which of the following steps in system authorization ha…
A security engineer is a new member to a configuration board at the request of management. The company has two new major IT projects starting this year and
wants to plan security into the application deployment. The board is primarily concerned with the applications’ compliance with federal assessment and
authorization standards. The security engineer asks for a timeline to determine when a security assessment of both applications should occur and does not attend
subsequent configuration board meetings. If the security engineer is only going to perform a security assessment, which of the following steps in system
authorization has the security engineer omitted?
Which of the following methods of software development …
A mature organization with legacy information systems has incorporated numerous new processes and dependencies to manage security as its networks and
infrastructure are modernized. The Chief Information Office has become increasingly frustrated with frequent releases, stating that the organization needs
everything to work completely, and the vendor should already have those desires built into the software product. The vendor has been in constant communication
with personnel and groups within the organization to understand its business process and capture new software requirements from users. Which of the following
methods of software development is this organization’s configuration management process using?
A security engineer is working on a large software development project.
A security engineer is working on a large software development project. As part of the design of
the project, various stakeholder requirements were gathered and decomposed to an implementable and testable level. Various security requirements were also
documented. Organize the following security requirements into the correct hierarchy required for an SRTM.
Requirement 1: The system shall provide confidentiality for data in transit and data at rest.
Requirement 2: The system shall use SSL, SSH, or SCP for all data transport.
Requirement 3: The system shall implement a file-level encryption scheme.
Requirement 4: The system shall provide integrity for all data at rest.
Requirement 5: The system shall perform CRC checks on all files.
Which of the following should the CSO conduct FIRST?
A small company’s Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the company’s security posture quickly with regard to
targeted attacks. Which of the following should the CSO conduct FIRST?
Which of the following equipment MUST be deployed to gu…
The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could
compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality.
Which of the following equipment MUST be deployed to guard against unknown threats?
Which of the following is the BEST method for this mana…
A human resources manager at a software development company has been tasked with recruiting personnel for a new cyber defense division in the company. This
division will require personnel to have high technology skills and industry certifications. Which of the following is the BEST method for this manager to gain insight
into this industry to execute the task?
Which of the following tools would a security engineer …
The security engineer receives an incident ticket from the helpdesk stating that DNS lookup requests are no longer working from the office. The network team has
ensured that Layer 2 and Layer 3 connectivity are working. Which of the following tools would a security engineer use to make sure the DNS server is listening on
port 53?
which of the following can the network administrator us…
A network administrator with a company’s NSP has received a CERT alert for targeted adversarial behavior at the company. In addition to the company’s physical
security, which of the following can the network administrator use to detect the presence of a malicious actor physically accessing the company’s network or
information systems from within? (Select TWO).
why would it be valuable?
A security consultant is conducting a network assessment and wishes to discover any legacy backup Internet connections the network may have. Where would the
consultant find this information and why would it be valuable?
Which of the following problems would MOST likely be un…
A new web based application has been developed and deployed in production. A security engineer decides to use an HTTP interceptor for testing the application.
Which of the following problems would MOST likely be uncovered by this tool?