1
WELL DETAILED ANSWERS|LATEST
PASS A new employee is granted access to all company resources without any restrictions. What security principle is being violated? - ANSWER C) Principle of least privilege
RATIONALE: Granting unrestricted access violates the principle of least privilege, which states users should only have access necessary for their roles
You discover that a key system in your organization is running outdated software. What is the most immediate risk associated with this situation? - ANSWER C) Vulnerability to known exploits
RATIONALE: Running outdated software poses a significant risk due to known vulnerabilities that attackers can exploit
During a risk assessment, you identify a critical vulnerability in a widely used application.What should be your first course of action? - ANSWER C) Implement a mitigation strategy immediately
RATIONALE: The first course of action should be to implement a mitigation strategy to address the critical vulnerability and protect the organization.
Which of the following best describes a "zero trust" architecture? - ANSWER B) Never trusting any user or device by default
- / 1