1. External users are reporting that a web application is slow and frequently times out when attempting to submit information. Which of the following softwaredevelopment best practices would have helped prevent this issue?
A) Stress testing
B) Fuzzing
C) Regression testing
D) Input validation
2. A cybersecurity analyst traced the source of an attack to compromised user credentials. Log analysis revealed that the attacker successfully authenticated from anunauthorized foreign country. Management asked the security analyst to research and implement a solution to help mitigate attacks based on compromisedpasswords. Which of the following should the analyst implement?
A) Single sign-on
B) Self-service password reset
C) Password complexity
D) Context-based authentication
3. A security analyst is creating baseline system images to remediate vulnerabilities found in different operating systems. Each image needs to be scanned before it isdeployed. The security analyst must ensure the configurations match industry standard benchmarks and the process can be repeated frequently. Which of thefollowing vulnerability options would BEST create the process requirements?
A) Utilizing a known malware plugin
B) Utilizing an authorized credential scan
C) Utilizing an operating system SCAP plugin
D) Utilizing a non-credential scan
4. Several accounting department users are reporting unusual Internet traffic in the browsing history of their workstations after returning to work and logging in. Thebuilding security team informs the IT security team that the cleaning staff was caught using the systems after the accounting department users left for the day.Which of the following steps should the IT security team take to help prevent this from happening again? (Choose two.)(Select 2answers)
A) Configure mandatory access controls to allow only accounting department users to access the workstations.
B) Configure a policy for workstation account timeout at three minutes.
C) Configure NAC to set time-based restrictions on the accounting group to normal business hours.
D) Install a web monitor application to track Internet usage after hours.
E) Set up a camera to monitor the workstations for unauthorized use.
5. A software development company in the manufacturing sector has just completed the alpha version of its flagship application. The application has been underdevelopment for the past three years. The SOC has seen intrusion attempts made by indicators associated with a particular APT. The company has a hot sitelocation for COOP. Which of the following threats would most likely incur the BIGGEST economic impact for the company?
A) DDoS
B) ICS destruction
C) IPS evasion
D) IP theft