0% found this document useful (0 votes)
29 views17 pages

Practice Question 1

The document contains questions about information security topics and the correct answers to each question. It tests knowledge in areas like protocols, access controls, cloud concepts, and disaster recovery plans.

Uploaded by

Alabam Joe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views17 pages

Practice Question 1

The document contains questions about information security topics and the correct answers to each question. It tests knowledge in areas like protocols, access controls, cloud concepts, and disaster recovery plans.

Uploaded by

Alabam Joe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Question 1: Correct

A company is deploying a new application that requires secure communication between


clients and the server.
Which of the following protocols would BEST meet this requirement?
Explanation
Ans: HTTPS(Hypertext Transfer Protocol Secure)

HTTPS is provide security communication between client & server

Question 2: Correct
What goal of security is enhanced by a STRONG business continuity program?
Explanation
ANS: Availability

Question 3: Correct
What term describes RISKS that originate inside the organization?
Explanation
Ans: Internal

Question 4: Correct
If Alice wants to send a message to Bob using symmetric cryptography, what key does
she use to encrypt the message?
Explanation
Ans: Shared secret key

Question 5: Incorrect
You are a member of the team that has been selected to create your organization's
business continuity plan. What is the most vital document in this plan?

Explanation
Ans: Business impact analysis (BIA)

Question 6: Correct
Sam Is Searching For A Forum Where He Can Share Threat Intelligence Information
With Others From His Industry In A Collaborative, Industry-Specific Forum. What Type
Of Organization Would Best Meet His Needs?

Explanation
Ans: Information Sharing & Analysis (ISACs)
Question 7: Incorrect
The purpose of mandatory vacations as a security measure is to discover which of the
following?
Explanation
Mandatory vacations are an administrative control which provides operational security
by forcing employees to take vacations and reinforces job rotation principles adding the
advantage that an employee sharing that job may determine if unethical occurrences
have been made.

Question 8: Correct
What is the minimum acceptable temperature for a data center?
Explanation
Ans: 64.4 degrees Fahrenheit

Question 9: Incorrect
What access management concept defines what rights or privileges a user has?
Explanation
Ans: Authorization

Question 10: Correct


Quantified harm caused when a vulnerability is exploited is known as what?
Explanation
Ans: Impact

Question 11: Correct


What is the purpose of hot and cold aisles?

Explanation
Ans: to control airflow in the data center

Question 12: Correct


You are training several IT professionals on security and access control. You need to
explain to the professionals the most common form of identification and authentication.

What identification and authentication mechanism should you explain?

Explanation
Ans: user identification with reusable password

Question 13: Incorrect


You are providing end-user security awareness training. As part of this training, you
explain why the organization uses asymmetric encryption and how it works.
What is used to decrypt a file in this type of encryption?
Explanation
Ans: private key
Question 14: Correct
Which of the following is not defined in RFC 1918 as one of the private IP address
ranges that are not routed on the Internet?
Explanation
Ans: The address range 169.172.0.0–169.191.255.255 is not listed in RFC 1918 as a
public IP address range.

Question 15: Incorrect


Confidentiality is dependent upon which of the following?
Explanation
Ans: Integrity

Without integrity, confidentiality cannot be maintained.

Question 16: Incorrect


What was the primary purpose of Separation of duties in an organizations?

Explanation
Main purpose of Separation of duties is Data Integrity. Data can"t modified by
unauthorized person

Question 17: Correct


You need to remove data from a storage media that is used to store confidential
information.

Which method is NOT recommended?


Explanation
Ans: formatting

Question 18: Correct


Which of the following is an example of a security control that provides accountability?
Explanation
Ans: Audit logs

Audit log will give clear picture, who has made change in system and make them
accountable.

Other Options are not relevant here.

Question 19: Incorrect


A cloud-based service that provides account provisioning, management, authentication,
authorization, reporting, and monitoring capabilities is known as what type of service?
Explanation
Ans: Identity as a service (IDaaS)

Identity as a service (IDaaS) provides capabilities such as account provisioning,


management, authentication, authorization, reporting, and monitoring. Platform as a
service (PaaS), infrastructure as a service (IaaS), and software as a service (SaaS)

Question 20: Correct


What is the process that occurs when the Session layer removes the header from data
sent by the Transport layer?
Explanation
Ans: De-encapsulation

Question 21: Correct


What is the purpose of the backup of electronically stored data on hdd?
Explanation
Main purpose is to keep data available whenever needed i.e during hdd crash

Question 22: Correct


A risk has been determined to have a low probability but very high impact.
What methodology was used to evaluate this risk?

Explanation
Ans: Qualitative

Question 23: Correct


What network port is used for SSL/TLS VPN connections?

Explanation
Ans: 443

Port 443: HTTPS


Port 88 : Kerberos
Port 80: HTTP
Port 1521 : SQL Port

Question 24: Correct


Bob has been tasked with writing a policy that describes how long data should be kept
and when it should be purged. What concept does this policy deal with?
Explanation
Ans:Record retention

Question 25: Incorrect


What process is typically used to ensure data security for workstations that are being
removed from service but that will be resold or otherwise reused?

Explanation
When done properly, a sanitization process fully ensures that data is not remnant on the
system before it is reused. Clearing and erasing can both be failure prone, and of
course destruction wouldn’t leave a machine or device to reuse

Question 26: Correct


Raj’s new employer has hired him for a position with access to their trade secrets and
confidential internal data. What legal tool should they use to help protect their data if he
chooses to leave to work at a competitor?

Explanation
Ans: NDA

A nondisclosure agreement (NDA) is a legal agreement between two parties that


specifies what data they will not disclose.

Question 27: Correct


Which one of the following is an example of a manmade disaster?

Explanation
Ans: Transformer failure

Question 28: Correct


Which of the following are the storage types associated with IaaS?

Explanation
Ans: Volume and object

Question 29: Correct


Which role is considered the leader of the business continuity plan committee and is
responsible for the overall success of the business continuity plan?

Explanation
Ans: business continuity coordinator

Question 30: Incorrect


Which one of the following is not a possible hash length from the SHA-2 function?

Explanation
Ans: 128 bits

Question 31: Correct


Which type of control is an example of a detective control?
Explanation
Ans: Closed-circuit television (CCTV)

Question 32: Incorrect


What authentication technology can be paired with OAuth to perform identity verification
and obtain user profile information using a RESTful API?

Explanation
Ans: OpenID Connect

Question 33: Incorrect


Which element of the security policy framework includes suggestions that are not
mandatory?

Explanation
Ans: Guidelines

Question 34: Incorrect


Which of the following common use cases would address the issue of data leakage
from a side-channel attack?

Explanation
Ans: Supporting high resiliency

Question 35: Correct


After 10 years working in her organization, Helia is moving into her fourth role, this time
as a manager in the accounting department. What issue is likely to show up during an
account review if her organization does not have strong account maintenance
practices?

Explanation
Privilege creep is a common problem when employees change roles over time and their
privileges and permissions are not properly modified to reflect their new roles. Least
privilege issues are a design or implementation problem, and switching roles isn’t
typically what causes them to occur.
Question 36: Correct
Twinklena Is Implementing A Network Access Control Solution For An Open Guest
Network. She Would Like To Use An Approach That Does Not Require Installing
Software On Systems Joining The Network But Can Limit Them To A Quarantine
Network Until They Successfully Pass A Health Check. What NAC Solution Would Best
Meet Her Needs?

Explanation
Ans: Captive Portal

Question 37: Correct


What are the elements of the CIA Triad?

Explanation
Ans: Confidentiality, integrity, and availability

Question 38: Correct


What type of security control is designed to stop a security issue from occurring in the
FIRST place?

Explanation
Ans: Preventive

Question 39: Incorrect


The type of access granted to an object and the actions that you can take on or with the
object are examples of what?

Explanation
Ans: Permissions

Question 40: Correct


Fred needs to transfer files between two servers on an untrusted network. Since he
knows the network isn’t trusted, he needs to select an encrypted protocol that can
ensure that his data remains secure. What protocol should he choose?

Explanation
The Secure File Transfer Protocol (SFTP) is specifically designed for encrypted file
transfer.

Question 41: Incorrect


Purchasing server instances and configuring them to run your own software is an
example of what cloud deployment model?

Explanation
Ans: IaaS

Question 42: Correct


Which of the following AAA protocols is the most commonly used?

Explanation
Ans: TACACS+

Question 43: Correct


What UDP port is typically used by the syslog service?

Explanation
Ans: UDP 514

Question 44: Correct


What type of security policy normally describes how users may access business
information with their OWN devices?

Explanation
Ans: BYOD policy

Question 45: Correct


During an incident response, what is the highest priority of FIRST responders?

Explanation
Ans: Containing the damage

Question 46: Correct


Which one of the following disaster recovery tests involves the actual activation of the
DR site?

Explanation
Ans: Parallel test

Question 47: Correct


Which of the following is an example of a physical security control?
Explanation
Security Camera - Its hardware control.
Question 48: Correct
You have recently been hired as a security administrator for your company. In the
security documentation, it mentions that message authentication code (MAC) is
implemented.
What does this ensure?

Explanation
Ans: message integrity
Question 49: Correct
What is meant by MTBF?

Explanation
Ans: The average amount of time from one failure to the next

Question 50: Incorrect


A company wants to protect the integrity of their data. Which of the following
cryptographic concepts should they implement?

Explanation
Ans: Secure hashing algorithms

Question 51: Correct


What operation uses a cryptographic key to convert plaintext into ciphertext?

Explanation
Ans: Encryption

Question 52: Correct


What type of access control is composed of policies and procedures that support
regula?tions, requirements, and the organization’s own policies?

Explanation
Ans: Administrative

Question 53: Incorrect


Something you know is an example of what type of authentication factor?

Explanation
Ans: Type 1

A Type 1 authentication factor is something you know.

A Type 2 authentication factor is something you have, like a smartcard or hardware


token.

A Type 3 authentication factor is something you are, like a biometric identifier.

There is no such thing as a Type 4 authentication factor.

Question 54: Correct


Which type of analysis involves comparing the cost of implementing a safeguard to the
impact of a possible threat?

Explanation
Ans: risk analysis
Question 55: Incorrect
Which one of the following intellectual property protection mechanisms has the shortest
duration?

Explanation
Ans: Patents

Question 56: Correct


Which cloud deployment model exclusively uses dedicated cloud resources for a
customer?

Explanation
Ans: Private Cloud

Question 57: Incorrect


A password that requires users to answer a series of Questions like “What is your
mother’s maiden name?” or “What is your favorite color?” is known as what type of
password?

Explanation
Ans: Cognitive passwords

Question 58: Correct


Your organization has just expanded its network to include another floor of the building
where your offices are located. You have been asked to ensure that the new floor is
included in the business continuity plan. What should you do?
Explanation
Ans: Update the business continuity plan to include the new floor and its functions.

Question 59: Correct


The process for assigning a dollar value to anticipated losses resulting from a threat
source successfully exploiting a vulnerability is known as ____?

Explanation
Ans: A qualitative risk analysis "Qualitative risk analysis" assesses impact in relative
terms such as high, medium, and low impact without assigning a dollar value.

Question 60: Incorrect


The correct choice for encrypting the entire original data packet in a tunneled mode for
an IPSec solution is____?

Explanation
Ans: Encapsulating Security Payload (ESP)
An IPSec solution that uses ESP will encapsulate the entire original data packet when
implemented in a tunnel mode.

Question 61: Correct


Which of the following is an example of a security control that provides availability?

Explanation
Ans: Data backup

When CIA(Information Security principle) comes with available, please think, how we
can make availble data to all user i.e

Question 62: Correct


What law applies to the use of personal information belonging to European Union
residents?

Explanation
Ans: GDPR

The General Data Protection Regulation is a Regulation in EU law on data protection


and privacy in the EU and the European Economic Area.

Question 63: Incorrect


David Recently Posted Signs Around His Organization’s Facility Warning Visitors That
The Area Is Under 24 Hour Video Surveillance. What Term Best Describes This
Control?

Explanation
Ans: Deterrent

Question 64: Incorrect


Which cryptographic attacks attempt to produce the same hash value from a brute force
attack using two inputs? (Choose two.)

Explanation
Ans: Collision & Birthday

Question 65: Incorrect


Your organization is trying to decide whether to use RSA or ECC to encrypt cellular
communications.
What is an advantage of ECC over the RSA algorithm?

Explanation
Ans: ECC requires fewer resources.

Question 66: Correct


Which of the following attributes are added beyond traditional access control
mechanisms (RBAC, MAC, and DAC) in order to implement ABAC?

Explanation
Ans: Context

Question 67: Incorrect


You Are Seeking To Secure A Windows Server And Would Like To Find A Security
Standard That Is Independent Of Both Government Agencies And The Vendors
Involved In Providing Your Operating System And Software.
Which One Of The Following Sources Would BEST Meet Your Needs?

Explanation
Ans: CIS

Question 68: Correct


At which OSI model layer does the IPSec protocol function?

Explanation
Ans: Network

Question 69: Correct


A web application accesses information in a database to retrieve user information. What
is the web application acting as?

Explanation
Ans: Subjects

Question 70: Correct


Your organization has decided to implement an encryption algorithm to protect data.
One IT staff member suggests that the organization use IDEA.
Which strength encryption key is used in this encryption algorithm?

Explanation
Ans: 128-bit

Question 71: Correct


Your company's security policy includes system testing and security awareness training
guidelines. Which control type is this considered?

Explanation
Ans: preventative administrative control

Question 72: Incorrect


A company is implementing a multi-factor authentication solution for remote access.
Which of the following is an example of an authentication factor that could be used?
Explanation
Ans: All of the above

Question 73: Correct


Security professionals with a (ISC)2 certification are expected to serve first:

Explanation
Human first concept is the prime focus of isc2

Question 74: Correct


Dogs, guards, and fences are all common examples of what type of control?

Explanation
Ans: Physical

Question 75: Correct


What disaster recovery metric provides the targeted amount of time to restore a service
after a failure?

Explanation
Ans: RTO

Question 76: Incorrect


The business continuity team is interviewing users to gather information about business
units and their functions. Which part of the business continuity plan includes this
analysis?

Explanation
Ans: Business impact analysis (BIA)

Question 77: Correct


Which one of the following data sanitization strategies is most secure?
Explanation
Ans: destruction

Question 78: Correct


Max is responding to a recent security incident and is seeking information on the
approval process for a recent modification to a system’s security settings.
Where would he most likely find this information?

Explanation
Ans: change log

The change log contains information about approved changes and the change
management process. While other logs may contain details about the change’s effect,
the audit trail for change management would be found in the change log.
Question 79: Correct
A web application accesses information in a database to retrieve user information. What
is the web application acting as?

Explanation
Ans:

Subjects are active entities that can access a passive object to retrieve information from
or about an object. Subjects can also make changes to objects when they are properly
authorized. Users are often subjects, but not all subjects are users.

Question 80: Incorrect


Which of the following is the PRIMARY purpose of a digital certificate?

Explanation
Ans: To protect data at rest.

Question 81: Incorrect


When a user attempts to log into their online account, Google sends a text message
with a code to their cell phone. What type of verification is this?

Explanation
Ans: Out-of-band identity proofing

Question 82: Correct


When you're designing a security system for Internet-delivered e-mail, which of the
following is least important?

Explanation
Ans: Availability

Question 83: Incorrect


Which type of application serves as a core for the business operations of an
organization?

Explanation
Ans: A critical application

Question 84: Correct


When vm are constructed and destroyed in elastic cloud computing environments, the
same physical hardware is commonly used by different clients over time. Implications
for which of the following data security issues does this have?

Explanation
Main drawback is privay, because same hdd can be used for other client too. SO in
cloud main drawback of Data is Confidentiality
Question 85: Incorrect
Creating incident response policies for an organization would be an example of ---?

Explanation
Ans: An administrative control

Administrative controls are “managerial” and are a part of corporate security policy.

Question 86: Incorrect


If availability of authentication services is the organization’s biggest priority, what type of
identity platform should Ben recommend?

Explanation
Ans: Hybrid

Question 87: Correct


What is the MINIMUM number of disk required to perform RAID level 5?

Explanation
Ans: 3

Question 88: Incorrect


What type of backup includes only those files that have changed since the most recent
full or incremental backup?

Explanation
Ans: Incremental

Question 89: Correct


Ann continues her investigation and realizes that the traffic generating the alert is
abnormally high volumes of inbound UDP traffic on port 53.
What service typically uses this port?

Explanation
Ans: DNS

Port 53 is DNS port

Question 90: Incorrect


When Chris verifies an individual’s identity and adds a unique identifier like a user ID to
an identity system, what process has occurred?

Explanation
Ans: Registration
Registration is the process of adding a user to an identity management system. This
includes creating their unique identifier and adding any attribute information that is
associated with their identity. Proofing occurs when the user provides information to
prove who they are. Directories are managed to maintain lists of users, services, and
other items. Session management tracks application and user sessions.

Question 91: Correct


Which of the following are the storage types associated with PaaS?

Explanation
Structured and unstructured

Question 92: Correct


Which of the following is an example of a biometric authentication method?

Explanation
Ans: Fingerprint scanner

Question 93: Correct


Marty discovers that the access restrictions in his organization allow any user to log into
the workstation assigned to any other user, even if they are from completely different
departments. This type of access most directly violates which information security
principle?

Explanation
This broad access may indirectly violate all of the listed security principles, but it is most
directly a violation of least privilege because it grants users privileges that they do not
need for their job functions

Question 94: Incorrect


When calculating risks by using the quantitative method, what is the result of multiplying
the asset values by the exposure factor (EF)?

Explanation
Ans: SLE

Question 95: Incorrect


What term BEST describes making a snapshot of a system or application at a point in
time for later comparison?

Explanation
Ans: Baselining

Question 96: Incorrect


Your organization has recently adopted a new security policy. As part of this policy, you
must implement the appropriate technologies to provide confidentiality.
Which technology provides this?

Explanation
Ans: asymmetric encryption

Question 97: Correct


Management has requested that you implement controls that take corrective action
against threats. Which entity is an example of this type of control?

Explanation
Ans: Business continuity planning

Question 98: Correct


Nessus is an example of a _____ tool?

Explanation
Ans: Network vulnerability scanning

Question 99: Incorrect


Which intrusion detection system (IDS) uses a magnetic field to detect intrusions?

Explanation
Ans: a proximity detector

Question 100: Correct


What network device can connect together multiple networks?

Explanation
Ans: Router"
https://www.udemy.com/course/isc2-certified-in-cybersecuritycc-practice-
exam/learn/quiz/5815616/result/962902952#:~:text=ISC2%20%2D%20CC%2Dcertified,
Ans%3A%20Router

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy