SEC - Jas - U Flashcards
(540 cards)
Question 1:
While analyzing network traffic at Dion Training Solutions, Carlos, a security analyst, discovered a specific workstation repeatedly sending HTTPS requests to unfamiliar IP addresses. These requests contained encoded data that matched sensitive company information. Carlos also noted the workstation downloading unknown executables from various domains. Which of the following terms BEST describes the primary malicious activity of extracting sensitive information that Carlos detected?
Malware Propagation
Data Exfiltration
C2 Communication
Network Reconnaissance
Malware Propagation
Correct answer
Data Exfiltration
Your answer is incorrect
C2 Communication
Network Reconnaissance
Overall explanation
OBJ 2.4 - Data exfiltration is the unauthorized transfer of sensitive data to an external source, which is the primary activity Carlos detected, as encoded company information was being sent to unfamiliar IP addresses. While Command and Control (C2) communication could be involved, it primarily serves to control compromised systems rather than exfiltrate data, making data exfiltration the more appropriate term. Although malware propagation is possible due to the unknown executables being downloaded, the focus is not on spreading malware but on the data transfer. Network reconnaissance, which involves gathering network information, does not fit since the activity observed relates to data extraction rather than network scanning.
For support or reporting issues, include Question ID: 67212af884b5580af615eca1 in your ticket. Thank you.
Domain
2.0 - Threats, Vulnerabilities, and Mitigations
Question 2:
Which of the following terms refers to the ability to obtain and apply security updates or fixes for software or systems?
Responsiveness
Inability to patch
Patch availability
Risk transference
Responsiveness
Inability to patch
Correct answer
Patch availability
Your answer is incorrect
Risk transference
Overall explanation
OBJ: 3.1 - Patch availability refers to the ability to obtain and apply security updates or fixes for software or systems, which is an important aspect of maintaining security and functionality. Some factors that can affect patch availability are vendor support, compatibility, and testing. Inability to patch refers to a situation where software or systems cannot be updated or fixed due to technical or operational reasons, such as legacy systems, custom applications, or regulatory constraints. It does not refer to the ability to obtain and apply security updates or fixes. Responsiveness refers to the speed at which a system or service responds to user requests or inputs. It does not refer to the ability to obtain and apply security updates or fixes. Risk transference refers to a situation where an organization transfers some of its risks or responsibilities to a third-party provider, such as a cloud service provider or an insurance company, as a way of mitigating potential losses or liabilities. It does not refer to the ability to obtain and apply security updates or fixes.
For support or reporting issues, include Question ID: 64bf7ba4cb1c7a74be71f9da in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 3:
Jason receives an email at his Kelly Innovations LLC account. The email seems to be from Reed, a coworker, and states that Reed urgently needs to see the invoice for a recent project. However, Reed specifies he needs it within the next 10 minutes as he is in a meeting with Sasha and top executives. Jason quickly sends over the invoice without double-checking with Reed. Which type of attack best describes this situation?
Brute-force attack
Cloning
Whaling
Pretexting
Brute-force attack
Cloning
Your answer is incorrect
Whaling
Correct answer
Pretexting
Overall explanation
OBJ: 2.2 - Pretexting involves creating a fabricated scenario, such as the described urgent meeting, to deceive the target into providing desired information or performing an action. The use of urgency and reference to known colleagues adds weight to the pretext, pressuring Jason into quick compliance. A brute-force attack involves attempting all possible combinations of passwords or encryption keys until the correct one is found. This scenario doesn’t involve this kind of attack method at all. Whaling is a type of phishing attack that specifically targets high-profile employees, like executives or CEOs, to steal sensitive information. While this attack is personalized, it usually targets top executives, and not general employees like Jason. The scenario doesn’t specifically mention Jason’s rank or position, so whaling is not the most appropriate description. Cloning refers to the duplication of items such as badges, access cards, or even digital identities. It’s about copying something authentic to gain unauthorized access, rather than fabricating a scenario.
For support or reporting issues, include Question ID: 652632586f507d8e8ff089a7 in your ticket. Thank you.
Domain
2.0 - Threats, Vulnerabilities, and Mitigations
Question 4:
What term refers to an organization’s predetermined level of acceptable risk exposure?
Risk appetite
Risk tolerance
Conservative
Exposure factor
Risk appetite
Correct answer
Risk tolerance
Conservative
Your answer is incorrect
Exposure factor
Overall explanation
OBJ: 5.2 - Risk tolerance refers to an organization’s predetermined level of acceptable risk exposure. It represents the extent to which an organization is willing to tolerate potential risks before taking action to mitigate or avoid them. While similar to risk tolerance, risk appetite refers to the amount of risk an organization is willing to take on to achieve its strategic objectives. It represents the organization’s overall attitude toward risk-taking. The term “conservative” is not directly related to risk management. In financial contexts, it may refer to a risk-averse approach or cautious decision-making. The exposure factor is a calculation that determines the amount of value that is lost if an event takes place. It doesn’t measure an organization’s level of acceptable risk exposure.
For support or reporting issues, include Question ID: 64b9f2283f9a38782a01fe5c in your ticket. Thank you.
Domain
5.0 - Security Program Management and Oversight
Question 5:
Which of the following terms refers to a major program executed by powerful entities to shift public opinion?
Digital diplomacy
Influence campaign
Digital espionage
Soft power
Digital diplomacy
Correct answer
Influence campaign
Digital espionage
Your answer is incorrect
Soft power
Overall explanation
OBJ: 2.2 - An influence campaign is a significant initiative launched by entities like nation-states to sway public opinion on specific topics, often utilizing various techniques including disinformation. Digital diplomacy involves the use of digital tools and platforms for diplomatic interactions and doesn’t necessarily involve shifting public opinion through campaigns. Digital espionage refers to cyber-related spying activities, which doesn’t directly relate to influencing public opinion. Soft power pertains to the use of diplomatic and cultural assets by a country to influence another country, but it doesn’t specifically mean a program to change public opinion.
For support or reporting issues, include Question ID: 64b9bd941161c30c45283e41 in your ticket. Thank you.
Domain
2.0 - Threats, Vulnerabilities, and Mitigations
Question 6:
Which of the following attackers is MOST likely driven by a desire to expose unethical practices within a corporation, even if it means acting in an unethical way themselves?
Hacktivist
Organized crime
State-sponsored actor
White hat hacker
Correct answer
Hacktivist
Organized crime
State-sponsored actor
Your answer is incorrect
White hat hacker
Overall explanation
OBJ: 2.1 - Driven by strong political, social, or ethical beliefs, hacktivists break into systems to spotlight perceived injustices or unethical behaviors. Organized crime actors engage in cyber-criminal activities for monetary gains, like fraud or data theft. Often tied to a nation’s government, state-sponsored actors deploy cyberattacks to further geopolitical objectives or national interests. A white hat hacker is a cybersecurity professional who conducts ethical hacking to identify vulnerabilities in systems, software, or networks, typically with the owner’s permission. Their primary motivation is to improve security and protect systems from potential threats.
For support or reporting issues, include Question ID: 65259a47123d472a0c4a2535 in your ticket. Thank you.
Domain
2.0 - Threats, Vulnerabilities, and Mitigations
Question 7:
Which email security protocol uses cryptographic signatures to verify the authenticity of an email’s sender?
DMARC
MTA
SPF
DKIM
DMARC
MTA
SPF
Your answer is correct
DKIM
Overall explanation
OBJ 4.5: DKIM (DomainKeys Identified Mail) allows senders to associate a domain name with an email, thus vouching for its authenticity using a cryptographic signature. MTA (Mail Transfer Agent) is responsible for transferring and routing emails between servers but doesn’t employ cryptographic signatures for sender authenticity. While DMARC (Domain-based Message Authentication, Reporting, and Conformance) builds upon DKIM and SPF, it itself doesn’t directly use cryptographic signatures. Instead, it allows domain owners to specify policies on how to handle mail that doesn’t authenticate with SPF or DKIM. SPF (Sender Policy Framework) is used to specify which mail servers are permitted to send email for a domain. It doesn’t utilize cryptographic signatures for this purpose.
For support or reporting issues, include Question ID: 654338a2f3d6fa9edaff4307 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 8:
Kelly Innovations LLC needs to securely authenticate remote users and needs to be able to handle multiple authentication methods. Which of the following protocols would be BEST suited for this scenario?
ICMP
SD-WAN
EAP
IPSec
ICMP
SD-WAN
Correct answer
EAP
Your answer is incorrect
IPSec
Overall explanation
OBJ 3.2: Extensible Authentication Protocol (EAP) is a network access authentication protocol that can handle multiple authentication methods, making it apt for this scenario. Internet Control Message Protocol (ICMP) is used by network devices, such as routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached, not for authenticating users. A Software-Defined Wide Area Network (SD-WAN) is a virtual WAN architecture that allows businesses to leverage any combination of transport services but isn’t used for authenticating remote users. Internet Protocol Security (IPSec) secures internet communication across an IP network by protecting data through encryption and authentication, but it doesn’t focus on authenticating remote users.
For support or reporting issues, include Question ID: 64c16de0fbaff7327d208b4a in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 9:
Last month at Kelly Innovations LLC, Jamario reported receiving inappropriate images while researching industry competitors. To prevent employees from accidentally accessing such media in the future, which of the following solutions would be MOST effective?
Upgrading to a faster internet connection
Installing a state-of-the-art firewall
Requiring two-factor authentication for internet access
Implementing content categorization
Upgrading to a faster internet connection
Installing a state-of-the-art firewall
Requiring two-factor authentication for internet access
Your answer is correct
Implementing content categorization
Overall explanation
OBJ 4.5: Content categorization systematically classifies websites based on their overall theme, making it easier to block access to unsuitable or irrelevant categories of web content. Firewalls primarily focus on blocking or allowing traffic based on IP addresses and ports, not necessarily the thematic content of websites. Two-factor authentication increases login security but does not categorize or filter web content. While a faster internet connection improves browsing speeds, it doesn’t filter or categorize web content.
For support or reporting issues, include Question ID: 65432a566491794aff7fb0c4 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 10:
Which of the following terms BEST describes the measurement used to describe a 7% possibility of hardware failure in the next year based on past statistical data?
Severity ranking
Exposure factor
Probability
Likelihood
Severity ranking
Exposure factor
Correct answer
Probability
Your answer is incorrect
Likelihood
Overall explanation
OBJ: 5.2 - Probability is a quantitative measure, usually expressed as a number between 0 and 1, or as a percentage, indicating the statistical likelihood of a risk event. Likelihood is used in qualitative risk analysis to subjectively describe how probable a risk event is, often expressed in terms such as “low,” “medium,” or “high.” The exposure factor (EF) is the fraction of the asset value that is at risk in the event of a security incident. Severity ranking may determine how serious an impact might be but does not directly relate to the probability of an event occurring.
For support or reporting issues, include Question ID: 6548fc397c24a94af8cddbf5 in your ticket. Thank you.
Domain
5.0 - Security Program Management and Oversight
Question 11:
As a network administrator, you have been assigned the critical task of upgrading a company’s encryption protocol for wireless devices. The current encryption method is outdated and poses a significant security risk. Your objective is to select the most secure option for the upgrade. Which of the following encryption mechanisms BEST represents the ideal choice for this upgrade?
WEP
TKIP
WPA
AES
WEP
TKIP
Your answer is incorrect
WPA
Correct answer
AES
Overall explanation
OBJ 4.1: AES (Advanced Encryption Standard) is currently the most secure and widely used encryption protocol for wireless networks. It offers strong encryption algorithms and has withstood extensive testing demonstrating its resilience against various attacks. Upgrading to AES is the ideal choice, as it provides the highest level of security for wireless communication. WEP (Wired Equivalent Privacy) is an outdated encryption protocol known for its numerous security flaws and vulnerabilities. Upgrading to WEP is more of a downgrade since it has depreciated, is not recommended, is easily exploitable, and does not provide adequate security for modern wireless networks. While TKIP (Temporal Key Integrity Protocol) was introduced as an improvement over the vulnerable WEP encryption protocol, it is still considered weak and susceptible to various attacks. Upgrading to TKIP may offer some enhancements, but it is not the most secure option available. WPA (Wi-Fi Protected Access) was designed to address the shortcomings of WEP and introduced stronger security mechanisms, such as TKIP and Message Integrity Check (MIC). While it was an improvement over WEP, it is important to note that WPA also has known vulnerabilities, especially when using its pre-shared key (PSK) mode. As such, it might not be the most secure option for this upgrade.
For support or reporting issues, include Question ID: 64b98a261faf349088211185 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 12:
Which of the following BEST represents a primary goal when seeking evidence of internal audits from a third-party vendor?
Determination of the vendor’s profit margins.
Assessment of external threat landscape to reduce security vulnerabilities.
Verification of compliance with internal security standards.
Review of the vendor’s client list.
Determination of the vendor’s profit margins.
Assessment of external threat landscape to reduce security vulnerabilities.
Correct answer
Verification of compliance with internal security standards.
Your answer is incorrect
Review of the vendor’s client list.
Overall explanation
OBJ: 5.3 - Evidence of internal audits primarily serves to verify that the vendor adheres to their own security and operational standards consistently. Client lists might be part of a business review, but they are not the primary concern of internal security or operational audits. While audits might touch on external threats, their main focus is internal controls, practices, and standards. Internal audits focus on operational and security aspects, not on the financial details like profit margins.
For support or reporting issues, include Question ID: 64bb3ecfeff2b06d2ceda19a in your ticket. Thank you.
Domain
5.0 - Security Program Management and Oversight
Question 13:
Kelly Innovations LLC is implementing a wireless network and needs a flexible authentication method that supports multiple mechanisms for authenticating both wired and wireless users. Which protocol BEST fits their requirements?
LDAP
WPA3
EAP
RADIUS
LDAP
WPA3
Correct answer
EAP
Your answer is incorrect
RADIUS
Overall explanation
OBJ 3.2: EAP (Extensible Authentication Protocol) provides a standard interface for integrating multiple authentication methods. It can be used in various network access scenarios, including wireless, to provide flexible authentication without requiring changes to the underlying authentication mechanism. WPA3 (Wi-Fi protected access 3) is a security protocol designed for securing wireless networks. While it incorporates authentication mechanisms, it isn’t as flexible or extensible in terms of supporting multiple authentication methods as EAP. LDAP (Lightweight directory access protocol) is a protocol used to access directory systems over IP networks. It is mainly used for user directory querying and authentication, not specifically for the flexibility in wireless or wired network authentication methods. RADIUS (Remote authentication dial-in user service) is a protocol for carrying authentication, authorization, and configuration information between a network access server and a central server. While it can support EAP as one of its methods, it is not an authentication method by itself.
For support or reporting issues, include Question ID: 652c7abaa67f751703997ca7 in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 14:
What is the name of the attack vector that involves sending fraudulent emails to trick recipients into revealing sensitive information or clicking malicious links?
Vishing
Misinformation
Smishing
Phishing
Vishing
Misinformation
Smishing
Your answer is correct
Phishing
Overall explanation
OBJ: 2.2 - Phishing is the correct answer because it involves emails to trick recipients. Misinformation is incorrect because it does not involve sending fraudulent emails, but spreading false or misleading information. Vishing is incorrect because it uses voice calls, not emails, to trick recipients. Smishing is incorrect because it uses SMS messages, not emails, to trick recipients.
For support or reporting issues, include Question ID: 64b8c06bc68e540174fdaa09 in your ticket. Thank you.
Domain
2.0 - Threats, Vulnerabilities, and Mitigations
Question 15:
Jenny, a newly hired sales representative, has been granted access to view customer records but is unable to modify, delete, or add new ones. Only managers and the IT department have the ability to make changes to these records to maintain data integrity. Which principle is the organization applying?
Mandatory access control (MAC)
Data classification
Principle of least privilege
Attribute-based access control (ABAC)
Mandatory access control (MAC)
Data classification
Your answer is correct
Principle of least privilege
Attribute-based access control (ABAC)
Overall explanation
OBJ 4.6: The principle of least privilege ensures users have only the necessary access to perform their tasks, reducing the risk from both unintended mistakes and malicious actions. Although MAC uses sensitivity labels to restrict access, it’s not specifically about limiting functions like modify or delete. ABAC uses multiple attributes, such as user, environment, and resource, to decide access, but it’s not solely about providing the minimum necessary permissions. While data classification categorizes data based on sensitivity, it does not specify access rights or restrictions.
For support or reporting issues, include Question ID: 654459b7ae770b15f1b50e2f in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 16:
Which type of symmetric encryption is BEST suited for scenarios where the total length of the message is not predetermined and encrypts data one byte or bit at a time?
Stream cipher
AES256
Block cipher
Initialization vector (IV)
Correct answer
Stream cipher
AES256
Block cipher
Your answer is incorrect
Initialization vector (IV)
Overall explanation
OBJ: 1.4 - Stream ciphers encrypt plaintext data one byte or bit at a time, making them suitable for scenarios where the total message length is unknown. They combine the plaintext with a separate randomly generated message derived from the key and an initialization vector (IV). The IV ensures uniqueness of the resulting ciphertext even with identical plaintexts, and the recipient must generate a similar keystream for decryption. While IVs are used in the encryption process, they are not a type of symmetric encryption. They work in conjunction with encryption methods to ensure unique ciphertexts. Block ciphers encrypt data in equal-sized blocks, typically 128-bit, and they require padding if the plaintext doesn’t match the block size. While AES256 is a widely used symmetric encryption cipher variant with a 256-bit key, it specifically refers to a type of block cipher and not the general categorization.
For support or reporting issues, include Question ID: 6525878ba8b3b77bfb418cae in your ticket. Thank you.
Domain
1.0 - General Security Concepts
Question 17:
What is the primary difference between an insider threat and a shadow IT threat actor?
Malicious intent
Resources/funding
Level of access
Level of sophistication/capability
Correct answer
Malicious intent
Resources/funding
Level of access
Your answer is incorrect
Level of sophistication/capability
Overall explanation
OBJ: 2.1 - The primary difference between an insider threat and a shadow IT threat actor is the malicious intent. An insider threat has malicious intent and abuses their legitimate access to an organization’s systems or data for harmful purposes, such as revenge, blackmail, or data theft. A shadow IT threat actor does not have malicious intent and uses unauthorized or unapproved devices, software, or services within an organization for convenience, productivity, or innovation purposes. Level of access is not the primary difference between an insider threat and a shadow IT threat actor, as both have legitimate access to an organization’s systems or data. However, an insider threat can have higher levels of access, trust, and knowledge than a shadow IT threat actor. Resources/funding is not the primary difference between an insider threat and a shadow IT threat actor, as both can have varying amounts of money, equipment, or personnel available to conduct attacks. However, a shadow IT threat actor can have more resources and funding than an insider threat. Level of sophistication/capability is not the primary difference between an insider threat and a shadow IT threat actor, as both can have varying levels of technical skills, knowledge, and experience. However, an insider threat can have more sophistication and capability than a shadow IT threat actor.
For support or reporting issues, include Question ID: 64b898d175f3764616371b95 in your ticket. Thank you.
Domain
2.0 - Threats, Vulnerabilities, and Mitigations
Question 18:
In the process of deploying a new software application within Kelly Innovations LLC, the IT team identified that a certain module wouldn’t function unless another software was already installed. Which of the following BEST describes this situation?
Running a legacy application.
Facing a compatibility issue.
Encountering a software dependency.
Allowing unrestricted user access.
Running a legacy application.
Facing a compatibility issue.
Correct answer
Encountering a software dependency.
Your answer is incorrect
Allowing unrestricted user access.
Overall explanation
OBJ: 1.3 - Software dependencies arise when one software or module requires another software or service to function correctly. In this case, the module’s reliance on another software to operate signifies a dependency. Legacy applications are older software versions or systems still in use, often because the user prefers the old version over a new version, or because the newer version is not compatible with the user’s hardware or operating system. It’s not directly related to the reliance of one software on another. Allowing unrestricted user access pertains to user permissions and access controls, and is not directly related to software functionality or interoperability. While facing a compatibility issue could be related to software dependencies, a compatibility issue is typically broader and deals with software not working due to system requirements, different software versions, or other factors.
For support or reporting issues, include Question ID: 6524d5e09eb2e17ced10c45f in your ticket. Thank you.
Domain
1.0 - General Security Concepts
Question 19:
Enrique at Dion Training is responsible for ensuring that the company’s project data is protected from potential data loss, especially since the office is located in a region prone to natural disasters. Which backup method would provide him with the most secure protection by keeping a physically separate copy of the data?
Cloud backups
Offsite backups
Hybrid backups
Onsite backups
Cloud backups
Correct answer
Offsite backups
Your answer is incorrect
Hybrid backups
Onsite backups
Overall explanation
OBJ 3.4: Offsite backups ensure that the backup is physically separated from the original data. Given the risk of natural disasters, offsite backups would offer Dion Training better protection for their project data. While hybrid backups combine onsite and cloud backups, the primary concern of natural disasters damaging onsite data remains. Onsite backups are unlikely to protect Dion Training’s project data if a natural disaster damages their office since they would be located in the same office location. Cloud backups provide a form of offsite storage; however, they depend on internet connectivity and may be subject to potential delays or data transfer limits. Additionally, cloud storage is often managed by third-party providers, which could raise security or compliance concerns. Since Enrique desires the most secure option, cloud backups would not be as effective as an offsite backup.
For support or reporting issues, include Question ID: 652df56a8571f35d53e5248e in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 20:
A company’s access control mechanism determines access to resources based on users’ job functions. The system enforces access control based on these predefined responsibilities, and users do not have the discretion to modify or override access permissions. Which type of access control mechanism is being used in this scenario?
Attribute-based
Discretionary
Role-based
Rule-based
Attribute-based
Discretionary
Your answer is correct
Role-based
Rule-based
Overall explanation
OBJ 4.6: In this scenario, the medium-sized company uses “Role-Based Access Control” (RBAC), where access is determined by user roles or job functions, with permissions assigned to these predefined roles for structured management. Unlike “Discretionary Access Control” (DAC), where users control their resource permissions, RBAC assigns access based on roles rather than individual discretion. “Rule-Based Access Control” is broader, covering various mechanisms but lacks the role-specific focus of RBAC. “Attribute-Based Access Control” (ABAC) uses dynamic attributes like location and time, unlike RBAC’s simpler role-based structure.
For support or reporting issues, include Question ID: 64c13e0259b059a712065d06 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 21:
Dion Training Solutions needs a network appliance capable of filtering traffic based on URLs, HTTP headers, and specific web application functionalities. At which layer of the OSI model would this appliance primarily operate?
Layer 3
Layer 7
Layer 5
Layer 6
Layer 3
Correct answer
Layer 7
Layer 5
Your answer is incorrect
Layer 6
Overall explanation
OBJ 3.2: Layer 7, or the application layer, deals with end-user services, and appliances at this layer can make filtering decisions based on specifics like URLs, HTTP headers, and specific application functions. Layer 6, the presentation layer, is responsible for translating data between the application and transport layers. Layer 5, the session layer, manages connections between applications. It isn’t focused on the content-specific criteria like URLs and HTTP headers. Layer 3 devices are concerned with IP addressing and routing.
For support or reporting issues, include Question ID: 652c85133b1d2556f6cb6b7f in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 22:
Which of the following is the BEST action a security professional would undertake to determine the order in which identified vulnerabilities should be addressed, based on potential impact and exploitation likelihood?
Threat intelligence gathering
Vulnerability prioritization
False positive assessment
Dynamic analysis
Threat intelligence gathering
Correct answer
Vulnerability prioritization
False positive assessment
Your answer is incorrect
Dynamic analysis
Overall explanation
OBJ 4.3: Vulnerability prioritization involves assessing the severity, exploitability, and potential impact of vulnerabilities to decide the order of their remediation. This ensures that critical risks are managed first, optimizing resource allocation. Threat intelligence gathering is the collection of data about potential threats from various sources. This provides context but doesn’t directly offer a sequence for remediation. Dynamic analysis involves evaluating software during its runtime to uncover vulnerabilities that might not be apparent when the software is not running. It’s useful for finding issues but doesn’t necessarily determine their importance. False positive assessment involves reviewing and verifying alerts that a security tool flags as malicious, only to determine they are benign. While essential, it doesn’t directly sort vulnerabilities by risk.
For support or reporting issues, include Question ID: 6541c8b181573933758874d4 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 23:
Kelly Innovations decides to manage its IT infrastructure within its physical location, retaining full control over its hardware, software, and data. Which of the following security implications is MOST directly associated with this approach?
Risk transference to third-party vendors
Multi-tenancy risks
Dependence on external patch availability
Increased responsibility for physical security
Risk transference to third-party vendors
Multi-tenancy risks
Dependence on external patch availability
Your answer is correct
Increased responsibility for physical security
Overall explanation
OBJ: 3.1 - With on-premise infrastructure, organizations must ensure the physical safety of servers and other equipment against theft, tampering, and disasters. Risk transference to third-party vendors is more relevant to cloud-based services where responsibilities are often shared between the provider and the customer. On-premise infrastructure typically allows for more control over when and how patches are applied, rather than being dependent on third-party vendors. Multi-tenancy is a concern in shared cloud environments where resources are shared among different clients, not in on-premise setups.
For support or reporting issues, include Question ID: 652c35c4e0af1b70771153b7 in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 24:
Which of the following terms describes a risk evaluation method that operates without interruption to provide real-time data, allowing organizations to rapidly detect and respond to emerging threats?
Risk analysis
Continuous assessment
Incident response
Periodic review
Risk analysis
Correct answer
Continuous assessment
Incident response
Your answer is incorrect
Periodic review
Overall explanation
OBJ: 5.2 - Continuous assessment refers to an ongoing, real-time process of evaluating risks to ensure that an organization can quickly identify and respond to new threats. A periodic review refers to the scheduled examination of systems and risks which, unlike continuous assessment, does not occur in real time. Risk analysis is a broader term that involves examining the identified risks to understand their nature, but it doesn’t specifically mean the continuous, real-time process. Incident response is the process an organization follows after a risk has materialized into a security event, which is a reactive measure rather than a continuous assessment process.
For support or reporting issues, include Question ID: 654875b4758b2ddd586d0fd8 in your ticket. Thank you.
Domain
5.0 - Security Program Management and Oversight