A company's main asset is a physical working prototype stored in the research and development
department. The prototype is not currently connected to the
... [Show More] company's network.
Which privileged user activity should be monitored?
a. Accessing camera logs
b. Adding accounts to the administrator group
c. Running scripts in PowerShell
d. Disabling host firewall CORRECT ANSWERS: a
A company performs a data audit on its critical information every six months. Company policy
states that the audit cannot be conducted by the same employee within a two-year time frame.
Which principle is this company following?
a. Job rotation
b. Two person control
c. Least privilege
d. Need to know CORRECT ANSWERS: a
A user is granted access to restricted and classified information but is supplied only with the
information for a current assignment.
Which type of authorization mechanism is being applied in this scenario?
a. Need to know
b. Constrained interface
c. Duty separation
d Access control list CORRECT ANSWERS: a
Which two data recovery components will back up a file and change the archive bit to 0?
Choose 2 answers.
a. Full backup
b. Differential backup
c. Incremental backup
d. Copy backup CORRECT ANSWERS: a, c
A company wants to monitor the inbound and outbound flow of packets and not the content.
Which defense-in-depth strategy should be implemented?
a. The organization should use egress filtering on the network.
b. Traffic and trend analyses should be installed on the router.
c. The administrator should configure network data loss prevention.
d. RADIUS authentication should be used on the bastion host. CORRECT ANSWERS: b
A penetration tester identifies a SQL injection vulnerability in a business-critical web
application. The security administrator discusses this finding with the application developer, and
the developer insists that the issue would take two months to remediate.
Which defense-in-depth practice should the security administrator use to prevent an attacker
from exploiting this weakness before the developer can implement a fix?
a. Perform daily vulnerability scans
b. Implement a web-application firewall
c. Submit an urgent change control ticket
d. Deploy an anti malware agent to the web server CORRECT ANSWERS: b
A company is concerned about securing its corporate network, including its wireless network, to
limit security risks.
Which defense-in-depth practice represents an application of least privilege?
a. Implement mutual multifactor authentication
b. Configure Wi-Fi-Protected Access for encrypted communication
c. Disable wireless access to users who do not need it
d. Implement an intrusion detection system CORRECT ANSWERS: c
A technician notifies her supervisor that the nightly backup of a critical system failed during the
previous night's run. Because the system is critical to the organization, the technician raised the
issue in order to make management aware of the missing backup. The technician is looking for
guidance on whether additional actions should be taken on the single backup failure.
Which role is responsible for making the final decision on how to handle the incomplete backup?
a. Senior management
b. Data owner
c. Supervisor
d. Application administrator CORRECT ANSWERS: b
A company relies exclusively on a system for critical functions. An audit is performed, and the
report notes that there is no log review performed on the system. Management has been tasked
with selecting the appropriate person to perform the log reviews in order to correct the
deficiency.
Which role is responsible for reviewing and auditing logs in order to detect any malicious
behavior?
a. Security Administrator
b. System user
c. Database administrator
d. Senior management CORRECT ANSWERS: a
A company's main asset is its client list stored in the company database, which is accessible to
only specific users. The client list contains Health Insurance Portability and Accountability Act
(HIPAA) protected data.
Which user activity should be monitored? [Show Less]