SEC - Jas - U 2 Flashcards
(540 cards)
Question 1:
Which of the following mitigation techniques would be most effective in reducing the security risks associated with a BYOD (Bring Your Own Device) policy in your corporation?
Configuration Enforcement
Network Access Control
Device Encryption
Endpoint Detection and Response
Correct answer
Configuration Enforcement
Network Access Control
Device Encryption
Your answer is incorrect
Endpoint Detection and Response
Overall explanation
OBJ 2.5 - For mitigating security risks associated with a BYOD (Bring Your Own Device) policy, Configuration Enforcement is the most effective technique. Configuration enforcement ensures that each device complies with corporate security policies before connecting to the network, reducing vulnerability exposure from non-compliant devices. Network Access Control manages device connectivity but doesn’t enforce security configurations. Device Encryption secures stored data but doesn’t ensure compliance with configuration standards. Endpoint Detection and Response focuses on identifying and responding to threats, rather than enforcing device configurations, which is critical for BYOD security.
For support or reporting issues, include Question ID: 6722349e556839597288f3f3 in your ticket. Thank you.
Domain
2.0 - Threats, Vulnerabilities, and Mitigations
Question 2:
A manufacturing company utilizes automated systems to control and monitor processes on their factory floor. These systems ensure precision and safety in operations. Which term BEST describes these systems?
SDN
Serverless computing
ICS
Embedded systems
SDN
Serverless computing
Correct answer
ICS
Your answer is incorrect
Embedded systems
Overall explanation
OBJ: 3.1 - Industrial Control Systems (ICS) are integral to manufacturing and industrial environments, overseeing and controlling processes for accuracy and safety. Software-defined networking (SDN) centralizes network control using software, not related to controlling industrial processes. Serverless computing focuses on eliminating the need to manage server infrastructure, not on overseeing manufacturing operations. Embedded systems are dedicated systems performing specific tasks, not necessarily related to industrial control and monitoring.
For support or reporting issues, include Question ID: 652c3383e0af1b70771153b2 in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 3:
In the context of Zero Trust architecture, what is the role of the Data Plane?
To manage identity and authentication requests
To analyze and detect potential threats in real time
To process and transmit data between systems
To enforce security policies across the network
To manage identity and authentication requests
To analyze and detect potential threats in real time
Correct answer
To process and transmit data between systems
Your answer is incorrect
To enforce security policies across the network
Overall explanation
OBJ 1.2 - In Zero Trust architecture, the Data Plane’s role is to handle the processing and transmission of data between systems, managing the flow of network traffic. It focuses on the movement of data rather than enforcing security policies or managing authentication. Security policies are enforced by the Control Plane, which makes decisions on access and controls based on set policies. The Data Plane does not analyze threats in real-time; instead, it operates as the pathway for data, ensuring efficient delivery while the Control Plane maintains security oversight.
For support or reporting issues, include Question ID: 6721029d6ecd963a7be80f4e in your ticket. Thank you.
Domain
1.0 - General Security Concepts
Question 4:
You are a cybersecurity consultant working with a large enterprise that handles sensitive customer data and financial information. The organization is concerned about detecting unauthorized changes to critical files on their servers and workstations. As a security expert, you recommend implementing a File Integrity Monitoring (FIM) solution. Which of the following approaches would be the MOST effective way to implement FIM for the given scenario?
Implementing FIM on a single server to monitor critical files and directories for the entire enterprise
Configuring the FIM tool to generate real-time alerts for all file changes without any exceptions
Limiting the scope of FIM to monitor only system files and directories on the servers and workstations
Scheduling FIM to perform file integrity checks during off-peak business hours to minimize resource utilization
Implementing FIM on a single server to monitor critical files and directories for the entire enterprise
Your answer is incorrect
Configuring the FIM tool to generate real-time alerts for all file changes without any exceptions
Limiting the scope of FIM to monitor only system files and directories on the servers and workstations
Correct answer
Scheduling FIM to perform file integrity checks during off-peak business hours to minimize resource utilization
Overall explanation
OBJ 4.5: Scheduling File Integrity Monitoring (FIM) checks during peak hours can optimize resources by focusing on low-activity periods, reducing the chance of missing critical changes. Real-time alerts for all file changes may overwhelm teams in large enterprises, making it difficult to spot real threats. A robust FIM should monitor critical application files and sensitive data, not just system files, as attackers may target these areas. Relying on a single server for FIM creates a single point of failure and limits scalability, so distributing FIM across multiple servers is recommended for redundancy and efficiency.
For support or reporting issues, include Question ID: 64c124f552ce7fd0f0ee0402 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 5:
Which of the following is a pre-defined period during which planned changes and upgrades to an IT system are implemented to minimize disruption to users?
Standard operating procedure
Recovery point objective
Baseline configuration
Maintenance window
Standard operating procedure
Recovery point objective
Baseline configuration
Your answer is correct
Maintenance window
Overall explanation
OBJ: 1.3 - A maintenance window is a scheduled timeframe during which system updates, patches, or changes are implemented. This period is specifically chosen to reduce the impact on users and ensure business continuity. A Recovery Point Objective is a metric used in disaster recovery that defines the maximum allowable amount of lost data measured in time. It does not pertain to scheduled maintenance periods. A baseline configuration represents a set of specifications for a system, against which all future changes are measured. It doesn’t refer to the time frame for implementing changes. An SOP (Standard Operating Procedure) is a set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations. It doesn’t specify when these operations should be performed.
For support or reporting issues, include Question ID: 6524d23f5aa43bae85dcdf7e in your ticket. Thank you.
Domain
1.0 - General Security Concepts
Question 6:
A power plant happens to utilize a specialized system to manage and monitor its daily operations which includes centralized control over its machinery and sensory feedback. Which of the following security concerns is most often associated with these types of systems?
Runtime efficiency constraints
Constrained memory use
Limited security update capabilities
Optimization for containerized deployments
Runtime efficiency constraints
Constrained memory use
Correct answer
Limited security update capabilities
Your answer is incorrect
Optimization for containerized deployments
Overall explanation
OBJ: 3.1 - SCADA systems such as this are often engineered for specific tasks and might not receive regular security updates, making them susceptible to vulnerabilities over time. SCADA systems are not typically deployed in containers; thus, this isn’t a relevant security implication. Memory constraints are more pertinent to embedded or real-time systems, not inherently a SCADA security concern. While important for real-time systems, runtime efficiency is not a primary security concern for SCADA systems.
For support or reporting issues, include Question ID: 652c42766000c2244d013a03 in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 7:
At Dion Training, a new initiative has been implemented to enhance operational security awareness among its staff. As part of this initiative, all employees must attend a series of training sessions. Which of the following topics should the training cover to ensure employees understand their role in maintaining operational security? (Select TWO).
Social Media Management
Incident Reporting
Workstation Security
Office Ergonomics
Team Building Activities
Social Media Management
Your selection is correct
Incident Reporting
Your selection is correct
Workstation Security
Office Ergonomics
Team Building Activities
Overall explanation
Employees must learn how to secure their workstations, including the use of password-protected screensavers and locking devices when unattended. OBJ: 5.6 - The training should emphasize the importance of reporting any suspicious activity or security breaches immediately as per company protocol. Team building is beneficial for work culture but does not directly contribute to operational security awareness. While ergonomics is important for employee well-being, it is not directly related to operational security practices. Unless the training specifically addresses the security risks of using social media, general social media management is not a primary component of operational security.
For support or reporting issues, include Question ID: 64c355ba68c1ea425b0f0c79 in your ticket. Thank you.
Domain
5.0 - Security Program Management and Oversight
Question 8:
Reed, a cybersecurity specialist at Dion Training Solutions, is optimizing the company’s IPS. He notes that while signature-based detection is highly effective against known threats, it has some limitations. Which of the following BEST describes a limitation of signature-based detection in an IPS?
It requires substantial network bandwidth to operate
It encrypts network traffic to hide malicious signatures
It might not detect zero-day exploits
It automatically updates with behavioral patterns of users
It requires substantial network bandwidth to operate
It encrypts network traffic to hide malicious signatures
Your answer is correct
It might not detect zero-day exploits
It automatically updates with behavioral patterns of users
Overall explanation
OBJ 4.5: Signature-based detection relies on a database of known threat patterns. Therefore, it might not recognize or stop new threats or zero-day exploits because their signatures aren’t in the database yet. Automatically updating with behavioral patterns of users describes behavior-based or heuristic detection, not signature-based detection. Signature-based detection relies on predefined patterns of known threats. While an IPS does process traffic, the bandwidth consumption is not a direct limitation of signature-based detection. The bandwidth concern is more about the throughput of the IPS device itself. Signature-based detection doesn’t encrypt traffic. Instead, it matches traffic patterns against known threat signatures.
For support or reporting issues, include Question ID: 654323d97acefad87de05679 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 9:
After a merger between two tech companies, employees notice they can seamlessly access applications of both firms without additional sign-ins. The IT department has likely employed which solution to achieve this unified access?
Proxy authentication
Password synchronization
Identity aggregation
Federation
Proxy authentication
Password synchronization
Identity aggregation
Your answer is correct
Federation
Overall explanation
OBJ 4.6: By employing a federation, companies can leverage single sign-on across multiple domains or organizations. Proxy authentication means another entity is authenticating on behalf of the user, not shared access between organizations. While password synchronization can provide some ease of access, it simply means passwords are kept consistent across platforms, not shared access. Identity aggregation collects and stores user identities but doesn’t necessarily mean seamless cross-organization access.
For support or reporting issues, include Question ID: 65446384665e6139823dea79 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 10:
Which of the following activities take place during the lessons learned phase in the incident response process?
Examining the effectiveness of the incident response process
Analyzing the evidence and determining the root cause of the incident
Classifying issues base on their impact
Conducting regular training and drills so that employees know what to do if an incident occurs
Correct answer
Examining the effectiveness of the incident response process
Analyzing the evidence and determining the root cause of the incident
Classifying issues base on their impact
Your answer is incorrect
Conducting regular training and drills so that employees know what to do if an incident occurs
Overall explanation
OBJ 4.8: The lessons learned phase in the incident response process involves documenting the incident response process, identifying areas for improvement, and implementing changes to enhance future incident response efforts. It includes analyzing the incident response actions taken, evaluating their effectiveness, and applying knowledge gained from the incident to improve incident response procedures and security measures. Identifying and classifying incidents based on their severity and impact to the organization is part of the Detection phase in the incident response process. This phase involves recognizing that an incident has occurred and understanding its potential implications but does not directly address lessons learned. Analyzing the evidence and determining the root cause of the incident falls under the Analysis phase of the incident response process. This phase aims to understand how the incident occurred and what vulnerabilities were exploited but does not directly relate to lessons learned. Developing an incident response plan, defining roles and responsibilities, and conducting regular training and drills belong to the Preparation phase of the incident response process. This phase ensures that the organization is ready to respond effectively to incidents but does not directly involve the lessons learned from a specific incident.
For support or reporting issues, include Question ID: 64c15d6c6ab51895b912b808 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 11:
Which of the following statements BEST explains the importance of training employees about the incident response process?
Training makes it easier to prevent social engineering attacks so incidents never occur
Training ensures that incident response team members quickly react to an incident
Training helps identify and classify incidents and determine their impact to the organization
Training ensures that incident response team members are adequately compensated for their efforts during an incident
Training makes it easier to prevent social engineering attacks so incidents never occur
Correct answer
Training ensures that incident response team members quickly react to an incident
Training helps identify and classify incidents and determine their impact to the organization
Your answer is incorrect
Training ensures that incident response team members are adequately compensated for their efforts during an incident
Overall explanation
OBJ 4.8: Training is crucial in the incident response process because it ensures that incident response team members are knowledgeable and well-prepared to handle security incidents effectively and efficiently. Training equips them with the necessary skills, knowledge, and best practices to recognize, contain, eradicate, and recover from incidents. While compensating incident response team members appropriately is essential for their dedication and efforts, it is not the primary purpose of training. Training focuses on building skills and knowledge to respond effectively to incidents. Identifying and classifying incidents based on their severity and impact is part of the incident response process, but it is not directly related to the importance of training. Training to avoid social engineering is a good idea and may reduce incidents, but it is only one type of incident that may occur. Training ensures that the response team knows what to do if an event occurs.
For support or reporting issues, include Question ID: 64c15e396ab51895b912b80d in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 12:
Recently, the IT team at Dion Training Solutions noticed multiple instances of security mishaps by the employees. There were incidents involving weak passwords, improper data storage, and unreported phishing attempts. Management was concerned about these repeated mistakes and sought a method to educate and guide their employees about maintaining cybersecurity best practices. Which of the following solutions would BEST assist the organization in preventing future security incidents?
Implementing robust multi-factor authentication protocols.
Maintaining consistent system backup schedules.
Deploying advanced network firewall solutions and notifying employees about the changes to the firewall.
Publishing security policies, best practices, and training materials.
Implementing robust multi-factor authentication protocols.
Maintaining consistent system backup schedules.
Your answer is incorrect
Deploying advanced network firewall solutions and notifying employees about the changes to the firewall.
Correct answer
Publishing security policies, best practices, and training materials.
Overall explanation
OBJ: 2.4 - Creating clear guidelines and sharing best practices along with comprehensive training materials ensures that employees are consistently informed about security standards and practices. Regular backups are essential for data integrity and recovery, but they don’t necessarily guide employees on security protocols. While multi-factor authentication strengthens login processes, it doesn’t holistically educate users on varied security practices. Advanced firewalls can enhance perimeter security, but they don’t directly address user knowledge and behavior related to cybersecurity.
For support or reporting issues, include Question ID: 6529ee0923faf5abc28f2e1c in your ticket. Thank you.
Domain
2.0 - Threats, Vulnerabilities, and Mitigations
Question 13:
Dwayne has told his friends to always turn off geolocation on their device application settings due to security concerns. Which of the following best explains why he would suggest his friends turn off geolocation?
Data is collected and use to improve the computational efficiency of algorithms
Having geolocation data tracked can drain the device’s battery
The data can be used to show what applications a person uses most often
The data can be used to tracking a person’s movements
Data is collected and use to improve the computational efficiency of algorithms
Having geolocation data tracked can drain the device’s battery
The data can be used to show what applications a person uses most often
Your answer is correct
The data can be used to tracking a person’s movements
Overall explanation
OBJ 3.3: Geolocation data is information that can identify the physical location of a device and, by extension, its user. When collected, stored, and analyzed without proper consent or transparency, it can infringe upon an individual’s privacy. Users might not be aware of how frequently their location is being tracked, who has access to this data, and for what purposes it might be used, leading to potential misuse and violation of personal privacy. While having geolocation on may affect the device’s performance or battery life, it is not a security concern that would be as concerning to Dwayne as tracking a user’s movement. Geolocation data is about determining physical location. It doesn’t have a direct influence on the graphic or visual quality of an application. Geolocation data can be used to personalize content or services based on location, but it does not inherently improve the computational efficiency of algorithms.
For support or reporting issues, include Question ID: 64c18e458a3754c97798b028 in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 14:
During testing of a security architecture, what method ensures the system can quickly switch to a standby system when the primary system doesn’t work?
Clustering
Failover
Warm site
Parallel processing tests
Clustering
Correct answer
Failover
Warm site
Your answer is incorrect
Parallel processing tests
Overall explanation
OBJ 3.4: Failovers are meant to keep an organization running after a significant failure. They are meant to be temporary means to prevent complete failure. They are less expensive than a full-scale backup plan. They are sort of like a spare tire for your car, where you wouldn’t want to use the spare tire permanently; however, it will allow you to get home or to a place where you can buy a new tire or fix the flat one. Warm sites have much of the equipment and resources already at the site. Devices may be kept updated, but the data will need to be loaded. The warm site isn’t a complete standby. Clustering, while crucial for high availability and load balancing, does not inherently ensure that control can be quickly switched in the event of a system failure. Parallel processing tests check the reliability and stability of the backup or secondary system while it’s running alongside the primary system.
For support or reporting issues, include Question ID: 64c19f1612b4631e4788b438 in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 15:
Which standard mandates specific security requirements for organizations that handle branded credit cards from the major card issuers, aiming to protect cardholder data?
PCI DSS
NIST Special Publication 800-63
ISO/IEC 27001
FIPS
Correct answer
PCI DSS
NIST Special Publication 800-63
ISO/IEC 27001
Your answer is incorrect
FIPS
Overall explanation
OBJ: 5.1 - The PCI DSS (Payment Card Industry Data Security Standard) is a widely-recognized security standard that imposes strict security measures for organizations handling credit cards from major card issuers to safeguard cardholder information against theft and fraud. ISO/IEC 27001 is an international standard for managing information security; it is not exclusive to the protection of credit card data. FIPS (Federal Information Processing Standards) are U.S. government standards that outline the requirements for cryptographic modules within federal computer systems and are not specifically related to credit card data protection. NIST SP 800-63 offers guidelines for digital identity management, which includes general recommendations for access control but does not deal specifically with credit card data security.
For support or reporting issues, include Question ID: 65484ed1d368f5a99a797d0f in your ticket. Thank you.
Domain
5.0 - Security Program Management and Oversight
Question 16:
Dion Training Solutions is deploying a new security system to monitor and detect malicious activities in real-time on their network. They want a device that can analyze network traffic without interfering or disrupting the flow. Which of the following would best meet this requirement?
Proxy server
Load balancer
Network appliance sensor
VLAN
Proxy server
Load balancer
Correct answer
Network appliance sensor
Your answer is incorrect
VLAN
Overall explanation
OBJ 3.2: Network appliance sensors passively monitor network traffic, looking for signs of malicious or anomalous activity. Because these sensors operate in “listen-only” mode, it won’t disrupt regular network operations. While a load balancer distributes incoming traffic to prevent server overloads, it does not provide detailed traffic analysis or threat detection functionalities. Though a proxy server can act as an intermediary for network requests and might offer some security features, it doesn’t passively monitor all network traffic for malicious activities in the same way a dedicated sensor does. A VLAN (Virtual local area network) segments a network based on operational requirements, not necessarily security needs. It doesn’t analyze traffic for signs of malicious activities.
For support or reporting issues, include Question ID: 652c7841a67f751703997ca2 in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 17:
Which element of the risk management process involves identifying the individuals or departments responsible for managing and mitigating specific risks?
Risk indicators
Risk owners
Risk threshold
Risk tolerance
Risk indicators
Correct answer
Risk owners
Risk threshold
Your answer is incorrect
Risk tolerance
Overall explanation
OBJ: 5.2 - Risk owners are individuals or departments who are responsible for managing and mitigating specific risks identified during the risk management process. Risk tolerance refers to an organization’s willingness to accept the level of risk, but it does not pertain to the identification of risk owners. Risk indicators are specific metrics used to monitor and assess the level of risk in an organization, but they do not directly involve identifying responsible parties. Risk threshold refers to the level of risk that an organization is willing to accept, but it does not address the identification of individuals or departments responsible for managing risks.
For support or reporting issues, include Question ID: 64b9eff91cce5933317db62b in your ticket. Thank you.
Domain
5.0 - Security Program Management and Oversight
Question 18:
Mary purchased a new laptop. Upon booting it up for the first time, she noticed several pre-installed applications that she neither requested nor intended to use. These applications consumed a significant amount of system resources, causing noticeable slowdowns. Mary was annoyed because she felt she didn’t need any of these programs and they were just taking up valuable space and resources on her new device. Which of the following types of malicious software is Mary MOST likely dealing with on her new laptop?
Ransomware
Trojan horse
Bloatware
Spyware
Ransomware
Trojan horse
Your answer is correct
Bloatware
Spyware
Overall explanation
OBJ: 2.4 - Bloatware refers to software that comes pre-installed on a device, which might be unnecessary or unwanted by the user, and can often consume system resources. Mary’s experience aligns with typical bloatware characteristics. Ransomware locks files or systems and demands a ransom. Mary doesn’t mention any encryption or demands related to her new laptop. Spyware covertly tracks user activities and can monitor local application activity. Mary’s issue doesn’t seem to revolve around any tracking or monitoring. A Trojan horse is malware disguised as legitimate software. Mary’s concern is about pre-installed software, not software she mistakenly downloaded or installed.
For support or reporting issues, include Question ID: 65281dd3d631f5bd4a085cef in your ticket. Thank you.
Domain
2.0 - Threats, Vulnerabilities, and Mitigations
Question 19:
Which of the following activities is MOST crucial for ensuring that known vulnerabilities in software or hardware are addressed before they can be exploited by attackers?
Penetration testing
Regular system monitoring
Applying security updates
Baseline configuration establishment
Penetration testing
Regular system monitoring
Correct answer
Applying security updates
Your answer is incorrect
Baseline configuration establishment
Overall explanation
OBJ 4.3: Actively monitoring for and applying security updates is an essential activity in vulnerability management. It helps in addressing and rectifying known vulnerabilities in software and hardware, thereby reducing the chances of exploitation. Setting a baseline configuration is vital for determining system changes and anomalies. However, it doesn’t directly involve rectifying vulnerabilities in software or hardware. While continuously observing system activities is essential for detecting anomalies or potential threats, regular system monitoring doesn’t directly deal with addressing known vulnerabilities in systems. Although penetration testing can help identify vulnerabilities by simulating cyberattacks, the act itself doesn’t address the vulnerabilities that are already known.
For support or reporting issues, include Question ID: 6541d1ec017ef401cbd78f21 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 20:
Jamario, a systems administrator at Dion Training Solutions, has been asked to configure the company’s firewall to allow FTP traffic for external users, but only secure HTTPS traffic should be allowed from the internal network to the internet. After implementing the rules, Jason, a manager, reports that he can’t access an external FTP site. Which of the following firewall rules could be the cause of the issue?
Allowing outbound TCP traffic on port 443 (HTTPS) from all internal addresses
Blocking inbound TCP traffic on port 21 (FTP) to all internal addresses
Blocking inbound TCP traffic on port 443 (HTTPS) to all external addresses
Allowing outbound TCP traffic on port 21 (FTP) from all internal addresses
Allowing outbound TCP traffic on port 443 (HTTPS) from all internal addresses
Correct answer
Blocking inbound TCP traffic on port 21 (FTP) to all internal addresses
Your answer is incorrect
Blocking inbound TCP traffic on port 443 (HTTPS) to all external addresses
Allowing outbound TCP traffic on port 21 (FTP) from all internal addresses
Overall explanation
OBJ 4.5: Blocking inbound FTP traffic can prevent users like Jason from accessing external FTP sites. This might be the reason he can’t connect. Blocking inbound HTTPS traffic for external addresses does not impact FTP access for internal users. Allowing outbound TCP traffic on port 21 (FTP) from all internal addresses permits external FTP traffic, so it’s not the cause of the issue. Allowing outbound TCP traffic on port 443 (HTTPS) from all internal addresses permits secure HTTPS traffic from the internal network to the internet, so it aligns with Jamario’s objective.
For support or reporting issues, include Question ID: 65431bccb496ed4c62e3f146 in your ticket. Thank you.
Domain
4.0 - Security Operations
Question 21:
In a large financial institution, like Kelly Financial Solutions, which of the following BEST describes an example of a task that an IT technician might be prohibited from doing without special authorization due to security concerns?
Checking their corporate email.
Using the office printer for printing documents.
Installing a recommended software update.
Downloading and installing third-party software from the internet.
Checking their corporate email.
Using the office printer for printing documents.
Installing a recommended software update.
Your answer is correct
Downloading and installing third-party software from the internet.
Overall explanation
OBJ: 1.3 - Downloading and installing third-party software from the internet is typically categorized as Restricted Activities within corporate environments, especially in sensitive sectors like finance, due to the potential security risks associated. Malicious software can easily be introduced into the system through unverified third-party software installations. In most institutions, using the office printer for printing documents is a regular task and isn’t categorized as a restricted activity unless it involves printing sensitive data without proper authorization. While installing a recommended software update could be restricted in certain scenarios, the term “recommended” implies that it’s an endorsed activity. Checking their corporate email is a standard activity for most employees and wouldn’t be restricted in a typical business setting.
For support or reporting issues, include Question ID: 6524d5085aa43bae85dcdf88 in your ticket. Thank you.
Domain
1.0 - General Security Concepts
Question 22:
What is the purpose of monitoring and revision as part of ensuring information security?
To continuously improve security measures
To establish centralized governance structures
To implement industry-specific regulations
To enforce strict access control policies
Correct answer
To continuously improve security measures
To establish centralized governance structures
To implement industry-specific regulations
Your answer is incorrect
To enforce strict access control policies
Overall explanation
OBJ: 5.1 - The purpose of monitoring and revision in information security is to continuously monitor the effectiveness of security measures, identify weaknesses or vulnerabilities, and make necessary improvements to enhance the overall security posture of the organization. Monitoring and revision are not directly related to establishing governance structures. Governance structures define the decision-making and authority in the organization, whereas monitoring and revision are about assessing and enhancing security practices. While monitoring and revision may play a role in ensuring access control policies are effective, it is not their primary purpose. Access control policies focus on managing and controlling user access to resources based on their roles and responsibilities. Monitoring and revision may be used to ensure compliance with industry-specific regulations, but it is not their primary purpose. Compliance with regulations is a separate aspect of information security management.
For support or reporting issues, include Question ID: 64b88e8575f3764616371b72 in your ticket. Thank you.
Domain
5.0 - Security Program Management and Oversight
Question 23:
In security architecture, which approach is the most effective for safeguarding data at rest?
Utilizing backups
Implementing parallel processing
Using encryption
Applying access control policies
Utilizing backups
Implementing parallel processing
Correct answer
Using encryption
Your answer is incorrect
Applying access control policies
Overall explanation
OBJ 3.4: Encryption is the best option as it transforms data into an unreadable format for unauthorized users, thereby safeguarding it from unauthorized access. Access control limits who can view or edit data but does not protect the data at rest from being accessed if the storage medium itself is compromised. Encryption is needed to secure the data itself. While backups are essential for data recovery, they do not directly secure the data. Backups provide redundancy but don’t protect data from unauthorized access or breaches. Parallel processing is a computational technique to speed up tasks but does not protect data; it’s unrelated to security or the protection of stored data.
For support or reporting issues, include Question ID: 64c1aa4345e9d8860c40464c in your ticket. Thank you.
Domain
3.0 - Security Architecture
Question 24:
You are browsing the web and you see an advertisement for a product that you have been looking for. You click on the link and it takes you to a website that looks like website of the product. However, you notice that the URL is slightly different and has a spelling error. What type of attack is this an example of?
Business email compromise
Watering hole
Brand impersonation
Typosquatting
Business email compromise
Watering hole
Your answer is incorrect
Brand impersonation
Correct answer
Typosquatting
Overall explanation
OBJ: 2.2 - Typosquatting is a form of cyberattack that involves registering domain names that are similar to legitimate ones but have spelling errors or variations. The goal is to trick users into visiting malicious websites that may steal their information or infect their systems with malware. Watering hole is a form of cyberattack that involves compromising a legitimate website that is frequented by a specific group of users, such as employees of a certain organization. The goal is to infect the users’ systems with malware when they visit the website. Business email compromise is a form of cyberattack that involves compromising an email account of a person in authority, such as a CEO or a manager, and using it to send fraudulent requests or instructions to other employees or partners. The goal is to trick them into transferring money or disclosing confidential information. Brand impersonation is a form of cyberattack that involves creating fake websites, emails, or social media accounts that mimic legitimate ones. The goal is to deceive users into trusting the fake entity and revealing their information or performing malicious actions.
For support or reporting issues, include Question ID: 64ba1a7ab711a9b6c71715d7 in your ticket. Thank you.
Domain
2.0 - Threats, Vulnerabilities, and Mitigations