What is the FIRST step for an organization to take before allowing personnel to access social media from a corporate device or user account? A. Publish an acceptable usage policy. B. Publish a social media guidelines document. C. Deliver security awareness training. D. Document a procedure for accessing social media sites.
Answer: A
Rationale: Acceptable use policies (AUPs) define expected behavior and boundaries before allowing social media access from corporate systems.
Question 642
Question 642
A hospital has allowed virtual private networking (VPN) access to remote database developers. Upon auditing the internal configuration, the network administrator discovered that split-tunneling was enabled. What is the concern with this configuration? A. The network intrusion detection system (NIDS) will fail to inspect Secure Sockets Layer (SSL) traffic. B. Remote sessions will not require multi-layer authentication. C. Remote clients are permitted to exchange traffic with the public and private network. D. Multiple Internet Protocol Security (IPSec) tunnels may be exploitable in specific circumstances.
Answer: C
Rationale: Split tunneling allows traffic to flow simultaneously to both the private and public networks, increasing risk of compromise.
Question 643
Question 643
In an IDEAL encryption system, who has sole access to the decryption key? A. Data custodian B. System owner C. System administrator D. Data owner
Answer: D
Rationale: The data owner is responsible for defining and controlling data access, including exclusive access to the decryption keys.
Question 644
Question 644
Which type of disaster recovery plan (DRP) testing carries the MOST operational risk? A. Cutover B. Parallel C. Walkthrough D. Tabletop
Answer: A
Rationale: Cutover testing fully transitions operations to the alternate site, risking disruption if recovery systems fail.
Question 645
Question 645
Which of the following methods provides the MOST protection for user credentials? A. Forms-based authentication B. Self-registration C. Basic authentication D. Digest authentication
Answer: A
Rationale: Forms-based authentication enables stronger session management and encryption options compared to basic or digest methods.
Question 646
Question 646
An organization is planning a penetration test that simulates the malicious actions of a former network administrator. What kind of penetration test is needed? A. Functional test B. Unit test C. Grey box D. White box
Answer: D
Rationale: A white box test assumes the tester has full internal knowledge, similar to an insider with previous administrative access.
Question 647
Question 647
How does Radio-Frequency Identification (RFID) assist with asset management? A. It uses biometric information for system identification. B. It uses two-factor authentication (2FA) for system identification. C. It transmits unique serial numbers wirelessly. D. It transmits unique Media Access Control (MAC) addresses wirelessly.
Answer: C
Rationale: RFID tags transmit unique serial identifiers wirelessly, enabling efficient asset tracking and inventory management.
Question 648
Question 648
Which of the following is the FIRST step an organization’s professional performs when defining a cyber-security program based upon industry standards? A. Review the past security assessments B. Define the organization’s objectives regarding security and risk mitigation C. Map the organization’s current security practices to industry standards and frameworks D. Select from a choice of security best practices
Answer: C
Rationale: Professionals begin by mapping current practices to recognized standards to identify gaps and improvement opportunities.
Question 649
Question 649
What is the MOST important criterion that needs to be adhered to during the data collection process of an active investigation? A. Maintaining the chain of custody B. Capturing an image of the system C. Outlining all actions taken during the investigation D. Complying with the organization’s security policy
Answer: D
Rationale: Investigations must comply with the organization’s security and legal policies to ensure evidence integrity and admissibility.
Question 650
Question 650
Two computers, each with a single connection on the same physical 10 gigabit Ethernet network segment, need to communicate with each other. The first machine has a single Internet Protocol (IP) Classless Inter-Domain Routing (CIDR) address of 192.168.1.3/30 and the second machine has an IP/CIDR address 192.168.1.6/30. Which of the following is correct? A. Since each computer is on a different layer 3 network, traffic between the computers must be processed by a network bridge in order to communicate B. Since each computer is on the same layer 3 network, traffic between the computers may be processed by a network router in order to communicate C. Since each computer is on the same layer 3 network, traffic between the computers may be processed by a network bridge in order to communicate D. Since each computer is on a different layer 3 network, traffic between the computers must be processed by a network router in order to communicate
Answer: B
Rationale: Both IPs belong to the same /30 subnet, allowing direct communication without routing through another network.
Question 651
Question 651
Security Software Development Life Cycle (SDLC) expects application code to be written in a consistent manner to allow ease of auditing and which of the following? A. Protecting B. Copying C. Enhancing D. Executing
Answer: A
Rationale: Consistent coding practices support security through protection, ensuring code is auditable and maintainable.
Question 652
Question 652
Which of the following is a risk matrix? A. A tool for determining risk management decisions for an activity or system. B. A database of risks associated with a specific information system. C. A two-dimensional picture of risk for organizations, products, projects, or other items of interest. D. A table of risk management factors for management to consider.
Answer: A
Rationale: A risk matrix visually correlates likelihood and impact, enabling decision-making on risk treatment strategies.
Question 653
Question 653
What part of an organization’s strategic risk assessment MOST likely includes information on items affecting the success of the organization? A. Threat analysis B. Vulnerability analysis C. Key Performance Indicator (KPI) D. Key Risk Indicator (KRI)
Answer: D
Rationale: Key Risk Indicators (KRIs) measure elements that could affect strategic objectives, highlighting potential organizational threats.
Question 654
Question 654
A company needs to provide employee access to travel services, which are hosted by a third-party service provider. Employee experience is important, and when users are already authenticated, access to the travel portal is seamless. Which of the following methods is used to share information and grant user access to the travel portal? A. Single sign-on (SSO) access B. Security Assertion Markup Language (SAML) access C. Open Authorization (OAuth) access D. Federated access
Answer: D
Rationale: Federated access allows identity information sharing between organizations, providing seamless login via existing credentials.
Question 655
Question 655
The Chief Executive Officer (CEO) wants to implement an internal audit of the company’s information security posture. The CEO wants to avoid any bias in the audit process; therefore, has assigned the Sales Director to conduct the audit. After significant interaction over a period of weeks the audit concludes that the company’s policies and procedures are sufficient, robust and well established. The CEO then moves on to engage an external penetration testing company in order to showcase the organization’s robust information security stance. This exercise reveals significant failings in several critical security controls and shows that the incident response processes remain undocumented. What is the MOST likely reason for this disparity in the results of the audit and the external penetration test? A. The audit team lacked the technical experience and training to make insightful and objective assessments of the data provided to them. B. The scope of the penetration test exercise and the internal audit were significantly different. C. The external penetration testing company used custom zero-day attacks that could not have been predicted. D. The information technology (IT) and governance teams have failed to disclose relevant information to the internal audit team leading to an incomplete assessment being formulated.
Answer: A
Rationale: The Sales Director lacks technical auditing expertise, so the internal review missed control deficiencies that a skilled assessor would have found.
Question 656
Question 656
An information security administrator wishes to block peer-to-peer (P2P) traffic over Hypertext Transfer Protocol (HTTP) tunnels. Which of the following layers of the Open Systems Interconnection (OSI) model requires inspection? A. Application B. Transport C. Session D. Presentation
Answer: A
Rationale: P2P traffic embedded in HTTP tunnels occurs at the Application Layer, requiring deep packet inspection to detect and block.
Question 657
Question 657
A Chief Information Officer (CIO) has delegated responsibility of their system security to the head of the information technology (IT) department. While corporate policy dictates that only the CIO can make decisions on the level of data protection required, technical implementation decisions are done by the head of the IT department. Which of the following BEST describes the security role filled by the head of the IT department? A. System security officer B. System processor C. System custodian D. System analyst
Answer: C
Rationale: The System Custodian handles day-to-day implementation of security controls as defined by the Data Owner or CIO.
Question 658
Question 658
Which of the following actions should be undertaken prior to deciding on a physical baseline Protection Profile (PP)? A. Conduct a site survey. B. Choose a suitable location. C. Check the technical design. D. Categorize assets.
Answer: D
Rationale: Before establishing a Protection Profile, assets must first be categorized to identify what needs protection and at what level.
Question 659
Question 659
Management has decided that a core application will be used on personal cellular phones. As an implementation requirement, regularly scheduled analysis of the security posture needs to be conducted. Management has also directed that continuous monitoring be implemented. Which of the following is required to accomplish management’s directive? A. Routine reports generated by the user’s cellular phone provider that detail security events B. Strict integration of application management, configuration management (CM), and phone management C. Management application installed on user phones that tracks all application events and cellular traffic D. Enterprise-level security information and event management (SIEM) dashboard that provides full visibility of cellular phone activity
Answer: C
Rationale: Installing a management application on user devices enables continuous monitoring and tracking of app activity as directed.
Question 660
Question 660
A systems engineer is designing a wide area network (WAN) environment for a new organization. The WAN will connect sites holding information at various levels of sensitivity, from publicly available to highly confidential. The organization requires a high degree of interconnectedness to support existing business processes. What is the BEST design approach to securing this environment? A. Use reverse proxies to create a secondary “shadow” environment for critical systems. B. Place firewalls around critical devices, isolating them from the rest of the environment. C. Layer multiple detective and preventative technologies at the environment perimeter. D. Align risk across all interconnected elements to ensure critical threats are detected and handled.
Answer: B
Rationale: The Data Owner determines the classification level and access requirements, while the Custodian implements the required controls. Governance responsibility lies with the Owner.