1.
Which of the following access control models enables a person who creates or owns objects to define permissions to access those objects?
A. 
Mandatory access control model
B. 
Rule-based access control model
C. 
Role-based access control model
D. 
Discretionary access control model
2.
During which type of assessment would penetration testers not have any knowledge about the network and network defenders have no knowledge of the test itself?
A. 
B. 
C. 
D. 
3.
Which of the following processes is concerned with validating credentials?
A. 
B. 
C. 
D. 
4.
Your organization is concerned that employees might e-mail proprietary information to themselves at their private addresses. Which of the following would be most effective at catching that particular effort?
A. 
B. 
C. 
D. 
5.
Which of the following methods of log management involves visiting each individual host to review its log files?
A. 
B. 
C. 
D. 
6.
You are trying to determine the appropriate level of high availability for a server. The server must be available on a constant basis, and downtime in a given year cannot exceed 1 hour. It normally takes you about 45 minutes to bring down and restart the server for maintenance. Which of the following reflects the level of availability you require?
A. 
99.999 percent availability
B. 
99.9 percent availability
C. 
99.99 percent availability
D. 
7.
Which of the following ports would be most likely to allow secure remote access into a system within a data center?
A. 
B. 
C. 
D. 
8.
Which of the following secure protocols protects traffic during transmission and uses TCP port 443?
A. 
B. 
C. 
D. 
E. 
9.
All of the following are valid methods to secure static hosts in an organization, except:
A. 
B. 
C. 
Application level firewalls
D. 
10.
Wissa is updating a printer driver on a Windows system. She downloads the latest driver from the manufacturer's Web site. When installing the driver, Windows warns that the driver is unsigned. To which of the following threats is Wissa exposing her system?
A. 
B. 
C. 
D. 
11.
Which of the following types of factors could be used to describe a fingerprint-based method of logging in and authenticating to a touchscreen device?
A. 
B. 
C. 
D. 
12.
Which of the following technologies allows devices to communicate with each other at very close range through radio signals by using a special chip implanted in the device, and may be vulnerable to eavesdropping and man-in-the-middle attacks?
A. 
B. 
C. 
Near-field communication (NFC)
D. 
13.
Which of the following is an application designed to create and initiate files on a host to provide a fully functional virtual machine?
A. 
B. 
C. 
D. 
14.
How many rounds does DES perform when it encrypts plaintext?
A. 
B. 
C. 
D. 
15.
Which of the following secure e-mail protocols is carried over an SSL or TLS connection and uses TCP port 993?
A. 
B. 
C. 
D. 
16.
Which of the following are true statements regarding the relationships of functionality, security, and available resources?
A. 
As functionality increases, security increases.
B. 
As security increases, functionality decreases.
C. 
As resources increase, security decreases but functionality decreases.
D. 
As resources decrease, both functionality and security decrease.
17.
During which stage of a secure development model would you normally find steps such as requirements gathering, analysis, and diagram development?
A. 
B. 
C. 
D. 
18.
Risk assessment means evaluating which of the following elements?
A. 
B. 
C. 
D. 
19.
Which of the following is a protocol used to obtain the status of digital certificates in public keys?
A. 
B. 
C. 
D. 
20.
All of the following are supporting elements of authorization, except:
A. 
B. 
Principle of least privilege
C. 
D. 
Rights, permissions, and privileges