Название: (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests
Автор: Mike Chapple
Издательство: John Wiley & Sons Limited
Жанр: Зарубежная компьютерная литература
isbn: 9781119852094
isbn:
4 Chris would like to use John the Ripper to test the security of passwords on a compromised Linux system. What files does he need to conduct this analysis?/etc/shadow and /etc/user/etc/passwd and /etc/user/etc/user and /etc/account/etc/passwd and /etc/shadow
5 Alex’s organization uses the NIST incident classification scheme. Alex discovers that a laptop belonging to a senior executive had keylogging software installed on it. How should Alex classify this occurrence?EventAdverse eventIncidentPolicy violation
6 When working to restore systems to their original configuration after a long-term APT compromise, Charles has three options:Option 1: He can restore from a backup and then update patches on the system.Option 2: He can rebuild and patch the system using the original installation media and application software and his organization’s build documentation.Option 3: He can remove the compromised accounts and rootkit tools and then fix the issues that allowed the attackers to access the systems.Which option should Charles choose in this scenario?Option 1Option 2Option 3None of the above. Charles should hire a third party to assess the systems before proceeding.
7 If Danielle wants to purge a drive, which of the following options will accomplish her goal?Cryptographic eraseReformatOverwritePartition
8 Cynthia is building a series of scripts to detect malware beaconing behavior on her network. Which of the following is not a typical means of identifying malware beaconing?Persistence of the beaconingBeacon protocolBeaconing intervalRemoval of known traffic
9 While performing post-rebuild validation efforts, Scott scans a server from a remote network and sees no vulnerabilities. Joanna, the administrator of the machine, runs a scan and discovered two critical vulnerabilities and five moderate issues. What is most likely causing the difference in their reports?Different patch levels during the scansScanning through a load balancerFirewall between the remote network and the serverRunning the scan with different settings
10 Mika wants to analyze the contents of a drive without causing any changes to the drive. What method is best suited to ensuring this?Set the read-only jumper on the drive.Use a write blocker.Use a read blocker.Use a forensic software package.
11 What type of forensic investigation-related form is shown here?Chain of custodyReport of examinationForensic discovery logPolicy custody release
12 Eric has access to a full suite of network monitoring tools and wants to use appropriate tools to monitor network bandwidth consumption. Which of the following is not a common method of monitoring network bandwidth usage?SNMPPortmonPacket sniffingNetflow
13 After completing an incident response process and providing a final report to management, what step should Casey use to identify improvement to her incident response plan?Update system documentation.Conduct a lessons-learned session.Review patching status and vulnerability scans.Engage third-party consultants.
14 The senior management of Kathleen’s company is concerned about rogue devices on the network. If Kathleen wants to identify rogue devices on her wired network, which of the following solutions will quickly provide the most accurate information?Discovery scan with a port scannerRouter and switch-based MAC address reportingPhysical surveyReviewing a central administration tool, such as SCCM
15 During a forensic investigation, Charles discovers that he needs to capture a virtual machine that is part of the critical operations of his company’s website. If he cannot suspend or shut down the machine for business reasons, what imaging process should he follow?Perform a snapshot of the system, boot it, suspend the copied version, and copy the directory it resides in.Copy the virtual disk files and then use a memory capture tool.Escalate to management to get permission to suspend the system to allow a true forensic copy.Use a tool like the Volatility Framework to capture the live machine completely.
16 Lauren is the IT manager for a small company and occasionally serves as the organization’s information security officer. Which of the following roles should she include as the leader of her organization’s CSIRT?Her lead IT support staff technicianHer organization’s legal counselA third-party IR team leadShe should select herself.
17 Because of external factors, Eric has only a limited time period to collect an image from a workstation. If he collects only specific files of interest, what type of acquisition has he performed?LogicalBit-by-bitSparseNone of the above
18 NIST defines five major types of threat information types in NIST SP 800-150 the “Guide to Cyber Threat Information Sharing.” They are:Indicators, which are technical artifacts or observables that suggest an attack is imminent, currently underway, or compromise may have already occurredTactics, techniques, and procedures that describe the behavior of an actorSecurity alerts like advisories and bulletinsThreat intelligence reports that describe actors, systems, and information being targeted and the methods being usedTool configurations that support collection, exchange, analysis, and use of threat informationWhich one of the following groups would be least likely to included in an organization’s cybersecurity incident communications plans?Law enforcementSecurity vendorsUtilitiesMedia
19 Which of the following is not an important part of the incident response communication process?Limiting communication to trusted partiesDisclosure based on public feedbackUsing a secure method of communicationPreventing accidental release of incident related information
20 As the CISO of her organization, Jennifer is working on an incident classification scheme and wants to base her design on NIST’s definitions. Which of the following options should she use to best describe a user accessing a file that they are not authorized to view?An incidentAn eventAn adverse eventA security incident
21 In his role as a forensic examiner, Lucas has been asked to produce forensic evidence related to a civil case. What is this process called?Criminal forensicseDiscoveryCyber productionCivil tort
22 Darcy is designing a fault-tolerant system and wants to implement RAID level 5 for her system. What is the minimum number of physical hard disks she can use to build this system?OneTwoThreeFive
23 What important function do senior managers normally fill on a business continuity planning team?Arbitrating disputes about criticalityEvaluating the legal environmentTraining staffDesigning failure controls
24 Which one of the following is not normally included in business continuity plan documentation?Statement of accountsStatement of importanceStatement of prioritiesStatement of organizational responsibility
25 Which one of the following is not normally considered a business continuity task?Business impact assessmentEmergency response guidelinesElectronic vaultingVital records program
26 Who should receive initial business continuity plan training in an organization?Senior executivesThose with specific business continuity rolesEveryone in the organizationFirst responders
27 Which one of the following components should be included in an organization’s emergency response guidelines?List of individuals who should be notified of an emergency incidentLong-term business continuity protocolsActivation procedures for the organization’s cold sitesContact information for ordering equipment
For questions 28–30, please refer to the following scenario.
Alejandro is an incident response analyst for a large corporation. He is on the midnight shift when an intrusion detection system alerts him to a potential brute-force password attack against one of the company’s critical information systems. He performs an initial triage of the event before taking any additional action.
1 What СКАЧАТЬ