Q163: An organization is outlining data stewardship roles and
responsibilities. Which of the following employee roles would determine
the purpose of data and how to process it?
A. Data controller
B. Data custodian
C. Data protection officer
D. Data processor
Answer163: A
Answer164: B
Answer165: D
73
Q166: A company prevented direct access from the database
administrators' workstations to the network segment that contains
database servers. Which of the following should a database administrator
use to access the database servers?
A. HSM
B. Load balancer
C. Jump server
D. RADIUS
Answer166: C
Answer167: C
Q168: a business development team reports that files are missing from
the database system and the server log-in screens are showing a lock
symbol that requires users to contact an email address to access the
system and data. Which of the following attacks is the company facing?
A. Rootkit
B. Spyware
C. Bloatware
D. Ransomware
Answer168: D
74
Q169: An organization is building a new backup data center with cost-
benefit as the primary requirement and RTO and RPO values around two
days. Which of the following types of sites is the best for this scenario?
A. Warm
B. Real-time recovery
C. Hot
D. Cold
Answer169: B
Q170: A user would like to install software and features that are not
available with a mobile device's default software. Which of the following
would all the user to install unauthorized software and enable new
features?
A. Jailbreaking
B. Side loading
C. Cross-site scripting
D. SQLi
Answer170: A
A. Cloud provider
B. Client
C. DBA
D. Third-party vendor
Answer171: B
75
Q172: Which of the following is the BEST reason to maintain a
functional and effective asset management policy that aids in ensuring the
security of an organization?
Answer172: D
A. DLP
B. VPC
C. CASB
D. ACL
Answer173: A
76
Q174: During an incident, an EDR system detects an increase in the
number of encrypted outbound connections from multiple hosts. A
firewall is also reporting an increase in outbound connections that use
random high ports. An analyst plans to review the correlated logs to find
the source of the incident. Which of the following tools will BEST assist
the analyst?
A. A NGFW
B. A SIEM
C. The Windows Event Viewer
D. A vulnerability scanner
Answer174: B
Answer175: D
77
Q176: Which of the following BEST reduces the security risks introduced
when running systems that have expired vendor support and lack an
immediate replacement?
Answer176: A
Q177: A company recently experienced a data breach and the source was
determined to be an executive who was charging a phone in a public area.
Which of the following would MOST likely have prevented this breach?
A. A device pin
B. A USB data blocker
C. A firewall
D. Biometrics
Answer177: B
A. Domain hijacking
B. On-path attack
C. Protocol poisoning
D. Bluejacking
Answer178: C
78
Q179: A company is auditing the manner in which its European
customers’ personal information is handled. Which of the following
should the company consult?
A. NIST
B. ISO
C. PCI DSS
D. GDPR
Answer179: D
A. 445
B. 135
C. 143
D. 161
E. 443
F. 139
Answer180: AF
79
Q181: A dynamic application vulnerability scan identified code injection
could be performed using a web form. Which of the following will be
BEST remediation to prevent this vulnerability?
Answer181: A
A. Homomorphic
B. Symmetric
C. Asymmetric
D. Ephemeral
Answer182: A
80
A. LDAPS
B. S/MIME
C. SRTP
D. SSH
Answer183: A
Answer184: D
Q185: The manager who is responsible for a data set has asked a security
engineer to apply encryption to the data on a hard disk. The security
engineer is an example of a:
A. Data custodian
B. Data owner
C. Data processor
D. Data controller
Answer185: A
81
Q186: Which of the following technologies is used to actively monitor
for specific file types being transmitted on the network?
A. Honeynets
B. Data loss prevention
C. Tcpreplay
D. File integrity monitoring
Answer186: D
A. MDM
B. User training
C. CASB
D. EDR
Answer187: D
82
Q188: An analyst is working on an email security incident in which the
target opened an attachment containing a worm. The analyst wants to
implement mitigation techniques to prevent further spread. Which of the
following is the BEST course of action for the analyst to take?
Answer188: A
Answer189: D
A. Supply chain
B. Cryptographer downgrade
C. Side channel
D. Malware
Answer190: D
83
Q191: Which of the following environments utilizes dummy data and is
MOST likely to be installed locally on a system that allows code to be
assessed directly and modified easily with each build?
A. Development
B. Staging
C. Production
D. Test
Answer191: D
A. Privilege escalation
B. Buffer overflow
C. Pharming
D. Persistence
Answer192: A
Answer193: D
84
Q194: If a current private key is compromised, which of the following
would ensure it cannot be used to decrypt all historical data?
Answer194: A
Answer195: B
A. Typo squatting
B. A watering-hole attack
C. A spear-phishing attack
D. A phishing attack
Answer196: B
85
Q197: A security analyst discovers several .jpg photos from a cellular
phone during a forensics investigation involving a compromised system.
The analyst runs a forensics tool to gather file metadata. Which of the
following would be part of the images if all the metadata is still intact?
Answer197: B
A. Phishing
B. Whaling
C. Vishing
D. Spear phishing
Answer198: A
86
Q199: A well-known organization has been experiencing attacks from
APIs. The organization is concerned that custom malware is being
created and emailed into the company or installed on USB sticks that are
dropped in parking lots. Which of the following is the BEST defense
against this scenario?
Answer199: C
A. COPE
B. CYOD
C. BYOD
D. VDI
Answer200: C
87
Q201: A security administrator is trying to determine whether a server is
vulnerable to a range of attacks. After using a tool, the administrator
obtains the following output:
A. Memory leak
B. SQL injection
C. Directory traversal
D. Race conditions
Answer201: C
Answer202: D
88
Q203: A financial analyst is expecting an email containing sensitive
information from a client when the email arrives the analyst receives an
error and is unable to open the encrypted message. which of the following
is the MOST likely causes of the issue?
Answer203: B
A. Zero day
B. Legacy operating system
C. Supply chain
D. Weak configuration
Answer204: A
A. Script kiddie
B. Hacktivist
C. Business competitor
D. Criminal syndicate
E. Disgruntled employee
Answer205: B
89
Q206: which of the following is the correct order of volatility from
MOST to LEAST volatile?
Answer206: D
A. FIM
B. HSM
C. CA
D. DLP
Answer207: A
A. MFA
B. Password history
C. Time-based logins
D. Lockout
Answer208: B
90
Q209: A user downloaded an extension for a browser and the user's
device later become infected the analyst who is investigating the incident
saw various logs where the attacker was hiding activity by deleting data
the following was observed running
A. Python
B. Macros
C. Bash
D. PowerShell
Answer209: D
A. Buffer overflow
B. Firmware version
C. SQL injection
D. Cross-site scripting
Answer012: B
A. Phone call
B. Email
C. Text message
D. Instant message
Answer211: B
91
Q212: Which of the following examples would be best mitigated by input
sanitization?
A. Email messages: “Click this link to get your free gift card.”
B. Browser messages: “your connection is not private.”
C. nmap -p- 10.11.1.130
D. <script> alert(“Warning!”); </script>
Answer212: B
Answer213: C
A. Encryption
B. Data masking
C. Geolocation policy
D. Data sovereignty regulation
Answer214: C
92
Q215: A security analyst is scanning a company's public network and
discovers a host is running a remote desktop that can be used to access
the production Network. Which of the following changes should the
security analyst recommend?
Answer215: A
Q216: An IT manager informs the entire help disk stuff that only the IT
manager and the help desk lead will have access to the administrator
Console of the help desk software which of the following security
techniques in the IT manager setting up?
A. Configuration enforcement
B. Employee monitonng
C. Hardening
D. Least privilege
Answer216: D
A. Smishing
B. disinformation
C. impersonation
D. Watering-hole
Answer217: D
93
Q218: Which of the following strategies shifts risks that are not covered
in an organization's risk strategy?
A. Risk acceptance
B. Risk mitigation
C. Risk avoidance
D. Risk transference
Answer218: A
A. Decentralization
B. Software-defined networking
C. Scalability
D. High availability
Answer219: D
A. Deterrent
B. Compensating
C. Directive
D. Corrective
Answer220: D
94
Q221: A company is planning to install a guest wireless network so
visitors will be able to access the Internet. The stakeholders want the
network to be easy to connect to so time is not wasted during meetings.
The WAPs are configured so that power levels and antennas cover only
the conference rooms where visitors will attend meetings. Which of the
following would BEST protect the company's Internal wireless network
against visitors accessing company resources?
A. Decrease the power levels of the access points for the guest
wireless network.
B. Change the password for the guest wireless network every month.
C. Enable WPA2 using 802.1X for logging on to the guest wireless
network.
D. Configure the guest wireless network to be on a separate VLAN
from the company's internal wireless network.
Answer221: D
Which of the following types of attacks is being attempted and how can it
be mitigated?
Answer222: C
95
Q223: Which of the following threat vectors would appear to be the most
legitimate when used by a malicious actor to impersonate a company?
A. Phone call
B. Text message
C. Instant message
D. Email
Answer223: D
Answer224: C
A. Reporting
B. Alerting
C. Scanning
D. Archiving
Answer225: C
96
Q226: A security administrator is setting up a SIEM to help monitor for
notable events across the enterprise. Which of the following control types
does this BEST represent?
A. Detective
B. Compensating
C. Corrective
D. Preventive
Answer226: A
A. Ask for the caller's name, verify the person's identity in the email
directory, and provide the requested information over the phone.
B. Direct the caller to stop by the help desk in person and hang up
declining any further requests from the caller.
C. Request the caller send an email for identity verification and
provide the requested information via email to the caller.
D. Write down the phone number of the caller if possible, the name of
the person requesting the information, hang up, and notify the
organization's cybersecurity officer.
Answer227: D
97
Q228: A host was infected with malware. During the incident response,
Joe, a user, reported that he did not receive any emails with links, but he
had been browsing the Internet all day. Which of the following would
MOST likely show where the malware originated?
Answer228: D
Answer229: B
Q230: A bakery has a secret recipe that it wants to protect. Which of the
following objectives should be added to the company's security
awareness training?
A. Phishing awareness
B. Risk analysis
C. Insider threat detection
D. Business continuity planning
Answer230: C
98
Q231: Which of the following teams combines both offensive and
defensive testing techniques to protect an organization's critical systems?
A. Yellow
B. Red
C. Purple
D. Blue
Answer231: C
Answer232: B
A. Privacy
B. Availability
C. Integrity
D. Confidentiality
Answer233: C
99
Q234: An endpoint protection application contains critical elements that
are used to protect a system from infection. Which of the following must
be updated before completing a weekly endpoint check?
A. Policy engine
B. Policy updates
C. Policy definitions
D. Policy signatures
Answer234: D
A. Database
B. Partition
C. Full disk
D. Asymmetric
Answer235: C
Q236: Which of the following describes the reason root cause analysis
should be conducted as part of incident response?
Answer236: B
100
Q237: During onboarding process, an employee needs to create a
password for an intranet account. The password must include ten
characters, numbers, and letters, and two special characters. Once the
passwords is created, the company will grant the employee access to
other company-owned websites based on the interanet profile. Which of
the following access management concepts is the company most likely
using to safeguard intranet accounts and grant access to multiple sites
based on a user's intranet account? (Select TWO)
A. Identity proofing
B. Default password changes
C. Federation
D. Password manager
E. Open authentication
F. Password complexity
Answer237: ACD
A. Ease of recovery
B. Ability to patch
C. Extensible authentication
D. Physical isolation
E. Attack surface
F. Responsiveness
Answer238: ADF
101
Q239: An audit report indicates multiple suspicious attempts to access
company resources were made. These attempts were not detected by the
company. Which of the following would be the best solution to
implement on the company's network?
A. Jump server
B. Intrusion prevention system
C. Proxy server
D. Security zones
Answer239: D
A. Phishing
B. Typosquatting
C. Smishing
D. Social engineering
Answer240: A
A. Directive
B. Corrective
C. Detective
D. Deterrent
Answer241: C
102
Q242: An attacker posing as the Chief Executive Officer calls an
employee and instructs the employee to buy gift cards. Which of the
following techniques is attacker using?
A. Impersonating
B. Phishing
C. Smishing
D. Vishing
Answer242: A
Answer243: A
A. Tertiary
B. Cold
C. Hot
D. Warm
Answer244: C
103
Q245: A threat actor used a sophisticated attack to breach a well-know
ride-sharing company. The threat actor posted media that this action was
in response to the company's treatment of its drivers. Which of the
following best describes this type of threat actor?
A. Nation-state
B. Organized crime
C. Hacktivist
D. Shadow IT
Answer245: C
Q246: An organization is concerned that its hosted web servers are not
running the most updated version of the software. Which of the following
would work best to help identify potential vulnerabilities?
Answer246: A
A. Red
B. Blue
C. Purple
D. White
Answer247: B
104
Q248: Which of the following requirements apply to a CYOD policy?
(Select Two)
Answer248: DF
105
Q249: Select the appropriate attack and remediation from each drop-
down list to label the corresponding attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the
simulation, please click the Reset All button.
106
Answer249:
107
Q250: A systems administrator needs to install a new wireless network
for authenticated guest access. The wireless network should support
802.1X using the most secure encryption and protocol available.
INSTRUCTIONS
Perform the following steps:
1. Configure the RADIUS server.
2. Configure the WiFi controller.
3. Preconfigure the client for an incoming guest.
108
Answer250:
109
Q251: Leveraging the information supplied below, complete the CSR for
the server to set up TLS (HTTPS)
• Hostname: ws01
• Domain: comptia.org
• IPv4: 10.1.9.50
• IPV4: 10.2.10.50
• Root: home.aspx
• DNS CNAME: homesite
INSTRUCTIONS
Drag the various data points to the correct locations within the CSR.
Extension criteria belong in the left-hand column and values belong in the
corresponding row in the right-hand column.
110
Answer251:
INSTRUCTIONS
Please click on the below items on the network diagram and configure
them accordingly:
- WAP
- DHCP Server
- AAA Server
- Wireless Controller
- LDAP Server
If at any time you would like to bring back the initial state of the
simulation, please click the Reset All button.
111
112
Answer252:
113
Q253: An attack has occurred against a company.
INSTRUCTIONS
You have been tasked to do the following:
- Identify the type of attack that is occurring on the network by clicking
on the attacker's tablet and reviewing the output.
- Identify which compensating controls a developer should implement
on the assets, in order to reduce the effectiveness of future attacks by
dragging them to the correct server.
All objects will be used, but not all placeholders may be filled. Objects
may only be used once.
If at any time you would like to bring back the initial state of the
simulation, please click the Reset All button.
114
Answer253:
INSTRUCTIONS
Click on each firewall to do the following:
1. Deny cleartext web traffic.
2. Ensure secure management protocols are used.
3. Resolve issues at the DR site.
The ruleset order cannot be modified due to outside constraints.
If at any time you would like to bring back the initial state of the
simulation, please click the Reset All button.
115
116
117
118
119
Answer254:
A. RAT
B. SQL injection
C. Backdoor
D. Logic bomb
E. Rootkit
Answer255: D
120
Q256: An incident has occurred in the production environment.
A. Rootkit
B. RAT
C. Logic bomb
D. SQL injection
E. Backdoor
Answer256: A
121
122
123
124
125
126
127
Answer257:
128
Q258: A data owner has been tasked with assigning proper data
classifications and destruction methods for various types of data
contained within the environment.
Answer258:
129
Q259: A security engineer is setting up passwordless authentication for
the first time.
Use the minimum set of commands to set this up and verify that it
works. Commands cannot be reused.
If at any time you would like to bring back the initial state of the
simulation, please click the Reset All button.
Answer259:
130
Q260: You are a security administrator investigating a potential infection
on a network.
INSTRUCTIONS
Click on each host and firewall. Review all logs to determine which host
originated the infection and then identify if each remaining host is clean
or infected. If at any time you would like to bring back the initial state of
the simulation, please click the Reset All button.
131
132
133
Answer260:
134