Comptia Certmaster Ce Security+ Domain 1.0
General Security Concepts Assessment
Question with 100% Correct Answers
The IT department of a corporation evaluates its security mechanisms to identify areas lacking
sufficient protection. Which of the following techniques should the IT department employ? -
✔️✔️D. Gap analysis
An organization frequently implements changes, reconfigurations, and patches to enhance its IT
infrastructure's security and efficiency. The cybersecurity analyst must carefully analyze
dependencies between services, applications, and interfaces to avoid unintended outages and
disruptions during service restarts or downtime events. How does understanding dependencies
impact the change management process? (Select the three best options.) - ✔️✔️A. Knowing
dependencies helps avoid unintended outages and disruptions during service restarts or
downtime events.
B. Understanding dependencies guides the development of effective backout plans and
downtime contingencies.
C. Understanding dependencies supports the development of post-change performance
monitoring to validate system functionality and quickly detect issues.
After encountering a cyber attack, an organization uses a monitoring solution that
automatically restarts services after it has detected the system has crashed. What type of
functional security control is the company implementing? - ✔️✔️(C. Technical incorrect)
A cyber security analyst wants to reduce the attack surface for a computer that contains top
secret data. The analyst installs a cryptoprocessor as a module within the central processing
unit (CPU) on the designated computer to accomplish this. What type of cryptoprocessor is the
analyst installing? - ✔️✔️C. Trusted Platform Module (TPM)
Prior to implementing new software integrations on the organization's network, a software
specialist evaluates the selected modifications in an environment to ensure the software works
, correctly and does not cause issues. What concept does the specialist observe with a desire to
ensure everything works before implementation? - ✔️✔️(A. Impact analysis incorrect)
An organization has an established change management program that includes standard
operating procedures (SOPs). It wants to implement changes consistently and effectively. What
role do SOPs play in the change management process? - ✔️✔️B. They define routine operations
or changes, providing detailed instructions to implement them.
After receiving the annual audit results from the Inspector General's office, a cyber specialist
begins identifying points of contact to implement change management on numerous flagged
processes. Understanding the various positions tied to change management, which roles would
have ownership in the change management process? (Select the two best options.) - ✔️✔️A.
Project manager
C. Team leader
A systems owner reviews permissions granted to a targeted team of employees and determines
that some of the employees' accesses are outside their scope of work. After revoking the
certificates, what log does the owner use to record the changes? - ✔️✔️B. Certificate Revocation
Lists (CRL)
A company installed a new locking cabinet in the computer room to hold extra flash drives and
other supplies. Which type of security control did the company configure? - ✔️✔️A. Preventive
A senior analyst is purchasing new cybersecurity tools that enhance the ability to detect and
defend against various types of attacks. What decoy system can support detection efforts by
mimicking specific applications and gathering information on the attacker's tactics and tools? -
✔️✔️C. Honeypot
A security specialist updates the organization's change management program after
implementing software patching and system updates for the new quarter. In considering the
various change management concepts, what is the process of identifying and assessing the
potential implications of a proposed change? - ✔️✔️C. Impact analysis
General Security Concepts Assessment
Question with 100% Correct Answers
The IT department of a corporation evaluates its security mechanisms to identify areas lacking
sufficient protection. Which of the following techniques should the IT department employ? -
✔️✔️D. Gap analysis
An organization frequently implements changes, reconfigurations, and patches to enhance its IT
infrastructure's security and efficiency. The cybersecurity analyst must carefully analyze
dependencies between services, applications, and interfaces to avoid unintended outages and
disruptions during service restarts or downtime events. How does understanding dependencies
impact the change management process? (Select the three best options.) - ✔️✔️A. Knowing
dependencies helps avoid unintended outages and disruptions during service restarts or
downtime events.
B. Understanding dependencies guides the development of effective backout plans and
downtime contingencies.
C. Understanding dependencies supports the development of post-change performance
monitoring to validate system functionality and quickly detect issues.
After encountering a cyber attack, an organization uses a monitoring solution that
automatically restarts services after it has detected the system has crashed. What type of
functional security control is the company implementing? - ✔️✔️(C. Technical incorrect)
A cyber security analyst wants to reduce the attack surface for a computer that contains top
secret data. The analyst installs a cryptoprocessor as a module within the central processing
unit (CPU) on the designated computer to accomplish this. What type of cryptoprocessor is the
analyst installing? - ✔️✔️C. Trusted Platform Module (TPM)
Prior to implementing new software integrations on the organization's network, a software
specialist evaluates the selected modifications in an environment to ensure the software works
, correctly and does not cause issues. What concept does the specialist observe with a desire to
ensure everything works before implementation? - ✔️✔️(A. Impact analysis incorrect)
An organization has an established change management program that includes standard
operating procedures (SOPs). It wants to implement changes consistently and effectively. What
role do SOPs play in the change management process? - ✔️✔️B. They define routine operations
or changes, providing detailed instructions to implement them.
After receiving the annual audit results from the Inspector General's office, a cyber specialist
begins identifying points of contact to implement change management on numerous flagged
processes. Understanding the various positions tied to change management, which roles would
have ownership in the change management process? (Select the two best options.) - ✔️✔️A.
Project manager
C. Team leader
A systems owner reviews permissions granted to a targeted team of employees and determines
that some of the employees' accesses are outside their scope of work. After revoking the
certificates, what log does the owner use to record the changes? - ✔️✔️B. Certificate Revocation
Lists (CRL)
A company installed a new locking cabinet in the computer room to hold extra flash drives and
other supplies. Which type of security control did the company configure? - ✔️✔️A. Preventive
A senior analyst is purchasing new cybersecurity tools that enhance the ability to detect and
defend against various types of attacks. What decoy system can support detection efforts by
mimicking specific applications and gathering information on the attacker's tactics and tools? -
✔️✔️C. Honeypot
A security specialist updates the organization's change management program after
implementing software patching and system updates for the new quarter. In considering the
various change management concepts, what is the process of identifying and assessing the
potential implications of a proposed change? - ✔️✔️C. Impact analysis