Filters
Question type

Study Flashcards

When dealing with compliance with the Payment Card Industry-Data Security Standard (PCI-DSS) , an organization that shares card holder information with a service provider MUST do which of the following?


A) Perform a service provider PCI-DSS assessment on a yearly basis
B) Validate the service provider's PCI-DSS compliance status on a regular basis
C) Validate that the service providers security policies are in alignment with those of the organization
D) Ensure that the service provider updates and tests its Disaster Recovery Plan (DRP) on a yearly basis

Correct Answer

verifed

verified

Which of the following management process allows ONLY those services required for users to accomplish their tasks, change default user passwords, and set servers to retrieve antivirus updates?


A) Configuration
B) Identity
C) Compliance
D) Patch

Correct Answer

verifed

verified

A security professional should consider the protection of which of the following elements FIRST when developing a defense-in-depth strategy for a mobile workforce?


A) Network perimeters
B) Demilitarized Zones (DMZ)
C) Databases and back-end servers
D) End-user devices

Correct Answer

verifed

verified

Which of the following techniques is effective to detect taps in fiber optic cables?


A) Taking baseline signal level of the cable
B) Measuring signal through external oscillator solution devices
C) Outlining electromagnetic field strength
D) Performing network vulnerability scanning

Correct Answer

verifed

verified

The adoption of an enterprise-wide Business Continuity (BC) program requires which of the following?


A) Good communication throughout the organization
B) A completed Business Impact Analysis (BIA)
C) Formation of Disaster Recovery (DR) project team
D) Well-documented information asset classification

Correct Answer

verifed

verified

A vulnerability assessment report has been submitted to a client. The client indicates that one third of the hosts that were in scope are missing from the report. In which phase of the assessment was this error MOST likely made?


A) Enumeration
B) Reporting
C) Detection
D) Discovery

Correct Answer

verifed

verified

What is the FIRST step in establishing an information security program?


A) Identify critical security infrastructure
B) Establish baseline security controls
C) Establish an information security policy
D) Identify factors affecting information security

Correct Answer

verifed

verified

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?


A) Link layer
B) Physical layer
C) Session layer
D) Application layer

Correct Answer

verifed

verified

Which of the following is the MOST effective preventative method to identify security flaws in software?


A) Monitor performance in production environments
B) Perform a structured code review
C) Perform application penetration testing
D) Use automated security vulnerability testing tools

Correct Answer

verifed

verified

A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is the BEST solution for the manufacturing organization?


A) Trusted third-party certification
B) Lightweight Directory Access Protocol (LDAP)
C) Security Assertion Markup language (SAML)
D) Cross-certification

Correct Answer

verifed

verified

Which of the following MOST applies to Session Initiation Protocol (SIP) security?


A) It reuses security mechanisms derived from existing protocols
B) It supports end-to-end security natively
C) It leverages Hypertext Transfer Protocol (HTTP) over Transport Layer Security (TLS)
D) It requires a Public Key Infrastructure (PKI)

Correct Answer

verifed

verified

What Service Organization Controls (SOC) report can be freely distributed and used by customers to gain confidence in a service organization's systems?


A) SOC 1 Type 1
B) SOC 1 Type 2
C) SOC 2
D) SOC 3

Correct Answer

verifed

verified

Which of the following is a process in the access provisioning lifecycle that will MOST likely identify access aggregation issues?


A) Test
B) Assessment
C) Review
D) Peer review

Correct Answer

verifed

verified

Which of the following is a remote access protocol that uses a static authentication?


A) Point-to-Point Tunneling Protocol (PPTP)
B) Routing Information Protocol (RIP)
C) Password Authentication Protocol (PAP)
D) Challenge Handshake Authentication Protocol (CHAP)

Correct Answer

verifed

verified

Which of the following processes has the PRIMARY purpose of identifying outdated software versions, missing patches, and lapsed system updates?


A) Penetration testing
B) Vulnerability management
C) Software Development Life Cycle (SDLC)
D) Life cycle management

Correct Answer

verifed

verified

Which of the following value comparisons MOST accurately reflects the agile development approach?


A) Processes and tools over individuals and interactions
B) Contract negotiation over customer collaboration
C) Following a plan over responding to change
D) Working software over comprehensive documentation

Correct Answer

verifed

verified

When using Generic Routing Encapsulation (GRE) tunneling over Internet Protocol version 4 (IPv4) , where is the GRE header inserted?


A) Into the options field
B) Between the delivery header and payload
C) Between the source and destination addresses
D) Into the destination address

Correct Answer

verifed

verified

Which type of test would an organization perform in order to locate and target exploitable defects?


A) Penetration
B) System
C) Performance
D) Vulnerability

Correct Answer

verifed

verified

Which of the following is the MOST common method of memory protection?


A) Compartmentalization
B) Segmentation
C) Error correction
D) Virtual Local Area Network (VLAN) tagging

Correct Answer

verifed

verified

Which of the following is a common feature of an Identity as a Service (IDaaS) solution?


A) Single Sign-On (SSO) authentication support  
B) Privileged user authentication support
C) Password reset service support
D) Terminal Access Controller Access Control System (TACACS) authentication support

Correct Answer

verifed

verified

Showing 81 - 100 of 336

Related Exams

Show Answer