option
Questions
ayuda
daypo
search.php

Key Principles

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Key Principles

Description:
DEZCRIPTIEON on Topic

Creation Date: 2025/09/09

Category: Others

Number of questions: 30

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Defense in Depth concept is best described as: Relying on a single, strong barrier to protect assets. Layering multiple independent security controls across people, processes, and technology. Focusing security exclusively on perimeter defenses. Encrypting data at rest only.

The Least Privilege principle means: Granting admin rights to most users so they don’t ask for access. Providing the minimum privileges necessary to perform the job, with just-in-time access where feasible. Requiring users to argue for higher privileges every time. Assigning the same access level to all roles.

Fail Safe (Secure Failure Mode) principle implies that when a component fails, the system should: Continue operation with degraded performance. Fail open to minimize downtime. Fail to a secure state (deny or restrict), preserving safety and integrity. Automatically reboot to restore service.

Zero Trust is best summarized by: Trusting internal networks by default after initial authentication. Never trust, always verify — continuous verification and authorization for access decisions. Only verifying users at first login and then granting broad access. Removing all access to cloud resources.

Separation of Duties (SoD) primarily aims to prevent: Operational bottlenecks by consolidating tasks. Fraud and error by requiring that critical steps be performed by different individuals. Compliance issues by creating more paperwork. Scalability problems by splitting responsibilities among teams.

Input Validation most effectively mitigates risks by: Allowing all inputs and sanitizing them downstream. Applying a blacklist to reject known bad inputs only. Applying a whitelist/allowlist approach (positive security model) to accept only valid input. Ignoring user input unless a manual review is required.

Output Encoding is a core XSS prevention technique because it: Encrypts all user-generated content before rendering. Encodes data based on the target rendering context (HTML, JavaScript, URL, CSS, etc.) before outputting it. Uses a strict content-type header only. Relies on client-side JavaScript to sanitize content after rendering.

Parameterized Queries are a SQL injection prevention method because they: Build SQL statements by concatenating user input. Use prepared statements with bound parameters, separating code from data. Execute every query in a stored procedure without user input. Validate input solely on the client side.

In a modern web application, a defense-in-depth approach typically includes: Perimeter firewall only. Identity and access management, network segmentation, application controls, data encryption, logging/monitoring, and incident response. Only antivirus software on endpoints. A single security policy applied uniformly without context.

In Zero Trust architecture, access decisions are typically made: Only at the point of initial login. At the network edge and once a user is inside the network. Continuously, close to the resource, using context such as identity, device posture, and risk signals. Only after a security incident has been detected.

A common SoD pattern for financial processing is: The same person initiates, approves, and reconciles a transaction. Initiation and approval are performed by different individuals; reconciliation is independent. No checks are needed if the system is trusted. All steps happen automatically with no human oversight.

For web applications, combining input validation, output encoding, and safe data handling helps primarily to: Increase application performance. Reduce the surface area for injection and scripting attacks and improve data integrity. Obscure security weaknesses from users. Replace the need for authentication.

Defense in Depth: In a multi-tenant cloud platform, misconfiguring the API gateway policy to be overly permissive changes the security posture how?. The misconfiguration makes all other controls irrelevant. It completely eliminates the need for defense in depth. It increases residual risk, but other layers still reduce risk. It only affects performance, not security.

Least Privilege: A data ingestion service account needs to read from a raw-events dataset and write to an ingested-events dataset. Which approach best implements least privilege?. Grant read/write access to both datasets for the service account. Grant only minimal, dataset-scoped read plus write, with short-lived credentials or Just-In-Time elevation. Use a single shared admin account for all data jobs. Create a new elevated role for every deployment.

Fail Safe: A critical payment gateway microservice is failing due to a downstream dependency outage. Which behavior aligns with a secure fail-safe default?. Continue processing and retry indefinitely. Fail open and return a generic error to maximize throughput. Fail to a secure state: deny the operation, return a safe error, route to a degraded but secure path, and alert operators. Halt all services globally until manual intervention.

Zero Trust: For a microservices platform, which pattern best embodies continuous verification near the resource?. Trust resources after initial authentication and grant broad access. Continuous, context-aware authorization with identity, device posture, risk signals, short-lived credentials, and micro-segmentation. Verify only at network egress. Use a single long-lived token for all internal calls.

Separation of Duties: In a high-risk financial operation (e.g., large fund transfer), which SoD arrangement minimizes fraud risk?. One person initiates, approves, and reconciles the transfer. Initiation and approval by different individuals; reconciliation by an independent, segregated team; all actions logged and auditable. All steps automated with no human oversight. Approvals bypassed for transactions under threshold.

For a sensitive API accepting a numeric age field (0–120) in JSON, which approach best ensures robust validation?. Only validate on the client side. Validate on the server side with strict numeric type checks and range constraints; return generic errors to the client. Accept any numeric-looking value and handle validation later in business logic. Validate by simple length checks and ignore type.

Output Encoding: A user-supplied string is rendered as innerText inside a div. Which encoding is required to prevent XSS in this scenario?. HTML entity encoding sufficient for content rendering. No encoding needed because innerText escapes. JavaScript escaping only. CSS escaping only.

Output Encoding: A user-supplied string is used as the value of an HTML attribute (e.g., title="..."). Which encoding is correct?. HTML content escaping (text context). HTML attribute context escaping (quotes and special characters). JavaScript escaping. URL encoding.

Parameterized Queries: Which statement about parameterized queries is NOT correct?. They separate code from data, reducing injection risk for values. They can be used to bind identifiers (e.g., column names) safely. They work well with LIKE patterns when wildcards are included in the bound value or SQL. They are less effective if dynamic SQL concatenates user input into the query string for identifiers.

Parameterized Queries / Edge Cases: How should you implement a substring search with a parameterized query in a typical SQL database?. Concatenate wildcards directly into the SQL string and bind the user input as a parameter. Bind the user input as a parameter and include wildcards in the SQL string (e.g., LIKE '%' || ? || '%'). Use a stored procedure with dynamic SQL for the pattern. Do not use parameterized queries for LIKE pattern.

Zero Trust: Which of the following best supports the Zero Trust principle in a cloud-native environment?. Relying on a strong perimeter firewall to block external access. Identity-driven access control, device posture checks, micro-segmentation, short-lived credentials, and continuous risk-based authorization. Using a single SSO token that never expires. Trusting internal network by default after initial login.

Separation of Duties: Which scenario demonstrates a proper SoD design for a payroll cycle?. The same person processes payroll initiation, approvals, and disbursement. Initiation by one person, approval by a different person, and reconciliation by a separate independent team; all actions are audited. All steps fully automated with no human oversight. Approval is skipped if the amount is below threshold.

Input Validation: In an API that accepts JSON payloads, which approach best ensures robust validation and security?. Use a schema (e.g., OpenAPI/JSON Schema) for type validation and constraints, plus server-side enforcement; include rate limiting and input sanitation where appropriate. ely solely on client-side validation for UX. alidate only after business logic processes the data. Permit any payload and reject only when an error occurs in the database.

Output Encoding: Which statement is true about context-aware output encoding?. Always HTML-escape data, regardless of rendering context. Escape data according to the final rendering context (HTML content, HTML attribute, JavaScript, URL, CSS) and avoid double-encoding. Encoding is unnecessary if you validate input. Encoding only matters for HTML, not JavaScript or CSS.

Defense in Depth: Which of the following best reflects risk-based layering in a Defense in Depth strategy?. Add as many controls as possible regardless of cost. Implement a balanced mix of controls across people, process, and technology based on risk, cost, and usability, with monitoring and feedback. Focus only on encryption and authentication. Rely solely on automated detection with no human oversight.

Evaluation: Which of the following statements about “least privilege with elevation” is most accurate?. Elevation should be permanent for a user who occasionally needs higher rights. Elevation should be time-bound, auditable, and require justification and approval, with automatic revocation. Elevation bypasses all controls if the user is trusted. Elevation should be requested via email once per quarter.

Zero Trust / Kubernetes: In a Kubernetes-based microservices environment, which combination best enforces Zero Trust for inter-service calls?. IP-based allowlists at the cluster edge only. Mutual TLS between services, short-lived service identities, and a policy engine enforcing per-call authorization. Rely solely on RBAC at the Kubernetes level. Use a single cluster-wide service account with broad permissions.

Edge Case—Dynamic Sorting with Parameterized Queries: You expose an API that allows clients to sort results by a column chosen at runtime. Which safe approach preserves flexibility and prevents injection?. Build ORDER BY by concatenating the user-provided column name after validation. Validate the column name against a whitelist and map to a fixed column in ORDER BY; do not directly interpolate user input. Bind the column name as a parameter. Use dynamic SQL with the user input interpolated.

Report abuse