Data remanence refers to which of the following? A. The remaining photons left in a fiber optic cable after a secure transmission. B. The retention period required by law or regulation. C. The magnetic flux created when removing the network connection from a server or personal computer. D. The residual information left on magnetic storage media after a deletion or erasure.
Answer: D
Rationale: Data remanence means residual data left behind on magnetic media even after deletion or reformatting.
Question 282
Question 282
Which of the following is the MOST important element of change management documentation? A. List of components involved B. Number of changes being made C. Business case justification D. A stakeholder communication
Answer: C
Rationale: Every change must have a clearly defined and approved business justification to assess its necessity and risk.
Question 283
Question 283
Which of the following is a reason to use manual patch installation instead of automated patch management? A. The cost required to install patches will be reduced. B. The time during which systems will remain vulnerable to an exploit will be decreased. C. The likelihood of system or application incompatibilities will be decreased. D. The ability to cover large geographic areas is increased.
Answer: C
Rationale: Manual patching allows administrators to validate compatibility before applying changes.
Question 284
Question 284
If compromised, which of the following would lead to the exploitation of multiple virtual machines? A. Virtual device drivers B. Virtual machine monitor C. Virtual machine instance D. Virtual machine file system
Answer: B
Rationale: The virtual machine monitor (hypervisor) controls all guest OS instances, so compromise affects all.
Question 285
Question 285
After a thorough analysis, it was discovered that a perpetrator compromised a network by gaining access to the network through a Secure Socket Layer (SSL) Virtual Private Network (VPN) gateway. The perpetrator guessed a username and brute forced the password to gain access. Which of the following BEST mitigates this issue? A. Implement strong passwords authentication for VPN B. Integrate the VPN with centralized credential stores C. Implement an Internet Protocol Security (IPSec) client D. Use two-factor authentication mechanisms
Answer: D
Rationale: Two-factor authentication prevents compromise even when passwords are guessed or brute-forced.
Question 286
Question 286
A mobile device application that restricts the storage of user information to just that which is needed to accomplish lawful business goals adheres to what privacy principle? A. Onward transfer B. Collection Limitation C. Collector Accountability D. Individual Participation
Answer: B
Rationale: The Collection Limitation principle ensures only necessary personal data is gathered.
Question 287
Question 287
Which of the following PRIMARILY contributes to security incidents in web-based applications? A. Systems administration and operating systems B. System incompatibility and patch management C. Third-party applications and change controls D. Improper stress testing and application interfaces
Answer: C
Rationale: Third-party components and weak change controls commonly introduce vulnerabilities in web apps.
Question 288
Question 288
Which of the following is most helpful in applying the principle of LEAST privilege? A. Establishing a sandboxing environment B. Setting up a Virtual Private Network (VPN) tunnel C. Monitoring and reviewing privileged sessions D. Introducing a job rotation program
Answer: A
Rationale: Sandboxing restricts applications and users to minimal necessary privileges.
Question 289
Question 289
What is an important characteristic of Role Based Access Control (RBAC)? A. Supports Mandatory Access Control (MAC) B. Simplifies the management of access rights C. Relies on rotation of duties D. Requires two factor authentication
Answer: B
Rationale: RBAC simplifies administration by assigning permissions to roles instead of individual users.
Question 290
Question 290
Which of the following is the BIGGEST weakness when using native Lightweight Directory Access Protocol (LDAP) for authentication? A. Authorizations are not included in the server response B. Unsalted hashes are passed over the network C. The authentication session can be replayed D. Passwords are passed in cleartext
Which security approach will BEST minimize Personally Identifiable Information (PII) loss from a data breach? A. A strong breach notification process B. Limited collection of individuals' confidential data C. End-to-end data encryption for data in transit D. Continuous monitoring of potential vulnerabilities
Answer: B
Rationale: Reducing the amount of collected PII directly minimizes loss impact.
Question 292
Question 292
Which of the following are Systems Engineering Life Cycle (SELC) Technical Processes? A. Concept, Development, Production, Utilization, Support, Retirement B. Stakeholder Requirements Definition, Architectural Design, Implementation, Verification, Operation C. Acquisition, Measurement, Configuration Management, Production, Operation, Support D. Concept, Requirements, Design, Implementation, Production, Maintenance, Support, Disposal
Answer: B
Rationale: The SELC technical processes include requirement definition, design, implementation, verification, and operation.
Question 293
Question 293
Which of the following describes the BEST configuration management practice? A. After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering. B. After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering. C. The firewall rules are backed up to an air-gapped system. D. A baseline configuration is created and maintained for all relevant systems.
Answer: B
Rationale: The Data Owner determines the classification level and access requirements, while the Custodian implements the required controls. Governance responsibility lies with the Owner.
Question 294
Question 294
Which of the following is the PRIMARY security concern associated with the implementation of smart cards? A. The cards have limited memory B. Vendor application compatibility C. The cards can be misplaced D. Mobile code can be embedded in the card
Answer: C
Rationale: Lost or stolen smart cards can be used for unauthorized physical or logical access.
Question 295
Question 295
Retaining system logs for six months or longer can be valuable for what activities? A. Disaster recovery and business continuity B. Forensics and incident response C. Identity and authorization management D. Physical and logical access control
Answer: B
Rationale: Historical logs are crucial for forensic analysis and tracing incidents after they occur.
Question 296
Question 296
Secure Sockets Layer (SSL) encryption protects A. data at rest. B. the source IP address. C. data transmitted. D. data availability.
Answer: C
Rationale: SSL/TLS encrypts data in transit between endpoints to prevent eavesdropping and interception.
Question 297
Question 297
The implementation of which features of an identity management system reduces costs and administration overhead while improving audit and accountability? A. Two-factor authentication B. Single Sign-On (SSO) C. User self-service D. A metadirectory
Answer: C
Rationale: Allowing users to manage their own credentials and requests reduces admin effort and improves tracking.
Question 298
Question 298
Application of which of the following Institute of Electrical and Electronics Engineers (IEEE) standards will prevent an unauthorized wireless device from being attached to a network? A. IEEE 802.1F B. IEEE 802.1H C. IEEE 802.1Q D. IEEE 802.1X
Answer: D
Rationale: IEEE 802.1X enforces authentication for devices before network access is granted.
Question 299
Question 299
The PRIMARY security concern for handheld devices is the A. strength of the encryption algorithm. B. spread of malware during synchronization. C. ability to bypass the authentication mechanism. D. strength of the Personal Identification Number (PIN).
Answer: C
Rationale: Weak or bypassed authentication allows unauthorized access to sensitive data on mobile devices.
Question 300
Question 300
Software Code signing is used as a method of verifying what security concept? A. Integrity B. Confidentiality C. Availability D. Access Control
Answer: A
Rationale: Code signing ensures that software has not been tampered with and verifies its origin.