#1. The Chief information Officer (CIO) wants to establish a non-binding agreement with a third party that outlines the objectives of the mutual arrangement dealing with data transfers between both organizations before establishing a formal partnership. Which of the follow would MOST likely be used?
#2. A satellite communications ISP frequently experiences outages and degraded modes of operation over one of its legacy satellite links due to the use of deprecated hardware and software. Three days per week, on average, a contracted company must follow a checklist of 16 different highlatency commands that must be run in serial to restore nominal performance. The ISP wants this process to be automated. Which of the following techniques would be BEST suited for this requirement?
#3. A security engineer needs to implement a solution to increase the security posture of user endpoints by providing more visibility and control over local administrator accounts. The endpoint security team is overwhelmed with alerts and wants a solution that has minimal operational burdens. Additionally, the solution must maintain a positive user experience after implementation. Which of the following is the BEST solution to meet these objectives?
#4. A Financial Investments organization, requires a task to be carried by more than one person concurrently. This is an example of:
#5. A systems administrator is in the process of hardening the host systems before connecting to the network. The administrator wants to add protection to the boot loader to ensure the hosts are secure before the OS fully boots. Which of the following would provide the BEST boot loader protection?
#6. During a black box assignment, a Pen Tester successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels. Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
#7. Following the report of a potential breach, a security engineer creates a forensic image of the server in question as part of the organization incident response procedure. Which of the following must occur to ensure the integrity of the image?
#8. Acme corporation is establishing a contract with a major services provider. The terms of the agreement are formalized in a document covering the payment terms, limitation of liability, and intellectual property rights. Which of the following documents will MOST likely contain these elements?
#9. A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer's laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy. Which of the following solutions should the security architect recommend?
#10. A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services. Which of the following should be modified to prevent the issue from reoccurring?
#11. A major defense contractor is designing a system, to mitigate recent setbacks caused competitors that are beating the company to market with the new products. Several of the products incorporate propriety enhancements developed by R&D within the company. The network already includes a SEIM and a NIPS and requires 2FA for all user access. Which of the following system should the company consider NEXT to mitigate the associated risks?
#12. Whilst reviewing web server application logs a threat analyst notices the following URL (see exhibit). What type of attack will likely occur?
#13. An application server was recently upgraded to prefer TLS 1.3, and now users are unable to connect their clients to the server. Attempts to reproduce the error are confirmed, and clients are reporting the following: ERR_SSL_VERSION_OR_CIPHER_MISMATCH Which of the following is MOST likely the root cause?
#14. A small company recently developed prototype technology for a military program. The company's security engineer is concerned about potential theft of the newly developed, proprietary information. Which of the following should the security engineer do to BEST manage the threats proactively?
Need to proactively mitigate the risks
#15. Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?
#16. A large online retailer recently experienced a ransomware attack. The CISO is concerned about the attack re-occurring. At this point, no further security measures have been implemented. Which of the following processes can be used to identify potential prevention recommendations?
#17. Security professionals are reviewing MDM device event logs (see exhibit), would poses the biggest risk & how should the team mitigate the risk.
#18. A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users.
Select all that apply: