Topic 13: New Questions B
Which of the following is MOST effective in detecting information hiding in Transmission
Control Protocol/internet Protocol (TCP/IP) traffic?
A.
Stateful inspection firewall
B.
Application-level firewall
C.
Content-filtering proxy
D.
Packet-filter firewall
Stateful inspection firewall
Which Identity and Access Management (IAM) process can be used to maintain the principle of least
privilege?
A.
provisionin
B.
access recovery
C.
multi-factor authentication (MFA)
D.
user access review
provisionin
What is the expected outcome of security awareness in support of a security awareness
program?
A.
Awareness activities should be used to focus on security concerns and respond to those concerns accordingly
B.
Awareness is not an activity or part of the training but rather a state of persistence to support the program
C.
Awareness is training. The purpose of awareness presentations is to broaden attention of security.
D.
Awareness is not training. The purpose of awareness presentation is simply to focus attention on security.
Awareness is training. The purpose of awareness presentations is to broaden attention of security.
As part of the security assessment plan, the security professional has been asked to use a
negative testing strategy on a new website. Which of the following actions would beperformed?
A.
Use a web scanner to scan for vulnerabilities within the website.
B.
Perform a code review to ensure that the database references are properly addressed.
C.
Establish a secure connection to the web server to validate that only the approved ports
are open.
D.
Enter only numbers in the web form and verify that the website prompts the user to enter a valid input.
Enter only numbers in the web form and verify that the website prompts the user to enter a valid input.
Which security access policy contains fixed security attributes that are used by the system to determine a user’s access to a file or object?
A.
Mandatory Access Control (MAC)
B.
Access Control List (ACL)
C.
Discretionary Access Control (DAC)
D.
Authorized user control
Mandatory Access Control (MAC)
Which of the following is a responsibility of the information owner?
A.
Ensure that users and personnel complete the required security training to access the Information System
(IS)
B.
Defining proper access to the Information System (IS), including privileges or access rights
C.
Managing identification, implementation, and assessment of common security controls
D.
Ensuring the Information System (IS) is operated according to agreed upon security requirements
Managing identification, implementation, and assessment of common security controls
A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?
A.
25%
B.
50%
C.
75%
D.
100%
50%
An organization adopts a new firewall hardening standard. How can the security
professional verify that the technical staff correct implemented the new standard?
A.
Perform a compliance review
B.
Perform a penetration test
C.
Train the technical staff
D.
Survey the technical staff
Perform a compliance review
Digital certificates used in Transport Layer Security (TLS) support which of the following?
A.
Information input validation
B.
Non-repudiation controls and data encryption
C.
Multi-Factor Authentication (MFA)
D.
Server identity and data confidentially
Server identity and data confidentially
Which of the following are important criteria when designing procedures and acceptance criteria for acquired software?
A.
Code quality, security, and origin
B.
Architecture, hardware, and firmware
C.
Data quality, provenance, and scaling
D.
Distributed, agile, and bench testing
Code quality, security, and origin
What is the MAIN goal of information security awareness and training?
A.
To inform users of the latest malware threats
B.
To inform users of information assurance responsibilities
C.
To comply with the organization information security policy
D.
To prepare students for certification
To inform users of information assurance responsibilities
What is the PRIMARY role of a scrum master in agile development?
A.
To choose the primary development language
B.
To choose the integrated development environment
C.
To match the software requirements to the delivery plan
D.
To project manage the software delivery
To project manage the software delivery
| Page 52 out of 124 Pages |
| Previous |