Which tool automates remediation of a confirmed cybersecurity breach?
Answer : C
Security Orchestration, Automation, and Response (SOAR) platforms are designed to automate the remediation of confirmed cybersecurity breaches by executing predefined response playbooks, reducing response time and manual effort during incidents.
What type of attack redirects the traffic of a legitimate website to a fake website?
Answer : B
Pharming is an attack that redirects traffic from a legitimate website to a malicious fake website, typically by corrupting the DNS system or modifying host files, with the intent of stealing user credentials or sensitive data.
What differentiates SOAR from SIEM?
Answer : B
SOAR (Security Orchestration, Automation, and Response) differs from SIEM by adding automated incident response and workflow orchestration to the detection and alerting capabilities found in SIEM. This enables faster and more efficient handling of security incidents.
What is a reason IoT devices are more susceptible to command-and-control (C2) attacks?
Answer : B
IoT devices often have constant internet connectivity and increased data sharing, making them more vulnerable to command-and-control (C2) attacks. Their limited security features and exposure to external networks provide attackers more opportunities to compromise and control them remotely.
What is an advantage of virtual firewalls over physical firewalls for internal segmentation when placed in a data center?
Answer : A
Virtual firewalls offer the advantage of dynamic scalability, making them ideal for internal segmentation in data centers. They can be quickly deployed, resized, and adjusted to meet the needs of changing workloads and environments, unlike physical firewalls which require fixed hardware resources.
Which statement describes a host-based intrusion prevention system (HIPS)?
Answer : D
A Host-Based Intrusion Prevention System (HIPS) is installed directly on an endpoint device (such as a server or workstation) and monitors local system activity, including processes, file access, and system calls, to detect and prevent malicious behavior.
What are two common lifecycle stages for an advanced persistent threat (APT) that is infiltrating a network? (Choose two.)
Answer : A, D
Lateral movement is a key stage where the attacker moves across the network to find valuable targets.
Privilege escalation involves gaining higher access rights to expand control within the compromised environment.
Communication with covert channels is a tactic used during persistence or exfiltration, while deletion of critical data is not a standard APT lifecycle stage --- it's more characteristic of destructive attacks.