01 - Chapter 1 - General Security Concepts - Q001 - Q110
01 - Chapter 1 - General Security Concepts - Q001 - Q110
✅- 00 | ❌- 00 | ℹ️- 00 | ⚠️ - 00
Revisto (14-11-2024)
QUESTION 1: ✅
A client disputes having signed a digital contract. The service provider needs to prove that the signature was indeed from the client and hasn’t been tampered with. Which
of the following security concepts is the service provider relying on?
(A) Authentication
(B) Confidentiality
(C) Non-repudiation
(D) Access Control
QUESTION 2: ✅
Carlos, an IT consultant, advises a startup company on cybersecurity best practices. The company plans to launch several microsites under various subdomains. They
want a solution that is cost-effective but also ensures that the sites are validated by a third-party.
QUESTION 3: ✅
A company wants to ensure that security incidents are detected and addressed as quickly as possible by on-duty personnel. Which of the following operational security
controls would be BEST to implement for this purpose?
QUESTION 4: ✅
During a routine check, the IT department discovered that several employees had left their computers on and unattended during lunch break. Which operational security
control can help mitigate the risk associated with this behavior?
QUESTION 5: ✅
An art gallery wants to deploy a security solution to detect movement in an open courtyard that features several sculptures. This space has varying temperature conditions,
which might cause false alarms in some motion detection technologies. Which type of sensor would be MOST appropriate to ensure consistent motion detection in such
conditions?
ℹ️Correct Answer: D.
Microwave motion detectors. Microwave motion detectors are suitable for open areas and are less affected by temperature changes. They emit microwave beams to create
an invisible detection zone and can consistently detect motion when an object interrupts this zone, irrespective of the ambient temperature.
QUESTION 6: ✅
A company’s primary security control for accessing secure server rooms is a biometric fingerprint scanner. However, the scanner occasionally malfunctions in high humidity.
The security team is considering an alternative solution to grant access when the primary method fails. Which of the following would be the MOST appropriate
compensating control?
QUESTION 7: ✅
A financial institution wants to ensure that customers are aware of the bank’s policies on information sharing and how their personal data is used. Which of the following
security controls would BEST communicate this to customers?
QUESTION 8: ✅
A large financial organization wants to ensure that all employees understand the importance of cybersecurity and the role they play in safeguarding company assets. Which
of the following managerial security controls will be MOST effective in achieving this?
QUESTION 9: ✅
A company has faced multiple instances of unauthorized individuals gaining access to their office premises. Which of the following preventive security controls would be
MOST effective in preventing unauthorized physical access?
QUESTION 10: ✅
TechVault, a company specializing in secure storage solutions, recently had an anauthorized intrusion where a burglar managed to bypass their motion sensors.
In a bid to prevent future breaches, they are considering deploying a system that can detect weight changes in a restricted floor area to alert any unauthorized access.
QUESTION 11: ✅
A system administrator is setting up an authentication system for a new web application.
Which of the following security controls falls under the technical category and ensures that users prove their identity before gaining access?
QUESTION 12: ✅
An e-commerce company has experienced a Distributed Denial of Service (DDoS) attack, which caused its website to become inaccessible for several hours. To mitigate
the impact of such attacks in the future, which of the following would be the BEST corrective control to implement?
Question 13. ✅
GreenTech Industries has a manufacturing facility located in a relatively secluded area. Recent incidents of theft and trespassing have alarmed the management. Which of
the following would MOST effectively deter unauthorized nighttime access to the perimeter of the facility?
Question 14. ✅
While conducting a routine security review, Jake, a security specialist, discovers an unexpected piece of data placed in the organization’s financial system. Upon asking, he
learns that this piece of data is intentionally placed and monitored to see if any unauthorized user or system interacts with it. What is this deceptive piece of data known as?
(A) Honeystring
(B) Honeytoken
(C) Canary token
(D) Security marker
ℹ️Canary tokens are a specific type of honeytoken and can serve the same purpose. However, given the choices provided and the context of the question, “Honeytoken” is
the most accurate answer.
Question 15. ✅
An organization is deploying new IoT devices in its smart office. To ensure that only authorized devices can connect to the corporate network, each device will be given a
unique key pair. Which of the following best describes the system authentication approach the organization is using?
Question 16. ✅
In the new branch of BankSecure, the management has decided to install a security system at the main entrance that forces visitors to go through two separate
authorization checks before entering the main premises. Which physical security measure should they consider?
(A) Turnstiles
(B) Security Guards
(C) Access Control Vestibule
(D) Keycard Readers
Question 17. ✅
The IT department wants to monitor network traffic in real time to detect any anomalies or malicious activities. Which of the following security controls can accomplish this?
Question 18. ✅
Jenna, a web administrator for a growing online retail business, is in the process of obtaining SSL certificates for the company’s domain. The company uses several
subdomains for different services, such as shop.example.com, blog.example.com, and support.example.com. Instead of obtaining individual certificates for each
subdomain, Jenna wants to use one certificate. What type of certificate should Jenna pursue?
Question 19. ✅
At a newly established museum, management wants to install sensors in the exhibit rooms to detect any unauthorized movement after hours. The rooms are often filled
with a mix of air conditioning and external noise from the city. Which sensor would be BEST suited to detect movement in such conditions without being affected by the
noise?
Question 20. ✅
A company is setting up a secure communication channel between its headquarters and a remote branch office. To ensure that data transmitted over this channel
originates from a legitimate system at the branch office, the company is considering using digital certificates.
Question 21. ✅
A financial institution has experienced an uptick in unauthorized transactions. They want to implement a control that will allow them to identify suspicious transactions in
real-time.
Which of the following would be the BEST detective control for this scenario?
Question 22. ✅
TechHaus has recently experienced multiple security breaches where unauthorized personnel have managed to infiltrate their server rooms after hours. To enhance
security measures, the company decided to deploy a new system.
Which of the following options would BEST detect human intruders based on their body heat even in complete darkness?
ℹ️Correct Answer: C. Deploying infrared (IR) sensors. Infrared (IR) sensors detect infrared radiation, such as the heat emitted by the human body. This makes them
particularly effective in detecting human intruders, even in complete darkness, based on the body heat they emit.
Question 23. ✅
After detecting an unauthorized intrusion into their network, a financial institution wants to implement a control that will restore compromised systems to a known good
state.
Question 24. ✅
After a recent security breach, Sarah, a cybersecurity analyst, is implementing additional measures to detect unauthorized activities. She decides to embed specific values
in the database that serve no real purpose but are monitored for any unauthorized access or usage.
These values are designed to raise alerts if they are ever accessed or used. What are these specific values commonly referred to as?
Question 25. ✅
Bob receives an email prompting him to verify his identity by clicking on a link. The link directs him to a webpage where he has to provide his username, password, and
answer a personal security question.
Question 26. ✅
In an effort to minimize data breaches from malware, a company is deciding on a control to prevent malicious software from being executed on company devices.
Question 27. ✅
After undergoing a major infrastructure upgrade, GlobalMed Corp experienced several unanticipated security issues. In retrospect, the IT manager realized they skipped an
essential step in their change management process which could have predicted and mitigated these issues. What step did they most likely overlook?
ℹ️Correct Answer: C. Impact analysis. An impact analysis is vital in the change management process as it evaluates the potential ramifications of a proposed change. By
conducting this analysis, organizations can anticipate potential security challenges and mitigate them before implementing the change.
**Question 28. ✅
MegaCorp recently introduced a new web application for its customers. Before its release, the software underwent rigorous testing in a controlled environment. When the
application was deployed in production, several security vulnerabilities were reported.
Which of the following reasons can explain the mismatch between the test results and actual vulnerabilities?
(A) The testing environment was an exact replica of the production environment
(B) Test results were not thoroughly reviewed
(C) The software was not tested for zero-day vulnerabilities
(D) Penetration testing was done post-production
Question 29. ✅
An online banking website employs a system that automatically logs out users after 10 minutes of inactivity to ensure that if a user forgets to log out, no one else can alter
the user’s banking details. Which principle of the CIA triad is the banking website MOST directly addressing?
(A) Confidentiality
(B) Availability
(C) Authentication
(D) Integrity
Question 30. ✅
A company is located in an area prone to natural disasters such as earthquakes and floods.
Which of the following physical security controls would be MOST effective in ensuring the safety of the company’s IT infrastructure?
Question 31. ✅
TechBank has just opened a new branch in the city center. Due to its location, the management is concerned about potential vehicular attacks on the facility.
Which of the following physical security measures can TechBank employ to specifically deter such attacks?
Question 32. ✅
During a security assessment, Maria, a security consultant, identifies a self-signed certificate being used on a client’s public-facing web server. What is the PRIMARY
security concern related to this finding?
(A) The web server might be vulnerable to Distributed Denial of Service (DDoS) attacks
(B) The certificate could be expired
(C) Users cannot validate the authenticity of the website easily
(D) The web server might not support modern encryption algorithms
Question 33. ✅
TechFin Bank is considering implementing a new software system for their transaction processing. Before rolling it out, the cybersecurity team insists on carrying out a
specific type of analysis to understand how this change might affect the organization’s security posture. What is the team referring to?
(A) Risk appetite assessment
(B) Performance benchmarking
(C) Impact analysis
(D) Penetration testing
Question 34. ✅
To discourage potential cybercriminals from targeting their online storefront, an e-commerce company is considering various security measures. Which of the following
would act MOST effectively as a deterrent control?
Question 35. ✅
The security team of a multinational company deployed a network of honeypots globally, making it appear as an interconnected and realistic environment. They aim to
study coordinated multi-stage attacks. This deceptive setup is known as:
Question 36. ✅
ExamsDigest Corp, a technology company, recently conducted a security assessment to align with industry best practices. The company’s current security posture was
compared to its desired future state, revealing discrepancies. Which of the following best describes the approach ExamsDigest Corp employed?
Question 37. ✅
A pharmaceutical company is concerned about competitors accessing their formula for a new drug. Which pillar of the CIA triad is MOST directly addressed by their
concern?
(A) Availability
(B) Confidentiality
(C) Integrity
(D) Non-repudiation
Question 38. ✅
FinCorp, a financial institution, has recently adopted a new security framework. In this framework, every device and user inside the organization’s network is treated as if
they were outside the perimeter, necessitating rigorous verification processes even for internal requests. Which security paradigm has FinCorp implemented?
Question 39. ✅
GreenValley Mall, located in a busy urban area, has recently faced security concerns due to the proximity of its main entrance to a major road. Which physical security
enhancement can the mall management implement to create a protective barrier between the road and the entrance, ensuring pedestrian safety and preventing
unauthorized vehicular access?
Question 40. ✅
A tech company, InnovateTech, has recently faced multiple incidents of unauthorized personnel trying to access their R&D labs. They wish to monitor and record all
activities near the entrance of this sensitive area. Which physical security measure would be most effective for this requirement?
Question 41. ✅
A cybersecurity analyst at XYZ Corp is looking to deploy a system that appears to be vulnerable and enticing to attackers. The main goal is to study the tactics, techniques,
and procedures (TTPs) of potential adversaries, without them realizing that they’re interacting with a decoy. Which of the following would BEST meet this requirement?
Question 42. ✅
A multinational organization recently experienced a significant security breach. After investigating, it was determined that a change to the network infrastructure was made
without undergoing the standard approval process. As a result, there was a misconfiguration which allowed unauthorized access.
What security principle related to change management did the organization neglect?
ℹ️A organização negligenciou a Approval process adherence (C), uma vez que mudanças à infraestrutura devem passar por processos formais de aprovação para evitar
erros e garantir que as mudanças sejam devidamente avaliadas antes da implementação.
Question 43. ✅
After a series of cyber-attacks on a company’s infrastructure, the IT team decided to deploy a solution that would seem like a legitimate part of their network but is
intentionally isolated and monitored. They intend to detect and analyze malicious activities in this isolated environment. What technology are they most likely implementing?
Question 44. ✅
Liam, the CTO of a medium-sized enterprise, noticed that several software applications were not updated regularly, leading to potential security vulnerabilities. Upon
investigation, he realized that no specific team or individual was assigned as the owner of these applications. To enhance security, what should Liam emphasize?
Question 45. ✅
TechSoft Corp, a mid-sized software development firm, is relocating its main office to a new building. The management is concerned about potential threats after hours,
particularly due to the increasing reports of cyber-espionage. They are evaluating different security measures. Which option would provide an immediate physical presence
and deterrence during non-business hours?
Question 46. ✅
Alice, a system administrator for a startup, is preparing to deploy a new website for her company. To ensure secure communications between the users and the website,
she plans to obtain a digital certificate for the site. Before doing so, which step must Alice first undertake to get a certificate from a Certificate Authority (CA)?
Question 47. ✅
Julia, a security administrator, is concerned about potential unauthorized access to confidential project files stored on a company server. She decides to place a document
within the project folders that seems enticing but is actually monitored for access. This strategy aims to detect if someone is accessing files without authorization. What is
this document commonly known as?
Question 48. ✅
After a recent incident of vandalism, a corporate building is considering implementing security controls that would dissuade potential perpetrators. Which of the following
would serve BEST as a deterrent control?
Question 49. ✅
Alice wants to access a restricted online portal. The portal asks her to enter a unique username and a secret passphrase only she should know. This process helps the
system ensure that Alice is who she claims to be. What security concept is the portal employing?
(A) Authorization
(B) Accounting
(C) Multifactor authentication
(D) Authentication
Question 50. ✅
Sophia, the cybersecurity lead at XYZ Corp, is in the process of drafting a new security policy. During the drafting process, she primarily consults with her security team.
However, upon implementation, several departments pushed back due to the policy interfering with their operations. Which best describes the misstep Sophia made during
the policy creation process?
Question 51. ✅
BioGen Inc., a biotechnology company, has implemented a layered security approach. They are considering adding a human element to their security measures for their
research labs. Which of the following would best provide the ability to evaluate and respond to various security situations with human judgment?
Question 52. ✅
While analyzing server logs, Mike, an IT security analyst, noticed that an unfamiliar document was frequently accessed. Upon investigation, he realized that this document
was deliberately placed by the security team and had no real data but was closely monitored. The purpose of this file is MOST likely:
Question 53. ✅
DataCenter Inc. is located in a region prone to protests and vandalism. They wish to enhance their perimeter security to deter potential intruders and make it visibly clear
that unauthorized access is restricted. Which of the following physical security measures would be the most effective first line of defense for the company?
Question 54. ✅
SecureTech Corp, a company dealing with sensitive client data, is redesigning its main office entrance to enhance security. They want to ensure that only one person gains
access at a time, even if multiple people try to enter using a single authorized access badge. Which of the following would best serve this purpose?
Question 55. ✅
While setting up a new internal web application, Laura, a system administrator, decides to use a digital certificate for SSL/TLS encryption. Due to budget constraints, she
can’t procure a certificate from a commercial Certificate Authority (CA). Which of the following would be a viable option for Laura to secure the application?
Question 56. ✅
A network administrator has received a new security patch for a mission-critical application. Which of the following is the BEST action to take before applying this patch in
the live environment?
Question 57. ✅
After implementing a major security update to its database system, TechCo experienced unexpected downtime and system incompatibilities. The CISO wants to ensure
that such incidents can be quickly addressed in the future. Which of the following should TechCo have had in place before deploying the update to mitigate the impact of
these kinds of incidents?
A financial institution processes thousands of credit card transactions daily. To ensure the security and integrity of these transactions, the security officer wants to employ a
solution that will safely manage and store cryptographic keys. Which of the following would be the MOST suitable solution?
Question 59. ✅
During the setup of a secure communication channel, Alice and Bob need to agree upon a shared secret key without sending the key directly to each other, as they fear
eavesdropping. Which protocol would best facilitate this requirement?
(A) RSA
(B) HMAC
(C) Diffie-Hellman
(D) AES
Question 60. ✅
A company is developing a new video conferencing tool. They want to make sure that all video and audio data transmitted between participants are encrypted and
protected from eavesdropping. Which type of encryption should the developers implement to achieve this?
Question 61. ✅
After a significant cybersecurity incident, ABC Tech revamped its incident response procedures. However, the documentation was not updated to reflect these changes.
During a subsequent minor incident, there was confusion regarding the steps to be followed. Which of the following is the MOST direct implication of not updating the
incident response documentation?
Question 62. ✅
A financial organization is considering implementing a system that allows all users to view all transactions, but once a transaction is recorded, it cannot be altered or
deleted. They want this transparency to foster trust among their users. Which of the following would best meet this requirement?
Question 63. ✅
A company is implementing a system to ensure that code released to production is both unaltered and approved by a specific team member. Which of the following
cryptographic techniques should they implement?
Question 64. ✅
Your company has recently deployed an update to its CRM application. Post-update, users are experiencing connectivity issues. As a security administrator, which of the
following steps should you take FIRST to address the connectivity problem without causing data loss?
Question 65. ✅
TechDynamics, a growing tech startup, plans to scale its operations and serve a global clientele. Given that their client base operates in multiple time zones, when should
TechDynamics schedule their system maintenance to ensure minimal disruption?
(A) During the busiest hours for their headquarters' local time
(B) Staggered based on the peak hours of their global clients
(C) Only when a system breakdown occurs
(D) Establish a consistent maintenance window during off-peak hours for the majority of their clientele
Question 66. ✅
During an IT audit, a company’s encryption practices come under scrutiny. The IT auditor recommends increasing the encryption key length for certain applications to
improve security. What is the PRIMARY reason to increase the encryption key length?
Question 67. ✅
Sarah is working on a project where she needs to validate the integrity and authenticity of assets over time, without a centralized authority. Which technology would be
most appropriate for this use case?
Question 68. ✅
A graphic design company frequently works with large files such as videos and high-resolution images. These files are stored on a dedicated storage volume in their server.
While they need to secure this data, they don’t want to encrypt individual files due to the volume of data and frequent access needs. Which encryption approach is most
appropriate for this scenario?
Question 69. ✅
An e-commerce company stores millions of customer transaction records in their primary database. They have decided to enhance their security posture by applying
encryption to protect sensitive data. However, they don’t want to encrypt the entire server storage, just the data within the database. Which encryption approach should the
company adopt to meet their objective?
ℹ️Option B is incorrect. File-level Encryption would require encrypting individual files, which may not be efficient for a database with millions of records.
Question 70. ✅
Your organization plans to upgrade its database system. To maintain security during this process, which of the following actions should be RESTRICTED until the upgrade
is validated?
Question 71. ✅
A journalist wants to send a confidential message to her editor without raising suspicion. Instead of sending a coded or encrypted text, she embeds the message within a
harmless-looking photograph. What method is she employing to keep the message concealed?
A security administrator needs to apply a configuration change to a critical service, requiring a service restart. Before initiating the restart, which of the following steps is
MOST important to ensure continuous service availability?
Question 73. ✅
A security analyst at DataCorp is tasked with preventing unauthorized external applications from connecting to their server. Which approach should the analyst primarily
rely on to achieve this?
Question 74. ✅
Alice needs to provide proof of the authenticity of a digital document she’s sending to Bob. Which of the following cryptographic elements should Alice use to accomplish
this task and ensure Bob knows the document came from her?
Question 75. ✅
Carla, a security analyst, receives an alert that one of the company’s server certificates may have been exposed in a recent data breach. What is the most immediate
action Carla should take to ensure that the exposed certificate cannot be used maliciously?
Question 76. ✅
A database administrator is concerned about identical hashes being produced for users who select the same password. To mitigate this risk, what cryptographic technique
should the administrator implement?
Question 77. ✅
An online retailer is considering various methods to protect its customers’ credit card information. Instead of storing the actual credit card numbers in their database, they
opt for a solution that replaces the numbers with unrelated, random values. What is this method called?
Question 78. ✅
During a scheduled maintenance window, a security administrator plans to apply a critical update to the company’s firewall. Which of the following actions is MOST crucial
to ensure minimized downtime during this process?
Question 79. ✅
A security administrator is considering a cryptographic solution for protecting data in transit between two servers located in the same data center. The primary goal is to
ensure speed and efficiency in encryption and decryption processes. Which type of encryption would best meet this requirement?
Question 80. ✅
A software developer wants to store user passwords in a way that even if the database is compromised, attackers would not be able to retrieve the original passwords.
What technique should the developer use to achieve this?
Question 81. ✅
A software development company is working on a mobile banking application. They want to ensure that sensitive operations like cryptographic processes and biometric
data validation are isolated from the main operating system to prevent potential tampering.
ℹ️KMS is primarily focused on the management of cryptographic keys, not on creating isolated environments for operations.
✅ Correct Answer: C. Secure enclave. A secure enclave is a hardware-based isolated environment often found in modern CPUs, especially in mobile devices. It’s
designed to run specific operations such as cryptographic processes and biometric data validation, ensuring that this data is kept isolated from the main operating system,
making it resilient to tampering.
Question 82. ✅
A web server hosting the company’s e-commerce site is set for an OS upgrade. The upgrade is expected to last 30 minutes. What should be a primary consideration to
minimize customer impact due to potential downtime?
Question 83. ✅
A project manager is working on a new product launch and has documents with sensitive financial projections on her local computer. She occasionally shares these
documents with select board members via email. While she wants to keep the financial documents secure, she doesn’t want to encrypt all the data on her computer. Which
encryption approach should she utilize?
ℹ️File-level Encryption allows individual files or folders to be encrypted. In this scenario, the project manager can encrypt only the sensitive financial documents, allowing
her to securely share them while keeping the rest of her data unencrypted
Question 84. ✅
A security analyst is evaluating security enhancements for a series of laptops that will store highly confidential data. The analyst wants to ensure that stored data remains
encrypted and the integrity of the boot process is maintained. Which of the following would BEST meet this requirement?
Question 85. ✅
A large e-commerce company is deploying a new online payment system. The Chief Information Security Officer (CISO) is concerned about the security of cryptographic
keys and wants to ensure they are protected from potential theft or compromise. Which tool should the CISO implement to provide the HIGHEST level of security for these
keys?
Question 86. ✅
Sarah, a security analyst, is concerned about potential man-in-the-middle attacks on the company’s internal portal. To mitigate this risk, she recommends obtaining a digital
certificate from a trusted entity. Which of the following is responsible for issuing such certificates?
Question 87. ✅
A financial institution is looking to adopt an encryption algorithm for its transactions that is considered to be very secure due to its longer key length, compared to older
standards. Which encryption algorithm best fits this description?
(A) DES - S
(B) Blowfish - S
(C) RSA - Chave Publica - A
(D) AES-256 S
ℹ️RSA is also secure but is typically used for asymmetric encryption, whereas AES is for symmetric encryption, making it better for securing transactions efficiently.
✅ AES-256, part of the Advanced Encryption Standard (AES) family, utilizes a 256-bit key length. This extended key length provides a higher degree of security and is
considered resistant to all known practical attacks when used properly.
Question 88. ✅
Alice receives an email from Bob with an attached document. She wants to verify both the authenticity of the sender and the integrity of the attached document. Which of
the following should Bob have used before sending the email?
Question 89. ✅
During a critical financial quarter, GlobalFin Corp experienced unexpected outages during peak business hours due to system maintenance, impacting its operations
significantly. To prevent such occurrences in the future, what should GlobalFin Corp implement regarding their maintenance activities?
Question 90. ✅
A financial institution wants to securely transfer transaction data between its main office and a branch office. The data should be encrypted while in transit to prevent any
interception and unauthorized access. Which encryption solution is most suitable for securing the data during transport?
Question 91. ✅
After a recent software update, a company’s intranet portal has been inaccessible to a few employees. The IT team suspects it could be due to network filtering rules. What
should the IT team review to confirm their suspicions?
Question 92. ✅
A user wants to send a confidential email to their colleague and ensure that only the intended recipient can read it. The user also wants to provide assurance to the
recipient that the email was indeed sent by them. Which encryption method should the user employ to accomplish this?
Question 93. ✅
A user, Amy, wants to securely send a confidential document to her colleague, Bob. Amy decides to encrypt the document to ensure its confidentiality. Which of the
following should Amy use to encrypt the document, ensuring only Bob can decrypt it?
A cybersecurity analyst is investigating a suspicious image file received via email. Upon closer examination, the analyst suspects that the image might be carrying hidden
data because the file size is unusually large. Which technique might the sender have used to embed secret information within the image?
Question 95. ✅
A company is preparing to roll out a new infrastructure deployment for its internal network. They have a server that will store both highly confidential customer information
and non-sensitive marketing material. The IT department wants to ensure that only the confidential data is encrypted, while the marketing data remains easily accessible.
Which level of encryption would be most suitable for this scenario?
ℹ️File-level Encryption would require each confidential file to be encrypted individually, which could be cumbersome.
Question 96. ✅
Sarah, a cybersecurity analyst, receives a report that a company laptop was stolen from an employee’s car. The laptop contained sensitive financial data. Sarah checked
the company’s security configurations and found that the laptop was equipped with full-disk encryption. How does this impact the potential data breach situation?
(A) The data remains easily accessible, as only the boot sector was encrypted
(B) The data is protected, as the entire hard drive's contents are encrypted
(C) The data is partially encrypted, with only the user directories protected
(D) The data is vulnerable since full-disk encryption only applies when the laptop is connected to the company network
Question 97.
A university’s IT department provides access to its student records for training purposes to new hires. To protect student identities, they replace the real names and social
security numbers with fictitious ones while maintaining the database’s original format. Which technique is the IT department utilizing?
Question 98. ✅
A company is looking for a cryptographic solution that provides an immutable and transparent record of all transactions in a distributed ledger system. Which of the
following would BEST meet this requirement?
Question 99. ✅
An IT manager is considering solutions to protect data stored on the laptops provided to remote employees. The primary concern is to ensure that the entire content of the
laptop’s storage drive is unreadable if a laptop is lost or stolen. Which encryption level would best address this concern?
Question 100. ✅
The finance department at a large firm still relies on a legacy application for their quarterly reporting. This application is known to have some security flaws, but due to its
critical nature, it cannot be easily replaced.
How can the firm BEST mitigate the risks associated with this application?
(A) Train the finance team about the latest cybersecurity threats
(B) Run the legacy application on the latest hardware to improve performance
(C) Place the legacy application behind a web application firewall (WAF)
(D) Frequently change the passwords of users who have access to the application
Question 101. ✅
A multinational corporation is concerned about the possibility of losing access to encrypted data due to the loss or compromise of private keys. They’ve approached a third-
party organization for a solution. Which of the following is a system that allows the third party to securely hold a copy of the corporation’s cryptographic keys to ensure data
recoverability?
Question 102. ✅
A financial institution plans to provide access to its database for third-party developers to create new applications. However, they want to ensure that the developers do not
see the actual data but instead work with a disguised version that retains the data’s original structure. What technique is the financial institution considering?
(A) Tokenization
(B) Data masking
(C) Encryption
(D) Digital watermarking
Tokenization: This technique replaces sensitive data with unique tokens that map to the original data, but the tokens themselves have no exploitable value
Question 103. ✅
NexTech, a cloud-based software company, recently faced a security breach due to inconsistent practices among its system administrators. To avoid such inconsistencies
in the future, what should NexTech emphasize in its operations?
ℹ️Standard Operating Procedures (SOPs) provide a consistent and documented process that employees can follow. By implementing SOPs, businesses ensure that tasks
are performed uniformly, reducing the risk of errors and inconsistencies that might lead to security vulnerabilities.
Question 104. ✅
After a series of system enhancements, a financial organization decided to use a manual method of documenting changes in separate files rather than implementing a
version control system. During an audit, the cybersecurity team struggled to determine which version of a critical system file was the most recent and accurate. What is the
PRIMARY risk of not implementing version control for such documentation?
Question 105. ✅
During a security audit, it was found that an application was using plain hashes for storing passwords. The security team recommended a method that involves using the
original password along with a salt and then rehashing it multiple times. What is this method known as?
During a routine update, a web server application requires a restart. What should the administrator do FIRST to ensure client connections aren’t abruptly terminated
during the restart?
Question 107. ✅
Carlos is responsible for managing IT services for a university. The university has numerous departments, each with its subdomain, like arts.university.com,
science.university.com, and sports.university.com. Carlos wants a solution that ensures HTTPS security while being costeffective.
However, he’s wary of potential risks. What might be a drawback of using a Wildcard Certificate for the university’s subdomains?
Question 108. ✅
Your organization is preparing to upgrade a database server that supports an e-commerce application. A review of the change management documentation has revealed
that multiple applications rely on this particular database server for various functionalities. Which of the following steps should be taken FIRST to ensure a smooth upgrade
process without disruptions?
(A) Upgrade the database server immediately to benefit from new features
(B) Perform a backup of the database server
(C) Identify and test all applications that have dependencies on the database server
(D) Inform users about potential downtime during the upgrade
Question 109. ✅
After a recent data breach, a multinational corporation is evaluating its cryptographic practices. The Chief Security Officer (CSO) determines that the manual management
of cryptographic keys has become too complex due to the scale of the operations. Which tool would BEST address the CSO’s concern while ensuring robust security
practices?
Question 110. ✅
During a quarterly review, the IT team at a logistics company decided to change the configuration of their load balancers to better distribute traffic among their servers.
After the change, a series of technical issues emerged, affecting customer-facing applications.
When troubleshooting the issue, it was discovered that the network diagrams had not been updated to reflect the new changes. What is the MAJOR consequence of not
having updated diagrams in such a scenario?