1. Which three (3) of these were among the top 5 security drivers in 2019? (Select 3)
IOT device attacks moving from targeting consumer electronics to targeting enterprise devices
The number of breached records in 2019 more than 3 times that of 2018
Human error accounting for the majority of security breaches
2. What was the average cost of a data breach in 2019 in US dollars?
$3.92M
3. What was the average size of a data breach in 2019?
25,575 records
4. According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as gathering data from internal, external, technical and human sources?
Collect
5. Crowdstrike organizes threat intelligence into which three (3) areas? (Select 3)
Operational
Tactical
Strategic
6. According to the Crowdstrike model, Endpoints, SIEMs and Firewalls belong in which intelligence area?
Tactical
7. Which three (3) sources are recommended reading for any cybersecurity professional? (Select 3)
DarkReading
BleepingComputer
Trend Micro
8. Which two (2) of these were among the 4 threat intelligence platforms covered in the Threat Intelligence Platforms video? (Select 2)
FireEye
Recorded Future
9. True or False. The average enterprise has 85 different security tools from 45 vendors.
True
10. Which threat intelligence framework can be described as a system that is effective if there are only 2 players and the adversary is motivated by socioeconomic or sociopolitical payoffs?
Diamond Model of Intrusion Analysis
11. True or False. An organization’s security immune system should not be considered fully integrated until it is integrated with the extended partner ecosystem.
True
12. Which term can be defined as “The real-time collection, normalization, and analysis of the data generated by users, applications, and infrastructure that impacts the IT security and risk posture of an enterprise”?
Security Intelligence
13. What are the three (3) pillars of effective threat detection? (Select 3)
Automate intelligence
Become proactive
See everything
14. True or False. According to the FireEye Mandiant’s Security Effectiveness Report 2020, organizations have an average of 50-70 security tools in their IT environments.
TRUE
15. Which three (3) of these were among the top 5 security drivers in 2019? (Select 3)
IOT device attacks moving from targeting consumer electronics to targeting enterprise devices
A significant skills gap exists with more new cybersecurity professional needed the total number currently working in this field
Factors such as cloud migration and IT complexity act as cost multipliers making new breaches increasingly expensive
16. What was the average time to identify and contain a breach in 2019?
279 days
17. Which industry had the highest average cost per breach in 2019 at $6.45M
Healthcare
18. Breaches caused by which source resulted in the highest cost per incident in 2019?
Credentials theft
19. According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as normalize, correlate, confirm and enrich the data?
Process
20. According to the Threat Intelligence Strategy Map, The threat intelligence process can be broken down into 4 steps: Collect, Process, Analyze, and Share. Which step would contain activities such as investigate, contain, remediate and prioritize?
Analyze
21. According to the Crowdstrike model, threat hunters, vulnerability management and incident response belong in which intelligence area?
Operational
22. Which three (3) sources are recommended reading for any cybersecurity professional? (Select 3)
Krebs on Security
InfoSecurity Magazine
X-Force Exchange
23. Which two (2) of these were among the 4 threat intelligence platforms covered in the Threat Intelligence Platforms video? (Select 2)
IBM X-Force Exchange
TruSTAR
24. Which threat intelligence framework is divided into 3 levels. Level 1 is getting to know your adversaries. Level 2 involves mapping intelligence yourself and level 3 where you map more information and use that to plan your defense?
Mitre Att&ck Knowledgebase
25. True or False. An organization’s security immune system should be isolated from outside organizations, including vendors and other third-parties to keep it from being compromised.
False
26. Activities performed as a part of security intelligence can be divided into pre-exploit and post-exploit activities. Which two (2) of these are pre-exploit activities? (Select 2)
Prioritize vulnerabilities to optimize remediation processes and close critical exposures
Detect deviations from the norm that indicate early warnings of APTs
27. True or False. According to the FireEye Mandiant’s Security Effectiveness Report 2020, more that 50% of successful attacks are able to infiltrate without detection.
True
28. A student’s grades should be visible to that student when she logs in to her university account. Her ability to see her grades is an example of which aspect of the CIA Triad?
Availability
29. A university has implemented practices that ensure all student data are encrypted while stored on university servers. Which aspect of the CIA Triad does this practice support?
Confidentiality
30. The Student Portal of a university issues a confirmation code with a hash value each time a student submits an assignment using the portal. This is an example of which aspect of the CIA Triad?
Integrity
31. True or False. An organization has “air gapped” its small network of critical data servers so they are accessible internally but not to any external system. These systems are now safe from a deliberate attack.
False
32. C-level executives face 4 challenges when assuring their organizations maintain a comprehensive, workable data security solution. The proliferation of smartphones used for work would impact which two (2) of these concerns the most? (Select 2)
Explosive data growth
New privacy regulations
33. True or False. An organization is subject to both GDPR and PCI-DSS data security regulations and has dedicated all of its efforts in remaining in compliance with these 2 sets of regulations. They are correct in believing that their data is safe.
False
34. True or False. A newly hired CISO made the right choice when he moved the Known Vulnerabilities list to a high priority for his team to resolve even though none of these had ever been exploited on the company’s network to-date.
True
35. All industries have their own unique data security challenges. Which of these industries has a particular concern with HIPAA compliance and the highest cost per breached record?
Healthcare
36. All industries have their own unique data security challenges. Which of these industries has a particular concern with being targeted more than any other by cybercriminals “because that is where the money is”?
Financial
37. Which three (3) of these are among the top 12 capabilities that a good data security and protection solution should provide? (Select 3)
Data risk analysis
Blocking, masking and quarantining
Data discovery
38. Parsing discovered data against known patterns or key words is a process known as what?
Data classification
39. Which data protection process takes data activity monitoring output and uses it to generate insights about threats?
Active analytics
40. True or False. The IBM Guardium administrator needs to be someone with the highest level of access to the data being protected?
False
41. Which mobile operating system runs the majority of smartphones today?
Android
42. Which mobile operating system runs approximately 60% of tablet computers worldwide?
iOS
43. True or False. Security is enhanced on iOS mobile devices because users typically cannot interact directly with the operating system.
True
44. Which statement best describes the use of anti-virus software on mobile devices?
Antivirus software can “see” the apps that are running on a mobile device but cannot see the data that is associated with each app.
45. Which type of threat is Jailbreaking?
System based
46. Which mobile operating system was originally based on the Linux kernel?
Android
47. Which two (2) mobile operating combined dominate the vast majority of the smartphone market? (Select 2)
iOS
Android
48. True or False. Security is enhanced on Android mobile devices because users interact directly with the operating system.
False
49. What is one limitation to the operation of anti-virus software running on mobile devices?
Antivirus software can “see” the apps that are running on a mobile device but cannot see the data that is associated with each app.
On a mobile device, which type of threat is a phishing scam?
App based
50. A university uses clustered servers to make sure students will always be able to submit their assignments even if one server is down for maintenance. Server clustering enables which aspect of the CIA Triad?
Availability
51. A university has enabled WPA2 encryption on its WiFi systems throughout the campus. Which aspect of the CIA Triad is directly supported by this action?
Confidentiality
52. A student can see her grades via her school’s Student Portal but is unable to change them. This restriction is in support of which aspect of the CIA Triad?
Integrity
53. True or False. An operator who corrupts data by mistake is considered an “inadvertent attack” that should be considered when developing data protection plans.
True
54. C-level executives face 4 challenges when assuring their organizations maintain a comprehensive and workable data security solution. GDPR, CCPA, and PCC-DSS are concerned with which one of these challenges?
New privacy regulations
55. True of False. A biotech research company with a very profitable product line has grown so rapidly it has acquired a marketing company, a small IT services company and a company that specializes in pharmaceutical manufacturing and distribution. The CEO of the parent company made a good decision when he decided not to consolidate all data security under a single CISO, believing that each of the new divisions understands its own data security needs better than the parent company possibly could.
False
56. Which three (3) of these are among the 5 common pitfalls of data security? (Select 3)
Failure to prioritize and leverage data activity monitoring
Failure to address known vulnerabilities
Failure to move beyond compliance
57. All industries have their own unique data security challenges. Which of these industries has a particular concern with a widely distributed IT infrastructure that must provide services across a multiple government jurisdictions while not violating the privacy concerns of its users?
Transportation
58. Which three (3) of these are among the top 12 capabilities that a good data security and protection solution should provide? (Select 3)
Data and file monitoring
Encryption
Data classification
59. Which is the data protection process that addresses inappropriate privileges, insecure authentication methods, account sharing, configuration files and missing security patches?
Vulnerability assessment
60. Which data protection process substitutes key data with a token that is issued by a trusted third-party where the token can be accessed but not redeemed by an untrusted party?
Tokenization
61. IBM Guardium provides heterogeneous data source support. This support results in which capability?
Similar security capabilities can be applied to different types of data repositories
62. Which component of a vulnerability scanner would perform security checks according to its installed plug-ins?
Engine Scanner
63. Which component of a vulnerability scanner stores vulnerability information and scan results?
Database
64. How does a vulnerability scanner detect internal threats?
By scanning hosts
65. In which component of a Common Vulnerability Score (CVSS) would the attack vector be reflected?
Base-Exploitability Subscore
66. In which component of a Common Vulnerability Score (CVSS) would confidentiality be reflected?
Base-Impact Subscore
67. In which component of a Common Vulnerability Score (CVSS) would exploit code maturity be reflected?
Temporal Score
68. In which component of a Common Vulnerability Score (CVSS) would security requirements subscore be reflected?
Environmental Score
69. True or False. The US Dept of Defense has produced a number of Security Technical Implementation Guides to show the most secure ways to deploy common software packages such as operation systems, open source software, and network devices. These guides are available to the public and can be freely downloaded.
True
70. The Center for Internet Security (CIS) has implementation groups that rank from the least secure to the most secure. Which of these has the least stringent security requirements?
CIS Sub-Controls for small, commercial off-the-shelf or home office software environments.
71. Which three (3) of these is identified by a basic port scanner? (Select 3)
A list of Open ports on a target system
Available services provided by the target system
Active hosts using TCP
72. Port numbers 49151 through 65536 are known as what?
Dynamic and Private Ports
73. What are the three (3) responses a port scanner might receive when it is scanning a system for open ports? (Select 3)
Closed
Open
Filtered (or blocked)
74. Which type of scan is commonly used to check if a working system is at the address indicated and that it is responding?
Ping (ICMP Echo Request)
75. Which type of scan sends an empty packet or packet with a different payload for each port scanned. A response is received only for closed ports?
UDP port scan
76. Which two (2) of these are other names for a protocol analyzer? (Select 2)
Packet analyzer
Network analyzer
77. Which is the most popular packet sniffer used?
WireShark
78. Which of these is identified by a basic port scanner?
Open ports
79. Port numbers 0 through 1023 are known as what?
Well known ports
80. If a port is blocked, what response will be sent to the port scanner?
There will be no response
81. Which type of scan notes the connection but leaves the target hanging, i.e. does not reveal any information to the target about the host that initiated the scan?
TCP/Half Open Scan (aka a SYN scan)
82. Which two (2) of these are other names for a protocol analyzer? (Select 2)
Sniffer
Traffic analyzer
83. True or False. Packet sniffers are used by hackers but have no legitimate place in legitimate network management.
False
84. Which component of a vulnerability scanner provides high-level graphs and trend reports for executive leadership?
Report Module
85. How does a vulnerability scanner detect external threats?
By scanning internet facing hosts from the Internet
86. What are the three (3) components that make up the overall Common Vulnerability Score (CVSS)? (Select 3)
Temporal
Environmental
Base
87. In which component of a Common Vulnerability Score (CVSS) would attack complexity be reflected?
Base-Exploitability Subscore
88. In which component of a Common Vulnerability Score (CVSS) would integrity be reflected?
Base-Impact Subscore
89. In which component of a Common Vulnerability Score (CVSS) would remediation level be reflected?
Temporal Score
90. In which component of a Common Vulnerability Score (CVSS) would impact subscore be reflected?
Environmental Score
91. True or False. The US Dept of Defense has produced a number of Security Technical Implementation Guides to show the most secure ways to deploy common software packages such as operation systems, open source software, and network devices. These guides are restricted to use by US military agencies only.
False
92. The Center for Internet Security (CIS) has implementation groups that rank from the least secure to the most secure. Which of these are required to meet the middle level of security?
“a” and “b” only
93. True or False. A security architect’s job is to make sure that security considerations dominate other design aspects such as usability, resilience and cost.
False
94. Which of these is an aspect of an Enterprise Architecture?
Considers the needs of the entire organization
95. Which of these is an aspect of a Solution Architecture?
Describes how specific products or technologies are used
96. Which three (3) of these are general features of Building Blocks? (Select 3)
Could be an actor, business service, application or data
Package of function defined to meet a business need
Defined boundary, but can work with other building blocks
97. Which three (3) of these are Architecture Building Blocks (ABBs)? (Select 3)
Identity and Access Management
Data Security
Application Security
98. Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3)
HSM
Certificate Authority
Key Security Manager
99. The diagram below shows which type of architecture?
Enterprise Security Architecture
100. Solution architectures often contain diagrams like the one below. What does this diagram show?
Architecture overview
101. In security architecture, a reusable solution to a commonly recurring problem is known as what?
A pattern
102. Which of these is an application security threat?
Malware
103. Failure to use input validation in your application introduces what?
A vulnerability
104. Which software development lifecycle is characterized as a top-down approach where one stage of the project is completed before the next stage begins?
Waterfall
105. Which form of penetration testing allows the testers complete knowledge of the systems they are trying to penetrate in advance of their attack to simulate an internal attack from a knowledgeable insider?
White Box testing
106. Which application testing method requires access to the original application source code?
SAST: Static Application Security Testing
107. Which three (3) steps are part of a Supplier Risk Assessment? (Select 3)
Identify how any risks would impact your organization’s business
Determine the likelihood the risk would interrupt the business
Identify how the risk would impact the business
108. What type of firewall should you install to protect applications used by your organization from hacking?
A web application firewall (WAF)
109. Which type of application attack would include elevation of privilege, data tampering and luring attacks?
Authorization
110. Which type of application attack would include information disclosure and denial of service?
Exception management
111. Which one of the OWASP Top 10 Application Security Risks would be occur when untrusted data is sent to an interpreter as part of a command or query?
Injection
112. Which one of the OWASP Top 10 Application Security Risks would be occur when a poorly configured XML processor evaluates an external entity reference within an XML document allowing the external entity to expose internal files?
XML external entities (XXE)
113. Which of these threat modeling methodologies was introduced in 1999 at Microsoft to provide their developer’s a mnemonic that would help them find security vulnerabilities in their products?
STRIDE
114. Security standards do not have the force of law but security regulations do. Which one of these is a security regulation?
Gramm-Leach-Bliley Act
115. Which phase of DevSecOps would contain the activities Threat modeling & risk analysis, Security backlog and Architecture & design?
Plan
116. Which phase of DevSecOps would contain the activities Continuous component control, Application and infrastructure orchestration, and Data cleansing & retention?
Release, deploy & decommission
117. The Release step in the DevSecOps Release, Deploy & Decommission phase contains which of these activities?
Versioning of infrastructure
118. The Detect & Visualize step in the DevSecOps Operate & Monitor phase contains which of these activities?
Inventory
119. True or False. Finding a bug in a software product from a major vendor can be very profitable for a security researcher.
True
120. Which is the top vulnerability found in common security products?
Cross-site scripting
121. True or False. Building software defenses into your software includes: input validation, output sensitization, strong encryption, strong authentication and authorization.
True
122. Complete the following statement. Cross-site scripting ____
allows attackers to inject client-side scripts into a web page.
123. True or False. A Stored XSS attack is potentially far more dangerous than a Reflected XSS attack.
True
124. Cross-site scripting attacks can be minimized by using HTML and URL Encoding. How would a browser display this string?: <b>Test</b>
<b>Test</b>
125. Which is the most effective means of validating user input?
Whitelisting
126. True or False. A security architect’s job is to make sure that security considerations are balanced against other design aspects such as usability, resilience and cost.
True
127. Which of these is an aspect of an Enterprise Architecture?
Maps the main components of a problem space and solution at a very high level.
128. Which of these is an aspect of a Solution Architecture?
Shows the internal data and use of reusable or off-the-shelf components
129. Which three (3) of these are features of Architecture Building Blocks (ABBs)? (Select 3)
Captures and defines requirements such as function, data, and application
Product and vendor neutral
Guides the development of a Solution Architecture
130. Which three (3) of these are Architecture Building Blocks (ABBs)? (Select 3)
Infrastructure and Endpoint Security
Detect and Respond
Identity and Access Management
131. Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3)
Privilege Access Manager
Hardware Token
Web Application Firewall (WAF)
132. The diagram below shows which level of architecture?
Enterprise Security Architecture
133. Solution architectures often contain diagrams like the one below. What does this diagram show?
Solution architecture overview
134. What is lacking in a security architecture pattern that prevents it from being used as a finished design?
The context of the project at hand
135. What are the possible consequences if a bug in your application becomes known?
All of the above
136. What was the ultimate consequence to Target Stores in the United States from their 2013 data breach in which over 100M records were stolen?
Costs and fines estimated at $1B.
137. Select the two (2) top vulnerabilities found in common security products. (Select 2)
Cross-site scripting
Cross-site request forgery
138. True or False. If you can isolate your product from the Internet, it is safe from being hacked.
False
139. Which three (3) things can Cross-site scripting be used for? (Select 3)
Steal cookies
Take over sessions
Harvest credentials
140. True or False. Commonly a Reflect XSS attack is sent as part of an Email or a malicious link and affects only the the user who receives the Email or link.
<b>Password</b>
141. Which three (3) statements about whitelisting user input are true? (Select 3)
Special characters should only be allowed on an exception basis
Whitelisting reduces the attack surface to a known quantity
Whenever possible, input should be whitelisted to alphanumeric values to prevent XSS
142. Which two (2) statements are considered good practice for avoiding XSS attacks (Select 2)
Encode all data output as part of HTML and JavaScript
Use strict whitelists on accepting input
143. How would you classify a hactivist group who thinks that your company’s stance on climate change threatens the survival of the planet?
threat
144. Which software development lifecycle is characterized by short bursts of analysis, design, coding and testing during a series of 1 to 4 week sprints?
Agile and Scrum
145. Which software development lifecycle is characterized by a series of cycles and an emphasis on security?
Spiral
146. Which form of penetration testing allows the testers no knowledge of the systems they are trying to penetrate in advance of their attack to simulate an external attack by hackers with no knowledge of an organizations systems?
Black Box Testing
147. Which application testing method requires a URL to the application, is quick and cheap but also produces the most false-positive results?
DAST: Dynamic Security Application Testing
148. Which type of application attack would include buffer overflow, cross-site scripting, and SQL injection?
Input validation
149. Which type of application attack would include unauthorized access to configuration stores, unauthorized access to administration interfaces and over-privileged process and service accounts?
Configuration management
150. Which one of the OWASP Top 10 Application Security Risks would occur when authentication and session management functions are implemented incorrectly allowing attackers to compromise passwords, keys or session tokens.
Broken authentication
151. Which one of the OWASP Top 10 Application Security Risks would occur when restrictions on what a user is allowed to do is not properly enforced?
Broken access control
152. Which of these threat modeling methodologies is integrated seamlessly into an Agile development methodology?
VAST
153. Security standards do not have the force of law but security regulations do. Which one of these is a security regulation?
HIPAA
154. Which phase of DevSecOps would contain the activities Secure application code, Secure infrastructure configuration, and OSS/COTS validation?
Code & build
155. Which phase of DevSecOps would contain the activities Detect & Visualize, Respond, and Recover?
Operate & monitor
156. The Deploy step in the DevSecOps Release, Deploy & Decommission phase contains which of these activities?
Creation of Immutable images
157. The Respond step in the DevSecOps Operate & Monitor phase contains which of these activities?
Virtual Patching
158. Which three (3) of the following are core functions of a SIEM? (Select 3)
Manages network security by monitoring flows and events
Consolidates log events and network flow data from thousands of devices, endpoints and applications distributed throughout a network
Collects logs and other security documentation for analysis
159. True or False. SIEMs capture network flow data in near real time and apply advanced analytics to reveal security offenses.
True
160. Which of these describes the process of data normalization in a SIEM?
Turns raw data into a format that has fields that SIEM can use
161. True or False. A SIEM considers any event that is anomalous, or outside the norm, to be an offense.
True
162. True or False. A large company might have QRadar event collectors in each of their data centers that are configured to forward all collected events to a central event processor for analysis.
True
163. The triad of a security operations centers (SOC) is people, process and technology. Which part of the triad would vendor-specific training belong?
People
164. True or False. Information is often overlooked simply because the security analysts do not know how it is connected.
True
165. The partnership between security analysts and technology can be said to be grouped into 3 domains, human expertise, security analytics and artificial intelligence. The human expertise domain would contain which three (3) of these topics?
Morals
Common sense
Generalization
166. A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for abstraction?
Human expertise
167. True or False. SIEMs can be available on premises and in a cloud environment.
True
168. For a SIEM, what are logs of specific actions such as user logins referred to?
Events
169. Which of these describes the process of data normalization in a SIEM?
Indexes data records for fast searching and sorting
170. When a data stream entering a SIEM exceeds the volume it is licensed to handle, what are three (3) ways the excess data is commonly handled, depending upon the terms of the license agreement? (Select 3)
The excess data is stored in a queue until it can be processed
The excess data is dropped
The data stream is throttled to accept only the amount allowed by the license
171. Which five (5) event properties must match before the event will be coalesced with other events? (Select 5)
Username
QID
Destination IP
Destination Port
Source IP
172. What is the goal of SIEM tuning?
To get the SIEM to sort out all false-positive offenses so only those that need to be investigated are presented to the investigators
173. True or False. QRadar event collectors send all raw event data to the central event processor for all data handling such as data normalization and event coalescence.
False
174. The triad of a security operations centers (SOC) is people, process and technology. Which part of the triad would containment belong?
Process
175. True or False. There is a natural tendency for security analysts to choose to work on cases that they are familiar with and to ignore those that may be important but for which they have no experience.
True
176. The partnership between security analysts and technology can be said to be grouped into 3 domains, human expertise, security analytics and artificial intelligence. The security analytics domain contains which three (3) of these topics?
Pattern identification
Anomaly detection
Data correlation
177. A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for data visualization?
Security analytics
178. Cyber threats pose many challenges to organizations today. Which three (3) of these are among those cited? (Select 3)
Almost half of the breaches are caused by malicious or criminal acts
There is a cybersecurity skills shortage
It takes an average of 191 days to even detect an attack has occurred
179. What percent of security leaders reported that threat hunting increased the speed and accuracy of response in detection of advanced threats?
91%
180. While 80% of the threats are known and detected, the 20% that remains unknown account for what percent of the damage?
80%
181. True or False. The skill set of a cyber threat hunter is very different from that of a cybersecurity analyst and many threat hunters a have backrounds doing intelligence work.
True
182. Your enemy uses a cyber kill chain to plan and execute his attack against your organization. Which three (3) of these are steps in a cyber kill chain? (Select 3)
Delivery
Weaponization
Reconnaissance
183. True or False. A cyber threat hunting team generally sits at the center of the SOC Command Center.
False
184. There is value brought by each of the IBM i2 EIA use cases. Which one of these delivers net new discovery of correlating low level alerts and offenses?
Cyber Threat Hunting
185. What is one thing that makes cybersecurity threats so challenging to deal with?
There is a big shortage in cyber security skills and many job openings unfilled
186. The level 3 and 4 cybersecurity analysts working in a Security Operations Center (SOC) combat cyber crime by performing which type of activity?
Cyber forensic investigations
187. True or False. If you have no better place to start hunting threats, start with a view of your own organization then work your way up to an industry view and then a regional view, a national view and finally a global view of the threat landscape.
False
188. Your enemy uses a cyber kill chain to plan and execute his attack against your organization. Which three (3) of these are steps in a cyber kill chain?
Installation
Delivery
Exploitation
189. True or False. A cyber threat hunting team generally sits outside the SOC command center.
True
190. There is value brought by each of the IBM i2 EIA use cases. Which one of these identifies net new money chain transfers?
Fraud Investigations
Other Links:
See other websites for quiz:
Check on QUIZLET