Professional Documents
Culture Documents
What is the main security concern associated with Single Sign-On (SSO) systems?
(Correcto)
Attribute-Based Access Control (ABAC)
(Correcto)
Explicación
Attribute-Based Access Control (ABAC) is the most suitable model for this scenario, as it
allows data owners to specify access rights based on specific attributes and the subject’s
contextual parameters, such as location, time, and purpose.
Pregunta 3: Incorrecto
Which of the following is NOT a type of access control that can be used to prevent
tailgating or piggybacking?
Biometric locks
Contraband checks
(Correcto)
Turnstiles
(Incorrecto)
Mantraps
Explicación
Contraband checks are used to prevent the introduction or removal of unauthorized
items, not to prevent unauthorized entry. While they can help to deter tailgating or
piggybacking, they are not a direct access control measure.
Pregunta 4: Correcto
You are setting up a secure website and need to choose a transport protocol. Which
layer in the OSI model would be relevant for making this decision?
Layer 4
(Correcto)
Layer 7
Layer 5
Layer 6
Explicación
When choosing a transport protocol for a secure website, you would consider the
properties provided by Layer 4 (the Transport Layer) in the OSI model, where you can
select between UDP and TCP.
Pregunta 5: Incorrecto
Which of the following is NOT a factor to consider when determining data retention
policies?
Data security
(Correcto)
Business needs
Cost of storage
(Incorrecto)
Legal requirements
Explicación
Data retention policies are primarily concerned with legal and business requirements,
not data security. Data security is addressed through other security measures.
Pregunta 6: Correcto
A large organization is planning to implement Role-Based Access Control (RBAC) for its
network security. Why is it important for the organization to regularly review and update
roles assigned to individuals?
Regular updates are crucial to maintain the balance between security and user
convenience.
(Correcto)
Explicación
Regularly updating RBAC roles is essential to adapt to changing responsibilities,
maintain security, and ensure a balance between security measures and user
convenience.
Pregunta 7: Incorrecto
You are the network administrator, and the company's e-commerce website is
experiencing a sudden surge in traffic. To protect against potential attacks, what firewall
feature should you consider enabling?
Proxy service
(Incorrecto)
Packet filtering
Content filtering
(Correcto)
Stateful inspection
Explicación
Content filtering can help identify and block malicious traffic during a traffic surge.
Pregunta 8: Incorrecto
Which phase of the IAAA model involves proving your identity using various credentials
like your name or employee number?
Identification
(Correcto)
Authorization
Authentication
(Incorrecto)
Accountability
Explicación
The identification phase involves establishing your identity using various credentials like
your name, username, or employee number.
Pregunta 9: Incorrecto
Your company is located in a high-security area and is concerned about tailgating or
piggybacking. Which of the following physical security controls would be most effective
in preventing this type of attack?
Contraband checks
(Incorrecto)
Motion sensors
Mantraps
(Correcto)
Turnstiles
Explicación
Mantraps are rooms with two doors that require one to close before the other opens,
often with multifactor authentication. They are used in high-security facilities to prevent
unauthorized entry.
Pregunta 10: Correcto
Your company's network is experiencing a sudden increase in phishing attempts. Which
network attack is most likely taking place, and what countermeasures should you
implement?
(Correcto)
Explicación
Patch management is the process of applying updates to software and hardware
components to fix vulnerabilities, bugs, and issues. It helps to reduce the risk of
unauthorized changes to the system by preventing attackers from exploiting known
flaws. It also improves the performance and reliability of the system by resolving errors
and glitches. It enhances the functionality and compatibility of the system by adding
new features and supporting new devices.
Pregunta 12: Incorrecto
What is the essential difference between "Redundant Sites" and "Hot Sites" in disaster
recovery planning?
Redundant Sites focus on minimal downtime, while Hot Sites prioritize data redundancy.
(Incorrecto)
Redundant Sites require manual failover, while Hot Sites offer automatic failover.
Redundant Sites are exact duplicates of the primary site, while Hot Sites host critical
applications with lower-spec hardware.
(Correcto)
Explicación
Redundant Sites are full duplicates of the primary site, while Hot Sites prioritize hosting
critical applications with less expensive hardware, reducing costs while still providing
failover capability.
Pregunta 13: Correcto
In the context of cloud computing, what does "SaaS" stand for?
System as a Service
Software as a Service
(Correcto)
(Correcto)
(Incorrecto)
Explicación
FIDM facilitates the use of common policies, practices, and protocols to manage
identities and trust across various systems.
Pregunta 15: Correcto
What are the four primary strategies for enterprise risk management? Choose a strategy
that involves recognizing the risk but choosing not to take action to mitigate it.
Risk Acceptance
(Correcto)
Risk Transference
Risk Mitigation
Risk Avoidance
Explicación
Risk Acceptance is the strategy where an organization recognizes the risk but chooses
not to take action to mitigate it. This decision is made after due diligence and due care
when the cost of mitigation may outweigh the potential loss.
Pregunta 16: Incorrecto
Which of the following is the most important consideration when choosing security
measures for a physical perimeter?
(Correcto)
(Incorrecto)
Explicación
The most important consideration when choosing security measures for a physical
perimeter is the specific security needs of the organization. Not all organizations have
the same security needs, and the most appropriate security measures will vary
depending on the organization's assets, risk profile, and budget.
Pregunta 17: Incorrecto
Which of the following is a type of network attack that involves sending a large number
of packets or requests to a target system or server to overwhelm its resources and
disrupt its normal functioning?
(Incorrecto)
Neither A nor B
Both A and B
(Correcto)
Explicación
A DoS attack is a type of network attack that involves sending a large number of packets
or requests to a target system or server to overwhelm its resources and disrupt its
normal functioning. A DDoS attack is a type of DoS attack that involves using multiple
compromised devices or systems to launch the attack from different sources.
Pregunta 18: Incorrecto
Which type of VPN provides the highest level of security for remote connections?
L2TP/IPsec VPN
(Correcto)
IPsec VPN
SSL VPN
(Incorrecto)
PPTP VPN
Pregunta 19: Correcto
What security measures are essential for securing a wireless network?
(Correcto)
Using default router settings, enabling WEP, and frequent SSID changes.
Core router
Gateway router
(Correcto)
Access router
Edge router
Explicación
A gateway router is a router that connects two or more networks that use different
protocols or architectures, such as Ethernet and Token Ring. It performs protocol
conversion and translation functions to enable communication between the networks.
Pregunta 21: Incorrecto
Your organization allows remote access via VPN for employees. A user complains about
connectivity issues. What should you check first to diagnose the problem?
(Correcto)
(Incorrecto)
Biometric lock
(Correcto)
Smart card
Combination lock
Explicación
Biometric locks use biometric authentication, such as fingerprints or facial recognition,
to verify authorized access.
Pregunta 23: Correcto
Which access control model is most commonly used in the private sector, as it simplifies
administration and enhances security by assigning access rights based on job roles and
privileges?
(Correcto)
Attribute-Based Access Control (ABAC)
Explicación
Role-Based Access Control (RBAC) is the most commonly used model in the private
sector, as it simplifies administration and enhances security by assigning access rights
based on job roles and privileges, and often includes a “need to know” requirement.
Pregunta 24: Correcto
What security feature is unique to IPv6 and missing in IPv4?
Options: A.
C. Lower overhead
Longer addresses
B. Built-in IPsec
(Correcto)
D. Improved routing
Explicación
It refers to the unique security feature of IPv6, which integrates IPsec for enhanced data
transmission security, whereas IPv4 requires IPsec as an optional and separate addition.
Pregunta 25: Incorrecto
In Identity and Access Provisioning, what is the primary purpose of the Identity and
Access Management Provisioning Lifecycle?
(Incorrecto)
(Correcto)
Explicación
Failing to apply a critical patch led to a breach, compromising both the confidentiality
(data exposed) and integrity (data altered) aspects of the CIA Triad.
Pregunta 27: Incorrecto
In which phase of the Incident Response Lifecycle is it crucial to isolate affected systems
and prevent further damage?
Response
(Correcto)
Remediation
Detection
(Incorrecto)
Recovery
Explicación
During the "Response" phase of the Incident Response Lifecycle, it is crucial to isolate
affected systems and prevent further damage. This phase involves immediate actions to
contain the incident.
Pregunta 28: Correcto
Which of the following is a type of security information and event management (SIEM)
system that collects, correlates, and analyzes data from various sources, such as logs,
alerts, and events, to provide a centralized view of the security status of the network?
(Correcto)
Explicación
A security analytics system is a type of SIEM system that collects, correlates, and
analyzes data from various sources, such as logs, alerts, and events, to provide a
centralized view of the security status of the network. It uses advanced techniques, such
as machine learning, artificial intelligence, and behavioral analysis, to detect and
respond to complex and sophisticated threats.
Pregunta 29: Incorrecto
What is the main difference between Qualitative Risk Analysis and Quantitative Risk
Analysis?
(Incorrecto)
(Correcto)
Explicación
The main difference is that qualitative analysis offers a broader view of risks, considering
factors beyond specific numbers, while quantitative analysis assigns numerical values to
risks for precise measurement.
Pregunta 30: Incorrecto
Imagine a scenario where an organization has implemented a security control that
deters potential attackers by creating a perception of higher risk. Which type of control
is this?
Detective Control
Compensating Control
Preventative Control
(Incorrecto)
Deterrent Control
(Correcto)
Explicación
A control that creates a perception of higher risk to deter potential attackers falls under
the category of Deterrent Controls.
Pregunta 31: Incorrecto
In a decentralized access control system, where are access control decisions made?
At a central location
(Incorrecto)
Through a cloud-based system
In hybrid servers
(Correcto)
Explicación
In decentralized access control systems, access control decisions are made at individual
locations or facilities, not at a central location.
Pregunta 32: Correcto
Which of the following is NOT a purpose of a Change Review Board (CRB)?
(Correcto)
Explicación
While the CRB may provide input on change plans, it is not responsible for developing
or implementing them.
Pregunta 33: Correcto
Which category of incidents typically involves unintentional actions or mistakes by
individuals?
Catastrophic incidents
Human-related incidents
(Correcto)
Environmental incidents
Natural disasters
Explicación
Human-related incidents encompass both intentional and unintentional actions,
including mistakes.
Pregunta 34: Correcto
What is the primary purpose of advisory policies in an organization's governance
framework?
To define acceptable and unacceptable behavior and provide consequences for non-
compliance.
(Correcto)
(Correcto)
Explicación
Change management is the process of planning, implementing, and reviewing changes
to the system or the environment. A best practice for change management is to
document changes and their impacts, such as the reason, scope, risk, cost, and benefit
of the change. This helps to ensure accountability, traceability, and auditability of the
change process
Pregunta 36: Correcto
In the context of access control, what does "Least Privilege" mean?
(Correcto)
Cellular
Wi-Fi
Satellite
Bluetooth
(Correcto)
Explicación
Bluetooth is a wireless technology that uses short-range radio waves to connect devices
within a distance of about 10 meters. It is commonly used for personal area networks
(PANs) that enable data exchange between devices such as personal computers,
smartphones, or printers.
Pregunta 38: Correcto
What type of access control employs policies and procedures as its primary security
mechanisms?
Physical controls
Administrative controls
(Correcto)
Corrective controls
Logical controls
Explicación
Administrative controls involve policies and procedures used to define and manage
access rights and privileges.
Pregunta 39: Incorrecto
A company experiences a significant cyber incident that has affected multiple critical
systems. What phase of the Incident Response Lifecycle should they prioritize to
minimize the impact?
Recovery
(Incorrecto)
Remediation
(Correcto)
Detection
Reporting
Explicación
Remediation involves addressing the underlying security flaw to prevent future attacks
and should be prioritized in this scenario.
Pregunta 40: Correcto
What is Personal Identifiable Information (PII), and why is it significant in cybersecurity,
as discussed in the lecture?
PII denotes financial information and is essential for secure financial transactions.
PII comprises information that can be used to uniquely identify individuals, and its
protection is a vital aspect of cybersecurity and data privacy.
(Correcto)
PII includes data that can identify individuals and is crucial for marketing efforts.
PII refers to an individual's personal hobbies and interests, and it helps in user profiling.
Explicación
The lecture explains that Personal Identifiable Information (PII) includes data that can
uniquely identify individuals, making its protection a critical concern in cybersecurity and
data privacy.
Pregunta 41: Incorrecto
An organization is planning to implement a disaster recovery plan. They want to reduce
data loss to a minimum. Which concept should they primarily focus on?
(Correcto)
(Incorrecto)
(Correcto)
Explicación
Multifactor authentication combines at least two authentication factors, making it more
secure as it requires multiple proofs of identity.
Pregunta 43: Incorrecto
Which of the following is NOT a critical step in the patch management process?
(Correcto)
(Incorrecto)
Explicación
While communicating patch deployments to stakeholders is important for awareness, it
is not a critical step in the patch management process itself.
Pregunta 44: Incorrecto
In the context of Configuration Management, what is the "baseline configuration"?
(Incorrecto)
(Correcto)
Digital signatures
(Incorrecto)
Asymmetric encryption
Hashing
(Correcto)
Symmetric encryption
Explicación
Hashing is a one-way cryptographic function, not a type of encryption.
Pregunta 46: Correcto
In the TCP/IP model, which layer is equivalent to Layer 3 (Networking Layer) in the OSI
model?
Application Layer
Transport Layer
Internetwork Layer
(Correcto)
Explicación
The TCP/IP Internetwork Layer corresponds to Layer 3 (Networking Layer) in the OSI
model, handling IP addresses and packet routing.
Pregunta 47: Correcto
What is the primary function of the Transport Layer in the OSI model?
Data encryption
(Correcto)
Explicación
The Transport Layer is responsible for managing data transport, which includes the use
of port numbers.
Pregunta 48: Correcto
In data handling, what does the principle of "least privilege" aim to achieve?
(Correcto)
Risk Assessment
Risk Identification
Explanation:
Layer 7
Layer 4
Layer 6
(Correcto)
Layer 5
Explicación
Layer 6, the Presentation Layer, is responsible for data formatting, compression, and
encryption.
Pregunta 51: Correcto
What is the key difference between an Intrusion Detection System (IDS) and an Intrusion
Prevention System (IPS)?
IDS and IPS are two names for the same security system.
IDS detects and logs intrusion attempts, while IPS blocks and prevents them.
(Correcto)
Recovery
(Correcto)
Preventative
Detective
Corrective
Explicación
Recovery is a type of disaster recovery, not access control.
Pregunta 53: Correcto
What is the key purpose of lessons learned in the Incident Management process?
(Correcto)
Explicación
Lessons learned are crucial for improving future incident response and overall security
measures.
Pregunta 54: Correcto
Detective controls are primarily responsible for:
(Correcto)
They improve the performance of the network by reducing broadcast domains and traffic
congestion.
They increase the security of the network by isolating traffic based on logical groups.
(Incorrecto)
(Correcto)
They enhance the flexibility of the network by allowing devices to move across physical
locations without changing their network configuration.
Explicación
VLANs are logical subdivisions of a network that group devices based on criteria such as
function, department, or security level. They provide several benefits for the network,
such as increasing security by isolating traffic based on logical groups, improving
performance by reducing broadcast domains and traffic congestion, and enhancing
flexibility by allowing devices to move across physical locations without changing their
network configuration.
Pregunta 56: Correcto
You work for a company that processes healthcare data. A customer inquires about their
rights to their data under a particular regulation. Which regulation gives individuals the
right to access their healthcare data?
Explicación
HIPAA (Health Insurance Portability and Accountability Act) provides individuals with the
right to access their healthcare data.
Pregunta 57: Correcto
In the context of access control, if an organization's disaster recovery plan aims to
ensure swift recovery and business continuity after a security incident, which type of
control does this plan fall under?
Recovery Control
(Correcto)
Compensating Control
Corrective Control
Preventative Control
Explicación
Recovery controls, such as disaster recovery plans, focus on ensuring swift recovery and
business continuity after a security incident.
Pregunta 58: Incorrecto
Which of the following is NOT a benefit of using Configuration Management?
(Incorrecto)
Reduced risk of unauthorized changes
(Correcto)
Explicación
While Configuration Management can improve efficiency and consistency, it is primarily
focused on security and regulatory compliance.
Pregunta 59: Correcto
What is the primary objective of data storage encryption in a security operations
context?
(Correcto)
To deter tailgating
(Correcto)
To prevent fires
Explicación
Slab-to-slab walls, fire-rated doors, and strong construction in a data center primarily
aim to enhance physical security by protecting the facility and its assets. These measures
contribute to a secure environment for critical data storage.
Pregunta 61: Incorrecto
Which element of physical security serves as both a deterrent and detective measure,
making potential intruders think twice?
Locks
Mantraps
Fences
(Incorrecto)
CCTV cameras
(Correcto)
Explicación
Closed-Circuit Television (CCTV) cameras serve as both deterrents and detective
measures by monitoring and recording activities in the area.
Pregunta 62: Correcto
What is the primary purpose of the Business Impact Analysis (BIA) in disaster recovery
planning?
(Correcto)
Explicación
The main purpose of BIA is to identify critical assets and determine acceptable
downtime.
Pregunta 63: Correcto
What is the primary goal of Patch Management in a security operations context?
(Correcto)
(Incorrecto)
IT Security only deals with data encryption, while Cybersecurity encompasses all aspects of
information protection.
Explicación
IT Security, while including cybersecurity, extends to all IT-related aspects, including
those not connected to the internet, while Cybersecurity primarily concerns online assets
and devices.
Pregunta 65: Correcto
You are a certified cybersecurity professional working for a reputable organization.
During a routine security assessment, you discover a critical vulnerability that could
potentially lead to a significant data breach if exploited. What should be your ethical
course of action based on the (ISC)² Code of Ethics?
Report the vulnerability to the organization's management and provide a detailed plan to
mitigate the risk.
(Correcto)
Exploit the vulnerability to assess its impact fully and then report it to the organization's
management.
(Incorrecto)
(Correcto)
Susceptibility to copying
(Correcto)
(Incorrecto)
Mandatory Access Control (MAC)
(Correcto)
Explicación
Mandatory Access Control (MAC) is the most likely model to use a lattice-based
structure to define the hierarchical relationship between subjects and objects, as it
assigns labels and clearances to objects and subjects, respectively, and grants access
based on the dominance relation between them.
Pregunta 69: Correcto
In a high-security facility, what type of rooms with two doors requires multifactor
authentication and are designed to prevent unauthorized access?
Turnstiles
Contraband checks
Bollards
Mantraps
(Correcto)
Explicación
Mantraps are rooms with two doors that require one to close before the other opens,
often with multifactor authentication. They are used in high-security facilities to prevent
unauthorized access.
Pregunta 70: Incorrecto
What is the primary benefit of using a hybrid access control system?
(Incorrecto)
(Correcto)
Explicación
Hybrid access control systems offer the benefits of centralized control while providing
resilience against network issues in remote locations.
Pregunta 71: Correcto
Which of the following is a type of network access control (NAC) that verifies the
identity and compliance of a device before granting it access to the network, such as
checking the device’s operating system, antivirus software, and patches?
Post-admission NAC
Pre-admission NAC
(Correcto)
Post-connection NAC
Pre-connection NAC
Explicación
Pre-admission NAC is a type of NAC that verifies the identity and compliance of a device
before granting it access to the network, such as checking the device’s operating
system, antivirus software, and patches. It prevents unauthorized or non-compliant
devices from accessing the network and potentially compromising its security.
Pregunta 72: Correcto
What is the primary purpose of a data center in a modern organization?
(Correcto)
(Incorrecto)
(Correcto)
Biometrics do not require careful consideration of environmental factors.
Explicación
Biometrics can raise privacy concerns, as they may reveal more than just identity, and
once compromised, they cannot be reissued.
Pregunta 74: Correcto
What is the primary focus of Change Management in a security operations context?
(Correcto)
Symmetric-key cryptography
Hash-based cryptography
Asymmetric-key cryptography
Explicación
Cryptography is the science of securing data using mathematical techniques. There are
different types of cryptography, such as symmetric-key cryptography, asymmetric-key
cryptography, and hash-based cryptography. Symmetric-key cryptography uses the
same key to encrypt and decrypt data. Asymmetric-key cryptography uses a pair of keys,
one public and one private, to encrypt and decrypt data. Hash-based cryptography uses
a hash function to generate a hash value from data.
Pregunta 76: Incorrecto
In which type of authentication do environmental factors, like time and location, play a
significant role in determining access?
Type 1 Authentication
(Correcto)
Type 3 Authentication
Type 4 Authentication
(Incorrecto)
Type 2 Authentication
Explicación
Type 1 Authentication, often using something you know, can be influenced by
environmental factors like time and location.
Pregunta 77: Correcto
What is the primary goal of the "Remediation" phase in the Incident Response Lifecycle?
(Correcto)
(Correcto)
Data destruction
Insider threat
Data breach
Explicación
A DDoS attack involves overwhelming a system with a massive number of connections
or requests, leading to unresponsiveness, which aligns with the scenario described.
Pregunta 79: Correcto
Which of the following is the most effective way to prevent social engineering attacks
that target guards?
(Correcto)
Explicación
The most effective way to prevent social engineering attacks that target guards is to
provide guards with training on social engineering tactics, implement a strict policy on
who is allowed to interact with guards, and use technology to monitor interactions
between guards and visitors.
Pregunta 80: Correcto
During a disaster, an organization's primary data center becomes inoperable. Which
type of recovery site would be the most suitable for minimizing downtime, and why?
Cold Site
Redundant Site
Warm Site
Hot Site
(Correcto)
Explicación
A Hot Site offers lower cost compared to a Redundant Site while providing rapid
recovery with existing hardware.
Pregunta 81: Correcto
In the context of data security, what is "Disclosure" the opposite of?
Alteration
Availability
Integrity
Confidentiality
(Correcto)
Explicación
Disclosure is the opposite of confidentiality. It refers to unauthorized access and
exposure of protected information.
Pregunta 82: Correcto
What is the formula for calculating Total Risk?
Threat * Vulnerability/Likelihood
(Correcto)
Threat * Vulnerability
Explicación
Total Risk is calculated by multiplying Threat, Vulnerability, and Asset Value, taking into
account the worth of the asset.
Pregunta 83: Correcto
An organization uses Role-Based Access Control (RBAC). Which principle is fundamental
to RBAC?
Separation of duties
Least privilege
(Correcto)
Background checks
Explicación
RBAC focuses on granting access based on job roles, but the principle of "Least
Privilege" ensures that individuals have only the necessary access for their roles
Pregunta 84: Incorrecto
Which category of access controls includes measures like drug tests for personnel,
intrusion prevention systems, and firewalls?
Physical Controls
Administrative Controls
Technical Controls
(Correcto)
Deterrent Controls
(Incorrecto)
Explicación
Technical controls encompass measures like intrusion prevention systems and firewalls
that operate at a digital level to prevent security incidents.
Pregunta 85: Incorrecto
Software-defined networking (SDN) separates the control plane from the data plane.
What is the primary benefit of this separation?
(Incorrecto)
Reduced network scalability
(Correcto)
Explicación
The primary benefit of separating the control plane from the data plane in software-
defined networking (SDN) is centralized network control and flexibility. This separation
allows for more centralized, programmable, and flexible management of network
resources and traffic, making it easier to adapt to changing network requirements and
conditions.
Pregunta 86: Correcto
What is the primary goal of availability in the context of the CIA Triad?
(Correcto)
Baiting
Phishing
Exploitation of trust
(Correcto)
Explicación
Social engineering attacks often rely on exploiting the trust of the victim.
Pregunta 88: Correcto
Which type of firewall operates at the application layer and can block specific
applications or services?
Packet-filtering firewall
Proxy firewall
(Correcto)
Explicación
It's a type of firewall that operates at the application layer and can block specific
applications or services by acting as an intermediary between a user's device and the
target server.
Pregunta 89: Correcto
Your organization has implemented a countermeasure to mitigate a specific risk. Over
time, you notice that the effectiveness of this countermeasure has diminished, and the
risk level is increasing. What phase of the risk management process should you focus on
to address this issue?
Risk Identification
Risk Assessment
(Correcto)
Explicación
To address the diminishing effectiveness of a countermeasure, you should focus on the
phase of Risk and Control Monitoring and Reporting, which involves continuous
monitoring to ensure that implemented measures remain effective.
Pregunta 90: Correcto
Which of the following is NOT an example of an administrative (directive) control?
Security policies
Security guidelines
Security procedures
(Correcto)
Explicación
Technical security controls are implemented through technology, while administrative
(directive) controls are implemented through policies, procedures, and guidelines.
Pregunta 91: Incorrecto
You work for a large organization with a complex IT infrastructure. The organization's
Board of Directors has just approved a new governance direction that emphasizes being
risk-averse and avoiding potential security breaches. As a security professional, how
should you align the organization's security measures with this new direction?
Continue with the current security measures, as the security team has always prioritized
risk aversion.
Align the security strategies with the new risk-averse direction by emphasizing measures to
avoid security risks.
(Correcto)
Inform the CIO about the new governance direction, and leave it to the IT department to
decide on appropriate security measures.
(Incorrecto)
Explicación
The best approach to align with the new governance direction is to emphasize security
measures that align with the organization's risk-averse stance, ensuring that the security
strategies are in harmony with the board's decisions.
Pregunta 92: Incorrecto
Which of the following is a type of intrusion prevention system (IPS) that blocks or
modifies malicious traffic based on predefined rules or signatures?
Network-based IPS
(Incorrecto)
Anomaly-based IPS
Host-based IPS
Signature-based IPS
(Correcto)
Explicación
A signature-based IPS is a type of IPS that blocks or modifies malicious traffic based on
predefined rules or signatures. It compares the network traffic with a database of known
attack patterns or signatures and takes action if a match is found. It is effective against
known attacks but may not detect new or unknown attacks.
Pregunta 93: Correcto
You are a cybersecurity professional tasked with conducting a Risk Assessment for a
financial institution. During the assessment, you identify a significant risk related to the
potential loss of sensitive customer data. What would be an appropriate risk response
strategy in this scenario?
Risk Avoidance
Risk Mitigation
(Correcto)
Risk Acceptance
Risk Transference
Explicación
In the context of a financial institution and sensitive customer data, the most suitable
strategy would be risk mitigation to reduce the potential impact of data loss.
Pregunta 94: Correcto
Your company is concerned about the security of its data center and is considering
using subceilings. However, you are aware that subceilings can pose a security risk.
Which of the following physical security controls would be most effective in mitigating
this risk?
Slab-to-slab walls
(Correcto)
Guard dogs
Panic bars on doors
Explicación
Slab-to-slab walls extend from the ceiling to the floor, preventing unauthorized access
to spaces above the ceiling.
Pregunta 95: Correcto
10. What does "fault tolerance" refer to in a network infrastructure?
Options: A.
(Correcto)
Data minimization
(Incorrecto)
Data encryption
Data disposal
Access control
(Correcto)
Explicación
Access control is a security measure, not a principle of data handling. Data minimization,
data encryption, and data disposal are principles of proper data handling.
Pregunta 97: Correcto
Which social engineering attack relies on impersonating a trusted individual or authority
to manipulate the victim?
Whaling attack
(Correcto)
Phishing attack
Shoulder surfing attack
Explicación
A whaling attack targets high-profile individuals or authorities to deceive victims based
on trust.
Pregunta 98: Correcto
Which of the following is an example of Personal Identifiable Information (PII)?
A national ID number
(Correcto)
(Correcto)
(Incorrecto)
(Correcto)