0% found this document useful (0 votes)
10 views10 pages

CS0 003 11 20

The document discusses various security-related scenarios and best practices, including the importance of application security scanning in the CI/CD pipeline, challenges posed by proprietary systems in vulnerability management, and the significance of conducting post-incident reviews. It also highlights the need for automation in security operations, particularly in email header analysis, and emphasizes the importance of reporting breaches to card issuers under PCI DSS. Additionally, it outlines steps in disaster recovery planning, remediation processes, and the benefits of integrating security controls into a unified system for improved efficiency.

Uploaded by

support
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views10 pages

CS0 003 11 20

The document discusses various security-related scenarios and best practices, including the importance of application security scanning in the CI/CD pipeline, challenges posed by proprietary systems in vulnerability management, and the significance of conducting post-incident reviews. It also highlights the need for automation in security operations, particularly in email header analysis, and emphasizes the importance of reporting breaches to card issuers under PCI DSS. Additionally, it outlines steps in disaster recovery planning, remediation processes, and the benefits of integrating security controls into a unified system for improved efficiency.

Uploaded by

support
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Which of the following recommendations would best mitigate this problem if applied along the SDLC

phase?

A. Conduct regular red team exercises over the application in production


B. Ensure that all implemented coding libraries are regularly checked
C. Use application security scanning as part of the pipeline for the CI/CDflow
D. Implement proper input validation for any data entry form

Answer(s): C

Explanation:

Application security scanning is a process that involves testing and analyzing applications for security
vulnerabilities, such as injection flaws, broken authentication, cross-site scripting, and insecure
configuration. Application security scanning can help identify and fix security issues before they
become exploitable by attackers. Using application security scanning as part of the pipeline for the
continuous integration/continuous delivery (CI/CD) flow can help mitigate the problem of finding the
same vulnerabilities in a critical application during security scanning. This is because application
security scanning can be integrated into the development lifecycle and performed automatically and
frequently as part of the CI/CD process.

QUESTION: 16

An analyst is reviewing a vulnerability report and must make recommendations to the executive
team. The analyst finds that most systems can be upgraded with a reboot resulting in a single
downtime window. However, two of the critical systems cannot be upgraded due to a vendor
appliance that the company does not have access to.

Which of the following inhibitors to remediation do these systems and associated vulnerabilities best
represent?

A. Proprietary systems
B. Legacy systems
C. Unsupported operating systems
D. Lack of maintenance windows

Answer(s): A

Explanation:
Proprietary systems are systems that are owned and controlled by a specific vendor or manufacturer,
and that use proprietary standards or protocols that are not compatible with other systems.
Proprietary systems can pose a challenge for vulnerability management, as they may not allow users
to access or modify their configuration, update their software, or patch their vulnerabilities. In this
case, two of the critical systems cannot be upgraded due to a vendor appliance that the company
does not have access to. This indicates that these systems and associated vulnerabilities are
examples of proprietary systems as inhibitors to remediation

QUESTION: 17

The security team reviews a web server for XSS and runs the following Nmap scan:

Which of the following most accurately describes the result of the scan?

A. An output of characters > and " as the parameters used m the attempt
B. The vulnerable parameter ID hccp://l72.31.15.2/1.php?id-2 and unfiltered characters
returned
C. The vulnerable parameter and unfiltered or encoded characters passed > and " as unsafe
D. The vulnerable parameter and characters > and " with a reflected XSS attempt

Answer(s): D

Explanation:

A cross-site scripting (XSS) attack is a type of web application attack that injects malicious code into a
web page that is then executed by the browser of a victim user. A reflected XSS attack is a type of XSS
attack where the malicious code is embedded in a URL or a form parameter that is sent to the web
server and then reflected back to the user's browser. In this case, the Nmap scan shows that the web
server is vulnerable to a reflected XSS attack, as it returns the characters > and " without any filtering
or encoding. The vulnerable parameter is id in the URL http://172.31.15.2/1.php?id=2.

QUESTION: 18

Which of the following is the best action to take after the conclusion of a security incident to improve
incident response in the future?
A. Develop a call tree to inform impacted users
B. Schedule a review with all teams to discuss what occurred
C. Create an executive summary to update company leadership
D. Review regulatory compliance with public relations for official notification

Answer(s): B

Explanation:

One of the best actions to take after the conclusion of a security incident to improve incident
response in the future is to schedule a review with all teams to discuss what occurred, what went
well, what went wrong, and what can be improved. This review is also known as a lessons learned
session or an after-action report. The purpose of this review is to identify the root causes of the
incident, evaluate the effectiveness of the incident response process, document any gaps or
weaknesses in the security controls, and recommend corrective actions or preventive measures for
future incidents.

Reference:

https://www.eccouncil.org/cybersecurity-exchange/threat- intelligence/cyber-kill-chain-seven-steps-
cyberattack/

QUESTION: 19

A security analyst received a malicious binary file to analyze.

Which of the following is the best technique to perform the analysis?

A. Code analysis
B. Static analysis
C. Reverse engineering
D. Fuzzing

Answer(s): C

Explanation:

Reverse engineering is a technique that involves analyzing a binary file to understand its structure,
functionality, and behavior. Reverse engineering can help security analysts perform malware analysis,
vulnerability research, exploit development, and software debugging. Reverse engineering can be
done using various tools, such as disassemblers, debuggers, decompilers, and hex editors.

QUESTION: 20

An incident response team found IoCs in a critical server. The team needs to isolate and collect
technical evidence for further investigation.

Which of the following pieces of data should be collected first in order to preserve sensitive
information before isolating the server?

A. Hard disk
B. Primary boot partition
C. Malicious tiles
D. Routing table
E. Static IP address

Answer(s): A

Explanation:

The hard disk is the piece of data that should be collected first in order to preserve sensitive
information before isolating the server. The hard disk contains all the files and data stored on the
server, which may include evidence of malicious activity, such as malware installation, data
exfiltration, or configuration changes. The hard disk should be collected using proper forensic
techniques, such as creating an image or a copy of the disk and maintaining its integrity using
hashing algorithms.

QUESTION: 21

Which of the following security operations tasks are ideal for automation?

A.Suspicious file analysis:

Look for suspicious-looking graphics in a folder.

Create subfolders in the original folder based on category of graphics found.


Move the suspicious graphics to the appropriate subfolder

B.Firewall IoC block actions:

Examine the firewall logs for IoCs from the most recently published zero-day exploit Take mitigating
actions in the firewall to block the behavior found in the logs Follow up on any false positives that
were caused by the block rules

C.Security application user errors:

Search the error logs for signs of users having trouble with the security application Look up the user's
phone number

Call the user to help with any questions about using the application

D.Email header analysis:

Check the email header for a phishing confidence metric greater than or equal to five Add the
domain of sender to the block list

Move the email to quarantine

Answer(s): D

Explanation:

Email header analysis is one of the security operations tasks that are ideal for automation. Email
header analysis involves checking the email header for various indicators of phishing or spamming
attempts, such as sender address spoofing, mismatched domains, suspicious subject lines, or
phishing confidence metrics. Email header analysis can be automated using tools or scripts that can
parse and analyze email headers and take appropriate actions based on predefined rules or
thresholds

QUESTION: 22

An organization has experienced a breach of customer transactions. Under the terms of PCI DSS,
which of the following groups should the organization report the breach to?

A. PCI Security Standards Council


B. Local law enforcement
C. Federal law enforcement
D. Card issuer

Answer(s): D
Explanation:

Under the terms of PCI DSS, an organization that has experienced a breach of customer transactions
should report the breach to the card issuer. The card issuer is the financial institution that issues the
payment cards to the customers and that is responsible for authorizing and processing the
transactions. The card issuer may have specific reporting requirements and procedures for the
organization to follow in the event of a breach. The organization should also notify other parties that
may be affected by the breach, such as customers, law enforcement, or regulators, depending on the
nature and scope of the breach.

Reference:

https://www.pcisecuritystandards.org/

QUESTION: 23

Which of the following is the best metric for an organization to focus on given recent investments in

SIEM, SOAR, and a ticketing system?

A. Mean time to detect


B. Number of exploits by tactic
C. Alert volume
D. Quantity of intrusion attempts

Answer(s): A

Explanation:

Mean time to detect (MTTD) is the best metric for an organization to focus on given recent
investments in SIEM, SOAR, and a ticketing system. MTTD is a metric that measures how long it takes
to detect a security incident or threat from the time it occurs. MTTD can be improved by using tools
and processes that can collect, correlate, analyze, and alert on security data from various sources.
SIEM, SOAR, and ticketing systems are examples of such tools and processes that can help reduce
MTTD and enhance security operations.
Reference:

https://www.eccouncil.org/cybersecurity- exchange/threat-intelligence/cyber-kill-chain-seven-steps-
cyberattack

QUESTION: 24

A company is implementing a vulnerability management program and moving from an on-premises


environment to a hybrid IaaS cloud environment.

Which of the following implications should be considered on the new hybrid environment?

A. The current scanners should be migrated to the cloud


B. Cloud-specific misconfigurations may not be detected by the current scanners
C. Existing vulnerability scanners cannot scan laaS systems
D. Vulnerability scans on cloud environments should be performed from the cloud

Answer(s): B

Explanation:

Cloud-specific misconfigurations are security issues that arise from improper or inadequate
configuration of cloud resources, such as storage buckets, databases, virtual machines, or containers.
Cloud-specific misconfigurations may not be detected by the current scanners that are designed for
on-premises environments, as they may not have the visibility or access to the cloud resources or the
cloud provider's APIs. Therefore, one of the implications that should be considered on the new
hybrid environment is that cloud-specific misconfigurations may not be detected by the current
scanners.

QUESTION: 25

A security alert was triggered when an end user tried to access a website that is not allowed per
organizational policy. Since the action is considered a terminable offense, the SOC analyst collects the
authentication logs, web logs, and temporary files, reflecting the web searches from the user's
workstation, to build the case for the investigation.

Which of the following is the best way to ensure that the investigation complies with HR or privacy
policies?

A. Create a timeline of events detailinq the date stamps, user account hostname and IP
information associated with the activities
B. Ensure that the case details do not reflect any user-identifiable information Password protect
the evidence and restrict access to personnel related to the investigation
C. Create a code name for the investigation in the ticketing system so that all personnel with
access will not be able to easily identity the case as an HR-related investigation
D. Notify the SOC manager for awareness after confirmation that the activity was intentional

Answer(s): B

Explanation:

The best way to ensure that the investigation complies with HR or privacy policies is to ensure that
the case details do not reflect any user-identifiable information, such as name, email address, phone
number, or employee ID. This can help protect the privacy and confidentiality of the user and prevent
any potential discrimination or retaliation. Additionally, password protecting the evidence and
restricting access to personnel related to the investigation can help preserve the integrity and
security of the evidence and prevent any unauthorized or accidental disclosure or modification.

QUESTION: 26

Which of the following is the first step that should be performed when establishing a disaster
recovery plan?

A. Agree on the goals and objectives of the plan


B. Determine the site to be used during a disaster
C. C Demonstrate adherence to a standard disaster recovery process
D. Identity applications to be run during a disaster

Answer(s): A

Explanation:

The first step that should be performed when establishing a disaster recovery plan is to agree on the
goals and objectives of the plan. The goals and objectives of the plan should define what the plan
aims to achieve, such as minimizing downtime, restoring critical functions, ensuring data integrity, or
meeting compliance requirements. The goals and objectives of the plan should also be aligned with
the business needs and priorities of the organization and be measurable and achievable.
QUESTION: 27

A technician identifies a vulnerability on a server and applies a software patch.

Which of the following should be the next step in the remediation process?

A. Testing
B. Implementation
C. Validation
D. Rollback

Answer(s): C

Explanation:

The next step in the remediation process after applying a software patch is validation. Validation is a
process that involves verifying that the patch has been successfully applied, that it has fixed the
vulnerability, and that it has not caused any adverse effects on the system or application functionality
or performance. Validation can be done using various methods, such as scanning, testing,
monitoring, or auditing.

QUESTION: 28

The analyst reviews the following endpoint log entry:

Which of the following has occurred?

A. Registry change
B. Rename computer
C. New account introduced
D. Privilege escalation

Answer(s): C
Explanation:

The endpoint log entry shows that a new account named "admin" has been created on a Windows
system with a local group membership of "Administrators". This indicates that a new account has
been introduced on the system with administrative privileges. This could be a sign of malicious
activity, such as privilege escalation or backdoor creation, by an attacker who has compromised the
system.

QUESTION: 29

A security program was able to achieve a 30% improvement in MTTR by integrating security controls
into a SIEM. The analyst no longer had to jump between tools.

Which of the following best describes what the security program did?

A. Data enrichment
B. Security control plane
C. Threat feed combination
D. Single pane of glass

Answer(s): D

Explanation:

A single pane of glass is a term that describes a unified view or interface that integrates multiple
tools or data sources into one dashboard or console. A single pane of glass can help improve security
operations by providing visibility, correlation, analysis, and alerting capabilities across various
security controls and systems. A single pane of glass can also help reduce complexity, improve
efficiency, and enhance decision making for security analysts. In this case, a security program was
able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM, which
provides a single pane of glass for security operations.

Reference:

https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/cyber-kill-chain-seven-steps-
cyberattack

You might also like