Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?
#151
Answer: C✅ Correct❌ Incorrect
Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution.
Choose three.
#152
Answer: ACD✅ Correct❌ Incorrect
Which of the following contract types is described in the statement below? "This contract type provides no incentive for the contractor to control costs and hence is rarely utilized."
#153
Answer: B✅ Correct❌ Incorrect
Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?
#154
Answer: D✅ Correct❌ Incorrect
What is a stakeholder analysis chart?
#155
Answer: A✅ Correct❌ Incorrect
Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?
#156
Answer: A✅ Correct❌ Incorrect
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
#157
Answer: D✅ Correct❌ Incorrect
In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?
#158
Answer: C✅ Correct❌ Incorrect
Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?
#159
Answer: C✅ Correct❌ Incorrect
Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?
#160
Answer: C✅ Correct❌ Incorrect
Which of the following roles is responsible for ensuring that important datasets are developed, maintained, and are accessible within their defined specifications?
#161
Answer: A✅ Correct❌ Incorrect
What is static analysis intended to do when analyzing an executable file?
#162
Answer: D✅ Correct❌ Incorrect
A network security engineer needs to ensure that a security solution analyzes traffic for protocol manipulation and various sorts of common attacks. In addition, all
Uniform Resource Locator (URL) traffic must be inspected and users prevented from browsing inappropriate websites. Which of the following solutions should be implemented to enable administrators the capability to analyze traffic, blacklist external sites, and log user traffic for later analysis?
#163
Answer: A✅ Correct❌ Incorrect
What is the PRIMARY consideration when testing industrial control systems (ICS) for security weaknesses?
#164
Answer: C✅ Correct❌ Incorrect
The security team plans on using automated account reconciliation in the corporate user access review process. Which of the following must be implemented for the BEST results with fewest errors when running the audit?
#165
Answer: D✅ Correct❌ Incorrect
A cloud service accepts Security Assertion Markup Language (SAML) assertions from users to exchange authentication and authorization data between security domains. However, an attacker was able to spoof a registered account on the network and query the SAML provider. What is the MOST common attack leveraged against this flaw?
#166
Answer: B✅ Correct❌ Incorrect
An organization is implementing security review as part of system development. Which of the following is the BEST technique to follow?
#167
Answer: A✅ Correct❌ Incorrect
What Hypertext Transfer Protocol (HTTP) response header can be used to disable the execution of inline JavaScript and the execution of eval()-type functions?
#168
Answer: B✅ Correct❌ Incorrect
A security professional was tasked with rebuilding a company's wireless infrastructure. Which of the following are the MOST important factors to consider while making a decision on which wireless spectrum to deploy?
#169
Answer: B✅ Correct❌ Incorrect
A software development company has a short timeline in which to deliver a software product. The software development team decides to use open-source software libraries to reduce the development time. What concept should software developers consider when using open-source software libraries?
#170
Answer: A✅ Correct❌ Incorrect
Which element of software supply chain management has the GREATEST security risk to organizations?
#171
Answer: A✅ Correct❌ Incorrect
When reviewing vendor certifications for handling and processing of company data, which of the following is the BEST Service Organization Controls (SOC) certification for the vendor to possess?
#172
Answer: C✅ Correct❌ Incorrect
Which of the following should be done at a disaster site before any item is removed, repaired, or replaced?
#173
Answer: C✅ Correct❌ Incorrect
When designing a new Voice over Internet Protocol (VoIP) network, an organization's top concern is preventing unauthorized users accessing the VoIP network.
Which of the following will BEST help secure the VoIP network?
#174
Answer: D✅ Correct❌ Incorrect
A user's credential for an application is stored in a relational database. Which control protects the confidentiality of the credential while it is stored?
#175
Answer: A✅ Correct❌ Incorrect
What are the essential elements of a Risk Assessment Report (RAR)?
#176
Answer: A✅ Correct❌ Incorrect
The security operations center (SOC) has received credible intelligence that a threat actor is planning to attack with multiple variants of a destructive virus. After obtaining a sample set of this virus' variants and reverse engineering them to understand how they work, a commonality was found. All variants are coded to write to a specific memory location. It is determined this virus is of no threat to the organization because they had the foresight to enable what feature on all endpoints?
#177
Answer: A✅ Correct❌ Incorrect
The Chief Information Security Officer (CISO) is to establish a single, centralized, and relational repository to hold all information regarding the software and hardware assets. Which of the following s ions would be the BEST option?
#178
Answer: B✅ Correct❌ Incorrect
What type of investigation applies when malicious behavior is suspected between two organizations?
#179
Answer: C✅ Correct❌ Incorrect
Which of the following techniques evaluates the secure design principles of network or software architectures?