Frage 1
Frage
Grace would like to implement application control technology in
her organization. Users often need to install new applications for
research and testing purposes, and she does not want to interfere
with that process. At the same time, she would like to block the use
of known malicious software. What type of application control
would be appropriate in this situation?
Antworten
-
A. Blacklisting
-
B. Graylisting
-
C. Whitelisting
-
D. Bluelisting
Frage 2
Frage
Warren is designing a physical intrusion detection system for his
data center and wants to include technology that issues an alert if
the communications lines for the alarm system are unexpectedly
cut. What technology would meet this requirement?
Antworten
-
A. Heartbeat sensor
-
B. Emanation security
-
C. Motion detector
-
D. Faraday cage
Frage 3
Frage
John and Gary are negotiating a business transaction, and John
must demonstrate to Gary that he has access to a system. He
engages in an electronic version of the “magic door” scenario
shown here. What technique is John using?
Antworten
-
A. Split-knowledge proof
-
B. Zero-knowledge proof
-
C. Logical proof
-
D. Mathematical proof
Frage 4
Frage
Raj is selecting an encryption algorithm for use in his organization
and would like to be able to vary the strength of the encryption
with the sensitivity of the information. Which one of the following
algorithms allows the use of different key strengths?
Antworten
-
A. Blowfish
-
B. DES
-
C. Skipjack
-
D. IDEA
Frage 5
Frage
Referring to the fire triangle shown here, which one of the
following suppression materials attacks a fire by removing the fuel
source?
Antworten
-
A. Water
-
B. Soda acid
-
C. Carbon dioxide
-
D. Halon
Frage 6
Frage
Howard is choosing a cryptographic algorithm for his organization,
and he would like to choose an algorithm that supports the
creation of digital signatures. Which one of the following
algorithms would meet his requirement?
Antworten
-
A. RSA
-
B. DES
-
C. AES
-
D. Blowfish
Frage 7
Frage
Laura is responsible for securing her company’s web-based
applications and wishes to conduct an educational program for
developers on common web application security vulnerabilities.
Where can she turn for a concise listing of the most common web
application issues?
Antworten
-
A. CVE
-
B. NSA
-
C. OWASP
-
D. CSA
Frage 8
Frage
The Bell-LaPadula and Biba models implement state machines in a
fashion that uses what specific state machine model?
Antworten
-
A. Information flow
-
B. Noninterference
-
C. Cascading
-
D. Feedback
Frage 9
Frage
The ___________ of a process consist(s) of the limits set on the
memory addresses and resources that the process may access.
Antworten
-
A. Perimeter
-
B. Confinement limits
-
C. Metes
-
D. Bounds
Frage 10
Frage
What type of motion detector senses changes in the
electromagnetic fields in monitored areas?
Antworten
-
A. Infrared
-
B. Wave pattern
-
C. Capacitance
-
D. Photoelectric
Frage 11
Frage
Which one of the following fire suppression systems uses a
suppressant that is no longer manufactured due to environmental
concerns?
Antworten
-
A. FM-200
-
B. Argon
-
C. Inergen
-
D. Halon
Frage 12
Frage
Which one of the following statements is correct about the Biba
model of access control?
Antworten
-
A. It addresses confidentiality and integrity.
-
B. It addresses integrity and availability.
-
C. It prevents covert channel attacks.
-
D. It focuses on protecting objects from integrity threats.
Frage 13
Frage
In Transport Layer Security, what type of key is used to encrypt the
actual content of communications between a web server and a
client?
Antworten
-
A. Ephemeral session key
-
B. Client’s public key
-
C. Server’s public key
-
D. Server’s private key
Frage 14
Frage
Beth would like to include technology in a secure area of her data
center to protect against unwanted electromagnetic emanations.
What technology would assist her with this goal?
Antworten
-
A. Heartbeat sensor
-
B. Faraday cage
-
C. Piggybacking
-
D. WPA2
Frage 15
Frage
In a virtualized computing environment, what component is
responsible for enforcing separation between guest machines?
Frage 16
Frage
Rick is an application developer who works primarily in Python.
He recently decided to evaluate a new service where he provides
his Python code to a vendor who then executes it on their server
environment. What type of cloud computing environment is this
service?
Antworten
-
A. SaaS
-
B. PaaS
-
C. IaaS
-
D. CaaS
Frage 17
Frage
A software company developed two systems that share
information. System A provides information to the input of System
B, which then reciprocates by providing information back to
System A as input. What type of composition theory best describes
this practice?
Antworten
-
A. Cascading
-
B. Feedback
-
C. Hookup
-
D. Elementary
Frage 18
Frage
Tommy is planning to implement a power conditioning UPS for a
rack of servers in his data center. Which one of the following
conditions will the UPS be unable to protect against if it persists for
an extended period of time?
Antworten
-
A. Fault
-
B. Blackout
-
C. Sag
-
D. Noise
Frage 19
Frage
Which one of the following humidity values is within the
acceptable range for a data center operation?
Antworten
-
A. 0%
-
B. 10%
-
C. 25%
-
D. 40%
Frage 20
Frage
Chris is designing a cryptographic system for use within his
company. The company has 1,000 employees, and they plan to use
an asymmetric encryption system. How many total keys will they
need?
Antworten
-
A. 500
-
B. 1,000
-
C. 2,000
-
D. 4,950
Frage 21
Frage
What term is used to describe the formal declaration by a
designated approving authority (DAA) that an information
technology (IT) system is approved to operate in a specific
environment?
Antworten
-
A. Certification
-
B. Accreditation
-
C. Evaluation
-
D. Approval
Frage 22
Frage
Object-oriented programming languages use a black box approach
to development, where users of an object do not necessarily need to
know the object’s implementation details. What term is used to
describe this concept?
Antworten
-
A. Layering
-
B. Abstraction
-
C. Data hiding
-
D. Process isolation
Frage 23
Frage
Todd wants to add a certificate to a certificate revocation list. What
element of the certificate goes on the list?
Antworten
-
A. Serial number
-
B. Public key
-
C. Digital signature
-
D. Private key
Frage 24
Frage
Alison is examining a digital certificate presented to her by her
bank’s website. Which one of the following requirements is not
necessary for her to trust the digital certificate?
Antworten
-
A. She knows that the server belongs to the bank.
-
B. She trusts the certificate authority.
-
C. She verifies that the certificate is not listed on a CRL.
-
D. She verifies the digital signature on the certificate.
Frage 25
Frage
Which one of the following is an example of a covert timing
channel when used to exfiltrate information from an organization?
Antworten
-
A. Sending an electronic mail message
-
B. Posting a file on a peer-to-peer file sharing service
-
C. Typing with the rhythm of Morse code
-
D. Writing data to a shared memory space
Frage 26
Frage
Which one of the following would be a reasonable application for
the use of self-signed digital certificates?
Frage 27
Frage
Mike has been tasked with preventing an outbreak of malware like
Mirai. What type of systems should be protected in his
organization?
Frage 28
Frage
A component failure in the primary HVAC system leads to a high
temperature alarm in the data center that Kim manages. After
resolving the issue, what should Kim consider to prevent future
issues like this?
Frage 29
Frage
As part of his team’s forensic investigation process, Matt signs
drives and other evidence out of storage before working with them.
What type of documentation is he creating?
Antworten
-
A. Criminal
-
B. Chain of custody
-
C. Civil
-
D. CYA
Frage 30
Frage
Lauren implements ASLR to help prevent system compromises.
What technique has she used to protect her system?
Antworten
-
A. Encryption
-
B. Mandatory access control
-
C. Memory address randomization
-
D. Discretionary access control
Frage 31
Frage
During a system audit, Casey notices that the private key for her
organization’s web server has been stored in a public Amazon S3
storage bucket for more than a year. What should she do?
Antworten
-
A. Remove the key from the bucket
-
B. Notify all customers that their data may have been exposed
-
C. Request a new certificate using a new key
-
D. Nothing, because the private key should be accessible for
validation
Frage 32
Frage
Joanna wants to review the status of the industrial control systems
her organization uses for building control. What type of systems
should she inquire about access to?
Antworten
-
A. SCADA
-
B. DSS
-
C. BAS
-
D. ICS-CSS
Frage 33
Frage
After scanning all of the systems on his wireless network, Mike
notices that one system is identified as an iOS device running a
massively out-of-date version of Apple’s mobile operating system.
When he investigates further, he discovers that the device is an
original iPad and that it cannot be updated to a current secure
version of the operating system. What should Mike recommend?
Antworten
-
A. Retire or replace the device
-
B. Isolate the device on a dedicated wireless network
-
C. Install a firewall on the tablet
-
D. Reinstall the OS
Frage 34
Frage
During a third-party vulnerability scan and security test, Danielle’s
employer recently discovered that the embedded systems that were
installed to manage her company’s new buildings have a severe
remote access vulnerability. The manufacturer has gone out of
business, and there is no patch or update for the devices. What
should Danielle recommend that her employer do about the
hundreds of devices that are vulnerable?
Antworten
-
A. Identify a replacement device model and replace every device
-
B. Turn off all of the devices
-
C. Move the devices to a secured network segment
-
D. Reverse engineer the devices and build an in-house patch
Frage 35
Frage
Alex’s employer creates most of their work output as PDF files.
Alex is concerned about limiting the audience for the PDF files to
those individuals who have paid for them. What technology can he
use to most effectively control the access to and distribution of
these files?
Antworten
-
A. EDM
-
B. Encryption
-
C. Digital signatures
-
D. DRM
Frage 36
Frage
Matthew is the security administrator for a consulting firm and
must enforce access controls that restrict users’ access based upon
their previous activity. For example, once a consultant accesses
data belonging to Acme Cola, a consulting client, they may no
longer access data belonging to any of Acme’s competitors. What
security model best fits Matthew’s needs?
Antworten
-
A. Clark-Wilson
-
B. Biba
-
C. Bell-LaPadula
-
D. Brewer-Nash
Frage 37
Frage
Referring to the figure shown here, what is the earliest stage of a
fire where it is possible to use detection technology to identify it?
Antworten
-
A. Incipient
-
B. Smoke
-
C. Flame
-
D. Heat
Frage 38
Frage
Ralph is designing a physical security infrastructure for a new
computing facility that will remain largely unstaffed. He plans to
implement motion detectors in the facility but would also like to
include a secondary verification control for physical presence.
Which one of the following would best meet his needs?
Antworten
-
A. CCTV
-
B. IPS
-
C. Turnstiles
-
D. Faraday cages
Frage 39
Frage
Harry would like to retrieve a lost encryption key from a database
that uses m of n control, with m = 4 and n = 8. What is the
minimum number of escrow agents required to retrieve the key?
Frage 40
Frage
Fran’s company is considering purchasing a web-based email
service from a vendor and eliminating its own email server
environment as a cost-saving measure. What type of cloud
computing environment is Fran’s company considering?
Antworten
-
A. SaaS
-
B. IaaS
-
C. CaaS
-
D. PaaS
Frage 41
Frage
Bob is a security administrator with the federal government and
wishes to choose a digital signature approach that is an approved
part of the federal Digital Signature Standard under FIPS 186-4.
Which one of the following encryption algorithms is not an
acceptable choice for use in digital signatures?
Antworten
-
A. DSA
-
B. HAVAL
-
C. RSA
-
D. ECDSA
Frage 42
Frage
Harry would like to access a document owned by Sally and stored
on a file server. Applying the subject/object model to this scenario,
who or what is the subject of the resource request?
Antworten
-
A. Harry
-
B. Sally
-
C. Server
-
D. Document
Frage 43
Frage
Michael is responsible for forensic investigations and is
investigating a medium-severity security incident that involved the
defacement of a corporate website. The web server in question ran
on a virtualization platform, and the marketing team would like to
get the website up and running as quickly as possible. What would
be the most reasonable next step for Michael to take?
Antworten
-
A. Keep the website offline until the investigation is complete.
-
B. Take the virtualization platform offline as evidence.
-
C. Take a snapshot of the compromised system and use that for
the investigation.
-
D. Ignore the incident and focus on quickly restoring the website.
Frage 44
Frage
Helen is a software engineer and is developing code that she would
like to restrict to running within an isolated sandbox for security
purposes. What software development technique is Helen using?
Antworten
-
A. Bounds
-
B. Input validation
-
C. Confinement
-
D. TCB
Frage 45
Frage
What concept describes the degree of confidence that an
organization has that its controls satisfy security requirements?
Antworten
-
A. Trust
-
B. Credentialing
-
C. Verification
-
D. Assurance
Frage 46
Frage
What type of security vulnerability are developers most likely to
introduce into code when they seek to facilitate their own access,
for testing purposes, to software they developed?
Antworten
-
A. Maintenance hook
-
B. Cross-site scripting
-
C. SQL injection
-
D. Buffer overflow
Frage 47
Frage
In the figure shown here, Sally is blocked from reading the file due
to the Biba integrity model. Sally has a Secret security clearance,
and the file has a Confidential classification. What principle of the
Biba model is being enforced?
Frage 48
Frage
Tom is responsible for maintaining the security of systems used to
control industrial processes located within a power plant. What
term is used to describe these systems?
Antworten
-
A. POWER
-
B. SCADA
-
C. HAVAL
-
D. COBOL
Frage 49
Frage
Sonia recently removed an encrypted hard drive from a laptop and
moved it to a new device because of a hardware failure. She is
having difficulty accessing encrypted content on the drive despite
the fact that she knows the user’s password. What hardware
security feature is likely causing this problem?
Antworten
-
A. TCB
-
B. TPM
-
C. NIACAP
-
D. RSA
Frage 50
Frage
Chris wants to verify that a software package that he downloaded
matches the original version. What hashing tool should he use if he
believes that technically sophisticated attackers may have replaced
the software package with a version containing a backdoor?
Antworten
-
A. MD5
-
B. 3DES
-
C. SHA1
-
D. SHA 256