1What is the primary purpose of a network security assessment?
Evaluate Network Security Capabilities
Easy
A.To design a new network from scratch
B.To identify vulnerabilities and weaknesses in the network
C.To increase the speed of the internet connection
D.To install new software on all computers
Correct Answer: To identify vulnerabilities and weaknesses in the network
Explanation:
A network security assessment is a systematic process to evaluate the security of a network by identifying potential vulnerabilities, threats, and weaknesses that could be exploited by an attacker.
Incorrect! Try again.
2Which of the following is a common tool used for network scanning to discover hosts and open ports?
Evaluate Network Security Capabilities
Easy
A.Wireshark
B.Microsoft Word
C.Nmap
D.Adobe Photoshop
Correct Answer: Nmap
Explanation:
Nmap (Network Mapper) is a free and open-source utility for network discovery and security auditing. It is widely used to find hosts and services on a computer network, thus creating a 'map' of the network.
Incorrect! Try again.
3What is a security baseline?
Network Security Baselines
Easy
A.A standard level of security configuration for a system or network
B.A list of all users on a network
C.The maximum speed a network can achieve
D.A physical drawing of the network layout
Correct Answer: A standard level of security configuration for a system or network
Explanation:
A security baseline is a standardized level of minimum security controls that all systems throughout an organization must comply with. It acts as a reference point for future changes and security audits.
Incorrect! Try again.
4Why is establishing a network security baseline important?
Network Security Baselines
Easy
A.It guarantees the network will never be successfully attacked
B.It provides a consistent and measurable standard for security
C.It eliminates the need for antivirus software
D.It automatically updates all software on the network
Correct Answer: It provides a consistent and measurable standard for security
Explanation:
Baselines create a consistent security posture across the organization, make it easier to detect deviations or unauthorized changes, and provide a clear, measurable standard for security configurations.
Incorrect! Try again.
5Which network device is designed to filter incoming and outgoing network traffic based on a set of security rules?
Network Security Capability Enhancement
Easy
A.Switch
B.Firewall
C.Router
D.Modem
Correct Answer: Firewall
Explanation:
A firewall is a network security device that monitors and filters network traffic, acting as a barrier between a trusted internal network and an untrusted external network, like the internet.
Incorrect! Try again.
6What is the primary function of an Intrusion Detection System (IDS)?
Network Security Capability Enhancement
Easy
A.To encrypt all network data
B.To actively block all potential threats
C.To manage user passwords and accounts
D.To monitor network traffic for suspicious activity and issue alerts
Correct Answer: To monitor network traffic for suspicious activity and issue alerts
Explanation:
An Intrusion Detection System (IDS) is a passive device or software application that monitors a network for malicious activity or policy violations and reports it to a management station. It is designed to detect, not necessarily to block.
Incorrect! Try again.
7In the context of network security, which of the following is considered an endpoint?
Assess Endpoint Security Capabilities
Easy
A.The internet backbone
B.A network cable
C.A network router
D.A user's laptop
Correct Answer: A user's laptop
Explanation:
An endpoint is any device that connects to the corporate network. Common examples include laptops, desktops, smartphones, servers, and tablets.
Incorrect! Try again.
8What is a primary goal of assessing endpoint security?
Assess Endpoint Security Capabilities
Easy
A.To measure the physical length of network cables
B.To ensure that devices connecting to the network have adequate security controls
C.To count the number of users in an organization
D.To check the internet speed of the network
Correct Answer: To ensure that devices connecting to the network have adequate security controls
Explanation:
Assessing endpoint security involves checking devices for required security measures like up-to-date antivirus, firewalls, and patches before allowing them to connect to the network, thereby preventing threats from entering.
Incorrect! Try again.
9Which of the following is a fundamental security control that should be implemented on all endpoints?
Implement Endpoint Security
Easy
A.Video editing software
B.Social media applications
C.Antivirus/Antimalware software
D.File compression tools
Correct Answer: Antivirus/Antimalware software
Explanation:
Antivirus and antimalware software is a foundational element of endpoint security, designed to detect, prevent, and remove malicious software from devices.
Incorrect! Try again.
10What is the purpose of full disk encryption on an endpoint device?
Implement Endpoint Security
Easy
A.To block viruses from the internet
B.To speed up the device's processor
C.To protect data at rest if the device is lost or stolen
D.To increase the device's storage capacity
Correct Answer: To protect data at rest if the device is lost or stolen
Explanation:
Full disk encryption (FDE) encrypts the entire contents of a hard drive, making the data unreadable without the correct decryption key. This is critical for protecting sensitive information if an endpoint like a laptop is physically stolen.
Incorrect! Try again.
11What is a basic and effective security measure to prevent unauthorized physical access to a mobile device?
Mobile Device Hardening
Easy
A.Deleting old photos
B.Increasing the screen brightness
C.Setting a strong PIN, password, or biometric lock
D.Installing a custom ringtone
Correct Answer: Setting a strong PIN, password, or biometric lock
Explanation:
A screen lock is the first line of defense against unauthorized physical access. Using a strong PIN, password, or biometrics (fingerprint/face ID) makes it difficult for someone to access the data on a lost or stolen device.
Incorrect! Try again.
12Disabling services like Bluetooth and Wi-Fi on a mobile device when they are not in use is a practice of:
Mobile Device Hardening
Easy
A.Enhancing cellular signal
B.Improving call quality
C.Reducing the attack surface
D.Freeing up storage space
Correct Answer: Reducing the attack surface
Explanation:
Unnecessary open services like Bluetooth or Wi-Fi can be potential entry points for attackers. Disabling them when not needed is a hardening technique that reduces the number of ways a device can be attacked, known as reducing the attack surface.
Incorrect! Try again.
13What is the term for installing an application on a mobile device from a source other than the official app store?
Mobile Device Hardening
Easy
A.Uploading
B.Sideloading
C.Downloading
D.Rooting
Correct Answer: Sideloading
Explanation:
Sideloading refers to the process of installing applications from unofficial sources, bypassing the curated and security-checked official app stores (like Google Play Store or Apple App Store). This practice carries a higher risk of installing malware.
Incorrect! Try again.
14In application security, what is the purpose of input validation?
Enhance Application Security Capabilities
Easy
A.To change the color scheme of the application
B.To prevent users from entering malicious data
C.To make the application run faster
D.To ensure the user has a valid license
Correct Answer: To prevent users from entering malicious data
Explanation:
Input validation is a security measure that checks and sanitizes data entered by a user before it is processed by the application. This helps prevent attacks like SQL injection and cross-site scripting (XSS).
Incorrect! Try again.
15The process of regularly scanning application code to find security flaws is known as:
Enhance Application Security Capabilities
Easy
A.Performance monitoring
B.User acceptance testing
C.Code compiling
D.Vulnerability scanning
Correct Answer: Vulnerability scanning
Explanation:
Vulnerability scanning is an automated process that identifies security weaknesses in an application or network. It is a key practice for maintaining and enhancing application security.
Incorrect! Try again.
16Which of the following protocols provides a secure, encrypted connection for web traffic?
Application Protocol Security Baselines
Easy
A.HTTP
B.FTP
C.HTTPS
D.Telnet
Correct Answer: HTTPS
Explanation:
HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP. It uses SSL/TLS to encrypt the communication between the web browser and the server, protecting the data from eavesdropping and tampering.
Incorrect! Try again.
17What is the primary security service provided by protocols like TLS (Transport Layer Security)?
Application Protocol Security Baselines
Easy
A.Encryption
B.User authentication
C.File storage
D.Network routing
Correct Answer: Encryption
Explanation:
The primary purpose of TLS (the successor to SSL) is to provide a secure communication channel between two systems by encrypting the data transmitted between them. This ensures confidentiality and integrity of the data.
Incorrect! Try again.
18In the cloud 'Shared Responsibility Model' for Infrastructure as a Service (IaaS), who is typically responsible for securing the data and applications?
Cloud and Web Application Security Concepts
Easy
A.The internet service provider
B.The customer
C.The hardware vendor
D.The cloud provider
Correct Answer: The customer
Explanation:
In an IaaS model, the cloud provider is responsible for the security of the cloud (physical infrastructure), while the customer is responsible for security in the cloud. This includes securing the operating systems, applications, and data they place on the infrastructure.
Incorrect! Try again.
19What type of web application attack involves injecting malicious scripts into a trusted website, which then get executed in the victim's browser?
Cloud and Web Application Security Concepts
Easy
A.Denial of Service (DoS)
B.Cross-Site Scripting (XSS)
C.Phishing
D.SQL Injection
Correct Answer: Cross-Site Scripting (XSS)
Explanation:
Cross-Site Scripting (XSS) is a vulnerability where an attacker injects client-side scripts into web pages viewed by other users. This can be used to steal session cookies, deface websites, or redirect users to malicious sites.
Incorrect! Try again.
20What is the primary function of a Web Application Firewall (WAF)?
Cloud and Web Application Security Concepts
Easy
A.To filter and monitor HTTP traffic between a web application and the Internet
B.To provide physical security for data centers
C.To manage user identities and access
D.To scan endpoint devices for viruses
Correct Answer: To filter and monitor HTTP traffic between a web application and the Internet
Explanation:
A WAF is specifically designed to protect web applications by filtering and monitoring HTTP traffic. It sits in front of the web application and can block common attacks like SQL injection and Cross-Site Scripting (XSS).
Incorrect! Try again.
21A company is evaluating its network security and wants to gain deeper insight into application-layer traffic, including encrypted SSL/TLS sessions. Their current stateful firewall cannot provide this. Which network security device should they implement to meet this requirement?
Evaluate Network Security Capabilities
Medium
A.A Network Intrusion Prevention System (NIPS)
B.A Next-Generation Firewall (NGFW)
C.A Layer 2 Switch with Port Security
D.A Network Access Control (NAC) server
Correct Answer: A Next-Generation Firewall (NGFW)
Explanation:
A Next-Generation Firewall (NGFW) is designed to operate at the application layer (Layer 7) and has the capability to perform deep packet inspection on encrypted traffic through SSL/TLS decryption. A NIPS may inspect traffic but often lacks native decryption capabilities. A Layer 2 switch operates at the data link layer, and NAC focuses on authentication and authorization, not deep traffic inspection.
Incorrect! Try again.
22An organization has just established a security baseline for its network routers, which includes disabling all unused ports and services. During a periodic audit, a tool reports that several routers have Telnet enabled, which violates the baseline. What is this phenomenon called?
Network Security Baselines
Medium
A.Vulnerability Creep
B.Baseline Deviation
C.Policy Obsolescence
D.Configuration Drift
Correct Answer: Configuration Drift
Explanation:
Configuration drift is the term used to describe the process where a system's configuration changes over time, deviating from the established security baseline. This often happens due to manual changes, patches, or unmanaged updates. Baseline Deviation is a general term, but Configuration Drift specifically describes this unintended change over time.
Incorrect! Try again.
23A security team notices an increase in sophisticated malware that evades signature-based detection. To enhance their network security, they want a solution that can execute suspicious files in an isolated environment to observe their behavior before they enter the network. What capability are they looking for?
Network Security Capability Enhancement
Medium
A.Sandboxing
B.Network Segmentation
C.Honeypotting
D.Protocol Analysis
Correct Answer: Sandboxing
Explanation:
Sandboxing is a security mechanism that provides an isolated environment (the 'sandbox') to execute and analyze suspicious code or files without affecting the host system or network. This is a key feature in advanced threat protection systems for detecting zero-day and polymorphic malware.
Incorrect! Try again.
24A security auditor is assessing an organization's endpoint protection. They find that while a traditional antivirus solution is installed on all workstations, the organization has recently fallen victim to a fileless malware attack. What critical capability is MOST LIKELY missing from their current endpoint security solution?
Assess Endpoint Security Capabilities
Medium
A.Signature-based threat detection
B.Centralized quarantine management
C.Scheduled full-disk scanning
D.Heuristic analysis and behavior monitoring
Correct Answer: Heuristic analysis and behavior monitoring
Explanation:
Fileless malware operates in memory and leverages legitimate system tools (like PowerShell), so it doesn't have a file 'signature' for traditional AV to detect. Endpoint solutions with heuristic analysis and behavior monitoring (often found in EDR or NGAV) are required to detect such attacks by identifying anomalous activities and system calls.
Incorrect! Try again.
25An organization wants to prevent unauthorized software from being executed on employee workstations to reduce the risk of malware. Which of the following endpoint security controls is the MOST effective and proactive method to achieve this?
Implement Endpoint Security
Medium
A.Host-based Intrusion Detection System (HIDS)
B.Full Disk Encryption (FDE)
C.Data Loss Prevention (DLP)
D.Application Whitelisting
Correct Answer: Application Whitelisting
Explanation:
Application whitelisting is a security policy that allows only pre-approved applications to be executed on an endpoint. This provides a very strong defense against malware and unauthorized software, as any application not on the 'whitelist' is blocked by default. HIDS detects, DLP prevents data exfiltration, and FDE protects data at rest, but none of them directly prevent the execution of unauthorized applications.
Incorrect! Try again.
26A company is implementing a Bring Your Own Device (BYOD) policy. To mitigate the risk of corporate data being compromised on personal devices, they want to create a secure, encrypted space on the device for all corporate apps and data, keeping it separate from personal information. Which technology best achieves this goal?
Mobile Device Hardening
Medium
A.Containerization
B.Geofencing
C.Full Device Encryption
D.Remote Wipe
Correct Answer: Containerization
Explanation:
Containerization creates a separate, encrypted, and managed partition or 'container' on a mobile device for corporate data and applications. This effectively isolates corporate assets from the user's personal space, allowing for granular control and security without impacting the user's personal data. Full device encryption protects all data but doesn't separate it, while remote wipe and geofencing are control features, not isolation mechanisms.
Incorrect! Try again.
27A development team wants to integrate security checks directly into their CI/CD pipeline to identify vulnerabilities like SQL injection and cross-site scripting in their code before it is compiled. Which security testing methodology is most appropriate for this requirement?
SAST, also known as 'white-box' testing, analyzes an application's source code, byte code, or binary code for security vulnerabilities without executing the application. This makes it ideal for integration into the early stages of a CI/CD pipeline to find flaws before the code is even compiled or deployed.
Incorrect! Try again.
28A web administrator wants to ensure that browsers visiting their site only ever connect using HTTPS, even if a user types http:// in the address bar. This is to mitigate protocol downgrade and man-in-the-middle attacks. Which HTTP response header should they implement as part of their security baseline?
Application Protocol Security Baselines
Medium
A.X-Content-Type-Options
B.Content-Security-Policy (CSP)
C.X-Frame-Options
D.HTTP Strict Transport Security (HSTS)
Correct Answer: HTTP Strict Transport Security (HSTS)
Explanation:
The HSTS header instructs browsers that they should only communicate with the site using HTTPS. Once a browser receives this header, it will automatically convert all future http:// requests to https:// requests for that domain, preventing insecure connections and protecting against attacks like SSL stripping.
Incorrect! Try again.
29An organization is deploying a new application on an Infrastructure as a Service (IaaS) platform. According to the shared responsibility model, which of the following security tasks is the organization's responsibility, not the cloud provider's?
Cloud and Web Application Security Concepts
Medium
A.Patching the operating systems and configuring firewalls for their virtual machines.
B.Managing the hypervisor that runs the virtual machines.
C.Ensuring the underlying storage and compute infrastructure is secure.
D.Securing the physical data center and network hardware.
Correct Answer: Patching the operating systems and configuring firewalls for their virtual machines.
Explanation:
In the IaaS model, the cloud provider is responsible for the security of the cloud (physical infrastructure, hardware, hypervisor). The customer is responsible for security in the cloud, which includes securing the guest operating systems, applications, data, user access, and virtual network configurations like firewall rules.
Incorrect! Try again.
30A security operations center (SOC) analyst needs to investigate a security alert on an endpoint. They need a tool that provides deep visibility into process execution, registry modifications, network connections, and file changes on the endpoint, as well as the ability to remotely isolate it from the network. Which solution best provides these capabilities?
Implement Endpoint Security
Medium
A.Data Loss Prevention (DLP)
B.Host-based Intrusion Prevention System (HIPS)
C.Endpoint Detection and Response (EDR)
D.Next-Generation Antivirus (NGAV)
Correct Answer: Endpoint Detection and Response (EDR)
Explanation:
EDR solutions are specifically designed for this purpose. They continuously monitor and collect endpoint data, providing the visibility and historical context needed for threat hunting and incident investigation. They also offer response capabilities like isolating hosts, terminating processes, and deleting files, which are crucial for containing threats.
Incorrect! Try again.
31When defining a network security baseline for switches, a network administrator wants to prevent MAC address spoofing and limit the number of devices that can connect to a single port. Which two features should be configured together to achieve this?
Network Security Baselines
Medium
A.Quality of Service (QoS) and SNMP
B.Access Control Lists (ACLs) and 802.1Q Trunking
C.Spanning Tree Protocol (STP) and VLANs
D.Port Security and DHCP Snooping
Correct Answer: Port Security and DHCP Snooping
Explanation:
Port Security can be configured to limit the number of MAC addresses allowed on a specific port and to specify which MAC addresses are allowed. DHCP Snooping helps prevent rogue DHCP servers and validates DHCP traffic, indirectly helping to control which devices get an IP address on the network. Together, they provide strong control over which devices can connect and communicate.
Incorrect! Try again.
32To secure company-issued smartphones, an administrator wants to enforce a policy that prevents users from installing applications from untrusted sources or modifying the core operating system. Which policy should be enforced via their Mobile Device Management (MDM) platform?
Mobile Device Hardening
Medium
A.Blocking access to public Wi-Fi networks.
B.Enforcing a complex passcode and screen lock.
C.Disabling sideloading and preventing rooting/jailbreaking.
D.Requiring the use of the corporate VPN.
Correct Answer: Disabling sideloading and preventing rooting/jailbreaking.
Explanation:
Disabling sideloading (installing apps from outside the official app store) and using MDM controls to detect and block rooted (Android) or jailbroken (iOS) devices are direct hardening techniques. These actions prevent users from bypassing built-in OS security controls and installing potentially malicious applications from untrusted sources.
Incorrect! Try again.
33A company is comparing a traditional Intrusion Detection System (IDS) with a modern Network Detection and Response (NDR) solution. What is a key advantage of the NDR solution that justifies its implementation for advanced threat detection?
Evaluate Network Security Capabilities
Medium
A.It uses machine learning and behavioral analysis to detect anomalies and lateral movement.
B.It is the only solution capable of inspecting packet headers.
C.It can block malicious traffic in real-time based on signatures.
D.It primarily focuses on analyzing log files from various network devices.
Correct Answer: It uses machine learning and behavioral analysis to detect anomalies and lateral movement.
Explanation:
While a traditional IDS often relies heavily on signatures of known threats, an NDR solution excels at identifying unknown threats and sophisticated attacks. It does this by baselining normal network behavior and then using machine learning and advanced analytics to detect anomalous activities, such as an attacker moving laterally within the network, which signature-based systems would likely miss.
Incorrect! Try again.
34A web application is being designed to run in a cloud environment. To protect against credential stuffing and brute-force login attacks, the security architect recommends a cloud-native service that can analyze login patterns, detect suspicious behavior, and dynamically require additional verification like an OTP. Which security concept does this describe?
Cloud and Web Application Security Concepts
Medium
Adaptive MFA (also called risk-based authentication) is an advanced form of MFA that dynamically adjusts the authentication requirements based on the user's context and risk profile (e.g., location, device, time of day, login behavior). It provides strong protection against brute-force attacks by introducing a second factor only when the risk is elevated, offering a balance between security and user experience.
Incorrect! Try again.
35An administrator is securing their domain's email infrastructure to prevent email spoofing and phishing attacks. They configure a DNS TXT record that specifies which mail servers are authorized to send email on behalf of their domain. What is this security mechanism called?
Application Protocol Security Baselines
Medium
A.DomainKeys Identified Mail (DKIM)
B.Secure/Multipurpose Internet Mail Extensions (S/MIME)
C.Sender Policy Framework (SPF)
D.Domain-based Message Authentication, Reporting, and Conformance (DMARC)
Correct Answer: Sender Policy Framework (SPF)
Explanation:
Sender Policy Framework (SPF) is an email authentication method designed to detect forged sender addresses during email delivery. An SPF record in the DNS allows a receiving mail server to check if an incoming mail from a domain comes from a host authorized by that domain's administrators.
Incorrect! Try again.
36A web application is frequently targeted by Cross-Site Scripting (XSS) and SQL injection attacks. The security team needs a solution that can inspect incoming HTTP/S traffic and block malicious requests before they reach the web server. Which security control is specifically designed for this purpose?
Enhance Application Security Capabilities
Medium
A.A Reverse Proxy
B.An Intrusion Prevention System (IPS)
C.A Web Application Firewall (WAF)
D.A Network Firewall
Correct Answer: A Web Application Firewall (WAF)
Explanation:
A WAF is a specialized firewall that operates at the application layer (Layer 7) to protect web applications. It is explicitly designed to understand and filter HTTP/S traffic, allowing it to identify and block common web-based attacks like XSS, SQL injection, and directory traversal that a network firewall or a generic IPS might miss.
Incorrect! Try again.
37A company wants to assess its compliance with a policy that requires all company laptops to have full disk encryption enabled and the corporate antivirus client running with the latest definitions. What type of tool would be most efficient for automating this continuous assessment across hundreds of endpoints?
Assess Endpoint Security Capabilities
Medium
A.A manual audit using checklists
B.A network vulnerability scanner
C.A Security Information and Event Management (SIEM) system
D.A Unified Endpoint Management (UEM) or Configuration Management tool
Correct Answer: A Unified Endpoint Management (UEM) or Configuration Management tool
Explanation:
UEM (or similar tools like SCCM) are designed to manage and enforce policies on endpoints. They can query devices for their configuration state (e.g., encryption status, software versions, service status) and report on compliance, making them the most efficient tool for this specific task. A SIEM collects logs, and a vulnerability scanner looks for CVEs, but neither is primarily for configuration compliance assessment.
Incorrect! Try again.
38To prevent data exfiltration, a company wants to implement a policy that blocks employees from copying sensitive files to personal USB drives but still allows the use of company-issued encrypted USB drives. Which endpoint security technology provides this granular level of control?
Implement Endpoint Security
Medium
A.Application Control
B.Data Loss Prevention (DLP)
C.Full Disk Encryption (FDE)
D.Host-based Firewall
Correct Answer: Data Loss Prevention (DLP)
Explanation:
Data Loss Prevention (DLP) solutions are designed to monitor, detect, and block sensitive data from leaving the corporate network. An endpoint DLP agent can enforce granular policies on peripheral devices, such as allowing access only to specific, encrypted USB models while blocking all others, and can inspect data content to prevent unauthorized transfers.
Incorrect! Try again.
39An organization's flat network architecture has made it easy for malware to spread rapidly between workstations. To limit the blast radius of future incidents, a security architect proposes dividing the network into smaller, isolated logical zones based on function (e.g., HR, Finance, Development). What is this security principle called?
Network Security Capability Enhancement
Medium
A.Least Privilege
B.Network Segmentation
C.Defense in Depth
D.Zero Trust
Correct Answer: Network Segmentation
Explanation:
Network segmentation is the practice of splitting a computer network into smaller subnetworks or segments. This is a core security principle used to contain security breaches, control traffic flow, and improve performance. By isolating segments with firewalls or ACLs, an attack that compromises one segment is prevented from easily spreading to others.
Incorrect! Try again.
40A user's corporate mobile device is lost or stolen. The IT department needs to ensure that all sensitive corporate data on the device is immediately and permanently erased, even without physical access to the device. Which MDM feature must be used to accomplish this?
Mobile Device Hardening
Medium
A.Application Blacklisting
B.Device Lock
C.Geolocation Tracking
D.Remote Wipe
Correct Answer: Remote Wipe
Explanation:
Remote wipe is a security feature that allows a network administrator or device owner to send a command to a computing device to delete all data. This is a critical capability in mobile device management (MDM) for responding to theft or loss to prevent a data breach. Device Lock only prevents access, while geolocation tracks the device's location, neither of which deletes the data.
Incorrect! Try again.
41A financial institution is conducting a security assessment of its core banking system, which is hosted on-premises but communicates with third-party APIs in the cloud. The primary concern is sophisticated, targeted attacks by state-sponsored actors. Which assessment methodology would provide the most realistic evaluation of their defensive capabilities against such threats?
Evaluate Network Security Capabilities
Hard
A.A black-box vulnerability scan using Nessus followed by a manual penetration test based on the OWASP Top 10.
B.An adversarial emulation exercise based on the MITRE ATT&CK framework, specifically modeling threat actor groups known to target the financial sector (e.g., FIN7, Lazarus Group).
C.A comprehensive audit against the ISO 27001 standard to ensure all controls are documented and in place.
D.A configuration review and baseline analysis using the Center for Internet Security (CIS) Benchmarks for all servers and network devices.
Correct Answer: An adversarial emulation exercise based on the MITRE ATT&CK framework, specifically modeling threat actor groups known to target the financial sector (e.g., FIN7, Lazarus Group).
Explanation:
While all options are valid security activities, adversarial emulation specifically aims to mimic the tactics, techniques, and procedures (TTPs) of real-world threat actors. Given the concern about state-sponsored actors, this approach provides the most realistic test of the organization's detection and response capabilities (the 'defensive capabilities') against the actual threats they face. A standard vulnerability scan, compliance audit, or configuration review would not effectively simulate the behavior and persistence of a sophisticated adversary.
Incorrect! Try again.
42A network security analyst establishes a baseline for outbound DNS traffic, noting that 99% of queries are for A or AAAA records and go to the corporate DNS resolvers. A new monitoring rule flags a sudden, sustained increase in TXT record queries from multiple workstations to various external domains, though the total volume of DNS traffic remains within the established baseline's volumetric limits. What is the most likely explanation that requires immediate investigation?
Network Security Baselines
Hard
A.This is a false positive caused by a new software deployment that uses TXT records for license validation.
B.The baseline is too simplistic and needs to be updated to include TXT record queries as a normal traffic type.
C.Data exfiltration is occurring via DNS tunneling, where data is encoded within the subdomains of TXT record queries.
D.A DNS cache poisoning attack is in progress, causing clients to query for incorrect record types.
Correct Answer: Data exfiltration is occurring via DNS tunneling, where data is encoded within the subdomains of TXT record queries.
Explanation:
The key indicators are the switch to a non-standard record type (TXT) for outbound queries, the destination being various external domains, and the activity originating from multiple workstations. This pattern is a classic signature of DNS tunneling, a covert channel used for C2 communication or data exfiltration. While a new application could cause this, the distributed and external nature of the queries makes an attack the most pressing and likely explanation. DNS cache poisoning affects the integrity of responses, it doesn't typically change the nature of outbound queries from clients in this manner.
Incorrect! Try again.
43An organization has a mature security stack including NGFW, IPS, and a SIEM. However, they recently suffered a breach from a sophisticated spear-phishing attack where an attacker gained an employee's credentials and then moved laterally using legitimate administrative tools (PsExec, PowerShell). The SIEM did not generate a high-fidelity alert because the individual actions appeared legitimate. Which security capability enhancement would be most effective at detecting this specific type of threat in the future?
Network Security Capability Enhancement
Hard
A.Upgrading the NGFW to a model with a higher throughput and more advanced threat intelligence feeds.
B.Deploying a User and Entity Behavior Analytics (UEBA) solution to baseline normal user and system behavior and detect anomalous lateral movement.
C.Implementing a Security Orchestration, Automation, and Response (SOAR) platform to automate responses to SIEM alerts.
D.Implementing a network sandbox to analyze all email attachments for malicious code.
Correct Answer: Deploying a User and Entity Behavior Analytics (UEBA) solution to baseline normal user and system behavior and detect anomalous lateral movement.
Explanation:
The core of the problem was the attacker 'living off the land'—using legitimate tools and credentials. Traditional signature-based or rule-based systems (like IPS and basic SIEM rules) often miss this. A UEBA platform excels here by creating a baseline of normal behavior for each user and entity (like a workstation). When the attacker uses the compromised credentials to perform actions that are anomalous for that specific user (e.g., an accountant using PsExec to access a developer's machine), the UEBA system can detect this deviation and flag it as a high-risk threat. SOAR automates responses but doesn't improve detection; a better NGFW or sandbox wouldn't have stopped the lateral movement post-compromise.
Incorrect! Try again.
44An incident responder is investigating a suspected compromise on a Windows endpoint. The Endpoint Detection and Response (EDR) agent has been disabled, and the attacker is believed to be using fileless malware that resides only in memory. Which assessment technique would be the most crucial next step to identify the malicious process and its artifacts?
Assess Endpoint Security Capabilities
Hard
A.Capturing a full memory dump (RAM acquisition) of the live system and analyzing it with a tool like Volatility or Rekall.
B.Performing a full disk image acquisition and running forensic analysis on the image to find malware executables.
C.Running an up-to-date antivirus scan on the live system to detect known malware signatures.
D.Reviewing the Windows Event Logs for suspicious login events and service creation.
Correct Answer: Capturing a full memory dump (RAM acquisition) of the live system and analyzing it with a tool like Volatility or Rekall.
Explanation:
Since the malware is described as 'fileless' and residing 'only in memory', disk-based forensics will likely miss the primary artifacts of the running malicious code. Similarly, a disabled EDR and a fileless nature suggest a standard AV scan would be ineffective. While event logs are useful for context, they won't reveal the in-memory malicious code itself. A memory dump is the only method that captures the live state of the system's RAM, allowing an analyst to find injected code, hidden processes, network connections, and other artifacts that do not exist on the disk, which is essential for investigating fileless malware.
Incorrect! Try again.
45A company is deploying application control using Microsoft AppLocker across its enterprise. The goal is to enforce a strict whitelisting policy, but the IT department is concerned about breaking critical, unsigned legacy applications used by the finance team. What is the most secure and operationally sound implementation strategy to achieve this?
Implement Endpoint Security
Hard
A.Configure AppLocker in 'Audit only' mode indefinitely to monitor but not block the legacy applications.
B.Create path-based rules for the legacy applications, allowing any executable in their specific directories to run.
C.Use a combination of publisher and hash-based rules for all standard software, and create a specific hash-based rule for each required legacy executable after verifying its integrity.
D.Add the software vendor of the legacy application to the 'Trusted Publishers' list in Group Policy.
Correct Answer: Use a combination of publisher and hash-based rules for all standard software, and create a specific hash-based rule for each required legacy executable after verifying its integrity.
Explanation:
This approach provides the best balance of security and functionality. Path-based rules are weak because an attacker who compromises the directory can replace the executable. 'Audit only' mode doesn't enforce security. Adding the vendor as a trusted publisher is risky if the application is unsigned; even if it were signed, this trusts all software from that vendor, which may be too broad. Creating a specific hash rule for each verified legacy binary is the most granular and secure method. It ensures that only that exact, vetted version of the application can run, preventing it from being replaced by malware, while standard, signed applications can be managed efficiently with publisher rules.
Incorrect! Try again.
46A mobile banking application is being developed for both Android and iOS. The primary security concern is preventing the application from running on compromised (rooted or jailbroken) devices where an attacker could hook into the application's process to steal data. Which of the following hardening techniques provides the most robust, platform-agnostic defense against this specific threat?
Mobile Device Hardening
Hard
A.Implementing root/jailbreak detection by checking for the presence of files like /system/app/Superuser.apk or /Applications/Cydia.app.
B.Enforcing mandatory application sandboxing and containerization through the operating system's default security model.
C.Using a Mobile Device Management (MDM) solution to enforce a policy that blocks rooted/jailbroken devices from enrolling.
D.Integrating a remote attestation service (like Google's SafetyNet Attestation API or Apple's DeviceCheck API) to verify device and application integrity with a trusted server before allowing full functionality.
Correct Answer: Integrating a remote attestation service (like Google's SafetyNet Attestation API or Apple's DeviceCheck API) to verify device and application integrity with a trusted server before allowing full functionality.
Explanation:
Simple file-based root detection (Option A) is trivial for a determined attacker to bypass. MDM (Option B) is effective for managed corporate devices, but not for an application available to the general public on unmanaged devices. Standard OS sandboxing (Option D) is a baseline security feature but does not prevent a compromised OS (a rooted device) from tampering with the application's environment. Remote attestation (Option C) is the most robust solution because it relies on a hardware-backed keystore and a trusted verifier (Google/Apple). The application gets a cryptographically signed statement from the service about the device's integrity, which is much harder for an attacker to spoof than a simple client-side check.
Incorrect! Try again.
47A development team is building a complex application using a microservices architecture. They are concerned about runtime attacks that exploit business logic flaws or insecure object deserialization, which are difficult to detect with static analysis. They require a solution that can identify and block these attacks in production with minimal performance overhead. Which technology is best suited for this requirement?
Enhance Application Security Capabilities
Hard
A.Static Application Security Testing (SAST) with custom rules for business logic.
B.Interactive Application Security Testing (IAST) deployed in the pre-production testing environment.
C.Runtime Application Self-Protection (RASP) integrated directly into the application's runtime environment.
D.Dynamic Application Security Testing (DAST) integrated into the CI/CD pipeline.
Correct Answer: Runtime Application Self-Protection (RASP) integrated directly into the application's runtime environment.
Explanation:
RASP is designed specifically for this use case. It instruments the application from within and has context of the code execution, data flow, and business logic at runtime. This allows it to detect and block attacks like insecure deserialization in real-time. SAST (B) cannot understand runtime business logic, and DAST (A) tests from the outside-in, often missing complex internal flaws. IAST (C) is a testing tool, not a production protection mechanism. RASP provides the runtime protection required, directly addressing the stated concerns for a production environment.
Incorrect! Try again.
48A security analyst is examining network captures and notices that an internal client is repeatedly making HTTPS requests to subdomain1.attacker.com and subdomain2.attacker.com. The TLS handshake for these connections completes successfully with a valid certificate for *.attacker.com. However, the server IP address for subdomain1 is 192.168.1.50 (an internal server) and for subdomain2 is a public IP. This pattern is being used to exfiltrate data from the internal server. Which attack is being described?
Application Protocol Security Baselines
Hard
A.DNS Cache Poisoning attack redirecting a legitimate domain to an internal IP.
B.Man-in-the-Middle (MitM) attack using a forged certificate.
C.Server-Side Request Forgery (SSRF) vulnerability in the client application.
D.DNS Rebinding attack.
Correct Answer: DNS Rebinding attack.
Explanation:
This is a classic DNS Rebinding attack. The attacker controls the DNS server for attacker.com. When the victim's browser first queries subdomain1.attacker.com, the attacker's DNS server responds with a very short Time-to-Live (TTL) and a public IP. The browser makes the connection, and the attacker's server serves malicious JavaScript. After the TTL expires, the JavaScript makes another request, but this time when the browser resolves the same domain name, the attacker's DNS server 'rebinds' it to an internal IP (192.168.1.50). The browser's Same-Origin Policy is bypassed because the domain name is the same, allowing the malicious script to interact with and exfiltrate data from the internal server. It's not SSRF because the request originates from the client-side browser, not a server. It's not cache poisoning because the authoritative DNS server is malicious by design.
Incorrect! Try again.
49A company hosts its entire infrastructure on a public cloud provider and wants to enforce a policy that prevents developers from accidentally provisioning S3 buckets or Azure Blob Storage containers with public access. They also need to continuously monitor for configuration drift across their multi-account cloud environment and automatically remediate violations. Which cloud security tool is specifically designed to address this requirement?
B.A Web Application Firewall (WAF) with custom rules.
C.A Cloud Workload Protection Platform (CWPP).
D.A Cloud Access Security Broker (CASB) in reverse-proxy mode.
Correct Answer: A Cloud Security Posture Management (CSPM) tool.
Explanation:
This is the core function of a CSPM tool. CSPM solutions are designed to identify misconfiguration issues and compliance risks in the cloud. They continuously monitor the cloud environment's configuration against a baseline (e.g., CIS benchmarks, internal policies), detect drifts like publicly accessible storage, and often provide automated remediation capabilities. A CASB focuses on securing access between users and cloud applications. A CWPP focuses on protecting the workloads (VMs, containers) themselves. A WAF protects web applications from attacks like SQLi/XSS, but it does not monitor the configuration of the underlying cloud infrastructure.
Incorrect! Try again.
50During a purple team exercise, the blue team's SIEM successfully detected a data staging attempt where a large amount of data was compressed into a single archive on a file server. However, the exfiltration, which occurred slowly over 48 hours via HTTPS POST requests to multiple cloud storage providers, went undetected. When evaluating the security capabilities, this outcome indicates a significant gap in which specific area?
Evaluate Network Security Capabilities
Hard
A.Host-based security control and file integrity monitoring (FIM).
B.Network Traffic Analysis (NTA) focusing on behavioral anomalies and data flow patterns.
C.Log ingestion and storage capacity.
D.Signature-based Intrusion Detection (IDS).
Correct Answer: Network Traffic Analysis (NTA) focusing on behavioral anomalies and data flow patterns.
Explanation:
The blue team successfully detected the host-based activity (data staging) but failed to detect the network-based exfiltration. The exfiltration method was designed to evade simple detection: it was slow, used a common protocol (HTTPS), and went to legitimate destinations (cloud storage). A signature-based IDS would likely miss this. This points to a failure in analyzing network behavior. A robust NTA capability would baseline normal traffic patterns (e.g., volume, destination, frequency) and would be able to flag the anomalous, sustained data transfer to external services, even if it's encrypted and slow, as a deviation from normal behavior.
Incorrect! Try again.
51A new security baseline for routers and switches, based on the CIS benchmarks, requires disabling Telnet and enforcing SSHv2. After deployment, the network operations team reports that their automated legacy network monitoring system, which uses Telnet-based scripts for health checks, has stopped functioning, causing a critical operational impact. What is the most appropriate and secure path to resolution?
Network Security Baselines
Hard
A.Maintain the new baseline and accept the temporary loss of monitoring visibility as an acceptable risk.
B.Work with the operations team to update the monitoring system's scripts to use SSHv2 with a dedicated, non-privileged, key-based service account, while keeping the new baseline in place.
C.Re-enable Telnet on all devices and create a firewall ACL to restrict Telnet access only to the monitoring system's IP address.
D.Roll back the security baseline deployment until the operations team can replace the monitoring system.
Correct Answer: Work with the operations team to update the monitoring system's scripts to use SSHv2 with a dedicated, non-privileged, key-based service account, while keeping the new baseline in place.
Explanation:
This option is the only one that resolves the operational conflict without compromising the security posture. Re-enabling Telnet (Option A) reintroduces a significant vulnerability (unencrypted credentials). Rolling back the baseline (Option B) negates the security improvement. Accepting the loss of monitoring (Option C) creates a different, significant operational risk. The correct approach is to remediate the root cause by modernizing the dependent system (the monitoring tool) to comply with the new, more secure baseline. This aligns security and operations for a long-term, sustainable solution.
Incorrect! Try again.
52An organization is transitioning from a traditional perimeter-based security model to a Zero Trust architecture. Which of the following technology enhancements represents the most foundational and critical step in enabling the 'never trust, always verify' principle within their internal network?
Network Security Capability Enhancement
Hard
A.Implementing network micro-segmentation using a software-defined networking (SDN) overlay or host-based firewalls.
B.Replacing their remote access VPN with a modern solution that integrates with multi-factor authentication.
C.Deploying a centralized SIEM with advanced correlation rules for east-west traffic.
D.Upgrading the perimeter firewall to a Next-Generation Firewall (NGFW) with advanced threat prevention features.
Correct Answer: Implementing network micro-segmentation using a software-defined networking (SDN) overlay or host-based firewalls.
Explanation:
The core tenet of Zero Trust is the elimination of implicit trust within the internal network. Micro-segmentation is the primary technology that achieves this by creating granular security boundaries around individual workloads or applications. It allows the enforcement of strict 'allow-list' policies for all communication (east-west traffic), ensuring that even if one workload is compromised, it cannot easily communicate with or attack others. While the other options are valuable components of a secure network, micro-segmentation is the most direct and foundational implementation of the internal Zero Trust principle of treating all network traffic as untrusted.
Incorrect! Try again.
53An EDR solution generates an alert for a PowerShell script that enumerates Active Directory group memberships and writes the output to a text file. The security analyst confirms the script was executed by a system administrator performing a legitimate audit. This event is a true positive from a detection standpoint but a false positive from an alerting/incident standpoint. What is the most effective long-term approach to assess and refine the EDR's capability to reduce this type of alert fatigue?
Assess Endpoint Security Capabilities
Hard
A.Disable the specific EDR rule that detects Active Directory enumeration via PowerShell.
B.Create a global exclusion for all PowerShell activity originating from the system32\WindowsPowerShell directory.
C.Create a highly specific tuning rule or suppression that allows this exact script (based on hash) or activity only when initiated by authenticated members of the 'Domain Admins' group.
D.Manually close the alert each time it occurs and document it as a known legitimate activity.
Correct Answer: Create a highly specific tuning rule or suppression that allows this exact script (based on hash) or activity only when initiated by authenticated members of the 'Domain Admins' group.
Explanation:
This option represents the principle of least privilege in alert tuning. A global exclusion (Option A) is dangerously broad and would allow attackers to use PowerShell undetected. Disabling the rule entirely (Option B) creates a significant blind spot, as this technique is commonly used by attackers. Manually closing the alert (Option D) does not solve the underlying problem and leads to alert fatigue. By creating a highly specific suppression rule that incorporates context—such as the user's identity/group and the specific script's hash—the organization can filter out the known good behavior without weakening its ability to detect the same TTP when used by an unauthorized user or a different script.
Incorrect! Try again.
54A large enterprise is implementing a Host-based Intrusion Prevention System (HIPS) to protect its servers. During the pilot phase, the HIPS, operating in blocking mode, frequently terminates processes of a critical, in-house legacy application due to behavioral patterns that it flags as suspicious (e.g., writing to system directories, unusual network connections). What is the most effective implementation strategy to roll out the HIPS without causing widespread operational disruption?
Implement Endpoint Security
Hard
A.Whitelist the entire legacy application executable, allowing it to perform any action without HIPS inspection.
B.Disable the behavioral analysis module of the HIPS and rely only on its signature-based detection capabilities.
C.Deploy the HIPS in blocking mode on all servers simultaneously to establish a secure baseline quickly.
D.Deploy the HIPS in a learning or permissive mode for an extended period, analyze the logs to create a detailed profile of the legacy application's normal behavior, and then build fine-grained exception rules before switching to blocking mode.
Correct Answer: Deploy the HIPS in a learning or permissive mode for an extended period, analyze the logs to create a detailed profile of the legacy application's normal behavior, and then build fine-grained exception rules before switching to blocking mode.
Explanation:
This phased approach is the standard best practice for implementing complex security tools like HIPS that can have high operational impact. Deploying in blocking mode immediately (Option A) is guaranteed to cause the issues seen in the pilot. Whitelisting the entire executable (Option B) effectively makes the application immune to HIPS protection, defeating its purpose. Disabling the most valuable feature (behavioral analysis) (Option D) significantly reduces the tool's effectiveness. The correct strategy is to use the learning/monitoring mode to build a high-fidelity baseline of what constitutes 'normal' for the specific environment and applications, then create precise rules to allow that behavior before enabling blocking. This maximizes security while minimizing false positives and operational disruption.
Incorrect! Try again.
55A security tester is able to intercept and modify traffic from a company's mobile application, even though the traffic is encrypted with TLS. The tester accomplished this by installing a custom root CA certificate on their test device and using a proxy tool like Burp Suite or mitmproxy. Which specific mobile application hardening technique is designed to prevent this exact attack vector?
This scenario describes a Man-in-the-Middle (MitM) attack facilitated by a user-installed trusted root CA. Certificate Pinning is the technique designed to defeat this. With pinning, the mobile application is hard-coded to only trust a specific server certificate (or the public key of that certificate). When the app initiates a TLS connection, it compares the server's certificate to its pinned certificate. If they don't match—as would be the case with a MitM proxy that generates its own certificate on the fly—the application will refuse the connection, even if the proxy's certificate is signed by a CA that the device's operating system trusts. The other options are not the primary defense: root detection can be bypassed, obfuscation makes reverse engineering harder but doesn't stop MitM, and strong crypto suites don't help if the client is tricked into trusting the attacker's CA.
Incorrect! Try again.
56In a DevSecOps pipeline, a team uses a SAST tool to scan for vulnerabilities in their code and an SCA tool to check for known vulnerabilities in open-source libraries. The SCA tool flags a critical vulnerability (CVE-2023-XXXX) in the log4j library. The SAST tool, however, does not flag anything. An investigation reveals the application is vulnerable because it uses a specific deprecated and insecure function from the library. Why did the SAST tool fail to detect this, and which tool is better positioned to find such issues?
Enhance Application Security Capabilities
Hard
A.The SAST tool requires an agent to be deployed in the runtime environment to detect how libraries are used, which is a feature of IAST, not SAST.
B.This is a configuration issue in the SCA tool, which should have provided a patch recommendation that the SAST tool could then verify.
C.The SAST tool failed because it cannot analyze third-party compiled libraries; only SCA tools can do this.
D.SAST tools are primarily designed to find vulnerabilities in first-party code (the code developers write), not to identify how that code insecurely uses a third-party library's API. A modern SCA or a specialized SAST tool with data-flow analysis across library boundaries would be needed.
Correct Answer: SAST tools are primarily designed to find vulnerabilities in first-party code (the code developers write), not to identify how that code insecurely uses a third-party library's API. A modern SCA or a specialized SAST tool with data-flow analysis across library boundaries would be needed.
Explanation:
This question highlights a critical nuance between SAST and SCA. A traditional SCA tool's primary job is to match library versions against a database of known CVEs (e.g., log4j version 2.14 is vulnerable). A traditional SAST tool analyzes the source code written by the developers for patterns of vulnerabilities (e.g., SQL injection). The gray area is the interaction between first-party and third-party code. In this case, the vulnerability is not just the presence of the library, but the insecure usage of its functions. A basic SAST tool often lacks the context to understand the internal workings and security implications of third-party library calls. More advanced SAST tools or modern SCA tools are beginning to bridge this gap with deeper analysis, but fundamentally, this is a known blind spot for traditional SAST.
Incorrect! Try again.
57A network security analyst observes TLS 1.3 traffic to a known malicious command-and-control (C2) server IP address. The SIEM has a rule to alert on malicious TLS connections by inspecting the Server Name Indication (SNI) field in the ClientHello message. However, no alert was generated for this traffic. What is the most plausible technical reason for this detection failure specific to TLS 1.3?
Application Protocol Security Baselines
Hard
A.The C2 server is configured to use a weak cipher suite that is not being monitored.
B.TLS 1.3 encrypts the ClientHello message, preventing any inspection of its contents, including the SNI.
C.The attacker is using a self-signed certificate, which the SIEM rule is not configured to detect.
D.The attacker is using Encrypted SNI (ESNI), now known as Encrypted Client Hello (ECH), a feature of TLS 1.3, which encrypts the SNI field, making it unreadable to passive network monitoring tools.
Correct Answer: The attacker is using Encrypted SNI (ESNI), now known as Encrypted Client Hello (ECH), a feature of TLS 1.3, which encrypts the SNI field, making it unreadable to passive network monitoring tools.
Explanation:
In TLS 1.2 and earlier, the SNI field, which reveals the hostname the client is trying to connect to, is sent in plaintext. This allows passive security devices to see the destination hostname even in encrypted traffic. A key privacy and security enhancement in TLS 1.3 is the ability to encrypt this information via ESNI/ECH. If the attacker and their malware leverage this feature, the SIEM rule based on inspecting the plaintext SNI field will fail because the field is no longer in plaintext. Option C is incorrect; the entire ClientHello is not encrypted, but specific extensions within it (like SNI) can be. Self-signed certs and weak ciphers are different issues and wouldn't stop an SNI-based rule from firing if the SNI were visible.
Incorrect! Try again.
58A web application running in a Kubernetes cluster has a Server-Side Request Forgery (SSRF) vulnerability. An attacker can force the application to make HTTP requests to arbitrary URLs. The greatest risk is that the attacker will use this to pivot and access the internal Kubernetes API server or the cloud provider's instance metadata service (e.g., 169.254.169.254). Which of the following controls is the most effective and specific mitigation for this internal pivot risk in a Kubernetes environment?
Cloud and Web Application Security Concepts
Hard
A.Implementing a Web Application Firewall (WAF) in front of the application to block malicious request patterns.
B.Deploying a Kubernetes Network Policy that denies egress traffic from the vulnerable application's pod to the cluster's internal network CIDRs, except for explicitly allowed destinations.
C.Regularly running a vulnerability scanner against the application's container image to detect the SSRF flaw.
D.Enforcing strict egress filtering at the network firewall for all nodes in the cluster.
Correct Answer: Deploying a Kubernetes Network Policy that denies egress traffic from the vulnerable application's pod to the cluster's internal network CIDRs, except for explicitly allowed destinations.
Explanation:
While a WAF (A) can help, sophisticated SSRF payloads can often bypass it. Egress filtering at the node level (B) is too broad and doesn't provide granular, pod-level control. Vulnerability scanning (D) is a detection measure, not a mitigation for an existing flaw. A Kubernetes Network Policy (C) is the most precise and effective control for this specific problem. It operates at L3/L4 within the cluster and can enforce a policy stating 'This pod is not allowed to initiate traffic to the IP range of the Kube API server or the metadata service.' This directly blocks the malicious pivot attempt at the source, even if the SSRF vulnerability itself is successfully exploited, adhering to the principle of least privilege for network access.
Incorrect! Try again.
59A company is processing highly sensitive data in a public cloud and is concerned about threats from a compromised hypervisor or a malicious cloud administrator. They have implemented encryption for data-at-rest (e.g., encrypted disks) and data-in-transit (e.g., TLS). What additional security concept provides the strongest protection against these specific threats by ensuring the data remains encrypted even while it is being processed in memory?
Cloud and Web Application Security Concepts
Hard
A.Homomorphic Encryption
B.A Hardware Security Module (HSM) for key management
C.Client-Side Field-Level Encryption
D.Confidential Computing (using technologies like Intel SGX or AMD SEV-SNP)
Correct Answer: Confidential Computing (using technologies like Intel SGX or AMD SEV-SNP)
Explanation:
This question targets the protection of data-in-use. Encryption-at-rest protects data on disk, and encryption-in-transit protects it on the network. However, data must typically be decrypted in memory (RAM) for the CPU to process it. This is where a compromised hypervisor or malicious admin could potentially access it. Confidential Computing solves this by creating a hardware-based trusted execution environment (TEE), or an 'enclave'. Data is only decrypted inside this secure enclave, and even the host OS/hypervisor cannot access the memory contents. This specifically protects data-in-use. Homomorphic encryption is a different technique that allows computation on ciphertext but is currently very performance-intensive. Client-side encryption protects data before it reaches the cloud, but it still must be decrypted for processing. An HSM protects keys, but not the data being processed by the CPU.
Incorrect! Try again.
60A red team assessment successfully exfiltrated sensitive data by chaining three seemingly low-severity vulnerabilities: (1) an information disclosure flaw in a web server, (2) a weak default password on an internal admin panel discovered from the disclosure, and (3) a misconfigured firewall rule allowing outbound traffic from the admin server to any destination on port 443. When evaluating the organization's security capabilities, this outcome most critically demonstrates a failure in:
C.Adopting a defense-in-depth strategy and understanding aggregate risk.
D.Implementing a robust patch management program.
Correct Answer: Adopting a defense-in-depth strategy and understanding aggregate risk.
Explanation:
While the other options point to individual failures, the core issue is the breakdown of the overall security strategy. The success of the attack relied on the combination of multiple, independent failures. A strong defense-in-depth model assumes that individual controls may fail and therefore requires layered, compensating controls. This scenario shows that each layer had a weakness that, when chained, became a critical threat. The key takeaway is the failure to assess aggregate risk—how multiple low-risk findings can create a high-risk attack path. A mature security capability evaluation looks beyond individual CVE scores and analyzes how the entire system of controls performs against a realistic attack chain.