Dump - 5

FondNarwhal avatar
FondNarwhal
·

Start Quiz

100 Questions

In the Software Development Life Cycle (SDLC), maintaining accurate hardware and software inventories is a critical part of

Answer hidden

As a best practice, the Security Assessment Report (SAR) should include which of the following sections?

Answer hidden

The application of a security patch to a product previously validate at Common Criteria (CC) Evaluation Assurance Level (EAL) 4 would

Answer hidden

Which of the following media sanitization techniques is MOST likely to be effective for an organization using public cloud services?

Answer hidden

What type of wireless network attack BEST describes an Electromagnetic Pulse (EMP) attack?

Answer hidden

Which of the following is a remote access protocol that uses a static authentication?

Answer hidden

Match the types of e-authentication tokens to their description. Drag each e-authentication token on the left to its corresponding description on the right.

Answer hidden

Which of the following sets of controls should allow an investigation if an attack is not blocked by preventive controls or detected by monitoring?

Answer hidden

Determining outage costs caused by a disaster can BEST be measured by the

Answer hidden

Which of the following is considered a secure coding practice?

Answer hidden

As part of the security assessment plan, the security professional has been asked to use a negative testing strategy on a new website. Which of the following actions would be performed?

Answer hidden

Who has the PRIMARY responsibility to ensure that security objectives are aligned with organization goals?

Answer hidden

Which of the following alarm systems is recommended to detect intrusions through windows in a high-noise, occupied environment?

Answer hidden

Which of the following is the MOST effective practice in managing user accounts when an employee is terminated?

Answer hidden

Which of the following is the MOST important part of an awareness and training plan to prepare employees for emergency situations?

Answer hidden

What is the process of removing sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique?

Answer hidden

The security accreditation task of the System Development Life Cycle (SDLC) process is completed at the end of which phase?

Answer hidden

DRAG DROP Drag the following Security Engineering terms on the left to the BEST definition on the right.

Answer hidden

Which of the following is the BEST reason for the use of security metrics?

Answer hidden

Which of the following is a benefit in implementing an enterprise Identity and Access Management (IAM) solution?

Answer hidden

A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?

Answer hidden

Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

Answer hidden

Which of the following mandates the amount and complexity of security controls applied to a security risk?

Answer hidden

When determining who can accept the risk associated with a vulnerability, which of the following is MOST important?

Answer hidden

A security professional determines that a number of outsourcing contracts inherited from a previous merger do not adhere to the current security requirements. Which of the following BEST minimizes the risk of this happening again?

Answer hidden

Which of the following is a direct monetary cost of a security incident?

Answer hidden

Which of the following mechanisms will BEST prevent a Cross-Site Request Forgery (CSRF) attack?

Answer hidden

Which of the following would MINIMIZE the ability of an attacker to exploit a buffer overflow?

Answer hidden

Which factors MUST be considered when classifying information and supporting assets for risk management, legal discovery, and compliance?

Answer hidden

When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?

Answer hidden

Which of the following is the MOST appropriate action when reusing media that contains sensitive data?

Answer hidden

An organization recently conducted a review of the security of its network applications. One of the vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications. Which of the following would be MOST effective in mitigating this vulnerability?

Answer hidden

Which of the following methods of suppressing a fire is environmentally friendly and the MOST appropriate for a data center?

Answer hidden

Unused space in a disk cluster is important in media analysis because it may contain which of the following?

Answer hidden

A company seizes a mobile device suspected of being used in committing fraud. What would be the BEST method used by a forensic examiner to isolate the powered-on device from the network and preserve the evidence?

Answer hidden

Which of the following is MOST appropriate for protecting confidentially of data stored on a hard drive?

Answer hidden

Which of the following is the MOST effective method to mitigate Cross-Site Scripting (XSS) attacks?

Answer hidden

What is the MOST significant benefit of an application upgrade that replaces randomly generated session keys with certificate based encryption for communications with backend servers?

Answer hidden

A user has infected a computer with malware by connecting a Universal Serial Bus (USB) storage device. Which of the following is MOST effective to mitigate future infections?

Answer hidden

Which of the following MUST be in place to recognize a system attack?

Answer hidden

Which of the following is the GREATEST benefit of implementing a Role Based Access Control (RBAC) system?

Answer hidden

Which Identity and Access Management (IAM) process can be used to maintain the principle of least privilege?

Answer hidden

A minimal implementation of endpoint security includes which of the following?

Answer hidden

What is the expected outcome of security awareness in support of a security awareness program?

Answer hidden

Which security modes is MOST commonly used in a commercial environment because it protects the integrity of financial and accounting data?

Answer hidden

Why is planning in Disaster Recovery (DR) an interactive process?

Answer hidden

Mandatory Access Controls (MAC) are based on:

Answer hidden

What is the foundation of cryptographic functions?

Answer hidden

The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover. Which access control mechanism would be preferred?

Answer hidden

Which of the following management process allows ONLY those services required for users to accomplish their tasks, change default user passwords, and set servers to retrieve antivirus updates?

Answer hidden

Which security access policy contains fixed security attributes that are used by the system to determine a user's access to a file or object?

Answer hidden

Which of the following is a common characteristic of privacy?

Answer hidden

At a MINIMUM, audits of permissions to individual or group accounts should be scheduled

Answer hidden

Which of the following is part of a Trusted Platform Module (TPM)?

Answer hidden

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?

Answer hidden

Which of the following combinations would MOST negatively affect availability?

Answer hidden

Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?

Answer hidden

A security compliance manager of a large enterprise wants to reduce the time it takes to perform network, system, and application security compliance audits while increasing quality and effectiveness of the results. What should be implemented to BEST achieve the desired results?

Answer hidden

Which of the following is a characteristic of an internal audit?

Answer hidden

Which of the following is a responsibility of a data steward?

Answer hidden

What is the MAIN goal of information security awareness and training?

Answer hidden

Proven application security principles include which of the following?

Answer hidden

When developing a business case for updating a security program, the security program owner MUST do which of the following?

Answer hidden

From a security perspective, which of the following assumptions MUST be made about input to an application?

Answer hidden

Which of the following is the BEST reason for writing an information security policy?

Answer hidden

What is the PRIMARY goal of fault tolerance?

Answer hidden

Which of the BEST internationally recognized standard for evaluating security products and systems?

Answer hidden

Which one of the following data integrity models assumes a lattice of integrity levels?

Answer hidden

Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?

Answer hidden

Which of the following is BEST achieved through the use of eXtensible Access Markup Language (XACML)?

Answer hidden

An organization has discovered that users are visiting unauthorized websites using anonymous proxies. Which of the following is the BEST way to prevent future occurrences?

Answer hidden

A post-implementation review has identified that the Voice Over Internet Protocol (VoIP) system was designed to have gratuitous Address Resolution Protocol (ARP) disabled. Why did the network architect likely design the VoIP system with gratuitous ARP disabled?

Answer hidden

Within the company, desktop clients receive Internet Protocol (IP) address over Dynamic Host Configuration Protocol (DHCP). Which of the following represents a valid measure to help protect the network against unauthorized access?

Answer hidden

Transport Layer Security (TLS) provides which of the following capabilities for a remote access server?

Answer hidden

A chemical plan wants to upgrade the Industrial Control System (ICS) to transmit data using Ethernet instead of RS422. The project manager wants to simplify administration and maintenance by utilizing the office network infrastructure and staff to implement this upgrade. Which of the following is the GREATEST impact on security for the network?

Answer hidden

What does a Synchronous (SYN) flood attack do?

Answer hidden

A Denial of Service (DoS) attack on a syslog server exploits weakness in which of the following protocols?

Answer hidden

In a High Availability (HA) environment, what is the PRIMARY goal of working with a virtual router address as the gateway to a network?

Answer hidden

A company receives an email threat informing of an Imminent Distributed Denial of Service (DDoS) attack targeting its web application, unless ransom is paid. Which of the following techniques BEST addresses that threat?

Answer hidden

The MAIN use of Layer 2 Tunneling Protocol (L2TP) is to tunnel data

Answer hidden

What protocol is often used between gateway hosts on the Internet?

Answer hidden

Stateful differs from Static packet filtering firewalls by being aware of which of the following?

Answer hidden

Which of the following provides the MOST comprehensive filtering of Peer-to-Peer (P2P) traffic?

Answer hidden

What can happen when an Intrusion Detection System (IDS) is installed inside a firewall-protected internal network?

Answer hidden

A security practitioner is tasked with securing the organization's Wireless Access Points (WAP). Which of these is the MOST effective way of restricting this environment to authorized users?

Answer hidden

Access to which of the following is required to validate web session management?

Answer hidden

Which of the following would an attacker BEST be able to accomplish through the use of Remote Access Tools (RAT)?

Answer hidden

During examination of Internet history records, the following string occurs within a Unique Resource Locator (URL): http://www.companysite.com/products/products.asp?productid=123 or 1=1 What type of attack does this indicate?

Answer hidden

Digital certificates used in Transport Layer Security (TLS) support which of the following?

Answer hidden

The core component of Role Based Access Control (RBAC) must be constructed of defined data elements. Which elements are required?

Answer hidden

Which of the following is the BEST metric to obtain when gaining support for an Identify and Access Management (IAM) solution?

Answer hidden

In an organization where Network Access Control (NAC) has been deployed, a device trying to connect to the network is being placed into an isolated domain. What could be done on this device in order to obtain proper connectivity?

Answer hidden

What is the second step in the identity and access provisioning lifecycle?

Answer hidden

Which of the following MUST be scalable to address security concerns raised by the integration of third-party identity services?

Answer hidden

Which of the following is a common feature of an Identity as a Service (IDaaS) solution?

Answer hidden

An organization's security policy delegates to the data owner the ability to assign which user roles have access to a particular resource. What type of authorization mechanism is being used?

Answer hidden

Extensible Authentication Protocol-Message Digest 5 (EAP-MD5) only provides which of the following?

Answer hidden

Which type of test would an organization perform in order to locate and target exploitable defects?

Answer hidden

What is the MAIN reason for testing a Disaster Recovery Plan (DRP)?

Answer hidden

Which of the following would BEST support effective testing of patch compatibility when patches are applied to an organization's systems?

Answer hidden

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Dump - 3
100 questions

Dump - 3

FondNarwhal avatar
FondNarwhal
Dump - 6
100 questions

Dump - 6

FondNarwhal avatar
FondNarwhal
Dump -7
100 questions

Dump -7

FondNarwhal avatar
FondNarwhal
Dump - 10
100 questions

Dump - 10

FondNarwhal avatar
FondNarwhal
Use Quizgecko on...
Browser
Browser