You are the project manager of the GHE Project. You have identified the following risks with the characteristics as shown in the following figure:
How much capital should the project set aside for the risk contingency reserve?
#181
Answer: D✅ Correct❌ Incorrect
Which of the following statements about system hardening are true? Each correct answer represents a complete solution. Choose two.
#182
Answer: AD✅ Correct❌ Incorrect
Which of the following processes is described in the statement below? "It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."
#183
Answer: A✅ Correct❌ Incorrect
Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?
#184
Answer: B✅ Correct❌ Incorrect
You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?
#185
Answer: D✅ Correct❌ Incorrect
You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. What is this called?
#186
Answer: D✅ Correct❌ Incorrect
Which of the following is the process performed between organizations that have unique hardware or software that cannot be maintained at a hot or warm site?
#187
Answer: D✅ Correct❌ Incorrect
What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?
#188
Answer: D✅ Correct❌ Incorrect
You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?
#189
Answer: B✅ Correct❌ Incorrect
Compared to a traditional network, which of the following is a security-related benefit that software-defined networking (SDN) provides?
#190
Answer: C✅ Correct❌ Incorrect
What is the MOST effective response to a hacker who has already gained access to a network and will attempt to pivot to other resources?
#191
Answer: C✅ Correct❌ Incorrect
Which of the following is a common term for log reviews, synthetic transactions, and code reviews?
#192
Answer: C✅ Correct❌ Incorrect
A database server for a financial application is scheduled for production deployment. Which of the following controls will BEST prevent tampering?
#193
Answer: B✅ Correct❌ Incorrect
The Industrial Control System (ICS) Computer Emergency Response Team (CERT) has released an alert regarding ICS-focused malware specifically propagating through Windows-based business networks. Technicians at a local water utility note that their dams, canals, and locks controlled by an internal Supervisory
Control and Data Acquisition (SCADA) system have been malfunctioning. A digital forensics professional is consulted in the Incident Response (IR) and recovery.
Which of the following is the MOST challenging aspect of this investigation?
#194
Answer: D✅ Correct❌ Incorrect
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
#195
Answer: A✅ Correct❌ Incorrect
You are the Security Consultant advising a company on security methods. This is a highly secure location that deals with sensitive national defense related data.
They are very concerned about physical security as they had a breach last month. In that breach an individual had simply grabbed a laptop and ran out of the building. Which one of the following would have been most effective in preventing this?
#196
Answer: C✅ Correct❌ Incorrect
You want to implement a network topology that provides the best balance for regional topologies in terms of the number of virtual circuits, redundancy, and performance while establishing a WAN network. Which of the following network topologies will you use to accomplish the task?
#197
Answer: D✅ Correct❌ Incorrect
Which of the following protocols is an alternative to certificate revocation lists (CRL) and allows the authenticity of a certificate to be immediately verified?
#198
Answer: C✅ Correct❌ Incorrect
Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each correct answer represents a complete solution. Choose two.
#199
Answer: AB✅ Correct❌ Incorrect
James works as a security manager for SoftTech Inc. He has been working on the continuous process improvement and on the ordinal scale for measuring the maturity of the organization involved in the software processes. According to James, which of the following maturity levels of software CMM focuses on the continuous process improvement?
#200
Answer: D✅ Correct❌ Incorrect
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?
#201
Answer: A✅ Correct❌ Incorrect
Mark works as a security manager for SoftTech Inc. He is involved in the BIA phase to create a document to be used to help understand what impact a disruptive event would have on the business. The impact might be financial or operational. Which of the following are the objectives related to the above phase in which
Mark is involved? Each correct answer represents a part of the solution. Choose three.
#202
Answer: ABC✅ Correct❌ Incorrect
Which of the following ports is the default port for Layer 2 Tunneling Protocol (L2TP) ?
#203
Answer: D✅ Correct❌ Incorrect
Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?
#204
Answer: D✅ Correct❌ Incorrect
Which of the following frameworks provides vulnerability metrics and characteristics to support the National Vulnerability Database (NVD)?
#205
Answer: C✅ Correct❌ Incorrect
A security architect is reviewing plans for an application with a Recovery Point Objective (RPO) of 15 minutes. The current design has all of the application infrastructure located within one co-location data center. Which security principle is the architect currently assessing?
#206
Answer: B✅ Correct❌ Incorrect
Which factors MUST be considered when classifying information and supporting assets for risk management, legal discovery, and compliance?
#207
Answer: C✅ Correct❌ Incorrect
The Chief Information Security Officer (CISO) of a small organization is making a case for building a security operations center (SOC). While debating between an in-house, fully outsourced, or a hybrid capability, which of the following would be the MAIN consideration, regardless of the model?
#208
Answer: B✅ Correct❌ Incorrect
An organization would like to ensure that all new users have a predefined departmental access template applied upon creation. The organization would also like additional access for users to be granted on a per-project basis. What type of user access administration is BEST suited to meet the organization's needs?
#209
Answer: B✅ Correct❌ Incorrect
Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?