An analyst just completed a port scan and received the following results
of open ports:
Based on these scan results, which of the following services are NOT
currently operating?
SSH
OBJ-1.4: Based on the port numbers shown as open in the nmap scan
results, SSH is not currently operating. SSH operates over port 22.
incorrect
Web servers use port 80 for HTTP and 443 for HTTPS.
Database servers run on port 1433 (Microsoft SQL) or 3306 (MySQL).
Remote Desktop Protocol runs on port 3389.
Which of the following categories would contain information about a
French citizen's race or ethnic origin?
Sensitive Personal Information (SPI)
OBJ-5.1: According to the GDPR, information about an individual's race
or ethnic origin is classified as Sensitive Personal Information (SPI).
Sensitive personal information (SPI) is information about a subject's
opinions, beliefs, and nature afforded specially protected status by
privacy legislation.
incorrect
As it cannot be used to identify somebody or make any relevant
assertions about health uniquely, it is neither PII nor PHI.
Data loss prevention (DLP) is a software solution that detects and
prevents sensitive information from being stored on unauthorized
systems or transmitted over unauthorized networks.
Previous
, Play
Next
Rewind 10 seconds
Move forward 10 seconds
Unmute
0:00
/
0:15
Full screen
Brainpower
Read More
You are reviewing the IDS logs and notice the following log entry:
What type of attack is being performed?
SQL injection
OBJ-1.7: SQL injection is a code injection technique that is used to
attack data-driven applications. SQL injections are conducted by
inserting malicious SQL statements into an entry field for execution. For
example, an attacker may try to dump the contents of the database by
using this technique. A common SQL injection technique is to insert an
always true statement, such as 1 == 1, or in this example, 7 == 7.
Header manipulation is the insertion of malicious data, which has not
been validated, into an HTTP response header.
XML Injection is an attack technique used to manipulate or compromise
an XML application or service's logic. The injection of unintended XML
content and/or structures into an XML message can alter the
application's intended logic.
Cross-Site Scripting (XSS) attacks are a type of injection in which
malicious scripts are injected into otherwise benign and trusted
websites. XSS attacks occur when an attacker uses a web application to
send malicious code, generally in a browser side script, to a different
end-user.
What technology is NOT PKI x.509 compliant and cannot be used in
various secure functions?
,blowfish
OBJ-2.1: AES, PKCS, and SSL/TLS are all compatible with x.509 and
can be used in a wide variety of functions and purposes. AES is used for
symmetric encryption. PKCS is used as a digital signature algorithm.
SSL/TLS is used for secure key exchange.
You need to perform an architectural review and select a view that
focuses on the technologies, settings, and configurations used within the
architecture. Which of the following views should you select?
Technical View
OBJ-2.1: A technical view focuses on technologies, settings, and
configurations.
note
An operational view looks at how a function is performed or what it
accomplishes.
A logical view describes how systems interconnect.
An acquisition views focus on the procurement process.
Which of the following is NOT a valid reason to conduct reverse
engineering?
to allow the software developer to spot flaws in their source code
OBJ-3.1: If a software developer has a copy of their source code, there
is no need to reverse engineer it since they can directly examine the
code. Doing this is known as static code analysis, not reverse
engineering. Reverse engineering is the process of analyzing a system's
or application's structure to reveal more about how it functions.
incorrect
In malware, examining the code that implements its functionality can
provide you with information about how the malware propagates and its
primary directives.
Reverse engineering is also used to conduct industrial espionage since
it can allow a company to figure out how a competitor's application works
and develop its own version.
An attacker might use reverse engineering of an application or
executable to identify a flaw or vulnerability in its operation and then
exploit that flaw as part of their attack.
Your company is adopting a new BYOD policy for tablets and
smartphones. Which of the following would allow the company to secure
the sensitive information on personally owned devices and the ability to
, remote wipe corporate information without the user's affecting personal
data?
containerization
OBJ-5.2: Containerization is the logical isolation of enterprise data from
personal data while co-existing in the same device. The major benefit of
containerization is that administrators can only control work profiles that
are kept separate from the user’s personal accounts, apps, and data.
This technology creates a secure vault for your corporate information.
Highly targeted remote wiping is supported with most container-based
solutions.
Fail to Pass Systems has just become the latest victim in a large-scale
data breach by an APT. Your initial investigation confirms a massive
exfiltration of customer data has occurred. Which of the following actions
do you recommend to the CEO of Fail to Pass Systems in handling this
data breach?
conduct notification to all affected customers within 72 hours of
discovery of the breach
OBJ-5.1: Generally speaking, most laws require notification within 72
hours, such as the GDPR. All other options are either unethical,
constitute insurance fraud, or are illegal.
incorrect
Conducting a hack-back is considered illegal, and once data has been
taken, it is nearly impossible to steal it back as the attacker probably has
a backup of it.
Providing an incorrect statement to the press is unethical, and if your
company is caught lying about the extent of the breach, it could further
hurt your reputation.
Purchasing a cyber insurance policy and altering the log file dates to
make it look like the attack occurred after buying the policy would be
insurance fraud. This is unethical and illegal.
When you purchase an exam voucher at diontraining.com, the system
only collects your name, email, and credit card information. Which of the
following privacy methods is being used by Dion Training?
data minimization
OBJ-5.1: Data minimization involves limiting data collection to only what
is required to fulfill a specific purpose. Reducing what information is
collected reduces the amount and type of information that must be
protected. Since we only need your name and email to deliver the
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Mirror. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.99. You're not tied to anything after your purchase.