Question 181
Question 181
Which technique evaluates secure design principles of network or software architectures?
A. Risk modeling
B. Threat modeling
C. Fuzzing
D. Waterfall method
Question 181
Which technique evaluates secure design principles of network or software architectures?
A. Risk modeling
B. Threat modeling
C. Fuzzing
D. Waterfall method
Question 182
How does RFID assist with asset management?
A. Uses biometric identification
B. Uses two-factor authentication
C. Transmits unique MAC addresses wirelessly
D. Transmits unique serial numbers wirelessly
Question 183
What is the MOST effective strategy to prevent an attacker from disabling a network?
A. Test DR plans
B. Design adaptive and failover networks
C. Implement segmentation
D. Follow security guidelines to prevent unauthorized access
Question 184
Who should perform the design review to uncover security design flaws in the SDLC?
A. Business owner
B. Security SME
C. Application owner
D. Developer SME
Question 185
At which phase of the software assurance life cycle should software acquisition risks be identified?
A. Follow-on phase
B. Planning phase
C. Monitoring and acceptance phase
D. Contracting phase
Question 186
How should the retention period for social media content be defined?
A. Wireless Access Points
B. Token-based authentication
C. Host-based firewalls
D. Trusted platforms
Question 187
A SaaS web app requires temporary access to logs during transition. Which privileges are MOST suitable?
A. OS administrative
B. Web server administrative
C. Application privileges on the hypervisor
D. Administrative privileges on the application folders
Question 188
Which of the following actions will reduce risk to a laptop before traveling to a high risk area?
A. Examine the device for physical tampering
B. Implement more stringent baseline configurations
C. Purge or re-image the hard disk drive
D. Change access codes
Question 189
Intellectual property rights are PRIMARY concerned with which of the following?
A. Owner’s ability to realize financial gain
B. Owner’s ability to maintain copyright
C. Right of the owner to enjoy their creation
D. Right of the owner to control delivery method
Question 190
Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?
A. Install mantraps at the building entrances
B. Enclose the personnel entry area with polycarbonate plastic
C. Supply a duress alarm for personnel exposed to the public
D. Hire a guard to protect the public area
Question 191
Which one of the following affects the classification of data?
A. Assigned security label
B. Multilevel Security (MLS) architecture
C. Minimum query size
D. Passage of time
Question 192
Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?
A. Common Vulnerabilities and Exposures (CVE)
B. Common Vulnerability Scoring System (CVSS)
C. Asset Reporting Format (ARF)
D. Open Vulnerability and Assessment Language (OVAL)
Question 193
The use of private and public encryption keys is fundamental in the implementation of which of the following?
A. Diffie-Hellman algorithm
B. Secure Sockets Layer (SSL)
C. Advanced Encryption Standard (AES)
D. Message Digest 5 (MD5)
Question 194
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
A. Implementation Phase
B. Initialization Phase
C. Cancellation Phase
D. Issued Phase
Question 195
Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?
A. Packet filtering
B. Port services filtering
C. Content filtering
D. Application access control
Question 196
An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?
A. Implement packet filtering on the network firewalls
B. Install Host Based Intrusion Detection Systems (HIDS)
C. Require strong authentication for administrators
D. Implement logical network segmentation at the switches
Question 197
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?
A. Link layer
B. Physical layer
C. Session layer
D. Application layer
Question 198
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?
A. Host VM monitor audit logs
B. Guest OS access controls
C. Host VM access controls
D. Guest OS audit logs
Question 199
In which of the following programs is it MOST important to include the collection of security process data?
A. Quarterly access reviews
B. Security continuous monitoring
C. Business continuity testing
D. Annual security training
Question 200
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?
A. Guaranteed recovery of all business functions
B. Minimization of the need decision making during a crisis
C. Insurance against litigation following a disaster
D. Protection from loss of organization resources