Exam 4 Jan 25, 2025 | Uncategorized | 0 comments Exam 4 Questions. Enter email to receive results: 89Security and Risk Management89898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898989898998Identity and Access Management (IAM)98989898989898989890Security Architecture and Engineering9094Security OperationsPage 1 of 4Security and Risk Management 1. When designing a vulnerability test, which one of the following is likely to give the BEST indication of what components currently operate on the network?Asset registerTopology diagramsMapping tools 2. What is an advantage of Elliptic Curve Cryptography (ECC)?Cryptographic approach that does not require a fixed-length keyOpportunity to use shorter keys for the same level of securityMilitary-strength security that does not depend upon secrecy of the algorithm 3. Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) connection?Temporal Key Integrity Protocol (TKIP)Transport Layer Security (TLS)Secure Hash Algorithm (SHA) 4. Although code using a specific programming language may not be susceptible to a buffer overflow attack, what other component could still be vulnerable?The supporting virtual machineMost calls to plug-in programsMost supporting application code 5. Which of the following standards/guidelines requires an Information Security Management System (ISMS) to be defined?Payment Card Industry Data Security Standard (PCIDSS)Information Technology Infrastructure Library (ITIL)International Organization for Standardization (ISO) 27000 family 6. Which of the following provides the minimum set of privileges required to perform a job function and restricts the user to a domain with the required privileges?Access based on rulesAccess based on user's roleAccess determined by the system 7. What is the GREATEST challenge to identifying data leaks?Senior management cooperation in investigating suspicious behaviorDocumented asset classification policy and clear labeling of assetsAvailable technical tools that enable user activity monitoring 8. A database administrator is asked by management to perform changes without recording them. What is the BEST course of action?Perform the change as requested, and rely on the next audit to detect and report the situationInform the audit committee or internal audit directly using the corporate whistleblower processIgnore the request and do not perform the change 9. Which of the following is the PRIMARY benefit of implementing data-in-use controls?If the data is lost, it must be decrypted to be openedWhen the data is being viewed, it can only be printed by authorized usersIf the data is lost, it will not be accessible to unauthorized users 10. In the Software Development Life Cycle (SDLC), maintaining accurate hardware and software inventories is a critical part ofSystems integrationRisk managementChange management 11. Software code signing is used as a method of verifying what security concept?ConfidentialityIntegrityAvailability 12. Which of the following is the MAIN reason for using configuration management?To provide centralized administrationTo reduce the number of changesTo provide consistency in security controls 13. Which methodology is recommended for penetration testing to be effective in the development phase of the lifecycle process?Black-box testingWhite-box testingSoftware fuzz testing 14. What should happen when an emergency change to a system must be performed?The change must be given priority at the next meeting of the change control boardTesting and approvals must be performed quicklyThe change must be performed immediately and then submitted to the change board 15. During the risk assessment phase of the project, the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant. What is the best approach for the CISO?Recommend outsourcing PHI managementEnsure ongoing compliance monitoring and risk assessmentConduct a full security audit 16. Which of the following BEST represents the concept of least privilege?Access to an object is allowed unless it is protected by the information security policyAccess to an object is denied unless access is specifically allowedAccess to an object is only available to the owner 17. During the risk assessment phase of a project, a CISO discovered that a college within the University is collecting Protected Health Information (PHI) via an in-house application. What is the best approach for the CISO?Perform a vulnerability assessmentNotate the information and move onDocument the system as high risk 18. Which of the following is the MOST important goal of information asset valuation?Assigning a financial value to an organization’s information assetsDeveloping a consistent method of controlling access on information assetsDeveloping appropriate access control policies and guidelines 19. Which set of controls should allow an investigation if an attack is not blocked by preventive controls or detected by monitoring?Security incident response lessons learned proceduresLogging and audit trail controls to enable forensic analysisSecurity event alert triage using a SIEM system 20. A health care provider is considering Internet access for their employees and patients. Which of the following is the organization's MOST secure solution for protection of data?Trusted server certificates and passphrasesUser ID and passwordPublic Key Infrastructure (PKI) and digital signatures 21. In configuration management, what baseline configuration information MUST be maintained for each computer system?Operating system and version, patch level, applications running, and versionsList of system changes, test reports, and change approvalsLast vulnerability assessment report and initial risk assessment report 22. While investigating a malicious event, only six days of audit logs from the last month were available. What policy should be updated to address this problem?RetentionReportingRecovery 23. Are companies legally required to report all data breaches?No, different jurisdictions have different rulesNo, not if the data is encryptedNo, companies' codes of ethics don't require it 24. An application developer is deciding on the amount of idle session time that the application allows before a timeout. The BEST reason for determining the session timeout requirement isindustry laws and regulationsindustry best practicesorganization policy 25. What is the MOST efficient way to secure a production program and its data?Disable unused services and implement tunnelingHarden the application and encrypt the dataDisable default accounts and implement access control lists (ACL) 26. Which of the following is MOST important when deploying digital certificates?Establish a certificate life cycle management frameworkValidate compliance with X.509 digital certificate standardsUse a third-party Certificate Authority (CA) 27. Which of the following is the PRIMARY reason for employing physical security personnel at entry points in facilities where card access is in operation?To verify that only employees have access to the facilityTo provide a safe environment for employeesTo identify present hazards requiring remediation 28. The PRIMARY security concern for handheld devices is thestrength of the encryption algorithmspread of malware during synchronizationability to bypass the authentication mechanism 29. When evaluating third-party applications, which of the following is the GREATEST responsibility of Information Security?Report findings to the business to determine security gapsQuantify the risk to the business for product selectionAccept the risk on behalf of the organization 30. In order for a security policy to be effective within an organization, it MUST includeStrong statements that clearly define the problemA list of all standards that apply to the policyDisciplinary measures for non-compliance 31. Single Sign-On (SSO) is PRIMARILY designed to address which of the following?Availability and AccountabilityConfidentiality and IntegrityAccountability and Assurance 32. What does the Maximum Tolerable Downtime (MTD) determine?The fixed length of time a company can endure a disaster without any Disaster Recovery (DR) planningThe estimated period of time a business can remain interrupted beyond which it risks never recoveringThe estimated period of time a business-critical database can remain down before customers are affected 33. Which Web Services Security (WS-Security) specification maintains a single authenticated identity across multiple dissimilar environments?WS-TrustWS-FederationWS-Policy 34. Which of the following methods can be used to achieve confidentiality and integrity for data in transit?Multiprotocol Label Switching (MPLS)Internet Protocol Security (IPSec)Federated identity management 35. Which of the following BEST describes the purpose of the security functional requirements of Common Criteria?Level of assurance of the TOE in the intended operational environmentSecurity behavior expected of a Target of Evaluation (TOE)Selection to meet the security objectives stated in test documents 36. After a thorough analysis, it was discovered that a perpetrator compromised a network by gaining access to the network through an SSL VPN gateway. The perpetrator guessed a username and brute-forced the password to gain access. Which of the following BEST mitigates this issue?Use two-factor authentication mechanismsIntegrate the VPN with centralized credential storesImplement strong passwords authentication for VPN 37. Which of the following controls is the FIRST step in protecting privacy in an information system?Role-based access controlData RedactionEncryption 38. What is the first step in protecting privacy in an information system?Data MinimizationData RedactionData Encryption 39. What is the difference between media marking and media labeling?Media marking refers to the use of human-readable security attributes, while media labeling refers to security attributes in internal data structuresMedia labeling refers to the use of human-readable security attributes, while media marking refers to the use of security attributes in internal data structuresMedia labeling refers to security attributes required by public policy/law, while media marking refers to security required by internal organizational policy 40. Which of the following entities is ultimately accountable for data remanence vulnerabilities with data replicated by a cloud service provider?Data ownerData stewardData custodian 41. Which of the following are effective countermeasures against passive network-layer attacks?Encryption and security-enabled applicationsTrusted software development and run-time integrity controlsFederated security and authenticated access controls 42. What is the MOST important element when considering the effectiveness of a training program for Business Continuity (BC) and Disaster Recovery (DR)?Technology used for deliveryConsideration of organizational needManagement support 43. An employee of a retail company has been granted an extended leave of absence by Human Resources (HR). What is the BEST action to take?Block user access and delete user account after six monthsRevoke access temporarilyBlock access to the offices immediately 44. Which of the following is an essential step before performing Structured Query Language (SQL) penetration tests on a production system?Verify countermeasures have been deactivatedEnsure firewall logging has been activatedValidate target systems have been backed up 45. How does Encapsulating Security Payload (ESP) in transport mode affect the Internet Protocol (IP)?Authenticates the IP payload and selected portions of the IP headerEncrypts and optionally authenticates the IP payload, but not the IP headerEncrypts and optionally authenticates the IP header, but not the IP payload 46. Determining outage costs caused by a disaster can BEST be measured by thecost of redundant systems and backupscost to recover from an outageoverall long-term impact of the outage 47. What is one way to mitigate the risk of security flaws in custom software?Purchase only Commercial Off-The-Shelf (COTS) productsInclude security language in the Earned Value Management (EVM) contractInclude security assurance clauses in the Service Level Agreement (SLA) 48. Which of the following is the PRIMARY reason to perform regular vulnerability scanning of an organization's network?Remediate known vulnerabilitiesProvide vulnerability reports to managementValidate vulnerability remediation activities 49. Which of the following is a document that identifies each item seized in an investigation, including date and time seized, full name and signature or initials of the person who seized the item, and a detailed description of the item?Property bookChain of custody formSearch warrant return 50. What is the PRIMARY goal for using Domain Name System Security Extensions (DNSSEC) to sign records?ConfidentialityIntegrityAccountability 51. An organization has hired a security services firm to conduct a penetration test. Which of the following will the organization provide to the tester?Physical location of server room and wiring closetLimits and scope of the testingLogical location of filters and concentrators 52. Regarding asset security and appropriate retention, which of the following INITIAL top three areas are important to focus on?Security control baselines, access controls, employee awareness and trainingHuman resources, asset management, production managementSupply chain lead-time, inventory control, and encryption 53. Which type of security testing is being performed when an ethical hacker has no knowledge about the target system but the testing target is notified before the test?BlindGray boxReversal 54. Between which pair of Open System Interconnection (OSI) Reference Model layers are routers used as a communications device?Network and SessionTransport and SessionData-Link and Transport 55. Which of the following BEST describes the purpose of performing security certification?To formalize the confirmation of compliance to security policies and standardsTo identify system threats, vulnerabilities, and acceptable level of riskTo formalize the confirmation of completed risk mitigation and risk analysis 56. For network-based evidence, which of the following contains traffic details of all network sessions to detect anomalies?Content dataAlert dataUser data 57. In order to assure authenticity, which of the following are required?Authentication and non-repudiationConfidentiality and authenticationConfidentiality and integrity 58. Which of the following command line tools can be used in the reconnaissance phase of a network vulnerability assessment?ipconfigifconfigdig 59. A network scan found 50% of the systems with one or more critical vulnerabilities. Which of the following represents the BEST action?Assess vulnerability risk and program effectivenessDisconnect all systems with critical vulnerabilitiesAssess vulnerability risk and business impact 60. Which of the following BEST describes a Protection Profile (PP)?A document that expresses an implementation-dependent set of security requirements which contains only the security functional requirementsA document that is used to develop an IT security product from its security requirements definitionA document that expresses an implementation-independent set of security requirements for an IT product that meets specific consumer needs 61. How does an organization verify that an information system's current hardware and software match the standard system configuration?By running vulnerability scanning tools on all devices in the environmentBy comparing the actual configuration of the system against the baselineBy reviewing the configuration after the system goes into production 62. A software security engineer is developing a black box-based test plan that will measure the system's reaction to incorrect or illegal inputs or unexpected operational errors and situations. Which type of testing is the engineer primarily performing?Fuzz testingBoundary testingNegative testing 63. When assessing an application’s potential security risks, what is the PRIMARY purpose of threat modeling?To detect security vulnerabilities during the testing phaseTo identify, prioritize, and mitigate potential security threats before they impact the applicationTo measure application performance under stress conditions 64. Which of the following activities BEST identifies operational problems, security misconfigurations, and malicious attacks?Authentication validationPeriodic log reviewsPolicy documentation review 65. Which of the following is an advantage of on-premise Credential Management Systems?Improved credential interoperabilityLower infrastructure capital costsControl over system configuration 66. As a best practice, the Security Assessment Report (SAR) should include which of the following sections?Remediation recommendationsData classification policySoftware and hardware inventory 67. Which of the following security engineering practices involves determining the structure and behavior of a system to meet its security requirements?Security ArchitectureSecurity DesignSecurity Testing 68. Which of the following BEST avoids data remanence disclosure for cloud-hosted resources?Strong encryption and deletion of the keys after data is deletedStrong encryption and deletion of the virtual host after data is deletedSoftware-based encryption with two-factor authentication 69. Which one of the following is a common risk with network configuration management?It is the responsibility of the systems administratorPatches on the network are difficult to keep currentNetwork diagrams are not up to date 70. Which activity BEST identifies operational problems, security misconfigurations, and malicious attacks?Interface testingAuthentication validationPeriodic log reviews 71. Which of the following practices BEST enhances cloud data privacy for customers?Data encryption before storage on cloud serversImplementing a strong password policyUsing multiple cloud providers for redundancy 72. If an identification process using a biometric system detects a 100% match between a presented template and a stored template, what is the interpretation of this result?Suspected tamperingUser errorAccurate identification 73. Which of the following is a strategy of grouping requirements in developing a Security Test and Evaluation (ST&E)?Management, operational, and technicalDocumentation, observation, and manualTactical, strategic, and financial 74. In the Open System Interconnection (OSI) model, which layer is responsible for the transmission of binary data over a communications network?Physical LayerData-Link LayerApplication Layer 75. Changes to a Trusted Computing Base (TCB) system that could impact the security posture of that system and trigger a recertification activity are documented in theroutine self-assessmentsecurity impact analysisstructured code review 76. A proxy firewall operates at what layer of the Open System Interconnection (OSI) model?ApplicationTransportData link 77. Disaster Recovery Plan (DRP) training material should bestored in a fireproof safe to ensure availability when neededconsistent so that all audiences receive the same trainingonly delivered in paper format 78. A company has decided that they need to begin maintaining assets deployed in the enterprise. What approach should be followed to determine and maintain ownership information to bring the company into compliance?Asset ownership database using domain login recordsAsset baseline using commercial off-the-shelf softwareEnterprise asset management framework 79. Which of the following types of security testing is the MOST effective in providing a better indication of the everyday security challenges of an organization when performing a security risk assessment?InternalOvertExternal 80. The application of a security patch to a product previously validated at Common Criteria (CC) Evaluation Assurance Level (EAL) 4 wouldrequire recertificationretain its current EAL ratingrequire an update of the Protection Profile (PP) 81. In which identity management process is the subject’s identity established?TrustProvisioningEnrollment 82. Which Web Services Security (WS-Security) specification negotiates how security tokens will be issued, renewed, and validated?WS-TrustWS-FederationWS-Security 83. Which of the following would BEST describe the role directly responsible for data within an organization?Data custodianDatabase administratorInformation owner 84. Which of the following is the MOST likely cause of a non-malicious data breach when the source of the data breach was an unmarked file cabinet containing sensitive documents?Ineffective identity management controlsLack of data access controlsIneffective data classification 85. Which of the following is the PRIMARY concern when using an Internet browser to access a cloud-based service?Vulnerabilities within protocols that can expose confidential dataInsecure implementation of Application Programming Interfaces (API)Improper use and storage of management keys 86. What is the PRIMARY difference between security policies and security procedures?Policies are generic in nature, and procedures contain operational detailsPolicies are used to enforce violations, and procedures create penaltiesPolicies point to guidelines, and procedures are more contractual in nature 87. A security professional is asked to provide a solution that restricts a bank teller to only perform a savings deposit transaction but allows a supervisor to perform corrections after the transaction. Which of the following is the MOST effective solution?Access is based on rulesAccess is determined by the systemAccess is based on user's role 88. Which of the following is the BEST method to reduce the effectiveness of phishing attacks?User awarenessAnti-phishing softwareTwo-factor authentication 89. Which technology is a prerequisite for populating the cloud-based directory in a federated identity solution?Synchronization toolNotification toolMessage queuing tool 90. Which security approach will BEST minimize Personally Identifiable Information (PII) loss from a data breach?A strong breach notification processEnd-to-end data encryption for data in transitLimited collection of individuals' confidential data 91. What is the BEST way to encrypt web application communications?Secure Hash Algorithm 1 (SHA-1)Transport Layer Security (TLS)Secure Sockets Layer (SSL) 92. A security professional is asked to provide a solution that restricts a bank teller to only perform a savings deposit transaction but allows a supervisor to perform corrections after the transaction. Which of the following is the MOST effective solution?Access is determined by the systemAccess is based on user's roleAccess is based on rules 93. Which of the following is the BEST method to reduce the effectiveness of phishing attacks?User awarenessTwo-factor authenticationAnti-phishing software 94. Which technology is a prerequisite for populating the cloud-based directory in a federated identity solution?Synchronization toolNotification toolMessage queuing tool 95. Which security approach will BEST minimize Personally Identifiable Information (PII) loss from a data breach?A strong breach notification processLimited collection of individuals' confidential dataEnd-to-end data encryption for data in transit 96. What is the BEST way to encrypt web application communications?Secure Sockets Layer (SSL)Transport Layer Security (TLS)Secure Hash Algorithm 1 (SHA-1) 97. Which of the following is a weakness of Wired Equivalent Privacy (WEP)?Length of Initialization Vector (IV)Detection of message tamperingProtection against message replay 98. In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?Developers checking out source code without approvalModifying source code without approvalPromoting programs to production without approval 99. At a MINIMUM, audits of permissions to individual or group accounts should be scheduledannuallyto correspond with staff promotionscontinually 100. What does electronic vaulting accomplish?It stripes all database recordsIt ensures the fault tolerance of Redundant Array of Independent Disks (RAID) systemsIt protects critical files 101. Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?Appending non-watermarked data to watermarked dataTruncating parts of the dataApplying Access Control Lists (ACL) to the data 102. Who would be the BEST person to approve an organization's information security policy?Chief internal auditorChief Information Officer (CIO)Chief Information Security Officer (CISO) 103. Which of the following is a common feature of an Identity as a Service (IDaaS) solution?Single Sign-On (SSO) authentication supportPrivileged user authentication supportRole-Based Access Control (RBAC) 104. A security practitioner is tasked with securing the organization’s Wireless Access Points (WAP). Which of these is the MOST effective way of restricting this environment to authorized users?Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access pointDisable the broadcast of the Service Set Identifier (SSID) nameChange the name of the Service Set Identifier (SSID) to a random value not associated with the organization 105. A security compliance manager of a large enterprise wants to reduce the time it takes to perform network, system, and application security compliance audits while increasing quality and effectiveness of the results. What should be implemented to BEST achieve the desired results?Configuration Management Plan (CMP)Source code repositoryConfiguration Management Database (CMDB) 106. Within the company, desktop clients receive Internet Protocol (IP) addresses over Dynamic Host Configuration Protocol (DHCP). Which of the following represents a valid measure to help protect the network against unauthorized access?Implement path managementImplement port-based security through 802.1xImplement DHCP to assign IP addresses to server systems 107. After following the processes defined within the change management plan, a super user has upgraded a device within an Information system. What step would be taken to ensure that the upgrade did NOT affect the network security posture?Conduct a security impact analysisReview the results of the most recent vulnerability scanConduct an Assessment and Authorization (A&A) 108. Which of the following is a benefit in implementing an enterprise Identity and Access Management (IAM) solution?Risk associated with orphan accounts is reducedPassword requirements are simplifiedSegregation of duties is automatically enforced 109. An international medical organization with headquarters in the United States (US) and branches in France wants to test a drug in both countries. What is the organization allowed to do with the test subject’s data?Process it in the US, but store the information in FranceAnonymize it and process it in the USAggregate it into one database in the US 110. Which of the following is a direct monetary cost of a security incident?MoraleEquipmentReputation 111. Which of the following alarm systems is recommended to detect intrusions through windows in a high-noise, occupied environment?Motion sensorShock sensorAcoustic sensor 112. What is the BEST reason for the organization to pursue a plan to mitigate client-based attacks?Client hardening and management is easier on clients than on serversClient-based attacks are more common and easier to exploit than server and network-based attacksClient privilege administration is inherently weaker than server privilege administration Page 2 of 4Identity and Access Management (IAM) 113. Which of the following is generally indicative of a replay attack when dealing with biometric authentication?False Rejection Rate (FRR) is greater than 5 in 100Exact matchFalse Acceptance Rate (FAR) is greater than 1 in 100,000 114. As part of the authentication process in OAuth 2.0, which of the following must the end user provide?A usernameAn access tokenA username and password 115. A security architect references a Mandatory Access Control (MAC) model for implementation. Which property is prioritized?ConfidentialityAvailabilityIntegrity 116. Which of the following is BEST suited for exchanging authentication and authorization messages in a multi-party decentralized environment?Security Assertion Markup Language (SAML)Lightweight Directory Access Protocol (LDAP)Internet Mail Access Protocol 117. During a fingerprint verification process, which of the following is used to verify identity and authentication?A pressure value is compared with a stored templateSets of digits are matched with stored valuesA template of minutiae is compared with a stored template 118. What is the most suitable approach that the administrator should take when a user requests read-only access to files that are not considered sensitive in a Discretionary Access Control (DAC) system?Request manager approval for the user accessRequest data owner approval to grant the user accessDirectly grant access to the non-sensitive files 119. Which of the following is the BIGGEST weakness when using native Lightweight Directory Access Protocol (LDAP) for authentication?Passwords are passed in clear textAuthorizations are not included in the server responseUnsalted hashes are passed over the network 120. Which of the following is a remote access protocol that uses a static authentication?Routing Information Protocol (RIP)Point-to-Point Tunneling Protocol (PPTP)Password Authentication Protocol (PAP) 121. Discretionary Access Control (DAC) restricts access according toauthorizations granted to the userdata classification labelingpage views within an application 122. For an organization considering two-factor authentication for secure network access, which of the following is MOST secure?Smart card and biometricsDigital certificates and Single Sign-On (SSO)Challenge response and private key Page 3 of 4Security Architecture and Engineering 123. Secure Sockets Layer (SSL) encryption protectsdata at restthe source IP addressdata transmitted 124. Which of the following is a recommended alternative to an integrated email encryption system?Encrypt sensitive data separately in attachmentsSend sensitive data in separate emailsSign emails containing sensitive data Page 4 of 4Security Operations 125. An IT professional attends a cybersecurity seminar on current incident response methodologies. What code of ethics canon is being observed?Advance and protect the professionProtect society, the commonwealth, and the infrastructureProvide diligent and competent service to principals Loading... Submit a Comment Cancel replyYour email address will not be published. Required fields are marked *Comment * Name * Email * Website Save my name, email, and website in this browser for the next time I comment. Δ