Podcast
Questions and Answers
What should happen when an emergency change to a system must be performed?
What should happen when an emergency change to a system must be performed?
Answer hidden
Which of the following is the BEST approach to take in order to effectively incorporate the concepts
of business continuity into the organization?
Which of the following is the BEST approach to take in order to effectively incorporate the concepts of business continuity into the organization?
Answer hidden
HOTSPOT
Which Web Services Security (WS-Security) specification maintains a single authenticated identity
across multiple dissimilar environments? Click on the correct specification in the image below.
HOTSPOT Which Web Services Security (WS-Security) specification maintains a single authenticated identity across multiple dissimilar environments? Click on the correct specification in the image below.
Answer hidden
Which of the following has the GREATEST impact on an organization's security posture?
Which of the following has the GREATEST impact on an organization's security posture?
Answer hidden
The application of which of the following standards would BEST reduce the potential for data
breaches?
The application of which of the following standards would BEST reduce the potential for data breaches?
Answer hidden
In order for a security policy to be effective within an organization, it MUST include
In order for a security policy to be effective within an organization, it MUST include
Answer hidden
Which of the following roles has the obligation to ensure that a third party provider is capable of
processing and handling data in a secure manner and meeting the standards set by the organization?
Which of the following roles has the obligation to ensure that a third party provider is capable of processing and handling data in a secure manner and meeting the standards set by the organization?
Answer hidden
To protect auditable information, which of the following MUST be configured to only allow read
access?
To protect auditable information, which of the following MUST be configured to only allow read access?
Answer hidden
What type of encryption is used to protect sensitive data in transit over a network?
What type of encryption is used to protect sensitive data in transit over a network?
Answer hidden
Which of the following entities is ultimately accountable for data remanence vulnerabilities with
data replicated by a cloud service provider?
Which of the following entities is ultimately accountable for data remanence vulnerabilities with data replicated by a cloud service provider?
Answer hidden
Which of the following is a recommended alternative to an integrated email encryption system?
Which of the following is a recommended alternative to an integrated email encryption system?
Answer hidden
In the Open System Interconnection (OSI) model, which layer is responsible for the transmission of
binary data over a communications network?
In the Open System Interconnection (OSI) model, which layer is responsible for the transmission of binary data over a communications network?
Answer hidden
What is the PRIMARY goal for using Domain Name System Security Extensions (DNSSEC) to sign
records?
What is the PRIMARY goal for using Domain Name System Security Extensions (DNSSEC) to sign records?
Answer hidden
While inventorying storage equipment, it is found that there are unlabeled, disconnected, and
powered off devices. Which of the following is the correct procedure for handling such equipment?
While inventorying storage equipment, it is found that there are unlabeled, disconnected, and powered off devices. Which of the following is the correct procedure for handling such equipment?
Answer hidden
The PRIMARY characteristic of a Distributed Denial of Service (DDoS) attack is that it
The PRIMARY characteristic of a Distributed Denial of Service (DDoS) attack is that it
Answer hidden
Which of the following is generally indicative of a replay attack when dealing with biometric
authentication?
Which of the following is generally indicative of a replay attack when dealing with biometric authentication?
Answer hidden
During a fingerprint verification process, which of the following is used to verify identity and
authentication?
During a fingerprint verification process, which of the following is used to verify identity and authentication?
Answer hidden
The BEST example of the concept of "something that a user has" when providing an authorized user
access to a computing system is
The BEST example of the concept of "something that a user has" when providing an authorized user access to a computing system is
Answer hidden
A security professional is asked to provide a solution that restricts a bank teller to only perform a
savings deposit transaction but allows a supervisor to perform corrections after the transaction.
Which of the following is the MOST effective solution?
A security professional is asked to provide a solution that restricts a bank teller to only perform a savings deposit transaction but allows a supervisor to perform corrections after the transaction. Which of the following is the MOST effective solution?
Answer hidden
Sensitive customer data is going to be added to a database. What is the MOST effective
implementation for ensuring data privacy?
Sensitive customer data is going to be added to a database. What is the MOST effective implementation for ensuring data privacy?
Answer hidden
DRAG DROP
Order the below steps to create an effective vulnerability management process.
DRAG DROP Order the below steps to create an effective vulnerability management process.
Answer hidden
Which of the following types of security testing is the MOST effective in providing a better indication
of the everyday security challenges of an organization when performing a security risk assessment?
Which of the following types of security testing is the MOST effective in providing a better indication of the everyday security challenges of an organization when performing a security risk assessment?
Answer hidden
What is the MOST effective method of testing custom application code?
What is the MOST effective method of testing custom application code?
Answer hidden
Which one of the following is a common risk with network configuration management?
Which one of the following is a common risk with network configuration management?
Answer hidden
What type of test assesses a Disaster Recovery (DR) plan using realistic disaster scenarios while
maintaining minimal impact to business operations?
What type of test assesses a Disaster Recovery (DR) plan using realistic disaster scenarios while maintaining minimal impact to business operations?
Answer hidden
How can lessons learned from business continuity training and actual recovery incidents BEST be
used?
How can lessons learned from business continuity training and actual recovery incidents BEST be used?
Answer hidden
HOTSPOT
Which Web Services Security (WS-Security) specification handles the management of security tokens
and the underlying policies for granting access? Click on the correct specification in the image below.
HOTSPOT Which Web Services Security (WS-Security) specification handles the management of security tokens and the underlying policies for granting access? Click on the correct specification in the image below.
Answer hidden
An Intrusion Detection System (IDS) has recently been deployed in a Demilitarized Zone (DMZ). The
IDS detects a flood of malformed packets. Which of the following BEST describes what has occurred?
An Intrusion Detection System (IDS) has recently been deployed in a Demilitarized Zone (DMZ). The IDS detects a flood of malformed packets. Which of the following BEST describes what has occurred?
Answer hidden
In configuration management, what baseline configuration information MUST be maintained for
each computer system?
In configuration management, what baseline configuration information MUST be maintained for each computer system?
Answer hidden
Which Radio Frequency Interference (RFI) phenomenon associated with bundled cable runs can
create information leakage?
Which Radio Frequency Interference (RFI) phenomenon associated with bundled cable runs can create information leakage?
Answer hidden
An Org. information security strategic plan MUST be reviewed
An Org. information security strategic plan MUST be reviewed
Answer hidden
When building a data classification scheme, which of the following is the PRIMARY concern?
When building a data classification scheme, which of the following is the PRIMARY concern?
Answer hidden
Which technology is a prerequisite for populating the cloud-based directory in a federated identity
solution?
Which technology is a prerequisite for populating the cloud-based directory in a federated identity solution?
Answer hidden
What is an advantage of Elliptic Curve Cryptography (ECC)?
What is an advantage of Elliptic Curve Cryptography (ECC)?
Answer hidden
Backup information that is critical to the organization is identified through a
Backup information that is critical to the organization is identified through a
Answer hidden
When using Generic Routing Encapsulation (GRE) tunneling over Internet Protocol version 4 (IPv4),
where is the GRE header inserted?
When using Generic Routing Encapsulation (GRE) tunneling over Internet Protocol version 4 (IPv4), where is the GRE header inserted?
Answer hidden
An application developer is deciding on the amount of idle session time that the application allows
before a timeout. The BEST reason for determining the session timeout requirement is
An application developer is deciding on the amount of idle session time that the application allows before a timeout. The BEST reason for determining the session timeout requirement is
Answer hidden
Knowing the language in which an encrypted message was originally produced might help a
cryptanalyst to perform a
Knowing the language in which an encrypted message was originally produced might help a cryptanalyst to perform a
Answer hidden
During the Security Assessment and Authorization process, what is the PRIMARY purpose for
conducting a hardware and software inventory?
During the Security Assessment and Authorization process, what is the PRIMARY purpose for conducting a hardware and software inventory?
Answer hidden
When evaluating third-party applications, which of the following is the GREATEST responsibility of
Information Security?
When evaluating third-party applications, which of the following is the GREATEST responsibility of Information Security?
Answer hidden
An employee of a retail company has been granted an extended leave of absence by Human
Resources (HR). This information has been formally communicated to the access provisioning team.
Which of the following is the BEST action to take?
An employee of a retail company has been granted an extended leave of absence by Human Resources (HR). This information has been formally communicated to the access provisioning team. Which of the following is the BEST action to take?
Answer hidden
The goal of a Business Impact Analysis (BIA) is to determine which of the following?
The goal of a Business Impact Analysis (BIA) is to determine which of the following?
Answer hidden
What does the Maximum Tolerable Downtime (MTD) determine?
What does the Maximum Tolerable Downtime (MTD) determine?
Answer hidden
What is a characteristic of Secure Socket Layer (SSL) and Transport Layer Security (TLS)?
What is a characteristic of Secure Socket Layer (SSL) and Transport Layer Security (TLS)?
Answer hidden
How does a Host Based Intrusion Detection System (HIDS) identify a potential attack?
How does a Host Based Intrusion Detection System (HIDS) identify a potential attack?
Answer hidden
From a cryptographic perspective, the service of non-repudiation includes which of the following
features?
From a cryptographic perspective, the service of non-repudiation includes which of the following features?
Answer hidden
Which of the following BEST represents the concept of least privilege?
Which of the following BEST represents the concept of least privilege?
Answer hidden
When designing a vulnerability test, which one of the following is likely to give the BEST indication of
what components currently operate on the network?
When designing a vulnerability test, which one of the following is likely to give the BEST indication of what components currently operate on the network?
Answer hidden
Which of the following approaches is the MOST effective way to dispose of data on multiple hard
drives?
Which of the following approaches is the MOST effective way to dispose of data on multiple hard drives?
Answer hidden
Which of the following is the BEST method to reduce the effectiveness of phishing attacks?
Which of the following is the BEST method to reduce the effectiveness of phishing attacks?
Answer hidden
The PRIMARY purpose of accreditation is to:
The PRIMARY purpose of accreditation is to:
Answer hidden
Which of the following is a weakness of Wired Equivalent Privacy (WEP)?
Which of the following is a weakness of Wired Equivalent Privacy (WEP)?
Answer hidden
When writing security assessment procedures, what is the MAIN purpose of the test outputs and
reports?
When writing security assessment procedures, what is the MAIN purpose of the test outputs and reports?
Answer hidden
Which of the following is the MAIN reason for using configuration management?
Which of the following is the MAIN reason for using configuration management?
Answer hidden
Which of the following is BEST suited for exchanging authentication and authorization messages in a
multi-party decentralized environment?
Which of the following is BEST suited for exchanging authentication and authorization messages in a multi-party decentralized environment?
Answer hidden
Which of the following is MOST important when deploying digital certificates?
Which of the following is MOST important when deploying digital certificates?
Answer hidden
A user sends an e-mail request asking for read-only access to files that are not considered sensitive. A
Discretionary Access Control (DAC) methodology is in place. Which is the MOST suitable approach
that the administrator should take?
A user sends an e-mail request asking for read-only access to files that are not considered sensitive. A Discretionary Access Control (DAC) methodology is in place. Which is the MOST suitable approach that the administrator should take?
Answer hidden
How should an organization determine the priority of its remediation efforts after a vulnerability
assessment has been conducted?
How should an organization determine the priority of its remediation efforts after a vulnerability assessment has been conducted?
Answer hidden
Which of the following is the MOST important consideration when developing a Disaster Recovery
Plan (DRP)?
Which of the following is the MOST important consideration when developing a Disaster Recovery Plan (DRP)?
Answer hidden
A proxy firewall operates at what layer of the Open System Interconnection (OSI) model?
A proxy firewall operates at what layer of the Open System Interconnection (OSI) model?
Answer hidden
Which of the following restricts the ability of an individual to carry out all the steps of a particular
process?
Which of the following restricts the ability of an individual to carry out all the steps of a particular process?
Answer hidden
Although code using a specific program language may not be susceptible to a buffer overflow attack,
Although code using a specific program language may not be susceptible to a buffer overflow attack,
Answer hidden
What is the BEST way to encrypt web application communications?
What is the BEST way to encrypt web application communications?
Answer hidden
Which of the following are effective countermeasures against passive network-layer attacks?
Which of the following are effective countermeasures against passive network-layer attacks?
Answer hidden
What is the MOST important element when considering the effectiveness of a training program for
Business Continuity (BC) and Disaster Recovery (DR)?
What is the MOST important element when considering the effectiveness of a training program for Business Continuity (BC) and Disaster Recovery (DR)?
Answer hidden
DRAG DROP
Match the name of access control model with its associated restriction.
Drag each access control model to its appropriate restriction access on the right.
DRAG DROP Match the name of access control model with its associated restriction. Drag each access control model to its appropriate restriction access on the right.
Answer hidden
A database administrator is asked by a high-ranking member of management to perform specific
changes to the accounting system database. The administrator is specifically instructed to not track
or evidence the change in a ticket. Which of the following is the BEST course of action?
A database administrator is asked by a high-ranking member of management to perform specific changes to the accounting system database. The administrator is specifically instructed to not track or evidence the change in a ticket. Which of the following is the BEST course of action?
Answer hidden
Which of the following is the MOST important goal of information asset valuation?
Which of the following is the MOST important goal of information asset valuation?
Answer hidden
Which of the following is a strategy of grouping requirements in developing a Security Test and
Evaluation (ST&E)?
Which of the following is a strategy of grouping requirements in developing a Security Test and Evaluation (ST&E)?
Answer hidden
Which one of the following activities would present a significant security risk to organizations when
employing a Virtual Private Network (VPN) solution?
Which one of the following activities would present a significant security risk to organizations when employing a Virtual Private Network (VPN) solution?
Answer hidden
Which of the following BEST describes a chosen plaintext attack?
Which of the following BEST describes a chosen plaintext attack?
Answer hidden
For network based evidence, which of the following contains traffic details of all network sessions in
order to detect anomalies?
For network based evidence, which of the following contains traffic details of all network sessions in order to detect anomalies?
Answer hidden
Which of the following is the PRIMARY reason to perform regular vulnerability scanning of an
organization network?
Which of the following is the PRIMARY reason to perform regular vulnerability scanning of an organization network?
Answer hidden
Which of the following would BEST describe the role directly responsible for data within an
organization?
Which of the following would BEST describe the role directly responsible for data within an organization?
Answer hidden
The restoration priorities of a Disaster Recovery Plan (DRP) are based on which of the following
documents?
The restoration priorities of a Disaster Recovery Plan (DRP) are based on which of the following documents?
Answer hidden
A security architect plans to reference a Mandatory Access Control (MAC) model for implementation.
This indicates that which of the following properties are being prioritized?
A security architect plans to reference a Mandatory Access Control (MAC) model for implementation. This indicates that which of the following properties are being prioritized?
Answer hidden
A vulnerability in which of the following components would be MOST difficult to detect?
A vulnerability in which of the following components would be MOST difficult to detect?
Answer hidden
During which of the following processes is least privilege implemented for a user account?
During which of the following processes is least privilege implemented for a user account?
Answer hidden
Which of the following is a document that identifies each item seized in an investigation, including
date and time seized, full name and signature or initials of the person who seized the item, and a
detailed description of the item?
Which of the following is a document that identifies each item seized in an investigation, including date and time seized, full name and signature or initials of the person who seized the item, and a detailed description of the item?
Answer hidden
Which of the following is needed to securely distribute symmetric cryptographic keys?
Which of the following is needed to securely distribute symmetric cryptographic keys?
Answer hidden
Reciprocal backup site agreements are considered to be
Reciprocal backup site agreements are considered to be
Answer hidden
In which identity management process is the subject's identity established?
In which identity management process is the subject's identity established?
Answer hidden
In order to assure authenticity, which of the following are required?
In order to assure authenticity, which of the following are required?
Answer hidden
At which layer of the Open Systems Interconnect (OSI) model are the source and destination address
for a datagram handled?
At which layer of the Open Systems Interconnect (OSI) model are the source and destination address for a datagram handled?
Answer hidden
An organization regularly conducts its own penetration tests. Which of the following scenarios MUST
be covered for the test to be effective?
An organization regularly conducts its own penetration tests. Which of the following scenarios MUST be covered for the test to be effective?
Answer hidden
A company was ranked as high in the following National Institute of Standards and Technology (NIST)
functions: Protect, Detect, Respond and Recover. However, a low maturity grade was attributed to
the Identify function. In which of the following the controls categories does this company need to
improve when analyzing its processes individually?
A company was ranked as high in the following National Institute of Standards and Technology (NIST) functions: Protect, Detect, Respond and Recover. However, a low maturity grade was attributed to the Identify function. In which of the following the controls categories does this company need to improve when analyzing its processes individually?
Answer hidden
What is the difference between media marking and media labeling?
What is the difference between media marking and media labeling?
Answer hidden
What balance MUST be considered when web application developers determine how informative
application error messages should be constructed?
What balance MUST be considered when web application developers determine how informative application error messages should be constructed?
Answer hidden
What operations role is responsible for protecting the enterprise from corrupt or contaminated
media?
What operations role is responsible for protecting the enterprise from corrupt or contaminated media?
Answer hidden
Which of the following is a characteristic of the initialization vector when using Data Encryption
Standard (DES)?
Which of the following is a characteristic of the initialization vector when using Data Encryption Standard (DES)?
Answer hidden
DRAG DROP
Match the access control type to the example of the control type.
Drag each access control type net to its corresponding example.
DRAG DROP Match the access control type to the example of the control type. Drag each access control type net to its corresponding example.
Answer hidden
In general, servers that are facing the Internet should be placed in a demilitarized zone (DMZ). What
is MAIN purpose of the DMZ?
In general, servers that are facing the Internet should be placed in a demilitarized zone (DMZ). What is MAIN purpose of the DMZ?
Answer hidden
Network-based logging has which advantage over host-based logging when reviewing malicious
activity about a victim machine?
Network-based logging has which advantage over host-based logging when reviewing malicious activity about a victim machine?
Answer hidden
Which of the following is the PRIMARY reason for employing physical security personnel at entry
points in facilities where card access is in operation?
Which of the following is the PRIMARY reason for employing physical security personnel at entry points in facilities where card access is in operation?
Answer hidden
Between which pair of Open System Interconnection (OSI) Reference Model layers are routers used
as a communications device?
Between which pair of Open System Interconnection (OSI) Reference Model layers are routers used as a communications device?
Answer hidden
Which type of security testing is being performed when an ethical hacker has no knowledge about
the target system but the testing target is notified before the test?
Which type of security testing is being performed when an ethical hacker has no knowledge about the target system but the testing target is notified before the test?
Answer hidden
Which of the following countermeasures is the MOST effective in defending against a social
engineering attack?
Which of the following countermeasures is the MOST effective in defending against a social engineering attack?
Answer hidden
Which of the following information MUST be provided for user account provisioning?
Which of the following information MUST be provided for user account provisioning?
Answer hidden
Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet
Protocol Security (IPSec) connection?
Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) connection?
Answer hidden
A company has decided that they need to begin maintaining assets deployed in the enterprise. What
approach should be followed to determine and maintain ownership information to bring the
company into compliance?
A company has decided that they need to begin maintaining assets deployed in the enterprise. What approach should be followed to determine and maintain ownership information to bring the company into compliance?
Answer hidden