Analyst B has discovered multiple sources which can harm the organization’s systems. What has she discovered?
Breach
Hacker
Threat
Ransomware
The Answer Is:
CExplanation:
Multiple sources that can harm an organization’s systems are classified as threats. In cybersecurity risk terminology, a threat is any circumstance, event, actor, or condition with the potential to adversely impact confidentiality, integrity, or availability. Threats can be human (external attackers, insiders, third-party compromises), technical (malware, ransomware campaigns, exploit kits), operational (misconfigurations, weak processes, inadequate monitoring), or environmental (power disruption, natural disasters). This differs from a breach, which is the realized outcome where unauthorized access or disclosure has already occurred. It also differs from hacker, which refers to one type of threat actor rather than the broader category of potential harm. Ransomware is a specific threat type (malware that encrypts data and demands payment), not a general term for multiple sources of harm. Cybersecurity documents commonly pair “threats” with “vulnerabilities” and “controls”: threats exploit vulnerabilities to create risk; controls reduce either the likelihood of exploitation or the impact if exploitation occurs. Identifying “multiple sources which can harm systems” is essentially threat identification—an early and ongoing step in risk management used to inform security architecture, monitoring, and incident preparedness. Therefore, the correct concept is threat.
If a system contains data with differing security categories, how should this be addressed in the categorization process?
Security for the system should be in line with the highest impact value across all categories
The data should be segregated across multiple systems so that they can have the appropriate security level for each
The data types should be merged into a single category and reevaluated
Security for the system should be in line with the lowest impact value across all categories
The Answer Is:
AExplanation:
When a system processes multiple information types with different security categorizations, cybersecurity standards require the system’s overall security categorization to reflect thehighest impact levelamong those information types. This is commonly called thehigh-water markapproach. The reason is straightforward: the system is only as secure as the protection applied to the most sensitive or most mission-critical data it handles. If the system were categorized at the lowest impact value, an attacker could target the weaker control baseline and still reach higher-impact information, creating an unacceptable gap in confidentiality, integrity, or availability protection.
In practice, categorization evaluates the potential impact of loss for each of the three security objectives and then selects the highest level for each objective across all information types handled by the system. That resulting system categorization then drives control selection, assurance activities, and the rigor of monitoring and incident response expectations. This approach also supports consistent governance: it prevents under-protecting systems that contain a mix of low and high sensitivity information and aligns control strength with worst-case business impact.
Segregating data across systems can be a valid architecture decision to reduce cost or scope, but it is not the required categorization rule; it is an optional design strategy that must be justified and implemented securely. Merging categories or using the lowest value contradicts risk-based protection principles and would likely fail compliance and audit scrutiny.
What terms are often used to describe the relationship between a sub-directory and the directory in which it is cataloged?
Primary and Secondary
Multi-factor Tokens
Parent and Child
Embedded Layers
The Answer Is:
CExplanation:
Directories are commonly organized in a hierarchical structure, where each directory can contain sub-directories and files. In this hierarchy, the directory that contains another directory is referred to as theparent, and the contained sub-directory is referred to as thechild. This parent–child relationship is foundational to how file systems and many directory services represent and manage objects, including how paths are constructed and how inheritance can apply.
From a cybersecurity perspective, understanding parent and child relationships matters because access control and administration often follow the hierarchy. For example, permissions applied at a parent folder may be inherited by child folders unless inheritance is explicitly broken or overridden. This can simplify administration by allowing consistent access patterns, but it also introduces risk: overly permissive settings at a parent level can unintentionally grant broad access to many child locations, increasing the chance of unauthorized data exposure. Security documents therefore emphasize careful design of directory structures, least privilege at higher levels of the hierarchy, and regular permission reviews to detect privilege creep and misconfigurations.
The other options do not describe this standard hierarchy terminology. “Primary and Secondary” is more commonly used for redundancy or replication roles, not directory relationships. “Multi-factor Tokens” relates to authentication factors. “Embedded Layers” is not a st
Recovery Point Objectives and Recovery Time Objectives are based on what system attribute?
Sensitivity
Vulnerability
Cost
Criticality
The Answer Is:
DExplanation:
Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are continuity and resilience targets that define how quickly a system must be restored and how much data loss is acceptable after an interruption. These objectives are derived primarily fromsystem criticality, meaning how essential the system is to business operations, safety, revenue, legal obligations, and customer commitments. Highly critical systems support mission-essential functions or time-sensitive services, so they require shorter RTOs (restore fast) and smaller RPOs (lose little or no data). Less critical systems can tolerate longer outages and larger data gaps, allowing longer RTOs and RPOs.
Cybersecurity and business continuity documents tie RTO/RPO determination to business impact analysis results. The BIA identifies maximum tolerable downtime, operational dependencies, and the consequences of service disruption and data unavailability. From there, organizations set RTO/RPO targets that align with risk appetite and required service levels. Those targets then drive technical and operational controls such as backup frequency, replication methods, high availability architecture, failover design, disaster recovery procedures, monitoring, and routine recovery testing.
Sensitivity focuses on confidentiality needs and may influence encryption and access controls, but it does not directly define acceptable downtime or data loss. Vulnerability describes weakness exposure and is used for threat/risk management, not recovery objectives. Cost is a constraint when selecting recovery solutions, but RTO/RPO are defined by business need and system importance first—then solutions are chosen to meet those targets within budget.
What is the purpose of Digital Rights Management DRM?
To ensure that all attempts to access information are tracked, logged, and auditable
To control the use, modification, and distribution of copyrighted works
To ensure that corporate files and data cannot be accessed by unauthorized personnel
To ensure that intellectual property remains under the full control of the originating enterprise
The Answer Is:
BExplanation:
Digital Rights Management is a set of technical mechanisms used to enforce the permitted uses of digital content after it has been delivered to a user or device. Its primary purpose is tocontrol how copyrighted works are accessed and used, including restricting copying, printing, screen capture, forwarding, offline use, device limits, and redistribution. DRM systems commonly apply encryption to content and then rely on a licensing and policy enforcement component that checks whether a user or device has the right to open the content and under what conditions. These conditions can include time-based access (expiry), geographic limitations, subscription status, concurrent use limits, or restrictions on modification and export.
This aligns precisely with option B because DRM is fundamentally aboutusage control of copyrighted digital works, such as music, movies, e-books, software, and protected media streams. In cybersecurity documentation, DRM is often discussed alongside content protection, anti-piracy measures, and license compliance. It differs from general access control and audit logging: access control determines who may enter a system or open a resource, while auditing records actions for accountability. DRM extends beyond simple access by enforcing what a legitimate user can do with the content once accessed.
Option A describes audit logging, option C describes general authorization and data access control, and option D is closer to broad information rights management goals but is less precise than the standard definition focused on controlling use and distribution of copyrighted works.
Which scenario is an example of the principle of least privilege being followed?
An application administrator has full permissions to only the applications they support
All application and database administrators have full permissions to every application in the company
Certain users are granted administrative access to their network account, in case they need to install a web-app
A manager who is conducting performance appraisals is granted access to HR files for all employees
The Answer Is:
AExplanation:
The principle of least privilege requires that users, administrators, services, and applications are granted only the minimum access necessary to perform authorized job functions, and nothing more. Option A follows this principle because the administrator’s elevated permissions are limited in scope to the specific applications they are responsible for supporting. This reduces the attack surface and limits blast radius: if that administrator account is compromised, the attacker’s reach is constrained to only those applications rather than the entire enterprise environment.
Least privilege is typically implemented through role-based access control, separation of duties, and privileged access management practices. These controls ensure privileges are assigned based on defined roles, reviewed regularly, and removed when no longer required. They also promote using standard user accounts for routine tasks and reserving administrative actions for controlled, auditable sessions. In addition, least privilege supports stronger accountability through logging and change tracking, because fewer people have the ability to make high-impact changes across systems.
The other scenarios violate least privilege. Option B grants excessive enterprise-wide permissions, creating unnecessary risk and enabling widespread damage from mistakes or compromise. Option C provides “just in case” administrative access, which cybersecurity guidance explicitly discourages because it increases exposure without a validated business need. Option D is overly broad because access to all HR files exceeds what is required for performance appraisals, which typically should be limited to relevant employee records only.
How should categorization information be used in business impact analysis?
To identify discrepancies between the security categorization and the expected business impact
To assess whether information should be shared with other systems
To determine the time and effort required for business impact assessment
To ensure that systems are designed to support the appropriate security categorization
The Answer Is:
AExplanation:
Security categorization (commonly based on confidentiality, integrity, and availability impact levels) is meant to reflect the level of harm that would occur if an information type or system is compromised. A business impact analysis, on the other hand, examines the operational and organizational consequences of disruptions or failures—such as loss of revenue, inability to deliver critical services, legal or regulatory exposure, reputational harm, and impacts to customers or individuals. Because these two activities look at impact from different but related perspectives, categorization information should be used during the BIA to confirm that the stated security categorization truly matches real business consequences.
Using categorization as an input helps analysts validate assumptions about criticality, sensitivity, and tolerance for downtime. If the BIA shows that outages or data compromise would produce greater harm than the existing categorization implies, that discrepancy signals under-classification and insufficient controls. Conversely, if the BIA demonstrates limited impact, it may indicate over-classification, potentially driving unnecessary cost and operational burden. Identifying these mismatches early supports better risk decisions, prioritization of recovery objectives, and selection of controls proportionate to actual impact.
The other options describe activities that may occur in architecture, governance, or project planning, but they are not the primary purpose of using categorization information in a BIA. The key value is reconciliation: aligning security impact levels with verified business impact.
Other than the Requirements Analysis document, in what project deliverable should Vendor Security Requirements be included?
Training Plan
Business Continuity Plan
Project Charter
Request For Proposals
The Answer Is:
DExplanation:
Vendor Security Requirements must be included in theRequest For Proposalsbecause the RFP is the formal mechanism used to communicate mandatory expectations to suppliers and to evaluate them consistently during selection. Cybersecurity and third-party risk management practices require that security expectations be establishedbeforea vendor is chosen, so the organization can assess whether a supplier can meet confidentiality, integrity, availability, privacy, and compliance obligations. Embedding requirements in the RFP makes them contractual in nature once incorporated into the final agreement and ensures vendors price and design their solution with security controls in scope rather than treating them as optional add-ons later.
Security requirements in an RFP typically cover topics such as secure development practices, vulnerability management, patching and support timelines, encryption for data at rest and in transit, identity and access controls, audit logging, incident notification timelines, subcontractor controls, data residency and retention, penetration testing evidence, compliance attestations, and right-to-audit provisions. The RFP also enables objective scoring by requesting documented evidence such as security certifications, control descriptions, and responses to standardized security questionnaires.
A training plan and business continuity plan are operational deliverables and do not drive vendor selection criteria. A project charter sets scope and governance at a high level, but it is not the primary procurement artifact for binding vendor security obligations. Therefore, the correct answer is Request For Proposals.
What is a Recovery Point Objective RPO?
The point in time prior to the outage to which business and process data must be recovered
The maximum time a system may be out of service before a significant business impact occurs
The target time to restore a system without experiencing any significant business impact
The target time to restore systems to operational status following an outage
The Answer Is:
AExplanation:
ARecovery Point Objectivedefines the acceptable amount of data loss measured in time. It answers the question: “After an outage or disruptive event,how far back in time can we restore data and still meet business needs?” If the RPO is 4 hours, the organization is stating it can tolerate losing up to 4 hours of data changes, meaning backups, replication, journaling, or snapshots must be frequent enough to restore to a point no older than 4 hours before the incident. That is exactly what option A describes: the specific point in time prior to the outage to which data must be recovered.
RPO is often paired withRecovery Time Objectivebut they are not the same. RTO focuses onhow quicklyservice must be restored, while RPO focuses onhow much datathe organization can afford to lose. Options B, C, and D all describe time-to-restore concepts, which align with RTO or related recovery targets rather than RPO.
In operational resilience and disaster recovery planning, RPO drives technical design choices: backup frequency, replication methods, storage and retention strategies, and validation testing. Lower RPO values generally require more robust and often more expensive solutions, such as near-real-time replication and strong change capture controls. RPO also influences incident response and recovery procedures to ensure restoration steps reliably meet the agreed data-loss tolerance.
Top of Form
NIST 800-30 defines cyber risk as a function of the likelihood of a given threat-source exercising a potential vulnerability, and:
the pre-disposing conditions of the vulnerability.
the probability of detecting damage to the infrastructure.
the effectiveness of the control assurance framework.
the resulting impact of that adverse event on the organization.
The Answer Is:
DExplanation:
NIST SP 800-30 describes risk using a classic risk model:risk is a function of likelihood and impact. In this model, a threat-source may exploit a vulnerability, producing a threat event that results in adverse consequences. Thelikelihoodcomponent reflects how probable it is that a threat event will occur and successfully cause harm, considering factors such as threat capability and intent (or in non-adversarial cases, the frequency of hazards), the existence and severity of vulnerabilities, exposure, and the strength of current safeguards. However, likelihood alone does not define risk; a highly likely event that causes minimal harm may be less important than a less likely event that causes severe harm.
The second required component is theimpact—the magnitude of harm to the organization if the adverse event occurs. Impact is commonly evaluated across mission and business outcomes, including financial loss, operational disruption, legal or regulatory consequences, reputational damage, and loss of confidentiality, integrity, or availability. This is why option D is correct: NIST’s definition explicitly ties the risk expression tothe resulting impact on the organization.
The other options may influence likelihood assessment or control selection, but they are not the missing definitional element. Detection probability and control assurance relate to monitoring and governance; predisposing conditions can shape likelihood. None replace the