Question #250
In an IDEAL encryption system, who has sole access to the decryption key?
- A. Data custodian
- B. System owner
- C. System administrator
- D. Data owner
Correct Answer: D
Community vote distribution
D (83%)
A (17%)
Question #251
Which type of disaster recovery plan (DRP) testing carries the MOST operational risk?
- A. Cutover
- B. Parallel
- C. Walkthrough
- D. Tabletop
Correct Answer: D
Community vote distribution
A (93%)
7%
Question #252
Which of the following methods provides the MOST protection for user credentials?
- A. Forms-based authentication
- B. Self-registration
- C. Basic authentication
- D. Digest authentication
Correct Answer: A
Community vote distribution
D (100%)
Question #253
An organization is planning a penetration test that simulates the malicious actions of a former network administrator. What kind of penetration test is needed?
- A. Functional test
- B. Unit test
- C. Grey box
- D. White box
Correct Answer: D
Community vote distribution
C (62%)
D (38%)
Question #254
How does Radio-Frequency Identification (RFID) assist with asset management?
- A. It uses biometric information for system identification.
- B. It uses two-factor authentication (2FA) for system identification.
- C. It transmits unique serial numbers wirelessly.
- D. It transmits unique Media Access Control (MAC) addresses wirelessly.
Correct Answer: C
Community vote distribution
C (100%)
Question #255
Which of the following is the FIRST step an organization’s professional performs when defining a cyber-security program based upon industry standards?
- A. Review the past security assessments
- B. Define the organization’s objectives regarding security and risk mitigation
- C. Map the organization’s current security practices to industry standards and frameworks
- D. Select from a choice of security best practices
Correct Answer: C
Community vote distribution
B (100%)
Question #256
What is the MOST important criterion that needs to be adhered to during the data collection process of an active investigation?
- A. Maintaining the chain of custody
- B. Capturing an image of the system
- C. Outlining all actions taken during the investigation
- D. Complying with the organization’s security policy
Correct Answer: A
Community vote distribution
A (100%)
Question #257
Two computers, each with a single connection on the same physical 10 gigabit Ethernet network segment, need to communicate with each other. The first machine has a single Internet Protocol (IP) Classless Inter-Domain Routing (CIDR) address of 192.168.1.3/30 and the second machine has an IP/CIDR address
192.168.1.6/30. Which of the following is correct?
- A. Since each computer is on a different layer 3 network, traffic between the computers must be processed by a network bridge in order to communicate
- B. Since each computer is on the same layer 3 network, traffic between the computers may be processed by a network router in order to communicate
- C. Since each computer is on the same layer 3 network, traffic between the computers may be processed by a network bridge in order to communicate
- D. Since each computer is on a different layer 3 network, traffic between the computers must be processed by a network router in order to communicate
Correct Answer: B
Community vote distribution
D (100%)
Question #258
Security Software Development Life Cycle (SDLC) expects application code to be written in a consistent manner to allow ease of auditing and which of the following?
- A. Protecting
- B. Copying
- C. Enhancing
- D. Executing
Correct Answer: A
Community vote distribution
C (50%)
A (50%)
Question #259
Which of the following is a risk matrix?
- A. A tool for determining risk management decisions for an activity or system.
- B. A database of risks associated with a specific information system.
- C. A two-dimensional picture of risk for organizations, products, projects, or other items of interest.
- D. A table of risk management factors for management to consider.
Correct Answer: A
Community vote distribution
C (62%)
A (38%)
Question #260
What part of an organization’s strategic risk assessment MOST likely includes information on items affecting the success of the organization?
- A. Threat analysis
- B. Vulnerability analysis
- C. Key Performance Indicator (KPI)
- D. Key Risk Indiaitor (KRI)
Correct Answer: A
Community vote distribution
D (65%)
C (20%)
A (15%)
Question #261
A company needs to provide employee access to travel services, which are hosted by a third-party service provider. Employee experience is important, and when users are already authenticated, access to the travel portal is seamless. Which of the following methods is used to share information and grant user access to the travel portal?
- A. Single sign-on (SSO) access
- B. Security Assertion Markup Language (SAML) access
- C. Open Authorization (OAuth) access
- D. Federated access
Correct Answer: D
Community vote distribution
D (77%)
A (18%)
5%
Question #262
The Chief Executive Officer (CEO) wants to implement an internal audit of the company’s information security posture. The CEO wants to avoid any bias in the audit process; therefore, has assigned the Sales Director to conduct the audit. After significant interaction over a period of weeks the audit concludes that the company’s policies and procedures are sufficient, robust and well established. The CEO then moves on to engage an external penetration testing company in order to showcase the organization’s robust information security stance. This exercise reveals significant failings in several critical security controls and shows that the incident response processes remain undocumented. What is the MOST likely reason for this disparity in the results of the audit and the external penetration test?
- A. The audit team lacked the technical experience and training to make insightful and objective assessments of the data provided to them.
- B. The scope of the penetration test exercise and the internal audit were significantly different.
- C. The external penetration testing company used custom zero-day attacks that could not have been predicted.
- D. The information technology (IT) and governance teams have failed to disclose relevant information to the internal audit team leading to an incomplete assessment being formulated.
Correct Answer: A
Community vote distribution
A (78%)
11%
11%
Question #263
An information security administrator wishes to block peer-to-peer (P2P) traffic over Hypertext Transfer Protocol (HTTP) tunnels. Which of the following layers of the Open Systems Interconnection (OSI) model requires inspection?
- A. Application
- B. Transport
- C. Session
- D. Presentation
Correct Answer: A
Community vote distribution
A (100%)
Question #264
A Chief Information Officer (CIO) has delegated responsibility of their system security to the head of the information technology (IT) department. While corporate policy dictates that only the CIO can make decisions on the level of data protection required, technical implementation decisions are done by the head of the IT department. Which of the following BEST describes the security role filled by the head of the IT department?
- A. System security officer
- B. System processor
- C. System custodian
- D. System analyst
Correct Answer: C
Community vote distribution
C (63%)
A (38%)
Question #265
Which of the following actions should be undertaken prior to deciding on a physical baseline Protection Profile (PP)?
- A. Conduct a site survey.
- B. Choose a suitable location.
- C. Check the technical design.
- D. Categorize assets.
Correct Answer: A
Community vote distribution
A (63%)
D (37%)
Question #266
Management has decided that a core application will be used on personal cellular phones. As an implementation requirement, regularly scheduled analysis of the security posture needs to be conducted. Management has also directed that continuous monitoring be implemented. Which of the following is required to accomplish management’s directive?
- A. Routine reports generated by the user’s cellular phone provider that detail security events
- B. Strict integration of application management, configuration management (CM), and phone management
- C. Management application installed on user phones that tracks all application events and cellular traffic
- D. Enterprise-level security information and event management (SIEM) dashboard that provides full visibility of cellular phone activity
Correct Answer: C
Community vote distribution
B (71%)
C (18%)
12%
Question #267
A systems engineer is designing a wide area network (WAN) environment for a new organization. The WAN will connect sites holding information at various levels of sensitivity, from publicly available to highly confidential. The organization requires a high degree of interconnectedness to support existing business processes.
What is the BEST design approach to securing this environment?
- A. Use reverse proxies to create a secondary “shadow” environment for critical systems.
- B. Place firewalls around critical devices, isolating them from the rest of the environment.
- C. Layer multiple detective and preventative technologies at the environment perimeter.
- D. Align risk across all interconnected elements to ensure critical threats are detected and handled.
Correct Answer: B
Community vote distribution
B (35%)
D (35%)
C (30%)
Question #268
Which of the following techniques is MOST useful when dealing with advanced persistent threat (APT) intrusions on live virtualized environments?
- A. Memory forensics
- B. Logfile analysis
- C. Reverse engineering
- D. Antivirus operations
Correct Answer: C
Community vote distribution
A (92%)
8%
Question #269
Which of the following types of web-based attack is happening when an attacker is able to send a well-crafted, malicious request to an authenticated user realizing it?
- A. Process injection
- B. Cross-Site request forgery (CSRF)
- C. Cross-Site Scripting (XSS)
- D. Broken Authentication And Session Management
Correct Answer: B
Community vote distribution
B (100%)
Question #270
A scan report returned multiple vulnerabilities affecting several production servers that are mission critical. Attempts to apply the patches in the development environment have caused the servers to crash. What is the BEST course of action?
- A. Mitigate the risks with compensating controls.
- B. Upgrade the software affected by the vulnerability.
- C. Remove the affected software from the servers.
- D. Inform management of possible risks.
Correct Answer: A
Community vote distribution
A (50%)
D (50%)
Question #271
A security professional has reviewed a recent site assessment and has noted that a server room on the second floor of a building has Heating, Ventilation, and Air
Conditioning (HVAC) intakes on the ground level that have ultraviolet light fi lters installed, Aero-K Fire suppression in the server room, and pre-action fire suppression on floors above the server room. Which of the following changes can the security professional recommend to reduce risk associated with these conditions?
- A. Remove the ultraviolet light filters on the HVAC intake and replace the fire suppression system on the upper floors with a dry system
- B. Elevate the HVAC intake by constructing a plenum or external shaft over it and convert the server room fire suppression to a pre-action system
- C. Add additional ultraviolet light fi lters to the HVAC intake supply and return ducts and change server room fire suppression to FM-200
- D. Apply additional physical security around the HVAC intakes and update upper floor fire suppression to FM-200
Correct Answer: A
Community vote distribution
D (67%)
A (33%)
Question #272
Which of the following is the MOST common use of the Online Certificate Status Protocol (OCSP)?
- A. To verify the validity of an X.509 digital certificate
- B. To obtain the expiration date of an X.509 digital certificate
- C. To obtain the revocation status of an X.509 digital certificate
- D. To obtain the author name of an X.509 digital certificate
Correct Answer: C
Community vote distribution
C (63%)
A (38%)
Question #273
A security professional has been assigned to assess a web application. The assessment report recommends switching to Security Assertion Markup Language
(SAML). What is the PRIMARY security benefit in switching to SAML?
- A. It enables single sign-on (SSO) for web applications.
- B. It uses Transport Layer Security (TLS) to address confidentiality.
- C. It limits unnecessary data entry on web forms.
- D. The users’ password is not passed during authentication.
Correct Answer: A
Community vote distribution
D (50%)
A (50%)
Question #274
An organization purchased a commercial off-the-shelf (COTS) software several years ago. The information technology (IT) Director has decided to migrate the application into the cloud, but is concerned about the application security of the software in the organization’s dedicated environment with a cloud service provider.
What is the BEST way to prevent and correct the software’s security weaknesses?
- A. Follow the software end-of-life schedule
- B. Implement a dedicated COTS sandbox environment
- C. Transfer the risk to the cloud service provider
- D. Examine the software updating and patching process
Correct Answer: B
Community vote distribution
D (86%)
14%
Question #275
What type of database attack would allow a customer service employee to determine quarterly sales results before they are publicly announced?
- A. Inference
- B. Aggregation
- C. Polyinstantiation
- D. Data mining
Correct Answer: A
Community vote distribution
A (70%)
D (15%)
B (15%)
Question #276
In a multi-tenant cloud environment, what approach will secure logical access to assets?
- A. Controlled configuration management (CM)
- B. Transparency/Auditability of administrative access
- C. Virtual private cloud (VPC)
- D. Hybrid cloud
Correct Answer: C
Community vote distribution
C (100%)
Question #277
An information technology (IT) employee who travels frequently to various countries remotely connects to an organization’s resources to troubleshoot problems.
Which of the following solutions BEST serves as a secure control mechanism to meet the organization’s requirements?
- A. Install a third-party screen sharing solution that provides remote connection from a public website.
- B. Install a bastion host in the demilitarized zone (DMZ) and allow multi-factor authentication (MFA) access.
- C. Implement a Dynamic Domain Name Services (DONS) account to initiate a virtual private network (VPN) using the DONS record.
- D. Update the firewall rules to include the static Internet Protocol (IP) addresses of the locations where the employee connects from.
Correct Answer: B
Community vote distribution
B (100%)
Question #278
Which of the following is the BEST way to determine the success of a patch management process?
- A. Change management
- B. Configuration management (CM)
- C. Analysis and impact assessment
- D. Auditing and assessment
Correct Answer: C
Community vote distribution
D (77%)
A (23%)
Question #279
An organization has discovered that organizational data is posted by employees to data storage accessible to the general public. What is the PRIMARY step an organization must take to ensure data is properly protected from public release?
- A. Implement a user reporting policy.
- B. Implement a data encryption policy.
- C. Implement a user training policy.
- D. Implement a data classification policy.
Correct Answer: C
Community vote distribution
D (75%)
C (25%)
Question #280
A security engineer is required to integrate security into a software project that is implemented by small groups that quickly, continuously, and independently develop, test, and deploy code to the cloud. The engineer will MOST likely integrate with which software development process?
- A. Devops Integrated Product Team (IPT)
- B. Structured Waterfall Programming Development
- C. Service-oriented architecture (SOA)
- D. Spiral Methodology
Correct Answer: D
Community vote distribution
A (62%)
D (38%)
Question #281
Which of the following is the BEST method to identify security controls that should be implemented for a web-based application while in development?
- A. Agile software development
- B. Secure software development
- C. Application threat modeling
- D. Penetration testing
Correct Answer: C
Community vote distribution
C (100%)
Question #282
Which Open Systems Interconnection (OSI) layer(s) BEST corresponds to the network access layer in the Transmission Control Protocol/Internet Protocol (TCP/
IP) model?
- A. Data Link and Physical Layers
- B. Session and Network Layers
- C. Transport Layer
- D. Application, Presentation, and Session Layers
Correct Answer: B
Community vote distribution
A (100%)
Question #283
An organization’s retail website provides its only source of revenue, so the disaster recovery plan (DRP) must document an estimated time for each step in the plan. Which of the following steps in the DRP will list the GREATEST duration of time for the service to be fully operational?
- A. Update the Network Address Translation (NAT) table.
- B. Update Domain Name System (DNS) server addresses with domain registrar.
- C. Update the Border Gateway Protocol (BGP) autonomous system number.
- D. Update the web server network adapter configuration.
Correct Answer: B
Community vote distribution
C (60%)
B (40%)
Question #284
In supervisory control and data acquisition (SCADA) systems, which of the following controls can be used to reduce device exposure to malware?
- A. Disallow untested code in the execution space of the SCADA device.
- B. Disable all command line interfaces.
- C. Disable Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) port 138 and 139 on the SCADA device.
- D. Prohibit the use of unsecure scripting languages.
Correct Answer: D
Community vote distribution
A (88%)
13%
Question #285
Which of the following secure transport protocols is often used to secure Voice over Internet Protocol (VoIP) communications on a network from end to end?
- A. Secure File Transfer Protocol (SFTP)
- B. Secure Real-time Transport Protocol (SRTP)
- C. Generic Routing Encapsulation (GRE)
- D. Internet Protocol Security (IPSec)
Correct Answer: D
Community vote distribution
B (100%)
Question #286
A healthcare insurance organization chose a vendor to develop a software application. Upon review of the draft contract, the information security professional notices that software security is not addressed. What is the BEST approach to address the issue?
- A. Update the contract to require the vendor to perform security code reviews.
- B. Update the service level agreement (SLA) to provide the organization the right to audit the vendor.
- C. Update the contract so that the vendor is obligated to provide security capabilities.
- D. Update the service level agreement (SLA) to require the vendor to provide security capabilities.
Correct Answer: B
Community vote distribution
C (86%)
14%
Question #287
Which of the following security tools will ensure authorized data is sent to the application when implementing a cloud-based application?
- A. Host-based intrusion prevention system (HIPS)
- B. Access control list (ACL)
- C. Data loss prevention (DLP)
- D. File integrity monitoring (FIM)
Correct Answer: A
Community vote distribution
C (65%)
B (35%)
Question #288
A client server infrastructure that provides user-to-server authentication describes which one of the following?
- A. Secure Sockets Layer (SSL)
- B. User-based authorization
- C. Kerberos
- D. X.509
Correct Answer: B
Community vote distribution
C (100%)
Question #289
A system developer has a requirement for an application to check for a secure digital signature before the application is accessed on a user’s laptop. Which security mechanism addresses this requirement?
- A. Trusted Platform Module (TPM)
- B. Certificate revocation list (CRL) policy
- C. Key exchange
- D. Hardware encryption
Correct Answer: A
Community vote distribution
A (60%)
B (40%)
Question #290
Which of the following is a term used to describe maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions?
- A. Information Security Continuous Monitoring (ISCM)
- B. Risk Management Framework (RMF)
- C. Information Sharing & Analysis Centers (ISAC)
- D. Information Security Management System (ISMS)
Correct Answer: A
Community vote distribution
A (100%)
Question #291
Which of the following types of firewall only examines the “handshaking” between packets before forwarding traffic?
- A. Proxy firewalls
- B. Circuit-level firewalls
- C. Network Address Translation (NAT) firewalls
- D. Host-based firewalls
Correct Answer: C
Community vote distribution
B (100%)
Question #292
What is a use for mandatory access control (MAC)?
- A. Allows for mandatory user identity and passwords based on sensitivity
- B. Allows for mandatory system administrator access control over objects
- C. Allows for labeling of sensitive user accounts for access control
- D. Allows for object security based on sensitivity represented by a label
Correct Answer: D
Community vote distribution
D (100%)
Question #293
An organization has developed a way for customers to share information from their wearable devices with each other. Unfortunately, the users were not informed as to what information collected would be shared. What technical controls should be put in place to remedy the privacy issue while still trying to accomplish the organization’s business goals?
- A. Share only what the organization decides is best.
- B. Stop sharing data with the other users.
- C. Default the user to not share any information.
- D. Inform the user of the sharing feature changes after implemented.
Correct Answer: C
Community vote distribution
C (50%)
D (50%)
Question #294
Which of the following system components enforces access controls on an object?
- A. Security perimeter
- B. Access control matrix
- C. Trusted domain
- D. Reference monitor
Correct Answer: D
Community vote distribution
D (100%)
Question #295
In setting expectations when reviewing the results of a security test, which of the following statements is MOST important to convey to reviewers?
- A. The accuracy of testing results can be greatly improved if the target(s) are properly hardened.
- B. The results of the tests represent a point-in-time assessment of the target(s).
- C. The deficiencies identified can be corrected immediately.
- D. The target’s security posture cannot be further compromised.
Correct Answer: C
Community vote distribution
B (100%)
Question #296
What is the benefit of an operating system (OS) feature that is designed to prevent an application from executing code from a non-executable memory region?
- A. Identifies which security patches still need to be installed on the system
- B. Reduces the risk of polymorphic viruses from encrypting their payload
- C. Stops memory resident viruses from propagating their payload
- D. Helps prevent certain exploits that store code in buffers
Correct Answer: B
Community vote distribution
D (100%)
Question #297
What is the overall goal of software security testing?
- A. Identifying the key security features of the software
- B. Ensuring all software functions perform as specified
- C. Reducing vulnerabilities within a software system
- D. Making software development more agile
Correct Answer: B
Community vote distribution
C (88%)
12%
Question #298
Which of the following implementations will achieve high availability in a website?
- A. Disk mirroring of the web server with redundant disk drives in a hardened data center
- B. Disk striping of the web server hard drives and large amounts of bandwidth
- C. Multiple geographically dispersed web servers that are configured for failover
- D. Multiple Domain Name System (DNS) entries resolving to the same web server and large amounts of bandwidth
Correct Answer: C
Community vote distribution
C (100%)
Question #299
Which of the following is an important design feature for the outer door of a mantrap?
- A. Allow it to be opened by an alarmed emergency button.
- B. Do not allow anyone to enter it alone.
- C. Do not allow it to be observed by closed-circuit television (CCTV) cameras.
- D. Allow it be opened when the inner door of the mantrap is also open.
Correct Answer: D
Community vote distribution
A (94%)