General
Threats, Vulnerabilities,
Mitigations
Architecture
Operations
Management & Oversight
100

What security concept is used when security guards, access control vestibules & bollards are installed?

Physical security

100

What type of threat actor defaces the website of a major corporation with political messages?

Hacktivist

100

Which feature should a backup solution support to ensure data integrity & confidentiality?

Encryption

100

What is the step of the incident response process that a tabletop exercise would be performed?

Preparation

100

What is the primary advantage of conducting recurring risk assessments?

Enables ongoing monitoring of changes in risk landscape

200

An IDS to monitor network traffic & alert the security team is an example of what type of security control?

Technical, Detective

200

Which type of threat vector is being exploited by finding a USB in the parking lot and plugging it in?

Removable device

200

What type of disaster recovery site provides basic infrastructure but doesn't have active systems?

Cold site

200

What security measure should be implemented during the disposal/decommissioning process to ensure that sensitive data is properly handled?

Sanitization of data

200

What policy establishes guidelines for employee conduct regarding information assets?

AUP Acceptable Use Policy

300

Which security concept ensures that only authenticated & authorized individuals individuals can access resources?

Authentication

300

What type of vulnerability allows attackers to inject SQL commands through the input fields?

SQL injection

300

Which security measure should be implemented to ensure secure communications & reduce unauthorized access to virtual environments?

Logical segmentation

300

What security technique should a company use to enforce security policies& protect data on employee owned devices?

MDM

300

What assesses a vendor's capabilities, reputation & compliance with industry standards to ensure suitability & minimize potential risk?

Due diligence

400

What aspect of the change management process will identify that new software version is compatible with older applications?

Impact analysis

400

What type of malware activates under certain conditions to execute unauthorized commands?

Logic bomb

400

Which type of firewall should be implemented to provide protection against SQL injection & XSS attacks?

WAF

400

What role do SNMP traps play in security alerting & monitoring?

Real-time alerting

400

What is the purpose of conducting internal compliance audits?

To identify & address any gaps in compliance

500

Which cryptographic method will ensure data integrity, authentication & non-repudiation of a message?

Digital signature

500

What technique would prevent unauthorized software from running on a network by only allowing approved applications to execute?

Access control list (ACL)

500

Which data protection concept complies with international regulations that mandate date stored in certain geographical boundaries?

Data Sovereignty

500

Which technology should the IT department deploy to mitigate web-based attacks targeting employee workstations?

DNS filtering

500

Which type of penetration testing simulates real-world attack scenarios to identify vulnerabilities in a company's systems?

Offensive penetration testing