Question 121
Question 121
Where can the OWASP list of associated vulnerabilities be found?
A. OWASP Top 10 Project
B. OWASP SAMM
C. OWASP Guide Project
D. OWASP Mobile Project
Question 121
Where can the OWASP list of associated vulnerabilities be found?
A. OWASP Top 10 Project
B. OWASP SAMM
C. OWASP Guide Project
D. OWASP Mobile Project
Question 122
Which vulnerability assessment activity BEST exemplifies the 'Examine' method?
A. Review system logs
B. Perform port scans
C. Ask ISSO about patch process
D. Logging into a web server with default admin credentials
Question 123
Within a large organization, which business unit is BEST positioned to handle provisioning and deprovisioning of user accounts?
A. Training
B. Internal Audit
C. Human Resources
D. IT
Question 124
After a ransomware attack, management wants improved availability and reduced RTO. Which solution should be implemented?
A. Virtualization
B. Antivirus
C. Process isolation
D. HIPS
Question 125
Which BEST describes the purpose of a reference monitor when defining access control?
A. Ensure quality by design
B. Validate organizational access policies
C. Cyber hygiene for system health
D. Keep staff safe
Question 126
What must be met during internal security audits to ensure objectivity and prevent retaliation?
A. Auditor must be independent and report directly to management
B. Auditor must use automated tools
C. Auditor must work closely with IT
D. Auditor must manually review processes
Question 127
A company resells decommissioned drives to vendors. Which data sanitization method ensures security while retaining resale value?
A. Pinning
B. Clearing
C. Purging
D. Overwriting
Question 128
Why is classifying data important during a risk assessment?
A. Framework for metrics
B. Justify security control cost
C. Classify control sensitivity
D. Determine appropriate control level
Question 129
OWASP SAMM allows organizations to assess impact based on which risk management aspect?
A. Risk tolerance
B. Risk exception
C. Risk treatment
D. Risk response
Question 130
A fiber link between two campuses is broken. Which tool detects the exact break point?
A. OTDR
B. Tone generator
C. Fusion splicer
D. Cable tester
Question 131
A software architect building a global content platform should focus primarily on:
A. Service-oriented architecture
B. Media caching methodology
C. ISP relationships
D. WAN design
Question 132
Which datacenter architecture is most likely used in large SDN and extends beyond the datacenter?
A. iSCSI
B. FCoE
C. Three-tiered
D. Spine-and-leaf
Question 133
What is the MOST common use of Online Certificate Status Protocol (OCSP)?
A. Get expiration date of a certificate
B. Get revocation status
C. Get author name
D. Verify certificate validity
Question 134
Which of the following is the PRIMARY type of cryptography required to support non-repudiation of a digitally signed document?
A. Message digest (MD)
B. Asymmetric
C. Symmetric
D. Hashing
Question 135
Which of the following is the MOST important first step in preparing for a security audit?
A. Identify team members.
B. Define the scope.
C. Notify system administrators.
D. Collect evidence.
Question 136
Which of the following should be done at a disaster site before any item is removed, repaired, or replaced?
A. Take photos of the damage.
B. Notify all of the Board of Directors.
C. Communicate with the press.
D. Dispatch personnel to the disaster recovery site.
Question 137
Which of the following is the MOST common use of the Online Certificate Status Protocol (OCSP)?
A. To obtain the expiration date of an X.509 digital certificate
B. To obtain the revocation status of an X.509 digital certificate
C. To obtain the author name of an X.509 digital certificate
D. To verify the validity of an X.509 digital certificate
Question 138
An organization’s retail website provides its only source of revenue, so the disaster recovery plan must document estimated time for each recovery step. Which step would take the longest?
A. Update NAT table.
B. Update DNS with domain registrar.
C. Update BGP autonomous system number.
D. Update web server network configuration.
Question 139
When resolving ethical conflicts, in what order should an information security professional prioritize responsibilities?
A. Public safety, duties to individuals, duties to the profession, duties to principals
B. Public safety, duties to principals, duties to individuals, duties to the profession
C. Public safety, duties to the profession, duties to principals, duties to individuals
D. Public safety, duties to individuals, duties to the profession, duties to principals
Question 140
What HTTP response header disables execution of inline JavaScript and eval()-type functions?
A. Strict-Transport-Security
B. X-XSS-Protection
C. X-Frame-Options
D. Content-Security-Policy