If the wide area network (WAN) is supporting converged applications like Voice over Internet Protocol (VoIP), which of the following becomes even MORE essential to the assurance of the network? A. Boundary routing B. Classless Inter-Domain Routing (CIDR) C. Internet Protocol (IP) routing lookups D. Deterministic routing
Answer: C
Rationale: VoIP requires stable IP routing and low latency; ensuring efficient IP lookups supports consistent packet delivery and service quality.
Question 762
Question 762
Why would a system be structured to isolate different classes of information from one another and segregate them by user jurisdiction? A. The organization is required to provide different services to various third-party organizations. B. The organization can avoid e-discovery processes in the event of litigation. C. The organization’s infrastructure is clearly arranged and scope of responsibility is simplified. D. The organization can vary its system policies to comply with conflicting national laws.
Answer: D
Rationale: Jurisdictional segregation allows compliance with multiple legal requirements by applying separate policies to each data class.
Question 763
Question 763
An organization implements Network Access Control (NAC) using Institute of Electrical and Electronics Engineers (IEEE) 802.1x and discovers the printers do not support the IEEE 802.1x standard. Which of the following is the BEST resolution? A. Implement port security on the switch ports for the printers. B. Do nothing; IEEE 802.1x is irrelevant to printers. C. Install an IEEE 802.1x bridge for the printers. D. Implement a virtual local area network (VLAN) for the printers.
Answer: D
Rationale: Placing non-802.1x devices in a separate VLAN maintains network segmentation and reduces exposure to unauthorized access.
Question 764
Question 764
Which of the following goals represents a modern shift in risk management according to National Institute of Standards and Technology (NIST)? A. Provide an improved mission accomplishment approach. B. Focus on operating environments that are changing, evolving, and full of emerging threats. C. Enable management to make well-informed risk-based decisions justifying security expenditure. D. Secure information technology (IT) systems that store, mass, or transmit organizational information.
Answer: B
Rationale: NIST emphasizes adaptive, continuous risk management in dynamic environments, focusing on evolving threats and resilience.
Question 765
Question 765
Which of the following security tools monitors devices and records the information in a central database for further analysis? A. Antivirus B. Host-based intrusion detection system (HIDS) C. Security orchestration automation and response D. Endpoint detection and response (EDR)
Answer: C
Rationale: SOAR platforms aggregate and correlate data from multiple tools into a central system for analysis and automated response.
Question 766
Question 766
In addition to life, protection of which of the following elements is MOST important when planning a data center site? A. Data and hardware B. Property and operations C. Resources and reputation D. Profits and assets
Answer: A
Rationale: After human safety, protecting critical data and hardware ensures business continuity and rapid recovery from disruptions.
Question 767
Question 767
Which of the following documents specifies services from the client’s viewpoint? A. Business Impact Analysis (BIA) B. Service Level Agreement (SLA) C. Service Level Requirement (SLR) D. Service Level Report
Answer: B
Rationale: An SLA defines measurable commitments between a service provider and client, representing client expectations and requirements.
Question 768
Question 768
Which of the following should be included in a good defense-in-depth strategy provided by object-oriented programming for software development? A. Polymorphism B. Inheritance C. Polyinstantiation D. Encapsulation
Answer: D
Rationale: Encapsulation protects internal object data and methods by restricting access through controlled interfaces, reducing attack surface and supporting defense-in-depth within software design. Polyinstantiation relates to multilevel secure databases, not object-oriented programming.
Question 769
Question 769
Which of the following is a key responsibility for a data steward assigned to manage an enterprise data lake? A. Ensure proper business definition, value, and usage of data B. Ensure adequate security controls applied to the enterprise data lake C. Ensure proper and identifiable data owners for each data element D. Ensure that any data passing within remit is being used in accordance with rules and regulations
Answer: D
Rationale: Data Stewards are responsible for ensuring that data is used in accordance with organizational policies, quality standards, and regulatory requirements. Data Owners define data value and business rules, while Stewards enforce them operationally.
Question 770
Question 770
What is the FIRST step prior to executing a test of an organization’s disaster recovery (DR) or business continuity plan (BCP)? A. Develop clear evaluation criteria. B. Identify key stakeholders. C. Develop recommendations for disaster scenarios. D. Identify potential failure points.
Answer: B
Rationale: Identifying key stakeholders is the first step so the right personnel are involved in defining objectives, scope, evaluation criteria, and responsibilities prior to DR/BCP testing.
Question 771
Question 771
A breach investigation found a website was exploited through an open-source component. What is the FIRST step in the process that could have prevented this breach? A. Application whitelisting B. Vulnerability remediation C. Web application firewall (WAF) D. Software inventory
Answer: D
Rationale: Preventing vulnerabilities in open-source components begins with maintaining an accurate software inventory. Without knowing what components exist, organizations cannot assess vulnerabilities or apply patches. A WAF may reduce exposure but does not address root cause prevention.
Question 772
Question 772
What security principle addresses the issue of “Security by Obscurity”? A. Open design B. Role-Based Access Control (RBAC) C. Segregation of duties (SoD) D. Least privilege
Answer: A
Rationale: Open design assumes system security should not depend on secrecy of design; instead, it relies on robust, transparent mechanisms.
Question 773
Question 773
What is the MOST important goal of conducting security assessments? A. To align the security program with organizational risk appetite B. To demonstrate proper function of security controls and processes to senior management C. To prepare the organization for an external audit, particularly by a regulatory entity D. To discover unmitigated security vulnerabilities, and propose paths for mitigating them
Answer: D
Rationale: The main goal of a security assessment is to identify and remediate security gaps before exploitation or audit findings occur.
Question 774
Question 774
Which of the following virtual network configuration options is BEST to protect virtual machines (VM)? A. Data segmentation B. Data encryption C. Traffic filtering D. Traffic throttling
Answer: C
Rationale: Traffic filtering controls and restricts communication between virtual machines, limiting lateral movement and reducing attack surfaces within virtualized environments.
Question 775
Question 775
Which of the following features is MOST effective in mitigating against theft of data on a corporate mobile device which has been stolen? A. Mobile Device Management (MDM) with device wipe B. Mobile device tracking with geolocation C. Virtual private network (VPN) with traffic encryption D. Whole device encryption with key escrow
Answer: A
Rationale: MDM enables remote device wiping, ensuring data cannot be recovered from lost or stolen mobile devices.
Question 776
Question 776
An organization is implementing data encryption using symmetric ciphers and the Chief Information Officer (CIO) is concerned about the risk of using one key to protect all sensitive data. The security practitioner has been tasked with recommending a solution to address the CIO’s concerns. Which of the following is the BEST approach to achieving the objective by encrypting all sensitive data? A. Use a Secure Hash Algorithm 256 (SHA-256). B. Use Rivest-Shamir-Adleman (RSA) keys. C. Use a hierarchy of encryption keys. D. Use Hash Message Authentication Code (HMAC) keys.
Answer: B
Rationale: RSA allows asymmetric key management, ensuring different keys are used for encryption, reducing exposure of a single master key.
Question 777
Question 777
Which of the following is a MUST for creating a new custom-built, cloud-native application designed to be horizontally scalable? A. Network as a Service (NaaS) B. Platform as a Service (PaaS) C. Infrastructure as a Service (IaaS) D. Software as a Service (SaaS)
Answer: C
Rationale: IaaS provides the flexibility and resource elasticity necessary for scaling applications horizontally across distributed systems.
Question 778
Question 778
Single sign-on (SSO) for federated identity management (FIM) must be implemented and managed so that authorization mechanisms protect access to privileged information using OpenID Connect (OIDC) tokens or Security Assertion Markup Language (SAML) assertions. What is the BEST method to protect them? A. Pass data in a bearer assertion, only signed by the identity provider. B. Tokens and assertions should use base64 encoding to assure confidentiality. C. Use a challenge and response mechanism such as CHAP. D. The access token or assertion should be encrypted to ensure privacy.
Answer: D
Rationale: Encrypting SAML or OIDC tokens ensures confidentiality and integrity during transmission, preventing interception or misuse.
Question 779
Question 779
The client of a security firm reviewed a vulnerability assessment report and claims it is inaccurate. The client states that the vulnerabilities listed are invalid because the host’s operating system (OS) was not properly detected. Where in the vulnerability assessment process did this error MOST likely occur? A. Report writing B. Detection C. Enumeration D. Scanning
Answer: B
Rationale: During the detection phase, incorrect OS identification leads to mismatched vulnerability checks and false findings.
Question 780
Question 780
For a victim of a security breach to prevail in a negligence claim, what MUST the victim establish? A. Concern B. Breach of contract C. Proximate cause D. Hardship
Answer: C
Rationale: Proximate cause legally links the defendant’s negligence to the plaintiff’s damages, which must be proven for liability.