) Cybersecurity Architecture and
Engineering | 1,100 Questions with Verified
Answers | Grade A | 100% Correct.
Question:
An IT organization recently suffered a data leak incident. Management has
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
asked the security team to implement a print blocking mechanism for all
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
documents stored on a corporate file share. i,- i,- i,- i,- i,- i,- i,-
i,-
Which solution fulfills these requirements?
i,- i,- i,- i,-
A) Virtual desktop infrastructure (VDI)
i,- i,- i,- i,-
B) Remote Desktop Protocol (RDP)
i,- i,- i,- i,-
C) Digital rights management (DRM)
i,- i,- i,- i,-
D) Watermarking?
i,-
Answer:
C) Digital rights management (DRM)
i,- i,- i,- i,-
Question:
A company has recently discovered that a competitor is distributing
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
copyrighted videos produced by the in-house marketing team.
i,- i,- i,- i,- i,- i,- i,- i,-
,Management has asked the security team to prevent these types of
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
violations in the future. i,- i,- i,- i,-
i,-
Which solution fulfills these requirements?
i,- i,- i,- i,-
A) Virtual desktop infrastructure (VDI)
i,- i,- i,- i,-
B) Secure Socket Shell (SSH)
i,- i,- i,- i,-
C) Digital rights management (DRM)
i,- i,- i,- i,-
D) Remote Desktop Protocol (RDP)?
i,- i,- i,- i,-
Answer:
C) Digital rights management (DRM)
i,- i,- i,- i,-
Question:
A security team has been tasked with performing regular vulnerability
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
scans for a cloud-based infrastructure.
i,- i,- i,- i,- i,-
i,-
How should these vulnerability scans be conducted when implementing
i,- i,- i,- i,- i,- i,- i,- i,- i,-
zero trust security?
i,- i,-
A) Manually
i,-
B) Annually
i,-
C) Automatically
i,-
D) As needed?
i,- i,-
Answer:
,C) Automatically
i,-
Question:
A healthcare company needs to ensure that medical researchers cannot
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
inadvertently share protected health information (PHI) data from medical
i,- i,- i,- i,- i,- i,- i,- i,- i,-
records. i,-
i,-
What is the best solution?
i,- i,- i,- i,-
A) Encryption
i,-
B) Metadata
i,-
C) Anonymization
i,-
D) Obfuscation?
i,-
Answer:
C) Anonymization
i,-
Question:
A security team has been tasked with mitigating the risk of stolen
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
credentials after a recent breach. The solution must isolate the use of
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
privileged accounts. In the future, administrators must request access to
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
mission-critical services before they can perform their tasks.
i,- i,- i,- i,- i,- i,- i,- i,-
i,-
What is the best solution?
i,- i,- i,- i,-
, A) Identity and access management (IAM)
i,- i,- i,- i,- i,-
B) Password policies
i,- i,-
C) Privileged access management (PAM)
i,- i,- i,- i,-
D) Password complexity?
i,- i,-
Answer:
C) Privileged access management (PAM)
i,- i,- i,- i,-
Question:
A global manufacturing company is moving its applications to the cloud.
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
The security team has been tasked with hardening the access controls for
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
a corporate web application that was recently migrated. End users should
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
be granted access to different features based on their locations and
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
departments. i,-
i,-
Which access control solution should be implemented?
i,- i,- i,- i,- i,- i,-
A) Kerberos i,-
B) Mandatory access control (MAC)
i,- i,- i,- i,-
C) Attribute-based access control (ABAC)
i,- i,- i,- i,-
D) Privileged access management (PAM)?
i,- i,- i,- i,-
Answer:
C) Attribute-based access control (ABAC)
i,- i,- i,- i,-