Exam 8 Questions.

  • Communication and Network Security
  • General Security Principles
  • Identity and Access Management (IAM)
  • Asset Security
  • Software Development Security
  • Security Operations
  • Security Assessment and Testing
  • Security and Risk Management
  • Security Architecture and Engineering

Page 1 of 9

Communication and Network Security

1. What is a security concern when considering implementing software-defined networking (SDN)?{
2. Individual access to a network is BEST determined based on: {
3. The security organization is looking for a solution that could help them determine with a strong level of confidence that attackers have breached their network. Which solution is MOST effective at discovering a successful network breach?{
4. Which of the following trust services principles refers to the accessibility of information used by the systems, products, or services offered to a third-party provider’s customers?{
5. Internet Protocol Security (IPSec), Point-to-Point Tunneling Protocol (PPTP), and Secure Sockets Layer (SSL) all use which of the following to prevent replay attacks?{
6. What technique used for spoofing the origin of an email can successfully conceal the sender's Internet Protocol (IP) address?{
7. What should be the FIRST action for a security administrator who detects an intrusion on the network based on precursors and other indicators?{
8. The security operations center (SOC) has received credible intelligence that a threat actor is planning to attack with multiple variants of a destructive virus. After obtaining a sample set of this virus’ variants and reverse engineering them to understand how they work, a commonality was found. All variants are coded to write to a specific memory location. What security feature enabled by default mitigates this threat?{
9. An organization has implemented a protection strategy to secure the network from unauthorized external access. The new Chief Information Security Officer (CISO) wants to increase security by better protecting the network from unauthorized internal access. Which Network Access Control (NAC) capability BEST meets this objective?{
10. A cloud service accepts Security Assertion Markup Language (SAML) assertions from users to access the service. An attacker was able to spoof a registered account on the network and query the SAML provider. What is the MOST common attack leveraged against this flaw?{
11. An information security administrator wishes to block peer-to-peer (P2P) traffic over Hypertext Transfer Protocol (HTTP) tunnels. Which of the following layers of the Open Systems Interconnection (OSI) model requires inspection?{
12. Which is the RECOMMENDED configuration mode for sensors in an intrusion prevention system (IPS) if prevention capabilities will be used?{
13. Which of the following is the BEST defense against password guessing?{
14. Which protocol does Secure Shell (SSH) version 2 support?{
15. What security principle addresses the issue of "Security by Obscurity"?{
16. Which of the following is the BEST definition of Cross-Site Request Forgery (CSRF)?{
17. Company A is evaluating new software to replace an in-house developed application. What step should Company A take after receiving a response from Company B with their flagship product that meets security and functional requirements but runs on an unfamiliar OS?{
18. Using the ciphertext and resultant clear text message to derive the non-alphabetic cipher key is an example of which method of cryptanalytic attack?{
19. If a wide area network (WAN) supports converged applications like Voice over Internet Protocol (VoIP), what becomes essential to ensure network reliability and security?{
20. An organization wants to enable users to authenticate across multiple security domains using Federated Identity Management (FIM). Which of the following is used behind the scenes in a FIM deployment?{
21. What action should a security professional take when a mission-critical computer network attack is suspected?{
22. Which is MOST important when negotiating an Internet service provider (ISP) service-level agreement (SLA) by an organization that solely provides Voice over Internet Protocol (VoIP) services?{
23. To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the MOST appropriate to complete the assessment?{
24. A subscription service provides power, climate control, raised flooring, and telephone wiring but NOT the computer and peripheral equipment. This is BEST described as a: {

 

Chat WhatsApp
+971501254773