Sunteți pe pagina 1din 5

Question 1: Health information, Credit Card Numbers, Social Security Numbers and Intellectual

Property (IP) are examples for

 Administrative Account
 User Account
 Sensitive data that the organization should protect
 Public Information

Question 2: In what ways attackers can use the Privileges to install software on a server machine?

 Install Malware
 Uninstall the Antivirus
 Retrieve the domain controller password
 Connect to C2 Server

Question 3: _______ infects the computer by visiting a website that is running malicious code.

 Social Engineering
 Drive-by-Download method
 Spear-Phishing method
 Social Engineering

Question 4: The first step of a targeted attack is ________.

 External Reconnaissance - Attackers collect data that will help them to attack the
organization
 Cyber attackers use a mix method (Spear-Phishing, Drive-by-Download) to breach the
organization
 Lateral movement within the organization to take control of additional machines
 Internal Reconnaissance - Attackers collect data inside the network that will help to get to their
goal.

Question 5: Organizations should remove local admin rights from standard users.

 True
 False

Question 6: ______ are used by applications to access databases and provide access to other
applications.

 User Account
 Local Admin Accounts
 Service Accounts
 Application accounts

Question 7: Monitoring privileged session activity is only recommended for contractors?


 True
 False

Question 8: The "new era" of information technology operations has opened the door to
possibilities for various attack vectors to exploit and compromise business. Which of the following
are examples of the new risks?

 Employees can take their laptops home or use their own devices at work
 Employee may print sensitive data such as credit card numbers
 Enterprises open their networks to partners and contractors to provide access to business-
critical resources
 Many organizations have adopted the cloud infrastructure and social media platforms to
conduct and facilitate business.

Question 9: ______ are typically used by the IT staff to perform maintenance or to set up new
workstations

 User Accounts
 Local Admin Accounts
 Service Accounts
 Application Accounts

Question 10: Organizations should change administrative password frequently

 True
 False

Question 11: _____ is when attackers manipulate people so they give up confidential information
or passwords.

 Social Engineering
 Zero-day- Attacks
 Drive-by-Download method
 Spear-phishing method

Question 12: A successful phishing attack, that caused infiltration of data is an example of _______.

 Unintentional Insiders
 Zero-day Attack
 Malicious Insider
 Exploited Insiders

Question 13: Organizations should analyze user and account behavious to detect anomalous activity

 True
 False
Question 14: ______ may simply take a wrong or careless decision, accidentally delete or modify
critical information or lose a laptop with sensitive information.

 Malicious Insiders
 Unintentional Insiders
 Exploited Insiders
 Attackers

Question 15: Organizations should proactively secure and monitor the ise of high-value accounts.

 True
 False

Question 16: Organizations should wait with patching systems until all zero-days exploits are
known

 True
 False

Question 17: What are the guiding principles of the CyberArk Blueprint for Privileged Access
Management Success?

 Prevent Credential Theft


 Stop Lateral & Vertical Movement
 Limit Privilege Escalation & Abuse
 Protect Against Irreversible Network Takeover Attacks

Question 18: Which of the following answers is a characteristic of a Targeted Attack?

 The attackers try to attack everyone, organizations and individuals in order to get as much money
as possible.
 Most of the attacks are unintentional and are caused by an employee that took a careless decision
 The attack is persistent, and the attackers coordinate activities to stay undetected
 The attackers don't need to spend lots of effort in ensuring that the attack continues after reaching
the end-point

Question 19: What are Blueprint's recommendations based on?

 Decades of Implementation Experience


 Red Team & Incident Response Experience
 PCI-DSS, HIPPA, & SOX
 Stakeholder Interviews & Questionnaires

Question 20: Which account is super user account that an application or service uses to interact
with the operating system?

 Administrative Account
 Any User Account
 Service Account
 Root Account

Question 21: ______ may be tricked by external parties into sharing data or passwords.

 Attackers
 Malicious Insiders
 Exploited Insiders
 Unintentional Insiders

Question 22: Which of the following approaches are good ways to identify Phishing emails?

 Don't Trust the display name


 Hover over the links to see the full URL
 Check for spelling mistakes
 Click on the Attachment

Question 23: ______ includes an email scam that targets individuals within an organization.

 Drive-by-Download method
 Zero-day Attacks
 Social Engineering
 Spear-phishing method

Question 24: What is difference between Malware and Ransomware?

 Ransomware is a type of Malware


 Malware is a type of Ransomware
 The sources of Ransomware is always Phishing emails
 Ransomware needs Privileged Accounts to be successful

Question 25: Which account is a special user account that an application or service uses to interact
with the operating system?

 Administrative Account
 Service Account
 Root Account
 Any User Account

Question 26: Organizations should encourage users to be suspicious of unexpected emails.

 True
 False

Question 27: Which accounts are considered privileged accounts?


 Elevated personal user accounts
 End-point account with controlled access
 Shared privileged accounts
 Application accounts

Question 28: What is typical ration between privilege account and the number of employees in an
organization?

 Less employees than privileged accounts


 More employees than privileged accounts
 1:1. Every employees has a singled privileged accounts

Question 29: ____ will deliberately steal information or cause damage.

 Malicious Insiders
 Attackers
 unintentional Insiders
 Exploited Insiders

S-ar putea să vă placă și