To protect auditable information, which of the following MUST be configured to only allow read access?
Sensitive customer data is going to be added to a database. What is the MOST effective implementation for ensuring data privacy?
What type of encryption is used to protect sensitive data in transit over a network?
Which of the following entities is ultimately accountable for data remanence vulnerabilities with data replicated by a cloud service provider?
An organization has developed a major application that has undergone accreditation testing. After receiving the results of the evaluation, what is the final step before the application can be accredited?
Which Web Services Security (WS-Security) specification negotiates how security tokens will be issued, renewed and validated? Click on the correct specification in the image below.
What is the MOST efficient way to secure a production program and its data?
Which of the following is the FIRST step an organization's security professional performs when defining a cyber-security program based upon industry standards?
The application of which of the following standards would BEST reduce the potential for data breaches?
Which of the following is the MOST effective method of mitigating data theft from an active user workstation?
In software development, developers should use which type of queries to prevent a Structured Query Language (SQL) injection?
In order to provide dual assurance in a digital signature system, the design MUST include which of the following?
Which of the following statements is TRUE regarding value boundary analysis as a functional software testing technique?
What is the PRIMARY goal for using Domain Name System Security Extensions (DNSSEC) to sign records?
Refer to the information below to answer the question.
Desktop computers in an organization were sanitized for re-use in an equivalent security environment. The data was destroyed in accordance with organizational policy and all marking and other external indications of the sensitivity of the data that was formerly stored on the magnetic drives were removed.
After magnetic drives were degaussed twice according to the product manufacturer's directions, what is the MOST LIKELY security issue with degaussing?
What is the FIRST step in reducing the exposure of a network to Internet Control Message Protocol (ICMP) based attacks?
The Chief Information Security Officer (CISO) is concerned about business application availability. The organization was recently subject to a ransomware attack that resulted in the unavailability of applications and services for 10 working days that required paper-based running of all main business processes. There are now aggressive plans to enhance the Recovery Time Objective (RTO) and cater for more frequent data captures. Which of the following solutions should be implemented to fully comply to the new business requirements?
The security organization is looking for a solution that could help them determine with a strong level of confidence that attackers have breached their network. Which solution is MOST effective at discovering a successful network breach?
What component of a web application that stores the session state in a cookie can be bypassed by an attacker?
Refer to the information below to answer the question.
In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files.
Which of the following is true according to the star property (*property)?
In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?
An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?
Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?
An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?
Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?
When implementing a data classification program, why is it important to avoid too much granularity?
Which of the following assures that rules are followed in an identity management architecture?
Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?
Which of the following BEST describes the responsibilities of a data owner?
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?
Which of the following is an initial consideration when developing an information security management system?
Which of the following is MOST important when assigning ownership of an asset to a department?
An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth. The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations and has a backlog of account management requests.
Which contract is BEST in offloading the task from the IT staff?
Which of the following is used to support the of defense in depth during development phase of a software product?
What is the BEST approach for maintaining ethics when a security professional is
unfamiliar with the culture of a country and is asked to perform a questionable task?
A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?
When designing a networked Information System (IS) where there will be several different types of individual access, what is the FIRST step that should be taken to ensure all access control requirements are addressed?
What is one way to mitigate the risk of security flaws in custom software?
Which of the following could cause a Denial of Service (DoS) against an authentication system?
Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?
Which of the following is a BEST practice when traveling internationally with laptops containing Personally Identifiable Information (PII)?
Which of the following initiates the systems recovery phase of a disaster recovery plan?
Which of the following is the primary advantage of segmenting Virtual Machines (VM) using physical networks?
A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C. The program is not working as expected. What is the MOST probable security feature of Java preventing the program from operating as intended?
The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle (SDLC)?
Which of the following is a PRIMARY advantage of using a third-party identity service?
What principle requires that changes to the plaintext affect many parts of the ciphertext?
Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?
A continuous information security monitoring program can BEST reduce risk through which of the following?
An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?
Which of the following represents the GREATEST risk to data confidentiality?
When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?
All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that
A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?
Which of the following is a web application control that should be put into place to prevent exploitation of Operating System (OS) bugs?
What is the BEST approach to addressing security issues in legacy web applications?
Which of the following is used to ensure that data mining activities Will NOT reveal sensitive data?
Which of the following is of GREATEST assistance to auditors when reviewing system configurations?
Which of the following is an essential element of a privileged identity lifecycle management?
A software scanner identifies a region within a binary image having high entropy. What does this MOST likely indicate?
Which of the following is the MAIN reason that system re-certification and re-accreditation are needed?
What are the three key benefits that application developers should derive from the northbound application programming interface (API) of software defined networking
(SDN)?
The BEST method of demonstrating a company's security level to potential customers is
When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include
Which one of the following is a threat related to the use of web-based client side input validation?
Which of the following is an attacker MOST likely to target to gain privileged access to a system?
Following the completion of a network security assessment, which of the following can BEST be demonstrated?
Which one of the following is a fundamental objective in handling an incident?
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?
Who should perform the design review to uncover security design flaws as part of the Software Development Life Cycle (SDLC)?
Which of the following is considered the FIRST step when designing an internal security control assessment?
Refer to the information below to answer the question.
During the investigation of a security incident, it is determined that an unauthorized individual accessed a system which hosts a database containing financial information.
If it is discovered that large quantities of information have been copied by the unauthorized individual, what attribute of the data has been compromised?
Which of the following is the FIRST step in the incident response process?
Refer to the information below to answer the question.
A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns.
In the plan, what is the BEST approach to mitigate future internal client-based attacks?
What is the PRIMARY reason for ethics awareness and related policy implementation?
Which of the following MUST system and database administrators be aware of and apply when configuring systems used for storing personal employee data?
Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
Which of the following media sanitization techniques is MOST likely to be effective for an organization using public cloud services?
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?
Which of the following is the BEST method to prevent malware from being introduced into a production environment?
What is an effective practice when returning electronic storage media to third parties for repair?
Intellectual property rights are PRIMARY concerned with which of the following?
Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?
In which of the following programs is it MOST important to include the collection of security process data?
Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?
What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?
Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual employee’s salary?
A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is the BEST solution for the manufacturing organization?
Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices?
Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?
Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?
Who in the organization is accountable for classification of data information assets?
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?
The use of private and public encryption keys is fundamental in the implementation of which of the following?
A vulnerability in which of the following components would be MOST difficult to detect?
Match the access control type to the example of the control type.
Drag each access control type net to its corresponding example.
A user sends an e-mail request asking for read-only access to files that are not considered sensitive. A Discretionary Access Control (DAC) methodology is in place. Which is the MOST suitable approach that the administrator should take?
An organization regularly conducts its own penetration tests. Which of the following scenarios MUST be covered for the test to be effective?
What is a characteristic of Secure Socket Layer (SSL) and Transport Layer Security (TLS)?
When building a data classification scheme, which of the following is the PRIMARY concern?
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?
What is considered the BEST explanation when determining whether to provide remote network access to a third-party security service?
Which of the following MUST the administrator of a security information and event management (SIEM) system ensure?
Which of the following uses the destination IP address to forward packets?
Which of the following is the BEST way to protect against Structured Query language (SQL) injection?
Which of the following actions will reduce risk to a laptop before traveling to a high risk area?
Which of the following authorization standards is built to handle Application programming Interface (API) access for federated Identity management (FIM)?
With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?
Refer to the information below to answer the question.
A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns.
What is the BEST reason for the organization to pursue a plan to mitigate client-based attacks?
Refer to the information below to answer the question.
A large, multinational organization has decided to outsource a portion of their Information Technology (IT) organization to a third-party provider’s facility. This provider will be responsible for the design, development, testing, and support of several critical, customer-based applications used by the organization.
The third party needs to have
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?
What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?
Refer to the information below to answer the question.
During the investigation of a security incident, it is determined that an unauthorized individual accessed a system which hosts a database containing financial information.
Aside from the potential records which may have been viewed, which of the following should be the PRIMARY concern regarding the database information?
Which of the following MOST influences the design of the organization's electronic monitoring policies?
What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?
employee training, risk management, and data handling procedures and policies could be characterized as which type of security measure?