Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An Information Technology (IT) professional attends a cybersecurity seminar on current incident response methodologies.

What code of ethics canon is being observed?

A.

Provide diligent and competent service to principals

B.

Protect society, the commonwealth, and the infrastructure

C.

Advance and protect the profession

D.

Act honorable, honesty, justly, responsibly, and legally

Which of the following mechanisms will BEST prevent a Cross-Site Request Forgery (CSRF) attack?

A.

parameterized database queries

B.

whitelist input values

C.

synchronized session tokens

D.

use strong ciphers

What is the second step in the identity and access provisioning lifecycle?

A.

Provisioning

B.

Review

C.

Approval

D.

Revocation

At a MINIMUM, audits of permissions to individual or group accounts should be scheduled

A.

annually

B.

to correspond with staff promotions

C.

to correspond with terminations

D.

continually

A user has infected a computer with malware by connecting a Universal Serial Bus (USB) storage device.

Which of the following is MOST effective to mitigate future infections?

A.

Develop a written organizational policy prohibiting unauthorized USB devices

B.

Train users on the dangers of transferring data in USB devices

C.

Implement centralized technical control of USB port connections

D.

Encrypt removable USB devices containing data at rest

Which of the following is the MOST common method of memory protection?

A.

Compartmentalization

B.

Segmentation

C.

Error correction

D.

Virtual Local Area Network (VLAN) tagging

Access to which of the following is required to validate web session management?

A.

Log timestamp

B.

Live session traffic

C.

Session state variables

D.

Test scripts

Who would be the BEST person to approve an organizations information security policy?

A.

Chief Information Officer (CIO)

B.

Chief Information Security Officer (CISO)

C.

Chief internal auditor

D.

Chief Executive Officer (CEO)

Which factors MUST be considered when classifying information and supporting assets for risk management, legal discovery, and compliance?

A.

System owner roles and responsibilities, data handling standards, storage and secure development lifecycle requirements

B.

Data stewardship roles, data handling and storage standards, data lifecycle requirements

C.

Compliance office roles and responsibilities, classified material handling standards, storage system lifecycle requirements

D.

System authorization roles and responsibilities, cloud computing standards, lifecycle requirements

Which of the following management process allows ONLY those services required for users to accomplish

their tasks, change default user passwords, and set servers to retrieve antivirus updates?

A.

Configuration

B.

Identity

C.

Compliance

D.

Patch

A system is developed so that its business users can perform business functions but not user administration functions. Application administrators can perform administration functions but not user business functions. These capabilities are BEST described as

A.

least privilege.

B.

rule based access controls.

C.

Mandatory Access Control (MAC).

D.

separation of duties.

Which of the following actions MUST be taken if a vulnerability is discovered during the maintenance stage in a System Development Life Cycle (SDLC)?

A.

Make changes following principle and design guidelines.

B.

Stop the application until the vulnerability is fixed.

C.

Report the vulnerability to product owner.

D.

Monitor the application and review code.

What is a common challenge when implementing Security Assertion Markup Language (SAML) for identity integration between on-premise environment and an external identity provider service?

A.

Some users are not provisioned into the service.

B.

SAML tokens are provided by the on-premise identity provider.

C.

Single users cannot be revoked from the service.

D.

SAML tokens contain user information.

When using third-party software developers, which of the following is the MOST effective method of providing software development Quality Assurance (QA)?

A.

Retain intellectual property rights through contractual wording.

B.

Perform overlapping code reviews by both parties.

C.

Verify that the contractors attend development planning meetings.

D.

Create a separate contractor development environment.

Which of the following MOST influences the design of the organization's electronic monitoring policies?

A.

Workplace privacy laws

B.

Level of organizational trust

C.

Results of background checks

D.

Business ethical considerations