QUESTIONS AND ANSWERS RATED A+
✔✔A device found not to comply with the security baseline should be: - ✔✔Disabled or
isolated into a quarantine area until it can be checked and updated.
✔✔Which type of attack PRIMARILY aims to make a resource inaccessible to its
intended users? - ✔✔Denial of Service
✔✔Which type of attack embeds malicious payload inside a reputable or trusted
software? - ✔✔Trojans
✔✔Which tool is commonly used to sniff network traffic? - ✔✔Wireshark
✔✔Which of these is not an attack against an IP network? - ✔✔Side-channel Attack
✔✔The detailed steps to complete tasks supporting departmental or organizational
policies are typically documented in: - ✔✔Procedures
✔✔Which device is used to connect a LAN to the Internet? - ✔✔Router
✔✔What does SIEM mean? - ✔✔Security Information and Event Manager
✔✔A Security safeguard is the same as a: - ✔✔Security control
✔✔Which access control model can grant access to a given object based on complex
rules? - ✔✔ABAC
✔✔Which port is used to secure communication over the web (HTTPS)? - ✔✔443
✔✔Which of these has the PRIMARY objective of identifying and prioritizing critical
business processes? - ✔✔Business Impact Analysis
✔✔Which of the following are NOT types of security controls? - ✔✔Storage controls
✔✔Which of the following is NOT a type of learning activity used in Security
Awareness? - ✔✔Tutorial
✔✔The magnitude of the harm expected as a result of the consequences of an
unauthorized disclosure, modification, destruction, or loss of information, is known as
the: - ✔✔Impact
✔✔The implementation of Security Controls is a form of: - ✔✔Risk reduction
, ✔✔Which of the following attacks take advantage of poor input validation in websites? -
✔✔Cross-Site Scripting
✔✔Which of the following is an example of an administrative security control? -
✔✔Acceptable Use Policies
✔✔In Change Management, which component addresses the procedure needed to
undo changes? - ✔✔Rollback
✔✔Which of the following properties is NOT guaranteed by Digital Signatures? -
✔✔Confidentiality
✔✔Which devices have the PRIMARY objective of collecting and analyzing security
events? - ✔✔SIEM
✔✔What is an effective way of hardening a system? - ✔✔Patch the system
✔✔Which type of key can be used to both encrypt and decrypt the same message? -
✔✔A symmetric key
✔✔Which regulations address data protection and privacy in Europe? - ✔✔GDPR
✔✔Which of the following types of devices inspect packet header information to either
allow or deny network traffic? - ✔✔Firewalls
✔✔A web server that accepts requests from external clients should be placed in which
network? - ✔✔DMZ
✔✔How many data labels are considered good practice? - ✔✔2-3
✔✔Security posters are an element PRIMARILY employed in: - ✔✔Security Awareness
✔✔Which of these types of user is LESS likely to have a privileged account? -
✔✔External Worker
✔✔The predetermined set of instructions or procedures to sustain business operations
after a disaster is commonly known as: - ✔✔Business Continuity Plan
✔✔Which of the following is NOT an element of System Security Configuration
Management? - ✔✔Audit logs