1. Which organization is an international nonprofit organization that offers the CISSP certification?
a) CompTIA
b) (ISC)2
c) IEEE
d) GIAC
Solution: b) (ISC)2
Explanation: (ISC)2 is an international nonprofit organization that offers the CISSP certification.
2. What is a benefit to an organization of using SOAR as part of the SIEM system?
a) SOAR was designed to address critical security events and high-end investigation.
b) SOAR would benefit smaller organizations because it requires no cybersecurity analyst involvement once installed.
c) SOAR automates incident investigation and responds to workflows based on playbooks.
d) SOAR automation guarantees an uptime factor of “5 nines”.
Solution: c) SOAR automates incident investigation and responds to workflows based on playbooks.
Explanation: SOAR technology integrates threat intelligence and automates incident investigation. It responds to events using response workflows based on previously developed playbooks.
3. Which personnel in a SOC are assigned the task of hunting for potential threats and implementing threat detection tools?
a) Tier 3 SME
b) Tier 2 Incident Reporter
c) Tier 1 Analyst
d) SOC Manager
Solution: a) Tier 3 SME
Explanation: In a SOC, Tier 3 SMEs have expert-level skills in network, endpoint, threat intelligence, and malware reverse engineering (RE). They are deeply involved in hunting for potential security threats and implementing threat detection tools.
4. Which three technologies should be included in a SOC security information and event management system? (Choose three.)
a) AD
b) security monitoring
c) threat intelligence
d) proxy service
e) firewall appliance
f) intrusion prevention
g) log management
Solution: b) security monitoring, c) threat intelligence, g) log management
Explanation: Technologies in a SOC should include security monitoring, threat intelligence, and log management among other components for effective security information and event management.
5. The term cyber operations analyst refers to which group of personnel in a SOC?
a) Tier 1 personnel
b) Tier 3 personnel
c) Tier 2 personnel
d) SOC managers
Solution: a) Tier 1 personnel
Explanation: In a typical SOC, Tier 1 personnel are called alert analysts, also known as cyber operations analysts.
6. How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?
a) by analyzing logging data in real time
b) by combining data from multiple technologies
c) by integrating all security devices and appliances in an organization
d) by dynamically implementing firewall rules
Solution: b) by combining data from multiple technologies
Explanation: A SIEM system combines data from multiple sources to help SOC personnel collect and filter data, detect and classify threats, analyze and investigate threats, and manage resources to implement preventive measures.
7. An SOC is searching for a professional to fill a job opening. The employee must have expert-level skills in networking, endpoint, threat intelligence, and malware reverse engineering in order to search for cyber threats hidden within the network. Which job within an SOC requires a professional with those skills?
a) Incident Responder
b) Alert Analyst
c) SOC Manager
d) Threat Hunter
Solution: d) Threat Hunter
Explanation: Tier 3 professionals called Threat Hunters must have expert-level skills in networking, endpoint, threat intelligence, and malware reverse engineering. They are experts at tracing the processes of malware to determine the impact and how it can be removed.
8. Which three are major categories of elements in a security operations center? (Choose three.)
a) AD
b) technologies
c) Internet connection
d) processes
e) data center
f) people
g) database engine
Solution: b) technologies, d) processes, f) people
Explanation: The three major categories of elements in a security operations center are people, processes, and technologies.
9. Which KPI metric does SOAR use to measure the time required to stop the spread of malware in the network?
a) MITR
b) Time to Control
c) MITC
d) MTTD
Solution: b) Time to Control
Explanation: The common KPI metric used by SOAR to measure the time required to stop the spread of malware in the network is "Time to Control".
10. What job would require verification that an alert represents a true security incident or a false positive?
a) Alert Analyst
b) Threat Hunter
c) SOC Manager
d) Incident Reporter
Solution: a) Alert Analyst
Explanation: A Cybersecurity Analyst monitors security alert queues and uses a ticketing system to assign alerts to a queue for an analyst to investigate, verifying whether an alert is a true security incident or a false positive.
11. When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?
a) Trojan
b) spyware
c) adware
d) ransomware
Solution: d) ransomware
Explanation: Ransomware requires payment for access to the computer or files. Bitcoin is a type of digital currency that does not go through a particular bank.
12. An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
a) rogue access point
b) cracking
c) spoofing
d) denial of service
Solution: a) rogue access point
Explanation: Configuring the cell phone to act as a wireless access point means that the cell phone is now a rogue access point. The employee unknowingly breached the security of the company network by allowing a user to access the network without connecting through the company access point.
13. What are two examples of personally identifiable information (PII)? (Choose two.)
a) first name
b) IP address
c) language preference
d) street address
e) credit card number
Solution: d) street address, e) credit card number
Explanation: Personally identifiable information (PII) is any data that could potentially identify and track a specific individual. A credit card number and street address are the best examples of PII.
14. What is the dark web?
a) It is a website that reports the most recent activities of cybercriminals all over the world.
b) It is a website that sells stolen credit cards.
c) It is part of the internet where a person can obtain personally identifiable information from anyone for free
d) It is part of the internet that can only be accessed with special software.
Solution: d) It is part of the internet that can only be accessed with special software.
Explanation: The dark web can only be accessed with special software and is used by cybercriminals to shield their activities. Stolen PII can be used to create fake accounts, such as credit cards and short-term loans.
15. A company has just had a cybersecurity incident. The threat actor appeared to have a goal of network disruption and appeared to use a common security hack tool that overwhelmed a particular server with a large amount of traffic. This traffic rendered the server inoperable. How would a certified cybersecurity analyst classify this type of threat actor?
a) terrorist
b) hacktivist
c) state-sponsored
d) amateur
Solution: d) amateur
Explanation: Amateurs or script kiddies use common, existing tools found on the internet to launch attacks. Hacktivists disrupt services in protest against organizations or governments for a particular political or social idea. State-sponsored threat actors use cyberspace for industrial espionage or interfering with another country in some way.
16. A user calls the help desk complaining that the password to access the wireless network has changed without warning. The user is allowed to change the password, but an hour later, the same thing occurs. What might be happening in this situation?
a) AD
b) rogue access point
c) password policy
d) weak password
e) user error
f) user laptop
Solution: b) rogue access point
Explanation: Man-in-the-middle attacks are a threat that results in lost credentials and data. These types of attacks can occur for different reasons, including traffic sniffing.
17. Which regulatory law regulates the identification, storage, and transmission of patient personal healthcare information?
a) FISMA
b) HIPAA
c) PCI-DSS
d) GLBA
Solution: b) HIPAA
Explanation: The Health Insurance Portability and Accountability Act (HIPAA) requires that all patient personally identifiable healthcare information be stored, maintained, and transmitted in ways that ensure patient privacy and confidentiality.
18. A worker in the records department of a hospital accidentally sends a medical record of a patient to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. What breach of confidentiality does this situation describe?
a) EMR
b) PII
c) PSI
d) PHI
Solution: d) PHI
Explanation: Protected Health Information (PHI) includes patient name, addresses, visiting dates, and more. The Health Insurance Portability and Accountability Act (HIPAA) regulates and provides severe penalties for breaches of PHI. EMRs (Electronic Medical Records) are documents created and maintained by the medical community that contain PHI. Personally identifiable information (PII) is any information that can be used to positively identify an individual, such as name and social security number. Personal Security Information (PSI) is related to information about an individual such as passwords, access keys, and account details.
19. What type of cyberwarfare weapon was Stuxnet?
a) botnet
b) virus
c) worm
d) ransomware
Solution: c) worm
Explanation: The Stuxnet worm was an excellent example of a sophisticated cyberwarfare weapon. In 2010, it was used to attack programmable logic controllers that operated uranium enrichment centrifuges in Iran.
20. Which example illustrates how malware might be concealed?
a) A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site.
b) An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors.
c) A botnet of zombies carry personal information back to the hacker.
d) An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
Solution: d) An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.
Explanation: An email attachment that appears as valid software but actually contains spyware shows how malware might be concealed. An attack to block access to a website is a DoS attack. A hacker uses search engine optimization (SEO) poisoning to improve the ranking of a website so that users are directed to a malicious site that hosts malware or uses social engineering methods to obtain information. A botnet of zombie computers is used to launch a DDoS attack.
21. What websites should a user avoid when connecting to a free and open wireless hotspot?
a) websites to check account fees
b) websites to check product details
c) websites to check stock prices
d) websites to make purchases
Solution: d) websites to make purchases
Explanation: Many free and open wireless hotspots operate with no authentication or weak authentication mechanisms. Attackers could easily capture the network traffic in and out of such a hotspot and steal user information. Therefore, users who use free and open wireless hotspots to connect to websites should avoid giving any personal information to the websites.
22. In a smart home, an owner has connected many home devices to the Internet, such as the refrigerator and the coffee maker. The owner is concerned that these devices will make the wireless network vulnerable to attacks. What action could be taken to address this issue?
a) Configure mixed mode wireless operation.
b) Install the latest firmware versions for the devices.
c) Assign static IP addresses to the wireless devices.
d) Disable the SSID broadcast.
Solution: b) Install the latest firmware versions for the devices.
Explanation: The Internet of Things (IoT) is facilitating the connection of different kinds of devices to the internet, like home devices such as coffee makers and refrigerators, and also wearable devices. In order to make these devices secure and not vulnerable to attacks, they have to be updated with the latest firmware.
23. Match the SOC metric to the description. (Not all options are used.)
a) Dwell Time
b) Mean Time to Detect (MTTD)
c) Mean Time to Respond (MTTR)
d) Mean Time to Contain (MTTC)
e) Time to Control
Solution: Not provided
Explanation: SOCs use many metrics as performance indicators of how long it takes personnel to locate, stop, and remediate security incidents.
24. A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?
a) botnet
b) spyware
c) virus
d) rootkit
Solution: a) botnet
Explanation: A botnet is a network of infected computers called a zombie network. The computers are controlled by a hacker and are used to attack other computers or to steal data.
25. Which statement describes cyberwarfare?
a) It is Internet-based conflict that involves the penetration of information systems of other nations.
b) It is simulation software for Air Force pilots that allows them to practice under a simulated war scenario.
c) Cyberwarfare is an attack carried out by a group of script kiddies.
d) It is a series of personal protective equipment developed for soldiers involved in nuclear war.
Solution: a) It is Internet-based conflict that involves the penetration of information systems of other nations.
Explanation: Cyberwarfare is Internet-based conflict that involves the penetration of the networks and computer systems of other nations. Organized hackers are typically involved in such an attack.
26. Why do IoT devices pose a greater risk than other computing devices on a network?
a) Most IoT devices do not receive frequent firmware updates.
b) Most IoT devices do not require an Internet connection and are unable to receive new updates.
c) IoT devices cannot function on an isolated network with only an Internet connection.
d) IoT devices require unencrypted wireless connections.
Solution: a) Most IoT devices do not receive frequent firmware updates.
Explanation: IoT devices commonly operate using their original firmware and do not receive updates as frequently as laptops, desktops, and mobile platforms.
27. Which cyber attack involves a coordinated attack from a botnet of zombie computers?
a) DDoS
b) MITM
c) address spoofing
d) ICMP redirect
Solution: a) DDoS
Explanation: DDoS is a distributed denial-of-services attack. A DDoS attack is launched from multiple coordinated sources. The sources of the attack are zombie hosts that the cybercriminal has built into a botnet. When ready, the cybercriminal instructs the botnet of zombies to attack the chosen target.
28. What is the main purpose of cyberwarfare?
a) to protect cloud-based data centers
b) to develop advanced network devices
c) to gain advantage over adversaries
d) to simulate possible war scenarios among nations
Solution: c) to gain advantage over adversaries
Explanation: Cyberwarfare is Internet-based conflict that involves the penetration of the networks and computer systems of other nations. The main purpose of cyberwarfare is to gain advantage over adversaries, whether they are nations or competitors.