Dump - 8
100 Questions
4 Views

Dump - 8

Created by
@FondNarwhal

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is applicable to a publicly held company concerned about information handling and storage requirement specific to the financial reporting?

Answer hidden

Which of the following is used to detect steganography?

Answer hidden

Which is the MOST critical aspect of computer-generated evidence?

Answer hidden

Which of the following media is LEAST problematic with data remanence?

Answer hidden

Which open standard could l large corporation deploy for authorization services for single sign-on (SSO) use across multiple internal and external application?

Answer hidden

Which of the following statements is TRUE regarding equivalence class testing?

Answer hidden

A large corporation is looking for a solution to automate access based on where the request is coming from, who the user is, what device they are connecting with, and what and time of day they are attempting this access. What type of solution would suit their needs?

Answer hidden

Which of the following techniques is MOST useful when dealing with Advanced persistent Threat (APT) intrusions on live virtualized environments?

Answer hidden

Which of the following MUST an organization do to effectively communicate is security strategy to all affected parties?

Answer hidden

When using Security Assertion markup language (SAML), it is assumed that the principal subject

Answer hidden

A vulnerability assessment report has been submitted to a client. The client indicates that one third of the hosts that were in scope are missing from the report. In which phase of the assessment was this error MOST likely made?

Answer hidden

Which of the below strategies would MOST comprehensively address the risk of malicious insiders leaking sensitive information?

Answer hidden

What is the FIRST step required in establishing a records retention program?

Answer hidden

Functional security testing is MOST critical during which phase of the system development life cycle (SDLC)?

Answer hidden

What is the threat modeling order using process for Attack simulation and threat analysis (PASTA)?

Answer hidden

Which is the RECOMMENDED configuration mode for sensors for an intrusion prevention system (IPS) if the prevention capabilities will be used?

Answer hidden

An organization implements a remote access server (RAS), Once users connect to the server, digital certificates are used to authenticate their identity. What type of extensible Authentication protocol (EAP) would the organization use during this authentication?

Answer hidden

An analysis finds unusual activity coming from a computer that was thrown away several months prior, which of the following steps ensure the proper removal of the system?

Answer hidden

As a security manger which of the following is the MOST effective practice for providing value to an organization?

Answer hidden

DRAG DROP Rank the Hypertext Transfer protocol (HTTP) authentication types shows below in order of relative strength. Drag the authentication type on the correct positions on the right according to strength from weakest to strongest.

Answer hidden

Which of the following BEST provides for non-repudiation od user account actions?

Answer hidden

What type of access control determines the authorization to resource based on pre-defined job titles within an organization?

Answer hidden

As users switch roles within an organization, their accounts are given additional permissions to perform the duties of their new position. After a recent audit, it was discovered that many of these accounts maintained their old permissions as well. The obsolete permissions identified by the audit have been remediated and accounts have only the appropriate permissions to complete their jobs.

Answer hidden

Continuity of operations is BEST supported by which of the following?

Answer hidden

Which of the following is true of Service Organization Control (SOC) reports?

Answer hidden

What testing technique enables the designer to develop mitigation strategies for potential vulnerabilities?

Answer hidden

Asymmetric algorithms are used for which of the following when using Secure Sockets Layer/Transport Layer Security (SSL/TLS) for implementing network security?

Answer hidden

What is the MOST common component of a vulnerability management framework?

Answer hidden

A new Chief Information Officer (CIO) created a group to write a data retention policy based on applicable laws. Which of the following is the PRIMARY motivation for the policy?

Answer hidden

What determines the level of security of a combination lock?

Answer hidden

A user downloads a file from the Internet, then applies the Secure Hash Algorithm 3 (SHA-3c?

Answer hidden

Which of the following is held accountable for the risk to organizational systems and data that result from outsourcing Information Technology (IT) systems and services?

Answer hidden

Which of the following is the BEST definition of Cross-Site Request Forgery (CSRF)?

Answer hidden

Which of the following is a process in the access provisioning lifecycle that will MOST likely identify access aggregation issues?

Answer hidden

Which of the following is the PRIMARY reason a sniffer operating on a network is collecting packets only from its own host?

Answer hidden

Which of the following is the final phase of the identity and access provisioning lifecycle?

Answer hidden

Which of the following is mobile device remote fingerprinting?

Answer hidden

Which of the following trust services principles refers to the accessibility of information used by the systems, products, or services offered to a third-party provider's customers?

Answer hidden

Which of the following open source software issues pose the MOST risk to an application?

Answer hidden

Which of the following is the PRIMARY mechanism used to limit the range of objects available to a given subject within different execution domains?

Answer hidden

Once the types of information have been identified, who should an information security practitioner work with to ensure that the information is properly categorized?

Answer hidden

What should be the FIRST action for a security administrator who detects an intrusion on the network based on precursors and other indicators?

Answer hidden

Which of the following needs to be taken into account when assessing vulnerability?

Answer hidden

For the purpose of classification, which of the following is used to divide trust domain and trust boundaries?

Answer hidden

Which of the following is the key requirement for test results when implementing forensic procedures?

Answer hidden

An application team is running tests to ensure that user entry fields will not accept invalid input of any length. What type of negative testing is this an example of?

Answer hidden

An Internet software application requires authentication before a user is permitted to utilize the resource. Which testing scenario BEST validates the functionality of the application?

Answer hidden

Which of the following techniques BEST prevents buffer overflows?

Answer hidden

A security architect is responsible for the protection of a new home banking system. Which of the following solutions can BEST improve the confidentiality and integrity of this external system?

Answer hidden

A security professional recommends that a company integrate threat modeling into its Agile development processes. Which of the following BEST describes the benefits of this approach?

Answer hidden

A security consultant has been hired by a company to establish its vulnerability management program. The consultant is now in the deployment phase. Which of the following tasks is part of this process?

Answer hidden

Directive controls are a form of change management policy and procedures. Which of the following subsections are recommended as part of the change management process?

Answer hidden

Which of the following BEST describes how access to a system is granted to federated user accounts?

Answer hidden

Which of the following is the primary advantage of segmenting Virtual Machines (VM) using physical networks?

Answer hidden

Which of the following would an internal technical security audit BEST validate?

Answer hidden

Which of the following processes has the PRIMARY purpose of identifying outdated software versions, missing patches, and lapsed system updates?

Answer hidden

A development operations team would like to start building new applications delegating the cybersecurity responsibility as much as possible to the service provider. Which of the following environments BEST fits their need?

Answer hidden

Change management policies and procedures belong to which of the following types of controls?

Answer hidden

What access control scheme uses fine-grained rules to specify the conditions under which access to each data item or applications is granted?

Answer hidden

Why is planning the MOST critical phase of a Role Based Access Control (RBAC) implementation?

Answer hidden

Vulnerability scanners may allow for the administrator to assign which of the following in order to assist in prioritizing remediation activities?

Answer hidden

In order for application developers to detect potential vulnerabilities earlier during the Software Development Life Cycle (SDLC), which of the following safeguards should be implemented FIRST as part of a comprehensive testing framework?

Answer hidden

Physical assets defined in an organization's Business Impact Analysis (BIA) could include which of the following?

Answer hidden

What is the best way for mutual authentication of devices belonging to the same organization?

Answer hidden

Which of the following encryption types is used in Hash Message Authentication Code (HMAC) for key distribution?

Answer hidden

Compared with hardware cryptography, software cryptography is generally

Answer hidden

A financial company has decided to move its main business application to the Cloud. The legal department objects, arguing that the move of the platform should comply with several regulatory obligations such as the General Data Protection (GDPR) and ensure data confidentiality. The Chief Information Security Officer (CISO) says that the cloud provider has met all regulations requirements and even provides its own encryption solution with internally-managed encryption keys to address data confidentiality. Did the CISO address all the legal requirements in this situation?

Answer hidden

An employee receives a promotion that entities them to access higher-level functions on the company's accounting system, as well as keeping their access to the previous system that is no longer needed or applicable. What is the name of the process that tries to remove this excess privilege?

Answer hidden

Which of the following is PRIMARILY adopted for ensuring the integrity of information is preserved?

Answer hidden

Why might a network administrator choose distributed virtual switches instead of stand-alone switches for network segmentation?

Answer hidden

An organization has implemented a new backup process which protects confidential data by encrypting the information stored on backup tapes. Which of the following is a MAJOR data confidentiality concern after the implementation of this new backup process?

Answer hidden

Organization A is adding a large collection of confidential data records that it received when it acquired Organization B to its data store. Many of the users and staff from Organization B are no longer available. Which of the following MUST Organization A 0do to property classify and secure the acquired data?

Answer hidden

An organization has a short-term agreement with a public Cloud Service Provider (CSP). Which of the following BEST protects sensitive data once the agreement expires and the assets are reused?

Answer hidden

Which of the following techniques is effective to detect taps in fiber optic cables?

Answer hidden

When would an organization review a Business Continuity Management (BCM) system?

Answer hidden

Which of the following is a characteristic of the independent testing of a program?

Answer hidden

Which of the following MUST be considered when developing business rules for a data loss prevention (DLP) solution?

Answer hidden

What is the BEST approach for maintaining ethics when a security professional is unfamiliar with the culture of a country and is asked to perform a questionable task?

Answer hidden

Which of the following activities is MOST likely to be performed during a vulnerability assessment?

Answer hidden

Which of the following is the BEST defense against password guessing?

Answer hidden

Why would a security architect specify that a default route pointing to a sinkhole be injected into internal networks?

Answer hidden

Which one of the following documentation should be included in a Disaster Recovery (DR) package?

Answer hidden

How long should the records on a project be retained?

Answer hidden

Which of the following phases involves researching a target's configuration from public sources when performing a penetration test?

Answer hidden

Which of the following provides the BEST method to verify that security baseline configurations are maintained?

Answer hidden

Which attack defines a piece of code that is inserted into software to trigger a malicious function?

Answer hidden

Which of the following is the MOST critical success factor in the security patch management process?

Answer hidden

A security professional should consider the protection of which of the following elements FIRST when developing a defense-in-depth strategy for a mobile workforce?

Answer hidden

Which of the following is the BEST technique to facilitate secure software development?

Answer hidden

What is the MAIN reason to ensure the appropriate retention periods are enforced for data stored on electronic media?

Answer hidden

For a federated identity solution, a third-party Identity Provider (IdP) is PRIMARILY responsible for which of the following?

Answer hidden

What is the BEST way to correlate large volumes of disparate data sources in a Security Operations Center (SOC) environment?

Answer hidden

Which of the following steps should be conducted during the FIRST phase of software assurance in a generic acquisition process?

Answer hidden

Assume that a computer was powered off when an information security professional arrived at a crime scene. Which of the following actions should be performed after the crime scene is isolated?

Answer hidden

Which of the following is used to support the concept of defense in depth during the development phase of a software product?

Answer hidden

An organization is considering outsourcing applications and data to a Cloud Service Provider (CSP). Which of the following is the MOST important concern regarding privacy?

Answer hidden

Individual access to a network is BEST determined based on

Answer hidden

The MAIN task of promoting security for Personal Computers (PC) is

Answer hidden

The Secure Shell (SSH) version 2 protocol supports.

Answer hidden

To control the scope of a Business Continuity Management (BCM) system, a security practitioner should identify which of the following?

Answer hidden

More Like This

Dump -1-2
250 questions

Dump -1-2

FondNarwhal avatar
FondNarwhal
Dump - 9
100 questions

Dump - 9

FondNarwhal avatar
FondNarwhal
Dump - 11
100 questions

Dump - 11

FondNarwhal avatar
FondNarwhal
Dump - 14
87 questions

Dump - 14

FondNarwhal avatar
FondNarwhal
Use Quizgecko on...
Browser
Browser