1 / 40

What is a common challenge when implementing Security Assertion Markup Language (SAML) for identity integration between on-premise environment and an external identity provider service?

2 / 40

Host-Based Intrusion Protection (HIPS) systems are often deployed in monitoring or learning mode during their initial implementation. What is the objective of starting in this mode?

3 / 40

During an audit, the auditor finds evidence of potentially illegal activity. Which of the following is the MOST appropriate action to take?

4 / 40

When using third-party software developers, which of the following is the MOST effective method of providing software development Quality Assurance (QA)?

5 / 40

Which of the following is the PRIMARY benefit of a formalized information classification program?

6 / 40

An organization decides to implement a partial Public Key Infrastructure (PKI) with only the servers having digital certificates. What is the security benefit of this implementation?

7 / 40

If an attacker in a SYN flood attack uses someone else's valid host address as the source address, the system under attack will send a large number of Synchronize/Acknowledge (SYN/ACK) packets to the

8 / 40

Which of the following BEST describes a Protection Profile (PP)?

9 / 40

The PRIMARY characteristic of a Distributed Denial of Service (DDoS) attack is that it

10 / 40

While inventorying storage equipment, it is found that there are unlabeled, disconnected, and powered off devices. Which of the following is the correct procedure for handling such equipment?

11 / 40

How does an organization verify that an information system's current hardware and software match the standard system configuration?

12 / 40

An organization has decided to contract with a cloud-based service provider to leverage their identity as a service offering. They will use Open Authentication (OAuth) 2.0 to authenticate external users to the organization's services.
As part of the authentication process, which of the following must the end user provide?

13 / 40

Which of the following command line tools can be used in the reconnaisance phase of a network vulnerability assessment?

14 / 40

Which of the following is the PRIMARY security concern associated with the implementation of smart cards?

15 / 40

Which of the following are Systems Engineering Life Cycle (SELC) Technical Processes?

16 / 40

Which of the following is the BEST example of weak management commitment to the protection of security assets and resources?

17 / 40

Single Sign-On (SSO) is PRIMARILY designed to address which of the following?

18 / 40

Which one of the following operates at the session, transport, or network layer of the Open System Interconnection (OSI) model?

19 / 40

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.
What is the best approach for the CISO?

20 / 40

Which of the following is generally indicative of a replay attack when dealing with biometric authentication?

21 / 40

Which of the following entities is ultimately accountable for data remanence vulnerabilities with data replicated by a cloud service provider?

22 / 40

What is the GREATEST challenge to identifying data leaks?

23 / 40

Which of the following BEST describes a rogue Access Point (AP)?

24 / 40

Which of the following controls is the FIRST step in protecting privacy in an information system?

25 / 40

Discretionary Access Control (DAC) is based on which of the following?

26 / 40

Which of the following is the PRIMARY concern when using an Internet browser to access a cloud-based service?

27 / 40

While investigating a malicious event, only six days of audit logs from the last month were available. What policy should be updated to address this problem?

28 / 40

Which of the following BEST avoids data remanence disclosure for cloud hosted resources?

29 / 40

During a fingerprint verification process, which of the following is used to verify identity and authentication?

30 / 40

Which methodology is recommended for penetration testing to be effective in the development phase of the life-cycle process?

31 / 40

What does an organization FIRST review to assure compliance with privacy requirements?

32 / 40

Which of the following methods can be used to achieve confidentiality and integrity for data in transit?

33 / 40

Which of the following is most helpful in applying the principle of LEAST privilege?

34 / 40

A security professional is asked to provide a solution that restricts a bank teller to only perform a savings deposit transaction but allows a supervisor to perform corrections after the transaction. Which of the following is the MOST effective solution?

35 / 40

Which of the following is the MOST important output from a mobile application threat modeling exercise
according to Open Web Application Security Project (OWASP)?

36 / 40

What should happen when an emergency change to a system must be performed?

37 / 40

Which of the following is an essential step before performing Structured Query Language (SQL) penetration tests on a production system?

38 / 40

The PRIMARY security concern for handheld devices is the

39 / 40

Which security approach will BEST minimize Personally Identifiable Information (PII) loss from a data breach?

40 / 40

The BEST method to mitigate the risk of a dictionary attack on a system is to

We will be happy to hear your thoughts

Leave a reply
Enable registration in settings - general
Compare items
  • Total (0)
Shopping cart