CC Exams Practice Exams 1
CC Exams Practice Exams 1
Administrative Incorrect
Physical Incorrect
Technical Correct
Directive Incorrect
"Technical" is correct. Technical controls are hardware or software components that protect
computing and network resources such as computers, servers, mobile devices, computer networks, or
data stored within a system. In this case the biometric authentication system is controlling access to
malicious scripts?
"Cross site scripting" is correct. Cross site scripting is an attack where the attacker injects a malicious
script into a website trusted by the victim. The script is then executed by the victim's browser causing
Backdoor Incorrect
"Buffer overflow" is incorrect. A buffer overflow is an attack where the attacker exceeds the capacity
"Timing attack" is incorrect. A timing attack is any attack that takes advantage of a program's
dependence on a sequence of events. Timing attacks may or may not involve browsers so this is not
is under way. Which of the following is the best next step to take?
Explanation
"Activate the incident response plan" is correct. Activating the incident response plan is the best next
"Inform law enforcement" is incorrect. Informing law enforcement is not the best next step to take.
Law enforcement may need to be notified depending on the nature of the incident, but this is not the
"Activate the disaster recovery plan" is incorrect. Disaster recovery plans are used to rescue the
organization by putting specific business functions back into place after an incident. Activating the
DRP is not the best next step given the information in the question.
"Notify the head of HR" is incorrect. Notifying the head of HR would not be the best next step to
take. Notifying HR may be warranted depending on the incident in question but this is not the best
act?
assigned so that one employee cannot commit fraud by themself since the critical job function is split
between two or more employees. As a result, the employees must collude with each other to commit
fraud.
"Asymmetric cryptography" is incorrect. Asymmetric cryptography requires two keys: one private
"Principle of least privilege" is incorrect. The principle of least privilege is the concept that a user
should have access to the resources they need to do their job but no more than that.
Explanation
"Dual-factor" is correct. In general two factors used in combination are almost always better than any
"Type 1" is incorrect. In general two factors used in combination are almost always better than any
Type 1 Incorrect
Type 3 Incorrect
Type 2 Incorrect
Dual-factor Correct
"Type 2" is incorrect. In general two factors used in combination are almost always better than any
"Type 3" is incorrect. In general two factors used in combination are almost always better than any
Explanation
"Mantrap" is correct. While the word mantrap might sound like sound social engineering, the term
actually refers to a special kind of vestibule used to protect a secure area. It has two doors and
requires a visitor to go through the first door and close it before going through the second door to
Mantrap Correct
Pretexting Incorrect
Baiting Incorrect
"Pretexting" is incorrect. Pretexting is a category of social engineering that uses a fake scenario to
"Quid Pro Quo" is incorrect. QPP is a category of social engineering that uses an exchange of
"Baiting" is incorrect. Baiting is a category of social engineering that lures the victim into a trap.
Explanation
"NAC" is correct. NAC or Network Access Control allows organizations to control which devices are
SIEM Incorrect
DMZ Incorrect
IDS Incorrect
NAC Correct
"IDS" is incorrect. An intrusion detection system may be used to detect a new or rogue device but
"SIEM" is incorrect. A Security Event and Incident Management system provides real time analysis,
monitoring, and alerting but is not normally used to control access to the network.
"DMZ" is incorrect. A demilitarized zone (DMZ) is a portion of the network that separates the
organization's internal resources from untrusted ones. It is not used for network access control.
Explanation
Antivirus Correct
administrative control.
Question 9 • Business Continuity (BC) and Disaster Recovery (DR) and Incident Response Concepts Incorrect
network has been infected with malware. The IRP has been enacted and
Disconnect the infected computer from the network using the organization's EDR
tooling. Correct
Explanation
"Disconnect the infected computer from the network using the organization's EDR tooling" is
correct. Disconnecting the infected computer from the network using the organization's endpoint
detection and response (EDR) tooling is the best containment strategy in this scenario for an infected
computer.
"Update perimeter firewall rules" is incorrect. While updating perimeter firewall rules might be a
containment strategy for containing an incident to a certain network in question, that is not the best
"Call 911" is incorrect. Calling 911 is not a containment strategy. Informing law enforcement may be
part of the organization's incident response plan, however, this is not the best option for containment
in this scenario.
Explanation
"Clerk" is correct. Of the choices, only the clerk would have privileges that are not elevated as the
clerk would not need to make impactful changes to the environment such as changing configurations
"Domain administrator" is incorrect. A domain administrator can add or delete user accounts or
Clerk Correct
Superuser Incorrect
"Local administrator" is incorrect. A local admin can change configuration setting that are otherwise
"Superuser" is incorrect. A superuser of OSs like Linux can have virtually unlimited functions such as
changing configuration settings, file settings, permissions, and user access rights
Explanation
administrative control.
CCTV Incorrect
Bollard Incorrect
Explanation
"Bollard" is correct. Physical controls are tangible controls put in place to protect resources against
physical threats (such as fires, theft, physical harm, and so on). A bollard is a pillar or sphere made out
of concrete or metal that is used to protect buildings from vehicles driving into them.
Bollard Correct
Firewall Incorrect
MFA Incorrect
HR Policy Incorrect
Question 13 • Business Continuity (BC) and Disaster Recovery (DR) and Incident Response Concepts Incorrect
Which of the following would not occur during the preparation phase of
Explanation
"Conduct a lessons learned" is correct. The preparation phase is the first phase in the incident
response process. Lessons learned occur as part of the post-incident activity phase of the incident
response process, which is the last phase.
"Document an incident response plan" is incorrect. The preparation phase is the first phase in the
incident response process. This phase includes activities such as documenting the incident response
plan, staffing the incident response function, developing communication plans, and training staff on
"Develop stakeholder communication plans" is incorrect. The preparation phase is the first phase in
the incident response process. This phase includes activities such as documenting the incident
response plan, staffing the incident response function, developing communication plans, and training
"Train staff on the incident response plan" is incorrect. The preparation phase is the first phase in the
incident response process. This phase includes activities such as documenting the incident response
plan, staffing the incident response function, developing communication plans, and training staff on
valid user?
Explanation
"Type 3" is correct. Type 3, something you are, uses biometrics which is an improving technology that
is not perfect and can falsely reject a valid user or falsely accept an unknown user.
Type 3 Correct
Type 1 Incorrect
Type 2 Incorrect
"Type 1" is incorrect. Type 1, something you know, such as a password, is less likely to falsely reject a
"Type 2" is incorrect. Type 2, something you have, such as a smartcard, is less likely to falsely reject a
"None of these answers" is incorrect. Type 3, something you are, uses biometrics which is an
improving technology that is not perfect and can falsely reject a valid user or falsely accept an
unknown us
Which of the following correctly matches the protocol with its well-known
port? Question 3
HTTP: 22
HTTPS: 80
DNS: 53
SSH: 443
Incorrect
HTTP: 443
HTTPS: 80
DNS: 53
SSH: 22
Incorrect
HTTP: 80
HTTPS: 443
DNS: 53
SSH: 22
Correct
"HTTP: 80..." is correct. Hypertext Transfer Protocol (HTTP) typically operates over port 80. Hypertext
Transfer Protocol Secure (HTTPS) leverages SSL/TLS with HTTP to add encryption for transmitted
information and typically runs over port 443. The Domain Name System (DNS) protocol typically
leverages port 53. Secure Shell (SSH) typically runs over port 22.
Explanation
"Zeroization" is correct. Zeroization occurs when data is overwritten with other data such as binary
1’s and 0’s using other data, patterns, or random data. This is a secure sanitization method but not a
Shredding Incorrect
Zeroization Correct
Burning Incorrect
The other answers are incorrect. Physical destruction includes shredding, crushing, burning,
Explanation
"Greater security visibility and monitoring" is correct. A key benefit of using a security information
and event management (SIEM) system is greater security visibility and monitoring. SIEM systems
collect and analyze security-related data from multiple sources, including network devices, servers,
and applications. This provides security analysts with a comprehensive view of the organization’s
security posture and helps them identify and respond to security threats more effectively.
"Greater network performance", "Enhanced user productivity", and "Improved system availability"
are incorrect. SIEMs do not necessarily increase network performance, user productivity, or system
availability
Explanation
"Prevent a vehicle from driving into a building" is correct. A bollard is a large sphere or pillar made
of hard material such as concrete or metal designed to help prevent a vehicle from driving into a
"Control data center access" is incorrect. A bollard is a large sphere or pillar made of hard material
such as concrete or metal designed to help prevent a vehicle from driving into a building. Multiple
"Control facility access" is incorrect. A bollard is a large sphere or pillar made of hard material such
as concrete or metal designed to help prevent a vehicle from driving into a building. Multiple bollards
"Prevent people from entering a building" is incorrect. A bollard is a large sphere or pillar made of
hard material such as concrete or metal designed to help prevent a vehicle from driving into a
Explanation
"Malware that infects a legitimate program and causes it to perform a function it was not intended
to do" is correct. A virus is malware that infects a legitimate program and causes it to perform a
Malware that infects a legitimate program and causes it to perform a function it was
Malware that infects a legitimate program and causes it to replicate itself Incorrect
"Malicious software" is incorrect. A virus is a type of malicious software but there are many kinds of
"Malware that infects a legitimate program and causes it to replicate itself" is incorrect. Malware
"Malware that causes a legitimate program to produce a payload" is incorrect. A virus does not
cause a legitimate program to produce a payload. The payload is the portion of the virus that infects
Joe is a network engineer who wants to deploy the most basic and least
accomplish his goals. Which type of firewall is best for his needs?
Explanation
Stateful inspection/Dynamic packet filter Incorrect
Proxy Incorrect
"Packet filter" is correct. A packet filter (Gen 1) is the simplest and least expensive type of firewall and
"Proxy" is incorrect. Proxies (Gen 2) do not allow direct communication between the networks and
they hide the IP address of devices in the protected network. This is greater functionality than Joe
needs.
"Stateful inspection/Dynamic packet filter" is incorrect. The Stateful inspection/Dynamic packet filter
(Gen 3) takes into account the nature of the communication and uses more than just ACLs.
"Web filter" is incorrect. Web filters are specialized software that limits the web sites users can access.
sanitization?
Explanation
"Deleting a file on your computer and emptying the recycling bin" is correct. When you press the
DELETE key on a computer or empty the recycle bin on your desktop the data is not actually removed
from the hard drive. This action simply tells the operating system that the location on the hard drive
Deleting a file on your computer and emptying the recycling bin Correct
Zeroization Incorrect
Overwriting data with other data such as binary 1’s and 0’s Incorrect
is available for future use. The data is still there and can be accessed with the right tools. To properly
remove data from media, sanitization methods must be used.
"Physical media destruction" is incorrect. Physical media (hard drives, disks, etc.) can be destroyed so
that it cannot be reused and the data cannot be accessed. Physical destruction methods that can be
used to securely destroy data include shredding, crushing, burning, disintegration, or dissolving using
chemical compounds.
"Zeroization" is incorrect. A common technique to securely destroy data is to overwrite data with
other data, patterns, or random data. The more times the data is overwritten (referred to as a pass),
the harder the original data is to recover. This is often referred to as overwriting or zeroization.
"Overwriting data with other data such as binary 1’s and 0’s" is incorrect. A common technique to
securely destroy data is to overwrite data with other data such as binary 1’s and 0’s using other data,
patterns, or random data. The more times the data is overwritten (referred to as a pass), the harder
factor?
Explanation
"USB hardware token" is correct. Using a USB hardware token for authentication is not an example of
biometric authentication. The three authentication factors include type 1 (something you know), type
2 (something you have), and type 3 (something you are). A USB hardware token is an example of type
(something you have). Biometric authentication is type 3 (something you are). Examples of
biometric authentication include fingerprint or palm scans, iris scans, retina scans, as well as
behavioral characteristics such as computer keystroke patterns, written signature patterns, or voice
patterns.
"Fingerprint scan" is incorrect. Biometric authentication is used to identify and authenticate people
using their personal attributes or characteristics. Examples include fingerprint or palm scans, iris
scans, retina scans, as well as behavioral characteristics such as computer keystroke patterns, written
"Iris scan" is incorrect. Biometric authentication is used to identify and authenticate people using
their personal attributes or characteristics. Examples include fingerprint or palm scans, iris scans,
retina scans, as well as behavioral characteristics such as computer keystroke patterns, written
"Keystroke patterns" is incorrect. Biometric authentication is used to identify and authenticate people
using their personal attributes or characteristics. Examples include fingerprint or palm scans, iris
scans, retina scans, as well as behavioral characteristics such as computer keystroke patterns, written
Previous N
Explanation
as long as the admins are experienced and know what they are doing. Incorrect
Changes should only be made following a change management process that includes
"Changes should only be made following a change management process that includes approvals
and documentation" is correct. Changes to production systems and security baselines should only be
made following a change management process that includes approvals and documentation.
the admins are experienced and know what they are doing" is incorrect. Regardless of how good or
experienced the administrators are, all changes should go through a formal approval process.
"Changes can be made but only in response to security incidents" is incorrect. Security incidents
may require quick changes to production systems but this should only occur following established
"Changes should never be made on production servers" is incorrect. Changes to production servers
occur all the time but they should happen following proper procedures.
Which step of the risk management process involves listing and describing
Explanation
"Risk identification" is correct. Risk identification is the first step of risk management and involves
"Risk assessment" is incorrect. Risk assessment involves building off of the risk identification by
"Risk treatment" is incorrect. During the risk treatment step approaches to handling risk are made to
"Risk testing" is incorrect because risk testing is not normally part of the risk management process
account?
Explanation
Privileged accounts require greater auditing and monitoring than regular user
accounts. Incorrect
Privileged accounts are usually managed by separate PAM tools and solutions. Incorrect
"A compromise of a privileged account could cause more damage than a compromise of a regular
user account" is correct. Privileged accounts are higher risk due to the impact of their compromise.
"A privileged account costs more than a regular user account" is incorrect. privileged accounts may
cost (or may not) cost more to administer but that is not why they are higher risk.
"Privileged accounts are usually managed by separate PAM tools and solutions" is incorrect. While
it is true that privileged accounts are usually managed by separate PAM tools and solutions, that does
"Privileged accounts require greater auditing and monitoring than regular user accounts" is
incorrect. It is true that privileged accounts should be subject to greater auditing and monitoring, but
that is because they are higher risk, not why they are higher risk.
Explanation
"Fail-secure" is correct. Fail-secure (also known as fail-closed) means that during a disaster (such as a
power outage), the door systems are set to automatically close and lock.
Fail-secure Correct
Fail-open Incorrect
Fail-safe Incorrect
"Fail-safe" and "Fail-open" are incorrect. Fail-safe (also known as fail-open) means that the doors are
Explanation
Preventive Correct
Detective Incorrect
Directive Incorrect
"Directive" is incorrect. Directive controls communicate expected behavior. A network firewall does
not communicate expected behavior. An example of a directive control would be a stop sign or a
company policy.
"Detective" is incorrect. Detective controls detect when something bad might have occurred. A
firewall is used to control traffic that is allowed to certain portions of the network but does not detect
when something bad happens. An example of a detective control would be an intrusion detection
system.
Access control model that leverages a central authority that regulates access based
Access control model that provides the owner of the resource complete control to
Access control model that grants permissions based on a variety of attributes such as
who is making the request, what resource is being requested, and other
Incorrect
Access control model that enforces access based on predefined roles. Correct
"Access control model that enforces access based on predefined roles" is correct. Role-based access
control (RBAC) enforces access based on roles that define permissions and the level of access
provided to any subjects assigned to that role. Roles are typically developed for similar users with the
"Access control model that provides the owner of the resource complete control..." is incorrect.
Discretionary access control (DAC) provides the owner of the resource, typically the creator, full
control to configure which subjects (e.g., users, groups) can access the object (e.g., file, folder). This
allows the user (object owner) the ability (“discretion”) to make decisions such as what permissions
"Access control model that leverages a central authority..." is incorrect. Mandatory access control
(MAC) leverages a central authority, typically a security administrator, that regulates access based on
security labels, such as the clearance level that a subject (user) has been approved for, as well as the
"Access control model that grants permissions based on a variety of attributes..." is incorrect.
Attribute-based access control (ABAC) grants permissions based on a variety of attributes such as
who is making the request (subject), what resource is being requested (object), environmental
conditions (e.g., time of day or location), and what action is being requested (e.g., read, write).
Explanation
"Accountability" is correct. Accountability is the function of using logs to record access control
Authentication Incorrect
Accountability Correct
Identification Incorrect
Authorization Incorrect
the system.
"Authentication" is incorrect. Authentication is the method by which the system verifies the user is
Explanation
Access control model that leverages a central authority that regulates access based
Access control model that enforces access based on predefined roles. Incorrect
Access control model that provides the owner of the resource complete control to
Access control model that grants permissions based on a variety of attributes such as
who is making the request, what resource is being requested, and other
Incorrect
"Access control model that leverages a central authority that regulates access based on security
labels" is correct. Mandatory access control (MAC) leverages a central authority, typically a security
administrator, that regulates access based on security labels, such as the clearance level that a subject
(user) has been approved for, as well as the classification of the object (file, database, etc.).
"Access control model that provides the owner of the resource complete control to configure
which subjects can access an object" is incorrect. Discretionary access control (DAC) provides the
owner of the resource, typically the creator, full control to configure which subjects (e.g., users,
groups) can access the object (e.g., file, folder). This allows the user (object owner) the ability
(“discretion”) to make decisions such as what permissions other users or groups of users have over
the object.
"Access control model that enforces access based on predefined roles" is incorrect. Role-based
access control (RBAC) enforces access based on roles that define permissions and the level of access
provided to any subjects assigned to that role. Roles are typically developed for similar users with the
"Access control model that grants permissions based on a variety of attributes such as who is
making the request, what resource is being requested, and other environmental conditions such as
the time of day or location" is incorrect. Attribute-based access control (ABAC) grants permissions
based on a variety of attributes such as who is making the request (subject), what resource is being
Explanation
"Processes or technologies put into place to protect the confidentiality, integrity, and availability of
systems, assets, and information" is correct. Security controls are processes or technologies put into
place to protect the confidentiality, integrity, and availability of systems, assets, and information.
The process of defining strategies to oversee the organization Incorrect
The discipline of how an organization chooses and implements the right level of
security Incorrect
Processes or technologies put into place to protect the confidentiality, integrity, and
"The process of defining strategies to oversee the organization" is incorrect. Governance is the
"The discipline of how an organization chooses and implements the right level of security" is
incorrect. Risk management is the discipline of how an organization chooses and implements the
"Moral standards or principles that govern behavior" is incorrect. Ethics are moral standards or
principles that govern behavior with a focus on acting responsibly with integrity and accountability.
While implementing an ethics program might be an example of a control, this is not the best answer.
Which type of attack uses an email that looks legitimate but is really fake
Explanation
"Phishing" is correct. Phishing is a fake email that looks like legitimate business communications.
"Brute force" is incorrect. Brute force is a method of guessing passwords using trial and error.
Scripting Incorrect
Phishing Correct
Return to course
"Scripting" is incorrect. Scripting is using a script or set of instructions to automate computing tasks
including malicious tasks. While an email attack might contain an embedded script, the name of such
Which of the following types of encryption uses the same key for both the
Explanation
"Symmetric Encryption" is correct. Symmetric encryption uses the same key for encryption and
decryption.
Hashing Incorrect
"Asymmetric Encryption" is incorrect. Asymmetric encryption uses two keys that are mathematically
related: a public key and a private key. Asymmetric encryption is sometimes called public key
cryptography due to there being a public key that can be freely shared with anyone the sender wants
to communicate with securely. The private key must remain private and only be known to the owner.
"Public Key Cryptography" is incorrect. Asymmetric encryption uses two keys that are mathematically
related: a public key and a private key. Asymmetric encryption is sometimes called public key
cryptography due to there being a public key that can be freely shared with anyone the sender wants
to communicate with securely. The private key must remain private and only be known to the owner.
"Hashing" is incorrect. Hashing is another type of cryptography that uses special algorithms known
as hash algorithms that transform information into fixed-length output known as a message digest
(MD). An MD output is also commonly referred to as a hash, hash value, or fingerprint. Unlike
encryption, which can be reversed via decryption, hashing is a one-way process, meaning the original
information or message cannot be reproduced from the hash value output. In addition, there is no
key involved when using a hash algorithm
Explanation
HTTP Incorrect
SFTP Incorrect
NTP Correct
ARP Incorrect
"NTP" is correct. Network Time Protocol (NTP) is a protocol for the synchronization of time between
the system clocks of computers. This is particularly important when it comes to logging and
monitoring and investigating when a security event took place. If your systems all have different times
"HTTP" is incorrect. Hypertext Transfer Protocol (HTTP) is a communication protocol that provides a
means of transmitting and formatting messages between clients and servers. It is the primary way
web browsers communicate with web servers to access web pages over the Internet. It is not used for
"ARP" is incorrect. Address Resolution Protocol (ARP) is used to map IP addresses to MAC addresses
(and vice versa) on a LAN. ARP serves as the bridge that connects the IP address and the MAC
address. Computers on a network use ARP to learn which MAC address corresponds to which IP
address and store that information for future communication. It is not used for time synchronization
"SFTP" is incorrect. Secure File Transfer Protocol (SFTP) is used for transferring files between systems.
SFTP leverages the SSH protocol to encrypt communications. It is not used for time synchronization
Previous
Question 35 • Security Operations Correct
Explanation
"HTTPS" is correct. Hypertext Transfer Protocol Secure (HTTPS) leverages SSL/TLS with HTTP to add
encryption for transmitted information. This is used to protect data in-transit, not data at rest.
HTTPS Correct
Explanation
"HTTP" is correct. Hypertext Transfer Protocol (HTTP) is a communication protocol that serves as the
primary way web browsers communicate with web servers to access web pages over the Internet.
HTTP is considered an insecure protocol since the information is transmitted in plaintext (not
encrypted) between the client and the server. Hypertext Transfer Protocol Secure (HTTPS) is the
secure alternative to HTTP which leverages SSL/TLS to encrypt the communication session.
HTTP Correct
FTPS Incorrect
SSH Incorrect
SFTP Incorrect
"FTPS" is incorrect. File Transfer Protocol Secure (FTPS) leverages Transport Layer Security (TLS) for
"SFTP" is incorrect. SSH File Transfer Protocol (SFTP) leverages the Secure Shell (SSH) protocol to
encrypt communications
"Secure Shell (SSH)" is incorrect. SSH is a protocol used for remotely logging into and interacting
with Unix/Linux computers through a text-only command-line interface. SSH is considered a secure
protocol, as it encrypts the communication from the client to the server during the session.
IaaS Incorrect
IDaaS Incorrect
SaaS Correct
PaaS Incorrect
Explanation
"SaaS" is correct. In a Software as a Service (SaaS) model, a software service or application is hosted
by a cloud provider and provided to customers (typically over the Internet). The cloud provider
manages the infrastructure and platform, and the customer only needs to manage specific
configurations within the application. Examples of SaaS include web-based e-mail, social media sites,
"IaaS" is incorrect. In an Infrastructure as a Service (IaaS) model, the cloud provider gives customers
self-service access to a pool of infrastructure resources (such as network, server, storage, etc.) that can
"PaaS" is incorrect. In a Platform as a Service (PaaS) model, the cloud service provider gives
customers access to platforms where they can develop, test, and run code for applications developed
in various programming languages. In the question scenario, a web-based customer relationship
"IDaaS" is incorrect. IDaaS stands for identity as a service. This term is sometimes used to describe a
Question 38 • Business Continuity (BC) and Disaster Recovery (DR) and Incident Response Concepts Correct
employee has been copying large amounts of sensitive data from the
system. What is the best next step for the security analyst to take?
Explanation
Do nothing. Incorrect
"Notify management" is correct. The security analyst should notify management of their findings.
"Notify law enforcement" is incorrect. Notifying law enforcement is not the best next step.
Depending on the violation, notifying law enforcement may be necessary, however, management
"Notify the employee in question" is incorrect. Notifying the employee in question is not the best
next step. The employee may be performing nefarious activity that should be reported to
"Do nothing" is incorrect. Do nothing is never the best next step when a security professional
Explanation
"Technical" is correct. Antivirus is an example of a technical control. Technical controls are hardware
or software components that protect computing and network resources.
Administrative Incorrect
Physical Incorrect
Directive Incorrect
Technical Correct
"Physical" is incorrect. Physical controls are tangible controls put in place to protect physical
resources against physical threats, including but not limited to break-ins, fires, theft, physical harm,
and so on.
"Directive" is incorrect. Directive is a control functionality which describes the protection a control
provides. It is not a control type. Directive controls communicate expected behavior (such as policies,
The CISO of a healthcare company has decided to shut down a data center
Explanation
"Risk avoidance" is correct. Shutting down the data center eliminates the risk altogether.
"Risk transference" is incorrect. In this example the responsibility for risk is not being transferred to
"Risk acceptance" is incorrect. Risk acceptance occurs when the organization does nothing and
accepts the consequences of what may happen but that is not what is happening here.
"Risk mitigation" is incorrect. Mitigation is putting countermeasures or controls in place. While
moving the data center assets may sound like mitigation, the purpose of moving them is to avoid the
When describing the mechanism for access control, what must happen
Explanation
"Before authorization can happen the system must validate who the user is" is correct. After the
system validates who the user is (authenticates the user) by comparing the credentials with
Before authorization can happen the system must validate who the user is. Correct
Before authorization can happen the user must present their token. Incorrect
Before authorization can happen the system must determine if the user is in the
information in the access management system, then authorization can take place.
"Before authorization can happen the resource must be available" is incorrect. Availability of the
"Before authorization can happen the system must determine if the user is in the correct network
segment" is incorrect. Access control may be based on network location but not always so this is not
"Before authorization can happen the user must present their token" is incorrect. A token is only
A server admin wants to ensure that the server's hard drive is encrypted to
protect the sensitive data on the server in case the server is ever stolen.
Which of the following would enable the best configuration for disk
encryption?
Explanation
HTTPS Incorrect
AES Correct
SSL/TLS Incorrect
SFTP Incorrect
"AES" is correct. The Advanced Encryption Standard (AES) algorithm is the most commonly used
symmetric encryption algorithm due to its maturity, security, and international recognition. Symmetric
encryption (and particularly AES) is most commonly used to encrypt data in bulk and large files (such
"HTTPS" is incorrect. Hypertext Transfer Protocol Secure (HTTPS) leverages SSL/TLS with HTTP to add
encryption for transmitted information. This is used to protect data in-transit, not data at rest.
"SSL/TLS" is incorrect. Secure Socket Layer/Transport Layer Security (SSL/TLS) is often used with
protocols, such as HTTP, to help secure, encrypt, and protect the integrity of communication. This is
for protecting data in-transit not data at rest (such as server hard drive encryption).
"SFTP" is incorrect. SSH File Transfer Protocol (SFTP) is used for transferring files between systems
and leverages the SSH protocol to encrypt communications. This protects data in-transit but not data
Explanation
Access control model that provides the owner of the resource (typically the creator)
Access control model that grants permissions based on a variety of attributes such as
who is making the request, what resource is being requested, and other
environmental conditions such as the time of day or location.
Incorrect
Access control model that enforces access based on predefined roles. Incorrect
Access control model that leverages a central authority that regulates access based
"Access control model that provides the owner of the resource (typically the creator)..." is correct.
Discretionary access control (DAC) provides the owner of the resource, typically the creator, full
control to configure which subjects (e.g., users, groups) can access the object (e.g., file, folder). This
allows the user (object owner) the ability (“discretion”) to make decisions such as what permissions
"Access control model that leverages a central authority that regulates access based on security
labels" is incorrect. Mandatory access control (MAC) leverages a central authority, typically a security
administrator, that regulates access based on security labels, such as the clearance level that a subject
(user) has been approved for, as well as the classification of the object (file, database, etc.).
"Access control model that enforces access based on predefined roles" is incorrect. Role-based
access control (RBAC) enforces access based on roles that define permissions and the level of access
provided to any subjects assigned to that role. Roles are typically developed for similar users with the
"Access control model that grants permissions based on a variety of attributes such as who is
making the request..." is incorrect. Attribute-based access control (ABAC) grants permissions based
on a variety of attributes such as who is making the request (subject), what resource is being
requested (object), environmental conditions (e.g., time of day or location), and what action is b
Explanation
"Review the sign-in sheet" is correct. A sign-in sheet is an example of a physical access log, not a
"Review SIEM alerts" is incorrect. Logical access is focused on access to computer and network
resources. Logical access can be monitored through regular account audits, review of logical access
"Access the log review" is incorrect. Logical access is focused on access to computer and network
resources. Logical access can be monitored through regular account audits, review of logical access
"Carry out regular account audits" is incorrect. Logical access is focused on access to computer and
network resources. Logical access can be monitored through regular account audits, review of logical
access a range of resources (such as email, file storage, payroll, and so on)
SSO Correct
RBAC Incorrect
CPTED Incorrect
"SSO" is correct. Single sign-on (SSO) is a technology that allows users to access a range of resources
after authenticating just once. For example, with SSO, employees can access separate corporate
systems (such as e-mail, payroll, and document management) by authenticating once instead of
having users create and remember separate passwords for each system.
"RBAC" is incorrect. Role-based access control (RBAC) is an access control model that enforces access
based on roles that define permissions and the level of access provided to any subjects assigned to
that role. Roles are typically developed for similar users with the same access needs (e.g., HR, Sales, IT,
Security). Single sign-on is often implemented leveraging RBAC, however, RBA"SSO" is not the best
answer.
"CPTED" is incorrect. Crime prevention through environmental design (CPTED) is a design technique
focused on preventing crime by leveraging environmental design elements that discourage criminal
people using their personal attributes or characteristics. Examples include fingerprint or palm scans,
encryption?
Explanation
Asymmetric encryption uses the same key for encryption and decryption, while
Symmetric encryption uses the same key for encryption and decryption, while
Both symmetric and asymmetric use the same key for encryption and decryption. Incorrect
"Symmetric encryption uses the same key for encryption and decryption, while asymmetric
encryption uses different keys" is correct. Symmetric encryption uses the same key for encryption
"Symmetric encryption is less secure than asymmetric encryption" is incorrect. Neither symmetric
Asymmetric encryption does not use the same key for encryption and decryption.
"Asymmetric encryption uses the same key for encryption and decryption, while symmetric
Explanation
DAC Incorrect
CPTED Correct
RBAC Incorrect
MAC Incorrect
"CPTED" is correct. Crime prevention through environmental design (CPTED) is a design technique
focused on preventing crime by leveraging environmental design elements that discourage criminal
The other answers are incorrect. MAC, DAC, and RBAC are access control models.
Craig wants to know if he can use his smartphone to access his company's
Explanation
AUP Incorrect
"BYOD Policy" is correct. The Bring Your Own Device (BYOD) policy defines requirements for
"Data Handling Policy" is incorrect. The Data Handling Policy defines the requirements for how the
organization handles data , usually covering the entire data life cycle.
"Privacy Policy" is incorrect. The Privacy Policy defines the requirements for how the organization
"AUP" is incorrect. The Acceptable Use Policy (AUP) defines what employees may and may not do
with company resources, usually stating such resources are to be used for official business purposes
only.
Lisa is the facilities manager for a large organization that has commercial
buildings with heavy foot traffic. Her responsibilities include managing the
risk of a vehicle driving into the building and through the lobby. Which of
the following physical control would best help mitigate this risk?
Bollard Correct
Explanation
"Bollard" is correct. A bollard is a physical control designed to help prevent a vehicle from driving
into a building
"MFA for the lobby door" is incorrect. MFA on a lobby door would not help mitigate the risk of a
"Surveillance camera" is incorrect. While surveillance cameras are physical controls, they do not
"Security guard" is incorrect. While a security guard is a physical control, it is not the best option to
Question 50 A security administrator is creating a document that outlines the steps for
Explanation
Policy Incorrect
Regulation Incorrect
Procedure Correct
Law Incorrect
"Procedure" is correct. Procedures are step-by-step workflows or instructions that define how a task
should be accomplished. In this case, the engineer is documenting procedures for how to
"Policy" is incorrect. A policy is a management document that contains high-level statements that
provide directives to the organization. A policy does not include step-by-step workflows.
"Law" is incorrect. A law is a rule of conduct established by a governmental body that is legally
enforceable.
"Regulation" is incorrect. Regulations are standards and rules adopted by administrative agencies
Explanation
Zeroization Incorrect
Erasure Correct
Overwriting Incorrect
"Erasure" is correct. Erasure is not a secure means of data sanitization. Erasure occurs when you
delete data by pressing the Delete key on a computer or emptying the recycle bin on your desktop.
When this occurs, the data is not actually removed from the hard drive and may be recovered. Secure
"Zeroization" is incorrect. Zeroization, overwriting, and physical destruction are all methods that can
"Overwriting" is incorrect. Overwriting or zeroization occurs when data is overwritten with other data
such as binary 1’s and 0’s using other data, patterns, or random data.
"Physical destruction" is incorrect. Physical destruction occurs when physical media (hard drives,
disks, etc.) are destroyed so that they cannot be reused and the data cannot be accessed. Physical
Mike and Steve want to exchange sensitive information but don't want
sends to Steve with Steve's public key (which has been shared with Mike).
When Steve receives the message from Mike, he decrypts it with his
private key which is only known to him. Similarly, if Steve wants to send a
message to Mike, he encrypts the message with Mike's public key, and
Mike decrypts the message with his private key. What is this an example
of?
Explanation
"Asymmetric Encryption" is correct. Asymmetric encryption uses two keys that are mathematically
related: a public key and a private key. Asymmetric encryption is sometimes called public key
cryptography due to there being a public key that can be freely shared with anyone the sender wants
to communicate with securely. The private key must remain private and only be known to the owner.
"Symmetric Encryption" is incorrect. Symmetric encryption uses the same key for encryption and
decryption.
"Hashing" is incorrect. Hashing is another type of cryptography that uses special algorithms known
as hash algorithms that transform information into fixed-length output known as a message digest
(MD). Unlike encryption, which can be reversed via decryption, hashing is a one-way process,
meaning the original information or message cannot be reproduced from the hash value output. In
Explanation
"Public" is correct. A public cloud consists of cloud computing resources operated by a third party
that are deployed for use by the general public for purchase and consumption (typically a
subscription or on-demand pricing model). Examples of public cloud service providers include
Public Correct
Hybrid Incorrect
Community Incorrect
Private Incorrect
Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Oracle Cloud
Infrastructure (OCI).
"Private" is incorrect. A private cloud consists of dedicated cloud computing resources used by a
"Community" is incorrect. A community cloud is a variation of a private cloud where cloud resources
are shared between multiple communities, organizations, or businesses typically for a specific
reasons). Like a private cloud, a community cloud is only available to members of the community, not
"Hybrid" is incorrect. A hybrid cloud is a combination of two or more of the other models (public,
private, or community). For example, an organization might operate a private cloud in its own onpremises data center
but leverage a public cloud provider to help load-balance traffic if there is a
spike in demand.
Explanation
"UDP is a connection-oriented protocol" is correct. User Datagram Protocol (UDP) is a protocol for
transmitting data between computers. In contrast to TCP, UDP is not a connection-oriented protocol
and is instead referred to as a connectionless protocol, as it does not establish a connection (threeway handshake) before
transmitting data. This makes UDP less reliable than TCP but also faster as it
UDP does not use a three-way handshake for establishing connections. Incorrect
UDP is less reliable than TCP. Incorrect
"UDP does not use a three-way handshake for establishing connections" is incorrect. User
Datagram Protocol (UDP) is a protocol for transmitting data between computers. In contrast to TCP,
"UDP is a connectionless protocol" is incorrect. User Datagram Protocol (UDP) is a protocol for
transmitting data between computers. In contrast to TCP, UDP is not a connection-oriented protocol
and is instead referred to as a connectionless protocol, as it does not establish a connection (threeway handshake) before
transmitting data.
"UDP is less reliable than TCP" is incorrect. User Datagram Protocol (UDP) is a protocol for
transmitting data between computers. In contrast to TCP, UDP is not a connection-oriented protocol
and is instead referred to as a connectionless protocol, as it does not establish a connection (threeway handshake) before
transmitting data. This makes UDP less reliable than TCP but also faster as it
network segmentation through the use of firewalls, and MFA for all
Explanation
Defense-in-depth Correct
"Defense-in-depth" is correct. The use of multiple layers of security controls is referred to as defensein-depth. Defense-
in-depth is the concept of coordinating and leveraging multiple layers of controls
to increase the effort required for a potential attacker to succeed in their attack.
"Risk Management" is incorrect. Risk management is the practice of studying potential threats facing
an organization and choosing the right kind of security to protect the organization against those
threats. While risk management may have influenced the security engineer's decisions of which
controls to implement, that is not the best answer given this scenario.
oversee the security program to facilitate alignment with the goals and objectives of the organization.
While security governance does influence the implementation of security controls, this is not the best
"Zero Trust" is incorrect. Zero trust is a security concept that requires all users to be specifically
authenticated and authorized before being granted access to a resource. While some of these design
techniques may be used to help facilitate zero trust, that is not the best answer.
Mary is conducting a risk analysis for her organization. Her boss, the CISO,
feels strongly that the organization's biggest risk is from hackers trying to
where their defensive focus should lie. This is an example of what kind of
analysis?
Explanation
"Qualitative risk analysis" is correct. Qualitative analysis considers priorities to evaluate the impact of
threats to the business and may be as simple as an executive saying, "this asset is important to us
"Quantitative risk analysis" is incorrect. Quantitative risk analysis assigns financial or numerical values
to assets along with factors with numerical weights which is not the case in this example.
"Defense in depth" is incorrect. Defense in depth is the concept of coordinating and leveraging
multiple layers of controls which is not what is being described in the question.
"Zero trust" is incorrect. Zero trust is a security concept that requires all users to be specifically
authenticated and authorized before being granted access to a resource. It may be part of the
defensive solution the CISO is seeking but it is not the best answe
Explanation
"Disable the employee's access to all accounts" is correct. When there is no longer a need for access,
Do nothing. If anyone tries to use the accounts, it will be detected by IDS and
Remove access to only accounts for which the user does not have write access. Incorrect
Disable the employee's access to all accounts after a grace period. Incorrect
"Do nothing. If anyone tries to use the accounts, it will be detected by IDS and monitoring
systems" is incorrect. When there is no longer a need for access, the access should be revoked.
"Remove access to only accounts for which the user does not have write access" is incorrect.
Regardless of the type of access, if the access is no longer required it should be revoked.
"Disable the employee's access to all accounts after a grace period" is incorrect. When there is no
longer a need for access, the access should be revoked. A grace period would rarely apply in the
Question 58 • Business Continuity (BC) and Disaster Recovery (DR) and Incident Response Concepts Correct
"Business continuity" is correct. Business continuity management encompasses planning for and
executing how and organization can continue to operate in the event of an incident.
"Disaster recovery" is incorrect. Disaster recovery is a subset of business continuity that focuses on
"Incident response" is incorrect. Incident response involves planning and processes for responding to
security incidents.
Explanation
Corrective Correct
Detective Incorrect
Preventive Incorrect
Directive Incorrect
Return to course
"Corrective" is correct. Corrective controls provide functionality that fixes a system, process, or
activity after an adverse event has occurred (such as recovering the production database from a
backup).
"Preventive" is incorrect. Preventive controls prevent or stop an adverse event or incident. In this
"Detective" is incorrect. Detective controls help to detect or identify when something bad might have
occurred.
Explanation
"SSL/TLS" is incorrect. Secure Socket Layer/Transport Layer Security (SSL/TLS) is often used with
protocols, such as HTTP, to help secure, encrypt, and protect the integrity of communication to help
SSL/TLS Incorrect
SSH Incorrect
data in-transit.
encrypted VPN is a secure connection to a private network through a public network such as the
Internet. The connection is encrypted and secured virtually, extending the organization’s private
"SSH" is incorrect. Secure Shell (SSH) is a protocol used for remotely logging into and interacting with
Unix/Linux computers through a text-only command-line interface. SSH encrypts the communication
from the client to the server during the session, providing protection for data in transit
course of action?
Explanation
Check the system for malware and indicators of malicious activity, properly disinfect,
Run a virus scan and if the server is clean it is ok to remain in production. Incorrect
Remove the system from production, wipe the hard drive and reinstall the OS and
applications. Incorrect
Return to course
"Check the system for malware and indicators of malicious activity, properly disinfect, configure,
and test the system" is correct. The system may have been compromised so it should be checked
"Run a virus scan and if the server is clean it is ok to remain in production" is incorrect. Simply
running a virus scan is not enough as the system remains non-compliant and can be a security risk
"Remove the system from production, wipe the hard drive and reinstall the OS and applications" is
incorrect. Wiping the hard drive without first checking to see if the system was compromised loses
"Install HIDS immediately" is incorrect. Installing Host-based IDS software does not solve the
Explanation
"SLA" is correct. A service level agreement (SLA) is a contractual agreement between a service
provider or supplier and a customer that defines the level of service the customer can expect. These
include provisions around things like performance, availability, security, response times, and
SLA Correct
accountability, as well as metrics by which the service can be measured to ensure the provider is
adhering to stated requirements. SLAs (and other similar contracts) are very important when it comes
to a customer’s ability to govern the relationship with the provider, as they serve as the primary legal
and contractual guarantee of the level of service and responsibility the provider takes on. SLAs may
even have provisions that the provider maintain a specific ISO/IEC certification or have SOC reports
"SOC Reports" is incorrect. A system and organization controls (SOC) audit is an audit performed on
a service organization (such as a cloud service provider) by a third-party audit firm that assesses the
internal controls of the provider. When the audit is concluded, the audit firm issues a SOC report
attesting to the controls implemented by the provider. While SOC reports are beneficial to a
customer to understand the controls the provider has in place, it is not the best option for governing
the relationship between the customer and the provider. Just because a provider has a SOC report
now does not mean they have contractually agreed to have one in the future.
"ISO/IEC Certification" is incorrect. The International Organization for Standardization (ISO) and the
standards. Organizations may seek to become certified against these standards by being audited by
an accredited third party. While ISO/IEC certification can be helpful in ensuring a provider has specific
controls in place, it is not the best option for governing the relationship between the customer and
A cyberattacker hacks into a system and steals data they are not
Explanation
"Malicious unauthorized access" is correct. If someone bypasses access control mechanisms to gain
"Unusual access", "System misconfiguration", and "Explicit unauthorized access" are incorrect.
Unusual and explicit unauthorized access are make-believe terms, while system misconfiguration
Explanation
"Malware" is correct. Malware (malicious software) is software designed to infiltrate and gain
unauthorized access to systems for malicious purposes. Malware includes viruses, trojans, worms,
Ransomware Incorrect
Malware Correct
Scripts Incorrect
"Social engineering" is incorrect. Social engineering is manipulating someone into doing something
"Ransomware" is incorrect. Ransomware is a type of malware that forces the victim to either pay a
ransom or deal with the damage the ransomware causes to the system on which it resides.
Question 65 • Security Principles Correct
Of the reasons listed which is the best reason why an organization would
Explanation
"Quantitative analysis requires a lot of data and can be very complex to perform" is correct.
Quantitative analysis requires a lot of data and can be very complex to perform which is why many
Quantitative analysis requires a lot of data and can be very complex to perform. Correct
Qualitative analysis requires a lot of data and can be very complex to perform. Incorrect
"Quantitative analysis can be subjective and open to interpretation" is incorrect and is not a true
"Qualitative analysis requires a lot of data and can be very complex to perform" is incorrect and is
not a true statement. Qualitative is usually chosen because it requires comparatively less data and is
less complex.
"Qualitative analysis can be subjective and open to interpretation" is incorrect. While the statement
is true, it isn't the best answer because it presents a reason why an organization might not want to
developed for each department such as IT, Finance, Sales, HR, and so on.
what team they are on. Which access control model is most likely being
utilized?
MAC Incorrect
ABAC Incorrect
RBAC Correct
Explanation
"RBAC" is correct. Role-based access control (RBAC) enforces access based on roles that define
permissions and the level of access provided to any subjects assigned to that role. Roles are typically
developed for similar users with the same access needs (e.g., HR, Sales, IT, Security).
"DAC" is incorrect. Discretionary access control (DAC) provides the owner of the resource, typically
the creator, full control to configure which subjects (e.g., users, groups) can access the object (e.g.,
file, folder). This allows the user (object owner) the ability (“discretion”) to make decisions such as
what permissions other users or groups of users have over the object.
"MAC" is incorrect. Mandatory access control (MAC) leverages a central authority, typically a security
administrator, that regulates access based on security labels, such as the clearance level that a subject
(user) has been approved for, as well as the classification of the object (file, database, etc.).
Explanation
"IPS" is incorrect. This isn't the best answer because an intrusion prevention system is both a
Bollard Incorrect
IPS Incorrect
IDS Correct
Incorrect
Correct
Cryptography
Incorrect
Explanation
"Company security policies, Social engineering defenses, Security best practices" is correct. Most
"Company security policies, Cryptography, Security best practices" is incorrect. From the list,
"Company security policies, Social engineering defenses, Security best practices" is incorrect.
Explanation
"Practice testing" is correct. If Joe's organization had a program of practicing and testing what
students were taught Joe may have remembered how to recognize the signs of a social engineering
attack.
"Modular training" is incorrect. It is unlikely modular training would have helped Joe recognize the
attack.
"Modular training" is incorrect. If Joe's organization had good or bad ways to track his training
progress, it is unlikely that it would have helped Joe recognize the attack.
"Modular training" is incorrect. It is unlikely that establishing goals would have helped Joe recognize
ransomware attacks?
Explanation
"Ping attack" is correct. A ping attack is a denial of service attack in which the attacker floods the
victim system with ping requests. By itself it does not enable a ransomware attack.
"Phishing emails" is incorrect. Phishing emails are a common method of launching ransomware
attacks.
Explanation
"All of these answers" is correct. Security guards, physical access logs, and security cameras may be
"Security guard" is incorrect. Security guards, physical access logs, and security cameras may be used
"Physical access logs" is incorrect. Security guards, physical access logs, and security cameras may be
"Security camera" is incorrect. Security guards, physical access logs, and security cameras may be
Explanation
"Advanced persistent threat" is correct. An advanced persistent threat is an attack in which the
Backdoor Incorrect
"Denial of service" is incorrect. A denial of service attack is any attack against availability.
"Distributed denial of service" is incorrect. A distributed denial of service attack is a DoS attack
launched from many computers usually in the form of a botnet and not necessarily persistent or
stealthy.
Explanation
"The latest news about security incidents" is correct. A security policy would never contain the latest
news about security incidents. That information would normally be found on the organization's
"Policy Scope" is incorrect. Good security policies usually contain a section describing the scope of
"Policy Enforcement" is incorrect. Many security policies have a section on enforcement which covers
how the organization enforces the policy and the ramifications of non-compliance.
Explanation
"Preventive" is correct. A fence provides preventive control functionality as it prevents someone from
"Detective" is incorrect. Detective controls helps to detect or identify when something bad might
have occurred.
keeping certain legal files long enough in order to comply with specific
laws governing how long data must be kept. What element of the data
Explanation
"Data retention" is correct. There are many state and federal laws that require organizations to retain
data for specific periods of time. As a result, when data is no longer needed by an organization, it
may still need to be stored for a period of time. This type of storage is called data retention.
"Data destruction" is incorrect. Data destruction occurs when data is no longer needed, and must be
securely sanitized. Sanitization methods include overwriting, degaussing, and physical destruction
"Data classification" is incorrect. Data classification is the process of assigning classification levels to
data types based on risk. The classification of the data dictates the controls that are utilized to protect
it appropriately.
"Data encryption" is incorrect. Data encryption is the process of transforming plaintext (information
that is in a readable format) into ciphertext (information that is in an encrypted, unreadable format).
having with their work laptop. When the employee attempts to connect to
the company network they are unable to get an IP address assigned and
HTTP Incorrect
SMTP Incorrect
DHCP Correct
"DHCP" is correct. Dynamic Host Configuration Protocol (DHCP) is used to dynamically assign IP
addresses to devices. A server (DHCP server) checks for available IP addresses from a pool and
automatically assigns them to client devices. The systems administrator should investigate to see
"HTTP" is incorrect. Hypertext Transfer Protocol (HTTP) is a communication protocol that provides a
means of transmitting and formatting messages between clients and servers. It is the primary way
web browsers communicate with web servers to access web pages over the Internet. It is not related
to IP address assignment.
"SMTP" is incorrect. Simple Mail Transfer Protocol (SMTP) is an email protocol used for sending
"FTP" is incorrect. File Transfer Protocol (FTP) is used for transferring files between systems. FTP
Explanation
"AUP" is correct. The Acceptable Use Policy (AUP) defines what employees may and may not do with
company resources, usually stating such resources are to be used for official business purposes only
AUP Correct
"BYOD Policy" is incorrect, The Bring Your Own Device (BYOD) policy defines requirements for
employee use of their own equipment but the question refers to company-owned equipment.
"Data Handling Policy" is incorrect. The Data Handling Policy defines the requirements for how the
organization handles data , usually covering the entire data life cycle.
"Privacy Policy" is incorrect. The Privacy Policy defines the requirements for how the organization
Explanation
"Reveal user accounts on endpoints that have excessive privileges" is correct. Scanners cannot tell if
user accounts have too many privileges since that is dependent upon the user's role in the
Enumerate the IP addresses and operating system types and versions of endpoints. Incorrect
Reveal user accounts on endpoints that have excessive privileges. Correct
"Enumerate the IP addresses and operating system types and versions of endpoints" is incorrect.
Scanners typically can enumerate the IP addresses and operating system types and versions of
endpoints.
"Reveal open ports on endpoints" is incorrect. Scanners typically can reveal open ports on
endpoints.
"Reveal any known vulnerabilities on endpoints" is incorrect. Scanners typically can reveal any
Question 79 • Business Continuity (BC) and Disaster Recovery (DR) and Incident Response Concepts Correct
operations?
Explanation
"Hot site" is correct. A hot site is ready to go at a moment's notice and can be up and running within
a few hours.
"Warm site" is incorrect. A warm site has power and infrastructure but not the computing equipment
"Cold site" is incorrect. A cold site is an empty building with no IT infrastructure or computing
equipment.
"Tertiary site" is incorrect. A tertiary site is a secondary backup site used if the primary backup site is
not available. It could be hot, warm, or cold, but it is not the best answer
Question 80 • Security Operations Correct
Explanation
Salting Incorrect
Hashing Incorrect
Encryption Correct
Decryption Incorrect
"Hashing" is incorrect. Hashing is another type of cryptography that uses special algorithms that
transform information into fixed-length output known as a message digest (MD). An MD output is
also commonly referred to as a hash, hash value, or fingerprint. Unlike encryption, which can be
reversed via decryption, hashing is a one-way process, meaning the original information or message
their servers and infrastructure from their on-prem data center to the
cloud. Which cloud service model best fits the organization's needs?
Explanation
IaaS Correct
On-prem Incorrect
SaaS Incorrect
PaaS Incorrect
"IaaS" is correct. In an Infrastructure as a Service (IaaS) model, the cloud provider gives customers
self-service access to a pool of infrastructure resources (such as network, server, storage, etc.) that can
be virtually provisioned and deprovisioned on-demand. In this case, the IT Director wants to move
their on-prem servers to the cloud so IaaS is the option that most closely aligns.
"SaaS" is incorrect. In a Software as a Service (SaaS) model, a software service or application is hosted
by a cloud provider and provided to customers (typically over the Internet). The cloud provider
manages the infrastructure and platform, and the customer only needs to manage specific
configurations within the application. Examples of SaaS include web-based e-mail, social media sites,
and other web-based applications. In this case, the IT Director wants to move physical on-prem
"IaaS" is incorrect. In a Platform as a Service (PaaS) model, the cloud service provider gives customers
access to platforms where they can develop, test, and run code for applications developed in various
programming languages. In this case, the IT Director wants to move physical on-prem servers to the
"On-prem" is incorr
Explanation
"Network Firewall" is correct. A firewall is a network device used to enforce certain security rules that
govern how traffic may flow, such as allowing certain types of traffic and denying other types of
traffic.
allows or denies connections to that computer based on a set of rules. This is not the best option for
Explanation
"Authentication" is correct. Authentication is the method by which a system validates a user is who
"Authorization" is incorrect. Authorization is the bestowing of a set of permissions and can only
malware. When investigating the concern, they realize that the appropriate
events have not been captured so they are unable to produce a chain of
events. Which of the following is the root cause of this issue pertaining to
the investigation?
Explanation
"Lack of logging" is correct. The appropriate events have not been captured due to a lack of logging.
This prevents the system administrator from being able to establish a chain of events during their
investigation.
"Lack of monitoring" is incorrect. While monitoring is critical for detecting incidents, logging must be
in place so that the appropriate events are captured for later monitoring. In this scenario, the
organization was not capturing key events that would be needed for monitoring to be effective.
"Lack of MFA" is incorrect. Multi-factor authentication (MFA) would not have helped in the
investigation.
"Lack of network security" is incorrect. Increased network security measures possibly could have
helped prevent the malware incident but would not have helped in the investigation
Explanation
"MAC" is correct. Mandatory access control (MAC) is an access control model that is commonly used
resources is based on a hierarchical system of security labels and clearances that are assigned by a
MAC Correct
ABAC Incorrect
RBAC Incorrect
DAC Incorrect
central authority. This allows for a high level of security and ensures that only users with the
"DAC" is incorrect. Discretionary access control (DAC) is an access control model that allows owners
or administrators to control access to resources based on the identity of the user and the permissions
assigned to them. While DAC can be used in military and government environments, mandatory
"RBAC" is incorrect. Role-based access control (RBAC) is an access control model that provides
granular access control based on a user’s job responsibilities. While RBAC can be used in military and
government environments, mandatory access control (MAC) is the best answer.
"ABAC" is incorrect. Attribute-based access control (ABAC) is an access control model that grants
access to resources based on a user’s attributes or characteristics, such as job title, location, or
department. While ABAC can be used in military and government environments, mandatory access
demagnetize media?
Explanation
extremely powerful magnetic field. This sanitizes the magnetic media. The media itself can then be
reused; however, degaussing will make most modern hard drives inoperable.
Overwriting Incorrect
Zeroization Incorrect
Disintegration Incorrect
Degaussing Correct
"Zeroization" is incorrect. A common technique for data sanitization is to overwrite data with other
data, patterns, or random data. The more times the data is overwritten (referred to as a pass), the
harder the original data is to recover. This is often referred to as overwriting or zeroization.
"Overwriting" is incorrect. A common technique for data sanitization is to overwrite data with other
data, patterns, or random data. The more times the data is overwritten (referred to as a pass), the
harder the original data is to recover. This is often referred to as overwriting or zeroization.
"Disintegration" is incorrect. Disintegration is a physical media destruction technique. It does not use
security incident.
Explanation
"Disabling system accounts" is correct. Disabling system accounts may be done as a containment
strategy as part of the incident response process, however, this is not a method for identifying a
security incident.
"Reviewing security logs" is incorrect. Reviewing security logs is a method for identifying a security
incident.
"IDS alerts" is incorrect. Intrusion Detection System (IDS) alerts can be used to identify a security
incident.
"SIEM alerts" is incorrect. Security Information and Event Management (SIEM) alerts can be used to
one time?
Explanation
"Annual Loss Expectancy" is incorrect. Annual (or Annualized) Loss Expectancy (ALE) is the potential
loss due to all threat events occurring over the course of one year.
"Single Exposure Factor" is incorrect. Single Exposure Factor is not a valid term used in quantitative
analysis.
controls access to the data center. In order for employees to enter the
data center, they must scan their palm to gain access. What type of
Explanation
Administrative Incorrect
Technical Incorrect
Physical Correct
Directive Incorrect
"Physical" is correct. Physical controls are controls put in place to protect physical resources against
physical threats, including but not limited to break-ins, fires, theft, physical harm, and so on. In this
example the biometric authentication system is controlling access to the data center to protect
"Technical" is incorrect. Technical controls are hardware or software components that protect
computing and network resources such as computers, servers, mobile devices, computer networks, or
data stored within a system. In this case, the biometric system is controlling access to a physical
Joe ran a vulnerability scan and posted the results on his organization's
unsecured website so it would be easy for his employees to see the results.
Yes, because it is important for scan results to be easily accessible by the security
staff. Incorrect
Yes, because storing the results in a secure location would make it harder for the
No, because scan results contain sensitive information which could be used by
No, because scan results must be encrypted according to NIST standards. Incorrect
Return to course
Explanation
"No, because scan results contain sensitive information which could be used by cybercriminals to
launch attacks against the organization" is correct. Scan results should be stored and handled in a
secure manner and dissemination should be tightly controlled because they contain sensitive
"Yes, because it is important for scan results to be easily accessible by the security staff" is
incorrect. While it is important for scan results to be easily accessible, they should also be secured
"Yes, because storing the results in a secure location would make it harder for the vulnerability
remediation staff to do their job" is incorrect. While it is important for scan results to be easily
accessible, they should also be secured and tightly controlled as they contain sensitive information.
"No, because scan results must be encrypted according to NIST standards" is incorrect. NIST
standards do not require scan results to be encrypted, although scan results should be stored and
management?
Explanation
"Test patches before deploying them to production devices" is correct. Patches may have
unintended consequences so they should be first tested before deploying them to production.
"Install patches as quickly as possible" is incorrect. As quickly as possible may be ok as long as they
"Deploy patches of the most reputable vendors first" is incorrect. Vendor reputation should not be a
"Install patches on a weekly basis" is incorrect. Patches could be installed on a regular basis but only
Explanation
"Internet Protocol (IP) address" is correct. IP addresses are used for identifying devices for the
a virtual address that is not hardcoded into hardware like a MAC address.
"Media access control (MAC) address" is incorrect. A MAC address is a unique string of numbers and
letters assigned to the network interface of a computing device used to uniquely identify devices on
the same network. The MAC address is often referred to as a physical address or hardware address
"Address Resolution Protocol (ARP)" is incorrect. Address Resolution Protocol (ARP) is used to map
IP addresses to MAC addresses (and vice versa) on a LAN. ARP serves as the bridge that connects the
IP address and the MAC address. Computers on a network use ARP to learn which MAC address
corresponds to which IP address and store that information for future communication. It is not used
"Mailing address" is incorrect. A mailing address is an address used for receiving physical mail. This is
Which of the following best describes the phases of the data lifecycle?
Explanation
"Create > Store, Use, Share > Archive > Destroy" is correct. Data passes through stages starting
from when data is created and progressing through how it is stored, used, shared, archived, and
Explanation
"Application" is correct. A web application firewall (WAF) is a type of firewall used to protect web
applications from malicious traffic. To perform this function a WAF needs insight into the HTTP web
traffic to the application which means it operates at Layer 7 (Application Layer) of the OSI model. The
Application Layer consists of protocols used by computer applications to perform certain functions
Session Incorrect
Application Correct
Transport Incorrect
"Session" is incorrect. A web application firewall (WAF) is a type of firewall used to protect web
applications from malicious traffic. To perform this function a WAF needs insight into the HTTP web
traffic to the application which means it operates at Layer 7 (Application Layer) of the OSI model. The
Application Layer consists of protocols used by computer applications to perform certain functions
is locked every night. What is the best way to ensure this happens?
Explanation
"Implement a two-person rule for locking the server room" is correct. By requiring that two-people
Issue keys to many people so anyone can lock the room. Incorrect
"Assign the locking of the server room to a responsible person" is incorrect. While assigning the
locking to a responsible person is a good idea, this solution isn't as good as implementing a twoperson rule.
"Issue keys to many people so anyone can lock the room" is incorrect and is a bad idea because it
"Install a combination lock that is easy to use" is incorrect. While using a lock that is easy to use is a
great idea, it does not solve the problem and is not as good as deploying a two-person
Question 96 • Business Continuity (BC) and Disaster Recovery (DR) and Incident Response Concepts Incorrect
Explanation
"To define plans for how to handle the sudden loss of an executive or key employee of the
organization" is correct. A succession plan lays out a process and timeline for actions in the event a
Question 97 • Business Continuity (BC) and Disaster Recovery (DR) and Incident Response Concepts Incorrect
Which of the following would not occur during the post-incident activity
Explanation
"Begin training staff on the incident response plan" is correct. Training staff on the incident
response plan should be done as part of the preparation phase of the incident response process. The
post-incident activity phase is the final phase of the incident response process. This is where the team
reviews everything that happened, analyzes how the incident was handled, conducts a lessons
learned, and documents opportunities for improvement. As part of the lessons learned the
organization may determine that more training is needed, but the training itself would occur as part
of the preparation phase (you can't effectively respond to an incident if you haven't been trained on
the process!).
"Conduct a lessons learned" is incorrect. The final phase of the incident response process is the postincident activity
phase. This is where the team reviews everything that happened, analyzes how the
incident was handled, conducts a lessons learned, and documents opportunities for improvement.
"Document opportunities for improvement" is incorrect. The final phase of the incident response
process is the post-incident activity phase. This is where the team reviews everything that happened,
analyzes how the incident was handled, conducts a lessons learned, and documents opportunities for
improvement.
Which type of access card has a microprocessor in the card and is capable
Explanation
"Smart card" is correct. A smart card has a microprocessor in the card and is capable of both storing
and processing information. A smart card can store biometric data, cryptographic keys, and other
information.
"Barcode card" is incorrect. A barcode is simply a visual representation of data. You will see these on
grocery store products that are scanned at the checkout (like a can of soup). Information can be
stored in the barcode but it does not have a microprocessor and cannot process information.
"Magnetic stripe card" is incorrect. Magnetic stripe cards require the card to be physically swiped
into the card reader (similar to a credit card or hotel card). Data is encoded in the dark black
magnetic stripe of the card. They can store data but do not have a microprocessor and cannot
process information.
"None of these answers" is incorrect. One of the other answer options is correct
Question 99 • Business Continuity (BC) and Disaster Recovery (DR) and Incident Response Concepts Correct
Explanation
Deterrent controls Incorrect
"Preventive controls" is correct. All of the controls listed are preventive which are controls designed
"Deterrent controls" is incorrect. A deterrent control is one that is intended to discourage a potential
His company has many divisions and departments but he wants the IT
organization to manage the access control for all of them. Which type of
Explanation
Type 2 Incorrect
Decentralized Incorrect
Type 1 Incorrect
Centralized Correct
responsible for governing, managing, and configuring tools for access administration for all systems.
managed by different departments or people for different systems throughout the organization.
"Type 1" is incorrect. Type 1 is an authentication factor not an access control administration method.
"Type 2" is incorrect. Type 2 is an authentication factor not an access control administration method.