PDF Download
FREE AND STUDY GAMES ABOUT SET1 TEST3 EXAM
QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -90 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: Which of the following best describes a governance model where
decision-making authority is restricted to a few individuals at the top of the organizational hierarchy?
Answer:
Centralized Governance Question 2: An organization has recently decided to utilize multiple operating systems and applications on a single physical server to optimize resource usage and reduce costs. Which of the following BEST represents this approach?
Answer:
Virtualization Question 3: State banking regulations require that all communications be secure even when traveling across unsecured networks. Which of the following will provide the Best solution to the challenge faced by Log Cabin Bank.
Answer:
VPN
Question 4: Which of the following terms is used to describe a situation where a security system or tool incorrectly flags an action or event as malicious or harmful, even though it's actually benign?
Answer:
False Positive Question 5: Which of the following refers to a vulnerability in software that is unknown to the vendor and often exploited by malicious actors before a patch is released?
Answer:
zero day Question 6: Which of the following statements BEST explains the importance of the workforce multiplier?
Answer:
Workforce multiplier enables organizations to rapidly scale their security capabilities using a combination of human and automated resources
Question 7: Which of the following tools is MOST known for agentless security
monitoring/alerting?
Answer:
Security information and event management Question 8: What is the primary responsibility of a data custodian in the realm of data governance?
Answer:
enforces security controls for the safe transport and storage of data Question 9: They have always converted passwords to fixed length sequences, but now they will do this process more than once to increase the amount of computing power and time it will take for an attacker to decode the password. What is this method known as?
Answer:
Key Stretching is repeatedly hashing Question 10: When aiming to limit access between different parts of a network to reduce the potential impact of compromised systems, which activity is MOST directly applied?
Answer:
Network segmentation
Question 11: Which of the following terms BEST describes the measurement used to describe a 7% possibility of hardware failure in the next year based on past statistical data?
Answer:
Possibility Question 12: Which of the following cryptographic techniques uses the same key for both encryption and decryption processes, making it essential that the key remains secret and is shared securely among the involved parties?
Answer:
AES Question 13: Which of the following network designs involves using air-gapping, disconnecting cables, or locking devices to prevent unauthorized access or interference?
Answer:
Physical Isolation Question 14: Given that cloud architecture provides dynamic resource allocation, which of the following security considerations is MOST critical when dealing with the compute component?
Answer:
Ensuring isolation between the instances Question 15: Which of the following provides short-term emergency power to a device when the input power source fails, allowing for either proper system shutdown or switching to a long-term power source?
Answer:
UPS Question 16: Which of the following statements is NOT true about the importance of continuous integration in relation to secure operations?
Answer:
Continous Integration may slow down the dev process but it provide sfar more secure systems overall Question 17: Which of the following is a type of security incident that involves unauthorized disclosure of sensitive data due to INSECURE SETTINGS IN SYSTEMS?
Answer:
Misconfiguration is a type of human error that involves setting up SYSTEMS or services with incorrect or
INSECURE SETTINGS
Question 18: To prevent employees from accidentally accessing such media in the future, which of the following solutions would be MOST effective?
Answer:
Implementing Content Categorization Question 19: Nicola, an IT manager, is considering an encryption method that uses public and private keys for encryption and decryption. What type of encryption is being considered?
Answer:
Asymmetric encryption Question 20: Kevin found that the script had been modified to contain a dormant code segment set to activate at a specific date and time. Which type of malware has MOST likely infected Kevin's scripts?
Answer:
Logic Bomb Question 21: They need a document that provides detailed instructions and requirements for the software development project that will include features the software should have, when the work must finished, and other essential details.
Answer:
SOW - statement of work or Work order Question 22: Dion Training is planning to expand its online services, including launching multiple subdomains for different courses. They want a single certificate that can secure all these subdomains. Which type of certificate should Dion Training consider?
Answer:
Wildcard Question 23: Before implementing a change in the organization's critical infrastructure, it's essential to ensure the proposed modification is assessed, reviewed, and authorized. Which process ensures that these steps are followed?
Answer:
Approval Process