SECURITY+ DOMAIN 5.0
1. A cybersecurity team is investigating a complex cyber threat landscape for a
large financial institution. The team is aware of some potential threats due to
previous encounters and security measures in place, but the evolving nature
of the landscape presents new threats and challenges. What type of cyber
environment is the team dealing with?
Answer D. Partially known environment
2. In a large organization, the IT department is working on enhancing informa-
tion security measures. They have identified the need for stronger guidelines
to ensure the protection of sensitive data and prevent unauthorized access.
As part of their efforts, they are specifically focusing on password policies.
The guidelines aim to establish rules for creating and managing passwords
effectively. The IT team wants to strike a balance between password complexity
and user convenience to promote secure practices. They intend to enforce reg-
1/
25
,ular password updates and implement measures to prevent password reuse
across multiple accounts. What is the IT department working on to ensure the
protection of sensitive data and prevent unauthorized access?
Answer D. Enhancing measures through stronger guidelines/password policies
A. Training employees on the basics of computer security (incorrect)
B. Developing a new IT infrastructure to support company-wide access (incorrect)
3. The IT department at a governmental agency ensures the organization's in-
formation security. When a new employee joins or leaves the organization, the
department sets up and terminates the user accounts, grants and revokes ap-
propriate access permissions, and provides and collects necessary resources.
These procedures are critical for maintaining the security and integrity of the
organization's data and systems. What is one of the critical responsibilities of
the IT department related to information security in this agency?
Answer B. Managing employee onboarding and ottboarding procedures
4. An organization has recently implemented new security standards as part
2/
25
, of its strategy to enhance its information systems security. The security team
monitors the implementation of these standards and revises them as neces-
sary. Considering the given scenario, what is the primary purpose of the se-
3/
25