Group 10 Flashcards
Which of the following management processes allots ONLY those services required for users to accomplish their tasks, change default user passwords, and set servers to retrieve antivirus updates?
A. Compliance
B. Configuration
C. Identity
D. Patch
Answer: B
Which of the following practices provides the development team with a definition of security and identification of threats in designing software?
A. Penetration testing
B. Stakeholder review
C. Threat modeling
D. Requirements review
Answer: C
Which of the following is a peor entity authentication method for Point-to-Point Protocol (PPP)?
A. Challenge Handshake Authentication Protocol (CHAP)
B. Message Authentication Code (MAC)
C. Transport Layer Security (TLS) handshake protocol
D. Challenge-response authentication mechanism
Answer: A
What form of attack could this represent?
A. A Denial of Service (DoS) attack against the gateway router because the router can no longer accept packets from
B. A transport layer attack that prevents the resolution of 10.102.10.6 address
C. A Denial of Service (DoS) attack against 10.102.10.2 because it cannot respond correctly to ARP requests
D. A masquerading attack that sends packets intended for 10.102.10.6 to 10.102.10.2
Answer: D
Which of the following value comparisons MOST accurately reflects the agile development approach?
A. Processes and toots over individuals and interactions
B. Contract negotiation over customer collaboration
C. Following a plan over responding to change
D. Working software over comprehensive documentation
Answer: D
Which of the following needs to be included in order for High Availability (HA) to continue operations during planned system outages?
A. Redundant hardware, disk spanning, and patching
B. Load balancing, power reserves, and disk spanning
C. Backups, clustering, and power reserves
D. Clustering, load balancing, and fault-tolerant options
Answer: D
Which of the following is the MOST effective countermeasure against Man-in-the Middle (MITM) attacks while using online banking?
A. Transport Layer Security (TLS)
B. Secure Sockets Layer (SSL)
C. Pretty Good Privacy (PGP)
D. Secure Shell (SSH)
Answer: A
According to the Capability Maturity Model Integration (CMMI), which of the following levels is identified by a managed process that is tailored from the organization’s set of standard processes according to the organization’s tailoring guidelines?
A. Level 0: Incomplete
B. Level 1: Performed
C. Level 2: Managed
D. Level 3: Defined
Answer: D
Point-to-Point Protocol (PPP) was designed to specifically address what issue?
A. A common design flaw in telephone modems
B. Speed and reliability issues between dial-up users and Internet Service Providers (ISP).
C. Compatibility issues with personal computers and web browsers
D. The security of dial-up connections to remote networks
Answer: B
Which of the following is an advantage of’ Secure Shell (SSH)?
A. It operates at the network layer.
B. It encrypts transmitted User ID and passwords.
C. It uses challenge-response to authenticate each party.
D. It uses the International Data Encryption Algorithm (IDEA) for data privacy.
Answer: C
A security engineer is designing a Customer Relationship Management (CRM) application for a third- party vendor. In which phase of the System Development Life Cycle (SDLC) will it be MOST beneficial to conduct a data sensitivity assessment?
A. Development / Acquisition
B. Initiation
C. Enumeration
D. Operation / Maintenance
Answer: B
Which of the following is a PRIMARY challenge when running a penetration test?
A. Determining the cost
B. Establishing a business case
C. Remediating found vulnerabilities
D. Determining the depth of coverage
Answer: D
Which one of the following would cause an immediate review and possible change to the security policies of an organization?
A. Change in technology
B. Change in senior management
C. Change to organization processes
D. Change to organization goals
Answer: D
An audit of an application reveals that the current configuration does not match the configuration of the originally implemented application. Which of the following is the FIRST action to be taken?
A. Recommend an update to the change control process.
B. Verify the approval of the configuration change.
C. Roll back the application to the original configuration.
D. Document the changes to the configuration.
Answer: B
What is the BEST method if an investigator wishes to analyze a hard drive which may be used as evidence?
A. Leave the hard drive in place and use only verified and authenticated Operating Systems (OS) utilities …
B. Log into the system and immediately make a copy of all relevant files to a Write Once, Read Many
…
C. Remove the hard drive from the system and make a copy of the hard drive’s contents using imaging hardware.
D. Use a separate bootable device to make a copy of the hard drive before booting the system and analyzing the hard drive.
Answer: C
Which of the following provides the GREATEST level of data security for a Virtual Private Network (VPN) connection?
A. Internet Protocol Payload Compression (IPComp)
B. Internet Protocol Security (IPSec)
C. Extensible Authentication Protocol (EAP)
D. Remote Authentication Dial-In User Service (RADIUS)
Answer: B
A. The signer verifies that the software being loaded is the software originated by the signer.
B. The vendor certifies the software being loaded is free of malicious code and that it was originated by the signer.
C. The signer verifies that the software being loaded is free of malicious code.
D. Both vendor and the signer certify the software being loaded is free of malicious code and it was originated by the signer.
Answer: A
What is the PRIMARY objective for conducting an internal security audit?
A. Verify that all systems and Standard Operating Procedures (SOP) are properly documented.
B. Verify that all personnel supporting a system are knowledgeable of their responsibilities.
C. Verify that security controls are established following best practices.
D. Verify that applicable security controls are implemented and effective.
Answer: D
What is the PRIMARY purpose for an organization to conduct a security audit?
A. To ensure the organization is adhering to a well-defined standard
B. To ensure the organization is applying security controls to mitigate identified risks
C. To ensure the organization is configuring information systems efficiently
D. To ensure the organization is documenting findings
Answer: A
Which testing method requires very limited or no information about the network infrastructure?
A. While box
B. Static
C. Black box
D. Stress
Answer: C
Which of the following is a MAJOR concern when there is a need to preserve or retain information for future retrieval?
A. Laws and regulations may change in the interim, making it unnecessary to retain the information.
B. The expense of retaining the information could become untenable for the organization.
C. The organization may lose track of the information and not dispose of it securely.
D. The technology needed to retrieve the information may not be available in the future.
Answer: C
Which of the following types of data would be MOST difficult to detect by a forensic examiner?
A. Slack space data
B. Steganographic data
C. File system deleted data
D. Data stored with a different file type extension
Answer: C
Following a penetration test, what should an organization do FIRST?
A. Review all security policies and procedures.
B. Ensure staff is trained in security.
C. Determine if you need to conduct a full security assessment.
D. Evaluate the problems identified in the test result.
Answer: D
An Intrusion Detection System (IDS) is based on the general hypothesis that a security violation is associated with a pattern of system usage which can be
A. differentiated from a normal usage pattern.
B. used to detect known violations.
C. used to detect a masquerader.
D. differentiated to detect all security violations.
Answer: A
Which of the following models uses unique groups contained in unique conflict classes?
A. Chinese Wall
B. Bell-LaPadula
C. Clark-Wilson
D. Biba
Answer: C
When developing the entitlement review process, which of the following roles is responsible for determining who has a need for the information?
A. Data Custodian
B. Data Owner
C. Database Administrator
D. Information Technology (IT) Director
Answer: B
What should an auditor do when conducting a periodic audit on media retention?
A. Check electronic storage media to ensure records are not retained past their destruction date.
B. Ensure authorized personnel are in possession of paper copies containing Personally Identifiable Information….
C. Check that hard disks containing backup data that are still within a retention cycle are being destroyed….
D. Ensure that data shared with outside organizations is no longer on a retention schedule.
Answer: A
Which of the following factors is á PRIMARY reason to drive changes in an Information Security Continuous Monitoring (ISCM) strategy?
A. Testing and Evaluation (TE) personnel changes
B. Changes to core missions or business processes
C. Increased Cross-Site Request Forgery (CSRF) attacks
D. Changes in Service Organization Control (SOC) 2 reporting requirements
Answer: B
Digital non-repudiation requires which of the following?
A. A trusted third-party
B. Appropriate corporate policies
C. Symmetric encryption
D. Multifunction access cards
Answer: A
Data remanence is the biggest threat in which of the following scenarios?
A. A physical disk drive has been overwritten and reused within a datacenter.
B. A physical disk drive has been degaussed, verified, and released to a third party for dest…….
C. A flash drive has been overwritten, verified, and reused within a datacenter.
D. A flash drive has been overwritten and released to a third party for destruction.
Answer: D
Which of the following is the MOST secure password technique?
A. Passphrase
B. One-time password
C. Cognitive password
D. dphertext
Answer: A
Which of the following is a Key Performance Indicator (KPI) for a security training and awareness program?
A. The number of security audits performed
B. The number of attendees at security training events
C. The number of security training materials created
D. The number of security controls implemented
Answer: B
When are security requirements the LEAST expensive to implement?
A. When identified by external consultants
B. During the application rollout phase
C. During each phase of the project cycle
D. When built into application design
Answer: D
What type of attack sends Internet Control Message Protocol (ICMP) echo requests to the target machine with a larger payload than the target can handle?
A. Man-in-the-Middle (MITM)
B. Denial of Service (DoS)
C. Domain Name Server (DNS) poisoning
D. Buffer overflow
Answer: B
What is the HIGHEST priority in agile development?
A. Selecting appropriate coding language
B. Managing costs of product delivery
C. Early and continuous delivery of software
D. Maximizing the amount of code delivered
Answer: C
Which of the following is included in the Global System for Mobile Communications (GSM) security framework?
A. Public-Key Infrastructure (PKI)
B. Symmetric key cryptography
C. Digital signatures
D. Biometric authentication
Answer: C
Which of the following is the reason that transposition ciphers are easily recognizable?
A. Key
B. Block
C. Stream
D. Character
Answer: B
How is it possible to extract private keys securely stored on a cryptographic smartcard?
A. Bluebugging
B. Focused ion-beam
C. Bluejacking
D. Power analysis
Answer: D
Which of the following is an important requirement when designing a secure remote access system?
A. Configure a Demilitarized Zone (DMZ) to ensure that user and service traffic is separated.
B. Provide privileged access rights to computer files and systems.
C. Ensure that logging and audit controls are included.
D. Reduce administrative overhead through password self service.
Answer: C
Which of the following is the BEST way to mitigate circumvention of access controls?
A. Multi-layer access controls working in isolation
B. Multi-vendor approach to technology implementation
C. Multi-layer firewall architecture with Internet Protocol (IP) filtering enabled
D. Multi-layer access controls with diversification of technologies
Answer: D