You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" CompTIA SecurityX (CAS-005) Practice Test 1 "
0 of 65 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
CompTIA SecurityX
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking view questions. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Answered
Review
Question 1 of 65
1. Question
Which of the following is an example of an incident?
Correct
Several invalid password attempts for multiple users is an example of an incident. All the other examples are events.
Incorrect
Several invalid password attempts for multiple users is an example of an incident. All the other examples are events.
Unattempted
Several invalid password attempts for multiple users is an example of an incident. All the other examples are events.
Question 2 of 65
2. Question
Which of the following creates an encrypted area to hold and quarantine corporate data separately from that of the users?
Correct
Containerization is a newer feature of most mobile device management (MDM) software that creates an encrypted “container” to hold and quarantine corporate data separately from that of the users. This allows for MDM policies to be applied only to that container and not the rest of the device.
Incorrect
Containerization is a newer feature of most mobile device management (MDM) software that creates an encrypted “container” to hold and quarantine corporate data separately from that of the users. This allows for MDM policies to be applied only to that container and not the rest of the device.
Unattempted
Containerization is a newer feature of most mobile device management (MDM) software that creates an encrypted “container” to hold and quarantine corporate data separately from that of the users. This allows for MDM policies to be applied only to that container and not the rest of the device.
Question 3 of 65
3. Question
Your organization has recently undergone major restructuring. During this time, a new chief security officer (CSO) was hired. He has asked you to make recommendations for the implementation of organizational security policies. Which of the following should you not recommend?
Correct
The principle of least privilege should be implemented for all positions, not just high-level positions.
Incorrect
The principle of least privilege should be implemented for all positions, not just high-level positions.
Unattempted
The principle of least privilege should be implemented for all positions, not just high-level positions.
Question 4 of 65
4. Question
Which of the following tenets has been satisfied when an organization takes all the actions it can reasonably take to prevent
security issues or to mitigate damage if security breaches occur?
Correct
Due care means that an organization takes all the actions it can reasonably take to prevent security issues or to mitigate damage if security breaches occur.
Incorrect
Due care means that an organization takes all the actions it can reasonably take to prevent security issues or to mitigate damage if security breaches occur.
Unattempted
Due care means that an organization takes all the actions it can reasonably take to prevent security issues or to mitigate damage if security breaches occur.
Question 5 of 65
5. Question
As a security analyst for your organization, you have implemented several new security controls. Management requests
that you analyze the availability of several devices and provide them with the appropriate metrics. Which metrics should you
provide?
Correct
You should provide mean time to repair (MTTR) and mean time between failures (MTBF) to provide management with metrics regarding availability.
Incorrect
You should provide mean time to repair (MTTR) and mean time between failures (MTBF) to provide management with metrics regarding availability.
Unattempted
You should provide mean time to repair (MTTR) and mean time between failures (MTBF) to provide management with metrics regarding availability.
Question 6 of 65
6. Question
Which of the following are used to steal proximity badge information?
Correct
Malicious individuals use RFID tools to steal proximity badge information from an unsuspecting employee who physically walks near the concealed device.
Incorrect
Malicious individuals use RFID tools to steal proximity badge information from an unsuspecting employee who physically walks near the concealed device.
Unattempted
Malicious individuals use RFID tools to steal proximity badge information from an unsuspecting employee who physically walks near the concealed device.
Question 7 of 65
7. Question
A security analyst is using the SCinformation system = [(confidentiality, impact), (integrity, impact), (availability, impact)]
formula while performing risk analysis. What will this formula be used for?
Correct
The formula given in the scenario is used to calculate the aggregate CIA score. To calculate ALE, you should multiply SLE Ă— ARO. To calculate SLE, you should multiply AV Ă— EF. Quantitative risk involves using SLE and ALE.
Incorrect
The formula given in the scenario is used to calculate the aggregate CIA score. To calculate ALE, you should multiply SLE Ă— ARO. To calculate SLE, you should multiply AV Ă— EF. Quantitative risk involves using SLE and ALE.
Unattempted
The formula given in the scenario is used to calculate the aggregate CIA score. To calculate ALE, you should multiply SLE Ă— ARO. To calculate SLE, you should multiply AV Ă— EF. Quantitative risk involves using SLE and ALE.
Question 8 of 65
8. Question
You need to identify zero-day malware. What technique could be used to help in this process?
Correct
Malware sandboxing aims to detect malware code by running it in a computer-based system of some type to analyze it for behavior and traits that indicate of malware. One of its goals is to spot zero-day malware—that is, malware that has not yet been identified by commercial anti-malware systems and for which there is not yet a cure.
Incorrect
Malware sandboxing aims to detect malware code by running it in a computer-based system of some type to analyze it for behavior and traits that indicate of malware. One of its goals is to spot zero-day malware—that is, malware that has not yet been identified by commercial anti-malware systems and for which there is not yet a cure.
Unattempted
Malware sandboxing aims to detect malware code by running it in a computer-based system of some type to analyze it for behavior and traits that indicate of malware. One of its goals is to spot zero-day malware—that is, malware that has not yet been identified by commercial anti-malware systems and for which there is not yet a cure.
Question 9 of 65
9. Question
Which of the following cloud approaches offers the maximum control over company data?
Correct
There is a trade-off when a decision must be made between the two architectures. A private solution provides the most control over the safety of your data but also requires staff and knowledge to deploy, manage, and secure the solution.
Incorrect
There is a trade-off when a decision must be made between the two architectures. A private solution provides the most control over the safety of your data but also requires staff and knowledge to deploy, manage, and secure the solution.
Unattempted
There is a trade-off when a decision must be made between the two architectures. A private solution provides the most control over the safety of your data but also requires staff and knowledge to deploy, manage, and secure the solution.
Question 10 of 65
10. Question
The following is what type of attack?
#include
char *code = “AAAABBBBCCCCDDD”; //including the character ‘\0’
size = 16 bytes
void main()
{char buf[8];
strcpy(buf,code);
Correct
In this example of a buffer overflow, 16 characters are being sent to a buffer that is only 8 bytes. With proper input validation, this will cause an access violation.
Incorrect
In this example of a buffer overflow, 16 characters are being sent to a buffer that is only 8 bytes. With proper input validation, this will cause an access violation.
Unattempted
In this example of a buffer overflow, 16 characters are being sent to a buffer that is only 8 bytes. With proper input validation, this will cause an access violation.
Question 11 of 65
11. Question
Your organization has established a new security metrics policy to be more proactive in its security measures. As part of the policy, you have been tasked with collecting and comparing metrics on a day-to-day basis. Which of the following are you performing?
Correct
When you are collecting and comparing metrics on a day-today basis, you are performing daily workloads.
Incorrect
When you are collecting and comparing metrics on a day-today basis, you are performing daily workloads.
Unattempted
When you are collecting and comparing metrics on a day-today basis, you are performing daily workloads.
Question 12 of 65
12. Question
In which type of test is the tester provided with limited knowledge of the network systems and devices, does the tester perform the test using publicly available information only, and does the organization’s security team knows that an attack is coming?
Correct
In a blind test, the testing team is provided with limited knowledge of the network systems and devices and performs the test using publicly available information only. The organization’s security team knows that an attack is coming. This test requires more effort from the testing team.
Incorrect
In a blind test, the testing team is provided with limited knowledge of the network systems and devices and performs the test using publicly available information only. The organization’s security team knows that an attack is coming. This test requires more effort from the testing team.
Unattempted
In a blind test, the testing team is provided with limited knowledge of the network systems and devices and performs the test using publicly available information only. The organization’s security team knows that an attack is coming. This test requires more effort from the testing team.
Question 13 of 65
13. Question
Which of the following applies rule sets to an HTTP conversation?
Correct
A web application firewall (WAF) applies rule sets to an HTTP conversation. These sets cover common attack types to which these session types are susceptible.
Incorrect
A web application firewall (WAF) applies rule sets to an HTTP conversation. These sets cover common attack types to which these session types are susceptible.
Unattempted
A web application firewall (WAF) applies rule sets to an HTTP conversation. These sets cover common attack types to which these session types are susceptible.
Question 14 of 65
14. Question
Which of the following is used to provision certificates to network devices, including mobile devices?
Correct
Simple Certificate Enrollment Protocol (SCEP) is used to provision certificates to network devices, including mobile devices.
Incorrect
Simple Certificate Enrollment Protocol (SCEP) is used to provision certificates to network devices, including mobile devices.
Unattempted
Simple Certificate Enrollment Protocol (SCEP) is used to provision certificates to network devices, including mobile devices.
Question 15 of 65
15. Question
You are the security analyst for your enterprise. You have been asked to make several security controls easier to implement and manage. Which attribute will you be addressing?
Correct
Usability means making a security solution or device easier to use and matching the solution or device more closely to organizational needs and requirements.
Incorrect
Usability means making a security solution or device easier to use and matching the solution or device more closely to organizational needs and requirements.
Unattempted
Usability means making a security solution or device easier to use and matching the solution or device more closely to organizational needs and requirements.
Question 16 of 65
16. Question
You have recently suffered some network attacks and would like to discover what services are available on the computers in your network. Which of the following assessment tools would be most appropriate for this?
Correct
Port scanners can be used to scan a network for open ports. Open ports indicate services that may be running and listening on a device that may be susceptible to being used for an attack. These tools basically ping every address and port number combination and keep track of which ports are open on each device as the pings are answered by open ports with listening services and not answered by closed ports.
Incorrect
Port scanners can be used to scan a network for open ports. Open ports indicate services that may be running and listening on a device that may be susceptible to being used for an attack. These tools basically ping every address and port number combination and keep track of which ports are open on each device as the pings are answered by open ports with listening services and not answered by closed ports.
Unattempted
Port scanners can be used to scan a network for open ports. Open ports indicate services that may be running and listening on a device that may be susceptible to being used for an attack. These tools basically ping every address and port number combination and keep track of which ports are open on each device as the pings are answered by open ports with listening services and not answered by closed ports.
Question 17 of 65
17. Question
Your company has decided to deploy network access control (NAC) on the enterprise to ensure that all devices comply with
corporate security policies. Which of the following should be done first?
Correct
First, you should develop the policy for NAC. A policy should be written first, and then the process, and then the procedures.
Incorrect
First, you should develop the policy for NAC. A policy should be written first, and then the process, and then the procedures.
Unattempted
First, you should develop the policy for NAC. A policy should be written first, and then the process, and then the procedures.
Question 18 of 65
18. Question
Which IPv4-to-IPv6 transition mechanism assigns addresses and creates host-to-host tunnels for unicast IPv6 traffic when IPv6
hosts are located behind IPv4 network address translators?
Correct
Teredo assigns addresses and creates host-to-host tunnels for unicast IPv6 traffic when IPv6 hosts are located behind IPv4 network address translators.
Incorrect
Teredo assigns addresses and creates host-to-host tunnels for unicast IPv6 traffic when IPv6 hosts are located behind IPv4 network address translators.
Unattempted
Teredo assigns addresses and creates host-to-host tunnels for unicast IPv6 traffic when IPv6 hosts are located behind IPv4 network address translators.
Question 19 of 65
19. Question
Some server products have certain capabilities (such as FTP), but those services may need to be enabled in order to function so that the service is not available to a hacker. What application security principle does this illustrate?
Correct
Secure by default means that without changes, the application is secure. For example, some server products have certain capabilities (such as FTP), but the service has to be enabled. This ensures that the port is not open if it is not being used.
Incorrect
Secure by default means that without changes, the application is secure. For example, some server products have certain capabilities (such as FTP), but the service has to be enabled. This ensures that the port is not open if it is not being used.
Unattempted
Secure by default means that without changes, the application is secure. For example, some server products have certain capabilities (such as FTP), but the service has to be enabled. This ensures that the port is not open if it is not being used.
Question 20 of 65
20. Question
An organization has a research server farm with a value of $12,000. The exposure factor for a complete power failure is 10%.
The annualized rate of occurrence that this will occur is 5%. What is the ALE for this event?
Correct
ALE = SLE Ă— ARO = $1,200 Ă— 5% = $60 SLE = AV Ă— EF = $12,000 Ă— 10% = $1,200
Incorrect
ALE = SLE Ă— ARO = $1,200 Ă— 5% = $60 SLE = AV Ă— EF = $12,000 Ă— 10% = $1,200
Unattempted
ALE = SLE Ă— ARO = $1,200 Ă— 5% = $60 SLE = AV Ă— EF = $12,000 Ă— 10% = $1,200
Question 21 of 65
21. Question
Recently someone stole data from your network, and that data should have been encrypted, but it’s too late to figure out whether it was. What tool could you use to determine if certain types of traffic on your network are encrypted?
Correct
Protocol analyzers, or sniffers, collect raw packets from the network and are used by both legitimate security professionals and attackers. Using such a tool, you could tell if the traffic of interest is encrypted.
Incorrect
Protocol analyzers, or sniffers, collect raw packets from the network and are used by both legitimate security professionals and attackers. Using such a tool, you could tell if the traffic of interest is encrypted.
Unattempted
Protocol analyzers, or sniffers, collect raw packets from the network and are used by both legitimate security professionals and attackers. Using such a tool, you could tell if the traffic of interest is encrypted.
Question 22 of 65
22. Question
OllyDbg is an example of which tool type?
Correct
OllyDbg is a reverse engineering tool. Specifically, it is a 32- bit, assembler-level analyzing debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where the source is unavailable.
Incorrect
OllyDbg is a reverse engineering tool. Specifically, it is a 32- bit, assembler-level analyzing debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where the source is unavailable.
Unattempted
OllyDbg is a reverse engineering tool. Specifically, it is a 32- bit, assembler-level analyzing debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where the source is unavailable.
Question 23 of 65
23. Question
Which of the following refers to responsibilities that an organization has due to partnerships with other organizations and
customers?
Correct
Downstream liability refers to liability that an organization accrues due to partnerships with other organizations and customers.
Incorrect
Downstream liability refers to liability that an organization accrues due to partnerships with other organizations and customers.
Unattempted
Downstream liability refers to liability that an organization accrues due to partnerships with other organizations and customers.
Question 24 of 65
24. Question
Which of the following is information on the connection between a mobile device and a radio?
Correct
The product release information (PRI) is the connection between a mobile device and a radio. From time to time, this may need to be updated, and such updates may add features or increase data speed.
Incorrect
The product release information (PRI) is the connection between a mobile device and a radio. From time to time, this may need to be updated, and such updates may add features or increase data speed.
Unattempted
The product release information (PRI) is the connection between a mobile device and a radio. From time to time, this may need to be updated, and such updates may add features or increase data speed.
Question 25 of 65
25. Question
What services allow for changes to an operating system to be detected by an authorized party?
Correct
Attestation services allow an authorized party to detect changes to an operating system. Attestation services involve generating a certificate for the hardware that states what software is currently running. The computer can use this certificate to attest that unaltered software is currently executing.
Incorrect
Attestation services allow an authorized party to detect changes to an operating system. Attestation services involve generating a certificate for the hardware that states what software is currently running. The computer can use this certificate to attest that unaltered software is currently executing.
Unattempted
Attestation services allow an authorized party to detect changes to an operating system. Attestation services involve generating a certificate for the hardware that states what software is currently running. The computer can use this certificate to attest that unaltered software is currently executing.
Question 26 of 65
26. Question
In what type of web attack does the website think that a request came from the user’s browser and was made by the user himself, when actually the request was planted in the user’s browser?
Correct
Cross-Site Request Forgery (CSRF) is an attack that causes an end user to execute unwanted actions on a web application in which he or she is currently authenticated. Unlike with XSS, in CSRF, the attacker exploits the website’s trust of the browser rather than the other way around. The website thinks that the request came from the user’s browser and is made by the user when actually the request was planted in the user’s browser.
Incorrect
Cross-Site Request Forgery (CSRF) is an attack that causes an end user to execute unwanted actions on a web application in which he or she is currently authenticated. Unlike with XSS, in CSRF, the attacker exploits the website’s trust of the browser rather than the other way around. The website thinks that the request came from the user’s browser and is made by the user when actually the request was planted in the user’s browser.
Unattempted
Cross-Site Request Forgery (CSRF) is an attack that causes an end user to execute unwanted actions on a web application in which he or she is currently authenticated. Unlike with XSS, in CSRF, the attacker exploits the website’s trust of the browser rather than the other way around. The website thinks that the request came from the user’s browser and is made by the user when actually the request was planted in the user’s browser.
Question 27 of 65
27. Question
Which of the following is not a single protocol but a framework
Correct
Extensible Authentication Protocol (EAP) is not a single protocol but a framework for port-based access control that uses the same three components as RADIUS.
Incorrect
Extensible Authentication Protocol (EAP) is not a single protocol but a framework for port-based access control that uses the same three components as RADIUS.
Unattempted
Extensible Authentication Protocol (EAP) is not a single protocol but a framework for port-based access control that uses the same three components as RADIUS.
Question 28 of 65
28. Question
Which document requires that a vendor reply with a formal bid proposal?
Correct
A request for proposal (RFP) requires that a vendor reply with a formal bid proposal.
Incorrect
A request for proposal (RFP) requires that a vendor reply with a formal bid proposal.
Unattempted
A request for proposal (RFP) requires that a vendor reply with a formal bid proposal.
Question 29 of 65
29. Question
Recently your users were redirected to a malicious site when their
DNS cache was polluted. What type of attack have you suffered?
Correct
Pharming is similar to phishing, but pharming actually pollutes the contents of a computer’s DNS cache so that requests to a legitimate site are routed to an alternate site.
Incorrect
Pharming is similar to phishing, but pharming actually pollutes the contents of a computer’s DNS cache so that requests to a legitimate site are routed to an alternate site.
Unattempted
Pharming is similar to phishing, but pharming actually pollutes the contents of a computer’s DNS cache so that requests to a legitimate site are routed to an alternate site.
Question 30 of 65
30. Question
Which of the following is a graphical desktop sharing system that uses the Remote Frame Buffer (RFB) protocol to remotely control another computer?
Correct
Virtual network computing (VNC) technology is a graphical desktop sharing system that uses the Remote Frame Buffer (RFB) protocol to remotely control another computer. There is a mobile version of VNC that can be installed for this purpose.
Incorrect
Virtual network computing (VNC) technology is a graphical desktop sharing system that uses the Remote Frame Buffer (RFB) protocol to remotely control another computer. There is a mobile version of VNC that can be installed for this purpose.
Unattempted
Virtual network computing (VNC) technology is a graphical desktop sharing system that uses the Remote Frame Buffer (RFB) protocol to remotely control another computer. There is a mobile version of VNC that can be installed for this purpose.
Question 31 of 65
31. Question
A group of your software developers just reviewed code while the author explained his reasoning. What type of code review have they just completed?
Correct
In over-the-shoulder code review, coworkers review the code while the author explains his reasoning.
Incorrect
In over-the-shoulder code review, coworkers review the code while the author explains his reasoning.
Unattempted
In over-the-shoulder code review, coworkers review the code while the author explains his reasoning.
Question 32 of 65
32. Question
Which of the following is a standard that the security automation community uses to enumerate software flaws and configuration issues?
Correct
Security Content Automation Protocol (SCAP) is a standard that the security automation community uses to enumerate software flaws and configuration issues. It standardized the nomenclature and formats used. A vendor of security automation products can obtain a validation against SCAP, demonstrating that it will interoperate with other scanners and express the scan results in a standardized way.
Incorrect
Security Content Automation Protocol (SCAP) is a standard that the security automation community uses to enumerate software flaws and configuration issues. It standardized the nomenclature and formats used. A vendor of security automation products can obtain a validation against SCAP, demonstrating that it will interoperate with other scanners and express the scan results in a standardized way.
Unattempted
Security Content Automation Protocol (SCAP) is a standard that the security automation community uses to enumerate software flaws and configuration issues. It standardized the nomenclature and formats used. A vendor of security automation products can obtain a validation against SCAP, demonstrating that it will interoperate with other scanners and express the scan results in a standardized way.
Question 33 of 65
33. Question
You implemented a procedure whereby a testing team was provided with limited knowledge of the network systems and
devices and could use publicly available information. The organization’s security team was NOT informed that an attack was
coming. What type of test have you implemented?
Correct
In a double blind test, the testing team is provided with limited knowledge of the network systems and devices using publicly available information. The organization’s security team does not know that an attack is coming.
Incorrect
In a double blind test, the testing team is provided with limited knowledge of the network systems and devices using publicly available information. The organization’s security team does not know that an attack is coming.
Unattempted
In a double blind test, the testing team is provided with limited knowledge of the network systems and devices using publicly available information. The organization’s security team does not know that an attack is coming.
Question 34 of 65
34. Question
ACLs are susceptible to what type of attack?
Correct
The inherent limitation of ACLs is their inability to detect whether IP spoofing is occurring. IP address spoofing is a technique hackers use to hide their trail or to masquerade as other computers. A hacker alters the IP address as it appears in a packet to attempt to allow the packet to get through an ACL that is based on IP addresses.
Incorrect
The inherent limitation of ACLs is their inability to detect whether IP spoofing is occurring. IP address spoofing is a technique hackers use to hide their trail or to masquerade as other computers. A hacker alters the IP address as it appears in a packet to attempt to allow the packet to get through an ACL that is based on IP addresses.
Unattempted
The inherent limitation of ACLs is their inability to detect whether IP spoofing is occurring. IP address spoofing is a technique hackers use to hide their trail or to masquerade as other computers. A hacker alters the IP address as it appears in a packet to attempt to allow the packet to get through an ACL that is based on IP addresses.
Question 35 of 65
35. Question
Your organization has experienced several security issues in the past year, and management has adopted a plan to periodically assess its information security awareness. You have been asked to lead this program. Which program are you leading?
Correct
You are leading the continuous monitoring program, which will periodically assess its information security awareness. A security training program designs and delivers security training at all levels of the organization. A risk mitigation program attempts to identify risks and select and deploy mitigating controls. A threat identification identifies all threats to an organization as part of risk management.
Incorrect
You are leading the continuous monitoring program, which will periodically assess its information security awareness. A security training program designs and delivers security training at all levels of the organization. A risk mitigation program attempts to identify risks and select and deploy mitigating controls. A threat identification identifies all threats to an organization as part of risk management.
Unattempted
You are leading the continuous monitoring program, which will periodically assess its information security awareness. A security training program designs and delivers security training at all levels of the organization. A risk mitigation program attempts to identify risks and select and deploy mitigating controls. A threat identification identifies all threats to an organization as part of risk management.
Question 36 of 65
36. Question
Which of the following is not a safe computing practice?
Correct
Autorun should be disabled.
Incorrect
Autorun should be disabled.
Unattempted
Autorun should be disabled.
Question 37 of 65
37. Question
Which of the following is the process of using a programming tool to not only identify syntactic problems in code but also discover weaknesses that can lead to memory leaks and buffer overflows?
Correct
Runtime debugging is the process of using a programming tool to not only identify syntactic problems in code but also discover weaknesses that can lead to memory leaks and buffer overflows. Runtime debugging tools operate by examining and monitoring the use of memory.
Incorrect
Runtime debugging is the process of using a programming tool to not only identify syntactic problems in code but also discover weaknesses that can lead to memory leaks and buffer overflows. Runtime debugging tools operate by examining and monitoring the use of memory.
Unattempted
Runtime debugging is the process of using a programming tool to not only identify syntactic problems in code but also discover weaknesses that can lead to memory leaks and buffer overflows. Runtime debugging tools operate by examining and monitoring the use of memory.
Question 38 of 65
38. Question
A hacker gains access to your organization’s network. During this attack, he is able to change some data and access some design plans that are protected by a U.S. patent. Which security tenets have been violated?
Correct
Confidentiality and integrity have been violated. Changing the data violates integrity, and accessing patented design plans violates confidentiality. Availability has not been violated in this scenario.
Incorrect
Confidentiality and integrity have been violated. Changing the data violates integrity, and accessing patented design plans violates confidentiality. Availability has not been violated in this scenario.
Unattempted
Confidentiality and integrity have been violated. Changing the data violates integrity, and accessing patented design plans violates confidentiality. Availability has not been violated in this scenario.
Question 39 of 65
39. Question
What port number does HTTPS use?
Correct
When HTTPS is used, port 80 is not used. Rather, HTTPS uses port 443.
Incorrect
When HTTPS is used, port 80 is not used. Rather, HTTPS uses port 443.
Unattempted
When HTTPS is used, port 80 is not used. Rather, HTTPS uses port 443.
Question 40 of 65
40. Question
What design measure is the solution to most XSS and CSRF attacks?
Correct
Input validation is the process of checking all input for things such as proper format and proper length.
Incorrect
Input validation is the process of checking all input for things such as proper format and proper length.
Unattempted
Input validation is the process of checking all input for things such as proper format and proper length.
Question 41 of 65
41. Question
Which of the following is used to control the use of a device and, when applied to a device, makes changes to settings such as the passcode settings?
Correct
An MDM configuration profile is used to control the use of a device and, when applied to a device, make changes to settings such as the passcode settings, Wi-Fi passwords, VPN configurations, and more.
Incorrect
An MDM configuration profile is used to control the use of a device and, when applied to a device, make changes to settings such as the passcode settings, Wi-Fi passwords, VPN configurations, and more.
Unattempted
An MDM configuration profile is used to control the use of a device and, when applied to a device, make changes to settings such as the passcode settings, Wi-Fi passwords, VPN configurations, and more.
Question 42 of 65
42. Question
Which form of HSM is specifically suited to mobile apps?
Correct
A microSD HSM is an HSM that connects to the microSD port on a device that has such a port. The card is specifically suited for mobile apps written for Android and is supported by most Android phones and tablets with a microSD card slot.
Incorrect
A microSD HSM is an HSM that connects to the microSD port on a device that has such a port. The card is specifically suited for mobile apps written for Android and is supported by most Android phones and tablets with a microSD card slot.
Unattempted
A microSD HSM is an HSM that connects to the microSD port on a device that has such a port. The card is specifically suited for mobile apps written for Android and is supported by most Android phones and tablets with a microSD card slot.
Question 43 of 65
43. Question
You have been asked to document the different threats to an internal file server. As part of that documentation, you need to
include the monetary impact of each threat occurrence. What should you do?
Correct
SLE indicates the monetary impact of each threat occurrence. ARO is the estimate of how often a given threat might occur annually. ALE is the expected risk factor of an annual threat event. EF is the percent value or functionality of an asset that will be lost when a threat event occurs.
Incorrect
SLE indicates the monetary impact of each threat occurrence. ARO is the estimate of how often a given threat might occur annually. ALE is the expected risk factor of an annual threat event. EF is the percent value or functionality of an asset that will be lost when a threat event occurs.
Unattempted
SLE indicates the monetary impact of each threat occurrence. ARO is the estimate of how often a given threat might occur annually. ALE is the expected risk factor of an annual threat event. EF is the percent value or functionality of an asset that will be lost when a threat event occurs.
Question 44 of 65
44. Question
Which of the following is most likely to be affected by the Sarbanes-Oxley (SOX) Act?
Correct
A publicly traded corporation is most likely to be affected by the Sarbanes-Oxley (SOX) Act.
Incorrect
A publicly traded corporation is most likely to be affected by the Sarbanes-Oxley (SOX) Act.
Unattempted
A publicly traded corporation is most likely to be affected by the Sarbanes-Oxley (SOX) Act.
Question 45 of 65
45. Question
Which of the following is used to manage a device using Telnet?
Correct
Management interfaces are used for accessing a device remotely. Typically, a management interface is disconnected from the in-band network and is connected to the device’s internal network. Through a management interface, you can access the device over the network by using utilities such as SSH and Telnet. SNMP can use the management interface to gather statistics from the device.
Incorrect
Management interfaces are used for accessing a device remotely. Typically, a management interface is disconnected from the in-band network and is connected to the device’s internal network. Through a management interface, you can access the device over the network by using utilities such as SSH and Telnet. SNMP can use the management interface to gather statistics from the device.
Unattempted
Management interfaces are used for accessing a device remotely. Typically, a management interface is disconnected from the in-band network and is connected to the device’s internal network. Through a management interface, you can access the device over the network by using utilities such as SSH and Telnet. SNMP can use the management interface to gather statistics from the device.
Question 46 of 65
46. Question
Which SCAP component contains methods for describing and classifying operating systems?
Correct
Common Platform Enumerations (CPE) are methods for describing and classifying operating systems applications and hardware devices.
Incorrect
Common Platform Enumerations (CPE) are methods for describing and classifying operating systems applications and hardware devices.
Unattempted
Common Platform Enumerations (CPE) are methods for describing and classifying operating systems applications and hardware devices.
Question 47 of 65
47. Question
Which attack involves unauthorized access to a device using a Bluetooth connection?
Correct
Bluesnarfing involves unauthorized access to a device using a Bluetooth connection. In this case, the attacker is trying to access information on the device.
Incorrect
Bluesnarfing involves unauthorized access to a device using a Bluetooth connection. In this case, the attacker is trying to access information on the device.
Unattempted
Bluesnarfing involves unauthorized access to a device using a Bluetooth connection. In this case, the attacker is trying to access information on the device.
Question 48 of 65
48. Question
Which of the following is not a part of hardening an OS?
Correct
The following are all components of hardening an OS: Unnecessary applications should be removed. Unnecessary services should be disabled. Unrequired ports should be blocked. The connecting of external storage devices and media should be tightly controlled, if allowed at all.
Incorrect
The following are all components of hardening an OS: Unnecessary applications should be removed. Unnecessary services should be disabled. Unrequired ports should be blocked. The connecting of external storage devices and media should be tightly controlled, if allowed at all.
Unattempted
The following are all components of hardening an OS: Unnecessary applications should be removed. Unnecessary services should be disabled. Unrequired ports should be blocked. The connecting of external storage devices and media should be tightly controlled, if allowed at all.
Question 49 of 65
49. Question
Your company has recently decided to switch Internet service providers. The new provider has provided a document that lists all the guaranteed performance levels of the new connection. Which document contains this information?
Correct
An SLA lists all the guaranteed performance levels of a new connection.
Incorrect
An SLA lists all the guaranteed performance levels of a new connection.
Unattempted
An SLA lists all the guaranteed performance levels of a new connection.
Question 50 of 65
50. Question
Your organization wants to deploy a new security control on its network. However, management has requested that you provide information on whether the security control will add value to the organization after its deployment. What should you do to provide this information to management?
Correct
You should perform a cost/benefit analysis for the new security control before deploying the control.
Incorrect
You should perform a cost/benefit analysis for the new security control before deploying the control.
Unattempted
You should perform a cost/benefit analysis for the new security control before deploying the control.
Question 51 of 65
51. Question
Your organization has decided to formally adopt a change management process, and you have been asked to design the
process. Which of the following guidelines should be part of this new process?
Correct
All changes should be formally requested. The following are some change management guidelines: Each request should be analyzed to ensure that it supports all goals and policies. Prior to formal approval, all costs and effects of the methods of implementation should be reviewed. After changes are approved, the change steps should be developed. During implementation, incremental testing should occur, and it should rely on a predetermined fallback strategy, if necessary. Complete documentation should be produced and submitted with a formal report to management.
Incorrect
All changes should be formally requested. The following are some change management guidelines: Each request should be analyzed to ensure that it supports all goals and policies. Prior to formal approval, all costs and effects of the methods of implementation should be reviewed. After changes are approved, the change steps should be developed. During implementation, incremental testing should occur, and it should rely on a predetermined fallback strategy, if necessary. Complete documentation should be produced and submitted with a formal report to management.
Unattempted
All changes should be formally requested. The following are some change management guidelines: Each request should be analyzed to ensure that it supports all goals and policies. Prior to formal approval, all costs and effects of the methods of implementation should be reviewed. After changes are approved, the change steps should be developed. During implementation, incremental testing should occur, and it should rely on a predetermined fallback strategy, if necessary. Complete documentation should be produced and submitted with a formal report to management.
Question 52 of 65
52. Question
Which of the following is a uniquely identifiable subset of the system that represents the smallest portion to be subject to an independent configuration control procedure?
Correct
A configuration item (CI) is a uniquely identifiable subset of the system that represents the smallest portion to be subject to an independent configuration control procedure. When an operation is broken into individual CIs, the process is called configuration identification.
Incorrect
A configuration item (CI) is a uniquely identifiable subset of the system that represents the smallest portion to be subject to an independent configuration control procedure. When an operation is broken into individual CIs, the process is called configuration identification.
Unattempted
A configuration item (CI) is a uniquely identifiable subset of the system that represents the smallest portion to be subject to an independent configuration control procedure. When an operation is broken into individual CIs, the process is called configuration identification.
Question 53 of 65
53. Question
Which of the following is an application and protocol that is used to remotely log in to another computer using a secure tunnel?
Correct
Secure Shell (SSH) is an application and protocol that is used to remotely log in to another computer using a secure tunnel. After a session key is exchanged and the secure channel is established, all communication between the two computers is encrypted over the secure channel.
Incorrect
Secure Shell (SSH) is an application and protocol that is used to remotely log in to another computer using a secure tunnel. After a session key is exchanged and the secure channel is established, all communication between the two computers is encrypted over the secure channel.
Unattempted
Secure Shell (SSH) is an application and protocol that is used to remotely log in to another computer using a secure tunnel. After a session key is exchanged and the secure channel is established, all communication between the two computers is encrypted over the secure channel.
Question 54 of 65
54. Question
You have recently been hired by a company to analyze its security mechanisms to determine any weaknesses in the current security mechanisms. During this analysis, you detect that an application is using a 3DES implementation that encrypts each block of data three times, each time with a different key. Which 3DES implementation does the application use?
Correct
The 3DES-EEE3 implementation encrypts each block of data three times, each time with a different key. The 3DES-EDE3 implementation encrypts each block of data with the first key, decrypts each block with the second key, and encrypts each block with the third key. The 3DES-EEE2 implementation encrypts each block of data with the first key, encrypts each block with the second key, and then encrypts each block again with the first key. The 3DES-EDE2 implementation encrypts each block of data with the first key, decrypts each block with the second key, and then encrypts each block with the first key.
Incorrect
The 3DES-EEE3 implementation encrypts each block of data three times, each time with a different key. The 3DES-EDE3 implementation encrypts each block of data with the first key, decrypts each block with the second key, and encrypts each block with the third key. The 3DES-EEE2 implementation encrypts each block of data with the first key, encrypts each block with the second key, and then encrypts each block again with the first key. The 3DES-EDE2 implementation encrypts each block of data with the first key, decrypts each block with the second key, and then encrypts each block with the first key.
Unattempted
The 3DES-EEE3 implementation encrypts each block of data three times, each time with a different key. The 3DES-EDE3 implementation encrypts each block of data with the first key, decrypts each block with the second key, and encrypts each block with the third key. The 3DES-EEE2 implementation encrypts each block of data with the first key, encrypts each block with the second key, and then encrypts each block again with the first key. The 3DES-EDE2 implementation encrypts each block of data with the first key, decrypts each block with the second key, and then encrypts each block with the first key.
Question 55 of 65
55. Question
Recently, sales people within your organization have been having trouble managing customer-related data. Management is concerned that sales figures are being negatively affected as a result of this mismanagement. You have been asked to provide a suggestion to fix this problem. What should you recommend?
Correct
You should recommend customer relationship management (CRM), which involves identifying customers and storing all customer-related data, particularly contact information and data on any direct contact with customers.
Incorrect
You should recommend customer relationship management (CRM), which involves identifying customers and storing all customer-related data, particularly contact information and data on any direct contact with customers.
Unattempted
You should recommend customer relationship management (CRM), which involves identifying customers and storing all customer-related data, particularly contact information and data on any direct contact with customers.
Question 56 of 65
56. Question
Your organization implements a public key infrastructure (PKI) to issue digital certificates to users. Management has requested that you ensure that all the digital certificates that were issued to contractors have been revoked. Which PKI component should you consult?
Correct
A CRL contains a list of all the certificates that have been revoked. A CA is the entity that creates and signs digital certificates, maintains the certificates, and revokes them when necessary. An RA verifies the requestor’s identity, registers the requestor, and passes the request to the CA. The OCSP is an Internet protocol that obtains the revocation status of an X.509 digital certificate.
Incorrect
A CRL contains a list of all the certificates that have been revoked. A CA is the entity that creates and signs digital certificates, maintains the certificates, and revokes them when necessary. An RA verifies the requestor’s identity, registers the requestor, and passes the request to the CA. The OCSP is an Internet protocol that obtains the revocation status of an X.509 digital certificate.
Unattempted
A CRL contains a list of all the certificates that have been revoked. A CA is the entity that creates and signs digital certificates, maintains the certificates, and revokes them when necessary. An RA verifies the requestor’s identity, registers the requestor, and passes the request to the CA. The OCSP is an Internet protocol that obtains the revocation status of an X.509 digital certificate.
Question 57 of 65
57. Question
Your company implements one of its applications on a Linux server. You would like to store passwords in a location that can be protected using a hash. Where is this location?
Correct
For Linux, passwords are stored in the /etc/passwd or /etc/shadow file. Because the /etc/passwd file is a text file that can be easily accessed, you should ensure that any Linux servers use the /etc/shadow file, where the passwords in the file can be protected using a hash.
Incorrect
For Linux, passwords are stored in the /etc/passwd or /etc/shadow file. Because the /etc/passwd file is a text file that can be easily accessed, you should ensure that any Linux servers use the /etc/shadow file, where the passwords in the file can be protected using a hash.
Unattempted
For Linux, passwords are stored in the /etc/passwd or /etc/shadow file. Because the /etc/passwd file is a text file that can be easily accessed, you should ensure that any Linux servers use the /etc/shadow file, where the passwords in the file can be protected using a hash.
Question 58 of 65
58. Question
Your organization has recently decided to implement encryption on the network. Management requests that you implement a system that uses a private, or secret, key that must remain secret between the two parties. Which system should you implement?
Correct
A symmetric algorithm uses a private, or secret, key that must remain secret between the two parties. A running key cipher uses a physical component, usually a book, to provide the polyalphabetic characters. A concealment cipher occurs when plaintext is interspersed somewhere within other written material. An asymmetric algorithm uses both a public key and a private, or secret, key.
Incorrect
A symmetric algorithm uses a private, or secret, key that must remain secret between the two parties. A running key cipher uses a physical component, usually a book, to provide the polyalphabetic characters. A concealment cipher occurs when plaintext is interspersed somewhere within other written material. An asymmetric algorithm uses both a public key and a private, or secret, key.
Unattempted
A symmetric algorithm uses a private, or secret, key that must remain secret between the two parties. A running key cipher uses a physical component, usually a book, to provide the polyalphabetic characters. A concealment cipher occurs when plaintext is interspersed somewhere within other written material. An asymmetric algorithm uses both a public key and a private, or secret, key.
Question 59 of 65
59. Question
Management expresses concerns about using multitenant public cloud solutions to store organizational data. You explain that
tenant data in a multitenant solution is quarantined from other tenants’ data, using tenant IDs in the data labels. What is the term for this process?
Correct
Data isolation ensures that tenant data in a multitenant solution is isolated from other tenants’ data via tenant IDs in the data labels.
Incorrect
Data isolation ensures that tenant data in a multitenant solution is isolated from other tenants’ data via tenant IDs in the data labels.
Unattempted
Data isolation ensures that tenant data in a multitenant solution is isolated from other tenants’ data via tenant IDs in the data labels.
Question 60 of 65
60. Question
What type of traffic is the SIMPLE protocol designed to secure?
Correct
Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions (SIMPLE) is designed to secure presence traffic.
Incorrect
Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions (SIMPLE) is designed to secure presence traffic.
Unattempted
Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions (SIMPLE) is designed to secure presence traffic.
Question 61 of 65
61. Question
Which threat modeling tool allows for assets to be automatically or manually placed on a drawing pane?
Correct
securiCAD focuses on threat modeling of IT infrastructures using a CAD-based approach where assets are automatically or manually placed on a drawing pane.
Incorrect
securiCAD focuses on threat modeling of IT infrastructures using a CAD-based approach where assets are automatically or manually placed on a drawing pane.
Unattempted
securiCAD focuses on threat modeling of IT infrastructures using a CAD-based approach where assets are automatically or manually placed on a drawing pane.
Question 62 of 65
62. Question
How are new technologies submitted for peer review to the IETF and, once approved, published as Internet standards?
Correct
The IETF is responsible for creating requests for comments (RFCs) that describe research and innovations on the Internet and its systems. Most RFCs are submitted for peer review, and, once approved, are published as Internet standards.
Incorrect
The IETF is responsible for creating requests for comments (RFCs) that describe research and innovations on the Internet and its systems. Most RFCs are submitted for peer review, and, once approved, are published as Internet standards.
Unattempted
The IETF is responsible for creating requests for comments (RFCs) that describe research and innovations on the Internet and its systems. Most RFCs are submitted for peer review, and, once approved, are published as Internet standards.
Question 63 of 65
63. Question
Which of the following combines voice, video, email, instant messaging, personal assistant, and other communication features?
Correct
Unified communication combines voice, video, email, instant messaging, personal assistant, and other communication features.
Incorrect
Unified communication combines voice, video, email, instant messaging, personal assistant, and other communication features.
Unattempted
Unified communication combines voice, video, email, instant messaging, personal assistant, and other communication features.
Question 64 of 65
64. Question
Users on your organization’s network need to be able to access several confidential files located on a file server. Currently, the files are encrypted. Recently, it was discovered that attackers were able to change the contents of the file. You need to use a hash function to calculate the hash values of the correct files. Which of the following should you not use?
Correct
ECC is not a hash function. It is an asymmetric algorithm. All the other options are hash functions.
Incorrect
ECC is not a hash function. It is an asymmetric algorithm. All the other options are hash functions.
Unattempted
ECC is not a hash function. It is an asymmetric algorithm. All the other options are hash functions.
Question 65 of 65
65. Question
The data owner has determined all the data classifications of the data he owns. He determines the level of access that will be
granted to users. Who should be responsible for implementing the controls?
Correct
A data custodian should be responsible for implementing the controls.
Incorrect
A data custodian should be responsible for implementing the controls.
Unattempted
A data custodian should be responsible for implementing the controls.
X
Use Page numbers below to navigate to other practice tests