Which of the following technologies can be used to monitor and dynamically respond to potential threats on web applications? A. Field-level tokenization B. Web application vulnerability scanners C. Runtime application self-protection (RASP) D. Security Assertion Markup Language (SAML)
Answer: C
Rationale: RASP operates inside the application, monitoring behavior at runtime and automatically blocking attacks—providing dynamic, real-time protection.
Question 442
Question 442
A security architect is developing an information system for a client. One of the requirements is to deliver a platform that mitigates against common vulnerabilities and attacks. What is the MOST efficient option used to prevent buffer overflow attacks? A. Access control mechanisms B. Process isolation C. Address Space Layout Randomization (ASLR) D. Processor states
Answer: C
Rationale: ASLR randomizes memory address space, making it significantly harder for attackers to predict and exploit memory locations during buffer overflow attacks.
Question 443
Question 443
In a quarterly system access review, an active privileged account was discovered that did not exist in the prior review on the production system. The account was created one hour after the previous access review. Which of the following is the BEST option to reduce overall risk in addition to quarterly access reviews? A. Implement bi-annual reviews B. Create policies for system access C. Implement and review risk-based alerts D. Increase logging levels
Answer: C
Rationale: Risk-based alerts (UEBA/SIEM) detect abnormal account creation in real-time, catching unauthorized privileged accounts immediately instead of waiting for quarterly reviews.
Question 444
Question 444
A corporation does not have a formal data destruction policy. During which phase of a criminal legal proceeding will this have the MOST impact? A. Sentencing B. Trial C. Discovery D. Arraignment
Answer: C
Rationale: During discovery, both sides must present relevant information and evidence. Without a destruction policy, data retention and deletion may appear negligent or spoliated, harming legal credibility.
Question 445
Question 445
What is considered the BEST explanation when determining whether to provide remote network access to a third-party security service? A. Contract negotiation B. Supplier request C. Business need D. Vendor demonstration
Answer: A
Rationale: Remote access must be formally established through contract negotiation to define the scope, controls, monitoring, and responsibilities — not based on ad hoc requests.
Question 446
Question 446
The acquisition of personal data being obtained by a lawful and fair means is an example of what principle? A. Collection Limitation Principle B. Openness Principle C. Purpose Specification Principle D. Data Quality Principle
Answer: A
Rationale: Under privacy frameworks such as OECD or GDPR, the Collection Limitation Principle ensures that data collection occurs only through lawful and fair means with consent where applicable.
Question 447
Question 447
Which of the following is the MOST appropriate control for asset data labeling procedures? A. Categorizing the types of media being used B. Logging data media to provide a physical inventory control C. Reviewing off-site storage access controls D. Reviewing audit trails of logging records
Answer: A
Rationale: Labeling depends on identifying the type of media and its sensitivity (e.g., “Confidential,” “Public”). This categorization ensures the proper labeling and handling of data assets.
Question 448
Question 448
What is the BEST approach to anonymizing personally identifiable information (PII) in a test environment? A. Swapping data B. Randomizing data C. Encoding data D. Encrypting data
Answer: B
Rationale: Randomization (data anonymization) permanently removes the link to the original identity. Encryption is reversible and therefore does NOT anonymize data.
Question 449
Question 449
Which of the following departments initiates the request, approval, and provisioning business process? A. Operations B. Security C. Human resources (HR) D. Information technology (IT)
Answer: C
Rationale: HR initiates onboarding/offboarding and is the authoritative source for provisioning and deprovisioning user access.
Question 450
Question 450
An organization is setting a security assessment scope with the goal of developing a Security Management Program (SMP). The next step is to select an approach for conducting the risk assessment. Which of the following approaches is MOST effective for the SMP? A. Security controls–driven assessment B. Business process–based risk assessment C. Asset-driven assessment D. Data-driven assessment
Answer: B
Rationale: Security management programs must align with business goals and processes. Business-process-based risk assessment ensures security supports core operations.
Question 451
Question 451
Which technique helps system designers consider potential security concerns of their systems and applications? A. Threat modeling B. Manual inspections and reviews C. Source code review D. Penetration testing
Answer: A
Rationale: Threat modeling is performed during system design to identify potential attack paths and define security requirements early in development.
Question 452
Question 452
A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in place? A. Network segmentation B. Blacklisting application C. Whitelisting application D. Hardened configuration
Answer: D
Rationale: COTS software often includes unnecessary features and configurations that may create vulnerabilities. Implementing a hardened configuration ensures only the required functions, ports, and services are enabled, reducing attack surface.
Question 453
Question 453
Which of the following BEST describes centralized identity management? A. Service providers perform as both the credential and identity provider (IdP). B. Service providers identify an entity by behavioral analysis versus an identification factor. C. Service providers agree to integrate identity system recognition across organizational boundaries. D. Service providers rely on a trusted third party (TTP) to provide requestors with both credentials and identifiers.
Answer: C
Rationale: Centralized identity management allows multiple systems and organizations to recognize and trust shared identities across domains — a principle achieved by integrated identity system recognition.
Question 454
Question 454
What is the MOST significant benefit of role-based access control (RBAC)? A. Reduces inappropriate access B. Management of least privilege C. Most granular form of access control D. Reduction in authorization administration overhead
Answer: D
Rationale: RBAC ties permissions to roles instead of individuals, which simplifies authorization management and significantly reduces administrative overhead when users change positions or projects.
Question 455
Question 455
What is the MOST common security risk of a mobile device? A. Data spoofing B. Malware infection C. Insecure communications link D. Data leakage
Answer: D
Rationale: CISSP identifies data leakage as the most prevalent mobile risk due to lost devices, misconfigured apps, cloud syncing, and insecure storage of sensitive data.
Question 456
Question 456
What level of Redundant Array of Independent Disks (RAID) is configured PRIMARILY for high-performance data reads and writes? A. RAID-0 B. RAID-1 C. RAID-5 D. RAID-6
Answer: A
Rationale: RAID-0 (striping) provides high-speed performance by splitting data evenly across multiple drives, though it offers no redundancy — prioritizing speed over fault tolerance.
Question 457
Question 457
What type of risk is related to the sequences of value-adding and managerial activities undertaken in an organization? A. Control risk B. Demand risk C. Supply risk D. Process risk
Answer: D
Rationale: Process risk arises from failures in internal procedures, systems, or operations that affect business processes or value creation. It focuses on inefficiencies or breakdowns in workflow execution.
Question 458
Question 458
International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of the following? A. International Traffic in Arms Regulations (ITAR) B. Palermo convention C. Wassenaar arrangement D. General Data Protection Regulation (GDPR)
Answer: C
Rationale: The Wassenaar Arrangement is an international export control regime that covers dual-use technologies and software — including cyber tools and surveillance systems — to prevent misuse.
Question 459
Question 459
An organization has implemented a protection strategy to secure the network from unauthorized external access. The new Chief Information Security Officer (CISO) wants to increase security by better protecting the network from unauthorized internal access. Which Network Access Control (NAC) capability BEST meets this objective? A. Port security B. Two-factor authentication (2FA) C. Strong passwords D. Application firewall
Answer: B
Rationale: Two-factor authentication (2FA) enhances internal network protection by requiring multiple verification factors before granting access, thereby preventing insider or compromised-credential attacks.
Question 460
Question 460
Which section of the assessment report addresses separate vulnerabilities, weaknesses, and gaps? A. Findings definition section B. Risk review section C. Executive summary with full details D. Key findings section
Answer: D
Rationale: The Key Findings section highlights critical vulnerabilities, deficiencies, and areas for improvement — serving as the core of a security assessment’s actionable results.