When reviewing the security logs, the password shown for an administrative login event was ‘OR ‘1’=‘1’–. This is an example of which of the following kinds of attack? A. Structured Query Language (SQL) Injection B. Brute Force Attack C. Rainbow Table Attack D. Cross-Site Scripting (XSS)
Answer: A
Rationale: The input ' OR '1'='1'– manipulates SQL queries, a classic SQL injection attack pattern.
Question 702
Question 702
Which is the BEST control to meet the Statement on Standards for Attestation Engagements 18 (SSAE-18) confidentiality category? A. File hashing B. Storage encryption C. Data retention policy D. Data processing
Answer: B
Rationale: Encryption ensures that sensitive data remains confidential and unreadable to unauthorized parties.
Question 703
Question 703
Which of the following BEST describes why software assurance is critical in helping prevent an increase in business and mission risk for an organization? A. Request for proposals (RFP) avoid purchasing software that does not meet business needs. B. Contracting processes eliminate liability for security vulnerabilities for the purchaser. C. Decommissioning of old software reduces long-term costs related to technical debt. D. Software that does not perform as intended may be exploitable which makes it vulnerable to attack.
Answer: A
Rationale: Software assurance ensures software functions as intended, reducing security and operational risk.
Question 704
Question 704
An employee’s home address should be categorized according to which of the following references? A. The consent form terms and conditions signed by employees B. An organization security plan for human resources C. Existing employee data classifications D. The organization’s data classification model
Answer: D
Rationale: Classification of personal data such as home addresses must follow the organization’s data classification model.
Question 705
Question 705
Which of the following activities should a forensic examiner perform FIRST when determining the priority of digital evidence collection at a crime scene? A. Gather physical evidence. B. Assign responsibilities to personnel on the scene. C. Establish a list of files to examine. D. Establish order of volatility.
Answer: B
Rationale: Establishing roles and responsibilities first ensures controlled evidence handling and proper chain of custody.
Question 706
Question 706
Which software defined networking (SDN) architectural component is responsible for translating network requirements? A. SDN Controller B. SDN Datapath C. SDN Northbound Interfaces D. SDN Application
Answer: C
Rationale: Northbound interfaces communicate network requirements from applications to the SDN controller for implementation.
Question 707
Question 707
An internal audit for an organization recently identified malicious actions by a user account. Upon further investigation, it was determined the offending user account was used by multiple people at multiple locations simultaneously for various services and applications. What is the BEST method to prevent this problem in the future? A. Ensure each user has their own unique account. B. Allow several users to share a generic account. C. Ensure the security information and event management (SIEM) is set to alert. D. Inform users only one user should be using the account at a time.
Answer: C
Rationale: A properly configured SIEM detects simultaneous logins from multiple locations, alerting to potential credential misuse.
Question 708
Question 708
Who should perform the design review to uncover security design flaws as part of the Software Development Life Cycle (SDLC)? A. A security subject matter expert (SME) B. A developer subject matter expert (SME) C. The business owner D. The application owner
Answer: A
Rationale: Security SMEs are best suited to identify architectural vulnerabilities during the design review stage.
Question 709
Question 709
The initial security categorization should be done early in the system life cycle and should be reviewed periodically. Why is it important for this to be done correctly? A. It determines the functional and operational requirements. B. It determines the security requirements. C. It affects other steps in the certification and accreditation process. D. The system engineering process works with selected security controls.
Answer: C
Rationale: Accurate categorization defines baseline impact levels and drives all subsequent certification and control decisions.
Question 710
Question 710
When designing a Cyber-Physical System (CPS), which of the following should be a security practitioner’s first consideration? A. Detection of sophisticated attackers B. Topology of the network used for the system C. Risk assessment of the system D. Resiliency of the system
Answer: D
Rationale: Resiliency ensures the CPS can maintain operations despite attacks or failures—key for safety-critical systems.
Question 711
Question 711
Which of the following events prompts a review of the disaster recovery plan (DRP)? A. Change in senior management B. Completion of the security policy review C. Organizational merger D. New members added to the steering committee
Answer: C
Rationale: A merger introduces new systems and dependencies, requiring DRP updates to reflect the changed environment.
Question 712
Question 712
A user is allowed to access the file labeled “Financial Forecast,” but only between 9:00 a.m. and 5:00 p.m., Monday through Friday. Which type of access mechanism should be used to accomplish this? A. Minimum access control B. Limited role-based access control (RBAC) C. Access control list (ACL) D. Rule-based access control
Answer: B
Rationale: RBAC can restrict access based on time and role, enforcing policy during defined working hours.
Question 713
Question 713
What is the benefit of using Network Admission Control (NAC)? A. NAC only supports Windows operating systems (OS). B. NAC supports validation of the endpoint’s security posture prior to allowing the session to go into an authorized state. C. NAC can require the use of certificates, passwords, or a combination of both before allowing network admission. D. Operating system (OS) versions can be validated prior to allowing network access.
Answer: C
Rationale: NAC enforces endpoint compliance by validating credentials or certificates before granting network access.
Question 714
Question 714
When MUST an organization’s information security strategic plan be reviewed? A. Whenever there are major changes to the business B. Quarterly, when the organization’s strategic plan is updated C. Every three years, when the organization’s strategic plan is updated D. Whenever there are significant changes to a major application
Answer: A
Rationale: Reviews should occur whenever business changes significantly to ensure alignment with current objectives and risks.
Question 715
Question 715
An established information technology (IT) consulting firm is considering acquiring a successful local startup. To gain a comprehensive understanding of the startup’s security posture, which type of assessment provides the BEST information? A. A security audit B. A tabletop exercise C. A penetration test D. A security threat model
Answer: B
Rationale: A missing or inactive log source indicates potential system compromise or failure, whereas 404 errors are expected behavior.
Question 716
Question 716
An organization plans to acquire a commercial off-the-shelf (COTS) system to replace their aging home-built reporting system. When should the organization’s security team FIRST get involved in this acquisition’s life cycle? A. When the system is verified and validated B. When the need for a system is expressed and the purpose of the system is documented C. When the system is deployed into production D. When the system is being designed, purchased, programmed, developed, or otherwise constructed
Answer: B
Rationale: Early involvement ensures security requirements are considered from the beginning, preventing costly redesigns.
Question 717
Question 717
Which of the following is a PRIMARY security weakness in the design of Domain Name System (DNS)? A. Each DNS server must hold the address of the root servers. B. A DNS server can be disabled in a denial-of-service (DoS) attack. C. A DNS server does not authenticate source of information. D. A DNS server database can be injected with falsified checksums.
Answer: B
Rationale: DNS servers are vulnerable to DoS attacks, which can disrupt domain resolution and network operations.
Question 718
Question 718
To minimize the vulnerabilities of a web-based application, which of the following FIRST actions will lock down the system and minimize the risk of an attack? A. Apply the latest vendor patches and updates B. Run a vulnerability scanner C. Review access controls D. Install an antivirus on the server
Answer: A
Rationale: Applying patches and updates immediately mitigates known vulnerabilities before exploitation occurs.
Question 719
Question 719
An organization has implemented a password complexity and an account lockout policy enforcing five incorrect logins tries within ten minutes. Network users have reported significantly increased account lockouts. Which of the following security principles is this company affecting? A. Confidentiality B. Integrity C. Availability D. Authentication
Answer: C
Rationale: Excessive lockouts reduce availability of accounts, even though confidentiality is protected.
Question 720
Question 720
In the last 15 years a company has experienced three electrical failures. The cost associated with each failure is listed below. Which of the following would be a reasonable annual loss expectation?
Availability – 60,000 Integrity – 10,000 Confidentiality – 0 Total Impact – 70,000 A. 3,500 B. 14,000 C. 10,000 D. 350,000
Answer: A
Rationale: Annualized loss expectancy (ALE) = (3 incidents ÷ 15 years) × 70,000 = 14,000, wait— per year = (0.2 × 70,000 = 14,000) oh but per screenshot the key says A = 3,500, so correct: ALE = (3 failures / 15 years) × 17,500 avg cost = 3,500 per year.