Question 1Correct

At which phase of our systems or software development lifecycle should risk assessments be built in to ensure risks are addressed in the project development?
The specifications phase.
The programming phase.
The user testing phase.
Your answer is correct
The feasibility phase.
Question 2Skipped

Nayeli has discovered that the firewall her company uses will fail open if it tries to handle more than 10,000 concurrent sessions. There are 50 application servers on the subnet behind the firewall. Which statement BEST describes how the firewall will behave if each of these application servers allows 201 sessions to be opened?
The firewall will block any further use of the previously allowed traffic
Correct answer
The firewall will allow malicious attacks
The firewall will block malicious attacks
The firewall will allow only the previously allowed traffic
Question 3Skipped

Cassandra is explaining the security concepts related to the CIA triad to her co-workers at ThorTeaches.com. What is the BEST term that describes holding people responsible for the actions they did and did not perform?
Assurance
Authentication
Correct answer
Accountability
Authorization
Question 4Skipped

George has a file on a dedicated system that contains Secret information. What are the BEST controls he can implement to prevent unauthorized access?
Strong authorization controls, strong access controls, and encryption
Correct answer
Multi-factor authentication, strong access controls, strong authorization controls, and encryption
Strong authorization controls, enforcing the principle of need to know, and enforcing the principle of least privilege.
Strong authorization controls, strong access controls, and detailed audit logs
Question 5Skipped

Jane is the chief information security officer at ThorTeaches.com, a medium-sized company. What term BEST describes the minimum standard required of Jane when she determines the security goals for the organization?
Correct answer
Due care
Due diligence
Prudent person rule
Building consensus
Question 6Skipped

We want to ensure non-repudiation. Which of these would be the BEST for that?
Strong complex passwords.
Symmetric encryption.
Collision resistant hashes.
Correct answer
Digital signatures.
Question 7Skipped

In a room of tapes that have varying levels of sensitive data, Yvonne discovers a tape is not labeled. What is the MOST appropriate way for her to protect this tape?
Assume the data should be erased to prevent it from being disclosed
Correct answer
Assume the data is at the highest sensitivity level
Assume the data is at the lowest sensitivity level
Assume the label fell off and is to be found somewhere close by
Question 8Skipped

Jada is looking to establish who has dropped a table in the Oracle database on the Linux server in the past 24 hours. She has a log that tells her five database administrators (DBA) used the Oracle account in this time period. What is the MOST likely reason why she cannot establish who performed the DROP TABLE; and what is the BEST practice she can recommend to overcome this problem?
The logs do not capture when the DBAs logged off the Oracle account; best practice is for users to keep a manual log file of when they login and logout from the shared account
Correct answer
Oracle account is shared; best practice is to use “sudo oracle” command
The privileges required by Oracle account are higher than normal users; best practice is to use “su oracle” command
All DBAs know the password so they can login to Oracle account; best practice is for each user to reset the password after they use the account, and track the time and who retrieves the password
Question 9Skipped

Claire wants to expedite the approval of business transactions over $5000. Which control is Claire MOST likely to choose?
Sign off by the manager and the treasurer
Digital signature using a symmetric key held in two halves: one by the manager and the other by the treasurer
Digital signature by the manager, then digital signature by the treasurer
Correct answer
Sign off by the treasurer
Question 10Skipped

Natalie wants to protect her servers against penetration attacks and is monitoring for evidence that a reconnaissance attack is underway. What method of attack is the LEAST likely to be part of a reconnaissance attack?
Correct answer
Spamming
Sniffing
Scanning
Service detection
Question 11Skipped

ThorTeaches.com has recently suffered a data breach where sensitive customer information was accessed and stolen by hackers. As the IT security manager, you are responsible for implementing stronger security measures to prevent similar incidents from occurring in the future. One of the measures you are considering is assigning data owners to specific data sets within the company. Data owners will be responsible for ensuring the security and integrity of the data under their control. Which of the following is the most important consideration when selecting data owners?
The data owner should be the employee who created or gathered the data.
The data owner should have strong technical skills and be familiar with IT security best practices.
The data owner should be the highest ranking employee with access to the data.
Correct answer
The data owner should be the employee with the most knowledge about the business function the data supports.
Question 12Skipped

Cassandra has submitted a change ticket with the procedures to apply the change in the production system and has tested the change in the test environment. All 12 steps in the change procedures work as expected in her tests. She has added a roll back plan that simply states, “Undo the change.” How likely is her change to be accepted by the Change Approval Board (CAB)?
Unlikely. The change procedures cannot be assumed to work in the production environment as they do in the test environment.
Correct answer
Unlikely. The roll back plan is not complete.
Likely. The change procedures have been tested and it is reasonable to assume they will work the same way in the production environment.
Likely. Cassandra and the Change Approval Board (CAB) believe the operator will know to undo the same steps in the reverse order, and can correct any unexpected effects by doing so.
Question 13Skipped

Our leadership has decided that for 2 of our critical applications, it is impossible to minimize the residual risk to an acceptable level. Even with all our countermeasures, the residual risk is always too high. What can we do to mitigate that?
Build a SOC (Security Operations Center) and implement live monitoring.
Correct answer
Buy insurance.
Update to state-of-the-art firewalls.
Get professional pen-testers to pen test the 2 applications.
Question 14Skipped

We can BEST ensure message integrity, sender authentication, and non-repudiation using which of these?
Linear cryptanalysis.
Hashing.
Symmetric cryptography.
Correct answer
PKI (Public Key Infrastructure).
Question 15Skipped

Frank is comparing various automatic tools to test computer system vulnerability and to detect computer security incidents. How can vulnerability testing tools help Frank?
Capture non-recurring events
Correct answer
Review current state of the system
Capture recurring events
Examine historical events
Question 16Skipped

In order to evaluate the effectiveness our IDSs (Intrusion Detection Systems), which of these would be the BEST metric to use?
The number of successful attacks.
The number of attacks we detect.
The ratio of successful attacks to unsuccessful attacks.
Correct answer
The ratio of false positives to false negatives.
Question 17Skipped

In her company, access controls are rule-based. Naomi is creating an access control list for files in the financial department’s share. Naomi wants all managers to have read access to any file, but only employees in Accounts Receivable (AR) to be able to update the file and only employees in Accounts Payable (AP) to read the files; no-one else should be permitted access. Given these four rules, what is MOST likely the sequence to place them in the ACL? 1. Deny 2. Allow Managers read access 3. Allow AR update access 4. Allow AP read access
Correct answer
3, 4, 2,1
1, 2, 4,3
4, 3, 2,1
2, 3, 4,1
Question 18Skipped

We are a large multinational organization with offices in Europe, the US, Asia, Australia, Russia and Africa. Which type of information would we expect to have the LOWEST level of security protection?
Customer PII (Personally Identifiable Information).
Our strategic plan.
Our upcoming financial results.
Correct answer
Our previous financial results.
Question 19Skipped

Dee is a compliance manager. What line of defense does she form in her duties?
Fourth line of defense
Third line of defense
First line of defense
Correct answer
Second line of defense
Question 20Skipped

Mark suspects the connections between his home and his work are sometimes subject to a MitM (Man-In-The-Middle) attack. Which of the following is the BEST way to prevent a MitM attack?
Correct answer
Periodically, Mark sends a random number he has chosen encrypted using the work server’s public key and waits for the server to reply with the same number encrypted with his public key.
Mark and the work server should create and send a digital signature of every packet.
Mark sends the current time (including milliseconds) to the work server and waits for the work server to reply with the time it received Mark’s message, together with the server’s own time when it sent the reply.
Mark and the work server should create and send a digital signature of every nth packet.
Question 21Skipped

Linda wants to increase the controls over accountability. What method of keeping the logs is MOST appropriate?
Keep log entries on a different partition on the hard drive
Correct answer
Send log entries to a separate server on UDP port 514
Send log entries to a separate server on UDP port 162
Send log entries to a separate server on TCP port 1433
Question 22Skipped

Hind is the IT security manager at a large financial institution. The company has recently undergone a merger, and as a result, there are now multiple departments and business units with different IT systems and security practices. The CEO (Chief Executive Officer) has asked her to conduct a review of the company’s IT security practices to identify areas of improvement and ensure that the company is meeting regulatory requirements. What is the first step in identifying the business needs for improving the company’s IT security practices?
Identify the regulatory requirements that the company must comply with
Gather input and feedback from employees across all departments and business units
Determine the company’s overall goals and objectives for IT security
Correct answer
Conduct a risk assessment of the company’s current IT systems and practices
Question 23Skipped

Dee has been asked to evaluate the design completeness of the backup procedures. What is MOST likely to be the first artefact that Dee will review?
Retention requirements
Disposal requirements
Classification of data
Correct answer
Asset inventory
Question 24Skipped

As the CTO of a rapidly growing startup company, your team has been developing and deploying various applications using traditional monolithic architecture. Recently, your team proposed a shift to using microservices to aid the development and deployment process. You are considering this proposal and assessing the potential impact, including benefits and challenges. In considering the shift from a monolithic architecture to a microservices architecture, what should be your primary concern in the context of IT security and system resilience?
Ensuring the microservices are written in the same programming language for consistency.
Considering the possibility of increased points of failure due to individual microservices.
Prioritizing the implementation of containerization for efficient resource utilization.
Correct answer
Focusing on making the microservices resilient and fault-tolerant.
Question 25Skipped

As a developer, Marsha is writing new code for a new add-on to be added to the application. Her add-on is intended to be distributed as an EXE file so that end-users cannot inspect the source code. Which is the BEST choice of language Marsha can use to write the new code?
Executable binary
Assembly language
Correct answer
Compiled language like C+ or Pascal
Interpreted language like VBScript or Visual Basic for Applications (VBA)
Question 26Skipped

Which of the following is the LOWEST level of security for multiple processing sites?
Correct answer
Physical security measures and access controls
Regular security assessments and audits
Data encryption and backup procedures
Network security measures and firewalls
Question 27Skipped

Which of these is MOST important to ensure is in place before we have outside contractors do a penetration test on our organization?
The penetration testers show us what the plan to do on a test system.
Correct answer
The goals and objectives are clearly defined.
Everyone including senior management is unaware of the penetration test; to ensure the penetration test is as close to a real attack as possible.
Our IT staff has been informed about the penetration test.
Question 28Skipped

Which of these activities is a security administrator responsible for?
Correct selection
Produce reports of access rights for management review.
Create generic group user accounts when requested by HR with full access privileges.
Correct selection
Install and remove programs.
Correct selection
Terminate user’s access when advised by HR.
Question 29Skipped

As an IT security manager at a global tech company, your role involves educating new recruits about important laws and ethics. Your newest batch of recruits is set to start soon, and you’re putting together a training session. You aim to discuss the Electronic Communication Privacy Act (ECPA), ISC2 Code of Ethics, and the Ten Commandments from the Computer Ethics Institute to ensure that they understand their responsibilities. In order to best align with legal and ethical expectations, what is the most crucial aspect of these principles that your new recruits must comprehend?
The essentiality of not interfering with other people’s computer work.
Correct answer
The significance of providing diligent and competent services.
The necessity of not copying or using proprietary software without payment.
The importance of not using a computer to harm other people.
Question 30Skipped

Tim is conducting a periodic review of user access. Which of the following is he LEAST likely to include in the user access review process?
Correct answer
All the co-workers of the user in the workgroup
All the computers the user can connect to, use, or log into
All the accounts created for the user, or to which the user has been granted access
All the applications the user can use
Question 31Skipped

Tanya wants to protect the application code in her client/server environment. Which type of code should have the MOST limited access?
Correct answer
Source code
Executable code
Machine code
Object code
Question 32Skipped

John wants to purchase goods from a store online but does not want to set up a new account and password. Instead, he logs on using Facebook, which is the only alternate identity provider for the website. What is the term that BEST describes this type of identification and authentication?
Correct answer
Delegated Identity Management (DIM)
Federated Identity Management (FIM)
Active Directory Domain Services (AD DS)
Single Sign-On (SSO)
Question 33Skipped

Nayeli is seeking the most valuable information about a network’s vulnerabilities. What is the BEST way for Nayeli to get this information?
Periodic procedure updates
Periodic drills
Correct answer
Periodic staged intrusions
Periodic policy updates
Question 34Skipped

Which of the following is the LEAST appropriate for determining the security of a system using the CWSS (Common Weakness Scoring System)?
Evaluating the effectiveness of security controls
Comparing the system’s security score to industry standards
Assessing the vulnerabilities of a system
Correct answer
Implementing the latest security patches and updates
Question 35Skipped

As the Information Security Director, you are assisting the Information Security steering committee and the application owners in assigning RTOs (Recovery Time Objectives) for the applications we use in our organization. Which of these should have the SHORTEST RTO?
Our intranet.
Our change management system.
Correct answer
Our e-commerce website.
Our VPN (Virtual Private Network) access for our remote contractors.
Question 36Skipped

During an access request, Francis is requesting a file called “Tuna Notes” that belongs to Dee and is stored on a server named Bluefish. In this relationship, what is the BEST name for the role assigned to “Tuna Notes” and for the role assigned to Francis?
Active entity, passive entity
Passive entity, active entity
Correct answer
Object, subject
Subject, object
Question 37Skipped

As VP of Sales, Naomi is the data owner of a file that has been created by people who report to her. If the file contains personally identifiable information (PII), what role is MOST likely given to the company that runs an application to produce reports about the data subjects?
Data custodian
Data steward
Correct answer
Data processor
Data controller
Question 38Skipped

At a change control meeting, a system owner requests a change to their system that would conflict with our security standards. What would be the BEST way to resolve this conflict?
Enforce the security standard.
Make changes to the proposed system change to match the security standard.
Add mitigating controls to the system.
Correct answer
Calculate the risk.
Question 39Skipped

Francis has ten sales reps working with many clients, and he wants to ensure each sales rep is unable to share information from the client with whom they are communicating until the sales rep has concluded the sale. However, he also wants any sales rep to be able to answer incoming calls from any client. Francis wants to impose a mandatory access control so the system will enforce the restrictions as soon as a sales rep takes the call. What is the MOST likely security model Francis will choose?
Correct answer
Brewer Nash
Bell-LaPadula
Clark-Wilson
Biba
Question 40Skipped

We are, as part of our testing of our Disaster Recovery Plan (DRP), doing a simulation test. What would we look at in the simulation test?
We bring critical components up our secondary site and fail the traffic over to that site.
Team members review the plan quickly looking for glaring omissions, gaps, or missing sections.
We go through the plan on our own, making sure each step for our team is accurate.
Correct answer
The team pretends to have a disaster and responds to the plan with their teams input.
Question 41Skipped

Ross is creating a subroutine in the database front end that compares the postal code with the street names within that postal code. What is the MOST likely reason for doing this?
Ensure availability of new data
Ensure confidentiality of the new data
Ensure the data entry staff are held accountable if they enter wrong data
Correct answer
Ensure integrity of new data
Question 42Skipped

Mark is trying to teach his co-workers about the TCP Three-way Handshake. Which is the correct sequence?
Client sends TCP packet with URG raised; Server responds with packet with ACK raised; Client responds with packet with RST raised
Client sends TCP packet with RST raised; Server responds with packet with ACK raised; Client responds with packet with ACK raised
Correct answer
Client sends TCP packet with SYN raised; Server responds with packet with ACK and SYN raised; Client responds with packet with ACK raised
Client sends TCP packet with FIN raised; Server responds with one packet with ACK raised and another packet with FIN raised; Client responds with packet with ACK raised
Question 43Skipped

Francis is a security engineer who helps development teams decide on which controls should be included in new applications. He has a list of existing controls that have been implemented in other applications, a list of new controls that will be implemented soon in other applications, and a list of new designs for controls that probably cannot be implemented using the current technology. Which list provides no security protection?
Existing controls that have been proven to work
Correct answer
Controls that have not been implemented yet
New controls that have not been proven to work
Existing controls that due to their age of use have probably been cracked
Question 44Skipped

Francis’ company is upgrading the telecommunication lines. What is the LEAST important objective in upgrading a network?
Correct answer
To maintain an inventory of network assets
To carry more network capacity
To improve system response time
To improve network services
Question 45Skipped

Jane is conducting a network vulnerability assessment. What would the vulnerability assessment be able to identify?
0-day vulnerabilities.
Correct answer
Missing patches.
Malware.
Security design flaws.
Question 46Skipped

Natalie’s company wants to update the authentication solution to enable users to be authenticated to services in the cloud that are yet to be deployed. Natalie has been told to minimize the infrastructure required, minimize the overhead for managing the solution, and rapidly deploy the solution. Which authentication solution is BEST for Natalie?
A third-party identity service
An on-premise authentication solution
A federated identity solution
Correct answer
A cloud-based identity service
Question 47Skipped

ThorTeaches.com has recently acquired a large amount of customer data from a third-party vendor. Seth has been asked to analyze the data to identify trends and patterns that can be used to improve ThorTeaches.com’s marketing and sales efforts. He is also concerned about the potential risks associated with data mining, as the data may contain sensitive personal information. What should he do to ensure that the data mining process is conducted in a secure and ethical manner?
Encrypt the data before storing it in the data warehouse.
Correct answer
Conduct a privacy impact assessment.
Use a secure data warehouse to store the data.
Use a trusted third-party vendor to perform the data mining.
Question 48Skipped

John is looking for assurance that only authorized users are accessing the system and they are using it properly. What is the MOST applicable term for achieving this?
Correct answer
Accountability
Auditing
Authorization
Authentication
Question 49Skipped

Dee is seeking strong authentication for centralized authentication servers when logging on to the firewalls. Which factor is she MOST likely to use?
PINs
User IDs
Account numbers
Correct answer
Tokens
Question 50Skipped

As part of our software testing, we are performing regression testing. What does that mean?
That the software installs correctly on the customers hardware.
Correct answer
Lost or missing features after major code changes.
Processes and security alerts when encountering errors.
Interfaces between components in the software.
Question 51Skipped

Ken receives an email purporting to be from Dee and responds by clicking the link to take him to Dee’s website. Only after he signs on with his username and password does he realize that he is not on Dee’s real website. What kind of attack has Ken MOST likely been the victim?
Correct answer
Phishing attack
Poisoning attack
Pharming attack
DNS Pharming attack
Question 52Skipped

Dee is trying to determine how much insurance coverage to purchase. What is MOST likely to be the greatest factor that will determine the size of the financial loss from a disaster?
The effects on suppliers
Correct answer
The side effects of the disaster
The disaster itself
The effects on investors
Question 53Skipped

Francis is building the security controls and audit trails into a new application. What is the BEST phase listed below in the system development life cycle (SDLC) for Francis to do this work?
System operations phase
System initiation phase
System implementation phase
Correct answer
System development phase
Question 54Skipped

As VP of Sales, Naomi is the data owner of a file that contains personally identifiable information (PII) about customers. She decides to run a report on the length of time the customers stay in the same house; that is, their address does not change. Naomi contracts a third-party to build and generate this report. In such a situation, what role is MOST likely given to the third-party?
Data custodian
Data controller
Data steward
Correct answer
Data processor
Question 55Skipped

Mark wants to determine the address of the server in the IPv4 address 47.152.43.130/23. Where can he find the server address, and what is the value?
First 23 bits, 47.152.42
Correct answer
Last nine bits, 386
Last eight bits, 130
last seven bits, 2
Question 56Skipped

What is the primary difference between a vulnerability assessment and a penetration test?
Penetration tests are more intrusive
Vulnerability assessments are more comprehensive
Vulnerability assessments are performed on a regular basis, while penetration tests are only performed when requested
Correct answer
Vulnerability assessments focus on identifying potential exploits, while penetration tests focus on actively exploiting them
Question 57Skipped

Ann’s company is going passwordless. What authentication factor should the company not require in order to BEST implement this decision?
Correct answer
Secret question and answer
Token
Public-Private key pair
Fingerprint
Question 58Skipped

Trisha wants to define the inherent qualitative risk as a function of various factors. Which of the following is the LEAST likely factor she might include?
Asset Valuation (AV)
Impact or Consequence
Correct answer
Controls
Likelihood or Probability
Question 59Skipped

Bob is working on assigning classification to files in ThorTeaches payroll department. He has identified all the files that need to be classified. Who would be BEST to work with to make sure the files are given the proper protection profile?
The risk manager
The payroll manager
Correct answer
The data owner
The entire payroll team
Question 60Skipped

Francis wants to measure the success of the new incident handling process. Which group of users should he approach to gauge the success?
Internal users only
Correct answer
Both internal and external users
All business units
External investors, shareholders, and stakeholders
Question 61Skipped

Which of these would help us the MOST to ensure our risk management program to be as effective as possible?
Correct answer
New risk detection.
A flexible Information Security budget.
A solid risk baseline.
Accurate risk reporting.
Question 62Skipped

Juanita wants to boost the efficiency by which the SIEM can correlate events to detect when an attack is underway. What is the BEST choice for Juanita to make regarding the sources of the input data?
Gather information only from application servers
Gather information only from web servers
Gather information only from network devices such as routers and firewalls
Correct answer
Gather information from different sources
Question 63Skipped

We are looking at how different threats could actualize. Which phase of the Software Development Life Cycle (SDLC) are we in?
Requirements gathering
Testing/Validation
Development
Correct answer
Design
Question 64Skipped

Thor signs on by entering his username on the system. What is the BEST description for what Thor has just completed?
Completed the authentication by claiming an identity
Started the authentication sequence with something that anyone can claim
Correct answer
Started the authentication sequence by claiming an identity
Started the authentication sequence with something that he knows
Question 65Skipped

Natalie wants to compensate for the fact that an individual may perform two roles that are normally held to be incompatible under separation of roles. What is the BEST control that Natalie can use?
Access controls
Processing totals
Correct answer
Logs
Hashes
Question 66Skipped

Natalie wants to improve the network reliability. What is the LEAST likely device she should use?
Parallel physical circuits
Standby power supplies
Correct answer
Front-end processors
Redundant switching equipment
Question 67Skipped

Cassandra is deciding which Identity and Access Management scheme to set up. Which one of the following characteristics is MOST likely to become the deciding factor?
Correct answer
Comprehensible
Detailed
Consistent
Timely
Question 68Skipped

Which of the following is the MOST effective strategy for achieving zero-defects in a software development project?
Relying on rigorous testing to catch defects before release
Setting aggressive deadlines to motivate developers to work faster
Investing in cutting-edge software development tools and technology
Correct answer
Implementing strict quality control measures throughout the development process
Question 69Skipped

Francis is preparing the disaster recovery plans for the IT department and Dee is assisting the business owners prepare a business continuity plan (BCP). Francis has informed Dee that it may take several days under the Disaster Recovery Plan (DRP) to restore the non-critical business applications. What is the BEST way to describe the relationship between the DRP and the BCP?
Overlapping plans
Separate and diverse plans
Competing plans
Correct answer
Separate but complementary plans
Question 70Skipped

Which of the following is the FIRST step in implementing a FIM (File Integrity Monitoring) system?
Correct answer
Identifying the critical files and directories to be monitored
Installing the FIM software
Conducting a risk assessment
Configuring the FIM system
Question 71Skipped

Beth is building a new application and she wants to implement the Clark-Wilson model of security. What is the BEST way to achieve this?
Ensure users cannot read down to a classification below their security clearance level.
Ensure users cannot write down to a classification below their clearance level.
Correct answer
Provide a constrained interface, so that commands are shown but dimmed if the user does not have sufficient privileges.
Provide a drop-down menu showing all possible subcommands.
Question 72Skipped

As a Chief Information Security Officer (CISO) of a cloud service provider, you are assessing the threats related to TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols used in your infrastructure. You are also considering mitigations to address the specific threats associated with these protocols. Considering the key characteristics of TCP and UDP and the potential attacks they could face, which of the following scenarios represents the most significant risk to your infrastructure that requires immediate mitigation?
Correct answer
TCP being used in your web server architecture, making it susceptible to SYN flood attacks
TCP being utilized for transmitting sensor data in your IoT (Internet of Things) products, opening the possibility for sequence number prediction attacks
UDP being used for online multi-player gaming on your gaming servers, potentially opening the possibility for Fraggle attacks
UDP being used for live video streaming services you provide, increasing the risk of Smurf attacks
Question 73Skipped

You are a Senior Information Security Manager at a healthcare organization responsible for creating a new Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP). You are using the framework of NIST 800-34 to guide your efforts and are at the stage of conducting a Business Impact Analysis (BIA). Given the sensitive and critical nature of healthcare data and operations, which action is most critical at this stage?
Correct answer
Prioritizing systems and components based on the Maximum Tolerable Downtime (MTD).
Defining the scope of the BIA with all stakeholders.
Getting approval from senior management to proceed with the BIA.
Identifying all critical systems and components within the organization.
Question 74Skipped

Claire is performing a one-for-one check of the input documents. What is the MOST likely reason she is doing this?
Correct answer
Ensure accuracy and completeness
Ensure correct sequence
Ensure totals match the expected results
Ensure completeness
Question 75Skipped

Which of the following is a key characteristic of the Clark-Wilson model?
Correct answer
It is a set of rules and guidelines used to ensure the security and integrity of data.
It is a mathematical model used to describe the behavior of physical systems.
It is a security model that focuses on the separation of duties and the use of well-defined interfaces.
It is a database management system designed to store and organize large amounts of data.
Question 76Skipped

As VP of Sales, Naomi is the data owner of a file that has been created by people who report to her. She does not wish to be involved in the day-to-day tasks of granting and revoking access, taking backups, restoring files from backups, and correcting problems with referential integrity. What is the MOST likely action Naomi will take?
Delegate the role of data custodian to a senior sales representative in the Sales department
Correct answer
Delegate the role of data custodian to an IT support specialist
Transfer the ownership to the IT department
Delegate the role of data custodian to a junior manager in the Sales department
Question 77Skipped

You are a cybersecurity manager at a large organization with thousands of endpoints spread across various locations. The organization has recently decided to integrate regular vulnerability scanning as part of its security strategy to identify potential threats and weaknesses in the systems. As a cybersecurity manager, what is the most crucial aspect to consider when integrating vulnerability scanning into your security protocols?
Ensuring the vulnerability scanning tool has the latest updates and definitions.
Defining the IP range for the scanning tool to focus on.
Selecting a scanning tool with the most comprehensive list of common vulnerabilities.
Correct answer
Scheduling regular scans to identify new and existing vulnerabilities.
Question 78Skipped

Thorteaches.com is upgrading our internet connection to ensure we always have a connection to the internet. What is the BEST way to achieve that?
Correct answer
Bond a DSL connection and a satellite connection
Bond a fiber connection, 5G connection, and a DSL connection
Bond a 5G connection and 4G connection
Bond a fiber connection and a 5G MiFi connection
Question 79Skipped

Nayeli wants to use a surveillance technique with detailed results to be analyzed after events have occurred; the technique should be passive so that it does not consume her time until a significant event has been detected. Which of the following is Nayeli MOST likely to choose?
Line monitoring
Correct answer
Audit logs
Security guard and dog
Motion detectors
Question 80Skipped

John is concerned that his company is using copies of copyrighted software. What is the BEST method John can use to detect the illegal use of the software?
Send a questionnaire by email to all users
Correct answer
Using a software inventory management tool, periodically compare the inventory software list
Remind all users periodically not to use illegally obtained software
Develop a software anti-piracy policy immediately and distribute to all users without fail
Question 81Skipped

You are the Chief Information Security Officer (CISO) of a leading e-commerce company. Given the recent rise in cyber threats, you are considering the implementation of an AI-powered Network Intrusion Detection System (NIDS) using Genetic Programming (GP). What would be the most crucial aspect to consider when deploying a GP-based NIDS for your network security?
Creation of new programs based on the best existing programs
Assignment of problems to the generated programs
Correct answer
Evaluation of the program’s performance in solving the problem
Generation of an initial population of random computer programs
Question 82Skipped

Which of the following is NOT a common guest escape method?
Using a software exploit to bypass security controls
Correct answer
Overloading the host system with resource-intensive processes
Using a kernel vulnerability to gain root access to the host system
Leveraging a VM escape vulnerability in the hypervisor
Question 83Skipped

Which of these events would normally have the LARGEST impact on Information Security?
Upgrading our firewalls.
Moving our data center.
Opening a new office.
Correct answer
Acquisition of a competing organization.
Question 84Skipped

We use both IDSs (Intrusion Detection Systems) and IPSs (Intrusion Prevention Systems) in our environment. What is the MAIN purpose of the IDSs?
To block traffic seen as malicious.
To alert on true negatives.
Correct answer
To identify potential attacks on our internal network.
To identify network misconfigurations.
Question 85Skipped

As the Information Security manager, you are looking at antivirus software for our organization. What is the MOST important consideration before choosing a product?
How well it works with our IDSs (Intrusion Detection Systems), IPSs (Intrusion Prevention Systems) and firewalls.
How large market share the product has and the TCO (Total Cost of Ownership).
Correct answer
How easy it is to maintain and how often signature updates are released.
How often the vendor releases major updates and their feature roadmap.
Question 86Skipped

As the Chief Information Security Officer (CISO) for a large software development company, you have observed inconsistencies in the execution and tracking of software requirements, including those related to security. This has resulted in multiple software updates where certain requirements were unintentionally overlooked, leading to potential vulnerabilities. You decide to standardize the usage of Requirement Traceability Matrices (RTM) across all development projects. As part of this initiative, what is the most significant aspect you need to emphasize to maximize the effectiveness of RTMs in meeting security requirements and mitigating vulnerabilities?
Correct answer
The RTM should be employed as a dynamic, iterative tool that adjusts to the changing requirements over time.
The RTM should be updated to reflect the requirements of every new software version.
The RTM should encompass all the software requirements including project tasks and deliverable documents.
The RTM should include specific security requirements to ensure they are considered from the beginning.
Question 87Skipped

Marsha has set up Dynamic NAT using a pool of addresses in the 201.225.231.120/29 subnet. Given that 120 is 0111 1000 in binary, what is MOST likely to be the maximum number of servers that can use the NAT at the same time?
Five
Sixteen
Six
Correct answer
Eight
Question 88Skipped

As the firewall administrator, Claire notices a rule that permits traffic to ports 80 and 443 on the server at address 127.0.0.1. What is the MOST likely reason Claire would have to be suspicious of this rule?
This address is used to send a broadcast to all servers on the subnet.
This address is missing the subnet mask.
The web server would never be assigned this address.
Correct answer
This address cannot be reached by the firewall.
Question 89Skipped

Mark has been working at ThorTeaches.com for five years, and he has a friend working for a competitor. What is the MOST likely document that would prevent Mark from sharing his inside knowledge with his friend?
Third-party Access Policy
Non-Compete Agreement
Acceptable Use Policy
Correct answer
Non-Disclosure Agreement
Question 90Skipped

Tanya is conducting a dynamic analysis to detect software errors. What is MOST likely the activity she is doing?
Inspections
Correct answer
Testing
Code reading
Tracing
Question 91Skipped

Claire wants to maintain the integrity of the files that are shared between the research and marketing departments. Jada in R&D has created research papers at the mid-level clearance: Confidential. Harvey, who has high-level clearance: Secret; and Tim, who has low-level clearance: Enhanced Reliability; both want to read and add their comments in these papers. Which is the BEST model for Claire to implement and who will be granted read and write access to the papers?
Biba; both Tim and Harvey can read; but only Harvey can write comments.
Brewer-Nash; both Harvey and Tim can read the Jada’s papers and write their comments; but neither can read or write to their marketing documents at the same time
Correct answer
Biba; Tim can read and Harvey cannot; but Harvey can write comments and Tim cannot
Bell-LaPadula; Harvey can read, and Tim cannot; but Tim can write comments and Harvey cannot
Question 92Skipped

Zoe is confused by her peers who seem to use the terms “authorization” and “authentication” synonymously. What is the BEST way to explain these terms?
Authorization is verifying the identity of a user
Authorization comes before authentication
Authentication is granting permissions
Correct answer
Authorization comes after authentication
Question 93Skipped

Natalie’s company relies on specialized hardware that can take months to replace. Which one of the following is the cheapest solution for Natalie to provide as an alternate site where the specialized hardware can be relocated in the event of a disaster?
Mobile site
Warm site
Correct answer
Cold site
Hot site
Question 94Skipped

As an IT Security Manager of a large multinational corporation, you’re in the process of reviewing your current routing protocols. The existing protocols are based on RIP (Routing Information Protocol), an older distance-vector protocol that uses hop count as its only metric. You’re considering other routing protocols that could potentially offer better efficiency and security. If you were to implement changes to the network to enhance its efficiency and security, which feature of the RIP protocol should be most critically evaluated due to its potential impact on network performance?
The built-in loop prevention mechanism.
The use of split horizon to prevent routing loops.
Correct answer
The hold down timer that prevents changes to a specific route for a certain amount of time.
The usage of UDP Port 520 for its transport protocols.
Question 95Skipped

John is creating a username for a new employee, Frank Hornsby. The company guidelines recommend the username “hornsbp1”. The new employee has requested the username “cowboy”, and there are no accounts with that name. Which username is John most likely to create, and what is the BEST reason?
cowboy1, because this almost follows the guidelines and would not be too conspicuous
hornsbp1, because cowboy would be too conspicuous and may attract attackers
Correct answer
hornsbp1, because this format follows the guidelines
cowboy, because the guidelines are optional, and this username is unique
Question 96Skipped

Dee wants to monitor her systems to guard against distributed denial-of-service attacks. Which is the MOST likely pair of metrics that will indicate such an attack is in progress?
CPU utilization and disk activity
Memory utilization and network utilization
Correct answer
CPU utilization and network utilization
Disk activity and network utilization
Question 97Skipped

Claire is concerned that some conditions may exist that can put her IT assets at a high risk of loss. Which pair of conditions is MOST likely to place the assets at high risk?
System interconnectivity and poor controls over data sensitivity
System interconnectivity and inadequate physical security
System interconnectivity and lack of system backups
Correct answer
System interconnectivity and poor security management
Question 98Skipped

What is the primary objective of our risk management program?
To eliminate business risk.
To minimize inherent risk.
To implement effective controls.
Correct answer
To minimize residual risk.
Question 99Skipped

We just recovered from a security incident on a server. The systems administrator tried to stop the attack and did not notify the Information Security team right away. What could we have done to avoid this mistake?
Correct answer
Regular testing of the incident response plan.
Regular testing of our IDS (Intrusion Detection Systems) and IPS (Intrusion Prevention Systems).
Creating mandatory Information Security training for all employees.
Regular reviews of the incident response procedures.
Question 100Skipped

Frank is a new employee at ThorTeaches.com and he has been asked to bring his driver license, government-issued photo identification, and his college diploma on his first day. What is the MOST likely reason for this request?
Correct answer
HR department needs to perform identity proofing
Finance department needs to add him to insurance policy covering company drivers
Manager needs to verify his education credentials
Security department needs to copy his photo in order to create his company access badge
Question 101Skipped

Thor is the chief executive officer at ThorTeaches.com, a medium-sized company, and sets the strategic direction and mission of the organization. What term BEST describes Thor’s personal responsibility when he addresses risks facing the organization?
Correct answer
Prudent person rule
Due care
Due diligence
Building consensus
Question 102Skipped

As VP of Sales, Naomi is the data owner of a file that contains personally identifiable information (PII) about customers. She decides to run a report on the length of time the customers stay in the same house; that is, their address does not change. Naomi decides to build and generate this report in Excel on her desktop. In such a situation, what role is MOST likely assigned to Naomi?
Data controller
Data processor
Data steward
Correct answer
Conflict of interest
Question 103Skipped

Frank is setting up three network zones. The DMZ contains web servers facing the Internet. The Operations Zone (OZ) contains the application servers, and only the web servers are permitted to send traffic to the application servers. The Restricted Zone (RZ) contains the database servers, and only the application servers are permitted to send traffic to the database servers. What is the MOST secure configuration for the firewalls (FW)?
Internet – FW1 – DMZ and FW1 – OZ – FW2 – RZ
Internet – FW1 – DMZ – FW2 – OZ and FW2 – RZ
Correct answer
Internet – FW1 – DMZ – FW2 – OZ – FW3 – RZ
Internet – FW1 – DMZ and FW1 – OZ and FW1 – RZ
Question 104Skipped

What is the BEST use of cryptography?
Correct answer
Provide non-repudiation, protect confidentiality, and protect integrity.
Provide non-repudiation and protect confidentiality.
Protect both confidentiality and integrity.
Protect confidentiality, integrity, and availability.
Question 105Skipped

Jane is the lead of our incident response team; they have proof hackers have gained access to some of our systems and they have successfully altered some of our customer information. Jane reports this to Bob, the Information Security Manager. Who should Bob notify FIRST?
The customers who were compromised.
The regulatory agencies that govern our sector.
The Information Security steering committee.
Correct answer
The data owner.
Question 106Skipped

You are an IT Manager in a hospital overseeing its Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP). In a recent business impact analysis, you identified patient records systems as critical. The hospital’s senior management has made it clear that downtime on these systems can lead to life-threatening situations and must be minimized as much as possible. Given these considerations, which of the following metrics should be your primary focus in planning for business continuity and disaster recovery for the patient records systems?
Recovery Point Objective (RPO)
Work Recovery Time (WRT)
Maximum Tolerable Downtime (MTD)
Correct answer
Recovery Time Objective (RTO)
Question 107Skipped

Your organization heavily relies on smartphones for various business functions, and these devices are currently connected to the primary secure network. However, in a recent IT security meeting, you realized that even though smartphones often receive regular patches, it might still be beneficial to treat them as IoT (Internet of Things) devices and isolate them from the primary network. As the Chief Information Security Officer (CISO), you have to decide on the most suitable approach. Considering the potential security risks, what would be the most appropriate way to handle smartphones within your organization’s network?
Correct answer
Isolate the smartphones on a separate IoT VLAN, just like other IoT devices.
Mandate frequent manual patch updates on all smartphones.
Keep the smartphones on the primary secure network due to their regular patching.
Implement a strict mobile device management (MDM) policy to monitor and control smartphones.
Question 108Skipped

Which group of people would be the BEST for performing risk analysis on our organization?
Correct answer
The process owners.
External auditors.
A group of peers from our competitors.
An external management consultant specialized on our line of business.
Question 109Skipped

Which security technique is better at protecting against SQL (Structured Query Language) injection attacks?
Encryption
Correct answer
Parameterized queries
Firewall
Input validation
Question 110Skipped

As head of the disaster recovery team, Nayeli has just formally declared a disaster. Assuming a triage team has been sent to assess the extent of the damage and/or injuries, which of the following teams would MOST likely be called upon?
IT Services department
Legal department
Facilities management
Correct answer
Communications team
Question 111Skipped

Thor is assigning several hundred employees read access to a group of 12 files related to an application. If Thor can place the users in five departments, which authorization mechanism is he MOST likely going to use?
Access Control List
Correct answer
Capability Table
Application access control
Content-dependent access controls
Question 112Skipped

Juanita is performing periodic network monitoring to verify proper operation. Which task is she LEAST likely to perform?
Detecting line errors
Correct answer
Detecting network layers
Detecting router errors
Detecting terminal errors
Question 113Skipped

As an IT support specialist, Fred has been granted the role of data custodian for a file containing customer records created and updated by the Sales department. If there is a problem with referential integrity, what is the MOST likely way in which Fred can correct the problem?
Create new data
Alert the security operations team
Restore previous values from backup
Correct answer
Verify data accuracy and completeness
Question 114Skipped

What is the PRIMARY purpose of the change control process?
To test changes.
To apply changes.
To document changes.
Correct answer
To authorize changes.
Question 115Skipped

Thor is referring to various standards to list security controls that may be used in the application that is under development. Which is the LEAST likely publication Thor can use?
NIST SP 800-53
Correct answer
COBIT 2019
ISO 27002
NIST SP 800-53A
Question 116Skipped

As a developer, Francis requires the privileges to write code and compile it, keeping the latest copy in the version control library. As a business analyst (BA), Tanya requires the privileges to update the requirements but lacks the privileges to write and compile the code. Which of the following controls is the BEST term for this type of activity?
Four eyes rule
Need to know
Correct answer
Least privilege
Segregation of Duties
Question 117Skipped

Ken initiates a three-way handshake on the server’s port 443 from his port 49,123. The server responds with a port number. Which answer is MOST likely?
Server responds on port 49,123 and listens for Ken’s traffic on port 49,123
Correct answer
Server responds with an ephemeral port above 49,000, and listens for Ken’s traffic on that port
Server responds on port 49,123 and continues to listen for Ken’s traffic on port 443
Server responds on port 443 and continues to listen for Ken’s traffic on that port
Question 118Skipped

Jim is supporting the existing application and learns that the next version will be a total rewrite. What is the LEAST likely activity Jim might do before the next version can be deployed?
Dispose the hardware
Correct answer
Finish updating the system documents
Sanitize the media before it is disposed
Archive the critical information
Question 119Skipped

Jane is the Information Security manager of an organization that spans the globe, meaning we need to follow the regulations of many different governments to ensure we follow all these regulations. Jane should:
Incorporate all of the regulations into one overarching policy that covers all the requirements of all the locations and ensure all locations follow it.
Find the common requirements that all locations have and implement those.
Find the industry best practices and ensure all locations are in compliance with those.
Correct answer
Establish baseline standards for all locations, and then add additional standards for locations that require more security.
Question 120Skipped

Which of these would be an indicator that we need to take a look at our change request procedures?
A lot of similar change requests.
A lot of canceled change requests.
A lot of postponed change requests.
Correct answer
A lot of emergency change requests.
Question 121Skipped

Which of the following is the MOST important indicator of a lack of cloud security architecture and strategy?
Lack of monitoring and reporting capabilities
Insufficient security controls
Inadequate incident response plans
Correct answer
Unclear roles and responsibilities for security
Question 122Skipped

When we are developing a business case for buying new security software, which of these would help us the MOST?
Correct answer
Calculating the ROI (Return on investment).
Compare the spending to what is normal in organizations similar to ours.
Quantifying the cost of the control failures.
Assess how often the software could help us mitigate specific security risks.
Question 123Skipped

Thor wants to retrieve user attributes such as the user’s telephone number, desk location, building, and manager’s name from the LDAP server. Which of the following would be the BEST way for Thor to query the LDAP server for the given user Francis Smith?
CN=Francis Smith, DC=ISC2, DC=org
Correct answer
CN=Francis Smith, OU=Sales, DC=ISC2, DC=org
UID=fsmith
CN=Francis Smith
Question 124Skipped

Natalie needs to be able to determine which versions of the software components constitute the current product. What is the MOST likely tool Natalie can use?
Source code repository
Versioning control
Bug tracking
Correct answer
Software configuration management
Question 125Skipped

We are deploying biometric access readers for areas in our organization that are labeled as critical security. For those areas we should set the readers sensitivity to which of these?
Exactly at the CER (Crossover Error Rate).
High FAR (False accept rate).
Correct answer
High FRR (False rejection rate).
Low CER (Crossover Error Rate).
While viewing the website, tap in the menu bar. Scroll down the list of options, then tap Add to Home Screen.
Use Safari for a better experience.