An organization is trying to secure instant messaging (IM) communications through its network perimeter. Which of the following is the MOST significant challenge?
#121
Answer: C✅ Correct❌ Incorrect
Using the cipher text and resultant cleartext message to derive the monoalphabetic cipher key is an example of which method of cryptanalytic attack?
#122
Answer: A✅ Correct❌ Incorrect
Which Wide Area Network (WAN) technology requires the first router in the path to determine the full path the packet will travel, removing the need for other routers in the path to make independent determinations?
#123
Answer: B✅ Correct❌ Incorrect
When developing an organization's information security budget, it is important that the:
#124
Answer: B✅ Correct❌ Incorrect
A subscription service which provides power, climate control, raised flooring, and telephone wiring but NOT the computer and peripheral equipment is BEST described as a:
#125
Answer: A✅ Correct❌ Incorrect
A company is enrolled in a hard drive reuse program where decommissioned equipment is sold back to the vendor when it is no longer needed. The vendor pays more money for functioning drives than equipment that is no longer operational. Which method of data sanitization would provide the most secure means of preventing unauthorized data loss, while also receiving the most money from the vendor?
#126
Answer: C✅ Correct❌ Incorrect
You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries.
But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.
#127
Answer: BCD✅ Correct❌ Incorrect
Assuming an individual has taken all of the steps to keep their internet connection private, which of the following is the BEST to browse the web privately?
#128
Answer: C✅ Correct❌ Incorrect
A software engineer uses automated tools to review application code and search for application flaws, back doors, or other malicious code. Which of the following is the FIRST Software Development Life Cycle (SDLC) phase where this takes place?
#129
Answer: B✅ Correct❌ Incorrect
A company developed a web application which is sold as a Software as a Service (SaaS) solution to the customer. The application is hosted by a web server running on a specific operating system (OS) on a virtual machine (VM). During the transition phase of the service, it is determined that the support team will need access to the application logs. Which of the following privileges would be the MOST suitable?
#130
Answer: B✅ Correct❌ Incorrect
A security practitioner detects an Endpoint attack on the organization's network. What is the MOST reasonable approach to mitigate future Endpoint attacks?
#131
Answer: B✅ Correct❌ Incorrect
Which of the following plans is a comprehensive statement of consistent actions to be taken before, during, and after a disruptive event that causes a significant loss of information systems resources?
#132
Answer: A✅ Correct❌ Incorrect
Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.
#133
Answer: ABD✅ Correct❌ Incorrect
Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply.
#134
Answer: ACD✅ Correct❌ Incorrect
Which of the following authentication protocols sends a user certificate inside an encrypted tunnel?
#135
Answer: B✅ Correct❌ Incorrect
The quality assurance (QA) department is short-staffed and is unable to test all modules before the anticipated release date of an application. What security control is MOST likely to be violated?
#136
Answer: A✅ Correct❌ Incorrect
Which of the following criteria ensures information is protected relative to its importance to the organization?
#137
Answer: A✅ Correct❌ Incorrect
What is the FIRST step when developing an Information Security Continuous Monitoring (ISCM) program?
#138
Answer: C✅ Correct❌ Incorrect
Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?
#139
Answer: A✅ Correct❌ Incorrect
An organization has requested storage area network (SAN) disks for a new project. What Redundant Array of Independent Disks (RAID) level provides the BEST redundancy and fault tolerance?
#140
Answer: D✅ Correct❌ Incorrect
What documentation is produced FIRST when performing an effective physical loss control process?
#141
Answer: D✅ Correct❌ Incorrect
Which organizational department is ultimately responsible for information governance related to e-mail and other e-records?
#142
Answer: A✅ Correct❌ Incorrect
A cloud service provider requires its customer organizations to enable maximum audit logging for its data storage service and to retain the logs for the period of three months. The audit logging gene has extremely high amount of logs. What is the MOST appropriate strategy for the log retention?
#143
Answer: C✅ Correct❌ Incorrect
In Federated Identity Management (FIM), which of the following represents the concept of federation?
#144
Answer: D✅ Correct❌ Incorrect
Which of the following is an indicator that a company's new user security awareness training module has been effective?
#145
Answer: B✅ Correct❌ Incorrect
In which of the following cryptographic attacking techniques does the attacker pick up the information to be encrypted and take a copy of it with the encrypted data?
#146
Answer: C✅ Correct❌ Incorrect
Which of the following are the goals of a public key infrastructure (PKI)? Each correct answer represents a part of the solution. Choose all that apply.
#147
Answer: ADE✅ Correct❌ Incorrect
Which of the following encryption modes has the property to allow many error correcting codes to function normally even when applied before encryption?
#148
Answer: B✅ Correct❌ Incorrect
In which of the following phases of the SDLC does the software and other components of the system faithfully incorporate the design specifications and provide proper documentation and training?
#149
Answer: B✅ Correct❌ Incorrect
You are the administrator for YupNo.com. You want to increase and enhance the security of your computers and simplify deployment. You are especially concerned with any portable computers that are used by remote employees. What can you use to increase security, while still allowing your users to perform critical tasks?