Correct
Correct
Question 1: What is the most effective guidance for a network analyst aiming
to configure a new firewall in accordance with the organization's
requirements?
Use industry best practices for firewall configuration.
Apply personal expertise to determine the optimal configuration.
Refer to the organization's security policy and follow documented procedures.
(Correct)
Question 2: Which type of recovery facility may take more than a day or two
to be activated?
Hot site
Warm site (Correct)
Cold site
Mobile site
窗体底端
窗体顶端
Question 3: Which access control model grants access based on attributes like
date and time?
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Attribute-Based Access Control (ABAC) (Correct)
窗体底端
窗体顶端
Question 4: Which of the following is a set of tools aimed at maintaining
elevated access to a system and capable of evading detection?
Malware
Virus
APT
Rootkit (Correct)
窗体底端
窗体顶端
Question 5: Which of the following describes data in transit?
Data stored on a local server
Data at rest in a database
Data archived for long-term storage
Data moving between devices in a network (Correct)
窗体底端
窗体顶端
Question 6: Which control is both physical and administrative and can deter
an intruder?
Warning sign (Correct)
Tailgating
Policy
Attendance register
Preventive(Correct)
Corrective
Compensating
窗体底端
窗体顶端
Question 8: Which of the following is an administrative control?
Soft Token
Patch
Algorithm
Guideline (Correct)
窗体底端
窗体顶端
Question 9: Which mechanism enables worms to self-propagate?
Firewall setting
Encryption techniques
User authentication
Vulnerabilities(Correct)
窗体底端
窗体顶端
Question 10: Which encryption method uses a single key for ciphering and
deciphering?
Public key
Symmetric(Correct)
Hybrid key
Asymmetric
窗体底端
窗体顶端
Question 11: What term is used to describe a security incident that resulted in
unauthorized access to information?
Vulnerability
Compromise(Correct)
Phishing
Malware
窗体底端
窗体顶端
Question 12: What type of control is CCTV that will give you digital access to
an information system?
Administrative
Physical
Technical(Correct)
Detective
Question 13: Which of the following techniques can be used to prevent XSS
attacks?
Encryption
Input Validation(Correct)
Firewall Configuration
Password Complexity
窗体底端
窗体顶端
Question 14: Which of the following is not an administrative control?
Antivirus (Correct)
窗体底端
窗体顶端
Question 15: What is a list that displays all the objects in which a subject has
access to and the associated permissions for each object?
Capability list(Correct)
Object list
Subject list
Control matrix
Question 16: Which of the following access control models is best suited for a
user who wants to have full control of the files they create and who can access
them?
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)(Correct)
Attribute-Based Access Control (ABAC)
窗体底端
窗体顶端
Question 17: Which of the following methods ensures that the appropriate
people are timely informed of an incident or disaster?
Call tree(Correct)
Backup schedule
Email notifications
Social media updates
窗体底端
窗体顶端
Question 18: Which of the following is considered an effective threat
intelligence source?
Dark Web forums (Correct)
窗体底端
窗体顶端
Question 19: Which of the following terms represents the product of the
probability of a harmful event taking place with the impact it will have on the
organization?
Vulnerability
Threat
Risk (Correct)
Exploit
窗体底端
窗体顶端
Question 20: Which access control model is predominantly utilized by military
personnel and government officials?
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)(Correct)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
窗体底端
窗体顶端
Question 21: Which of the following strategies is primarily focused on
minimizing the risk of potential attacks on the organization's network?
Incident Response Planning
Security Awareness Training
Network Encryption
Vulnerability Management (Correct)
窗体底端
窗体顶端
Question 22: Which of the following represents the primary goal of security
governance?
Ensuring compliance with industry regulations
Managing day-to-day security operations
Implementing the latest cybersecurity technologies
Aligning the security strategy with the organizational objectives (Correct)
窗体底端
窗体顶端
Question 23: Which of the following backup solutions backs up all files that
have changed since the last backup of any kind?
Full
Incremental(Correct)
Differential
Snapshot
Question 24: Which critical activity is part of the risk identification process in
cybersecurity
Patch management
Vulnerability scanning
Asset inventory population(Correct)
Firewall configuration
Question 25: Which of the following information can a hacker easily obtain
from running passive scans on a network?
User credentials and passwords
Hardware configurations
Network settings
Open ports and services(Correct)
窗体底端
窗体顶端
Question 26: Which of the following is a recommended way to prevent buffer
overflow attacks?
Network segmentation
Strong password policies
Encryption
Static code analysis (Correct)
窗体底端
窗体顶端
Question 27: Which of the following is considered an administrative control?
Incident Response Plan (Correct)
Metal Detector
ID Card
窗体底端
窗体顶端
Question 28: Which access control model is designed to grant object access to
a subject based on their role?
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)(Correct)
窗体底端
窗体顶端
Question 29: Which of the following control types is a vulnerability scanner?
Technical (Correct)
Administrative
Physical
Detective
窗体底端
窗体顶端
Question 31: Which of the following principles aims to prevent any single
individual from having complete control over all processes in a sensitive
transaction?
Least Privilege
Separation of Powers
Segregation of Duties(Correct)
Two-Factor Authentication
窗体底端
窗体顶端
Question 32: What is the primary objective of implementing logical controls?
Monitor network traffic
窗体底端
窗体顶端
Question 33: In implementing rules and defining access control permissions
within Discretionary Access Control (DAC), what is a fundamental concept that
can be employed?
Security Labels
Policy
Roles
窗体底端
窗体顶端
Question 34: Which of the following uses radio waves for contactless
communication with a reader?
RFID card(Correct)
Smart card
Access card
Magnetic stripe card
窗体底端
窗体顶端
Question 35: Which of the following represents the fundamental process that
converts ciphertext to plaintext?
Key generation
Encryption
Hashing
Decryption(Correct)
窗体底端
窗体顶端
Question 36: Which of the following aims at reducing the probability and
impacts that result from a security incident?
Threat assessment
Security control(Correct)
Security awareness training
Incident response plan
窗体底端
窗体顶端
Question 38: What is a benefit of CIDR notation?
Enhanced security measures
Improved data transfer speeds
Simplified device configuration
Flexibility in segmenting the network address space (Correct)
Compression
Decryption (Correct)
窗体底端
窗体顶端
Question 40: Which portable device features a chip embedded mainly for
access control?
Smartphone
窗体底端
窗体顶端
Question 41: Which of the following activities is less likely to be a primary
objective in the context of system hardening?
Enforcing strong password policies
窗体底端
窗体顶端
Question 42: Which of the following represents the primary process aimed at
remediation of discovered vulnerabilities in information assets?
Threat modelling
Penetration testing
窗体底端
窗体顶端
Question 44:
Which of the following represents the primary source for the security
requirements that all members of the organization should abide by?
Security framework
Security guideline
Security procedure
Security policy(Correct)
Question 45: Which activity involves analyzing potential threat situations and
assets to rank the consequences and impacts to the organization?
Incident response
Vulnerability assessment
Quantitative risk assessment
Qualitative risk assessment(Correct)
窗体底端
窗体顶端
Question 46: What tool may be used to alert about and prevent abnormal
activity observed in the network?
IDS
IPS(Correct)
SIEM
Logging
窗体底端
窗体顶端
Question 48:Which of the following are detective controls?
Alarms
Keypad lock
Lighting
Camera (Correct)
窗体底端
窗体顶端
Question 49: Which cybersecurity concept involves the implementation of
multiple security control layers to provide a comprehensive defense against
various threats?
Perimeter security
Defense-in-Depth(Correct)
Endpoint protection
Access control
窗体底端
窗体顶端
Question 50: Which of the following represents the primary purpose of
ransomware in a cybersecurity attack?
Data exfiltration
System infiltration
Unauthorized access
窗体底端
窗体顶端
Question 51: Which of the following is an access control model?
DLP
NGF
IPS
MAC (Correct)
窗体底端
窗体顶端
Question 52: Which security measure can concurrently safeguard
confidentiality and integrity without explicitly ensuring availability?
Firewall
Intrusion Detection System
Cryptography(Correct)
Access Control List
窗体底端
窗体顶端
Question 53: Which of the following is the most reliable source of evidence in
a cybersecurity forensic investigation focusing on access events in a system?
Configuration settings
System backups
Antivirus reports
Logs(Correct)
窗体底端
窗体顶端
Question 54: Which of the following types of malware can pretend to be a
legitimate word document?
Adware
Worm
Spyware
Trojan(Correct)
窗体底端
窗体顶端
Question 55: Which of the following terms refers to a table that contains
subjects, objects, and permissions along with how they are related to each
other?
Security Policy
Access Control List
Access Control Matrix(Correct)
Authentication Protocol
窗体底端
窗体顶端
窗体底端
窗体顶端
Question 58: Which of the following is the primary objective focused on
recognizing and ranking potential threats confronted by an organization to
implement appropriate measures for reduction or elimination?
Threat intelligence
Vulnerability assessment
Risk Management(Correct)
Incident detection
窗体底端
窗体顶端
Question 59: Which of the following poses a threat to physical security?
Malware
SQL injection
DoS
Vandalism (Correct)
窗体底端
窗体顶端
Question 60: Which process produces fixed output strings from variable
inputs?
Hashing(Correct)
Encryption
Compression
Encoding
窗体底端
窗体顶端
Question 62: What document shall set requirements for the creation,
updating, and management of passwords?
Security Policy
Password Policy (Correct)
Access Control Policy
Encryption Policy
窗体底端
窗体顶端
Question 63: Which control is most effective in deterring unarmed intruders
from a cold site?
Guard dogs(Correct)
Fence
Warning sign
Policy
Question 64: What security measure is capable of reducing the attack surface?
Intrusion Detection System (IDS)
Antivirus Software
System hardening(Correct)
Network segmentation
Question 65: What is a key advantage of quantitative risk analysis?
Increased stakeholder communication
窗体底端
窗体顶端
Question 66: Which of the following best describes a condition in which a
system, network, or application has a weakness that could be intentionally
triggered or exploited to compromise the confidentiality, integrity, or
availability of information?
Vulnerability
Threat
Exposure(Correct)
Risk
Question 67: What security principle is impacted when a botnet army floods
packets to a server?
Confidentiality
Integrity
Authentication
Availability(Correct)
窗体底端
窗体顶端
Question 68: Which of the following terms is used to describe a system or
network weakness that can be exploited or compromised by a threat source?
Threat
Exploit
Risk
Vulnerability(Correct)
窗体底端
窗体顶端
Question 70: What is a major cause of buffer overflow vulnerabilities?
Insufficient network monitoring
Poor programming practice(Correct)
\窗体底端
窗体顶端
Question 71: Which of the following is a crucial and ongoing activity necessary
to uphold the business continuity plan?
Network monitoring
System patching
Data backup
Training and re-assessment of personnel(Correct)
窗体底端
窗体顶端
Question 72: Which of the following attack vectors allows an attacker to
execute malicious scripts on a victim’s machine through a website trusted by
the target?
Cross-Site Scripting (XSS)(Correct)
SQL Injection
Man-in-the-Middle (MitM) Attack
Distributed Denial of Service (DDoS) Attack
Question 73: What method is considered the most effective for testing a
business continuity plan to simulate a real disaster scenario?
Tabletop exercise
Checklist review
Partial interruption test
Executing a full interruption test(Correct)
窗体底端
窗体顶端
Question 74: Which tool is commonly employed for managing authentication
and identities in cybersecurity?
Antivirus software
Firewall
Intrusion Detection System
Directory Services(Correct)
窗体底端
窗体顶端
Question 75: Which of the following CIDR notations represents the subnet
mask 255.0.0.0?
/8(Correct)
/16
/24
/32
窗体底端
窗体顶端
Question 76: What type of malware is designed to capture events occurring
on a system and transmit them to a remote attacker?
Adware
Ransomware
Spyware(Correct)
Worm
窗体底端
窗体顶端
Question 78: Which of the following represents rules established by
governmental agencies to enforce legal requirements?
Policies
Procedures
Standards
Laws(Correct)
窗体底端
窗体顶端
Question 79: Which of the following documents within an organization
consists of executive leadership statements outlining requirements for the
security program?
Incident response plan
Security awareness training materials
Security Policy(Correct)
Risk management framework
窗体底端
窗体顶端
Question 80: During which phase of the incident response plan are the goals,
mission, and strategy defined?
Detection
Preparation (Correct)
Containment
Eradication
Risk mitigation
Incident detection
Compliance monitoring
窗体底端
窗体顶端
Question 82: What is a malicious software program aimed at compromising a
system, network, or information asset?
Spim
Spam
Patch
Malware (Correct)
窗体底端
窗体顶端
Question 83: Which of the following are administrative controls?
Firewall, antivirus, disk encrypter
Bollard, cameras, locks
Fence, gates, walls
窗体底端
窗体顶端
Question 85: Which technical control can be employed to regulate and
manage network traffic based on specified rules?
Intrusion Detection System (IDS)
Antivirus Software
Firewall(Correct)
窗体底端
窗体顶端
Question 88: Which of the following measures is least effective in preventing
physical attacks?
Sealed door
Wall
Bollards
CCTV(Correct)
窗体底端
窗体顶端
Question 89: Which of the following represents the primary goal of
implementing data security measures?
Enhancing system performance
Ensuring data availability
Preventing unauthorized access to the information(Correct)
MTBF
MTTR
窗体底端
窗体顶端
Question 91: After a disaster has occurred, what is the maximum allowable
time that can elapse before business services must become operational?
RPO
MTBF
MTTR
RTO (Correct)
窗体底端
窗体顶端
Question 92: Which activity is not commonly part of security awareness
training?
Security policy guidance
Advanced hacking demonstrations(Correct)
窗体底端
窗体顶端
Question 94: Which method is considered the most secure for exchanging a
symmetric cryptographic key?
Out-of-band distribution(Correct)
Question 96: At which layer of the OSI model does SMTP operate?
Physical
Data Link
Network
Application(Correct)
窗体底端
窗体顶端
Question 97: Which of the following represents the correct order of layers in
the OSI model from layer 1 to 7?
Physical, Data Link, Network, Transport, Session, Presentation, Application.
(Correct)
窗体底端
窗体顶端
Question 98:In the TCP/IP model, what is the correct order of layers from
bottom to top?
Internet → Network Access → Transport → Application.
Network Access → Internet → Transport → Application.(Correct)
Question 99: Which of the following are frameworks that provide best
practices for achieving an objective?
Standards (Correct)
Regulations
Guidelines
Policies
窗体底端
窗体顶端
Question 100: Which of the following represents a passive attack?
Phishing
Malware
DDoS