An international medical organization with headquarters in the United States (US) and branches in France wants to test a drug in both countries. What is the organization allowed to do with the test subject’s data? A. Aggregate it into one database in the US B. Process it in the US, but store the information in France C. Share it with a third party D. Anonymize it and process it in the US
Answer: C
Rationale: International privacy regulations may allow sharing anonymized data with authorized third parties.
Question 362
Question 362
Which of the following are important criteria when designing procedures and acceptance criteria for acquired software? A. Code quality, security, and origin B. Architecture, hardware, and firmware C. Data quality, provenance, and scaling D. Distributed, agile, and bench testing
Answer: A
Rationale: Evaluating software for quality, security, and origin ensures safe and reliable integration.
Question 363
Question 363
Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework? A. Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found. B. Maintaining segregation of duties. C. Standardized configurations for logging, alerting, and security metrics. D. Availability of security teams at the end of design process to perform last-minute manual audits and reviews.
Answer: B
Rationale: DevOps merges development and operations, making separation of duties harder to enforce.
Question 364
Question 364
Which of the following combinations would MOST negatively affect availability? A. Denial of Service (DoS) attacks and outdated hardware B. Unauthorized transactions and outdated hardware C. Fire and accidental changes to data D. Unauthorized transactions and denial of service attacks
Answer: A
Rationale: A DoS attack combined with aging hardware significantly impairs system availability.
Question 365
Question 365
Which of the following is the MOST efficient mechanism to account for all staff during a speedy nonemergency evacuation from a large security facility? A. Large mantrap where groups of individuals leaving are identified using facial recognition technology B. Radio Frequency Identification (RFID) sensors worn by each employee scanned by sensors at each exitdoor C. Emergency exits with push bars with coordinates at each exit checking off the individual against a predefined list D. Card-activated turnstile where individuals are validated upon exit
Answer: B
Rationale: RFID tags enable rapid, automated tracking of personnel movement during evacuation.
Question 366
Question 366
Which security modes is MOST commonly used in a commercial environment because it protects the integrity of financial and accounting data? A. Biba B. Graham-Denning C. Clark-Wilson D. Beil-LaPadula
Answer: C
Rationale: The Clark-Wilson model enforces integrity through well-formed transactions and separation of duties.
Question 367
Question 367
Which of the following is a benefit in implementing an enterprise Identity and Access Management (IAM) solution? A. Password requirements are simplified. B. Risk associated with orphan accounts is reduced. C. Segregation of duties is automatically enforced. D. Data confidentiality is increased.
Answer: A
Rationale: IAM centralizes and simplifies authentication, making password and user management more consistent.
Question 368
Question 368
When developing solutions for mobile devices, in which phase of the Software Development Life Cycle (SDLC) should technical limitations related to devices be specified? A. Implementation B. Initiation C. Review D. Development
Answer: A
Rationale: Technical limitations should be identified and addressed during implementation for proper adaptation.
Question 369
Question 369
The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover. Which access control mechanism would be preferred? A. Attribute Based Access Control (ABAC) B. Discretionary Access Control (DAC) C. Mandatory Access Control (MAC) D. Role-Based Access Control (RBAC)
Answer: D
Rationale: RBAC simplifies administration in dynamic environments by assigning permissions to roles, not individuals.
Question 370
Question 370
Which of the following methods of suppressing a fire is environmentally friendly and the MOST appropriate for a data center? A. Inert gas fire suppression system B. Halon gas fire suppression system C. Dry-pipe sprinklers D. Wet-pipe sprinklers
Answer: C
Rationale: Inert gas systems extinguish fires without harming equipment or the environment.
Question 371
Question 371
Which of the following is a common characteristic of privacy? A. Provision for maintaining an audit trail of access to the private data B. Notice to the subject of the existence of a database containing relevant credit card data C. Process for the subject to inspect and correct personal data on-site D. Database requirements for integration of privacy data
Answer: A
Rationale: Audit trails ensure transparency and accountability in personal data handling.
Question 372
Question 372
Which of the following is a responsibility of the information owner? A. Ensure that users and personnel complete the required security training to access the Information System (IS) B. Defining proper access to the Information System (IS), including privileges or access rights C. Managing identification, implementation, and assessment of common security controls D. Ensuring the Information System (IS) is operated according to agreed upon security requirements
Answer: C
Rationale: Information owners determine who can access data and establish related access control requirements.
Question 373
Question 373
Proven application security principles include which of the following? A. Minimizing attack surface area B. Hardening the network perimeter C. Accepting infrastructure security controls D. Developing independent modules
Answer: A
Rationale: Reducing the attack surface lowers potential vulnerabilities in application design.
Question 374
Question 374
Which type of test would an organization perform in order to locate and target exploitable defects? A. Penetration B. System C. Performance D. Vulnerability
Assessing a third party’s risk by counting bugs in the code may not be the best measure of an attack surface within the supply chain. Which of the following is LEAST associated with the attack surface? A. Input protocols B. Target processes C. Error messages D. Access rights
Answer: C
Rationale: Error messages are outputs, not direct entry points for attacks, and don’t define the system’s attack surface.
Question 376
Question 376
What is the second step in the identity and access provisioning lifecycle? A. Provisioning B. Review C. Approval D. Revocation
Answer: B
Rationale: After provisioning, periodic review validates that access remains appropriate and necessary.
Question 377
Question 377
Which of the following is the MOST challenging issue in apprehending cyber criminals? A. They often use sophisticated method to commit a crime. B. It is often hard to collect and maintain integrity of digital evidence. C. The crime is often committed from a different jurisdiction. D. There is often no physical evidence involved.
Answer: B
Rationale: Non-repudiation is achieved with asymmetric encryption (digital signatures) ensuring sender authenticity and integrity verification.
Question 378
Question 378
Which of the following MUST be scalable to address security concerns raised by the integration of third-party identity services? A. Mandatory Access Controls (MAC) B. Enterprise security architecture C. Enterprise security procedures D. Role Based Access Controls (RBAC)
Answer: D
Rationale: RBAC must scale to accommodate federated identities and third-party access structures.
Question 379
Question 379
At a MINIMUM, audits of permissions to individual or group accounts should be scheduled A. annually B. to correspond with staff promotions C. to correspond with terminations D. continually
Answer: A
Rationale: Annual audits ensure user access remains aligned with roles and security policies.
Question 380
Question 380
Which Identity and Access Management (IAM) process can be used to maintain the principle of least privilege? A. identity provisioning B. access recovery C. multi-factor authentication (MFA) D. user access review
Answer: A
Rationale: Identity provisioning defines and enforces the minimum necessary access rights.