SCRIPT 2026 QUESTIONS WITH SOLUTIONS
GRADED A+
◍ How should you present yourself during an appointment?.
Answer: -Dress appropriately -Behave professionally
◍ What type of exploit is described below?CVE-2019-9874: Deserialization of
Untrusted Data in the Sitecore.Security.AnitCSRF (aka anti CSRF) module
in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an
unauthenticated attacker to execute arbitrary code by sending a serialized
.NET object in the HTTP POST parameter __CSRFTOKE
N. A) RCEB) Heap corruptionC) Information disclosureD) Buffer
over-readE) File InclusionF)SQLiHINT "Blank" bugs allow an attacker to
achieve "arbitrary code execution." This, in effect, allows them to assume
control of a target system. They can come in many flavors but are often seen
as the most high-risk category of attack..
Answer: RCE
◍ What do I do if the documents are in electronica format?.
Answer: -receive documents via email or access contracting-print
documents on laser printer-erase documents from your hard drive when the
appointment is finished
◍ What basic steps are involved in prepping the documents for the signing
appointment?.
Answer: 1) look for a specific lender instructions2)Use the prep sheet to
organize the packet into note the stacking order3)Check in flag the
documents4)Compile a list of questions for the contracting company, if
necessary
,◍ (B3, Pg236) What is Pretexting?A) The metadata that is created before the
text is sentB) Where you pretend to be someone else over email or phoneC)
None of the aboveD) Where you are the person you are trying to pretend to
be over the phone or email.
Answer: Where you pretend to be someone else over email or phone
◍ What is interesting to be an attacker about the program below?-rwsr-xr-x 1
root root 44k May 7th 2014 /bin/pingA)The program will be run with root
permissionsB) The program can only be saved by the root userC)The
program will create a tunnel to the remote hostD) Yo mama.
Answer: The program will be run with root permissions
◍ Good Faith Estimate(GFE).
Answer: The Good Faith Estimate is an estimate of all closing fees,
including pre-paid and escrow items as well as lender charges.
◍ (B3, Pg234)Why is end of support for applications or technology
important?.
Answer: Because you should never use applications or tech that is no longer
supported from developers
◍ What Is the difference between brokered and direct assignments?.
Answer: Brokered assignments -contracted with a signing service-need not
market yourself-steady stream of work-Pays flat rate-Will work with less
experienced notary signing agent'sDirect assignments -contracted directly
with lenders, escrow agents, etc.-rate may be negotiated-Quick
payment-only work with experienced notary signing agent's
◍ (B3, Pg164) What is a clickjacking attack?.
Answer: Where a user can be tricked into clicking on something without
realizing that they did
◍ (B3, Pg179-180) What might a captcha do to a scanner?A) Redirect the
scanner to the same page in a loopB) Proceed to the website as per normalC)
Shut the scanner downD) Lock you out of the website.
Answer: Redirect the scanner to the same page in a loop
,◍ Manage Appointment Logistics.
Answer: -Confirm The appointment before the signing-confirm the time of
the appointment and get driving directions-confirm the borrowers have the
necessary IDs and stipulations ready-if the documents were sent to the
borrowers, confirm the receipt
◍ When would a security analyst create a "TCP Socket" in a Python
Program?A) When scanning the host computer for malicious software B)
When creating a script to run against a network serviceC) When collecting
information about the host computer's hardwareD) When the host is running
network services in the background during Python program execution.
Answer: When creating a script to run against a network service
◍ (B3, Pg10) What makes an encryption a strong encryption?A) An
encryption where the mathematical calculations are open to the publicB) An
encryption that was bought from a 3rd partyC) An encryption with no
mathematical calculationsD) A decrypted encryption.
Answer: An encryption where the mathematical calculations are open to the
public
◍ Plan for personal safety.
Answer: -Become familiar with geographic areas you serve -Determine if
the signing location is safe-Suggest an alternate location, if necessary
◍ (B1, Pg340-341) What can an Apache server administrator do to prevent
version information from leaking?A) Run Apache as a non-root userB)
Enable HTTPSC) Set permission on /var/www/html to 700D) Disable the
banner.
Answer: Disable the banner
◍ (B3, Pg158) How do you mitigate SQL?.
Answer: It is to not use an insecure method of passing queries to the
database
◍ How do you present a document?.
Answer: 1. Read the document title2. Describe the documents purpose in
, general terms3. State the signing requirements for the document
◍ Signing appointment order of tasks.
Answer: 1) Manage the appointment logistics 2) Take the lead when you
arrive 3) Arrange the workspace4) review the process with the Borrowers 5)
Request the Borrowers ID's6) Show the borrowers their copies 7) Obtain the
required Stipulations8) Complete the journal entries 9) Present the loan
documents
◍ Compliance Agreement.
Answer: This document is similar to the correction agreement limited power
of attorney as it serves as an attempt to find a way to ensure that small
clerical errors can be quickly fixed. The compliance agreement has the
borrower agree to cooperate should there be any changes to any loan
documents due to clerical errors. There would not be any changes to the
terms of the loan though.
◍ How should I respond to specific questions about the loan?.
Answer: Change the borrowers"How/when/what" question into a where
question
◍ (B3, Pg186) What is Integer Overflow?.
Answer: Program assumes that a value is always positive, overflow makes
signed integer wrap and become negative
◍ Represent your contracting company properly.
Answer: -present yourself as if you work directly for the lender-introduce
yourself and present your ID-dress according to your contract and
company's policy-A signing appointment as a business meeting: never bring
children or friends, never leave a child or pet in the car, mute your phone
and keep it out of sight.
◍ Who are the stakeholders in the loan process?.
Answer: The stakeholders in the loan process are: the borrower, the lender,
the contracting company, and the NSA(Notary Signing Agent)
◍ Signature Affidavit.