Final
Final
In which framework would you most likely find a matrix of tac9cs used at different
stages of a cyber a=ack lifecycle?
2. In the Diamond Model, what represents the tools, malware, or methods used by the
a=acker?
A. Adversary
B. Infrastructure
C. Capability
D. Result
Answer: C. Capability
3. In the Cyber Kill Chain, which phase is focused on pairing a payload with an exploit?
A. Reconnaissance
B. Weaponiza9on
C. Delivery
D. Installa9on
Answer: B. Weaponiza9on
Answer: c) dd
8. When dealing with cloud environments, which of the following is a poten9al barrier to
effec9ve digital forensics?
a) Over-reliance on physical servers
b) Too much storage availability
c) Inability to access server logs due to provider restric9ons
d) Decreased scalability
Answer: c)
10. Which of the following is NOT typically a considera9on when placing data on legal hold?
a) Dura9on of the hold
b) Cloud provider's market share showing acceptability by the legal community
c) Specific data types and loca9ons
d) Preserva9on methods and procedures
Answer: b) Cloud provider's market share showing acceptability by the legal community
11. Which document provides detailed technical steps to recover IT systems following a
disrup9on?
A) Business Con9nuity Plan
B) Disaster Recovery Plan
C) Incident Response Plan
D) Security Policy Document
Answer: B) Disaster Recovery Plan
12. An individual who knowingly causes the transmission of a program that damages a
computer, network, or system could be prosecuted under which sec9on of the CFAA
A) Sec9on 1029
B) Sec9on 1030(a)(5)(A)
C) Sec9on 1041(a)(7)
D) Sec9on 1052(b)(3)
answer: B)
13. Which component of FISMA emphasizes the need for con9nuous monitoring of
informa9on systems?
A) Risk Management Framework (RMF)
B) Federal Agency Security Prac9ces (FASP)
C) Categoriza9on of Informa9on Systems
D) Informa9on System Security Officer (ISSO) responsibili9es
14. Which requirement in PCI DSS focuses on the use of strong cryptography and secure
protocols?
A) Requirement 1(Build and Maintain Secure Network and Systems)
B) Requirement 6 (Maintain a Vulnerability Management System)
C) Requirement 9 (Implement Strong Access Control Measures)
D) Requirement 4 (Protect Cardholder Data)
Correct Answer: D) Requirement 4
15. A file in a system has an associated list detailing that User A can read and write, while
User B can only read. This is an example of:
A) Capabili9es Table
B) Role-Based Access
Answer: D
16. A system uses a table that indicates User X can access Files Y and Z, while User A can
access File B. What best describes this system?
B) Capabili9es Table
C) Role-Based Access with MAC
Answer: B
17. In a MAC system, how is the decision made regarding a user's access to a file?
Answer: C
18. Which process involves an en9ty claiming a specific iden9ty, usually through a unique
iden9fier?
A) Authen9ca9on
B) Authoriza9on
C) Accountability
D) Iden9fica9on
Answer: D
19. Which principle is enforced by the Bell-LaPadula model to prevent informa9on from
flowing from a high-security level to a low-security level?
Answer: A
20. clearance cannot write to objects (like files) at a lower security level?
Answer: A
21. The Bell-LaPadula model is primarily concerned with which of the following aspects of
security?
A) Integrity
B) Availability
C) Confiden9ality
D) Accountability
Answer: C
22. Which model provides a set of eight basic protec9on rights, including the right to
create an object and the right to destroy an object?
A) Graham-Denning
B) Clark-Wilson
C) Bell-LaPadula
Answer: A
23. Which model focuses on commercial security, addressing the inadequacies of the Bell-
LaPadula and Biba models in that context?
A) Graham-Denning
B) Clark-Wilson
D) Bell-LaPadula
25. Which model does not inherently focus on the separa9on of du9es concept
A) Biba
B) Clark-Wilson
C) Bell-LaPadula
D) Graham-Denning
Answer: A
26. Which type of firewall works at the network layer and makes decisions based on
source and des9na9on IP addresses, port numbers, and protocols?
A) Proxy Firewall
B) Applica9on Firewall
D) Circuit-Level Gateway
27. Which firewall feature keeps track of ac9ve connec9ons to determine if an incoming
packet is part of an established connec9on?
B) State Table
C) Address Restric9ons
D) Applica9on Inspec9on
Answer: B
28. Which is a primary advantage of stateful packet inspec9on over sta9c packet filtering?
Answer: B
29. If a firewall only allows incoming traffic if it corresponds to a request sent from inside
the network, it's likely using:
A) Address Restric9ons
Answer: D
30. A firewall that evaluates packets based on both its pre-defined rules and the state of
the connec9on is known as:
Answer: B
31. Which of the following is typically used for end-to-end communica9ons between
individual devices in VPN setups?
A) Tunnel Mode
B) Transport Mode
C) Secure Mode
D) Gateway Mode
Answer: B
A) RADIUS
B) LDAP
C) TACACS+
D) Diameter
Answer: C
A) Diameter
B) SNMP
C) TACACS
D) SSH
Answer: A
34. In terms of security, which protocol encrypts the en9re authen9ca9on packet?
A) RADIUS
B) Diameter
C) TACACS+
D) SMTP
Answer: C
35. Which protocol has an extensible architecture that can support new command codes
and aYributes without affec9ng exis9ng commands?
A) SSH
B) RADIUS
C) TACACS+
D) Diameter
Answer: D
36. Which of the following is a common use case for a network-based intrusion detec9on
system (NIDS)?
a) Monitoring and analyzing network traffic for signs of intrusion or malicious ac9vity
b) Monitoring and analyzing system files and configura9ons on a specific host or device
c) Detec9ng and preven9ng malware infec9ons
d) Detec9ng and preven9ng unauthorized access to a network
Correct Answer: a)
37. Which of the following IDS techniques can BEST detect zero-day vulnerabili9es?
a) Anomaly-based IDS
b) Signature-based IDS
c) Behavior-based IDS
d) Heuris9c-based IDS
39. Which of the following is a common use case for a log file monitor?
a) Detec9ng unauthorized access to a system
b) Blocking malicious traffic
c) Encryp9ng sensi9ve data
d) Scanning for vulnerabili9es
Correct Answer: a)
41. Chosen Ciphertext a=acks are mostly used against what kind of cipher?
a. Private Key Cipher
b. Symmetric key Ciphers
c. Public Key Ciphers
d. Hash Algorithms
Ans. C –
42. What is not a method of steganography?
a. Superimposi9on
b. Injec9on
c. Subs9tu9on
d. Genera9on of a new file
Answer – A
Answer – B
45. Which type of encryp9on uses a one way transforma9on that is not reversible
a. MD5
b. RSA
c. DES
d. Diffie-Hellman
Ans. A
Answer B
47. Which of the following best describes shuffling the order of characters?
a. Permuta9on
b. Rota9on
c. Subs9tu9on
d. Hybrid
Answer A
Answer A
Answer – A
Answer D
Answer – D
52. Which standard defines the format and structure of digital cer9ficates used in many
security protocols, including SSL/TLS?
A) SSL/TLS
B) X.509
C) PKCS#12
D) PGP
Correct Answer: B) X.509