Comp test 1287-1487
|
|
Title of test:
![]() Comp test 1287-1487 Description: comp test 6 |



| New Comment |
|---|
NO RECORDS |
|
Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?. Time separation. Trusted Computing Base (TCB). Reference monitor. Security kernel. Which of the following technologies can be used to monitor and dynamically respond to potential threats on web applications?. Security Assertion Markup Language (SAML). Web application vulnerability scanners. Runtime application self-protection (RASP). Field-level tokenization. The MAIN purpose of placing a tamper seal on a computer system's case is to: raise security awareness. detect efforts to open the case. expedite physical auditing. make it difficult to steal internal components. Which of the following factors is รก PRIMARY reason to drive changes in an Information Security Continuous Monitoring (ISCM) strategy?. Testing and Evaluation (TE) personnel changes. Changes to core missions or business processes. Increased Cross-Site Request Forgery (CSRF) attacks. Changes in Service Organization Control (SOC) 2 reporting requirements. When configuring Extensible Authentication Protocol (EAP) in a Voice over Internet Protocol (VoIP) network, which of the following authentication types is the MOST secure?. EAP-Transport Layer Security (TLS). EAP-Flexible Authentication via Secure Tunneling. EAP-Tunneled Transport Layer Security (TLS). EAP-Protected Extensible Authentication Protocol (PEAP). What process facilitates the balance of operational and economic costs of protective measures with gains in mission capability?. Risk assessment. Performance testing. Security audit. Risk management. A large human resources organization wants to integrate their identity management with a trusted partner organization. The human resources organization wants to maintain the creation and management of the identities and may want to share with other partners in the future. Which of the following options BEST serves their needs?. Federated identity. Cloud Active Directory (AD). Security Assertion Markup Language (SAML). Single sign-on (SSO). Which of the following determines how traffic should flow based on the status of the infrastructure true?. Application plane. Data plane. Control plane. Traffic plane. Which of the following is the MOST appropriate technique for destroying magnetic platter style hard disk drives (HDD) containing data with a "HIGH" security categorization?. Drill through the device and platters. Mechanically shred the entire HDD. Remove the control electronics. HP iProcess the HDD through a degaussing device. Which of the following protection is provided when using a Virtual Private Network (VPN) with Authentication Header (AH)?. Payload encryption. Sender confidentiality. Sender non-repudiation. Multi-factor authentication (MFA). A software engineer uses automated tools to review application code and search for application flaws, back doors, or other malicious code. Which of the following is the FIRST Software Development Life Cycle (SDLC) phase where this takes place?. Design. Test. Development. Deployment. Which of the following is a term used to describe maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions?. Information Security Management System (ISMS). Information Sharing & Analysis Centers (ISAC). Risk Management Framework (RMF). Information Security Continuous Monitoring (ISCM). Which of the following is the reason that transposition ciphers are easily recognizable?. Key. Block. Stream. Stream. A company is attempting to enhance the security of its user authentication processes. After evaluating several options, the company has decided to utilize Identity as a Service (IDaaS). Which of the following factors leads the company to choose an IDaaS as their solution?. In-house development provides more control. In-house team lacks resources to support an on-premise solution. Third-party solutions are inherently more secure. Third-party solutions are known for transferring the risk to the vendor. A large manufacturing organization arranges to buy an industrial machine system to produce a new line of products. The system includes software provided to the vendor by a thirdparty organization. The financial risk to the manufacturing organization starting production is high. What step should the manufacturing organization take to minimize its financial risk in the new venture prior to the purchase?. Hire a performance tester to execute offline tests on a system. Calculate the possible loss in revenue to the organization due to software bugs and vulnerabilities, and compare that to the system's overall price. Place the machine behind a Layer 3 firewall. Require that the software be thoroughly tested by an accredited independent software testing company. Which of the following statements BEST distinguishes a stateful packet inspection firewall from a stateless packet filter firewall?. The SPI inspects the flags on Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) packets. The SPI inspects the traffic in the context of a session. The SPI is capable of dropping packets based on a pre-defined rule set. The SPI inspects traffic on a packet-by-packet basis. A software development company has a short timeline in which to deliver a software product. The software development team decides to use open-source software libraries to reduce the development time. What concept should software developers consider when using open-source software libraries?. Open source libraries contain known vulnerabilities, and adversaries regularly exploit those vulnerabilities in the wild. Open source libraries can be used by everyone, and there is a common understanding that the vulnerabilities in these libraries will not be exploited. Open source libraries are constantly updated, making it unlikely that a vulnerability exists for an adversary to exploit. Open source libraries contain unknown vulnerabilities, so they should not be used. What method could be used to prevent passive attacks against secure voice communications between an organization and its vendor?. Encryption in transit. Configure a virtual private network (VPN). Configure a dedicated connection. Encryption at rest. Which of the following BEST describes botnets?. Computer systems on the Internet that are set up to trap people who attempt to penetrate other computer system. Set of related programs that protects the resources of a private network from other networks. Small network inserted in a neutral zone between an organization's private the outside public network. Groups of computers that are used to launch destructive attacks. Upon commencement of an audit within an organization, which of the following actions is MOST important for the auditor(s) to take?. Understand circumstances which may delay the overall audit timelines. Review all prior audit results to remove all areas of potential concern from the audit scope. Meet with stakeholders to review methodology, people to be interviewed, and audit scope. Meet with stakeholders to understand which types of audits have been completed. Which of the following access control models is MOST restrictive?. Discretionary Access Control (DAC). Mandatory Access Control (MAC). Role Based Access Control (RBAC). Rule based access control. Which of the following MUST the administrator of a security information and event management (SIEM) system ensure?. All sources are reporting in the exact same Extensible Markup Language (XML) format. Data sources do not contain information infringing upon privacy regulations. All sources are synchronized with a common time reference. Each source uses the same Internet Protocol (IP) address for reporting. Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?. File Integrity Checker. Security information and event management (SIEM) system. Audit Logs. Intrusion detection system (IDS). Which of the following is the name of an individual or group that is impacted by a change?. Change agent. Stakeholder. Sponsor. End User. The security architect has been assigned the responsibility of ensuring integrity of the organization's electronic records. Which of the following methods provides the strongest level of integrity?. Time stamping. Encryption. Hashing. Digital signature. What is considered a compensating control for not having electrical surge protectors installed?. Having dual lines to network service providers built to the site. Having backup diesel generators installed to the site. Having backup diesel generators installed to the site. Having network equipment in active-active clusters at the site. Which of the following is a canon of the (ISC)2 Code of Ethics?. Integrity first, association before serf, and excellence in all we do. Perform all professional activities and duties in accordance with all applicable laws and the highest ethical standards. Provide diligent and competent service to principals. Cooperate with others in the interchange of knowledge and ideas for mutual security. |




