Exam 5 Questions.

  • General Security Principles
  • Security and Risk Management
  • Security Assessment and Testing
  • Security Operations
  • Identity and Access Management (IAM)
  • Communication and Network Security
  • Asset Security
  • Security Architecture and Engineering
  • Software Development Security

Page 1 of 9

General Security Principles

1. Which of the following is a weakness of Wired Equivalent Privacy (WEP)?{
2. Even though a particular digital watermark is difficult to detect, which of the following represents a way it might still be inadvertently removed?{
3. Which of the following alarm systems is recommended to detect intrusions through windows in a high-noise, occupied environment?{
4. Who has the PRIMARY responsibility to ensure that security objectives are aligned with organization goals?{
5. Which of the following mechanisms will BEST prevent a Cross-Site Request Forgery (CSRF) attack?{
6. Which of the BEST internationally recognized standard for evaluating security products and systems?{
7. An organization has discovered that users are visiting unauthorized websites using anonymous proxies. Which of the following is the BEST way to prevent future occurrences?{
8. Which of the following is the MOST common method of memory protection?{
9. Which of the following would MINIMIZE the ability of an attacker to exploit a buffer overflow?{
10. Who is responsible for the protection of information when it is shared with or provided to other organizations?{
11. Which of the following techniques is known to be effective in spotting resource exhaustion problems, especially with resources such as processes, memory, and connections?{
12. What does a Synchronous (SYN) flood attack do?{
13. Which of the following is a responsibility of the information owner?{
14. Which of the following is a responsibility of the information owner?{
15. Which of the following steps should be performed FIRST when purchasing Commercial Off-The-Shelf (COTS) software?{
16. What is the PRIMARY goal of fault tolerance?{
17. Attack trees are MOST useful for which of the following?{
18. What is the PRIMARY goal of fault tolerance?{
19. Attack trees are MOST useful for which of the following?{
20. Which of the following are important criteria when designing procedures and acceptance criteria for acquired software?{
21. Which of the following is the MOST challenging issue in apprehending cyber criminals?{
22. A user has infected a computer with malware by connecting a Universal Serial Bus (USB) storage device. Which of the following is MOST effective to mitigate future infections?{
23. When developing a business case for updating a security program, the security program owner MUST do which of the following?{
24. Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?{
25. Which of the following combinations would MOST negatively affect availability?{

 

Chat WhatsApp
+971501254773