In which of the following processes are experienced personnel and software tools used to investigate, resolve, and handle process deviation, malformed data, infrastructure, or connectivity issues?
#1
Answer: B✅ Correct❌ Incorrect
Which of the following rated systems of the Orange book has mandatory protection of the TCB?
#2
Answer: D✅ Correct❌ Incorrect
Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?
#3
Answer: C✅ Correct❌ Incorrect
Which of the following ensures that a party to a dispute cannot deny the authenticity of their signature on a document or the sending of a message that they originated?
#4
Answer: D✅ Correct❌ Incorrect
Which of the following are examples of the application programming interface (API)? Each correct answer represents a complete solution. Choose three.
#5
Answer: BCD✅ Correct❌ Incorrect
A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?
#6
Answer: C✅ Correct❌ Incorrect
There are seven risks responses that a project manager can choose from. Which risk response is appropriate for both positive and negative risk events?
#7
Answer: A✅ Correct❌ Incorrect
You work as a Security Manager for Tech Perfect Inc. In the organization, Syslog is used for computer system management and security auditing, as well as for generalized informational, analysis, and debugging messages. You want to prevent a denial of service (DoS) for the Syslog server and the loss of Syslog messages from other sources. What will you do to accomplish the task?
#8
Answer: C✅ Correct❌ Incorrect
You work as a project manager for a company. The company has started a new security software project. The software configuration management will be used throughout the lifecycle of the project. You are tasked to modify the functional features and the basic logic of the software and then make them compatible to the initial design of the project. Which of the following procedures of the configuration management will you follow to accomplish the task?
#9
Answer: B✅ Correct❌ Incorrect
Which of the following areas of information system, as separated by Information Assurance Framework, is a collection of local computing devices, regardless of physical location, that are interconnected via local area networks (LANs) and governed by a single security policy?
#10
Answer: D✅ Correct❌ Incorrect
In which of the following DIACAP phases is residual risk analyzed?
#11
Answer: D✅ Correct❌ Incorrect
Which of the following security controls will you use for the deployment phase of the SDLC to build secure software? Each correct answer represents a complete solution. Choose all that apply.
#12
Answer: AC✅ Correct❌ Incorrect
Which of the following provides an easy way to programmers for writing lower-risk applications and retrofitting security into an existing application?
#13
Answer: D✅ Correct❌ Incorrect
Which of the following is a malicious exploit of a website, whereby unauthorized commands are transmitted from a user trusted by the website?
#14
Answer: D✅ Correct❌ Incorrect
An attacker exploits actual code of an application and uses a security hole to carry out an attack before the application vendor knows about the vulnerability.
Which of the following types of attack is this?
#15
Answer: B✅ Correct❌ Incorrect
Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?
#16
Answer: D✅ Correct❌ Incorrect
Which of the following types of redundancy prevents attacks in which an attacker can get physical control of a machine, insert unauthorized software, and alter data?
#17
Answer: C✅ Correct❌ Incorrect
Which of the following individuals inspects whether the security policies, standards, guidelines, and procedures are efficiently performed in accordance with the company's stated security objectives?
#18
Answer: D✅ Correct❌ Incorrect
Which of the following process areas does the SSE-CMM define in the 'Project and Organizational Practices' category? Each correct answer represents a complete solution. Choose all that apply.
#19
Answer: ACD✅ Correct❌ Incorrect
The LeGrand Vulnerability-Oriented Risk Management method is based on vulnerability analysis and consists of four principle steps. Which of the following processes does the risk assessment step include? Each correct answer represents a part of the solution. Choose all that apply.
#20
Answer: BCD✅ Correct❌ Incorrect
You work as a Security Manager for Tech Perfect Inc. You have set up a SIEM server for the following purposes:
- Analyze the data from different log sources
- Correlate the events among the log entries
- Identify and prioritize significant events
- Initiate responses to events if required
One of your log monitoring staff wants to know the features of SIEM product that will help them in these purposes. What features will you recommend? Each correct answer represents a complete solution.
Choose all that apply.
#21
Answer: ACDE✅ Correct❌ Incorrect
The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment? Each correct answer represents a part of the solution. Choose all that apply.
#22
Answer: ABCE✅ Correct❌ Incorrect
According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD? Each correct answer represents a complete solution. Choose all that apply.
#23
Answer: ACD✅ Correct❌ Incorrect
The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE? Each correct answer represents a complete solution. Choose all that apply.
#24
Answer: BCD✅ Correct❌ Incorrect
In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?
#25
Answer: D✅ Correct❌ Incorrect
Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?
#26
Answer: D✅ Correct❌ Incorrect
Which of the following types of signatures is used in an Intrusion Detection System to trigger on attacks that attempt to reduce the level of a resource or system, or to cause it to crash?
#27
Answer: C✅ Correct❌ Incorrect
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
#28
Answer: D✅ Correct❌ Incorrect
Which of the following actions does the Data Loss Prevention (DLP) technology take when an agent detects a policy violation for data of all states? Each correct answer represents a complete solution. Choose all that apply.
#29
Answer: AD✅ Correct❌ Incorrect
What are the various activities performed in the planning phase of the Software Assurance Acquisition process? Each correct answer represents a complete solution. Choose all that apply.