A web developer is completing a new web application security checklist before releasing the application to production. The task of disabling unnecessary services is on the checklist. Which web application threat is being mitigated by this action? A. Session hijacking B. Security misconfiguration C. Broken access control D. Sensitive data exposure
Answer: B
Rationale: Disabling unneeded services and tightening configurations addresses security misconfiguration, one of the OWASP Top 10 vulnerabilities that increases attack exposure.
Question 482
Question 482
What is the BEST method to use for assessing the security impact of acquired software? A. Threat modeling B. Common vulnerability review C. Software security compliance validation D. Vendor assessment
Answer: A
Rationale: Threat modeling proactively evaluates how newly acquired software could be exploited within your environment, identifying attack vectors and security gaps before integration.
Question 483
Question 483
Which of the following ensures old log data is not overwritten? A. Log retention B. Implement Syslog C. Increase log file size D. Log preservation
Answer: A
Rationale: A defined log retention policy ensures logs are archived, rotated, and preserved according to organizational requirements, preventing them from being overwritten. Increasing file size only delays overwriting but does not prevent it.
Question 484
Question 484
Under the General Data Protection Regulation (GDPR), what is the maximum amount of time allowed for reporting a personal data breach? A. 24 hours B. 48 hours C. 72 hours D. 96 hours
Answer: C
Rationale: GDPR mandates that data controllers notify the supervisory authority within 72 hours of becoming aware of a personal data breach, unless unlikely to result in risk.
Question 485
Question 485
A financial organization that works according to agile principles has developed a new application for their external customer base to request a line of credit. A security analyst has been asked to assess the security risk of the minimum viable product (MVP). Which is the MOST important activity the analyst should assess? A. The software has been signed off for release by the product owner. B. The software had been branded according to corporate standards. C. The software has the correct functionality. D. The software has been code reviewed.
Answer: D
Rationale: Code review is critical to identify vulnerabilities and logic flaws early in agile releases. It ensures the MVP meets secure coding practices before wider deployment.
Question 486
Question 486
An application developer receives a report back from the security team showing their automated tools were able to successfully enter unexpected data into the organization’s customer service portal, causing the site to crash. This is an example of which type of testing? A. Performance B. Positive C. Non-functional D. Negative
Answer: D
Rationale: Negative testing checks how software behaves under invalid, unexpected, or malicious input, revealing weaknesses in input validation or error handling.
Question 487
Question 487
Which of the following is the MOST effective strategy to prevent an attacker from disabling a network? A. Design networks with the ability to adapt, reconfigure, and fail over. B. Test business continuity and disaster recovery (DR) plans. C. Follow security guidelines to prevent unauthorized network access. D. Implement network segmentation to achieve robustness.
Answer: A
Rationale: Resilient network design—including redundancy, failover paths, adaptive routing, and reconfigurable infrastructure—prevents attackers from disabling the network. Access control does not stop attacks that target availability, such as DDoS or link disruption.
Question 488
Question 488
What is the FIRST step that should be considered in a Data Loss Prevention (DLP) program? A. Policy creation B. Information Rights Management (IRM) C. Data classification D. Configuration management (CM)
Answer: C
Rationale: Data classification identifies and categorizes sensitive data (e.g., confidential, internal, public), forming the foundation for implementing effective DLP policies and controls.
Question 489
Question 489
Which change management role is responsible for the overall success of the project and supporting the change throughout the organization? A. Change driver B. Project manager C. Program sponsor D. Change implementer
Answer: C
Rationale: The program sponsor provides organizational authority, strategic alignment, resources, and executive support. They are responsible for ensuring the success of major change initiatives across the entire organization.
Question 490
Question 490
A company needs to provide shared access of sensitive data on a cloud storage to external business partners. Which of the following identity models is the BEST to blind identity providers (IdP) and relying parties (RP) so that subscriber lists of other parties are not disclosed? A. Proxied federation B. Dynamic registration C. Federation authorities D. Static registration
Answer: C
Rationale: Federation authorities act as trusted intermediaries managing authentication between IdPs and RPs without revealing subscriber details — maintaining privacy across entities.
Question 491
Question 491
A security professional needs to find a secure and efficient method of encrypting data on an endpoint. Which solution includes a root key? A. Bitlocker B. Trusted Platform Module (TPM) C. Virtual storage array network (VSAN) D. Hardware security module (HSM)
Answer: B
Rationale: The TPM securely stores root encryption keys within the device hardware, enabling strong endpoint encryption like BitLocker without exposing master keys to the OS.
Question 492
Question 492
Which combination of cryptographical algorithms are compliant with Federal Information Processing Standard (FIPS) Publication 140-2 for non-legacy systems? A. Diffie-Hellman (DH) key exchange: DH (>=2048 bits) Symmetric Key: Advanced Encryption Standard (AES) >128 bits Digital Signature: Digital Signature Algorithm (DSA) (>=2048 bits) B. Diffie-Hellman (DH) key exchange: DH (>=2048 bits) Symmetric Key: Advanced Encryption Standard (AES) >128 bits Digital Signature: Rivest-Shamir-Adleman (RSA) (1024 bits) C. Diffie-Hellman (DH) key exchange: DH (<=1024 bits) Symmetric Key: Blowfish Digital Signature: Rivest-Shamir-Adleman (RSA) (>=2048 bits) D. Diffie-Hellman (DH) key exchange: DH (>=2048 bits) Symmetric Key: Advanced Encryption Standard (AES) <128 bits Digital Signature: Elliptic Curve Digital Signature Algorithm (ECDSA) (>=256 bits)
Answer: B
Rationale: FIPS 140-2 specifies strong, validated algorithms such as AES (>128 bits), DH (≥2048 bits), and RSA (≥1024 bits) for secure key exchange and digital signatures.
Question 493
Question 493
What is the PRIMARY purpose of creating and reporting metrics for a security awareness, training, and education program? A. Measure the effect of the program on the organization’s workforce. B. Make all stakeholders aware of the program’s progress. C. Facilitate supervision of periodic training events. D. Comply with legal regulations and document due diligence in security practices.
Answer: A
Rationale: The goal of metrics is to measure behavior change and awareness improvements among employees — ensuring training effectiveness, not just participation tracking.
Question 494
Question 494
In a DevOps environment, which of the following actions is MOST necessary to have confidence in the quality of the changes being made? A. Prepare to take corrective actions quickly. B. Automate functionality testing. C. Review logs for any anomalies. D. Receive approval from the change review board.
Answer: B
Rationale: DevOps relies on continuous integration and automated testing to ensure rapid, consistent validation of code quality. Manual approval processes such as CRBs slow down development and are not aligned with DevOps principles.
Question 495
Question 495
What is the MAIN purpose of a security assessment plan? A. Provide education to employees on security and privacy, to ensure their awareness on policies and procedures. B. Provide the objectives for the security and privacy control assessments and a detailed roadmap of how to conduct such assessments. C. Provide guidance on security requirements, to ensure the identified security risks are properly addressed based on the recommendation. D. Provide technical information to executives to help them understand information security postures and secure funding.
Answer: B
Rationale: A security assessment plan (SAP) defines objectives, scope, methodology, and criteria for conducting assessments — ensuring consistent and measurable evaluations.
Question 496
Question 496
What documentation is produced FIRST when performing an effective physical loss control process? A. Deterrent controls list B. Security standards list C. Asset valuation list D. Inventory list
Answer: D
Rationale: Physical loss control begins with creating an accurate inventory of assets. Valuation and control selection can only occur after all assets are identified.
Question 497
Question 497
Which organizational department is ultimately responsible for information governance related to e-mail and other e-records? A. Legal B. Audit C. Compliance D. Security
Answer: A
Rationale: The Legal department ensures retention, discovery, and disclosure obligations for e-records are met under applicable laws and litigation requirements.
Question 498
Question 498
A cloud service provider requires its customer organizations to enable maximum audit logging for its data storage service and to retain the logs for the period of three months. The audit logging gene has extremely high amount of logs. What is the MOST appropriate strategy for the log retention? A. Keep all logs in an online storage. B. Keep last week’s logs in an online storage and the rest in an offline storage. C. Keep last week’s logs in an online storage and the rest in a near-line storage. D. Keep all logs in an offline storage.
Answer: B
Rationale: Tiered log storage — online for recent activity and offline for archives — balances performance, retention, and cost efficiency while maintaining compliance.
Question 499
Question 499
In Federated Identity Management (FIM), which of the following represents the concept of federation? A. Collection, maintenance, and deactivation of user objects and attributes in one or more systems, directories or applications B. Collection of information logically grouped into a single entity C. Collection of information for common identities in a system D. Collection of domains that have established trust among themselves
Answer: D
Rationale: Federation refers to multiple domains establishing trust to share authentication and authorization data securely.
Question 500
Question 500
Which of the following is an indicator that a company’s new user security awareness training module has been effective? A. There are more secure connections to internal e-mail servers. B. More incidents of phishing attempts are being reported. C. Fewer incidents of phishing attempts are being reported. D. There are more secure connections to the internal database servers.
Answer: B
Rationale: Effective training increases user vigilance, resulting in more reporting of suspicious messages—not fewer.