Group 9 Flashcards
Which of the following is applicable to a publicly held company concerned about information handling and storage requirement specific to the financial reporting?
A. Privacy Act of 1974
B. Clinger-Cohan Act of 1996
C. Sarbanes-Oxley (SOX) Act of 2002
D. International Organization for Standardization (ISO) 27001
Answer: C
Which of the following is used to detect steganography?
A. Audio analysis
B. Statistical analysis
C. Reverse engineering
D. Cryptanalysis
Answer: C
Which is the MOST critical aspect of computer-generated evidence?
A. Objectivity
B. Integrity
C. Timeliness
D. Relevancy
Answer: B
Which of the following media is LEAST problematic with data remanence?
A. Dynamic Random Access Memory (DRAM)
B. Electrically Erasable Programming Read-Only Memory (BPRCM)
C. Flash memory
D. Magnetic disk
Answer: A
Which open standard could l large corporation deploy for authorization services for single sign-on (SSO) use across multiple internal and external application?
A. Terminal Access Controller Access Control System (TACACS)
B. Security Assertion Markup Language (SAML)
C. Lightweight Directory Access Protocol (LDAP)
D. Active Directory Federation Services (ADFS)
Answer: B
Which of the following statements is TRUE regarding equivalence class testing?
A. Test inputs are obtained from the derived boundaries of the given functional specifications.
B. It is characterized by the stateless behavior of a process implemented in a function.
C. An entire partition can be covered by considering only one representative value from that partition.
D. It is useful for testing communications protocols and graphical user interfaces.
Answer: C
A large corporation is looking for a solution to automate access based on where the request is coming from, who the user is, what device they are connecting with, and what and time of day they are attempting this access. What type of solution would suit their needs?
A. Mandatory Access Control (MAC)
B. Network Access Control (NAC)
C. Role Based Access Control (RBAC)
D. Discretionary Access Control (DAC)
Answer: B
Which of the following techniques is MOST useful when dealing with Advanced persistent Threat (APT) intrusions on live virtualized environments?
A. Antivirus operations
B. Reverse engineering
C. Memory forensics
D. Logfile analysis
Answer: B
Which of the following MUST an organization do to effectively communicate is security strategy to all affected parties?
A. Involve representatives from each key organizational area.
B. Provide regular updates to the board of directors.
C. Notify staff of changes to the strategy.
D. Remove potential communication barriers.
Answer: C
When using Security Assertion markup language (SAML), it is assumed that the principal subject
A. accepts persistent cookies from the system.
B. allows Secure Sockets Layer (SSL) for data exchanges.
C. is on a system that supports remote authorization.
D. enrolls with at least one identity provider.
Answer: D
A client has reviewed a vulnerability assessment report and has stated it is inaccurate. The client states that the vulnerabilities listed are not valid because the host’s Operating system (OS) was not properly detected.
Where in the vulnerability assessment process did the error MOST likely occur?
A. Enumeration
B. Detection
C. Reporting
D. Discovery
Answer: A
Which of the below strategies would MOST comprehensively address the risk of malicious insiders leaking sensitive information?
A. Data Loss Protection (DIP), firewalls, data classification
B. Least privilege access, Data Loss Protection (DLP), physical access controls
C. Staff vetting, least privilege access, Data Loss Protection (DLP)
D. Background checks, data encryption, web proxies
Answer: B
What is the FIRST step required in establishing a records retention program?
A. Identify and inventory all records storage locations.
B. Classify records based on sensitivity.
C. Identify and inventory all records.
D. Draft a records retention policy.
Answer: D
Functional security testing is MOST critical during which phase of the system development life cycle (SDLC)?
A. Operations / Maintenance
B. Implementation
C. Acquisition / Development
D. Initiation
Answer: B
What is the threat modeling order using process for Attack simu-lation and threat analysis (PASTA)?
A. Application decomposition, threat analysis, vulnerability detection, attack enumeration, risk/impact analysis
B. Threat analysis, vulnerability detection, application decomposition, attack enumeration, risk/Impact analysis
C. Risk/impact analysis, application decomposition, threat analysis, vulnerability detection, attack enumeration
D. Application decomposition, threat analysis, risk/impact analysis, vulnerability detection, attack enumeration
Answer: A
Which is the RECOMMENDED configuration mode for sensors for an intrusion prevention system (IPS) if the prevention capabilities will be used?
A. Active
B. Passive
C. Inline
D. Span
Answer: C
An organization implements a remote access server (RAS), Once users connect to the server, digital certificates are used to authenticate their identity. What type of extensible Authentication protocol (EAP) would the organization use during this authentication?
A. Message Digest 5 (MD5)
B. Subscriber Identity Module (SIM)
C. Lightweight Extensible Authentication Protocol (EAP)
D. Transport layer security (TLS)
Answer: D
An analysis finds unusual activity coming from a computer that was thrown away several months prior, which of the following steps ensure the proper removal of the system?
A. Deactivation
B. Decommission
C. Deploy
D. Procure
Answer: B
As a security manger which of the following is the MOST effective practice for providing value to an organization?
A. Assess business risk and apply security resources accordingly
B. Coordinate security implementations with internal audit
C. Achieve compliance regardless of related technical issues
D. Identify confidential information and protect it
Answer: D
Rank the Hypertext Transfer protocol (HTTP) authentication types shows below in order of relative strength.
Drag the authentication type on the correct positions on the right according to strength from weakest to strongest.
Which of the following BEST provides for non-repudiation od user account actions?
A. Centralized authentication system
B. File auditing system
C. Managed Intrusion Detection System (IDS)
D. Centralized logging system
Answer: D
What type of access control determines the authorization to resource based on pre-defined job titles within an organization?
A. Role-Based Access Control (RBAC)
B. Role-based access control
C. Non-discretionary access control
D. Discretionary Access Control (DAC)
Answer: A
As users switch roles within an organization, their accounts are given additional permissions to perform the duties of their new position. After a recent audit, it was discovered that many of these accounts maintained their old permissions as well. The obsolete permissions identified by the audit have been remediated and accounts have only the appropriate permissions to complete their jobs.
Which of the following is the BEST way to prevent access privilege creep?
A. Implementing Identity and Access Management (IAM) solution
B. Time-based review and certification
C. Internet audit
D. Trigger-based review and certification
Answer: A
Continuity of operations is BEST supported by which of the following?
A. Confidentiality, availability, and reliability
B. Connectivity, reliability, and redundancy
C. Connectivity, reliability, and recovery
D. Confidentiality, integrity, and availability
Answer: B
Which of the following is true of Service Organization Control (SOC) reports?
A. SOC 1 Type 2 reports assess the security, confidentiality, integrity, and availability of an organization’s controls
B. SOC 2 Type 2 reports include information of interest to the service organization’s management
C. SOC 2 Type 2 reports assess internal controls for financial reporting
D. SOC 3 Type 2 reports assess internal controls for financial reporting
Answer: B
What testing technique enables the designer to develop mitigation strategies for potential vulnerabilities?
A. Manual inspections and reviews
B. Penetration testing
C. Threat modeling
D. Source code review
Answer: C
Asymmetric algorithms are used for which of the following when using Secure Sockets Layer/Transport Layer Security (SSL/TLS) for implementing network security?
A. Peer authentication
B. Payload data encryption
C. Session encryption
D. Hashing digest
Answer: C
What is the MOST common component of a vulnerability management framework?
A. Risk analysis
B. Patch management
C. Threat analysis
D. Backup management
Answer: B
A new Chief Information Officer (CIO) created a group to write a data retention policy based on applicable laws. Which of the following is the PRIMARY motivation for the policy?
A. To back up data that is used on a daily basis
B. To dispose of data in order to limit liability
C. To reduce costs by reducing the amount of retained data
D. To classify data according to what it contains
Answer: B
What determines the level of security of a combination lock?
A. Complexity of combination required to open the lock
B. Amount of time it takes to brute force the combination
C. The number of barrels associated with the internal mechanism
D. The hardness score of the metal lock material
Answer: A
A user downloads a file from the Internet, then applies the Secure Hash Algorithm 3 (SHA-3c?
A. It verifies the integrity of the file.
B. It checks the file for malware.
C. It ensures the entire file downloaded.
D. It encrypts the entire file.
Answer: A
Which of the following is held accountable for the risk to organizational systems and data that result from outsourcing Information Technology (IT) systems and services?
A. The acquiring organization
B. The service provider
C. The risk executive (function)
D. The IT manager
Answer: C
Which of the following is the BEST definition of Cross-Site Request Forgery (CSRF)?
A. An attack which forces an end user to execute unwanted actions on a web application in which they are currently authenticated
B. An attack that injects a script into a web page to execute a privileged command
C. An attack that makes an illegal request across security zones and thereby forges itself into the security database of the system
D. An attack that forges a false Structure Query Language (SQL) command across systems
Answer: A
Which of the following is a process in the access provisioning lifecycle that will MOST likely identify access aggregation issues?
A. Test
B. Assessment
C. Review
D. Peer review
Answer: C
Which of the following is the PRIMARY reason a sniffer operating on a network is collecting packets only from its own host?
A. An Intrusion Detection System (IDS) has dropped the packets.
B. The network is connected using switches.
C. The network is connected using hubs.
D. The network’s firewall does not allow sniffing.
Answer: A
Which of the following is the final phase of the identity and access provisioning lifecycle?
A. Recertification
B. Revocation
C. Removal
D. Validation
Answer: B
Which of the following is mobile device remote fingerprinting?
A. Installing an application to retrieve common characteristics of the device
B. Storing information about a remote device in a cookie file
C. Identifying a device based on common characteristics shared by all devices of a certain type
D. Retrieving the serial number of the mobile device
Answer: C
Which of the following trust services principles refers to the accessibility of information used by the systems, products, or services offered to a third-party provider’s customers?
A. Security
B. Privacy
C. Access
D. Availability
Answer: C
Which of the following open source software issues pose the MOST risk to an application?
A. The software is beyond end of life and the vendor is out of business.
B. The software is not used or popular in the development community.
C. The software has multiple Common Vulnerabilities and Exposures (CVE) and only some are remediated.
D. The software has multiple Common Vulnerabilities and Exposures (CVE) but the CVEs are classified as low risks.
Answer: D
Which of the following is the PRIMARY mechanism used to limit the range of objects available to a given subject within different execution domains?
A. Process isolation
B. Data hiding and abstraction
C. Use of discrete layering and Application Programming Interfaces (API)
D. Virtual Private Network (VPN)
Answer: C