Question 81
Question 81
Using Address Space Layout Randomization (ASLR) reduces the potential for which of the following attacks?
A. SQL injection (SQLi)
B. Man-in-the-Middle (MITM)
C. Cross-Site Scripting (XSS)
D. Heap overflow
Question 81
Using Address Space Layout Randomization (ASLR) reduces the potential for which of the following attacks?
A. SQL injection (SQLi)
B. Man-in-the-Middle (MITM)
C. Cross-Site Scripting (XSS)
D. Heap overflow
Question 82
When designing a business continuity plan (BCP), what is the formula to determine the Maximum Tolerable Downtime (MTD)?
A. Annual Loss Expectancy (ALE) + Work Recovery Time (WRT)
B. Business Impact Analysis (BIA) + Recovery Point Objective (RPO)
C. Recovery Time Objective (RTO) + Work Recovery Time (WRT)
D. Estimated Maximum Loss (EML) + Recovery Time Objective (RTO)
Question 83
When assessing the audit capability of an application, which of the following activities is MOST important?
A. Determine if audit records contain sufficient information.
B. Review security plan for actions to be taken in the event of audit failure.
C. Verify sufficient storage is allocated for audit records.
D. Identify procedures to investigate suspicious activity.
Question 84
When designing a new Voice over Internet Protocol (VoIP) network, an organization’s top concern is preventing unauthorized users from accessing the VoIP network. Which of the following will BEST help secure the VoIP network?
A. Transport Layer Security (TLS)
B. 802.1x
C. 802.11g
D. Web Application Firewall (WAF)
Question 85
After the INITIAL input of a user identification (ID) and password, what is an authentication system that prompts the user for a different response each time the user logs on?
A. Personal Identification Number (PIN)
B. Secondary password
C. Challenge-response
D. Voice authentication
Question 86
An organization is trying to secure instant-messaging (IM) communications through its network perimeter. Which of the following is the MOST significant challenge?
A. IM clients can interoperate between multiple vendors.
B. IM clients can run without administrator privileges.
C. IM clients can utilize random port numbers.
D. IM clients can run as executables that do not require installation.
Question 87
An organization has discovered that organizational data is posted by employees to data storage accessible to the general public. What is the PRIMARY step an organization must take to ensure data is properly protected from public release?
A. Implement a data classification policy.
B. Implement a data encryption policy.
C. Implement a user training policy.
D. Implement a user reporting policy.
Question 88
While classifying credit-card data related to PCI-DSS, which of the following is a PRIMARY security requirement?
A. Processor agreements with cardholders
B. Three-year retention of data
C. Encryption of data
D. Specific card-disposal methodology
Question 89
The personal laptop of an organization executive is stolen from the office, complete with personnel and project records. Which of the following should be done FIRST to mitigate future occurrences?
A. Encrypt disks on personal laptops.
B. Issue cable locks for use on personal laptops.
C. Create policies addressing critical information on personal laptops.
D. Monitor personal laptops for critical information.
Question 90
An enterprise is developing a baseline cybersecurity standard its suppliers must meet before being awarded a contract. Which statement is TRUE about the baseline cybersecurity standard?
A. It should be expressed as general requirements.
B. It should be expressed in legal terminology.
C. It should be expressed in business terminology.
D. It should be expressed as technical requirements.
Question 91
What BEST describes the confidentiality, integrity, availability (CIA) triad?
A. A tool used to assist in understanding how to protect the organization’s data
B. The three-step approach to determine the risk level on an organization
C. The implementation of security systems to protect the organization’s data
D. A vulnerability assessment to see how well the organization’s data is protected
Question 92
A small office is running Wi-Fi 4 APs, and neighboring offices do not want to increase throughput to associated devices. Which is the MOST cost-efficient way for the office to increase network performance?
A. Add another AP.
B. Disable the 2.4 GHz radios.
C. Enable channel bonding.
D. Upgrade to Wi-Fi 5.
Question 93
Management has decided that a core application will be used on personal cellular phones. Continuous monitoring must be implemented. Which of the following is required to accomplish management’s directive?
A. Strict integration of application management, configuration management, and phone management
B. Management application installed on user phones that tracks all application events and cellular traffic
C. Enterprise-level SIEM dashboard with visibility of cellular phone activity
D. Routine reports generated by the user’s carrier provider
Question 94
What is static analysis intended to do when analyzing an executable file?
A. Collect evidence of the executable file’s usage, including creation and last use dates.
B. Search the documents and files associated with the executable file.
C. Analyze the position of the file in the file tree in the system and the executable file’s libraries.
D. Disassemble the file to gather information about the executable file’s function.
Question 95
Commercial off-the-shelf (COTS) software presents which of the following additional security concerns?
A. Vendors take on liability for COTS software vulnerabilities.
B. In-house developed software is inherently less secure.
C. Exploits for COTS software are well-documented and publicly available.
D. COTS software is inherently less secure.
Question 96
Which of the following would be considered an incident if reported by a SIEM system?
A. An administrator logging in via VPN
B. A log source has stopped sending data
C. A web resource has reported a 404 error
D. A firewall logs a TCP connection on port 80
Question 97
Which of the following is the reason that transposition ciphers are easily recognizable?
A. Key
B. Block
C. Stream
D. Character
Question 98
Which of the following is MOST appropriate to collect evidence of a zero-day attack?
A. Firewall
B. Honeypot
C. Antispam
D. Antivirus
Question 99
What is the benefit of using Network Admission Control (NAC)?
A. OS versions can be validated before allowing access.
B. NAC supports validation at the endpoint’s security posture prior to allowing the session.
C. NAC can require use of certificates, passwords, or both before admission.
D. NAC only supports Windows OS.
Question 100
Which of the following is the PRIMARY issue when analyzing detailed log information?
A. Logs may be unavailable when required.
B. Timely review of data is difficult.
C. Most systems don’t support logging.
D. Logs don’t provide sufficient details of system and individual activities.