Topic 14: NEW Questions C
What is the BEST way to correlate large volumes of disparate data sources in a
Security Operations Center (SOC) environment?
A.
Implement Intrusion Detection System (IDS).
B.
Implement a Security Information and Event Management (SIEM) system.
C.
Hire a team of analysts to consolidate data and generate reports.
D.
Outsource the management of the SOC
Implement a Security Information and Event Management (SIEM) system.
Which of the following is the MOST important reason for timely installation of software
patches?
A.
Attackers may be conducting network analysis.
B.
Patches ere only available for a specific time.
C.
Attackers reverse engineer the exploit from the patch.
D.
Patches may not be compatible with proprietary software
Attackers reverse engineer the exploit from the patch.
What testing technique enables the designer to develop mitigation strategies for potential
vulnerabilities?
A.
Manual inspections and reviews
B.
Penetration testing
C.
Threat modeling
D.
Source code review
Threat modeling
Reference: https://owasp.org/www-project-web-security-testingguide/
assets/archive/OWASP_Testing_Guide_v4.pdf (15)
Which of the following will help prevent improper session handling?
A.
Ensure that all UlWebView calls do not execute without proper input validation.
B.
Ensure that tokens are sufficiently long, complex, and pseudo-random.
C.
Ensure JavaScript and plugin support is disabled.
D.
Ensure that certificates are valid and fail closed
Ensure that tokens are sufficiently long, complex, and pseudo-random.
Which of the following would an internal technical security audit BEST validate?
A.
Whether managerial controls are in place
B.
Support for security programs by executive management
C.
Appropriate third-party system hardening
D.
Implementation of changes to a system
Implementation of changes to a system
Digital non-repudiation requires which of the following?
A.
A trusted third-party
B.
Appropriate corporate policies
C.
Symmetric encryption
D.
Multifunction access cards
A trusted third-party
Who is essential for developing effective test scenarios for disaster recovery (DR) test plans?
A.
Business line management and IT staff members
B.
Chief Information Officer (CIO) and DR manager
C.
DR manager end IT staff members
D.
IT staff members and project managers
Chief Information Officer (CIO) and DR manager
Which of the following is the BEST identity-as-a-service (IDaaS) solution for validating users?
A.
Lightweight Directory Access Protocol (LDAP)
B.
Security Assertion Markup Language (SAM.)
C.
Single Sign-on (SSO)
D.
Open Authentication (OAuth)
Lightweight Directory Access Protocol (LDAP)
Which of the following is used to support the of defense in depth during development phase
of a software product?
A.
Security auditing
B.
Polyinstantiation
C.
Maintenance
D.
Known vulnerability list
Polyinstantiation
When a flaw in Industrial control (ICS) software is discovered, what is the GREATEST
impediment to deploying a patch?
A.
Many IG systems have software that is no longer being maintained by the venders.
B.
Compensating controls may impact IG performance.
C.
Testing a patch in an IG may require more resources than the organization can commit.
D.
vendors are required to validate the operability patches.
vendors are required to validate the operability patches.
Which of the following findings would MOST likely indicate a high risk in a vulnerability
assessment report?
A.
Transmission control protocol (TCP) port 443 open
B.
Non-standard system naming convention used
C.
Unlicensed software installed
Transmission control protocol (TCP) port 443 open
Which layer of the Open systems Interconnection (OSI) model is being targeted in the event of a Synchronization (SYN) flood attack?
A.
Session
B.
Transport
C.
Network
D.
Presentation
Transport
| Page 55 out of 124 Pages |
| Previous |