option
Questions
ayuda
daypo
search.php

Computer test 2 1387 - 1487

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Computer test 2 1387 - 1487

Description:
Computer test

Creation Date: 2024/12/22

Category: Others

Number of questions: 36

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Which of the following is required to verify the authenticity of a digitally signed document?. Digital hash of the signed document. Sender's private key. Recipient's public key. Agreed upon shared secret.

Which of the following is a common term for log reviews, synthetic transactions, and code reviews?. Security control testing. Application development. Spiral development functional testing. DevOps Integrated Product Team (IPT) development.

What is the FIRST step in risk management?. Establish the expectations of stakeholder involvement. Identify the factors that have potential to impact business. Establish the scope and actions required. Identify existing controls in the environment.

When developing an organization's information security budget, it is important that the. expected risk can be managed appropriately with the funds allocated. requested funds are at an equal amount to the expected cost of breaches. requested funds are part of a shared funding pool with other areas. expected risk to the organization does not exceed the funds allocated.

A retail company is looking to start a development project that will utilize open source components in its code for the first time. The development team has already acquired several ‘open source components and utilized them in proof of concept (POC) code. The team recognizes that the legal and operational risks are outweighed by the benefits of opensource software use. What MUST the organization do next?. Mandate that all open-source components be approved by the Information Security Manager (ISM). Scan all open-source components for security vulnerabilities. Establish an open-source compliance policy. Require commercial support for all open-source components.

Which of the following examples is BEST to minimize the attack surface for a customer's private information?. Obfuscation. Collection limitation. Authentication. Data masking.

The Chief Information Security Officer (CISO) of a small organization is making a case for building a security operations center (SOC). While debating between an in-house, fully outsourced, or a hybrid capability, which of the following would be the MAIN consideration, regardless of the model?. Skill set and training. Headcount and capacity. Tools and technologies. Scope and service catalog.

A cloud service provider requires its customer organizations to enable maximum audit logging for its data storage service and to retain the logs for the period of three months. The audit logging generates extremely high amount of logs. What is the MOST appropriate strategy for the log retention?. Keep last week's logs in an online storage and the rest in a near-line storage. Keep all logs in an online storage. Keep all logs in an offline storage. Keep last week's logs in an online storage and the rest in an offline storage.

Which of the following is the BEST way to protect privileged accounts?. Quarterly user access rights audits. Role-based access control (RBAC). Written supervisory approval. Multi-factor authentication (MFA).

Which of the following is the BEST way to protect against Structured Query language (SQL) injection?. Enforce boundary checking. Ratfrict um of SELECT command. Restrict HyperText Markup Language (HTML) source code. Use stored procedures.

Digital non-repudiation requires which of the following?. A trusted third-party. Appropriate corporate policies. Symmetric encryption. Multifunction access cards.

An enterprise is developing a baseline cybersecurity standard its suppliers must meet before being awarded a contract. Which of the following statements is TRUE about the baseline cybersecurity standard?. It should be expressed as general requirements. It should be expressed in legal terminology. It should be expressed in business terminology. It should be expressed as technical requirements.

How does Radio-Frequency Identification (RFID) assist with asset management?. It uses biometric information for system identification. It uses two-factor authentication (2FA) for system identification. It transmits unique Media Access Control (MAC) addresses wirelessly. It transmits unique serial numbers wirelessly.

What is static analysis intended to do when analyzing an executable file?. Collect evidence of the executable file's usage, including dates of creation and last use. Search the documents and files associated with the executable file. Analyze the position of the file in the file system and the executable file's libraries. Disassemble the file to gather information about the executable file's function.

Which of the following types of hosts should be operating in the demilitarized zone (DMZ)?. Hosts intended to provide limited access to public resources. Database servers that can provide useful information to the public. Hosts that store unimportant data such as demographical information. File servers containing organizational data.

Which is the PRIMARY mechanism for providing the workforce with the information needed to protect an agency’s vital information resources?. Incorporating security awareness and training as part of the overall information security program. An information technology (IT) security policy to preserve the confidentiality, integrity, and availability of systems. Implementation of access provisioning process for coordinating the creation of user accounts. Execution of periodic security and privacy assessments to the organization.

What action should be taken by a business line that is unwilling to accept the residual risk in a system after implementing compensating controls?. Notify the audit committee of the situation. Purchase insurance to cover the residual risk. Implement operational safeguards. Find another business line willing to accept the residual risk.

An establish information technology (IT) consulting firm is considering acquiring a successful local startup. To gain a comprehensive understanding of the startup’s security posture’ which type of assessment provides the BEST information?. A security audit. A penetration test. A tabletop exercise. A security threat model.

A financial organization that works according to agile principles has developed a new application for their external customer base to request a line of credit. A security analyst has been asked to assess the security risk of the minimum viable product (MVP). Which is the MOST important activity the analyst should assess?. The software has the correct functionality. The software has been code reviewed. The software had been branded according to corporate standards. The software has been signed off for release by the product owner.

Which of the following addresses requirements of security assessment during software acquisition?. Software assurance policy. Continuous monitoring. Software configuration management (SCM). Data loss prevention (DLP) policy.

A hospital enforces the Code of Fair Information Practices. What practice applies to a patient requesting their medical records from a web portal?. Use limitation. Individual participation. Purpose specification. Collection limitation.

In a large company, a system administrator needs to assign users access to files using Role Based Access Control (RBAC). Which option Is an example of RBAC?. Mowing users access to files based on their group membership. Allowing users access to files based on username. Allowing users access to files based on the users location at time of access. Allowing users access to files based on the file type.

Which Redundant Array c/ Independent Disks (RAID) Level does the following diagram represent?. RAID 0. RAID 1. RAID 5. RAID 10.

Which of the following does the security design process ensure within the System Development Life Cycle (SDLC)?. Proper security controls, security goals, and fault mitigation are properly conducted. Proper security controls, security objectives, and security goals are properly initiated. Security goals, proper security controls, and validation are properly initiated. Security objectives, security goals, and system test are properly conducted.

Why is authentication by ownership stronger than authentication by knowledge?. It is easier to change. It can be kept on the user's person. It is more difficult to duplicate. It is simpler to control.

A new employee formally reported suspicious behavior to the organization security team. The report claims that someone not affiliated with the organization was inquiring about the member's work location, length of employment, and building access controls. The employee's reporting is MOST likely the result of which of the following?. Risk avoidance. Risk avoidance. security awareness. Phishing.

In what phase of the System Development Life Cycle (SDLC) should security training for the development team begin?. Development/Acquisition. Initiation. Implementation/ Assessment. Disposal.

What security principle addresses the issue of "Security by Obscurity"?. Open design. Segregation of duties (SoD). Role Based Access Control (RBAC). Least privilege.

The personal laptop of an organization executive is stolen from the office, complete with personnel and project records. Which of the following should be done FIRST to mitigate future occurrences?. Encrypt disks on personal laptops. Issue cable locks for use on personal laptops. Create policies addressing critical information on personal laptops. Monitor personal laptops for critical information.

Which of the following services can be deployed via a cloud service or on-premises to integrate with Identity as a Service (IDaaS) as the authoritative source of user identities?. Which of the following services can be deployed via a cloud service or on-premises to integrate with Identity as a Service (IDaaS) as the authoritative source of user identities. User database. Multi-factor authentication (MFA). Single sign-on (SSO).

The security operations center (SOC) has received credible intelligence that a threat actor is planning to attack with multiple variants of a destructive virus. After obtaining a sample set of this virus’ variants and reverse engineering them to understand how they work, a commonality was found. All variants are coded to write to a specific memory location. It is determined this virus is of no threat to the organization because they had the focresight to enable what feature on all endpoints?. Process isolation. Trusted Platform Module (TPM). Address Space Layout Randomization (ASLR). Virtualization.

Which of the following BEST represents a defense in depth concept?. Network-based data loss prevention (DLP), Network Access Control (NAC), networkbased Intrusion prevention system (NIPS), Port security on core switches. Host-based data loss prevention (DLP), Endpoint anti-malware solution, Host-based integrity checker, Laptop locks, hard disk drive (HDD) encryption. Endpoint security management, network intrusion detection system (NIDS), Network Access Control (NAC), Privileged Access Management (PAM), security information and event management (SIEM). Web application firewall (WAF), Gateway network device tuning, Database firewall, Next-Generation Firewall (NGFW), Tier-2 demilitarized zone (DMZ) tuning.

Which of the following is the MOST effective countermeasure against data remanence?. Destruction. Clearing. Purging. Encryption.

What is the BEST reason to include supply chain risks in a corporate risk register?. Risk registers help fund corporate supply chain risk management (SCRM) systems. Risk registers classify and categorize risk and allow risks to be compared to corporate risk appetite. Risk registers can be used to illustrate residual risk across the company. Risk registers allow for the transfer of risk to third parties.

What are the first two components of logical access control?. Confidentiality and authentication. Authentication and identification. Identification and confidentiality. Authentication and availability.

Information security practitioners are in the midst of implementing a new firewall. Which of the following failure methods would BEST prioritize security in the event of failure?. Fail-Closed. Fail-Open. Fail-Safe. Failover.

Report abuse