Q101. - (Topic 4) 

Company XYZ has employed a consultant to perform a controls assessment of the HR system, backend business operations, and the SCADA system used in the factory. Which of the following correctly states the risk management options that the consultant should use during the assessment? 

A. Risk reduction, risk sharing, risk retention, and risk acceptance. 

B. Avoid, transfer, mitigate, and accept. 

C. Risk likelihood, asset value, and threat level. 

D. Calculate risk by determining technical likelihood and potential business impact. 

Answer:


Q102. - (Topic 5) 

The threat abatement program manager tasked the software engineer with identifying the fastest implementation of a hash function to protect passwords with the least number of collisions. Which of the following should the software engineer implement to best meet the requirements? 

A. hash = sha512(password + salt);for (k = 0; k < 4000; k++) {hash = sha512 (hash);} 

B. hash = md5(password + salt);for (k = 0; k < 5000; k++) {hash = md5 (hash);} 

C. hash = sha512(password + salt);for (k = 0; k < 3000; k++) {hash = sha512 (hash + password + salt);} 

D. hash1 = sha1(password + salt);hash = sha1 (hash1); 

Answer:


Q103. - (Topic 4) 

A security administrator is tasked with securing a company's headquarters and branch offices move to unified communications. The Chief Information Officer (CIO) wants to integrate the corporate users' email, voice mail, telephony, presence and corporate messaging to internal computers, mobile users, and devices. Which of the following actions would BEST meet the CIO's goals while providing maximum unified communications security? 

A. Create presence groups, restrict IM protocols to the internal networks, encrypt remote devices, and restrict access to services to local network and VPN clients. 

B. Enable discretionary email forwarding restrictions, utilize QoS and Secure RTP, allow external IM protocols only over TLS, and allow port 2000 incoming to the internal firewall interface for secure SIP 

C. Set presence to invisible by default, restrict IM to invite only, implement QoS on SIP and RTP traffic, discretionary email forwarding, and full disk encryption. 

D. Establish presence privacy groups, restrict all IM protocols, allow secure RTP on session border gateways, enable full disk encryptions, and transport encryption for email security. 

Answer:


Q104. - (Topic 2) 

Which of the following represents important technical controls for securing a SAN storage infrastructure? (Select TWO). 

A. Synchronous copy of data 

B. RAID configuration 

C. Data de-duplication 

D. Storage pool space allocation 

E. Port scanning 

F. LUN masking/mapping 

G. Port mapping 

Answer: F,G 


Q105. - (Topic 5) 

A software project manager has been provided with a requirement from the customer to place limits on the types of transactions a given user can initiate without external interaction from another user with elevated privileges. This requirement is BEST described as an implementation of: 

A. An administrative control 

B. Dual control 

C. Separation of duties 

D. Least privilege 

E. Collusion 

Answer:


Q106. - (Topic 2) 

The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance department. The following information is compiled: 

Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0 Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0 Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0 

All callers are connected to the same switch and are routed by a router with five built-in interfaces. The upstream router interface’s MAC is 00-01-42-32-ab-1a 

A packet capture shows the following: 

09:05:15.934840 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a) 

09:06:16.124850 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a) 

09:07:25.439811 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a) 

09:08:10.937590 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2305, seq 1, length 65534 

09:08:10.937591 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2306, seq 2, length 65534 

09:08:10.937592 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2307, seq 3, length 65534 

Which of the following is occurring on the network? 

A. A man-in-the-middle attack is underway on the network. 

B. An ARP flood attack is targeting at the router. 

C. The default gateway is being spoofed on the network. 

D. A denial of service attack is targeting at the router. 

Answer:


Q107. - (Topic 4) 

A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important? 

A. Insecure direct object references, CSRF, Smurf 

B. Privilege escalation, Application DoS, Buffer overflow 

C. SQL injection, Resource exhaustion, Privilege escalation 

D. CSRF, Fault injection, Memory leaks 

Answer:


Q108. - (Topic 3) 

A large financial company has a team of security-focused architects and designers that contribute into broader IT architecture and design solutions. Concerns have been raised due to the security contributions having varying levels of quality and consistency. It has been agreed that a more formalized methodology is needed that can take business drivers, capabilities, baselines, and re-usable patterns into account. Which of the following would BEST help to achieve these objectives? 

A. Construct a library of re-usable security patterns 

B. Construct a security control library 

C. Introduce an ESA framework 

D. Include SRTM in the SDLC 

Answer:


Q109. - (Topic 5) 

A system administrator needs to meet the maximum amount of security goals for a new DNS infrastructure. The administrator deploys DNSSEC extensions to the domain names and infrastructure. Which of the following security goals does this meet? (Select TWO). 

A. Availability 

B. Authentication 

C. Integrity 

D. Confidentiality 

E. Encryption 

Answer: B,C 


Q110. - (Topic 2) 

A Chief Information Security Officer (CISO) has requested that a SIEM solution be implemented. The CISO wants to know upfront what the projected TCO would be before looking further into this concern. Two vendor proposals have been received: 

Bundled offering expected to be $100,000 per year. 

Operational expenses for the pharmaceutical company to partner with the vendor are expected to be a 0.5 FTE per year. 

Internal employee costs are averaged to be $80,000 per year per FTE. Based on calculating TCO of the two vendor proposals over a 5 year period, which of the following options is MOST accurate? 

A. Based on cost alone, having an outsourced solution appears cheaper. 

B. Based on cost alone, having an outsourced solution appears to be more expensive. 

C. Based on cost alone, both outsourced an in-sourced solutions appear to be the same. 

D. Based on cost alone, having a purchased product solution appears cheaper. 

Answer: