What is the purpose of a Business Impact Analysis (BIA)?
Access control used in high-security military and government environments:
A system architecture where one instance serves multiple user groups:
Scans networks to determine connected devices and services:
Why is security training important?
What is the process of verifying a user’s identity called?
What is the main objective of DRP after a breach shuts down systems?
Mark is configuring an automated data transfer between two hosts and needs an authentication method. What approach is best suited?
A prolonged, targeted cyberattack where an intruder remains undetected for an extended period is called:
Which port is used by SSH?
Which of the following documents contains elements that are NOT mandatory?
Type 1 authentication poses which risks?
Information should be consistently and readily accessible for authorized parties.
Which cloud service model provides the most suitable environment for customers to build and operate their own software?
What is the most important aspect of security awareness and training?
Which of the following is an endpoint?
Removing the belief that a network has any trusted space and enforcing security at the most granular level is known as:
Which zero-trust component breaks LANs into very small, localized security zones?
The purpose of risk identification is:
Which type of authentication issomething which you know?
David's team recently implemented a new system that gathers information from a variety of different log sources, analyzes that information, and then triggers automated playbooks in response to security events. What term BEST describes this technology?
Load balancing primarily safeguards which CIA triad element?
Why is an asset inventory so important?
Which threat is directly associated with malware?
What is the purpose of immediate response procedures in a BCP?
Exhibit.
What is the purpose of a Security Information and Event Management (SIEM) system?
A company analyzes system requirements, functions, and interdependencies to prioritize contingency needs. What is this process called?
Which security control is most commonly used to prevent data breaches?
What is the main purpose of using multi-factor authentication (MFA) in a security system?
Which security control is designed to prevent unauthorized access to sensitive information by ensuring it is accessible only to authorized users?
What is the recommended fire suppression system for server rooms?
Which of the following is NOT one of the three main components of an SQL database?
Often offered by third-party organizations and covering advisory or compliance objectives:
XenServer, LVM, Hyper-V, and ESXi are:
A common network device used to filter traffic?
The harmonization of automated computing tasks into reusable workflows is called:
Which of the following does NOT normally influence an organization’s log retention policy?
A way to prevent unwanted devices from connecting to a network is:
A company wants to prevent employees from bringing unauthorized electronic devices into the workspace. Which physical control is best?
Which of the following attacks can TLS help mitigate?
An employee unintentionally shares confidential information with an unauthorized party. What term best describes this?
A transaction over $50,000 requires approval from both a manager and an accountant. Which concept applies?
Which one of the following groups is NOT normally part of an organization's cybersecurity incident response team?
Which type of risk involves unauthorized use or disclosure of confidential information such as passwords, financial data, or personal information?
In which cloud model does the customer have theleast responsibilityover infrastructure?
Which fire suppression system is more friendly to electronics?
In incident terminology, a zero-day is:
Who should participate in creating a Business Continuity Plan?
What doescriticalityrepresent?
In Mandatory Access Control (MAC), which statement is true?
An external entity has tried to gain access to your organization’s IT environment without authorization. This is an example of a(n):
If a device is found to be non-compliant with the security baseline, what action should the security team take?
The Bell–LaPadula access control model is a form of:
A power outage disrupts operations. Which plan helps sustain operations?
What drove the introduction of IPv6?
What are registered ports primarily used for?
A company’s governing board decides that only legal services may review third-party contracts. They create a document stating that no other department has permission to do so. This document is a:
What is an IPSec replay attack?
A team activates procedures to mitigate a cyberattack. What plan is this?
What is the term used to denote the inherent set of privileges assigned to a user upon the creation of a new account?
What is the difference between Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)?
What is privacy in the context of Information Security?
Common network device used to connect networks?
Which is related to privacy?
Port used by DNS.
What is the main purpose of creating a baseline for system integrity?
A centralized organizational function that monitors, detects, and analyzes security events to prevent disruptions is called:
Which type of control is used to restore systems or processes to their normal state after an attack?
An ISC2 member is offered an illicit copy of a movie. What should they do?
A system crash results in loss of data. What term best describes this?
An attacker places themselves between two communicating devices is known as:
You experienced a power outage that disrupted access to your data center. What type of security concern occurred?
Software that creates and manages virtual machines (VMM) is called:
Which is very likely to be used in a Disaster Recovery effort?
Which is related to standards?
_______ are virtual separations within a switch used mainly to limit broadcast traffic.
Security commensurate with risk and magnitude of harm is known as:
Which type of network is set up similar to the internet but is private to an organization? Select the MOST appropriate answer.
What is the purpose of multi-factor authentication (MFA) in IAM?
DNS operates at which OSI layer?
What is the primary goal of a risk management process in cybersecurity?
Which of the following is a characteristic of cloud computing?
A DLP solution should be deployed so it can inspect all forms of data leaving the organization, including:
A type of malware capable of self-propagation and infecting multiple systems without human intervention is called:
Exhibit.
IPSec works in which layer of OSI Model
A company wants to ensure that its employees can evacuate the building in case of an emergency. Which physical control is best suited?
Which one of the following cryptographic algorithms does NOT depend upon the prime factorization problem?
A hacker launches a specific attack to exploit a known vulnerability. This is called:
A DDoS attack affects which OSI layers?
In cybersecurity, typical threat actors include:
A hacker intercepts network traffic to steal login credentials. Which OSI layer is being attacked?
Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Microsegmentation of workloads is a tool of the model.
A LAN-based attack involving malicious packets sent to the default gateway:
Which is the most efficient and effective way to test a business continuity plan?
A company network experiences a sudden flood of network packets that causes major slowdown in Internet traffic. What type of event is this?
Which layer provides services directly to the user?
Example of Type 1 authentication:
A standard that defines wired communication for network devices:
Raj wants aphysical deterrent controlto discourage unauthorized entry. Which option best serves this purpose?
Which penetration testing technique requires the team to do the MOST work and effort?
Actions, processes, and tools ensuring continuity of critical operations:
Why is the recovery of IT often crucial to the recovery and sustainment of business operations?
True or False: The IT department is responsible for creating the organization’s Business Continuity Plan.
The order of controls used in defense in depth:
What is the first step in incident response planning?
Which of the following protocols is a secure alternative to using Telnet?
The right of an individual to control the distribution of information about themselves is:
Which type of database combines related records and fields into a logical tree structure?
Which of the following is a subject?
Which is the first step in the risk management process?
Events with negative consequences such as crashes, floods, defacement, or malicious code execution are called:
What is multi-factor authentication (MFA)?
The primary functionality of Privileged Access Management (PAM) is:
In which access control model can the creator of an object delegate permissions?
A curated knowledge base modeling adversary behavior across attack phases is:
What is the main purpose of digital signatures?
An approach using software-based controllers and APIs to direct network traffic:
Which of the following properties is NOT guaranteed by digital signatures?
Why is identifying roles and responsibilities important in IR planning?
A set of instructions to detect, respond to, and recover from security incidents is a: