170 Chapter 7 ■ Security Operations (Domain 7)
- Gina is the firewall administrator for a small business and recently installed a new fire-
wall. After seeing signs of unusually heavy network traffic, she checked the intrusion
detection system, which reported that a SYN flood attack was under way. What firewall
configuration change can Gina make to most effectively prevent this attack?
A. Block SYN from known IPs.
B. Block SYN from unknown IPs.
C. Enable SYN-ACK spoofing at the firewall.
D. Disable TCP. - What type of trust relationship extends beyond the two domains participating in the trust
to one or more of their subdomains?
A. Transitive trust
B. Inheritable trust
C. Nontransitive trust
D. Noninheritable trust - Renee is a software developer who writes code in Node.js for her organization. The com-
pany is considering moving from a self-hosted Node.js environment to one where Renee
will run her code on application servers managed by a cloud vendor. What type of cloud
solution is Renee’s company considering?
A. IaaS
B. CaaS
C. PaaS
D. SaaS - Timber Industries recently got into a dispute with a customer. During a meeting with his
account representative, the customer stood up and declared, “There is no other solution.
We will have to take this matter to court.” He then left the room. When does Timber
Industries have an obligation to begin preserving evidence?
A. Immediately
B. Upon receipt of a notice of litigation from opposing attorneys
C. Upon receipt of a subpoena
D. Upon receipt of a court order - What legal protection prevents law enforcement agencies from searching a facility or elec-
tronic system without either probable cause or consent?
A. First Amendment
B. Fourth Amendment
C. Fifth Amendment
D. Fifteenth Amendment