CMIT 320 Final Exam Latest Update - Actual Exam 200 Questions with 100% Verified Correct Answers Guaranteed A+ Verified by Professor
a binary file format found mainly in Java environments - CORRECT ANSWER: DER
A company configures workstations only to run software on an approved list. What is
this an example of? - CORRECT ANSWER: allow listing
A company decides to invest in embedded systems to improve security by limiting the number of components used in various critical and sensitive systems. Which of the following would make it more difficult to justify embedded systems in certain cases?This task contains the radio buttons and checkboxes for options. Press the enter key to
select the option. option A - CORRECT ANSWER: the wireless networking range
a format for sharing and archiving certificates without the private key - CORRECT
ANSWER: P7B
a framework for enterprise risk management - CORRECT ANSWER: 31000
a knowledge base of adversary techniques presented as a matrix for enterprise -
CORRECT ANSWER: mitre att&ck
a linear seven step attack model that defenders use to interrupt the steps and stop the
attack - CORRECT ANSWER: cyber kill chain
A manufacturer that relies on purchasing various components for the fabrication of their finished products made the decision to work only with suppliers that use a particular blockchain solution to track individual items along the supply chain. What is the key feature of a private blockchain that assures the manufacturer that the status 1 / 3
transformation of any given component along its journey cannot be forged or corrupted, ensuring all status updates are verified accurately? - CORRECT ANSWER: the public ledger
A network technician has been asked to troubleshoot recently observed performance issues as well as the root cause of new alerts regarding network traffic anomalies.Which monitoring tool should the technician choose first to troubleshoot both problems?
- CORRECT ANSWER: bandwidth monitor
A secure records room installed a new iris scanner, chosen for its low crossover error
rate. What does that mean it has? - CORRECT ANSWER: Low FRR (false rejection
rate) & low FAR (false acceptance rate)
A security program alerts you of a failed login attempt to a secure system. On investigation, you learn the system's regular user accidentally had caps lock turned on.
What kind of alert was it? - CORRECT ANSWER: false positive
A user complains that after entering a URL into a browser, what appeared to be the correct page is displayed in the browser. However, after clicking a few links on the page, it became obvious that the site the user arrived at was not the correct site, but instead a malicious copy of the site the user intended to visit. Which of the following attacks did
the user most likely fall prey to? - CORRECT ANSWER: typosquatting
A user complains that every time they open their Internet browser, it no longer goes to their preferred home page, and advertisements pop up in dialog boxes that they have to
close. What is the likely cause? - CORRECT ANSWER: spyware
a very popular Base-64 ASCII-encoded file format - CORRECT ANSWER: PEM
ACLs that are secure by default are based on which assumption? - CORRECT
ANSWER: implicit deny
- / 3
After a security incident, you rush to take a screenshot of a telltale running process before you leisurely take a backup of suspicious files on the hard drive. What forensic
principle are you exercising? - CORRECT ANSWER: Order of Volatility
After finishing a full antimalware scan on all drives in a server, a technician is convinced an infection of some sort persists. Which of the following malware variants would have
evaded the scan that was performed? - CORRECT ANSWER: fileless virus
After having trouble navigating to a webpage on the Internet, resulting in a privacy error, you inspect the site's certificate and notice the chain of certificates contains three nodes, one being the leaf certificate of the site you are attempting to reach. You inspect the root certificate and find that your operating system stores an exact match for it locally and, therefore, it and your browser trust it explicitly. Which of the following
actions might solve the problem you are facing? - CORRECT ANSWER: install the
certificate of the intermediate CA
Also known as after-action meetings and reports, what alternate name for these bears evidence to the importance of discussing and documenting the outcome of an incident
response-team activation? - CORRECT ANSWER: lessons learned
Among the options listed, which mitigation technique is known most for increasing
security at the expense of flexibility? - CORRECT ANSWER: whitelisting
An administrator has created two EC2 instances in an AWS VPC. Noticing that the default behavior of the instances is to allow full communication between them, the administrator investigates ways to control their interaction with one another. What option
best supports the interests of the administrator? - CORRECT ANSWER: Using non-
standard security groups
An administrator sets up a new virtualization server with virtual machines intended to run instances of a web-based application while following secure configuration guides from CIS for the operating system, hypervisor, webserver, and application server. What can the administrator use to confirm that all efforts to secure these components were
- / 3