Unit 4 - Practice Quiz

INT242 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the primary purpose of a network security assessment?

Evaluate Network Security Capabilities Easy
A. To design a new network from scratch
B. To identify vulnerabilities and weaknesses in the network
C. To increase the speed of the internet connection
D. To install new software on all computers

2 Which of the following is a common tool used for network scanning to discover hosts and open ports?

Evaluate Network Security Capabilities Easy
A. Wireshark
B. Microsoft Word
C. Nmap
D. Adobe Photoshop

3 What is a security baseline?

Network Security Baselines Easy
A. A standard level of security configuration for a system or network
B. A list of all users on a network
C. The maximum speed a network can achieve
D. A physical drawing of the network layout

4 Why is establishing a network security baseline important?

Network Security Baselines Easy
A. It guarantees the network will never be successfully attacked
B. It provides a consistent and measurable standard for security
C. It eliminates the need for antivirus software
D. It automatically updates all software on the network

5 Which network device is designed to filter incoming and outgoing network traffic based on a set of security rules?

Network Security Capability Enhancement Easy
A. Switch
B. Firewall
C. Router
D. Modem

6 What is the primary function of an Intrusion Detection System (IDS)?

Network Security Capability Enhancement Easy
A. To encrypt all network data
B. To actively block all potential threats
C. To manage user passwords and accounts
D. To monitor network traffic for suspicious activity and issue alerts

7 In the context of network security, which of the following is considered an endpoint?

Assess Endpoint Security Capabilities Easy
A. The internet backbone
B. A network cable
C. A network router
D. A user's laptop

8 What is a primary goal of assessing endpoint security?

Assess Endpoint Security Capabilities Easy
A. To measure the physical length of network cables
B. To ensure that devices connecting to the network have adequate security controls
C. To count the number of users in an organization
D. To check the internet speed of the network

9 Which of the following is a fundamental security control that should be implemented on all endpoints?

Implement Endpoint Security Easy
A. Video editing software
B. Social media applications
C. Antivirus/Antimalware software
D. File compression tools

10 What is the purpose of full disk encryption on an endpoint device?

Implement Endpoint Security Easy
A. To block viruses from the internet
B. To speed up the device's processor
C. To protect data at rest if the device is lost or stolen
D. To increase the device's storage capacity

11 What is a basic and effective security measure to prevent unauthorized physical access to a mobile device?

Mobile Device Hardening Easy
A. Deleting old photos
B. Increasing the screen brightness
C. Setting a strong PIN, password, or biometric lock
D. Installing a custom ringtone

12 Disabling services like Bluetooth and Wi-Fi on a mobile device when they are not in use is a practice of:

Mobile Device Hardening Easy
A. Enhancing cellular signal
B. Improving call quality
C. Reducing the attack surface
D. Freeing up storage space

13 What is the term for installing an application on a mobile device from a source other than the official app store?

Mobile Device Hardening Easy
A. Uploading
B. Sideloading
C. Downloading
D. Rooting

14 In application security, what is the purpose of input validation?

Enhance Application Security Capabilities Easy
A. To change the color scheme of the application
B. To prevent users from entering malicious data
C. To make the application run faster
D. To ensure the user has a valid license

15 The process of regularly scanning application code to find security flaws is known as:

Enhance Application Security Capabilities Easy
A. Performance monitoring
B. User acceptance testing
C. Code compiling
D. Vulnerability scanning

16 Which of the following protocols provides a secure, encrypted connection for web traffic?

Application Protocol Security Baselines Easy
A. HTTP
B. FTP
C. HTTPS
D. Telnet

17 What is the primary security service provided by protocols like TLS (Transport Layer Security)?

Application Protocol Security Baselines Easy
A. Encryption
B. User authentication
C. File storage
D. Network routing

18 In the cloud 'Shared Responsibility Model' for Infrastructure as a Service (IaaS), who is typically responsible for securing the data and applications?

Cloud and Web Application Security Concepts Easy
A. The internet service provider
B. The customer
C. The hardware vendor
D. The cloud provider

19 What type of web application attack involves injecting malicious scripts into a trusted website, which then get executed in the victim's browser?

Cloud and Web Application Security Concepts Easy
A. Denial of Service (DoS)
B. Cross-Site Scripting (XSS)
C. Phishing
D. SQL Injection

20 What is the primary function of a Web Application Firewall (WAF)?

Cloud and Web Application Security Concepts Easy
A. To filter and monitor HTTP traffic between a web application and the Internet
B. To provide physical security for data centers
C. To manage user identities and access
D. To scan endpoint devices for viruses

21 A company is evaluating its network security and wants to gain deeper insight into application-layer traffic, including encrypted SSL/TLS sessions. Their current stateful firewall cannot provide this. Which network security device should they implement to meet this requirement?

Evaluate Network Security Capabilities Medium
A. A Network Intrusion Prevention System (NIPS)
B. A Next-Generation Firewall (NGFW)
C. A Layer 2 Switch with Port Security
D. A Network Access Control (NAC) server

22 An organization has just established a security baseline for its network routers, which includes disabling all unused ports and services. During a periodic audit, a tool reports that several routers have Telnet enabled, which violates the baseline. What is this phenomenon called?

Network Security Baselines Medium
A. Vulnerability Creep
B. Baseline Deviation
C. Policy Obsolescence
D. Configuration Drift

23 A security team notices an increase in sophisticated malware that evades signature-based detection. To enhance their network security, they want a solution that can execute suspicious files in an isolated environment to observe their behavior before they enter the network. What capability are they looking for?

Network Security Capability Enhancement Medium
A. Sandboxing
B. Network Segmentation
C. Honeypotting
D. Protocol Analysis

24 A security auditor is assessing an organization's endpoint protection. They find that while a traditional antivirus solution is installed on all workstations, the organization has recently fallen victim to a fileless malware attack. What critical capability is MOST LIKELY missing from their current endpoint security solution?

Assess Endpoint Security Capabilities Medium
A. Signature-based threat detection
B. Centralized quarantine management
C. Scheduled full-disk scanning
D. Heuristic analysis and behavior monitoring

25 An organization wants to prevent unauthorized software from being executed on employee workstations to reduce the risk of malware. Which of the following endpoint security controls is the MOST effective and proactive method to achieve this?

Implement Endpoint Security Medium
A. Host-based Intrusion Detection System (HIDS)
B. Full Disk Encryption (FDE)
C. Data Loss Prevention (DLP)
D. Application Whitelisting

26 A company is implementing a Bring Your Own Device (BYOD) policy. To mitigate the risk of corporate data being compromised on personal devices, they want to create a secure, encrypted space on the device for all corporate apps and data, keeping it separate from personal information. Which technology best achieves this goal?

Mobile Device Hardening Medium
A. Containerization
B. Geofencing
C. Full Device Encryption
D. Remote Wipe

27 A development team wants to integrate security checks directly into their CI/CD pipeline to identify vulnerabilities like SQL injection and cross-site scripting in their code before it is compiled. Which security testing methodology is most appropriate for this requirement?

Enhance Application Security Capabilities Medium
A. Penetration Testing
B. Static Application Security Testing (SAST)
C. Dynamic Application Security Testing (DAST)
D. Interactive Application Security Testing (IAST)

28 A web administrator wants to ensure that browsers visiting their site only ever connect using HTTPS, even if a user types http:// in the address bar. This is to mitigate protocol downgrade and man-in-the-middle attacks. Which HTTP response header should they implement as part of their security baseline?

Application Protocol Security Baselines Medium
A. X-Content-Type-Options
B. Content-Security-Policy (CSP)
C. X-Frame-Options
D. HTTP Strict Transport Security (HSTS)

29 An organization is deploying a new application on an Infrastructure as a Service (IaaS) platform. According to the shared responsibility model, which of the following security tasks is the organization's responsibility, not the cloud provider's?

Cloud and Web Application Security Concepts Medium
A. Patching the operating systems and configuring firewalls for their virtual machines.
B. Managing the hypervisor that runs the virtual machines.
C. Ensuring the underlying storage and compute infrastructure is secure.
D. Securing the physical data center and network hardware.

30 A security operations center (SOC) analyst needs to investigate a security alert on an endpoint. They need a tool that provides deep visibility into process execution, registry modifications, network connections, and file changes on the endpoint, as well as the ability to remotely isolate it from the network. Which solution best provides these capabilities?

Implement Endpoint Security Medium
A. Data Loss Prevention (DLP)
B. Host-based Intrusion Prevention System (HIPS)
C. Endpoint Detection and Response (EDR)
D. Next-Generation Antivirus (NGAV)

31 When defining a network security baseline for switches, a network administrator wants to prevent MAC address spoofing and limit the number of devices that can connect to a single port. Which two features should be configured together to achieve this?

Network Security Baselines Medium
A. Quality of Service (QoS) and SNMP
B. Access Control Lists (ACLs) and 802.1Q Trunking
C. Spanning Tree Protocol (STP) and VLANs
D. Port Security and DHCP Snooping

32 To secure company-issued smartphones, an administrator wants to enforce a policy that prevents users from installing applications from untrusted sources or modifying the core operating system. Which policy should be enforced via their Mobile Device Management (MDM) platform?

Mobile Device Hardening Medium
A. Blocking access to public Wi-Fi networks.
B. Enforcing a complex passcode and screen lock.
C. Disabling sideloading and preventing rooting/jailbreaking.
D. Requiring the use of the corporate VPN.

33 A company is comparing a traditional Intrusion Detection System (IDS) with a modern Network Detection and Response (NDR) solution. What is a key advantage of the NDR solution that justifies its implementation for advanced threat detection?

Evaluate Network Security Capabilities Medium
A. It uses machine learning and behavioral analysis to detect anomalies and lateral movement.
B. It is the only solution capable of inspecting packet headers.
C. It can block malicious traffic in real-time based on signatures.
D. It primarily focuses on analyzing log files from various network devices.

34 A web application is being designed to run in a cloud environment. To protect against credential stuffing and brute-force login attacks, the security architect recommends a cloud-native service that can analyze login patterns, detect suspicious behavior, and dynamically require additional verification like an OTP. Which security concept does this describe?

Cloud and Web Application Security Concepts Medium
A. Identity and Access Management (IAM)
B. Cloud Access Security Broker (CASB)
C. Adaptive Multi-Factor Authentication (MFA)
D. Web Application Firewall (WAF)

35 An administrator is securing their domain's email infrastructure to prevent email spoofing and phishing attacks. They configure a DNS TXT record that specifies which mail servers are authorized to send email on behalf of their domain. What is this security mechanism called?

Application Protocol Security Baselines Medium
A. DomainKeys Identified Mail (DKIM)
B. Secure/Multipurpose Internet Mail Extensions (S/MIME)
C. Sender Policy Framework (SPF)
D. Domain-based Message Authentication, Reporting, and Conformance (DMARC)

36 A web application is frequently targeted by Cross-Site Scripting (XSS) and SQL injection attacks. The security team needs a solution that can inspect incoming HTTP/S traffic and block malicious requests before they reach the web server. Which security control is specifically designed for this purpose?

Enhance Application Security Capabilities Medium
A. A Reverse Proxy
B. An Intrusion Prevention System (IPS)
C. A Web Application Firewall (WAF)
D. A Network Firewall

37 A company wants to assess its compliance with a policy that requires all company laptops to have full disk encryption enabled and the corporate antivirus client running with the latest definitions. What type of tool would be most efficient for automating this continuous assessment across hundreds of endpoints?

Assess Endpoint Security Capabilities Medium
A. A manual audit using checklists
B. A network vulnerability scanner
C. A Security Information and Event Management (SIEM) system
D. A Unified Endpoint Management (UEM) or Configuration Management tool

38 To prevent data exfiltration, a company wants to implement a policy that blocks employees from copying sensitive files to personal USB drives but still allows the use of company-issued encrypted USB drives. Which endpoint security technology provides this granular level of control?

Implement Endpoint Security Medium
A. Application Control
B. Data Loss Prevention (DLP)
C. Full Disk Encryption (FDE)
D. Host-based Firewall

39 An organization's flat network architecture has made it easy for malware to spread rapidly between workstations. To limit the blast radius of future incidents, a security architect proposes dividing the network into smaller, isolated logical zones based on function (e.g., HR, Finance, Development). What is this security principle called?

Network Security Capability Enhancement Medium
A. Least Privilege
B. Network Segmentation
C. Defense in Depth
D. Zero Trust

40 A user's corporate mobile device is lost or stolen. The IT department needs to ensure that all sensitive corporate data on the device is immediately and permanently erased, even without physical access to the device. Which MDM feature must be used to accomplish this?

Mobile Device Hardening Medium
A. Application Blacklisting
B. Device Lock
C. Geolocation Tracking
D. Remote Wipe

41 A financial institution is conducting a security assessment of its core banking system, which is hosted on-premises but communicates with third-party APIs in the cloud. The primary concern is sophisticated, targeted attacks by state-sponsored actors. Which assessment methodology would provide the most realistic evaluation of their defensive capabilities against such threats?

Evaluate Network Security Capabilities Hard
A. A black-box vulnerability scan using Nessus followed by a manual penetration test based on the OWASP Top 10.
B. An adversarial emulation exercise based on the MITRE ATT&CK framework, specifically modeling threat actor groups known to target the financial sector (e.g., FIN7, Lazarus Group).
C. A comprehensive audit against the ISO 27001 standard to ensure all controls are documented and in place.
D. A configuration review and baseline analysis using the Center for Internet Security (CIS) Benchmarks for all servers and network devices.

42 A network security analyst establishes a baseline for outbound DNS traffic, noting that 99% of queries are for A or AAAA records and go to the corporate DNS resolvers. A new monitoring rule flags a sudden, sustained increase in TXT record queries from multiple workstations to various external domains, though the total volume of DNS traffic remains within the established baseline's volumetric limits. What is the most likely explanation that requires immediate investigation?

Network Security Baselines Hard
A. This is a false positive caused by a new software deployment that uses TXT records for license validation.
B. The baseline is too simplistic and needs to be updated to include TXT record queries as a normal traffic type.
C. Data exfiltration is occurring via DNS tunneling, where data is encoded within the subdomains of TXT record queries.
D. A DNS cache poisoning attack is in progress, causing clients to query for incorrect record types.

43 An organization has a mature security stack including NGFW, IPS, and a SIEM. However, they recently suffered a breach from a sophisticated spear-phishing attack where an attacker gained an employee's credentials and then moved laterally using legitimate administrative tools (PsExec, PowerShell). The SIEM did not generate a high-fidelity alert because the individual actions appeared legitimate. Which security capability enhancement would be most effective at detecting this specific type of threat in the future?

Network Security Capability Enhancement Hard
A. Upgrading the NGFW to a model with a higher throughput and more advanced threat intelligence feeds.
B. Deploying a User and Entity Behavior Analytics (UEBA) solution to baseline normal user and system behavior and detect anomalous lateral movement.
C. Implementing a Security Orchestration, Automation, and Response (SOAR) platform to automate responses to SIEM alerts.
D. Implementing a network sandbox to analyze all email attachments for malicious code.

44 An incident responder is investigating a suspected compromise on a Windows endpoint. The Endpoint Detection and Response (EDR) agent has been disabled, and the attacker is believed to be using fileless malware that resides only in memory. Which assessment technique would be the most crucial next step to identify the malicious process and its artifacts?

Assess Endpoint Security Capabilities Hard
A. Capturing a full memory dump (RAM acquisition) of the live system and analyzing it with a tool like Volatility or Rekall.
B. Performing a full disk image acquisition and running forensic analysis on the image to find malware executables.
C. Running an up-to-date antivirus scan on the live system to detect known malware signatures.
D. Reviewing the Windows Event Logs for suspicious login events and service creation.

45 A company is deploying application control using Microsoft AppLocker across its enterprise. The goal is to enforce a strict whitelisting policy, but the IT department is concerned about breaking critical, unsigned legacy applications used by the finance team. What is the most secure and operationally sound implementation strategy to achieve this?

Implement Endpoint Security Hard
A. Configure AppLocker in 'Audit only' mode indefinitely to monitor but not block the legacy applications.
B. Create path-based rules for the legacy applications, allowing any executable in their specific directories to run.
C. Use a combination of publisher and hash-based rules for all standard software, and create a specific hash-based rule for each required legacy executable after verifying its integrity.
D. Add the software vendor of the legacy application to the 'Trusted Publishers' list in Group Policy.

46 A mobile banking application is being developed for both Android and iOS. The primary security concern is preventing the application from running on compromised (rooted or jailbroken) devices where an attacker could hook into the application's process to steal data. Which of the following hardening techniques provides the most robust, platform-agnostic defense against this specific threat?

Mobile Device Hardening Hard
A. Implementing root/jailbreak detection by checking for the presence of files like /system/app/Superuser.apk or /Applications/Cydia.app.
B. Enforcing mandatory application sandboxing and containerization through the operating system's default security model.
C. Using a Mobile Device Management (MDM) solution to enforce a policy that blocks rooted/jailbroken devices from enrolling.
D. Integrating a remote attestation service (like Google's SafetyNet Attestation API or Apple's DeviceCheck API) to verify device and application integrity with a trusted server before allowing full functionality.

47 A development team is building a complex application using a microservices architecture. They are concerned about runtime attacks that exploit business logic flaws or insecure object deserialization, which are difficult to detect with static analysis. They require a solution that can identify and block these attacks in production with minimal performance overhead. Which technology is best suited for this requirement?

Enhance Application Security Capabilities Hard
A. Static Application Security Testing (SAST) with custom rules for business logic.
B. Interactive Application Security Testing (IAST) deployed in the pre-production testing environment.
C. Runtime Application Self-Protection (RASP) integrated directly into the application's runtime environment.
D. Dynamic Application Security Testing (DAST) integrated into the CI/CD pipeline.

48 A security analyst is examining network captures and notices that an internal client is repeatedly making HTTPS requests to subdomain1.attacker.com and subdomain2.attacker.com. The TLS handshake for these connections completes successfully with a valid certificate for *.attacker.com. However, the server IP address for subdomain1 is 192.168.1.50 (an internal server) and for subdomain2 is a public IP. This pattern is being used to exfiltrate data from the internal server. Which attack is being described?

Application Protocol Security Baselines Hard
A. DNS Cache Poisoning attack redirecting a legitimate domain to an internal IP.
B. Man-in-the-Middle (MitM) attack using a forged certificate.
C. Server-Side Request Forgery (SSRF) vulnerability in the client application.
D. DNS Rebinding attack.

49 A company hosts its entire infrastructure on a public cloud provider and wants to enforce a policy that prevents developers from accidentally provisioning S3 buckets or Azure Blob Storage containers with public access. They also need to continuously monitor for configuration drift across their multi-account cloud environment and automatically remediate violations. Which cloud security tool is specifically designed to address this requirement?

Cloud and Web Application Security Concepts Hard
A. A Cloud Security Posture Management (CSPM) tool.
B. A Web Application Firewall (WAF) with custom rules.
C. A Cloud Workload Protection Platform (CWPP).
D. A Cloud Access Security Broker (CASB) in reverse-proxy mode.

50 During a purple team exercise, the blue team's SIEM successfully detected a data staging attempt where a large amount of data was compressed into a single archive on a file server. However, the exfiltration, which occurred slowly over 48 hours via HTTPS POST requests to multiple cloud storage providers, went undetected. When evaluating the security capabilities, this outcome indicates a significant gap in which specific area?

Evaluate Network Security Capabilities Hard
A. Host-based security control and file integrity monitoring (FIM).
B. Network Traffic Analysis (NTA) focusing on behavioral anomalies and data flow patterns.
C. Log ingestion and storage capacity.
D. Signature-based Intrusion Detection (IDS).

51 A new security baseline for routers and switches, based on the CIS benchmarks, requires disabling Telnet and enforcing SSHv2. After deployment, the network operations team reports that their automated legacy network monitoring system, which uses Telnet-based scripts for health checks, has stopped functioning, causing a critical operational impact. What is the most appropriate and secure path to resolution?

Network Security Baselines Hard
A. Maintain the new baseline and accept the temporary loss of monitoring visibility as an acceptable risk.
B. Work with the operations team to update the monitoring system's scripts to use SSHv2 with a dedicated, non-privileged, key-based service account, while keeping the new baseline in place.
C. Re-enable Telnet on all devices and create a firewall ACL to restrict Telnet access only to the monitoring system's IP address.
D. Roll back the security baseline deployment until the operations team can replace the monitoring system.

52 An organization is transitioning from a traditional perimeter-based security model to a Zero Trust architecture. Which of the following technology enhancements represents the most foundational and critical step in enabling the 'never trust, always verify' principle within their internal network?

Network Security Capability Enhancement Hard
A. Implementing network micro-segmentation using a software-defined networking (SDN) overlay or host-based firewalls.
B. Replacing their remote access VPN with a modern solution that integrates with multi-factor authentication.
C. Deploying a centralized SIEM with advanced correlation rules for east-west traffic.
D. Upgrading the perimeter firewall to a Next-Generation Firewall (NGFW) with advanced threat prevention features.

53 An EDR solution generates an alert for a PowerShell script that enumerates Active Directory group memberships and writes the output to a text file. The security analyst confirms the script was executed by a system administrator performing a legitimate audit. This event is a true positive from a detection standpoint but a false positive from an alerting/incident standpoint. What is the most effective long-term approach to assess and refine the EDR's capability to reduce this type of alert fatigue?

Assess Endpoint Security Capabilities Hard
A. Disable the specific EDR rule that detects Active Directory enumeration via PowerShell.
B. Create a global exclusion for all PowerShell activity originating from the system32\WindowsPowerShell directory.
C. Create a highly specific tuning rule or suppression that allows this exact script (based on hash) or activity only when initiated by authenticated members of the 'Domain Admins' group.
D. Manually close the alert each time it occurs and document it as a known legitimate activity.

54 A large enterprise is implementing a Host-based Intrusion Prevention System (HIPS) to protect its servers. During the pilot phase, the HIPS, operating in blocking mode, frequently terminates processes of a critical, in-house legacy application due to behavioral patterns that it flags as suspicious (e.g., writing to system directories, unusual network connections). What is the most effective implementation strategy to roll out the HIPS without causing widespread operational disruption?

Implement Endpoint Security Hard
A. Whitelist the entire legacy application executable, allowing it to perform any action without HIPS inspection.
B. Disable the behavioral analysis module of the HIPS and rely only on its signature-based detection capabilities.
C. Deploy the HIPS in blocking mode on all servers simultaneously to establish a secure baseline quickly.
D. Deploy the HIPS in a learning or permissive mode for an extended period, analyze the logs to create a detailed profile of the legacy application's normal behavior, and then build fine-grained exception rules before switching to blocking mode.

55 A security tester is able to intercept and modify traffic from a company's mobile application, even though the traffic is encrypted with TLS. The tester accomplished this by installing a custom root CA certificate on their test device and using a proxy tool like Burp Suite or mitmproxy. Which specific mobile application hardening technique is designed to prevent this exact attack vector?

Mobile Device Hardening Hard
A. Enforcing strong cryptography suites (TLS 1.3 only).
B. Code obfuscation.
C. Root/Jailbreak detection.
D. Certificate Pinning.

56 In a DevSecOps pipeline, a team uses a SAST tool to scan for vulnerabilities in their code and an SCA tool to check for known vulnerabilities in open-source libraries. The SCA tool flags a critical vulnerability (CVE-2023-XXXX) in the log4j library. The SAST tool, however, does not flag anything. An investigation reveals the application is vulnerable because it uses a specific deprecated and insecure function from the library. Why did the SAST tool fail to detect this, and which tool is better positioned to find such issues?

Enhance Application Security Capabilities Hard
A. The SAST tool requires an agent to be deployed in the runtime environment to detect how libraries are used, which is a feature of IAST, not SAST.
B. This is a configuration issue in the SCA tool, which should have provided a patch recommendation that the SAST tool could then verify.
C. The SAST tool failed because it cannot analyze third-party compiled libraries; only SCA tools can do this.
D. SAST tools are primarily designed to find vulnerabilities in first-party code (the code developers write), not to identify how that code insecurely uses a third-party library's API. A modern SCA or a specialized SAST tool with data-flow analysis across library boundaries would be needed.

57 A network security analyst observes TLS 1.3 traffic to a known malicious command-and-control (C2) server IP address. The SIEM has a rule to alert on malicious TLS connections by inspecting the Server Name Indication (SNI) field in the ClientHello message. However, no alert was generated for this traffic. What is the most plausible technical reason for this detection failure specific to TLS 1.3?

Application Protocol Security Baselines Hard
A. The C2 server is configured to use a weak cipher suite that is not being monitored.
B. TLS 1.3 encrypts the ClientHello message, preventing any inspection of its contents, including the SNI.
C. The attacker is using a self-signed certificate, which the SIEM rule is not configured to detect.
D. The attacker is using Encrypted SNI (ESNI), now known as Encrypted Client Hello (ECH), a feature of TLS 1.3, which encrypts the SNI field, making it unreadable to passive network monitoring tools.

58 A web application running in a Kubernetes cluster has a Server-Side Request Forgery (SSRF) vulnerability. An attacker can force the application to make HTTP requests to arbitrary URLs. The greatest risk is that the attacker will use this to pivot and access the internal Kubernetes API server or the cloud provider's instance metadata service (e.g., 169.254.169.254). Which of the following controls is the most effective and specific mitigation for this internal pivot risk in a Kubernetes environment?

Cloud and Web Application Security Concepts Hard
A. Implementing a Web Application Firewall (WAF) in front of the application to block malicious request patterns.
B. Deploying a Kubernetes Network Policy that denies egress traffic from the vulnerable application's pod to the cluster's internal network CIDRs, except for explicitly allowed destinations.
C. Regularly running a vulnerability scanner against the application's container image to detect the SSRF flaw.
D. Enforcing strict egress filtering at the network firewall for all nodes in the cluster.

59 A company is processing highly sensitive data in a public cloud and is concerned about threats from a compromised hypervisor or a malicious cloud administrator. They have implemented encryption for data-at-rest (e.g., encrypted disks) and data-in-transit (e.g., TLS). What additional security concept provides the strongest protection against these specific threats by ensuring the data remains encrypted even while it is being processed in memory?

Cloud and Web Application Security Concepts Hard
A. Homomorphic Encryption
B. A Hardware Security Module (HSM) for key management
C. Client-Side Field-Level Encryption
D. Confidential Computing (using technologies like Intel SGX or AMD SEV-SNP)

60 A red team assessment successfully exfiltrated sensitive data by chaining three seemingly low-severity vulnerabilities: (1) an information disclosure flaw in a web server, (2) a weak default password on an internal admin panel discovered from the disclosure, and (3) a misconfigured firewall rule allowing outbound traffic from the admin server to any destination on port 443. When evaluating the organization's security capabilities, this outcome most critically demonstrates a failure in:

Evaluate Network Security Capabilities Hard
A. Enforcing a strong password complexity policy.
B. Conducting regular automated vulnerability scanning.
C. Adopting a defense-in-depth strategy and understanding aggregate risk.
D. Implementing a robust patch management program.