During the Security Assessment and Authorization process, what is the PRIMARY purpose for conducting a hardware and software inventory? A. Calculate the value of assets being accredited. B. Create a list to include in the Security Assessment and Authorization package. C. Identify obsolete hardware and software. D. Define the boundaries of the information system.
Answer: A
Rationale: Asset inventory defines system boundaries and components, establishing what is subject to security assessment.
Question 1002
Question 1002
Which of the following countermeasures is the MOST effective in defending against a social engineering attack? A. Mandating security policy acceptance B. Changing individual behavior C. Evaluating security awareness training D. Filtering malicious e-mail content
Answer: C
Rationale: Regular, effective awareness training reinforces user vigilance and helps reduce social engineering success rates.
Question 1003
Question 1003
Which of the following is the PRIMARY reason to perform regular vulnerability scanning of an organization network? A. Provide vulnerability reports to management. B. Validate vulnerability remediation activities. C. Prevent attackers from discovering vulnerabilities. D. Remediate known vulnerabilities.
Answer: B
Rationale: Regular scans confirm whether remediation efforts have been effective and vulnerabilities remain resolved.
Question 1004
Question 1004
A security analyst for a large financial institution is reviewing network traffic related to an incident. The analyst determines the traffic is irrelevant to the investigation but in the process of the review, the analyst also finds that an applications data, which included full credit card cardholder data, is transferred in clear text between the server and user’s desktop. The analyst knows this violates the Payment Card Industry Data Security Standard (PCI-DSS). Which of the following is the analyst’s next step? A. Send the log file co-workers for peer review B. Include the full network traffic logs in the incident report C. Follow organizational processes to alert the proper teams to address the issue. D. Ignore data as it is outside the scope of the investigation and the analyst’s role.
Answer: C
Rationale: Reporting the PCI-DSS violation through proper internal channels ensures immediate risk mitigation and compliance correction.
Question 1005
Question 1005
Which of the following steps should be performed FIRST when purchasing Commercial Off-The-Shelf (COTS) software? A. undergo a security assessment as part of authorization process B. establish a risk management strategy C. harden the hosting server, and perform hosting and application vulnerability scans D. establish policies and procedures on system and services acquisition
Answer: D
Rationale: Before acquiring COTS software, the organization must define policies and procedures for system and service acquisition to ensure all purchases meet security and compliance requirements.
Question 1006
Question 1006
What is the MAIN goal of information security awareness and training? A. To inform users of the latest malware threats B. To inform users of information assurance responsibilities C. To comply with the organization information security policy D. To prepare students for certification
Answer: B
Rationale: The primary goal of security awareness and training is to ensure all users understand their information assurance and security responsibilities.
Question 1007
Question 1007
What protocol is often used between gateway hosts on the Internet? A. Exterior Gateway Protocol (EGP) B. Border Gateway Protocol (BGP) C. Open Shortest Path First (OSPF) D. Internet Control Message Protocol (ICMP)
Answer: B
Rationale: BGP is the standard routing protocol used between Internet gateway hosts to exchange routing and reachability information.
Question 1008
Question 1008
From a security perspective, which of the following assumptions MUST be made about input to an application? A. It is tested B. It is logged C. It is verified D. It is untrusted
Answer: D
Rationale: All user inputs must be assumed untrusted to ensure proper validation and prevent injection attacks or malicious data entry.
Question 1009
Question 1009
What is the MAIN reason for testing a Disaster Recovery Plan (DRP)? A. To ensure Information Technology (IT) staff knows and performs roles assigned to each of them B. To validate backup sites’ effectiveness C. To find out what does not work and fix it D. To create a high level DRP awareness among Information Technology (IT) staff
Answer: B
Rationale: Testing a DRP verifies that backup sites and recovery strategies function effectively to support business continuity.
Question 1010
Question 1010
What is the PRIMARY role of a scrum master in agile development? A. To choose the primary development language B. To choose the integrated development environment C. To match the software requirements to the delivery plan D. To project manage the software delivery
Answer: D
Rationale: The scrum master acts as a facilitator who manages the agile process and ensures timely, efficient software delivery.
Question 1011
Question 1011
Which security access policy contains fixed security attributes that are used by the system to determine a user’s access to a file or object? A. Mandatory Access Control (MAC) B. Access Control List (ACL) C. Discretionary Access Control (DAC) D. Authorized user control
Answer: A
Rationale: MAC enforces access decisions based on predefined labels and classifications controlled by the system, not by users.
Question 1012
Question 1012
It is MOST important to perform which of the following to minimize potential impact when implementing a new vulnerability scanning tool in a production environment? A. Negotiate schedule with the Information Technology (IT) operation’s team B. Log vulnerability summary reports to a secured server C. Enable scanning during off-peak hours D. Establish access for Information Technology (IT) management
Answer: A
Rationale: Coordination with IT operations before introducing scanning tools prevents unexpected disruptions in production systems.
Question 1013
Question 1013
Which security modes is MOST commonly used in a commercial environment because it protects the integrity of financial and accounting data? A. Biba B. Graham-Denning C. Clark-Wilson D. Beil-LaPadula
Answer: C
Rationale: The Clark-Wilson model emphasizes integrity through well-formed transactions and separation of duties, suiting financial environments.
Question 1014
Question 1014
Which of the following is the BEST reason for the use of security metrics? A. They ensure that the organization meets its security objectives. B. They provide an appropriate framework for Information Technology (IT) governance. C. They speed up the process of quantitative risk assessment. D. They quantify the effectiveness of security processes.
Answer: D
Rationale: Security metrics provide measurable data that allows an organization to assess the effectiveness of its security controls and processes. Metrics quantify performance and identify gaps for improvement.
Question 1015
Question 1015
When developing solutions for mobile devices, in which phase of the Software Development Life Cycle (SDLC) should technical limitations related to devices be specified? A. Implementation B. Initiation C. Review D. Development
Answer: A
Rationale: Implementation phase testing reveals platform limitations such as memory and processor constraints that affect mobile security controls.
Question 1016
Question 1016
Mandatory Access Controls (MAC) are based on: A. security classification and security clearance B. data segmentation and data classification C. data labels and user access permissions D. user roles and data encryption
Answer: A
Rationale: MAC enforces access based on assigned security labels and user clearances, aligning users with data sensitivity levels.
Question 1017
Question 1017
Which of the following methods of suppressing a fire is environmentally friendly and the MOST appropriate for a data center? A. Inert gas fire suppression system B. Halon gas fire suppression system C. Dry-pipe sprinklers D. Wet-pipe sprinklers
Answer: A
Rationale: Inert gas fire suppression systems (such as FM-200 or Inergen) extinguish fire without damaging electronic equipment and are safer for the environment and personnel. Halon is environmentally harmful and largely banned; water sprinklers risk damaging hardware.
Question 1018
Question 1018
What are the steps of a risk assessment? A. identification, analysis, evaluation B. analysis, evaluation, mitigation C. classification, identification, risk management D. identification, evaluation, mitigation
Answer: A
Rationale: A standard risk assessment process begins with identifying risks, analyzing their impact, and evaluating their likelihood and priority.
Question 1019
Question 1019
Which of the following is a common characteristic of privacy? A. Provision for maintaining an audit trail of access to the private data B. Notice to the subject of the existence of a database containing relevant credit card data C. Process for the subject to inspect and correct personal data on-site D. Database requirements for integration of privacy data
Answer: A
Rationale: Privacy controls typically include mechanisms to track and audit data access to ensure accountability and compliance.
Question 1020
Question 1020
What does electronic vaulting accomplish? A. It protects critical files. B. It ensures the fault tolerance of Redundant Array of Independent Disks (RAID) systems C. It stripes all database records D. It automates the Disaster Recovery Process (DRP)
Answer: A
Rationale: Electronic vaulting secures and stores critical files off-site electronically to protect against data loss.