Its About Company Quiz

236 Questions | Total Attempts: 192

SettingsSettingsSettings
Please wait...
Its About Company Quiz

.


Questions and Answers
  • 1. 
    Due to compliance regulations, a company requires a yearly penetration test. The Chief Information Security Officer (CISO) has asked that it be done under a black box methodology.Which of the following would be the advantage of conducting this kind of penetration test?
    • A. 

      The risk of unplanned seiver outages is reduced

    • B. 

      Using documentation provided to them, the pen-test organization can quickly determine areas to focus on.

    • C. 

      The results will show an in-depth view of the network and should help pin-point areas of internal weakness.

    • D. 

      The results should reflect what attackers may be able to learn about the company.

  • 2. 
    A company has received the contract to begin developing a new suite of software tools to replace an aging collaboration solution. The original collaboration solution hasbeen in place for nine years, contains over a million lines of code, and took over two years to develop originally. The SDLC has been broken up into eight primary stages,with each stage requiring an in-depth risk analysis before moving on to the next phase. Which of the following software development methods is MOST applicable?
    • A. 

      Spiral model

    • B. 

      Incremental model

    • C. 

      Waterfall model

    • D. 

      Agile model

  • 3. 
    An information security assessor for an organization finished an assessment that identified critical issues with the human resource new employee management softwareapplication. The assessor submitted the report to senior management but nothing has happened. Which of the following would be a logical next step?
    • A. 

      Meet the two key VPs and request a signature on the original assessment.

    • B. 

      Include specific case studies from other organizations in an updated report.

    • C. 

      Schedule a meeting with key human resource application stakeholders.

    • D. 

      Craft an RFP to begin finding a new human resource application.

  • 4. 
    The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromisecorporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of thefollowing equipment MUST be deployed to guard against unknown threats?
    • A. 

      Cloud-based ant ivirus solut ion, running as local admin. with push technology for definition updates.

    • B. 

      Implementation of an offsite data center hosting all company data, as well as deployment of VOi for all client computing needs.

    • C. 

      Host based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall ACLs.

    • D. 

      Behavior based IPS with a communication lank to a cloud based vulnerabthty and threat feed

  • 5. 
    ABC Corporation has introduced token-based authentication to system administrators due to the risk of password compromise. The tokens have a set of HMAC counterbasedcodes and are valid until they are used. Which of the following types of authentication mechanisms does this statement describe?
    • A. 

      TOTP

    • B. 

      PAP

    • C. 

      CHAP

    • D. 

      HOTP

  • 6. 
    A bank has decided to outsource some existing IT functions and systems to a third party service provider. The third party service provider will manage the outsourcedsystems on their own premises and will continue to directly interface with the bank's other systems through dedicated encrypted links. Which of the following is critical toensure the successful management of system security concerns between the two organizat ions?
    • A. 

      ISA

    • B. 

      BIA

    • C. 

      MOU

    • D. 

      SOA

    • E. 

      BPA

  • 7. 
    It has come to the IT administrator's attention that the "post your comment" field on the company blog page has been exploited, resulting in cross-site scripting attacksagainst customers reading the blog. Which of the following would be the MOST effective at. preventing the "post your comment" field from being exploited?
    • A. 

      Update the blog page to HTTPS

    • B. 

      Filter metacharacters

    • C. 

      Install HIDS on the server

    • D. 

      Patch the web application

    • E. 

      Perform client side input validation

  • 8. 
    A security administrator has noticed that an increased number of employees' workstations are becoming infected with malware. The company deploys an enterpriseantivirus system as well as a web content filter, which blocks access to malicious web sites where malware files can be downloaded. Additionally, the companyimplements technical measures to disable external storage. Which of the following is a technical control that the security administrator should implement next to reducemalware infection?
    • A. 

      Implement an Acceptable Use Policy which addresses malware downloads

    • B. 

      Deploy a network access control system with a persistent agent.

    • C. 

      Enforce mandatory security awareness training for all employees and contractors.

    • D. 

      Block cloud-based storage software on the company network

  • 9. 
    The administrator is troubleshooting availability issues on an FCoE-based storage array that uses deduplication. The single controller in the storage array has failed, so theadministrator wants to move the drives to a storage array from a different manufacturer in order to access the data. Which of the following issues may potentially occur?
    • A. 

      The data may not be in a usable format.

    • B. 

      The new storage array is not FCoE based.

    • C. 

      The data may need a file system check.

    • D. 

      The new storage array also only has a single controller.

  • 10. 
    The DLP solution has been showing some unidentified encrypted data being sent using FTP to a remote server. A vulnerability scan found .a collection of Linux servers thatare missing OS level patches. Upon further investigation, a technician notices that there are a few unidentified processes running on a number of the servers. What wouldbe a key FIRST step for the data security team to undertake at this point?
    • A. 

      Capture process ID data and submit to anti-virus vendor for review.

    • B. 

      Reboot the Linux servers, check running processes, and install needed patches.

    • C. 

      Remove a single Linux server from production and place in quarantine.

    • D. 

      Notify upper management of a security breach.

    • E. 

      Conduct a bit level image, including RAM, of one or more of the Linux servers.

  • 11. 
    A security manager has received the following email from the Chief Financial Officer (CFO):'While I am concerned about the security of the proprietary financial data in our ERP application, we have had a lot of turnover in the accounting group and I am having adifficult time meeting our monthly performance targets. As things currently stand, we do not allow employees to work from home but this is something I am willing to allowso we can get back on track. What should we do first to securely enable this capability for my group?" Based on the information provided, which of the following would bethe MOST appropriate response to the CFO?
    • A. 

      Remote access to the ERP tool introduces additional security vulnerabilities and should not be allowed .

    • B. 

      Allow VNC access to corporate desktops from personal computers for the users working from home.

    • C. 

      Allow terminal services access from personal computers after the CFO provides a list of the users working from home.

    • D. 

      Work with the executive management team to revise policies before allowing any remote access.

  • 12. 
    Company ABC is hiring customer service representatives from Company XYZ. The representatives reside at Company XYZ's headquarters. Which of the following BESTprevents Company XYZ representatives from gaining access to unauthorized Company ABC systems?
    • A. 

      Require each Company XYZ employee to use an IPSec connection to the required systems

    • B. 

      Require Company XYZ employees to establish an encrypted VDI session to the required systems

    • C. 

      Require Company ABC employees to use two-factor authentication on the required systems

    • D. 

      Require a site-to-site VPN for intercompany communications

  • 13. 
    A human resources manager at a software development company has been tasked with recruiting personnel for a new cyber defense division in the company. This divisionwill require personnel to have high technology skills and industry certifications. Which of the following is the BEST method for this manager to gain insight into this industryto execute the task?
    • A. 

      Interview candidates, attend training, and hire a staffing company that specializes in technology jobs

    • B. 

      Interview employees and managers to discover the industry h ct topics and trends

    • C. 

      Attend meetings with staff, internal training, and become certified in software management

    • D. 

      Attend conferences, webinars, and training to remain current with the industry and job requirements

  • 14. 
    The Chief Executive Officer (CEO) of a small start-up company wants to set up offices around the country for the sales staff to generate business. The company needs aneffective communication solution to remain in constant contact with each other, while maintaining a secure business environment. A junior-level administrator suggests thatthe company and the sales staff stay connected via free social media. Which of the following decisions is BEST for the CEO to make?
    • A. 

      Social media is an effective solution because it is easily adaptable to new situations.

    • B. 

      Social media is an ineffective solution because the policy may not align with the business.

    • C. 

      Social media is an effective solution because it implements SSL encryption.

    • D. 

      Social media is an ineffective solution because it is not primarily intended for business applications.

  • 15. 
    A security administrator is tasked with increasing the availability of the storage networks while enhancing the performance of existing applications. Which of the followingtechnologies should the administrator implement to meet these goals? (Select TWO).
    • A. 

      LUN masking

    • B. 

      Snapshots

    • C. 

      VSAN

    • D. 

      Dynamic disk pools

    • E. 

      Multipath

    • F. 

      Deduplication

  • 16. 
    A company Chief Information Officer (CIO) is unsure which set of standards should govern the company's IT policy. The CIO has hired consultants to develop use cases totest against various government and industry security standards. The CIO is convinced that there is large overlap between the configuration checks and security controlsgoverning each set of standards. Which of the following selections represent the BEST option for the CIO?
    • A. 

      Issue a RFQ for vendors to quote a complete vulnerability and risk management solution to the company.

    • B. 

      Issue a policy that requires only the most stringent security standards be implemented throughout the company

    • C. 

      Issue a policy specifying best practice security standards and a baseline to be implemented across the company.

    • D. 

      Issue a RFI for vendors to determine which set of security standards i s best for the company

  • 17. 
    A penetration tester is assessing a mobile banking application. Man-in-the-middle attempts via a HTTP intercepting proxy are failing with SSL errors. Which of the followingcontrols has likely been implemented by the developers?
    • A. 

      SSL certificate revocation

    • B. 

      SSL certificate pinning

    • C. 

      Mobile device root-kit detection

    • D. 

      Extended Validation certificates

  • 18. 
    The risk manager at a small bank wants to use quantitative analysis to determine the ALE of running a business system at a location which is subject to fires during theyear. A risk analyst reports to the risk manager that the asset value of the business system is $120,000 and. based on industry data, the exposure factor to fires is only20% due to the fire suppression system installed at the site. Fires occur in the area on average every four years. Which of the following is the ALE?
    • A. 

      $6,000

    • B. 

      $24,000

    • C. 

      $30,000

    • D. 

      $96,000

  • 19. 
    An information security assessor for an organization finished an assessment that identified critical issues with the human resource new employee management softwareapplication. The assessor submitted the report to senior management but nothing has happened. Which of the following would be a logical next step?
    • A. 

      Meet the two key VPs and request a signature on the original assessment.

    • B. 

      Include specific case studies from other organizations in an updated report.

    • C. 

      Schedule a meeting with key human resource application stakeholders.

    • D. 

      Craft an RFP to begin finding a new human resource application.

  • 20. 
    A system worth $100,000 has an exposure factor of eight percent and an ARO of four. Which of the following figures is the system's SLE?
    • A. 

      $2,000

    • B. 

      $8,000

    • C. 

      $12,000

    • D. 

      $32,000

  • 21. 
    The helpdesk manager wants to find a solution that will enable the helpdesk staff to better serve company employees who call with computer-related problems. Thehelpdesk staff is currently unable to perform effective troubleshooting and relies on callers to describe their technology problems. Given that the helpdesk staff is locatedwithin the company headquarters and 90% of the callers are telecommuters, which of the· following tools should the helpdesk manager use to make the staff more effectiveat troubleshooting while at the same time reducing company costs? (Select TWO).
    • A. 

      Web cameras

    • B. 

      Email

    • C. 

      Instant messaging

    • D. 

      BYOD

    • E. 

      Desktop sharing

    • F. 

      Presence

  • 22. 
    An organization has implemented an Agile development process for front end web application development . A new security architect has just joined the company andwants to integrate security activities into the SDLC.Which of the following activities MUST be mandated to ensure code quality from a security perspective? (Select TWO).
    • A. 

      Static and dynamic analysis is run as part of integration

    • B. 

      Security standards and training is performed as part of the project

    • C. 

      Daily stand-up meetings are held to ensure security requirements are understood

    • D. 

      For each major iteration penetration testing is performed

    • E. 

      Security requirements are story boarded and make it into the build

    • F. 

      A security design is performed at the end of the requirements phase

  • 23. 
    An IT Manager is concerned about errors made during the deployment process for a new model of tablet. Which of the following would suggest best practices andconfiguration parameters that technicians could follow during the deployment process?
    • A. 

      Automated workflow

    • B. 

      Procedure

    • C. 

      Corporate standard

    • D. 

      Guideline

    • E. 

      Policy

  • 24. 
    The helpdesk department desires to roll out a remote support application for internal use on all company computers. This tool should allow remote desktop sharing, systemlog gathering, chat, hardware logging, inventory management, and remote registry access. The risk management team has been asked to review vendor responses to theRFQ. Which of the following questions is the MOST important?
    • A. 

      What are the protections against MITM?

    • B. 

      What accountability is built into the remote support application?

    • C. 

      What encryption standards are used in tracking database?

    • D. 

      What snapshot or "undo" features are present in the application?

    • E. 

      What encryption standa1ds are used in remote desktop and file transfer functionality?

  • 25. 
    An IT manager is concerned about the cost of implementing a web filtering solution in an effort to mitigate the risks associated with malware and resulting data leakage .Given that the ARO is twice per year, the ALE resulting from a data leak is $25,000 and the ALE after implementing the web filter is $15,000. The web filtering solution willcost the· organization $10,000 per year. Which of the following values is the single loss expectancy of a data leakage event after implementing the web filtering solution?
    • A. 

      $0

    • B. 

      $7,500

    • C. 

      $10,000

    • D. 

      $12,500

    • E. 

      $15,000