A hacker launches a specific attack to exploit a known vulnerability. This is called:
A team activates procedures to mitigate a cyberattack. What plan is this?
Which of the following is NOT an element of system security configuration management?
Which of the following attacks can TLS help mitigate?
Which device is used to control traffic flow between networks?
A ________ creates an encrypted tunnel to protect your personal data and communications.
Which physical controls protect against electromagnetic eavesdropping?
Which of the following best describes a zero-day vulnerability?
What security feature is used in HTTPS?
XenServer, LVM, Hyper-V, and ESXi are:
Which access control model is best suited for a large organization with many departments and varied access needs?
A hacker intercepts network traffic to steal login credentials. Which OSI layer is being attacked?
Which layer provides services directly to the user?
The documented set of procedures to detect, respond to, and limit the consequences of cyberattacks is called:
Which of the following is often associated with Disaster Recovery planning?
A popular way of implementing the principle of least privilege is:
What is the process of verifying a user’s identity called?
An unusual occurrence in a system or network is best described as:
What does the termbusinessin business continuity planning refer to?
A company analyzes system requirements, functions, and interdependencies to prioritize contingency needs. What is this process called?
Which control identifies that an attack has occurred or is occurring?
Which of these tools is commonly used to crack passwords?
What is the purpose of a Business Impact Analysis (BIA)?
Which of the following is NOT one of the three main components of an SQL database?
Restoring IT and communications after a disruption is the goal of:
Malicious code that acts like a remotely controlled “robot” for an attacker.
A power outage disrupts operations. Which plan helps sustain operations?
A portion of the network exposed to the outside world with additional controls is called:
Ignoring a risk and continuing business operations is known as:
A set of instructions to detect, respond to, and recover from security incidents is a:
What is the primary purpose of a honeytoken in cybersecurity?
When is the Business Continuity Plan (BCP) enacted?
Which scenario best represents defense in depth?
A DLP solution should be deployed so it can inspect all forms of data leaving the organization, including:
A hacker gains unauthorized access and steals confidential data. What term best describes this?
What is the main objective of DRP after a breach shuts down systems?
Which regulation addresses personal privacy?
Which is related to standards?
The amount of risk an organization is willing to accept in pursuit of objectives is called:
Which fire suppression system is more friendly to electronics?
Token Ring operates at which OSI layer?
An approach using software-based controllers and APIs to direct network traffic:
Flooding a server with traffic to make services unavailable is called:
Information should be consistently and readily accessible for authorized parties.
Which type of control minimizes the impact of an attack and restores normal operations as quickly as possible?
An IP network protocol standardized by the IETF through RFC 792 to determine if a host is available is:
A company’s servers are down due to malware. What is the FIRST step the DR team should take?
A measure combining impact and likelihood is known as:
Which access control model can grant access to a given object based on complex rules?
Which zero-trust component breaks LANs into very small, localized security zones?
Limiting access based on data sensitivity and user authorization is known as:
Which plan provides immediate response procedures and management guidance?
A practitioner needing step-by-step instructions to complete a provisioning task should consult a:
Often offered by third-party organizations and covering advisory or compliance objectives:
The purpose of risk identification is:
Why is security training important?
Which one of the following controls is NOT particularly effective against the insider threat?
Four main components of Incident Response are:
Which plan is activated when Incident Response and BCP fail?
A transaction over $50,000 requires approval from both a manager and an accountant. Which concept applies?
What is knowledge-based authentication?
Which type of software testing focuses on examining the source code for vulnerabilities and security issues?
Which OSI layer does a VPN primarily operate at?
If a device is found to be non-compliant with the security baseline, what action should the security team take?
An integrated platform and graphical tool for security testing of web applications is:
A company’s governing board decides that only legal services may review third-party contracts. They create a document stating that no other department has permission to do so. This document is a:
Which penetration testing technique requires the team to do the MOST work and effort?
What is the purpose of multi-factor authentication (MFA) in IAM?
What kind of control is it when we add a backup firewall that takes over if the main one stops working?
Which document identifies the principles and rules governing an organization’s protection of information systems and data?
Which security control is designed to prevent unauthorized access to sensitive information by ensuring it is accessible only to authorized users?
How does IPSec protect against replay attacks?
Natalia wants to ensure the authenticity of her organization’s domain name records using digital signatures. What technology should she use?
A prolonged, targeted cyberattack where an intruder remains undetected for an extended period is called:
Why is identifying roles and responsibilities important in IR planning?
Which is the most efficient and effective way to test a business continuity plan?
Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve this objective?
Which threat is directly associated with malware?
Which is very likely to be used in a Disaster Recovery effort?
Which type of application can intercept sensitive information such as passwords on a network segment?
Malware that disguises itself as legitimate software is called:
Which provides confidentiality by hiding or obscuring a message so it cannot be understood by unauthorized parties?
In which cloud model does the customer have theleast responsibilityover infrastructure?
Selvaa presents a user ID and password to log on. Which characteristic must the user ID have?
What federal law requires the use of vulnerability scanning on information systems operated by federal government agencies?
What is the main purpose of using multi-factor authentication (MFA) in a security system?
Which document serves as specifications for implementing policy and dictates mandatory requirements?
What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?
What is the first step in incident response planning?
Which can be considered a fingerprint of a file or message?
Dylan is creating a cloud architecture that requires connections between systems in two different private VPCs. What is the BEST way to enable this access?
An employee unintentionally shares confidential information with an unauthorized party. What term best describes this?
The magnitude of harm expected from unauthorized disclosure, modification, destruction, or loss of information is known as:
Which is NOT a function of an Intrusion Prevention System (IPS)?
IDS can be described in terms of what fundamental functional components?
Which phase of the access control process (AAA) does a user prove his/her identity?
Natalia is concerned that users on her network may be storing sensitive information, such as Social Security numbers, on their hard drives without proper authorization or security controls. What third-party security service can she implement to best detect this activity?
What are registered ports primarily used for?
Which TLS extension is used to optimize the TLS handshake process by reducing the number of round trips between the client and server?
In DAC, a subject granted access can:
Networks that are heavily microsegmented with firewalls at connection points are characteristic of:
An analysis of system requirements and interdependencies used to prioritize recovery is known as:
What is the primary goal of Identity and Access Management (IAM) in cybersecurity?
Which ensures maintaining business operations during or after an incident?
A set of rules that everyone must comply with and that usually carry monetary penalties for noncompliance are:
Why is an asset inventory so important?
A centralized organizational function that monitors, detects, and analyzes security events to prevent disruptions is called:
Which attack most effectively maintains remote access and control over a victim’s computer?
Which aspect of cybersecurity is MOST impacted by Distributed Denial of Service (DDoS) attacks?
Which type of risk involves unauthorized use or disclosure of confidential information such as passwords, financial data, or personal information?
When operating in a cloud environment, which cloud deployment model provides security teams with the greatest access to forensic information?
Example of a deterrent control:
Which of the following is NOT a feature of a cryptographic hash function?
What is the purpose of the CIA triad?
Embedded systems and network-enabled devices that communicate with the Internet are:
What should be done to limit damage caused by a ransomware attack?
Which is the loopback address?
The order of controls used in defense in depth:
What is the primary goal of input validation?
A backup is which type of security control?