CC Practice Quiz
CC Practice Quiz
2. Which term refers to the property of information being recorded, used, and maintained in a way that
ensures its completeness, accuracy, internal consistency, and usefulness for a stated purpose?
A) Confidentiality
B) Integrity
C) Availability
D) Disclosure
Answer: B
Integrity refers to the property of information being recorded, used, and maintained in a way that ensures
its completeness, accuracy, internal consistency, and usefulness for a stated purpose.
3. Which term refers to the property of systems and data being accessible at the time users need them?
A) Confidentiality
B) Integrity
C) Availability
D) Disclosure
Answer: C
Availability refers to the property of systems and data being accessible at the time users need them.
4. What is the term used to describe data about an individual that could be used to identify them?
A) Protected health information (PHI)
B) Sensitive information
C) Personally Identifiable Information (PII)
D) Confidential information
Answer: C - Personally Identifiable Information (PII)
5. What is the main challenge in achieving confidentiality when dealing with system users who may be
accessing the system from compromised machines or vulnerable mobile applications?
A) Regulating access to protect data
B) Balancing authorized access and data protection
C) Identifying sensitive information
D) Defending against external stakeholders
Answer: B - Balancing authorized access and data protection
6. What does sensitivity measure in terms of information?
A) The importance assigned to information by its owner
B) The level of confidentiality needed for the data
C) The degree of authorized access to the information
D) The vulnerability of the information to external stakeholders
Answer: A - The importance assigned to information by its owner
9. What is the term used to describe granting users access only after successfully demonstrating two or
more methods of authentication?
A) Single-factor authentication (SFA)
B) Multi-factor authentication (MFA)
C) Token-based authentication
D) Characteristic-based authentication
Answer: B) Multi-factor authentication (MFA)
10. Which of the following authentication methods is vulnerable to a variety of attacks and often requires
additional forms of authentication for better security?
A) Knowledge-based authentication
B) Token-based authentication
C) Characteristic-based authentication
D) Single-factor authentication (SFA)
Answer: A) Knowledge-based authentication
12. What is the purpose of non-repudiation methodologies in e-commerce and electronic transactions?
A) To ensure data integrity and confidentiality
B) To prevent unauthorized access to online transactions
C) To hold individuals responsible for their conducted transactions
D) To detect and mitigate fraudulent activities
Answer: C) To hold individuals responsible for their conducted transactions
14. Which legislation has multinational implications and applies to all organizations, foreign or domestic,
doing business in the European Union?
A) General Data Protection Regulation (GDPR)
B) United States privacy legislation
C) State-level privacy laws
D) Laws regarding data collection and use
Answer: A) General Data Protection Regulation (GDPR)
18. Which of the following is NOT a typical threat actor in the context of cybersecurity?
A) Insiders
B) Outside individuals or informal groups
C) Formal entities that are nonpolitical
D) Formal entities that are political
Answer: E) Customers and clients
19. Scenario: A business competitor targets a company's system vulnerabilities to gain a competitive
advantage. What type of threat actor does this scenario describe?
A) Insiders
B) Outside individuals or informal groups
C) Formal entities that are nonpolitical
D) Formal entities that are political
Answer: C) Formal entities that are nonpolitical
- In the scenario, a business competitor specifically targets a company's system vulnerabilities to gain a
competitive advantage. The fact that the threat actor is a business competitor suggests that they are a
formal entity involved in the same industry or market. They are motivated by gaining a competitive edge
over the company by exploiting the vulnerabilities in its systems. Furthermore, the scenario mentions that
the threat actor is nonpolitical, indicating that their actions are driven by business competition rather than
political motives. They are not affiliated with any political group or government entity. Therefore, based
on the information provided, the scenario describes a formal entity that is nonpolitical as the type of threat
actor targeting the company's system vulnerabilities.
20. Which of the following threat actors aims to achieve political objectives through exploiting system
vulnerabilities?
A) Insiders
B) Outside individuals or informal groups
C) Formal entities that are nonpolitical
D) Formal entities that are political
Answer: D) Formal entities that are political
21. Scenario: A group of hackers opportunistically discovers a vulnerability in a company's system and
decides to exploit it for personal gain. What type of threat actor does this scenario describe?
A) Insiders
B) Outside individuals or informal groups
C) Formal entities that are nonpolitical
D) Formal entities that are political
Answer: B) Outside individuals or informal groups
- In the scenario, a group of hackers opportunistically discovers a vulnerability in a company's system and
decides to exploit it for personal gain. The fact that they are external to the company and not formally
affiliated with it indicates that they are outside individuals or informal groups. These hackers do not have
authorized access to the system and are not part of the company's internal staff or formal
entities.Therefore, based on the information provided, the scenario describes an outside individuals or
informal groups as the type of threat actor involved in exploiting the vulnerability for personal gain.
25. Scenario: An organization's security team analyzes their organization from the perspective of a threat
actor to understand why they might be an attractive target. What is the goal of this analysis?
A) Identifying vulnerabilities
B) Decreasing vulnerability
C) Discouraging threat actors
D) Learning about threats
Answer: A) Identifying vulnerabilities
In the scenario, the organization's security team is analyzing their organization from the perspective of a
threat actor. By doing so, they aim to understand why they might be an attractive target. The goal of this
analysis is to identify vulnerabilities within the organization's systems or components. By viewing their
organization through the eyes of a potential threat actor, the security team can pinpoint weaknesses or
flaws that could be exploited. This analysis helps them uncover areas that require attention and
improvement in terms of security measures. Therefore, the primary objective of this analysis is to identify
vulnerabilities within the organization.
27. Scenario: A security team assesses a vulnerability and concludes that there is a high probability of it
being exploited due to the prevalence of similar attacks in the industry. What factor are they considering?
A) Likelihood
B) Impact
C) Subjective analysis
D) Magnitude of harm
Answer: A) Likelihood
Reasoning: In the scenario, the security team is considering the probability of the vulnerability being
exploited. They base this assessment on the prevalence of similar attacks in the industry, indicating that
there is a high likelihood of exploitation. This aligns with the definition of likelihood mentioned in the
provided information.
29. Scenario: A security team analyzes the potential consequences of a threat being realized and an event
occurring. They determine that the loss of information system availability would have severe financial
implications for the organization. What factor are they considering?
A) Likelihood
B) Impact
C) Subjective analysis
D) Magnitude of harm
Answer: B) Impact
Reasoning: In the scenario, the security team considers the likely results if a threat is realized and an
event occurs. Specifically, they focus on the severe financial implications that would result from the loss
of information system availability. This aligns with the definition of impact, which refers to the
magnitude of harm resulting from unauthorized actions.
30. What is the recurring process of identifying different possible risks, characterizing them, and
estimating their potential for disrupting the organization?
A) Risk communication
B) Risk assessment
C) Risk mitigation
D) Risk identification
Answer: D) Risk identification
31. Scenario: An employee notices loose wires at their desk and reports it to the security professional.
What is the responsibility of the employee in this scenario?
A) Risk communication
B) Risk assessment
C) Risk identification
D) Risk mitigation
Answer: C) Risk identification
Reasoning: In the scenario, the employee is responsible for identifying the risk of loose wires at their
desk. By noticing the loose wires and reporting it, they contribute to the process of risk identification.
33. Scenario: A security professional assists in risk assessment at a system level, focusing on process,
control, monitoring, or incident response and recovery activities. What is the role of the security
professional in this scenario?
A) Risk communication
B) Risk assessment
C) Risk identification
D) Risk mitigation
Answer: B) Risk assessment
Reasoning: In the scenario, the security professional is involved in risk assessment at a system level. They
focus on evaluating processes, controls, monitoring, and incident response and recovery activities to
assess the potential risks. This aligns with the role of conducting risk assessments mentioned in the
provided information.
35. Scenario: A risk assessment identifies fire as a potential risk to a building. Which mitigation method
would be most suitable to protect the systems in a data center?
A) Fire alarms
B) Sprinkler systems
C) Gas-based system
D) Evacuation plan
Answer: C) Gas-based system
Reasoning: In the scenario, it is mentioned that while sprinkler systems limit the fire's spread, they can
destroy all the systems and data in a data center. A gas-based system is the best solution to protect the
systems without causing damage. Therefore, a gas-based system would be the most suitable mitigation
method for protecting the systems in a data center.
36. What is the result of the risk assessment process often documented as?
A) Mitigation plan
B) Incident report
C) Risk register
D) Report or presentation
Answer: D) Report or presentation
37. When management requires a more in-depth or detailed risk assessment, who may perform it?
A) Employees at all levels of the organization
B) External consultants
C) Risk assessment team
D) Auditors or compliance officers
Answer: B) External consultants
38. What is risk avoidance in the context of risk treatment?
A) Eliminating the risk entirely
B) Accepting the risk without taking any action
C) Mitigating the possibility of a risk event
D) Transferring the risk to another party
Answer: A) Eliminating the risk entirely
39: Scenario: An organization decides to cease operation for certain activities that are exposed to a high-
risk area. What risk treatment option does this scenario represent?
A) Risk avoidance
B) Risk acceptance
C) Risk mitigation
D) Risk transference
Answer: A) Risk avoidance
Reasoning: In the scenario, the organization chooses to eliminate the risk entirely by ceasing operations
for the activities exposed to a high-risk area. This aligns with the definition of risk avoidance mentioned
in the provided information.
41. What is the most common type of risk management that involves taking actions to prevent or reduce
the possibility of a risk event or its impact?
A) Risk avoidance
B) Risk acceptance
C) Risk mitigation
D) Risk transference
Answer: C) Risk mitigation
42. Scenario: An organization establishes security controls, policies, procedures, and standards to
minimize adverse risk. What risk treatment option does this scenario represent?
A) Risk avoidance
B) Risk acceptance
C) Risk mitigation
D) Risk transference
Answer: C) Risk mitigation
Reasoning: In the scenario, the organization takes actions to prevent or reduce the possibility of a risk
event or its impact by establishing security controls, policies, procedures, and standards. This aligns with
the definition of risk mitigation mentioned in the provided information.
45. What type of risk treatment should always be in place, even if risk cannot be fully mitigated?
A) Risk avoidance
B) Risk acceptance
C) Risk mitigation
D) Risk transference
Answer: C) Risk mitigation
46. What is the purpose of conducting qualitative and quantitative risk analysis?
A) To determine the root causes of risks
B) To narrow down apparent risks and core risks
C) To prioritize and analyze core risks
D) To understand the organization's overall mission
Answer: C) To prioritize and analyze core risks
47. Scenario: A security team uses a risk matrix to determine the priority of risks based on their likelihood
of occurrence and impact. What does the risk matrix help identify?
A) Root causes of risks
B) Qualitative risk analysis
C) Priorities for risk response actions
D) Overall mission of the organization
Answer: C) Priorities for risk response actions
Reasoning: In the scenario, the risk matrix is used to determine the priority of risks. It helps identify
priorities as the intersection of likelihood of occurrence and impact. This aligns with the information
provided, which mentions that the risk matrix is used to determine a prioritized set of risk-response
actions.
48. What is one of the factors considered when assigning priority to risks?
A) Root causes of risks
B) Overall mission of the organization
C) Cost of mitigating a risk
D) Qualitative risk analysis
Answer: C) Cost of mitigating a risk
49. What can be used as a common language with management when determining the final priorities of
risks?
A) Qualitative risk analysis
B) Quantitative risk analysis
C) Risk matrix
D) Overall mission of the organization
Answer: C) Risk matrix
50. Scenario: An incident is identified with a high likelihood and high impact. How would this incident be
prioritized?
A) Low priority
B) Medium priority
C) High priority
D) No priority assigned
Answer: C) High priority
Reasoning: In the scenario, the incident is characterized by both a high likelihood and high impact.
According to the information provided, incidents with high likelihood and high impact are prioritized as
high priority risks.
51. What factors should organizations evaluate when making decisions based on risk priorities?
A) Likelihood and impact of the risk
B) Risk tolerance and liability
C) Executive management and board of directors
D) Concerns about specific natural disasters
Answer: A) Likelihood and impact of the risk
52. What is the role of executive management and the board of directors in determining risk tolerance?
A) Evaluating the likelihood and impact of risks
B) Planning for specific natural disasters
C) Determining risk priorities
D) Assessing liability and exposure to risks
Answer: C) Determining risk tolerance
55. Which type of security controls addresses process-based security needs using physical hardware
devices?
A) Physical controls
B) Technical controls
C) Administrative controls
D) None of the above
Answer: A) Physical controls
56. Scenario: Visitors and guests entering a workplace must pass through a designated entrance where
they can be identified and their purpose assessed. Which type of security controls is involved in this
scenario?
A) Physical controls
B) Technical controls
C) Administrative controls
D) None of the above
Answer: A) Physical controls
Reasoning: In the scenario, the process of visitors and guests entering a workplace through a designated
entrance involves physical controls, such as badge readers and identity management systems.
57. Which type of security controls are implemented directly by computer systems and networks?
A) Physical controls
B) Technical controls
C) Administrative controls
D) None of the above
Answer: B) Technical controls
58. Scenario: A computer system has configuration settings that restrict unauthorized access to data.
Which type of security controls does this scenario describe?
A) Physical controls
B) Technical controls
C) Administrative controls
D) None of the above
Answer: B) Technical controls
Reasoning: In the scenario, the configuration settings of the computer system directly implement controls
to restrict unauthorized access to data. This aligns with the definition of technical controls mentioned in
the provided information.
59. Which type of security controls provide frameworks, constraints, and standards for human behavior
within an organization?
A) Physical controls
B) Technical controls
C) Administrative controls
D) None of the above
Answer: C) Administrative controls
60. What is an example of an administrative control that can be an effective security measure?
A) Badge readers
B) Firewall settings
C) Security awareness policies
D) Hardware switches
Answer: C) Security awareness policies
70. How can administrative controls be integrated into an organization's activities and decision processes?
A) By providing in-context ready reference and advisory resources
B) By implementing physical security measures
C) By configuring technical controls
D) By using hardware settings
Answer: A) By providing in-context ready reference and advisory resources
71. Which type of controls can be managed through a software graphical user interface (GUI)?
A) Physical controls
B) Technical controls
C) Administrative controls
D) None of the above
Answer: B) Technical controls
72. How can administrative controls be made more operational and useful on a daily basis?
A) By implementing physical hardware devices
B) By integrating them into training activities
C) By configuring software settings
D) By linking them to technical controls
Answer: B) By integrating them into training activities
73. What is the relationship between regulations, standards, policies, and procedures?
A) Regulations provide a framework for standards, which guide the development of policies, which are
implemented through procedures.
B) Regulations guide the development of standards, which are implemented through policies and
procedures.
C) Regulations and standards are interchangeable terms that define policies and procedures.
D) Policies and procedures are used to enforce regulations and standards.
Answer: A) Regulations provide a framework for standards, which guide the development of policies,
which are implemented through procedures.
74. Scenario: The Health Insurance Portability and Accountability Act (HIPAA) in the United States
governs the use of protected health information (PHI) and imposes penalties for noncompliance. Which
element does HIPAA represent?
A) Regulation
B) Standard
C) Policy
D) Procedure
Answer: A) Regulation
Reasoning: In the scenario, HIPAA is mentioned as a law that governs the use of protected health
information and carries the possibility of fines and imprisonment for noncompliance. This aligns with the
definition of regulations provided in the information.
75. Which organization develops and publishes international standards on a variety of technical subjects,
including information systems and information security?
A) ISO
B) NIST
C) IEEE
D) IETF
Answer: A) ISO
76. Scenario: The National Institute of Standards and Technology (NIST) publishes technical standards
that are considered recommended standards by industries worldwide and are free to download. Which
element does NIST represent?
A) Regulation
B) Standard
C) Policy
D) Procedure
Answer: B) Standard
Reasoning: In the scenario, NIST is mentioned as a government agency that publishes technical standards,
which are considered recommended standards by industries worldwide and are available for free
download. This aligns with the definition of standards provided in the information.
77. Which organization sets standards for telecommunications, computer engineering, and similar
disciplines?
A) ISO
B) NIST
C) IEEE
D) IETF
Answer: C) IEEE
78.
What is the purpose of policies within an organization?
A) To establish context and strategic direction
B) To provide explicit, repeatable activities
C) To enforce regulations and standards
D) To measure the completion of tasks
Answer: A) To establish context and strategic direction
79. Scenario: High-level policies are used by senior executives to shape and control decision-making
processes within the organization. Which element does this scenario describe?
A) Regulation
B) Standard
C) Policy
D) Procedure
Answer: C) Policy
Reasoning: In the scenario, it is mentioned that high-level policies are used by senior executives to shape
and control decision-making processes. This aligns with the definition of policies provided in the
information.
78. Scenario: Procedures establish the explicit steps and instructions necessary to accomplish specific
tasks within an organization. Which element does this scenario describe?
A) Regulation
B) Standard
C) Policy
D) Procedure
Answer: D) Procedure
Reasoning: In the scenario, it is mentioned that procedures define explicit, repeatable activities necessary
to accomplish specific tasks and provide step-by-step instructions. This aligns with the definition of
procedures provided in the information.
79. Which element provides detailed steps to complete a task that supports organizational policies?
A) Regulation
B) Standard
C) Policy
D) Procedure
Answer: D) Procedure
80. Scenario: An organization must comply with regulations at the national, regional, and local levels.
Which level of regulation is typically the most restrictive?
A) National
B) Regional
C) Local
D) All levels are equally restrictive
Answer: A) National
Reasoning: In the scenario, it is mentioned that multinational organizations are subject to regulations at
multiple levels, and organizations need to consider the regulations that apply to their business at all levels.
Typically, national-level regulations carry the most restrictions.
81. Which organization develops and publishes technical standards in addition to information technology
and information security standards?
A) ISO
B) NIST
C) IEEE
D) IETF
Answer: B) NIST
82. Scenario: Computers communicate with each other across borders through communication protocols
defined by international standards. Which organization sets standards for communication protocols?
A) ISO
B) NIST
C) IEEE
D) IETF
Answer: D) IETF
Reasoning: In the scenario, it is mentioned that computers communicate through standards in
communication protocols. The Internet Engineering Task Force (IETF) sets standards for communication
protocols.
84. Scenario: Security awareness policies are implemented and integrated into training activities to shape
the behavior and activity of the workforce. Which element does this scenario describe?
A) Regulation
B) Standard
C) Policy
D) Procedure
Answer: C) Policy
Reasoning: In the scenario, it is mentioned that security awareness policies are implemented and
integrated into training activities to guide the behavior and activity of the workforce. This aligns with the
definition of policies provided in the information.
Reference Guide:
HIPAA: Health Insurance Portability and Accountability Act
GDPR: General Data Protection Regulation
ISO: International Organization for Standardization
NIST: National Institute of Standards and Technology
IEEE: Institute of Electrical and Electronics Engineers
IETF: Internet Engineering Task Force
86. Which entities do cybersecurity professionals who are members of ISC2 have a duty to, according to
the Canons?
A) Society, principals, and the common good
B) The infrastructure, legal responsibilities, and the profession
C) Public trust and confidence, the common good, and society
D) Competent service, the profession, and public safety
Answer: C) Public trust and confidence, the common good, and society
87. Which principle is emphasized in the Canons of the ISC2 Code of Ethics?
A) Diligent and competent service to principals
B) Advancement and protection of the profession
C) Honorable, honest, and responsible behavior
D) Protection of the infrastructure and legal responsibilities
Answer: A) Diligent and competent service to principals
88. Why is strict adherence to the ISC2 Code of Ethics a condition of certification?
A) To protect society and ensure public safety
B) To establish legal compliance in the profession
C) To promote the advancement of the cybersecurity field
D) To maintain the highest ethical standards of behavior
Answer: D) To maintain the highest ethical standards of behavior
Chapter 2: Incident Response, Business Continuity and Disaster Recovery Concepts
(42 questions)
3. An unauthorized individual gains access to a company's network and attempts to steal sensitive data.
What is this considered?
A) Event
B) Breach
C) Intrusion
D) Exploit
Answer: C) Intrusion. In this scenario, the unauthorized access to the network constitutes an intrusion by
an intruder attempting to gain access to the system without authorization.
13. Which component of the incident response plan involves developing a policy approved by
management?
A) Preparation
B) Detection and Analysis
C) Containment
D) Post-Incident Activity
Answer: A) Preparation. Developing a policy approved by management is a key component of the
preparation phase in the incident response plan.
14. Which component of the incident response plan focuses on monitoring all possible attack vectors?
A) Preparation
B) Detection and Analysis
C) Containment
D) Post-Incident Activity
Answer: B) Detection and Analysis. Monitoring all possible attack vectors is part of the detection and
analysis phase, where incidents are identified and analyzed.
15. Which component of the incident response plan involves gathering evidence and choosing an
appropriate containment strategy?
A) Preparation
B) Detection and Analysis
C) Containment
D) Post-Incident Activity
Answer: C) Containment. Gathering evidence and selecting the appropriate containment strategy are key
activities within the containment phase of the incident response plan.
16. Which component of the incident response plan involves documenting lessons learned and conducting
a retrospective analysis?
A) Preparation
B) Detection and Analysis
C) Containment
D) Post-Incident Activity
Answer: D) Post-Incident Activity. Documenting lessons learned and conducting a retrospective analysis
are part of the post-incident activity phase, which focuses on learning from the incident and improving
future response efforts.
17. During an incident response, the incident response team analyzes the available data and threat
intelligence to understand the nature of the incident and prioritize the response. Which component of the
incident response plan does this activity belong to?
A) Preparation
B) Detection and Analysis
C) Containment
D) Post-Incident Activity
Answer: B) Detection and Analysis. Analyzing the incident using known data and threat intelligence is
part of the detection and analysis phase, where the incident is further assessed and prioritized.
18. After identifying an incident, the incident response team determines the roles and responsibilities of
team members involved in the response effort. Which component of the incident response plan covers this
aspect?
A) Preparation
B) Detection and Analysis
C) Containment
D) Post-Incident Activity
Answer: A) Preparation. Identifying roles and responsibilities is an essential part of the preparation phase,
ensuring that all team members understand their roles during incident response.
19. During an incident response, the incident response team isolates the attack to prevent further damage
and limit the attacker's access. Which component of the incident response plan includes this activity?
A) Preparation
B) Detection and Analysis
C) Containment
D) Post-Incident Activity
Answer: C) Containment. Isolating the attack to prevent further damage falls under the containment phase
of the incident response plan.
22. After a security incident, an organization's incident response team assesses the damage caused by the
incident and identifies any compromised confidential information. Which primary responsibility of the
incident response team does this align with?
A) Determine the scope of damage caused by the incident
B) Determine whether any confidential information was compromised
C) Implement necessary recovery procedures
D) Supervise the implementation of additional security measures
Answer: B) Determine whether any confidential information was compromised during the incident.
Assessing the compromise of confidential information is one of the primary responsibilities of the
incident response team.
23. An incident response team is responsible for implementing necessary recovery procedures to restore
security and recover from incident-related damage. Which primary responsibility of the incident response
team does this align with?
A) Determine the scope of damage caused by the incident
B) Determine whether any confidential information was compromised
C) Implement necessary recovery procedures
D) Supervise the implementation of additional security measures
Answer: C) Implement necessary recovery procedures to restore security and recover from incident-
related damage. Implementing recovery procedures is one of the primary responsibilities of the incident
response team.
24. Which team members typically assist with investigating the incident, collecting evidence, and
reporting the incident?
A) Legal representatives
B) Public affairs/communications representatives
C) Engineering representatives
D) Information security professionals
Answer: D) Information security professionals. Information security professionals typically assist with
investigating the incident, collecting evidence, and reporting the incident as part of the incident response
team.
27. Why is it important to have critical contact numbers for the supply chain and external sites in a
business continuity plan?
A) To organize employee contact information for team-building activities
B) To establish communication with law enforcement agencies
C) To ensure smooth airline operations
D) To maintain essential activity and coordination during disruptions
Answer: D) To maintain essential activity and coordination during disruptions. Having critical contact
numbers for the supply chain and external sites allows for efficient communication and coordination with
key stakeholders in case of a disruption, ensuring that essential activities can continue and necessary
support can be obtained.
28. Which of the following is a common component of a comprehensive business continuity plan?
A) Detailed employee performance evaluation criteria
B) Inventory management procedures for office supplies
C) List of BCP team members and their contact information
D) Guidelines for decorating the office space
Answer: C) List of BCP team members and their contact information. Including a list of the BCP team
members and their contact information ensures effective communication and coordination during a
business disruption.
29. What is the purpose of immediate response procedures and checklists in a business continuity plan?
A) To determine employee vacation schedules
B) To establish fire suppression procedures
C) To monitor office supply inventory levels
D) To notify appropriate emergency-response agencies and initiate security and safety procedures
Answer: D) To notify appropriate emergency-response agencies and initiate security and safety
procedures. Immediate response procedures and checklists outline the necessary actions to be taken
during a business disruption, including security and safety procedures and notifying relevant emergency-
response agencies.
Scenario-based question:
30. In the scenario provided, why does the billing department remain in an alternate working area until a
new permanent area is available?
A) The company does not want to disrupt other areas of work
B) The billing department personnel prefer the alternate working area
C) The fire completely destroyed the original office space
D) The company wants to test the efficiency of the alternate working area
Answer: A) The company does not want to disrupt other areas of work. The scenario mentions that the
billing department's functions were identified as important but not immediately affecting other areas of
work. By remaining in the alternate working area until a new permanent area is available, the company
can continue its operations without causing unnecessary disruption to other departments.
31. What is the purpose of a Business Impact Analysis (BIA) in business continuity planning?
A) To evaluate employee job satisfaction levels
B) To assess the financial performance of the company
C) To identify critical functions and their dependencies
D) To analyze customer demographics and preferences
Answer: C) To identify critical functions and their dependencies. A Business Impact Analysis (BIA) is
conducted to identify the critical functions within an organization and understand their dependencies on
other processes and resources.
32. In the scenario provided, why does the company have an alternative area for the billing department to
work?
A) To test the company's fire suppression systems
B) To accommodate an increase in billing inquiries
C) To prevent disruption in customer billing operations
D) To allow personnel to work remotely
Answer: C) To prevent disruption in customer billing operations. The scenario mentions that the company
has an alternative area for the billing department to work in order to ensure continuity in customer billing
operations despite the loss of the original office space due to the fire.
33. What is the significance of having ample cash reserves in the scenario?
A) To invest in office equipment upgrades
B) To provide employee performance bonuses
C) To cover the costs of temporary office space
D) To expand the company's product offerings
Answer: C) To cover the costs of temporary office space. Having ample cash reserves allows the company
to finance the expenses associated with setting up and operating the temporary office space for the billing
department during the transition period.
35. Which aspect of business operations does disaster recovery planning specifically focus on?
A) Maintaining critical business functions
B) Managing financial resources
C) Enhancing customer satisfaction
D) Restoring IT and communications services
Answer: D) Restoring IT and communications services. Disaster recovery planning is specifically focused
on restoring IT and communications services to ensure the organization can resume normal operations
after a disruption.
36. Why is it important for an organization to have backups of critical systems that are regularly tested?
A) To comply with industry regulations
B) To prevent any incidents from occurring
C) To ensure immediate detection of incidents
D) To enable efficient recovery and restoration of systems
Answer: D) To enable efficient recovery and restoration of systems. Regularly tested backups of critical
systems are important because they provide a means to restore the systems efficiently and effectively in
the event of an incident or disruption.
37. What is the relationship between business continuity planning and disaster recovery planning?
A) They are synonymous terms that refer to the same process
B) Business continuity planning focuses on IT recovery, while disaster recovery planning focuses on
overall business operations
C) Business continuity planning ensures the safety of employees, while disaster recovery planning
restores critical systems
D) Business continuity planning maintains critical business functions, while disaster recovery planning
focuses on restoring IT and communications services
Answer: D) Business continuity planning maintains critical business functions, while disaster recovery
planning focuses on restoring IT and communications services. Business continuity planning and disaster
recovery planning are related but have different focuses. Business continuity planning ensures the
continuity of critical business functions, while disaster recovery planning specifically addresses the
recovery of IT and communications services.
38. Why is it important to promptly detect incidents, even if they may not be immediately recognized or
detected?
A) To avoid disruptions to business activities
B) To initiate the disaster recovery plan
C) To mitigate potential damages and losses
D) To test the effectiveness of the backup systems
Answer: C) To mitigate potential damages and losses. Prompt detection of incidents, even if not
immediately recognized, allows the organization to take appropriate actions to mitigate potential damages
and losses. By identifying incidents early, the organization can activate the necessary response measures
and prevent further negative impacts.
39. Which document provides a high-level overview of the disaster recovery plan (DRP)?
A) Department-specific plans
B) Technical guides for IT personnel
C) Executive summary
D) Checklists for critical team members
Answer: C) Executive summary. The executive summary provides a concise high-level overview of the
disaster recovery plan, summarizing its key components and objectives for executive-level stakeholders.
40. Who would typically utilize technical guides in a disaster recovery plan?
A) Department-specific personnel
B) Critical team members
C) Public relations personnel
D) IT personnel responsible for backup systems
Answer: D) IT personnel responsible for backup systems. Technical guides are designed to assist IT
personnel in implementing and maintaining critical backup systems during the disaster recovery process.
41. Why do critical disaster recovery team members require checklists in a disaster situation?
A) To ensure effective communication with the public
B) To guide their actions amid the chaotic atmosphere of a disaster
C) To maintain department-specific operations
D) To troubleshoot technical issues during recovery
Answer: B) To guide their actions amid the chaotic atmosphere of a disaster. Checklists provide critical
disaster recovery team members with a structured framework and specific tasks to follow during a
disaster situation. This helps ensure that essential actions are taken promptly and efficiently despite the
challenging and hectic environment.
42. Why do managers and public relations personnel require simple-to-follow, high-level documents in a
disaster recovery plan?
A) To troubleshoot technical issues during recovery
B) To maintain department-specific operations
C) To facilitate effective communication about the issue
D) To guide their actions amid the chaotic atmosphere of a disaster
Answer: C) To facilitate effective communication about the issue. Managers and public relations
personnel need simple-to-follow, high-level documents that accurately communicate the issue without
requiring extensive input from busy team members working on the recovery. These documents enable
clear and concise communication with internal and external stakeholders, helping manage the perception
and impact of the disaster.
Chapter 3: Access Control Concepts (93 questions)
7. A user attempts to access a highly confidential file. The access control rule validates the user's identity
and determines that only users with specific privileges can access the file. What does this scenario
demonstrate?
A) Applying attribute-based access control
B) Enforcing role-based access control
C) Implementing discretionary access control
D) Utilizing mandatory access control
Answer: B) Enforcing role-based access control. In this scenario, the access control rule validates the
user's identity and determines their role or privileges to access the highly confidential file. This
demonstrates the use of role-based access control, where access decisions are based on the user's assigned
role or position within the organization.
8. A firewall is configured with access control rules that allow traffic from the internal network to the
external network but block incoming traffic from the outside. What is the purpose of these rules?
A) Prevent unauthorized access from the outside
B) Enable communication between internal and external networks
C) Protect internal resources from external threats
D) Enforce network segmentation
Answer: C) Protect internal resources from external threats. The access control rules in the firewall
configuration are designed to prevent unauthorized access from the outside network, thereby protecting
the internal resources from potential external threats. These rules restrict inbound traffic while allowing
outbound communication.
12. An organization assigns different levels of access to its employees based on their roles and
responsibilities. For example, managers have access to financial data, while regular employees do not.
Which access control model is being applied?
A) Discretionary access control
B) Attribute-based access control
C) Role-based access control
D) Rule-based access control
Answer: C) Role-based access control. In this scenario, the organization is applying role-based access
control (RBAC). RBAC grants access permissions based on the roles or positions individuals hold within
the organization. Employees are assigned roles, and access rights are associated with those roles, ensuring
that users have access privileges aligned with their specific responsibilities.
13. In the scenario of repurposing an office building for use as a secure storage facility, why is it
important to conduct a site assessment before implementing controls?
A) To determine the value of what is being protected
B) To evaluate the effectiveness of the controls
C) To assess the physical security requirements of the area
D) To align the cost of implementing controls with the level of protection needed
Answer: C) To assess the physical security requirements of the area. Conducting a site assessment helps
determine the specific physical security measures needed for the repurposed area, such as installing
biometric scanners on doors. It allows the organization to evaluate the existing infrastructure, identify
vulnerabilities, and determine the appropriate controls to secure the area effectively.
15. Which authentication mechanism demonstrates the principle of defense in depth by utilizing two
layers of authentication?
A) Password-based authentication
B) Biometric authentication
C) Multi-factor authentication
D) Single sign-on authentication
Answer: C) Multi-factor authentication. Multi-factor authentication requires users to provide multiple
factors to verify their identity, typically combining something they know (e.g., password) with something
they have (e.g., a code sent to their phone) or something they are (e.g., biometric data). By combining two
or more layers of authentication, it adds an extra layer of security and aligns with the principle of defense
in depth.
16. In a multi-layered defense strategy, how can firewalls be utilized to implement defense in depth?
A) By preventing all network traffic from reaching trusted networks
B) By isolating untrusted networks from trusted networks
C) By encrypting all network communications
D) By providing physical barriers to data centers
Answer: B) By isolating untrusted networks from trusted networks. Firewalls can be used as a part of
defense in depth by separating untrusted networks with different security requirements from trusted
networks. By enforcing access control rules and filtering network traffic, firewalls create an additional
layer of protection to prevent unauthorized access and limit the impact of potential security breaches.
21. In a healthcare environment, what is an example of applying the Principle of Least Privilege?
A) All employees have access to patient and medical data.
B) Workers have access to patient data but not their medical data.
C) Individual doctors have access to all patient data.
D) Only IT administrators have access to patient records.
Answer: B) Workers have access to patient data but not their medical data. Applying the Principle of
Least Privilege in a healthcare environment involves granting access to specific subsets of patient data
based on job roles. Workers may have access to patient data for their assigned tasks but not to more
sensitive medical data. This ensures that access is limited to what is necessary for employees to fulfill
their responsibilities and protects the confidentiality of medical information.
22. What are some measures used to mitigate risks associated with privileged accounts?
A) Limited logging and access control.
B) Stricter authentication for non-privileged users.
C) Regular background checks and financial investigation.
D) Auditing regular user accounts more extensively.
Answer: C) Regular background checks and financial investigation. Mitigating risks associated with
privileged accounts involves implementing measures such as regular background checks, stricter
nondisclosure agreements, and financial investigations for privileged account holders. These measures
help ensure the trustworthiness of individuals with elevated privileges and reduce the potential for misuse
or abuse of those privileges.
23. How can the Help Desk role adhere to the Principle of Least Privilege?
A) Granting Help Desk personnel unrestricted access to the Windows domain.
B) Requiring Help Desk personnel to have administrative access to all systems.
C) Providing Help Desk personnel with specific permissions for password resets.
D) Allowing Help Desk personnel to change user information in the Windows domain.
Answer: C) Providing Help Desk personnel with specific permissions for password resets. Adhering to
the Principle of Least Privilege in the Help Desk role involves granting personnel specific permissions
necessary for their tasks, such as the ability to reset passwords. By assigning only the required privileges,
such as "password reset" permissions, and logging and auditing these actions, the Help Desk personnel
can fulfill their responsibilities effectively while minimizing the risk associated with broader
administrative access to the Windows domain.
27. In a defense in depth approach, what is an example of implementing multiple layers of technical
controls?
A) Requiring username and password authentication for accessing an account.
B) Using firewalls to separate untrusted networks from sensitive data.
C) Conducting background checks for privileged account holders.
D) Monitoring and auditing regular user account activities.
Answer: B) Using firewalls to separate untrusted networks from sensitive data. In a defense in depth
approach, implementing multiple layers of technical controls involves using additional firewalls to
separate untrusted networks from sensitive data. By applying multiple layers of firewall rules and
segmentation, organizations can enhance security by restricting unauthorized access from untrusted
networks to critical systems or data repositories.
29. How can the Principle of Least Privilege enhance information security?
A) By granting users unrestricted access to all systems.
B) By allowing users to have administrative privileges.
C) By restricting access to only what is necessary for users to perform their tasks.
D) By providing users with excessive privileges for flexibility.
Answer: C) By restricting access to only what is necessary for users to perform their tasks. The Principle
of Least Privilege enhances information security by limiting user access to the minimum privileges
required for their specific job roles. This reduces the attack surface and potential impact of unauthorized
actions. By implementing this principle, organizations can mitigate the risks associated with excessive
privileges and unauthorized access to sensitive systems and data.
30. In a healthcare environment, why is implementing the Principle of Least Privilege crucial?
A) It ensures unrestricted access to all patient data for all healthcare staff.
B) It prevents doctors from accessing data related to their own patients.
C) It allows workers to have access to both patient and medical data.
D) It complies with regulations like HIPAA to protect patient privacy.
Answer: D) It complies with regulations like HIPAA to protect patient privacy. In a healthcare
environment, implementing the Principle of Least Privilege is crucial to comply with regulations such as
HIPAA (Health Insurance Portability and Accountability Act). It ensures that access to patient data is
restricted to authorized personnel who have a legitimate need to know. By implementing least privilege,
organizations can safeguard patient privacy and protect sensitive healthcare information from
unauthorized access or disclosure.
31. Scenario: In a company, an employee submits an invoice for payment to a vendor. However, the
invoice must be approved by a manager before payment. This is an example of:
a) Dual control
b) Segregation of duties
c) Two-person integrity
d) Authentication
Answer: b) Segregation of duties
Reasoning: Segregation of duties ensures that different individuals are responsible for different parts of a
transaction, reducing the risk of fraud or errors. In this scenario, the employee's role is to submit the
invoice, while the manager's role is to approve it, creating a separation of duties.
32. A bank has two separate combination locks on the door of its vault. No single person knows both
combinations. This is an example of:
a) Dual control
b) Two-person rule
c) Segregation of duties
d) Authorization
Answer: a) Dual control
Reasoning: Dual control is implemented when two or more individuals must work together to perform a
high-security task. In this scenario, two separate combinations are required to open the vault, and each
combination is known by different individuals, ensuring that no single person has full access to the vault.
33. When a user attempts to delete a file, the system checks the user's permissions to see if they are
authorized to perform the action. This is an example of:
a) Authentication
b) Authorization
c) Segregation of duties
d) Provisioning
Answer: b) Authorization
Reasoning: Authorization is the process of determining whether a subject (user) has the necessary
permissions to perform a specific action on an object (file). In this scenario, the system checks the user's
permissions to determine if they are authorized to delete the file.
34. A new employee is hired in a company. The hiring manager requests the creation of a new user ID and
provides instructions on appropriate access levels. This is an example of:
a) Two-person integrity
b) Segregation of duties
c) Provisioning
d) Dual control
Answer: c) Provisioning
Reasoning: Provisioning refers to the process of creating new user accounts or changing privileges for
users. In this scenario, the hiring manager requests the creation of a new user ID for the new employee,
specifying the appropriate access levels.
35. An employee leaves the company, and their account needs to be disabled and removed from security
roles and access profiles. This is an example of:
a) Dual control
b) Segregation of duties
c) Separation of employment
d) Two-person integrity
Answer: c) Separation of employment
Reasoning: Separation of employment refers to the process of handling user accounts when employees
leave the company. In this scenario, the employee's account is disabled after their termination date and
time, and it is removed from security roles and access profiles to ensure they can no longer access
company data.
36. Which of the following is a core element of the principle of least privilege?
a) Dual control
b) Segregation of duties
c) Two-person integrity
d) Authorization
Answer: b) Segregation of duties
Reasoning: The principle of least privilege emphasizes that no one person should have complete control
over high-risk transactions. Segregation of duties breaks down transactions into separate parts, requiring
different individuals to execute each part, reducing the risk of fraud or errors.
37. In an organization, a sensitive financial operation requires two employees to work together and
provide their respective credentials to complete the transaction. This is an example of:
a) Dual control
b) Segregation of duties
c) Two-person rule
d) Authorization
Answer: a) Dual control
Reasoning: Dual control is implemented when two or more individuals must work together to perform a
high-security task. In this scenario, two employees are required to collaborate and provide their
credentials, ensuring that no single person can complete the transaction alone.
38. When determining appropriate access levels, which process confirms the identity of a subject?
a) Authentication
b) Authorization
c) Provisioning
d) Segregation of duties
Answer: a) Authentication
Reasoning: Authentication is the process of confirming the identity of a subject (user). It ensures that the
user is who they claim to be before the system checks their authorization to determine if they are allowed
to perform specific actions.
39. An employee is promoted to a higher position within the company. Their access rights and privileges
are adjusted to align with their new role, and any unnecessary access is removed. This is an example of:
a) Authorization
b) Provisioning
c) Separation of duties
d) Segregation of duties
Answer: a) Authorization
Reasoning: Authorization involves granting or adjusting access rights and privileges based on the specific
role and responsibilities of an individual. In this scenario, the employee's access rights are modified to
align with their new position, ensuring they have the appropriate level of access and removing any
unnecessary access.
41. A company installs a fence around its premises and installs motion detectors and cameras to monitor
the perimeter. What type of physical security controls are being implemented?
a) Access control systems
b) Biometric scanners
c) Intrusion detection systems
d) Physical barriers and surveillance systems
Answer: d) Physical barriers and surveillance systems
Reasoning: By installing a fence, motion detectors, and cameras, the company is creating physical
barriers and implementing surveillance systems to prevent unauthorized access and monitor the perimeter
for any potential intrusions.
44. An organization uses mantraps and turnstiles at the entrance of its data center. This security measure is
primarily aimed at:
a) Monitoring network traffic and detecting cyber threats
b) Securing data stored in the data center
c) Controlling and monitoring the physical access of individuals
d) Enforcing strong passwords and encryption protocols
Answer: c) Controlling and monitoring the physical access of individuals
Reasoning: Mantraps and turnstiles are physical access control mechanisms that restrict and monitor the
entry and exit of individuals into a specific area. They help control and monitor physical access to the
data center, ensuring that only authorized personnel can enter.
46. An organization uses turnstiles at the entrance of its office building. This physical access control
mechanism primarily serves to:
a) Monitor network traffic and detect cybersecurity threats
b) Authenticate the identity of individuals entering the building
c) Control and limit the flow of human traffic into the building
d) Enforce strong passwords and encryption protocols
Answer: c) Control and limit the flow of human traffic into the building
Reasoning: Turnstiles are physical access control mechanisms designed to control the entry of individuals
into a building by allowing only one person to pass at a time. They help regulate and restrict the flow of
human traffic, ensuring that only authorized personnel can enter.
47. Which of the following is NOT an example of a card type used in access control systems?
a) Bar code
b) Magnetic stripe
c) RFID
d) Bluetooth
Answer: d) Bluetooth
Reasoning: Bluetooth is a wireless communication technology and is not typically used as a card type in
access control systems. Bar codes, magnetic stripes, and RFID (proximity) cards are commonly used for
identification and access control purposes.
48. Why is Crime Prevention through Environmental Design (CPTED) important for physical security?
a) It focuses on creating safer workspaces through passive design elements
b) It prevents unauthorized access to digital systems and networks
c) It enhances user authentication and authorization processes
d) It mitigates cybersecurity risks and threats
Answer: a) It focuses on creating safer workspaces through passive design elements
Reasoning: CPTED is an approach that aims to create secure physical environments by incorporating
passive design elements. It focuses on factors such as space layout, visibility, and natural surveillance to
deter criminal activities and enhance overall security.
49. An organization implements a biometric authentication system that scans employees' fingerprints for
access control. This is an example of:
a) Physiological biometrics
b) Behavioral biometrics
c) Multi-factor authentication
d) RFID-based authentication
Answer: a) Physiological biometrics
Reasoning: Scanning fingerprints for authentication falls under physiological biometrics. Physiological
biometrics measure unique physical characteristics of individuals, such as fingerprints, iris patterns, or
palm scans, to verify their identity.
50. What are the two processes involved in a biometric authentication solution?
a) Registration and validation
b) Identification and verification
c) Enrollment and verification
d) Authorization and authentication
Answer: c) Enrollment and verification
51. A company is considering implementing a biometric authentication system for its employees.
However, there are concerns about the cost and user privacy. Which of the following is a potential
drawback of biometric systems?
a) High implementation and maintenance costs
b) Limited accuracy compared to other authentication methods
c) Incompatibility with existing access control systems
d) Lack of user acceptance and privacy concerns
Answer: a) High implementation and maintenance costs
Reasoning: Biometric systems can be expensive to implement and maintain due to the cost of equipment
and the need to register all users. Additionally, user acceptance and privacy concerns may arise, impacting
the overall adoption of biometric authentication.
52. Which physical access control mechanism requires at least two individuals to be present for entry into
a high-security area?
a) Biometric scanners
b) Security cameras
c) Mantraps
d) Turnstiles
Answer: c) Mantraps
53. A company wants to ensure that only authorized personnel can access its server room. Which physical
access control mechanism is most suitable for this purpose?
a) Security guards
b) Fences
c) Biometric scanners
d) Locked doors/gates
Answer: d) Locked doors/gates
Reasoning: Locked doors/gates provide a physical barrier and allow access only to authorized individuals
who possess the necessary keys or access codes.
54. What is the primary purpose of using motion detectors as physical access controls?
a) To monitor network traffic and detect cybersecurity threats
b) To track the movement of personnel within a facility
c) To control and limit the entry of individuals into a building
d) To deter unauthorized access and trigger alarms
Answer: d) To deter unauthorized access and trigger alarms
55. An organization installs surveillance cameras throughout its premises to monitor and record activities.
This physical access control mechanism primarily serves to:
a) Monitor network traffic and detect cybersecurity threats
b) Authenticate the identity of individuals entering the building
c) Control and limit the flow of human traffic into the building
d) Monitor and provide evidence of security incidents or violations
Answer: d) Monitor and provide evidence of security incidents or violations
Reasoning: Surveillance cameras are used to monitor activities, record incidents, and provide evidence in
case of security breaches or violations.
56. What is the purpose of using laptop locks as physical access controls?
a) To prevent unauthorized access to computer systems
b) To secure laptops and prevent theft or unauthorized removal
c) To control and monitor network traffic
d) To enforce strong passwords and encryption protocols
Answer: b) To secure laptops and prevent theft or unauthorized removal
57. An organization uses swipe cards to control access to various areas within its facility. This physical
access control mechanism primarily serves to:
a) Authenticate the identity of individuals entering the building
b) Monitor and record access activity for audit purposes
c) Control and limit access to specific areas based on user permissions
d) Trigger alarms and alerts in case of unauthorized access attempts
Answer: c) Control and limit access to specific areas based on user permissions
Reasoning: Swipe cards are commonly used in access control systems to grant or restrict access to
specific areas based on user permissions and clearances.
58. Which physical access control mechanism provides an extra layer of security by requiring both a
physical card and a personal identification number (PIN) for authentication?
a) Mantraps
b) Biometric scanners
c) Smart cards
d) Turnstiles
Answer: c) Smart cards
60. What is the primary purpose of using cameras in a physical security program?
a) To monitor network traffic
b) To authenticate user identities
c) To provide evidence after an activity
d) To control access to specific areas
Answer: c) To provide evidence after an activity
61. A company wants to monitor the perimeter of its facility for any potential intruders. Which technology
can be effective for detecting intruders attempting to breach the fence line?
a) Motion sensors
b) Security guards
c) Surveillance cameras
d) Turnstiles
Answer: a) Motion sensors
Reasoning: Motion sensors, such as infrared, microwave, and laser sensors, can detect if someone
attempts to breach the fence line or gain access across open space.
63. An organization has a policy to review logs regularly as part of its security program. What should be
established and followed regarding log retention?
a) Logs should be retained indefinitely
b) Logs should be retained for one year
c) Logs should be retained for six months
d) Logs should be retained based on legal and business requirements
Answer: d) Logs should be retained based on legal and business requirements
Reasoning: Log retention should be based on business and legal requirements, which may vary among
economies, countries, and industries.
68. A fire alarm system is activated by heat or smoke at a sensor. What is the likely outcome of a fire
alarm being triggered?
a) It will contact local response personnel and the fire department.
b) It will authenticate user identities for access control.
c) It will trigger a panic button alert.
d) It will monitor network traffic.
Answer: a) It will contact local response personnel and the fire department.
70. An organization wants to monitor the access to certain areas within its facility. Which physical access
control mechanism is commonly used to assign and activate access control devices?
a) Motion sensors
b) Security guards
c) Badge systems
d) Panic buttons
Answer: c) Badge systems
Reasoning: Badge systems are commonly used to assign and activate access control devices, such as
badges or cards, to authorize access to specific areas within a facility.
71. What is the purpose of integrating cameras into a physical security program?
a) To authenticate user identities
b) To control access to physical areas
c) To monitor network traffic
d) To provide surveillance, deterrence, and evidence gathering
Answer: d) To provide surveillance, deterrence, and evidence gathering
Integration of cameras into a physical security program enables surveillance, acts as a deterrent to
criminal activity, and provides evidence gathering capabilities after an activity occurs.
73. In an organization, employees are required to enter a password to log in to their computer systems.
Which type of logical access control is being used?
a) Biometrics
b) Badge/token readers
c) Passwords
d) Rule-based access control
Answer: c) Passwords
Reasoning: Passwords are a common form of logical access control where users must provide a secret
combination of characters to authenticate their identity and gain access to systems.
74. In a secure facility, employees use their access badges to authenticate their identity and gain access to
specific areas. What type of logical access control is being used?
a) Biometrics
b) Passwords
c) Badge/token readers
d) Rule-based access control
Answer: c) Badge/token readers
Reasoning: Badge/token readers are electronic tools that read access badges or tokens to authenticate an
individual's identity and grant logical access to specific areas or assets.
76. In a UNIX environment with discretionary access control (DAC) in place, Steve has created a file and
granted Aidan permission to access and modify it. What does this scenario demonstrate?
a) The principle of least privilege
b) Rule-based access control
c) Discretionary access control (DAC)
d) Role-based access control (RBAC)
Answer: c) Discretionary access control (DAC)
Reasoning: The scenario illustrates how in a DAC system, users can establish or change permissions on
files they create or own, giving them discretion over access control decisions.
77. Which data structure is commonly used in DAC systems to map subjects to objects and their
respective permissions?
a) Access control matrix
b) Capabilities list
c) Access control list
d) Permission table
Answer: c) Access control list
80. In a DAC system, an employee has created a sensitive document and decides to share it with a
colleague. What does this scenario demonstrate?
a) Discretionary Access Control (DAC)
b) Mandatory Access Control (MAC)
c) Role-based Access Control (RBAC)
d) Rule-based Access Control
Answer: a) Discretionary Access Control (DAC)
Reasoning: In a DAC system, the asset owner has the discretion to share files or grant access to other
individuals based on their judgment and permissions.
81. What is the primary difference between Mandatory Access Control (MAC) and Discretionary Access
Control (DAC)?
a) MAC relies on security administrators to assign access rights, while DAC allows asset owners to make
access control decisions.
b) MAC enforces uniform access control policies, while DAC allows individual decision-making on
access.
c) MAC restricts access based on government policies, while DAC grants access based on an individual's
judgment.
d) MAC provides role-based access control, while DAC uses rule-based access control.
Answer: a) MAC relies on security administrators to assign access rights, while DAC allows asset owners
to make access control decisions.
82. In a government agency, personnel are granted access to specific areas based on their security
clearance. What access control model is being used?
a) Role-based Access Control (RBAC)
b) Rule-based Access Control
c) Discretionary Access Control (DAC)
d) Mandatory Access Control (MAC)
Answer: d) Mandatory Access Control (MAC)
Reasoning: In the scenario, access to certain areas is determined by the security clearance level set by
government policies, demonstrating the use of MAC.
83. What is one characteristic of Mandatory Access Control (MAC) in the workplace?
a) Individual decision-making on access control
b) Asset owners determining access based on their judgment
c) Enforcement of access control rules by security administrators
d) Separation of duties facilitated by role-based access control
Answer: c) Enforcement of access control rules by security administrators
84. In a workplace with MAC in place, employees have limited access based on their specific roles and
responsibilities. What access control principle is being applied?
a) Discretionary Access Control (DAC)
b) Separation of duties
c) Role-based Access Control (RBAC)
d) Rule-based Access Control
Answer: b) Separation of duties
Reasoning: The scenario mentions that employees have limited access and that someone else handles
information that does not concern them. This indicates the application of separation of duties, which can
be facilitated by RBAC.
85. In a Mandatory Access Control (MAC) system, who has the authority to modify security rules for
subjects and objects?
a) Asset owners
b) Individual users
c) Security administrators
d) System administrators
Answer: c) Security administrators
86. What is the primary concept behind Role-Based Access Control (RBAC)?
a) Assigning access based on individual user permissions
b) Setting up user permissions based on roles
c) Enforcing access control rules uniformly
d) Granting access based on discretionary decisions
Answer: b) Setting up user permissions based on roles
87. In an organization, only the Human Resources staff have access to personnel files. Which access
control model is being implemented?
a) Role-Based Access Control (RBAC)
b) Discretionary Access Control (DAC)
c) Mandatory Access Control (MAC)
d) Rule-Based Access Control
Answer: a) Role-Based Access Control (RBAC)
Reasoning: In the scenario, access to personnel files is granted based on the role of being part of the
Human Resources staff, demonstrating the use of RBAC.
88. What is the potential risk of privilege creep in a role-based access control system?
a) Unauthorized access to sensitive information
b) Inadequate access permissions for employees
c) Limited flexibility in assigning roles
d) Excessive administrative overhead
Answer: a) Unauthorized access to sensitive information
89. A junior worker's permissions are temporarily expanded to act as a department manager. What
potential issue can occur if their permissions are not changed back?
a) Privilege creep
b) Access control misconfiguration
c) Role mismatch
d) Insufficient access privileges
Answer: a) Privilege creep
Reasoning: If the junior worker's permissions are not reverted when a new manager is hired, they may
retain access to sensitive information beyond their intended role, leading to privilege creep.
90. What is a best practice when provisioning new users in an RBAC system?
a) Copy user profiles from existing users
b) Grant full administrative privileges to new users
c) Establish standard roles and create new users based on those roles
d) Assign permissions based on individual user requirements
Answer: c) Establish standard roles and create new users based on those roles
91. A new employee joins the organization. How should their roles and permissions be assigned in an
RBAC system?
a) Based on their individual preferences
b) According to their job title and responsibilities
c) Randomly assigned to ensure fairness
d) Mirroring the roles and permissions of an existing employee
Answer: b) According to their job title and responsibilities
Reasoning: Roles and permissions in an RBAC system should be assigned based on the new employee's
job title and responsibilities to ensure appropriate access levels.
92. What is the potential challenge in maintaining RBAC with extremely granular roles and permissions?
a) Difficulty in assigning roles to users
b) Inefficient management of access control lists
c) Increased risk of privilege creep
d) Limited scalability of the RBAC system
Answer: b) Inefficient management of access control lists
93. What is the recommended approach for managing RBAC when an employee is promoted?
a) Assign additional roles to the employee
b) Remove the employee's existing roles and assign new ones
c) Retain the employee's existing roles and permissions
d) Review and update the employee's roles and permissions based on their new responsibilities
Answer: d) Review and update the employee's roles and permissions based on their new responsibilities
Chapter 4: Network Security (296 questions)
1. What is a network?
a. A single computer
b. Two or more computers linked together
c. A geographical area with multiple computers
d. A wireless connection between devices
Answer: b. Two or more computers linked together
3. What is the term for the long-distance connections between geographically remote networks?
a. Local area network (LAN)
b. Wide area network (WAN)
c. Metropolitan area network (MAN)
d. Personal area network (PAN)
Answer: b. Wide area network (WAN)
4. Which network device is used to connect multiple devices and is less intelligent than switches or
routers?
a. Hubs
b. Switches
c. Routers
d. Firewalls
Answer: a. Hubs
6. In a network setup, you need to control traffic flow between different networks. Which network device
should you use?
a. Hubs
b. Switches
c. Routers
d. Firewalls
Answer: c. Routers
Reasoning: Routers are used to control traffic flow between networks and are specifically designed for
that purpose.
9. An employee is trying to access a file stored on a server from their desktop workstation. What are the
endpoints in this communication?
a. Hubs and switches
b. Routers and firewalls
c. Servers and endpoints
d. Workstations and servers
Answer: c. Servers and endpoints
Reasoning: The server is one end of the communication link, where the resource resides, and the desktop
workstation is the client making the request, representing the other end.
14. Which network device is responsible for determining the most efficient route for traffic flow across a
network?
a. Hubs
b. Switches
c. Routers
d. Firewalls
Answer: c. Routers
17. What is the term for the ends of a network communication link?
a. Hubs
b. Switches
c. Routers
d. Endpoints
Answer: d. Endpoints
18. A network administrator wants to segment their network to improve security and performance. Which
network device can create separate broadcast domains and aid in segmentation?
a. Hubs
b. Switches
c. Routers
d. Firewalls
Answer: b. Switches
Reasoning: Switches can create VLANs (Virtual LANs), which enable the segmentation of a network into
separate broadcast domains, improving security and performance.
19. Which standard defines the format of data transmission over wired connections in a network?
a. Ethernet (IEEE 802.3)
b. Media Access Control (MAC) Address
c. Internet Protocol (IP) Address
d. Wide Area Network (WAN)
Answer: a. Ethernet (IEEE 802.3)
20. What is the purpose of a Media Access Control (MAC) address in networking?
a. Defining wired connections between devices
b. Filtering network traffic
c. Assigning logical IP addresses to devices
d. Identifying a device's physical network interface
Answer: d. Identifying a device's physical network interface
23. Which network device is typically deployed between a private network and the internet to filter
traffic?
a. Hubs
b. Switches
c. Routers
d. Firewalls
Answer: d. Firewalls
24. Which layer of the OSI model is responsible for managing the integrity of a connection and
controlling the session between two computers?
a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
Answer: c. Session Layer
25. What is the primary responsibility of the lower layer in the network model?
a. Managing the integrity of a connection
b. Controlling the session between two computers
c. Transforming data into a format that any system can understand
d. Receiving bits from the physical connection medium and converting them into a frame
Answer: d. Receiving bits from the physical connection medium and converting them into a frame
26. You are troubleshooting a network issue and need to ensure that the connection between two
computers is stable and well-controlled. Which layer of the OSI model should you focus on?
a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
Answer: c. Session Layer
Reasoning: The session layer is responsible for managing the integrity of a connection and controlling the
session between two computers. By focusing on this layer, you can ensure that the connection is stable
and well-controlled.
27. Which layer of the OSI model is responsible for adding destination addresses to the data frames to
create packets?
a. Application Layer
b. Network Layer
c. Data Link Layer
d. Physical Layer
Answer: b. Network Layer
28. When discussing routers sending packets, which layer of the OSI model is involved?
a. Application Layer
b. Network Layer
c. Data Link Layer
d. Physical Layer
Answer: b. Network Layer
Reasoning: Routers operate at the network layer of the OSI model. They are responsible for forwarding
packets between different networks.
29. Which layer of the OSI model is responsible for sending frames in a network?
a. Application Layer
b. Presentation Layer
c. Data Link Layer
d. Physical Layer
Answer: c. Data Link Layer
30. You are setting up a network and need to choose the appropriate device to send frames within the
network. Which layer of the OSI model should you consider?
a. Application Layer
b. Presentation Layer
c. Data Link Layer
d. Physical Layer
Answer: c. Data Link Layer
Reasoning: The data link layer is responsible for sending frames within a network. By considering this
layer, you can choose the appropriate device for frame transmission.
31. Which layer of the OSI model is responsible for converting data into binary and transmitting it across
physical wires?
a. Application Layer
b. Presentation Layer
c. Transport Layer
d. Physical Layer
Answer: d. Physical Layer
32. When discussing logical ports like NetBIOS, which layer of the OSI model is involved?
a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
Answer: c. Session Layer
33. When discussing TCP/UDP, which layer of the OSI model is involved?
a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
Answer: d. Transport Layer
34. You are configuring a network and need to select the appropriate layer of the OSI model to focus on
for implementing TCP/UDP. Which layer should you consider?
a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
Answer: d. Transport Layer
Reasoning: TCP/UDP operate at the transport layer of the OSI model. By focusing on this layer, you can
implement the appropriate protocols for reliable data transport.
35. What is the term for the process of adding header and footer data by a protocol used at a specific layer
of the OSI model?
a. Encapsulation
b. De-encapsulation
c. Segmentation
d. Reassembly
Answer: a. Encapsulation
36. Which layer of the OSI model is responsible for converting data into a format that any system can
understand?
a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
Answer: b. Presentation Layer
37. When data moves up the layers of the OSI model from Physical to Application, what process occurs?
a. Encapsulation
b. De-encapsulation
c. Segmentation
d. Reassembly
Answer: b. De-encapsulation
38. Which layer of the OSI model is responsible for managing communication sessions between
applications?
a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
Answer: c. Session Layer
39. You are troubleshooting an issue with a communication session between two applications. Which
layer of the OSI model should you focus on?
a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
Answer: c. Session Layer
Reasoning: The session layer manages communication sessions between applications. By focusing on this
layer, you can identify and resolve any issues affecting the session.
40. Which layer of the OSI model is responsible for adding destination addresses to frames for routing
purposes?
a. Network Layer
b. Data Link Layer
c. Physical Layer
d. Transport Layer
Answer: a. Network Layer
41. When discussing the conversion of data into binary and transmission across physical wires, which
layer of the OSI model is involved?
a. Presentation Layer
b. Session Layer
c. Physical Layer
d. Transport Layer
Answer: c. Physical Layer
42. Which layer of the OSI model is responsible for standardizing routing, addressing, and control?
a. Application Layer
b. Network Layer
c. Data Link Layer
d. Transport Layer
Answer: b. Network Layer
43. When discussing the addition of header and possibly a footer by a protocol used at a specific layer of
the OSI model, which layers are most likely involved?
a. Application, Presentation, and Session Layers
b. Transport, Network, and Data Link Layers
c. Data Link, Network, and Transport Layers
d. Physical, Data Link, and Network Layers
Answer: b. Transport, Network, and Data Link Layers
44. Which layer of the OSI model is responsible for receiving bits from the physical connection medium
and converting them into frames?
a. Application Layer
b. Presentation Layer
c. Data Link Layer
d. Transport Layer
Answer: c. Data Link Layer
45. When discussing routers sending packets, which layer of the OSI model is involved?
a. Application Layer
b. Presentation Layer
c. Network Layer
d. Transport Layer
Answer: c. Network Layer
46. Which layer of the OSI model is responsible for managing the integrity of a connection and
controlling the session between two computers?
a. Application Layer
b. Presentation Layer
c. Session Layer
d. Transport Layer
Answer: c. Session Layer
47. What is the term for the process of interpreting the data payload and discarding the header and footer
as data moves up the OSI model layers?
a. Encapsulation
b. De-encapsulation
c. Segmentation
d. Reassembly
Answer: b. De-encapsulation
49. In the TCP/IP protocol stack, which layer defines the protocols for the transport layer?
a. Application Layer
b. Transport Layer
c. Internet Layer
d. Network Interface Layer
Answer: a. Application Layer
50. Which protocol is used at the Transport Layer to provide a full-duplex connection-oriented
communication?
a. TCP
b. UDP
c. ICMP
d. IP
Answer: a. TCP
51. You need to establish a reliable connection between two devices on a network. Which protocol from
the TCP/IP stack should you use?
a. TCP
b. UDP
c. ICMP
d. IP
Answer: a. TCP
Reasoning: TCP provides reliable, connection-oriented communication, making it suitable for
establishing a reliable connection between devices.
55. Which version of IP provides a larger address space and several other important features?
a. IPv4
b. IPv6
c. TCP/IP
d. ICMP
Answer: b. IPv6
56. How are IPv6 addresses represented?
a. Octets separated by periods (.)
b. Hexadecimal groups separated by colons (:)
c. Binary digits
d. Numeric digits
Answer: b. Hexadecimal groups separated by colons (:)
58. You want to ensure secure and authenticated communication between devices on an IPv6 network.
Which feature should be enabled?
a. IPsec
b. ICMP
c. TCP
d. UDP
Answer: a. IPsec
Reasoning: IPsec is a mandatory component of IPv6 networks that ensures the integrity and
confidentiality of IP packets, providing secure and authenticated communication.
60. You have a network with multiple departments, and you want to isolate their communication and
improve network performance. Which networking device should you use?
a. Hub
b. Switch
c. Router
d. Firewall
Answer: b. Switch
Reasoning: Using a switch allows for separate broadcast domains and improves network performance by
forwarding traffic only to the intended devices.
62. You need to connect two networks with different IP addressing schemes and control traffic flow
between them. Which networking device should you use?
a. Hub
b. Switch
c. Router
d. Firewall
Answer: c. Router
Reasoning: Routers are used to connect similar or different networks and control traffic flow between
them.
64. You need to test the connectivity between two network devices and determine the response time.
Which protocol would you use?
a. TCP
b. UDP
c. ICMP
d. IP
Answer: c. ICMP
Reasoning: ICMP is used for network management tools like ping, which tests connectivity and response
time between network devices.
66. You want to transfer files between computers on a network. Which protocol would you use?
a. Telnet
b. FTP
c. SMTP
d. DNS
Answer: b. FTP
Reasoning: FTP (File Transfer Protocol) is specifically designed for transferring files between computers
on a network.
67. Which layer of the TCP/IP protocol stack is responsible for creating/inserting packets?
a. Application Layer
b. Transport Layer
c. Internet Layer
d. Network Interface Layer
Answer: c. Internet Layer
68. You want to establish a secure and encrypted communication channel between two devices on a
network. Which protocol would you use?
a. TCP
b. UDP
c. ICMP
d. IPsec
Answer: d. IPsec
Reasoning: IPsec (Internet Protocol Security) provides secure and encrypted communication at the IP
layer.
69. What is the purpose of IP addresses in networking?
a. To establish connections between devices
b. To uniquely identify a network device on a network
c. To determine the health of a network or link
d. To create/insert packets in the network
Answer: b. To uniquely identify a network device on a network
71. You want to extend the coverage of your Wi-Fi network to reach all areas of your large campus. What
device should you use?
a. Firewall
b. Switch
c. Range extender
d. Router
Answer: c. Range extender
Reasoning: A range extender is specifically designed to extend the signal range of a Wi-Fi network,
making it suitable for large campuses or homes.
73. You want to monitor the traffic patterns on your network to gather information about network activity.
What technique would you use?
a. Port scanning
b. Cable tampering
c. Sniffing
d. Spoofing
Answer: c. Sniffing
Reasoning: Sniffing is the act of monitoring traffic patterns to obtain information about a network,
including network activity and potential vulnerabilities.
75. You need to establish a secure communication channel for web traffic. Which port would you use?
a. Port 80
b. Port 443
c. Port 21
d. Port 25
Answer: b. Port 443
Reasoning: Port 443 is commonly used for secure web traffic (HTTPS) to ensure encrypted
communication.
76. What type of ports are associated with well-known protocols in TCP/IP?
a. Physical ports
b. Registered ports
c. Dynamic ports
d. Logical ports
Answer: b. Registered ports
77. You want to authenticate users connecting to your network using a specific protocol. Which port
would you use?
a. Port 80
b. Port 1812
c. Port 1433
d. Port 2375
Answer: b. Port 1812
Reasoning: Port 1812 is commonly associated with RADIUS authentication.
79. When a user requests a service associated with a well-known or registered port, the service responds
with a dynamic port for that session. Which range of ports is used for these dynamic ports?
a. Well-known ports (0-1023)
b. Registered ports (1024-49151)
c. Dynamic or private ports (49152-65535)
d. Secure ports (443-1023)
Answer: c. Dynamic or private ports (49152-65535)
80. Which protocol is used to transfer files between a client and a server in a secure manner?
a. FTP
b. SFTP
c. Telnet
d. SSH
Answer: b. SFTP
81. You need to remotely access a Linux system and ensure that the communication is encrypted. Which
protocol should you use?
a. FTP
b. SFTP
c. Telnet
d. SSH
Answer: d. SSH
Reasoning: Telnet sends information in plaintext, while SSH encrypts the communication between the
host and terminal.
83. You want to ensure that the time synchronization on your network is secure. Which protocol should
you use?
a. Time Protocol
b. NTP
c. DNS
d. SNMP
Answer: b. NTP
Reasoning: NTP on port 123 offers better error-handling capabilities and ensures secure time
synchronization.
85. You want to secure the web browser traffic on your website. Which port and protocol should you use?
a. Port 80, HTTP
b. Port 443, HTTPS
c. Port 143, IMAP
d. Port 161, SNMP
Answer: b. Port 443, HTTPS
Reasoning: HTTPS using TLS encryption is the secure alternative to HTTP for web browser traffic.
87. You need to ensure secure management of your infrastructure devices. Which version of SNMP
should you use?
a. SNMPv1
b. SNMPv2
c. SNMPv3
d. SNMPv4
Answer: c. SNMPv3
Reasoning: SNMP version 2 or 3 includes encryption and additional security features for managing
infrastructure devices securely.
88. Which port is commonly used by Windows for accessing files over the network?
a. Port 21
b. Port 53
c. Port 445
d. Port 389
Answer: c. Port 445
89. You want to secure the communication between LDAP servers and clients. Which port and protocol
should you use?
a. Port 389, LDAP
b. Port 636, LDAPS
c. Port 123, NTP
d. Port 2049, NFS
Answer: b. Port 636, LDAPS
Reasoning: LDAPS adds SSL/TLS security to LDAP communication.
90. You need to transfer large files securely over the network. Which protocol should you use?
a. FTP
b. SFTP
c. Telnet
d. SSH
Answer: b. SFTP
Reasoning: SFTP provides secure file transfer over the network.
92. You want to send email messages securely using encryption. Which port and protocol should you use?
a. Port 25, SMTP
b. Port 587, SMTP with TLS
c. Port 80, HTTP
d. Port 443, HTTPS
Answer: b. Port 587, SMTP with TLS
Reasoning: SMTP with TLS provides secure email communication.
94. You want to protect the integrity of DNS information from being modified in transit. Which port and
protocol should you use?
a. Port 53, DNS
b. Port 853, DoT
c. Port 80, HTTP
d. Port 443, HTTPS
Answer: b. Port 853, DoT (DNS over TLS)
Reasoning: DoT protects DNS information from being modified in transit.
98. You want to access files over the network securely using a Windows system. Which port and protocol
should you use?
a. Port 445, SMB
b. Port 2049, NFS
c. Port 389, LDAP
d. Port 22, SSH
Answer: a. Port 445, SMB (Server Message Block)
Reasoning: SMB is commonly used for accessing files in Windows systems.
100. You need to communicate securely between a web server and a web browser. Which port and
protocol should you use?
a. Port 21, FTP
b. Port 22, SSH
c. Port 80, HTTP
d. Port 443, HTTPS
Answer: d. Port 443, HTTPS
Reasoning: HTTPS provides secure communication between a web server and a web browser.
101. Which protocol is commonly used for secure file sharing over the network?
a. FTP
b. SFTP
c. Telnet
d. SSH
Answer: b. SFTP
102. You want to remotely manage network devices with sensitive information. Which protocol should
you use to include encryption and additional security features?
a. FTP
b. SFTP
c. SNMPv3
d. SMB
Answer: c. SNMPv3 (Simple Network Management Protocol version 3)
Reasoning: SNMPv3 includes encryption and additional security features for managing network devices
with sensitive information.
104. You want to protect the information while communicating directory information from servers to
clients. Which port and protocol should you use?
a. Port 389, LDAP
b. Port 22, SSH
c. Port 123, NTP
d. Port 25, SMTP
Answer: a. Port 389, LDAP (Lightweight Directory Access Protocol)
Reasoning: LDAPS (LDAP Secure) on port 636 provides encryption for secure communication of
directory information.
106. You want to securely manage infrastructure devices. Which protocol should you use?
a. FTP
b. SFTP
c. SNMPv2
d. SMTP
Answer: c. SNMPv2 (Simple Network Management Protocol version 2)
Reasoning: SNMPv2 includes encryption for secure management of infrastructure devices.
108. You want to protect file access over the network. Which protocol should you avoid due to
vulnerabilities and opt for a more secure alternative?
a. FTP
b. SFTP
c. SMB
d. NFS
Answer: c. SMB (Server Message Block)
Reasoning: SMB has known vulnerabilities, and it is recommended to use NFS (Network File System) as
a more secure alternative.
109. Which protocol is used for secure access to a remote server's terminal?
a. Telnet
b. SSH
c. HTTP
d. SNMP
Answer: b. SSH (Secure Shell)
111. A client wants to establish a connection with a web server. Which packet does the client send to
initiate the connection?
a. SYN packet
b. ACK packet
c. SYN/ACK packet
d. Data packet
Answer: a. SYN packet
Reasoning: The client sends a SYN packet to the web server's port 80 or 443 to request the establishment
of a connection.
112. After receiving the SYN packet from the client, what does the web server send back?
a. SYN packet
b. ACK packet
c. SYN/ACK packet
d. Data packet
Answer: c. SYN/ACK packet
Reasoning: The web server replies to the client's SYN packet with a SYN/ACK packet, acknowledging
the request and initiating the connection.
113. What is the final step of the three-way handshake in TCP/IP communication?
a. Sending a data packet.
b. Establishing a secure connection.
c. Sending an ACK packet.
d. Negotiating the protocol.
Answer: c. Sending an ACK packet
Reasoning: The client acknowledges the connection by sending an ACK packet, finalizing the three-way
handshake and establishing the basic connection.
115. Scenario:
A user receives an email that contains a fraudulent link to a malicious website. What type of cyber threat
is this?
a. Spoofing
b. Phishing
c. DoS attack
d. Computer virus
Answer: b. Phishing
Reasoning: Phishing involves misdirecting legitimate users to malicious websites through the abuse of
URLs or hyperlinks in emails.
122. An employee who is trusted by the organization unknowingly falls victim to a scam and
compromises sensitive information. What type of cyber threat is this?
a. Spoofing
b. Insider threat
c. Ransomware
d. Malware
Answer: b. Insider threat
Reasoning: Insider threats can arise from individuals who are trusted by the organization, including
employees who unknowingly compromise security.
125. An attacker sends an email claiming to be from a trusted organization and requests the recipient to
provide their login credentials. What type of cyber threat is this?
a. Spoofing
b. Phishing
c. DoS attack
d. Computer virus
Answer: b. Phishing
Reasoning: Phishing involves attempting to deceive individuals into revealing sensitive information, such
as login credentials, by impersonating a trusted entity.
129. An attacker intercepts and modifies communication between a web browser and a web server to
extract sensitive information. What type of cyber threat is this?
a. Spoofing
b. Phishing
c. Man-in-the-middle (MITM) attack
d. Side-channel attack
Answer: c. Man-in-the-middle (MITM) attack
Reasoning: In this scenario, the attacker is placing themselves between two devices to intercept or modify
information, which is known as a man-in-the-middle attack.
131. What distinguishes an advanced persistent threat (APT) from other cyber threats?
a. APTs are carried out by individuals, while other threats are conducted by organizations.
b. APTs are less sophisticated compared to other threats.
c. APTs are short-term attacks, while other threats are prolonged.
d. APTs demonstrate a high level of technical and operational sophistication over a prolonged period.
Answer: d. APTs demonstrate a high level of technical and operational sophistication over a prolonged
period.
135. A user unknowingly clicks on a link in an email and their computer becomes infected with malicious
software. What type of cyber threat is this?
a. Spoofing
b. Phishing
c. DoS attack
d. Drive-by download
Answer: d. Drive-by download
Reasoning: In this scenario, the user's computer becomes infected with malware after visiting a malicious
website through a link, which is known as a drive-by download.
139. Scenario:
An attacker uses a combination of software and social engineering techniques to deceive an employee
into revealing their login credentials. What type of cyber threat is this?
a. Spoofing
b. Phishing
c. Social engineering
d. Man-in-the-middle (MITM) attack
Answer: c. Social engineering
Reasoning: In this scenario, the attacker manipulates the employee through deception to obtain sensitive
information, which is a characteristic of social engineering.
145. What is a benefit of a Host-based IDS (HIDS) over a Network-based IDS (NIDS)?
a. HIDS can monitor network traffic patterns.
b. HIDS can detect attacks from external connections.
c. HIDS can pinpoint specific files compromised in an attack.
d. HIDS has less impact on network performance.
Answer: c. HIDS can pinpoint specific files compromised in an attack.
149. Which tool is used to prevent threats by locking files and demanding a ransom fee?
a. Firewall
b. Intrusion Detection System (IDS)
c. Anti-malware tool
d. Ransomware tool
Answer: d. Ransomware tool
152. What type of attack attempts to misdirect legitimate users through URLs or hyperlinks in emails?
a. Spoofing attack
b. Phishing attack
c. Man-in-the-middle (MITM) attack
d. Side-channel attack
Answer: b. Phishing attack
153. Which type of attack involves placing oneself between two devices to intercept or modify
information?
a. Spoofing attack
b. Phishing attack
c. Man-in-the-middle (MITM) attack
d. Side-channel attack
Answer: c. Man-in-the-middle (MITM) attack
155. Which tool collects log data from various sources to better understand potential security concerns?
a. Firewall
b. Intrusion Detection System (IDS)
c. Security Information and Event Management (SIEM)
d. Anti-malware tool
Answer: c. Security Information and Event Management (SIEM)
158. What is the primary countermeasure against malicious code such as viruses and worms?
a. Patch management
b. Intrusion detection and prevention systems
c. Firewalls
d. Anti-malware software
Answer: d. Anti-malware software
166. What is the purpose of a security information and event management (SIEM) solution?
a. To monitor system logs and events
b. To detect malware based on signatures
c. To collect information about the IT environment
d. To prevent threats from reaching target systems
Answer: c. To collect information about the IT environment
169. What are the two types of intrusion prevention systems (IPS)?
a. Network-based IPS (NIPS) and Host-based IPS (HIPS)
b. Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
c. Anti-malware IPS and Firewall IPS
d. Network-based IPS (NIPS) and Application-based IPS (AIPS)
Answer: a. Network-based IPS (NIPS) and Host-based IPS (HIPS)
172. What are the two primary options for data centers?
a. In-house and cloud-based
b. Outsourced and on-premises
c. Virtual and physical
d. Offshore and local
Answer: b. Outsourced and on-premises
173. What is the purpose of protecting the physical layer of the network in data centers and wiring
closets?
a. To prevent power outages
b. To minimize damage to equipment
c. To ensure proper cooling and airflow
d. To secure data transmission
Answer: b. To minimize damage to equipment
174. Which component of a data center's infrastructure is responsible for providing adequate cooling and
airflow?
a. Fire suppression system
b. Power supply unit
c. Environmental monitoring system
d. HVAC system
Answer: d. HVAC system
175. What is the recommended temperature range for optimized data center operation?
a. 50° to 64°F (10° to 18°C)
b. 64° to 81°F (18° to 27°C)
c. 81° to 95°F (27° to 35°C)
d. 95° to 104°F (35° to 40°C)
Answer: b. 64° to 81°F (18° to 27°C)
176. Why is it important to monitor for water or gas leaks in a data center?
a. To prevent unauthorized access
b. To ensure proper cooling
c. To protect equipment from dust contamination
d. To minimize damage and system failures
Answer: d. To minimize damage and system failures
177. What is the critical load in the context of backup power in data centers?
a. The amount of electricity consumed by the HVAC system
b. The computing resources and supporting infrastructure
c. The maximum capacity of the backup generators
d. The total power capacity of the data center
Answer: b. The computing resources and supporting infrastructure
178. What should be considered when selecting a fire suppression system for server rooms?
a. Size of the room and risk of equipment damage
b. Type of power source used in the data center
c. Cooling requirements of the equipment
d. Network connectivity and bandwidth requirements
Answer: a. Size of the room and risk of equipment damage
179. What is the purpose of backup generators in a data center's power supply?
a. To provide constant and consistent power delivery
b. To ensure proper cooling and airflow
c. To protect against fire hazards
d. To minimize damage to equipment
Answer: a. To provide constant and consistent power delivery
180. Which of the following is an important security consideration for physical data centers and wiring
closets?
a. Fire suppression systems
b. Cooling and airflow management
c. Backup power generators
d. Access control measures
Answer: d. Access control measures
184. Which fire suppression system is more friendly to electronics in server rooms?
a. Water-based systems
b. Gas-based systems
c. Foam-based systems
d. Powder-based systems
Answer: b. Gas-based systems
186. What is the recommended temperature range for data center environments?
a. 50-64°F (10-18°C)
b. 64-81°F (18-27°C)
c. 81-95°F (27-35°C)
d. 95-104°F (35-40°C)
Answer: b. 64-81°F (18-27°C)
188. What is a potential issue with water-based fire suppression systems in a data center?
a. They activate throughout the entire building during a fire.
b. They can cause damage to electronic equipment.
c. They require frequent maintenance.
d. They are not effective in extinguishing fires.
Answer: b. They can cause damage to electronic equipment.
Reasoning: Water-based fire suppression systems, although activated in a fire, can cause damage to
electronic equipment due to the combination of water and electricity.
200. What is the difference between an MOU/MOA and a Service Level Agreement (SLA)?
a. MOU/MOA specifies what can be done with a system or information, while SLA focuses on intricate
service aspects.
b. MOU/MOA focuses on pricing and service agreements, while SLA specifies resource sharing during
emergencies.
c. MOU/MOA ensures user comfort, while SLA ensures equipment warranty compliance.
d. MOU/MOA outlines physical security measures, while SLA outlines data security measures.
Answer: a. MOU/MOA specifies what can be done with a system or information, while SLA focuses on
intricate service aspects.
Reasoning: An MOU/MOA outlines the scope and terms of resource sharing or cooperation, while an
SLA specifies detailed service expectations and agreements.
201. Why is it crucial to review and understand Service Level Agreements (SLAs) when outsourcing with
cloud-based services?
a. To ensure legal compliance
b. To verify accessibility to information
c. To negotiate pricing terms
d. To protect intellectual property rights
Answer: b. To verify accessibility to information
Reasoning: Reviewing and understanding SLAs is crucial to ensure the promised accessibility to
information, including access details and response times, when outsourcing with cloud-based services.
202. Who should be involved in the review of Service Level Agreements (SLAs) before signing?
a. IT technicians
b. Legal team
c. Human resources department
d. Senior executives
Answer: b. Legal team
Reasoning: The legal team should be involved in the review of SLAs to ensure the terms and conditions
are in compliance with legal requirements and protect the organization's interests.
203. What is the purpose of a dry-pipe fire suppression system in a data center?
a. To minimize water damage to electronic equipment
b. To extinguish fires more effectively
c. To reduce the risk of water pipe failures
d. To comply with building regulations
Answer: a. To minimize water damage to electronic equipment
Reasoning: A dry-pipe fire suppression system is used in data centers to minimize water damage to
electronic equipment. Unlike traditional sprinkler systems, a dry-pipe system keeps water out of the pipes
until a fire is detected, reducing the risk of water leaks and damage.
204. In the context of data centers, what does redundancy refer to?
a. Having duplicate components for backup in case of failure
b. Implementing strict access controls for sensitive data
c. Establishing multiple data centers in different locations
d. Utilizing multiple cloud service providers simultaneously
Answer: a. Having duplicate components for backup in case of failure
Reasoning: Redundancy in data centers refers to the design practice of having duplicate components, such
as power supplies and generators, to provide backup and ensure continuous operations in case of
component failures.
205. What is the purpose of joint operating agreements (JOAs) or memoranda of understanding (MOUs/
MOAs) between organizations?
a. To foster healthy competition between organizations
b. To share resources and maintain critical functions during emergencies
c. To establish pricing and service agreements
d. To comply with industry guidelines
Answer: b. To share resources and maintain critical functions during emergencies
Reasoning: JOAs or MOUs/MOAs between organizations are meant to facilitate resource sharing and
collaboration during emergencies, enabling them to maintain critical functions and enhance business
continuity.
206. What is the primary objective of a Service Level Agreement (SLA) in the context of outsourcing IT
services?
a. To ensure data privacy and security
b. To establish pricing and payment terms
c. To define service expectations and obligations
d. To specify technical specifications and requirements
Answer: c. To define service expectations and obligations
Reasoning: The primary objective of an SLA in outsourcing IT services is to clearly define the
expectations, obligations, and quality of service to be provided by the service provider.
207. What is the purpose of redundancy in the context of power supply in a data center?
a. To reduce energy consumption
b. To comply with environmental regulations
c. To minimize downtime and ensure continuous power supply
d. To support renewable energy initiatives
Answer: c. To minimize downtime and ensure continuous power supply
Reasoning: Redundancy in the power supply of a data center is implemented to minimize downtime and
ensure uninterrupted power supply, thereby enhancing business continuity.
209. Why is it important to have multiple generators connected by different transfer switches in a data
center?
a. To increase energy efficiency
b. To comply with building regulations
c. To reduce maintenance costs
d. To ensure redundancy and backup power availability
Answer: d. To ensure redundancy and backup power availability
Reasoning: Having multiple generators connected by different transfer switches in a data center ensures
redundancy and backup power availability in case of generator failures or maintenance needs.
210. Which department is typically responsible for reviewing and negotiating the conditions outlined in a
Service Level Agreement (SLA) when outsourcing with cloud-based services?
a. Human Resources
b. Legal Department
c. IT Department
d. Finance Department
Answer: b. Legal Department
Reasoning: The Legal Department is typically responsible for reviewing and negotiating the conditions
outlined in an SLA when outsourcing with cloud-based services. They ensure that the terms and
conditions align with the organization's requirements and mitigate any potential legal risks.
213.nWhich cloud service model provides access to software applications hosted by a vendor or cloud
service provider?
a. Software as a Service (SaaS)
b. Platform as a Service (PaaS)
c. Infrastructure as a Service (IaaS)
d. On-Premises Service (OPS)
Answer: a. Software as a Service (SaaS)
214. In which service model does the consumer have control over the deployed applications and
configurations?
a. Software as a Service (SaaS)
b. Platform as a Service (PaaS)
c. Infrastructure as a Service (IaaS)
d. On-Premises Service (OPS)
Answer: b. Platform as a Service (PaaS)
215. Which cloud service model provides basic computing resources such as servers and storage?
a. Software as a Service (SaaS)
b. Platform as a Service (PaaS)
c. Infrastructure as a Service (IaaS)
d. On-Premises Service (OPS)
Answer: c. Infrastructure as a Service (IaaS)
217. Which department is responsible for maintaining the operating systems and applications in the
Infrastructure as a Service (IaaS) model?
a. IT Department
b. Security Department
c. Cloud Service Provider
d. Consumer Organization
Answer: d. Consumer Organization
223. What type of agreement allows organizations to share resources and maintain critical functions
during emergencies?
a. Service Level Agreement (SLA)
b. Memorandum of Understanding (MOU)
c. Joint Operating Agreement (JOA)
d. Memorandum of Agreement (MOA)
Answer: b. Memorandum of Understanding (MOU)
224. Which cloud service model provides access to hardware, operating systems, storage, and network
capacity over the internet?
a. Software as a Service (SaaS)
b. Platform as a Service (PaaS)
c. Infrastructure as a Service (IaaS)
d. Cloud Storage as a Service (CSaaS)
Answer: c. Infrastructure as a Service (IaaS)
226. Which cloud deployment model is accessible to the public and hosted by an external cloud service
provider?
a. Public cloud
b. Private cloud
c. Hybrid cloud
d. Community cloud
Answer: a. Public cloud
233. Which cloud deployment model is accessible to a specific community and focuses on shared
interests?
a. Public cloud
b. Private cloud
c. Hybrid cloud
d. Community cloud
Answer: d. Community cloud
234. What types of services do managed service providers (MSPs) commonly offer?
a. Network and security monitoring
b. Patching services
c. Help Desk service management
d. All of the above
Answer: d. All of the above
239. What is one important consideration in a service-level agreement (SLA) for cloud computing?
a. Change management processes
b. Problem identification and resolution expectations
c. Dispute mediation processes
d. All of the above
Answer: d. All of the above
240. What is the role of a managed service provider (MSP) in relation to cloud computing?
a. Managing day-to-day operations of information technology assets
b. Providing expertise in areas the company does not have
c. Offering cloud-based services such as managed detection and response
d. All of the above
Answer: d. All of the above
243. Which network area is designed to be accessed by outside visitors but isolated from the private
network?
a. DMZ
b. VLAN
c. VPN
d. NAC
Answer: a. DMZ
248. What type of control is implemented at the endpoint level in defense in depth?
a. Data controls
b. Application controls
c. Host controls
d. Perimeter controls
Answer: c. Host controls
249. Which layer of defense in depth protects against unauthorized access to the network?
a. Data layer
b. Application layer
c. Host layer
d. Perimeter layer
Answer: d. Perimeter layer
250. What is the purpose of policies, procedures, and awareness in defense in depth?
a. Enhance data encryption
b. Establish network segmentation
c. Reduce insider threats
d. Control network traffic
Answer: c. Reduce insider threats
251. In the defense in depth approach, which layer provides a physical barrier?
a. Data layer
b. Application layer
c. Physical layer
d. Internal network layer
Answer: c. Physical layer
252. What technology can be used to protect the internal network layer in defense in depth?
a. Intrusion detection systems
b. Application firewalls
c. Gateway firewalls
d. Encryption algorithms
Answer: a. Intrusion detection systems
256. ABC Company wants to enhance the security of their network by implementing a layered security
approach. Which principle are they following?
a. Data segmentation
b. Defense in depth
c. Network virtualization
d. Physical access control
Answer: b. Defense in depth
Reasoning: By implementing a layered security approach, ABC Company is ensuring that they have
multiple types of security controls in place, including administrative, technological, and physical controls.
This approach provides a more comprehensive and effective defense against various types of threats,
making it harder for attackers to penetrate their network.
257. XYZ Corporation wants to isolate their web servers from the internal network to protect against
external threats. Which network area should they implement?
a. VLAN
b. DMZ
c. VPN
d. NAC
Answer: b. DMZ
Reasoning: A DMZ (Demilitarized Zone) is a network area that is designed to be accessed by outside
visitors but is isolated from the private network. By placing their web servers in the DMZ, XYZ
Corporation can provide public access to their web services while keeping them separated from their
internal network, reducing the risk of unauthorized access and potential attacks.
258. Company A wants to logically segment their network without changing the physical topology. Which
technology should they use?
a. VLAN
b. DMZ
c. VPN
d. NAC
Answer: a. VLAN
Reasoning: VLANs (Virtual Local Area Networks) allow for logical network segmentation without
altering the physical topology. By creating VLANs, Company A can separate network traffic into different
virtual segments, improving network performance, security, and management flexibility without the need
for physical infrastructure changes.
259. An employee needs to access the corporate network securely from a remote location over the
internet. Which technology should they use?
a. VLAN
b. DMZ
c. VPN
d. NAC
Answer: c. VPN
Reasoning: A VPN (Virtual Private Network) provides secure point-to-point transmission of both
authentication and data traffic over an untrusted network such as the internet. By using a VPN, the
employee can establish a secure communication tunnel and access the corporate network remotely,
ensuring the confidentiality and integrity of their data transmissions.
260. ABC Corporation wants to implement a network access control solution that enforces strict
adherence to security policies. What concept are they implementing?
a. VLAN segmentation
b. Defense in depth
c. Network virtualization
d. Network access control (NAC)
Answer: d. Network access control (NAC)
Reasoning: By implementing a network access control (NAC) solution, ABC Corporation can control and
enforce access to their network based on security policies. NAC ensures that only authorized and
compliant devices are allowed to connect to the network, reducing the risk of unauthorized access and
enhancing overall network security.
261. XYZ Company wants to ensure that their network design includes multiple layers of security
controls to protect against various types of threats. Which principle are they implementing?
a. VLAN segmentation
b. Defense in depth
c. Network virtualization
d. Physical access control
Answer: b. Defense in depth
Reasoning: By implementing a defense in depth approach, XYZ Company is incorporating multiple
layers of security controls, such as data controls, application controls, host-level controls, internal
network controls, perimeter controls, and administrative controls. This layered approach provides a
stronger and more resilient security posture, making it harder for attackers to exploit vulnerabilities and
breach the network.
262. Company A wants to improve the overall performance of their network by efficiently managing data
traffic and optimizing resource usage. Which network design objective are they aiming to achieve?
a. Data segmentation
b. Defense in depth
c. Network virtualization
d. Efficient overall performance
Answer: d. Efficient overall performance
Reasoning: By efficiently managing data traffic and optimizing resource usage, Company A aims to
achieve the objective of improving the overall performance of their network. This can be accomplished
through strategies such as network segmentation, load balancing, bandwidth management, and quality of
service (QoS) implementations to ensure optimal utilization of network resources and enhance network
performance.
263. ABC Corporation wants to implement a security approach that focuses on protecting assets and data
rather than relying solely on perimeter defense. Which design approach aligns with their objective?
a. Microsegmentation
b. Defense in depth
c. Zero trust
d. Network virtualization
Answer: c. Zero trust
Reasoning: The scenario mentions that ABC Corporation wants to focus on protecting assets and data
rather than relying on perimeter defense. Zero trust aligns with this objective by emphasizing the need for
authentication and authorization for every process or action, regardless of the user's location within the
network. Zero trust networks often use microsegmentation and multiple firewalls to increase security at
various connecting points.
264. Company A wants to enforce strict access control policies for both internal and external connections
to their network. Which solution should they consider?
a. VPN
b. NAC
c. VLAN
d. Firewall
Answer: b. NAC
Reasoning: The scenario mentions the need to both know and control access to the organization's
network, including connections from insiders and outsiders. Network Access Control (NAC) provides the
capability to enforce access control policies, identify connections, and ensure compliance with
organizational policies. NAC solutions can also provide network visibility and isolation for noncompliant
devices, enhancing network security.
265. XYZ Corporation wants to prevent unauthorized devices from connecting to their network and
enforce device compliance. Which solution should they implement?
a. Firewall
b. VPN
c. NAC
d. VLAN
Answer: c. NAC
Reasoning: The scenario describes the need to prevent unwanted devices from connecting to the network
and enforce device compliance. Network Access Control (NAC) systems allow for the enforcement of
device compliance to policy prior to connecting. NAC can validate devices, check for software
compliance, and ensure that only authorized and compliant devices are allowed to join the network.
266. A hotel wants to ensure that only registered guests can access their internet network. Which
technology should they implement to enforce this policy?
a. VLAN
b. VPN
c. NAC
d. Firewall
Answer: c. NAC
Reasoning: The scenario describes the requirement for guests to acknowledge an acceptable use policy
before being granted access to the hotel's internet network. Network Access Control (NAC) can be
implemented to enforce this policy by validating the guest's device, requiring authentication (such as a
special password or room number), and ensuring that only authorized guests have access to the network.
NAC helps prevent abuse and provides control over network access for different user types.
274. Why is network segmentation important for protecting sensitive data in a hospital or doctor's office?
a. To restrict access to critical information and keep it segregated
b. To enable wireless connectivity for IoT devices
c. To encrypt data transmissions between patients and healthcare providers
d. To enhance network performance and speed
Answer: a. To restrict access to critical information and keep it segregated
Reasoning: In a healthcare environment, there is a need to segregate networks to protect patient
information and billing data. Network segmentation, such as using a demilitarized zone (DMZ), ensures
that critical information remains separate from other parts of the network and can only be accessed by
authorized personnel.
275. How does network segmentation help protect embedded systems and IoT devices?
a. By isolating them from other devices on the network
b. By encrypting data transmissions between devices
c. By providing wireless connectivity for IoT devices
d. By enhancing the performance of embedded systems
Answer: a. By isolating them from other devices on the network
Reasoning: Network segmentation ensures that embedded systems and IoT devices are isolated from
other devices on the network. This helps prevent unauthorized access and potential security breaches, as
compromised devices cannot easily access other parts of the network.
276. What are some means of implementing network segmentation for IoT environments?
a. VLANs, MAC addresses, IP addresses, and physical ports
b. Wireless routers, Bluetooth connections, and application filtering
c. Encryption protocols, routing algorithms, and access control lists
d. Firewalls, intrusion detection systems, and virtual private networks
Answer: a. VLANs, MAC addresses, IP addresses, and physical ports
Reasoning: Network segmentation for IoT environments can be achieved through various means, such as
using VLANs (Virtual Local Area Networks), MAC addresses, IP addresses, and physical ports. These
methods help create logical boundaries and isolate IoT devices from other devices on the network.
277. Why is network segmentation important for embedded systems connected to a corporate network?
a. To prevent unauthorized access to physical controls of the embedded systems
b. To provide wireless connectivity for the embedded systems
c. To encrypt data transmissions between the embedded systems and the corporate network
d. To enhance the performance and efficiency of the embedded systems
Answer: a. To prevent unauthorized access to physical controls of the embedded systems
Reasoning: Network segmentation ensures that embedded systems connected to a corporate network are
isolated from other parts of the network. This prevents unauthorized access to the physical controls of the
embedded systems, reducing the risk of potential harm to people and property.
279. How does network segmentation contribute to the principle of defense in depth?
a. By creating additional layers of security throughout the network
b. By eliminating the need for firewalls and other security devices
c. By centralizing all security controls within a single segment
d. By increasing the number of potential network entry points
Answer: a. By creating additional layers of security throughout the network
Reasoning: Network segmentation involves the creation of separate network segments or zones, which act
as additional layers of security in the defense-in-depth strategy. Each segment can have its own security
controls and access restrictions, making it harder for attackers to penetrate the network.
280. Which type of network segmentation involves the use of secured switches or an additional firewall?
a. Perimeter segmentation
b. Application segmentation
c. VLAN-based segmentation
d. DMZ-based segmentation
Answer: d. DMZ-based segmentation
Reasoning: DMZ-based segmentation involves the use of secured switches or an additional firewall to
physically separate host systems accessible through the firewall from the internal network. This helps
control and secure traffic between web servers and the internal network.
281. What is the primary reason for segmenting embedded systems on a network?
a. To improve the performance and efficiency of the embedded systems
b. To enhance wireless connectivity for the embedded systems
c. To prevent unauthorized access to physical controls on the embedded systems
d. To encrypt data transmissions between the embedded systems and the network
Answer: c. To prevent unauthorized access to physical controls on the embedded systems
Reasoning: Segmenting embedded systems on a network is primarily done to prevent unauthorized access
to the physical controls of these systems. By isolating them through network segmentation, the risk of
unauthorized control or manipulation of physical mechanisms is minimized.
282. How does network segmentation help protect against lateral movement within a network?
a. By limiting access between different network segments
b. By encrypting all network traffic within a segment
c. By implementing intrusion detection systems on each segment
d. By providing frequent system updates to all network devices
Answer: a. By limiting access between different network segments
Reasoning: Network segmentation restricts access between different network segments, preventing lateral
movement of attackers within the network. If a segment is compromised, the attacker's access is limited to
that specific segment, reducing the overall impact on the network.
284. Scenario: An organization wants to restrict communication between different business units to
enforce the concept of least privilege. Which technology can be used to achieve this?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: a. Microsegmentation
Reasoning: Microsegmentation allows organizations to limit which business functions/units/offices/
departments can communicate with others, enforcing the concept of least privilege. It can create logical
rules to restrict communication at a granular level, ensuring sensitive data is not available to unauthorized
entities.
285. Scenario: In a corporate network, the IT department wants to separate voice communication traffic
from other network traffic to manage it more effectively. Which technology can be used for this purpose?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: b. VLAN
Reasoning: VLANs can be used to separate Voice Over IP (VOIP) telephones from the corporate network,
allowing the IT department to manage voice communication traffic separately and efficiently.
286. Scenario: An organization wants to restrict server-to-server traffic to the data center network while
allowing specific traffic from workstations and the web to access the servers. Which technology can help
achieve this?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: b. VLAN
Reasoning: VLANs can be used to segment the network and create a separate VLAN for the data center.
This allows the organization to keep server-to-server traffic contained within the data center network
while allowing selective access from workstations and the web.
287. Scenario: A wireless access controller is used to control whether devices connect to the corporate
network or a guest network. Which technology is commonly used to achieve this control?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: b. VLAN
Reasoning: Network Access Control (NAC) systems, which include wireless access controllers, use
VLANs to control device connectivity. The VLAN associated with the device connection determines the
VLAN the device operates on and which networks it can access.
288. Scenario: In a large corporate network, the IT department wants to limit broadcast traffic within the
network to improve performance. Which technology can be used for this purpose?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: b. VLAN
Reasoning: VLANs can be used to limit the amount of broadcast traffic within a network. This is
particularly useful in large networks with many devices, as it helps reduce congestion and improve
network performance.
289. Scenario: A remote employee wants to securely access their organization's network from a public
Wi-Fi hotspot. Which technology should they use?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: c. VPN
Reasoning: A virtual private network (VPN) provides a secure point-to-point connection over an untrusted
network like the internet. It allows remote users to access their organization's network securely, protecting
their communication and providing access to network resources.
290. Scenario: An organization wants to create software-based LAN segments to segregate or consolidate
traffic across multiple switch ports. Which technology can help achieve this?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: b. VLAN
Reasoning: VLANs allow network administrators to create software-based LAN segments using switches.
This enables the segregation or consolidation of traffic across multiple switch ports, improving network
management and control.
291. Scenario: A company wants to enhance network security within their data center by implementing a
solution that allows for granular restrictions and fine-grained control over traffic. Which technology
should they consider?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: a. Microsegmentation
Reasoning: Microsegmentation provides the ability to apply extremely granular restrictions within the IT
environment, allowing for detailed and complex rules to be applied to individual machines and users. By
implementing microsegmentation, the company can achieve precise control over traffic flows within their
data center, effectively mitigating the risk of threats bypassing static security controls and moving
between systems.
292. Scenario: A university wants to ensure secure and isolated communication between their various
departments located in different buildings. Which technology can help achieve this goal?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: b. VLAN
Reasoning: VLANs can be used to segregate network segments within the university's infrastructure. By
assigning different VLANs to each department, the university can create isolated communication channels
between departments while sharing the same physical network infrastructure. VLANs enable simplified
administration, reduce broadcast traffic, and allow for controlled access between different network
segments.
293. Scenario: A company wants to provide secure remote access for its employees to access internal
resources while working from home. Which technology should they implement?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: c. VPN
Reasoning: VPNs provide secure remote access to the company's internal network by establishing
encrypted connections over the internet. By implementing a VPN solution, employees can securely access
internal resources from their home or remote locations, ensuring confidentiality and data protection while
maintaining connectivity and productivity.
294. Scenario: A financial institution wants to securely connect its various branch offices across different
cities. Which technology should they implement?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: c. VPN
Reasoning: VPNs can be used to establish secure communication channels between different locations.
By implementing VPNs, the financial institution can securely transmit information and data between
branch offices over the internet, ensuring confidentiality and integrity of the communication while
preventing unauthorized access to sensitive information.
295. Scenario: A company wants to enforce strict traffic restrictions and security policies for a group of
servers hosting sensitive customer data. Which technology can help achieve this?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: a. Microsegmentation
Reasoning: Microsegmentation allows for granular restrictions within the IT environment, enabling the
company to enforce strict traffic restrictions and security policies for specific servers hosting sensitive
customer data. By applying detailed rules and controls at the machine and user level, microsegmentation
can ensure that only authorized traffic and users have access to the servers, minimizing the risk of
unauthorized access or data breaches.
296. Scenario: A company wants to implement a secure remote access solution for its employees,
contractors, and business partners. Which technology should they use?
a. Microsegmentation
b. VLAN
c. VPN
d. SDN
Answer: c. VPN
Reasoning: VPNs provide a secure remote access solution by establishing encrypted connections over the
internet. By implementing a VPN, the company can ensure secure and authenticated access for its
employees, contractors, and business partners, enabling them to connect to the company's network
resources while maintaining data confidentiality and integrity.
Chapter 5: Security Operations (144 questions)
1. What are the six major sets of activities in the life cycle of data handling?
a) Create, store, use, share, archive, destroy
b) Encrypt, transfer, analyze, protect, update, discard
c) Collect, process, transmit, backup, recover, retain
d) Acquire, manipulate, distribute, assess, discard, update
Answer: a) Create, store, use, share, archive, destroy
2. Under the rules of the Healthcare Insurance Portability and Accountability Act (HIPAA), medical
records need to be kept for 10 years. However, OSHA requires the maintenance of medical records of on-
the-job injuries for over 30 years. Which regulatory requirement applies in this case?
a) HIPAA
b) OSHA
c) PCI DSS
d) GDPR
Answer: b) OSHA
Reasoning: OSHA specifies the requirement to maintain medical records of on-the-job injuries for over 30
years, even after the last day of work, as mentioned in the scenario.
3. What is the purpose of data classification and labeling in data handling practices?
a) To determine the sensitivity of the data
b) To encrypt the data for secure storage
c) To ensure data integrity during transmission
d) To automate data backups and recovery
Answer: a) To determine the sensitivity of the data
4. An organization needs to securely destroy data stored on physical media such as hard drives and tapes.
What is the recommended method for secure destruction?
a) Emptying the virtual trash can
b) Using powerful magnets for degaussing
c) Deleting files manually
d) Performing a quick format of the media
Answer: b) Using powerful magnets for degaussing
Reasoning: Using powerful magnets for degaussing is a method to erase data stored on physical media
such as hard drives and tapes effectively.
6. An organization operates in multiple jurisdictions with varying regulations. What should the
organization be aware of in terms of data handling?
a) The need for encryption at all stages of the data life cycle
b) The potential impact of data breaches on customer trust
c) The regulations imposed by each jurisdiction affecting data protection
d) The cost of data storage and retention
Answer: c) The regulations imposed by each jurisdiction affecting data protection
Reasoning: The organization needs to be aware of the regulations imposed by each jurisdiction that affect
data protection in order to ensure compliance throughout the data life cycle.
8. What is the potential risk of not following specific protocols and processes for data destruction?
a) Loss of data integrity
b) Increased vulnerability to cyberattacks
c) Non-compliance with regulatory requirements
d) Excessive storage costs
Answer: c) Non-compliance with regulatory requirements
10. An organization has classified a set of data as "highly restricted." What impact would compromising
this data have?
a) Substantial loss of life, injury, or property damage
b) Loss of temporary competitive advantage
c) Minor disruptions, delays, or impacts
d) No harm can come from further dissemination or disclosure
Answer: a) Substantial loss of life, injury, or property damage
Reasoning: According to the data classification descriptions provided, compromising data labeled as
"highly restricted" could potentially lead to substantial loss of life, injury, or property damage.
12. An organization has classified a set of data as "unrestricted public data." What is the appropriate
handling requirement for this data?
a) Apply strict access controls and encryption
b) Store the data in an encrypted format
c) Share the data with authorized personnel only
d) No harm can come from further dissemination or disclosure
Answer: d) No harm can come from further dissemination or disclosure
Reasoning: Data classified as "unrestricted public data" is already published, and no harm can come from
further dissemination or disclosure.
13. What is the purpose of data retention policies in data handling practices?
a) To determine the sensitivity of data
b) To define the labeling requirements for data
c) To ensure data is kept for the required or useful period
d) To implement encryption for data protection
Answer: c) To ensure data is kept for the required or useful period
14. An organization applies the longest retention period to all types of information. What is the potential
risk of this approach?
a) Increased risk of data exposure
b) Violation of externally mandated requirements
c) Loss of data integrity
d) Wasting storage space
Answer: b) Violation of externally mandated requirements
Reasoning: Applying the longest retention period to all types of information may violate externally
mandated requirements such as legislation, regulations, or contracts, which can result in fines or other
judgments.
16. An organization needs to dispose of a magnetic disk. What is the appropriate method for data
destruction in this case?
a) Clearing the disk by writing zeros
b) Degaussing the disk to remove residual data
c) Physically shredding or breaking up the disk
d) Storing the disk in a protected landfill
Answer: c) Physically shredding or breaking up the disk
Reasoning: When it comes to disposing of a magnetic disk, physically shredding or breaking up the disk
is considered the most effective method of data destruction. Magnetic disks store data magnetically on
their surfaces, and even if the data is overwritten or cleared, remnants of the original data can still
potentially be recovered.By physically shredding or breaking up the disk, the actual storage medium is
destroyed, making it virtually impossible to retrieve any data from it. This method ensures that the
sensitive information stored on the disk is completely unrecoverable and eliminates the risk of data
remanence.
18. An organization has classified a set of data as "low sensitivity (internal use only)." What impact would
compromising this data have?
a) Substantial loss of life, injury, or property damage
b) Loss of temporary competitive advantage
c) Minor disruptions, delays, or impacts
d) No harm can come from further dissemination or disclosure
Answer: c) Minor disruptions, delays, or impacts
Reasoning: According to the data classification descriptions provided, compromising data labeled as "low
sensitivity" could cause minor disruptions, delays, or impacts.
19. What is the purpose of retention policies in data handling practices?
a) To define the sensitivity levels of data
b) To ensure compliance with legal and regulatory requirements
c) To assign labels to data based on its value
d) To implement encryption for data protection
Answer: b) To ensure compliance with legal and regulatory requirements
20. An organization applies the shortest retention period to all types of information. What is the potential
risk of this approach?
a) Increased risk of data exposure
b) Violation of externally mandated requirements
c) Loss of data integrity
d) Wasting storage space
Answer: b) Violation of externally mandated requirements
Reasoning: Applying the shortest retention period to all types of information may result in a violation of
externally mandated requirements, such as legal or regulatory obligations.
22. An organization needs to dispose of an optical disk. What is the appropriate method for data
destruction in this case?
a) Clearing the disk by writing zeros
b) Degaussing the disk to remove residual data
c) Physically shredding or breaking up the disk
d) Storing the disk in a protected landfill
Answer: c) Physically shredding or breaking up the disk
Reasoning: The scenario mentions that for optical disks, physical destruction is the appropriate method
for data destruction.
24. Which of the following is the primary form of instrumentation that captures signals generated by
events?
a) Monitoring
b) Logging
c) Alerting
d) Auditing
Answer: b) Logging
28. An organization's log files have been edited or deleted, compromising the integrity of the log data.
Which measure should be taken to address this issue?
a) Perform regular log reviews
b) Increase the storage capacity of log file media
c) Implement controls to protect against unauthorized changes
d) Monitor ingress and egress traffic
Answer: c) Implement controls to protect against unauthorized changes
31. A security engineer is reviewing raw log data to investigate a potential security breach.
What advantage does reviewing log data provide in this scenario?
a) Identifying system vulnerabilities
b) Monitoring network bandwidth usage
c) Determining the source of a security breach
d) Assessing the performance of the security infrastructure
Answer: c) Determining the source of a security breach
32. What is the importance of planning for security from the beginning?
a) It allows for patching and updates of existing systems
b) It ensures the smooth integration of security measures
c) It protects the network before introducing data
d) It optimizes network bandwidth usage
Answer: c) It protects the network before introducing data
33. Which type of monitoring focuses on regulating data leaving the organization?
a) Ingress monitoring
b) Egress monitoring
c) Data leak prevention (DLP)
d) Intrusion Detection System (IDS)
Answer: b) Egress monitoring
34. A company detects a potential security incident and wants to investigate the source.
Which activity is crucial for identifying the root cause of the security incident?
a) Reviewing log data
b) Performing system updates
c) Increasing network bandwidth
d) Implementing data loss prevention
Answer: a) Reviewing log data
Reasoning: By reviewing log data, the company can analyze the events leading up to the incident and
identify any suspicious or unauthorized activities, helping to pinpoint the source of the security breach.
35. An organization wants to monitor and regulate outbound data transfers to prevent data leakage.
Which solution should the organization deploy for this purpose?
a) Firewalls
b) Intrusion Detection System (IDS)
c) Remote authentication servers
d) Data Loss Prevention (DLP)
Answer: d) Data Loss Prevention (DLP)
Reasoning: DLP solutions are designed to monitor and control data leaving the organization's IT
environment, including various channels such as email, file transfer, and web postings.
36. A company experienced unauthorized changes to its log files, compromising the integrity of the log
data.
What measure can mitigate the risk of unauthorized changes to log files?
a) Regular log reviews
b) Increasing storage capacity
c) Implementing intrusion detection systems
d) Applying access controls to log files
Answer: d) Applying access controls to log files
Reasoning: By implementing access controls, the organization can restrict who can modify or delete log
files, reducing the risk of unauthorized changes and maintaining the integrity of the log data.
37. A security incident occurred, and the organization needs to determine if similar vulnerabilities have
been exploited in the past.
Which practice can help in this situation?
a) Conducting regular log reviews
b) Increasing network bandwidth
c) Monitoring system performance
d) Retaining and reviewing historic audit logs
Answer: d) Retaining and reviewing historic audit logs
Reasoning: Historic audit logs provide a record of past events and can help identify if a similar
vulnerability has been exploited previously. By reviewing these logs, the organization can gain insights
into any previous security incidents and take necessary measures to prevent future occurrences.
40. Which type of encryption uses the same key for both encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) Substitution cipher
d) Public-key encryption
Answer: a) Symmetric encryption
Reasoning: Symmetric encryption utilizes the same key for both encryption and decryption processes,
making it essential for both communicating parties to have knowledge of the shared key.
42. A company wants to ensure the confidentiality of sensitive customer data during transmission over the
internet.
Which encryption method would be suitable for achieving this goal?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Substitution cipher
Answer: b) Asymmetric encryption
Reasoning: Asymmetric encryption, with the use of public and private keys, allows for secure
transmission of data over untrusted channels, ensuring confidentiality.
43. A user wants to digitally sign a document to ensure its authenticity and non-repudiation.
Which encryption method would be appropriate for this purpose?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Substitution cipher
Answer: b) Asymmetric encryption
Reasoning: Asymmetric encryption enables the user to sign the document using their private key, which
can be verified by anyone with access to the corresponding public key, ensuring authenticity and non-
repudiation.
44. An organization needs to securely exchange encryption keys with a remote location.
Which approach should be used for key distribution?
a) Sending the key through the same channel as the encrypted message
b) Out-of-band key distribution
c) Storing the key in a secure database
d) Sharing the key via email
Answer: b) Out-of-band key distribution
Reasoning: To maintain the security of the key, it should be distributed through a different channel or
medium than the encrypted message to prevent interception by potential attackers. This is known as out-
of-band key distribution.
46. Which encryption method uses a different key for encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Substitution cipher
Answer: b) Asymmetric encryption
Reasoning: Asymmetric encryption uses a different key for encryption and decryption, with the
encryption key being public and the decryption key being private.
49. An organization wants to secure their sensitive data stored on a cloud server.
Which encryption approach would be most appropriate for this scenario?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Substitution cipher
Answer: a) Symmetric encryption
Reasoning: Symmetric encryption is commonly used for securing data at rest, such as encrypting files
stored on a cloud server, as it provides efficient and secure encryption of large data volumes.
50. A user wants to securely transmit confidential information to another user without exchanging keys
beforehand.
Which encryption method would best address this requirement?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Substitution cipher
Answer: b) Asymmetric encryption
Reasoning: Asymmetric encryption allows for secure communication without the need for prior key
exchange. The sender can encrypt the information using the recipient's public key, and only the recipient,
with their private key, can decrypt and access the information.
51. A company wants to ensure the confidentiality and integrity of their network traffic.
Which encryption technique would be suitable for this purpose?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Substitution cipher
Answer: a) Symmetric encryption
Reasoning: Symmetric encryption is commonly used for encrypting network traffic, such as using
protocols like IPsec or TLS to protect the confidentiality and integrity of data transmitted between
systems.
52. Scenario: A user wants to verify the integrity and authenticity of a downloaded software package.
Which encryption approach would be most appropriate for this scenario?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Substitution cipher
Answer: c) Hashing
Reasoning: Hashing can be used to verify the integrity and authenticity of downloaded software packages
by generating a hash value of the package and comparing it to the expected hash value provided by the
software provider. If the hash values match, it ensures the file has not been tampered with during the
download process.
55. Which encryption method uses the same key for both encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Substitution cipher
Answer: a) Symmetric encryption
Reasoning: Symmetric encryption employs the same key for both the encryption and decryption
processes.
57. Which property of a cryptographic hash function makes it computationally infeasible to reverse the
hash process?
a) Content integrity assurance
b) Nonreversibility
c) Determinism
d) Uniqueness
Answer: b) Nonreversibility
Reasoning: Cryptographic hash functions are designed to be computationally infeasible to reverse the
hash process and derive the original plaintext from the hash value.
58. A software developer wants to ensure the integrity of software packages during distribution.
Which cryptographic technique can be used to verify the integrity of software packages?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signatures
Answer: c) Hashing
Reasoning: Hashing can be used to create a message digest of software packages and verify their integrity
by comparing the generated hash value with the expected hash value.
59. A user suspects that their password file has been compromised.
What offline attack can be performed on password hashes?
a) Brute force attack
b) Dictionary attack
c) Rainbow table attack
d) Birthday attack
Answer: a) Brute force attack
Reasoning: In an offline brute force attack, an attacker tries different combinations of letters and numbers
to match the known password hash, usually obtained from a compromised system.
60. A company wants to compare the integrity of a software package with its original version.
Which cryptographic technique can be used for this purpose?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signatures
Answer: c) Hashing
Reasoning: Hashing can be used to compare the hash digest of the original software package with the
newly obtained version to detect any changes or tampering.
63. What property of a cryptographic hash function ensures that it is computationally infeasible to find
two different messages that hash to the same value?
a) Deterministic
b) Unique
c) Content integrity assurance
d) Nonreversibility
Answer: b) Unique
Reasoning: A cryptographic hash function should produce a unique hash value for each unique input. It
should be computationally infeasible to find two different messages that result in the same hash value.
64. Which encryption method is more suitable for encrypting large amounts of data, such as hard drives or
backups?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Substitution cipher
Answer: a) Symmetric encryption
Reasoning: Symmetric encryption is generally faster and more efficient for encrypting large volumes of
data, such as hard drives or backups. Asymmetric encryption is typically slower and more
computationally intensive.
66. Which property of a cryptographic hash function ensures that any changes in the input message result
in a completely different hash value?
a) Content integrity assurance
b) Deterministic
c) Nonreversibility
d) Unique
Answer: d) Unique
Reasoning: A cryptographic hash function should produce a completely different hash value even for
slight changes in the input message. This property ensures that any modifications to the message will be
detected.
67. Which encryption method is suitable for secure communication over an untrusted medium without
prior key exchange?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Digital signatures
Answer: b) Asymmetric encryption
Reasoning: Asymmetric encryption allows secure communication over an untrusted medium without the
need for prior key exchange. Each party uses their unique key pair consisting of a private key and a public
key. Messages encrypted with the recipient's public key can only be decrypted with their private key.
68. Which of the following is NOT a component of the configuration management process?
a) Identification
b) Baselines
c) Updates and patches
d) Encryption
Answer: d) Encryption
Reasoning: Encryption is not a component of the configuration management process. It is a separate
security measure used to protect data.
70. What is the purpose of regression and validation in the configuration management process?
a) To test the compatibility of different components
b) To verify that changes have not broken the system
c) To update the system with new features
d) To identify vulnerabilities in the system
Answer: b) To verify that changes have not broken the system
Reasoning: Regression and validation processes are used to ensure that changes applied to the system
have not introduced any issues or broken the functionality of the system.
76. What is the challenge with patch management when it comes to testing patches?
a) Lack of budget for maintaining a test environment
b) Limited availability of patches from different vendors
c) Difficulty in prioritizing critical patches
d) Complexity of patch distribution across the organization
Answer: a) Lack of budget for maintaining a test environment
Reasoning: Maintaining a test environment that matches the production environment can be challenging
due to budget limitations. Organizations may struggle to replicate the production environment for
thorough patch testing.
77. Why is it important to test patches before deploying them?
a) To ensure all patches are deployed quickly
b) To prevent system functionality issues caused by flawed patches
c) To maintain a complete inventory of patches
d) To roll back to a previous state if the patch fails
Answer: b) To prevent system functionality issues caused by flawed patches
Reasoning: Testing patches helps identify any potential system functionality issues or conflicts that may
arise from deploying flawed patches, ensuring the stability and reliability of the system.
84. Which of the following is NOT a common security-related policy in most organizations?
a. Appropriate use of data
b. Password policy
c. Acceptable use policy (AUP)
d. Bring your own device (BYOD) policy
Answer: d. Bring your own device (BYOD) policy
86. Which policy defines the acceptable use of the organization's network and computer systems?
a. Appropriate use of data policy
b. Password policy
c. Acceptable use policy (AUP)
d. Bring your own device (BYOD) policy
Answer: c. Acceptable use policy (AUP)
87. An employee is using the organization's network for personal file sharing and downloading
copyrighted material. Which policy is being violated?
a. Appropriate use of data policy
b. Password policy
c. Acceptable use policy (AUP)
d. Bring your own device (BYOD) policy
Answer: c. Acceptable use policy (AUP)
Reasoning: The scenario describes an employee using the organization's network inappropriately for
personal activities, which violates the acceptable use policy.
89. Why should employees be required to sign a copy of the acceptable use policy (AUP)?
a. To track their internet usage
b. To demonstrate compliance with data retention policies
c. To hold them accountable for adhering to the policy
d. To determine their password formulation standards
Answer: c. To hold them accountable for adhering to the policy
90. What challenge does the bring your own device (BYOD) policy pose for security professionals?
a. Loss of control over standardization and privacy
b. Increased costs for acquiring approved devices
c. Difficulty enforcing data retention policies
d. Inability to access personal information on employee devices
Answer: a. Loss of control over standardization and privacy
91. An organization allows employees to use their personal smartphones for business purposes. However,
during a forensic audit, it becomes challenging to ensure the devices are securely configured and free
from vulnerabilities. Which policy implementation could have prevented this?
a. Appropriate use of data policy
b. Password policy
c. Acceptable use policy (AUP)
d. Bring your own device (BYOD) policy
Answer: d. Bring your own device (BYOD) policy
Reasoning: The scenario highlights the challenges caused by using personal devices for business
purposes, which could have been addressed through a well-implemented BYOD policy.
95. What should a public document associated with an organization's privacy policy explain?
a. The process for data retention
b. How private information is used internally and externally
c. Procedures for handling PII/ePHI
d. Senior leadership's commitment to privacy protection
Answer: b. How private information is used internally and externally
96. What are the three major activities involved in change management?
a. Data classification, password formulation, and system access
b. Decision to change, making the change, and confirming the change
c. Change approvals, enforcing policies, and monitoring system access
d. Compliance with regulations, risk assessment, and data retention
Answer: b. Decision to change, making the change, and confirming the change
97. Why is change management important for security?
a. It helps reduce the potential of security breaches.
b. It ensures compliance with regulatory obligations.
c. It allows organizations to monitor system access.
d. It establishes password formulation standards.
Answer: a. It helps reduce the potential of security breaches.
100. What should be outlined clearly during onboarding regarding security policies?
a. Consequences of noncompliance
b. Vision and mission of the organization
c. Procedures for requesting changes
d. Roles and responsibilities of IT professionals
Answer: a. Consequences of noncompliance
103. An employee violates a security policy by accessing sensitive data without proper authorization.
What consequence might they face based on the provided information?
a. A warning
b. Forced leave of absence
c. Suspension without pay
d. Termination
Answer: b. Forced leave of absence
Reasoning: The scenario describes a violation that may result in a more severe consequence than a
warning, but not as severe as termination.
107. A requested change has been implemented, but it is causing performance issues. What should be
done based on the information provided?
a. Monitor the change and schedule a subsequent change if necessary
b. Immediately initiate the rollback plan
c. Request approval for additional changes to address the performance issues
d. Terminate the change management process
Answer: a. Monitor the change and schedule a subsequent change if necessary
Reasoning: The scenario suggests inadequate performance, which requires monitoring and potential
further changes as part of the change management process.
110. Who should provide input during the change management process?
a. End users, IT professionals, and management
b. Quality or risk management department only
c. Information Security professionals and developers
d. IT professionals and end users only
Answer: a. End users, IT professionals, and management
112. An employee submits a request for a change to the organization's network infrastructure. The change
involves reconfiguring firewall rules to allow access to a new server. What should be the next step in the
change management process?
a. Evaluate the RFC for completeness
b. Assign the change authorization process based on risk
c. Test the change before implementing it
d. Document the change in the production environment
Answer: a. Evaluate the RFC for completeness
Reasoning: Evaluating the RFC (Request for Change) for completeness is an essential step in the change
management process. It ensures that all necessary information is provided, including the details of the
requested change, its impact, and the associated risks.
113. During the change management process, a stakeholder raises concerns about potential security risks
associated with a proposed change. What should be the appropriate action?
a. Proceed with the change as planned
b. Reject the change based on the stakeholder's concerns
c. Evaluate the security risks and make necessary adjustments to the change
d. Document the stakeholder's concerns for future reference
Answer: c. Evaluate the security risks and make necessary adjustments to the change
Reasoning: When a stakeholder raises concerns about potential security risks, it is crucial to address those
concerns and evaluate the associated risks. Making necessary adjustments to the change based on the
security considerations ensures that the change can be implemented while mitigating potential security
vulnerabilities.
114. After implementing a change, the organization realizes that it is causing disruptions in the production
environment. What should be the immediate action?
a. Roll back the change to the previous state
b. Monitor the change for further assessment
c. Document the impact of the change for future reference
d. Request additional approvals for remediation actions
Answer: a. Roll back the change to the previous state
Reasoning: If a change implementation leads to disruptions in the production environment, the immediate
action should be to roll back the change to the previous state. This helps restore stability and ensures that
business operations can continue without the adverse effects caused by the change.
115. During the change management process, an IT team identifies a potential rollback plan if the
implemented change does not meet the desired objectives. What does this signify?
a. The change management process is complete
b. The change management process requires further approvals
c. Contingency plans are in place to revert to the legacy system
d. The change has been successfully tested and validated
Answer: c. Contingency plans are in place to revert to the legacy system
Reasoning: Identifying a potential rollback plan indicates that contingency measures have been
considered and established in case the implemented change does not meet the desired objectives. This
signifies that there are plans to revert to the previous system state if necessary, ensuring continuity of
operations and minimizing any potential negative impacts.
116. Which of the following learning activities aims to improve understanding and application of ideas?
a. Education
b. Training
c. Awareness
d. Perception
Answer: a. Education
119. A newly hired senior executive with little exposure to the organization's compliance needs needs to
understand the importance of information security. What type of learning activity should be used to make
them aware?
a. Education
b. Training
c. Awareness
d. Perception
Answer: c. Awareness
Reasoning: The scenario describes the need to attract and engage the executive's attention to make them
aware of the organization's specific compliance needs, which aligns with the purpose of awareness
activities.
120. Which type of learning activity aims to improve learners' understanding and ability to relate ideas to
their own experiences?
a. Education
b. Training
c. Awareness
d. Perception
Answer: a. Education
123. In a security awareness training program, employees working in a secure server room need to
understand the interaction of fire safety systems. Which type of learning activity would help them with
this understanding?
a. Education
b. Training
c. Awareness
d. Perception
Answer: a. Education
Reasoning: Education activities aim to help learners improve their understanding, in this case, of the
interaction of fire safety systems in a secure server room.
124. What is the purpose of simulated phishing emails in a security awareness training program?
a. Testing users' ability to identify phishing emails
b. Increasing users' proficiency in social engineering attacks
c. Building awareness of the threat posed by phishing
d. Engaging users in creating their own defensive strategies
Answer: a. Testing users' ability to identify phishing emails
125. What should a security awareness program emphasize about social engineering?
a. Its effectiveness as an inexpensive investment for bad actors
b. The need to recognize and resist social engineering attacks
c. The connection between social engineering and espionage agencies
d. The application of social engineering in police investigations
Answer: b. The need to recognize and resist social engineering attacks
126. A user receives a phone call requesting their login credentials in exchange for a monetary payment.
What type of social engineering tactic is this?
a. Phone phishing or vishing
b. Pretexting
c. Quid pro quo
d. Tailgating
Answer: c. Quid pro quo
Reasoning: The scenario describes a situation where the attacker requests login credentials in exchange
for compensation, which aligns with the quid pro quo social engineering tactic.
128. An individual impersonates an IT support worker to gain access to a user's computer and
information. What type of social engineering tactic is this?
a. Phone phishing or vishing
b. Pretexting
c. Quid pro quo
d. Tailgating
Answer: b. Pretexting
Reasoning: The scenario describes the impersonation of an authority figure to gain access to login
information, which aligns with the pretexting social engineering tactic.
132. An employee shares their password with a co-worker who claims to need it for a specific task. What
is the potential risk associated with this action?
a. The co-worker may misuse the password for unauthorized access
b. The employee may forget their own password
c. The co-worker may accidentally disclose the password to others
d. The employee's supervisor may consider it a policy violation
Answer: a. The co-worker may misuse the password for unauthorized access
Reasoning: Sharing passwords with others, even if they are co-workers, increases the risk of unauthorized
access and potential misuse of sensitive information.
134. What should a recommended password management solution provide for users?
a. A secure cloud storage for all passwords
b. A weak password or passphrase chosen by the user
c. Different passwords for different systems
d. Encouragement to write down passwords for easy access
Answer: c. Different passwords for different systems
135. Why is it important to raise awareness about the threat of phishing in security awareness training?
a. Phishing attacks are inexpensive investments for bad actors
b. Phishing attacks can be easily prevented with proper training
c. Phishing attacks are a significant threat to individuals and organizations
d. Phishing attacks are rare and unlikely to affect most users
Answer: c. Phishing attacks are a significant threat to individuals and organizations
136. How can security awareness training help in countering social engineering attacks?
a. By educating users about social engineering tactics
b. By providing task-specific learning for specific social engineering scenarios
c. By attracting and engaging users' attention through awareness activities
d. All of the above
Answer: d. All of the above
137. What role do education, training, and awareness play in countering social engineering attacks?
a. They help people realize their role in information security
b. They build proficiency in recognizing and resisting social engineering
c. They improve understanding of the threat and types of social engineering
d. All of the above
Answer: d. All of the above
138. How can security awareness programs help improve password protection practices?
a. By encouraging the use of password managers for all systems
b. By discouraging the use of different passwords for different systems
c. By promoting the importance of strong and unique passwords
d. By providing employees with a list of recommended passwords
Answer: c. By promoting the importance of strong and unique passwords
139. According to the narrator, how long would it take to crack a 10-number password using brute force
attack software?
a. 5 seconds
b. 35 days
c. 152,000 years
d. It cannot be cracked
Answer: a. 5 seconds
140. What is the advantage of using a 16-character password with one upper case and one special
character?
a. It is easier to remember
b. It cannot be cracked
c. It takes less time to crack than an 8-character password
d. It takes significantly longer to crack compared to an 8-character password
Answer: d. It takes significantly longer to crack compared to an 8-character password
141. To promote awareness and improve password security, the organization encourages friendly
competition between departments to spot phishing attempts. What is the purpose of this approach?
a. To identify the most vulnerable departments
b. To create a positive and engaging awareness experience
c. To penalize departments for falling victim to phishing
d. To discourage reporting of phishing attempts
Answer: b. To create a positive and engaging awareness experience
Reasoning: By fostering friendly competition, the organization aims to create a positive and engaging
experience around phishing awareness, encouraging employees to actively participate in identifying and
reporting phishing attempts.
142. What is one way to provide positive feedback for reported simulated phishing emails?
a. Give monetary rewards to employees who report the most emails
b. Send warning emails to employees who fail to report phishing attempts
c. Provide recognition or rewards for employees who report phishing attempts
d. Increase the frequency of simulated phishing emails for employees
Answer: c. Provide recognition or rewards for employees who report phishing attempts
143. What should be the primary focus of awareness training for information security?
a. Creating a punitive environment
b. Promoting a positive experience for everyone
c. Identifying and penalizing individuals for security breaches
d. Ensuring strict adherence to policies and procedures
Answer: b. Promoting a positive experience for everyone
144. The organization emphasizes the importance of providing personnel with the opportunity to practice
what they've learned through exercises and simulations. What is the benefit of this approach?
a. It helps identify the weakest areas in the organization's security
b. It creates a punitive environment for employees
c. It discourages employees from reporting security incidents
d. It reinforces and enhances the knowledge and skills acquired during training
Answer: d. It reinforces and enhances the knowledge and skills acquired during training
Reasoning: By allowing personnel to practice what they've learned through exercises and simulations, it
helps reinforce and enhance their knowledge and skills related to information security, making them
better prepared to respond to real-world security incidents.