Cybersecurity Architecture & Engineering Pre-
Assessment | Questions with Verified Answers|
100% Correct| Graded A.
Question:
The security team recently enabled public access to a web application
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
hosted on a server inside the corporate network. The developers of the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
application report that the server has received several structured query
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
language (SQL) injection attacks in the past several days. The team needs
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
to deploy a solution that will block the SQL injection attacks.?
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
Answer:
Web application firewall (WAF)
i,- i,- i,-
Question:
An IT security team has been notified that external contractors are using
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
their personal laptops to gain access to the corporate network. The team
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
needs to recommend a solution that will prevent unapproved devices
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
from accessing the network.?
i,- i,- i,-
Answer:
Implementing port security i,- i,-
,Question:
The chief technology officer for a small publishing company has been
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
tasked with improving the company's security posture. As part of a
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
network upgrade, the company has decided to implement intrusion
i,- i,- i,- i,- i,- i,- i,- i,- i,-
detection, spam filtering, content filtering, and antivirus controls. The
i,- i,- i,- i,- i,- i,- i,- i,- i,-
project needs to be completed using the least amount of infrastructure
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
while meeting all requirements.?
i,- i,- i,-
Answer:
Deploying a unified threat management (UTM) appliance
i,- i,- i,- i,- i,- i,-
Question:
The security team plans to deploy an intrusion detection system (IDS)
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
solution to alert engineers about inbound threats. The team already has a
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
database of signatures that they want the IDS solution to validate.?
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
Answer:
Signature-based detection i,-
Question:
An IT organization had a security breach after deploying an update to its
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
production web servers. The application currently goes through a manual
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
update process a few times per year. The security team needs to
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
recommend a failback option for future deployments.? i,- i,- i,- i,- i,- i,-
Answer:
, Implementing versioning i,-
Question:
A software development team is working on a new mobile application
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
that will be used by customers. The security team must ensure that builds
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
of the application will be trusted by a variety of mobile devices.?
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
Answer:
Code signing i,-
Question:
An IT organization recently suffered a data leak incident. Management has
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
asked the security team to implement a print blocking mechanism for all
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
documents stored on a corporate file share.? i,- i,- i,- i,- i,- i,-
Answer:
Digital rights management (DRM)
i,- i,- i,-
Question:
A company has recently discovered that a competitor is distributing
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
copyrighted videos produced by the in-house marketing team.
i,- i,- i,- i,- i,- i,- i,- i,-
Management has asked the security team to prevent these types of
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
violations in the future.? i,- i,- i,-
Answer: