Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following BEST describes the responsibilities of a data owner?

A.

Ensuring quality and validation through periodic audits for ongoing data integrity

B.

Maintaining fundamental data availability, including data storage and archiving

C.

Ensuring accessibility to appropriate users, maintaining appropriate levels of data security

D.

Determining the impact the information has on the mission of the organization

Which one of the following affects the classification of data?

A.

Assigned security label

B.

Multilevel Security (MLS) architecture

C.

Minimum query size

D.

Passage of time

Which of the following is MOST important when assigning ownership of an asset to a department?

A.

The department should report to the business owner

B.

Ownership of the asset should be periodically reviewed

C.

Individual accountability should be ensured

D.

All members should be trained on their responsibilities

Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?

A.

Personal Identity Verification (PIV)

B.

Cardholder Unique Identifier (CHUID) authentication

C.

Physical Access Control System (PACS) repeated attempt detection

D.

Asymmetric Card Authentication Key (CAK) challenge-response

An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth. The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations and has a backlog of account management requests.

Which contract is BEST in offloading the task from the IT staff?

A.

Platform as a Service (PaaS)

B.

Identity as a Service (IDaaS)

C.

Desktop as a Service (DaaS)

D.

Software as a Service (SaaS)

A system developer has a requirement for an application to check for a secure digital signature before the application is accessed on a user's laptop. Which security mechanism

addresses this requirement?

A.

Hardware encryption

B.

Certificate revocation list (CRL) policy

C.

Trusted Platform Module (TPM)

D.

Key exchange

Which of the following is MOST important when determining appropriate countermeasures for an identified risk?

A.

Interaction with existing controls

B.

Cost

C.

Organizational risk tolerance

D.

Patch availability

What steps can be taken to prepare personally identifiable information (PII) for processing by a third party?

A.

It is not necessary to protect PII as long as it is in the hands of the provider.

B.

A security agreement with a Cloud Service Provider (CSP) was required so there is no concern.

C.

The personal information should be maintained separately connected with a one-way reference.

D.

The personal information can be hashed and then the data can be sent to an outside processor.

A subscription service which provides power, climate control, raised flooring, and telephone wiring but NOT the computer and peripheral equipment is BEST described as a:

A.

warm site.

B.

reciprocal site.

C.

sicold site.

D.

hot site.

A security professional has been assigned to assess a web application. The assessment report recommends switching to Security Assertion Markup Language (SAML). What is the

PRIMARY security benefit in switching to SAML?

A.

It uses Transport Layer Security (TLS) to address confidentiality.

B.

it enables single sign-on (SSO) for web applications.

C.

The users’ password Is not passed during authentication.

D.

It limits unnecessary data entry on web forms.

A security practitioner needs to implementation solution to verify endpoint security protections and operating system (0S) versions. Which of the following is the BEST solution to implement?

A.

An intrusion prevention system (IPS)

B.

An intrusion prevention system (IPS)

C.

Network Access Control (NAC)

D.

A firewall

A cloud service accepts Security Assertion Markup Language (SAML) assertions from users to on and security However, an attacker was able to spoof a registered account on the network and query the SAML provider.

What is the MOST common attack leverage against this flaw?

A.

Attacker forges requests to authenticate as a different user.

B.

Attacker leverages SAML assertion to register an account on the security domain.

C.

Attacker conducts denial-of-service (DoS) against the security domain by authenticating as the same user repeatedly.

D.

Attacker exchanges authentication and authorization data between security domains.

A hacker can use a lockout capability to start which of the following attacks?

A.

Denial of service (DoS)

B.

Dictionary

C.

Ping flood

D.

Man-in-the-middle (MITM)

A project manager for a large software firm has acquired a government contract that generates large amounts of Controlled Unclassified Information (CUI). The organization's information security manager has received a request to transfer project-related CUI between systems of differing security classifications. What role provides

the authoritative guidance for this transfer?

A.

Information owner

B.

PM

C.

Data Custodian

D.

Mission/Business Owner

A security engineer is assigned to work with the patch and vulnerability management group. The deployment of a new patch has been approved and needs to be applied.

The research is complete, and the security engineer has provided recommendations. Where should the patch be applied FIRST?

A.

Server environment

B.

Desktop environment

C.

Lower environment

D.

Production environment