Which of the following security concerns does the analy…
An analyst connects to a company web conference hosted on www.webconference.com/meetingID#01234 and
observes that numerous guests have been allowed to join, without providing identifying information. The topics
covered during the web conference are considered proprietary to the company. Which of the following security
concerns does the analyst present to management?
which of the following steps in system authorization ha…
A security engineer is a new member to a configuration board at the request of management. The company
has two new major IT projects starting this year and wants to plan security into the application deployment. The
board is primarily concerned with the applications’ compliance with federal assessment and authorization
standards. The security engineer asks for a timeline to determine when a security assessment of bothapplications should occur and does not attend subsequent configuration board meetings. If the security
engineer is only going to perform a security assessment, which of the following steps in system authorization
has the security engineer omitted?
Which of the following methods of software development …
A mature organization with legacy information systems has incorporated numerous new processes and
dependencies to manage security as its networks and infrastructure are modernized. The Chief Information
Office has become increasingly frustrated with frequent releases, stating that the organization needs everything
to work completely, and the vendor should already have those desires built into the software product. The
vendor has been in constant communication with personnel and groups within the organization to understand
its business process and capture new software requirements from users. Which of the following methods of
software development is this organization’s configuration management process using?
Requirement 5: The system shall perform CRC checks on a…
A security engineer is working on a large software development project. As part of the design of the project,
various stakeholder requirements were gathered and decomposed to an implementable and testable level.
Various security requirements were also documented. Organize the following security requirements into the
correct hierarchy required for an SRTM.
Requirement 1: The system shall provide confidentiality for data in transit and data at rest.
Requirement 2: The system shall use SSL, SSH, or SCP for all data transport.
Requirement 3: The system shall implement a file-level encryption scheme.
Requirement 4: The system shall provide integrity for all data at rest.
Requirement 5: The system shall perform CRC checks on all files.
Which of the following should the CSO conduct FIRST?
A small company’s Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the
company’s security posture quickly with regard to targeted attacks. Which of the following should the CSO
conduct FIRST?
Which of the following equipment MUST be deployed to gu…
The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO
is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as
well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of
the following equipment MUST be deployed to guard against unknown threats?
Which of the following is the BEST method for this mana…
A human resources manager at a software development company has been tasked with recruiting personnel
for a new cyber defense division in the company. This division will require personnel to have high technology
skills and industry certifications. Which of the following is the BEST method for this manager to gain insight into
this industry to execute the task?
Which of the following tools would a security engineer …
The security engineer receives an incident ticket from the helpdesk stating that DNS lookup requests are no
longer working from the office. The network team has ensured that Layer 2 and Layer 3 connectivity are
working. Which of the following tools would a security engineer use to make sure the DNS server is listening on
port 53?
which of the following can the network administrator us…
A network administrator with a company’s NSP has received a CERT alert for targeted adversarial behavior at
the company. In addition to the company’s physical security, which of the following can the network
administrator use to detect the presence of a malicious actor physically accessing the company’s network or
information systems from within? (Select TWO).
why would it be valuable?
A security consultant is conducting a network assessment and wishes to discover any legacy backup Internet
connections the network may have. Where would the consultant find this information and why would it be
valuable?