Sorry, you are out of time.
SSCP Practice Exam 3
Take your exam preparation to the next level with fully simulated online practice tests designed to replicate the real exam experience. These exams feature realistic questions, timed conditions, and detailed explanations to help you assess your knowledge, identify weak areas, and build confidence before test day.
1 / 125
1. An organization wants to allow its employees to securely access the company’s internal resources from any location over the public network. Which architecture would best support this requirement?
Using a VPN over the internet (D) is the best approach for allowing secure access to internal resources from any location. The VPN creates a secure tunnel through the public internet, ensuring data integrity and confidentiality. The internet (A) alone does not provide the necessary security. An intranet (B) is an internal network and does not support remote access. An extranet (C) is for secure, controlled access by external partners, not for internal employees accessing the network remotely.
2 / 125
2. A financial company is concerned about the integrity of its internal applications and wants to ensure that the software they deploy has not been tampered with. Which countermeasure would be most effective in verifying the authenticity of these applications before installation?
Code signing (B) is a technique used to ensure the integrity and authenticity of software applications by digitally signing them. This helps verify that the code has not been altered since it was signed by the trusted author, providing a layer of security against tampering. Antivirus software (A) is primarily used to detect and remove malicious software but does not verify the authenticity of software. An Intrusion Detection System (IDS) (C) monitors network traffic for suspicious activity but does not directly relate to verifying software integrity. A firewall (D) controls incoming and outgoing network traffic based on security rules, and it does not authenticate software applications.
3 / 125
3. An organization has deployed HIPS on all its servers to prevent malware attacks. The security team notices an increase in false positives. What is the most appropriate action to address this issue while maintaining robust security?
Reviewing and tuning HIPS rule sets (D) helps to refine the system's detection capabilities, reducing false positives while maintaining security. Disabling features (A) compromises security by potentially allowing threats. Adjusting sensitivity levels (B) can be part of tuning but alone might reduce overall effectiveness. Removing HIPS (C) entirely in favor of antivirus reduces layered security and is not advisable.
4 / 125
4. An organization has decided to implement an access control model that uses roles to determine access to different systems and data. Each user will be assigned to one or more roles that grant specific permissions. What is a key advantage of this approach?
The correct answer is B, Roles can be quickly updated to reflect changes in job functions, because Role-Based Access Control (RBAC) allows for rapid adjustment of access rights by simply changing the permissions associated with roles, which is beneficial in dynamic organizational environments. Option A, Users can individually set permissions for their resources, is incorrect as it describes Discretionary Access Control (DAC). Option C, Access is based on the security classification of data, is incorrect because it describes Mandatory Access Control (MAC). Option D, Access permissions are defined by multiple user attributes, is incorrect as it pertains to Attribute-Based Access Control (ABAC), not the role-based system.
5 / 125
5. To prevent data leakage, a company deploys a data loss prevention (DLP) system that blocks the transfer of sensitive information. What type of control is this, and why is it effective?
A data loss prevention (DLP) system functions as a preventive control (B) by blocking the transfer of sensitive information outside the organization, thus preventing data leakage. A deterrent control (A) would discourage data transfer attempts but not block them. A detective control (C) would monitor and identify potential data leaks, but a DLP system actively prevents them. A compensating control (D) offers alternative methods to achieve security objectives when other measures are lacking, but a DLP system directly prevents data leaks by enforcing policies that block unauthorized transfers.
6 / 125
6. A financial services firm needs to ensure the integrity of its transaction logs over time. What is the best hashing practice they should implement to detect any unauthorized changes?
Hashing each log entry individually ensures that any change to a single entry can be detected (D). Hashing the concatenated entries periodically provides an additional layer of integrity checking, helping to identify if any entries have been tampered with after the fact. Using the same hash algorithm with a static salt for all logs (A) does not provide individual entry integrity and a static salt can be vulnerable. Using different hash algorithms for each log file (B) is not necessary and does not add significant security benefits. Appending a timestamp to each log and hashing periodically (C) ensures integrity over time but does not provide granular detection of changes at the individual entry level.
7 / 125
7. A government agency requires a security model where access to classified documents is controlled strictly based on the user’s clearance level. Users should be unable to grant or revoke access to documents themselves. Which access control method is most suitable for this scenario?
The correct answer is C, Mandatory Access Control (MAC), because MAC enforces access control policies based on security classifications that cannot be altered by individual users. This ensures that only users with the appropriate clearance can access classified documents, and users do not have the ability to change these access permissions. Option A, Discretionary Access Control (DAC), is incorrect as it allows users to control access to their own data, which could lead to security policy violations. Option B, Role-Based Access Control (RBAC), is incorrect because it assigns access based on user roles, which is not as rigid or secure as MAC for handling classified information. Option D, Rule-Based Access Control, is incorrect as it is more flexible and can be used to implement various policies but does not inherently provide the strict classification control required by MAC.
8 / 125
8. A university needs to restrict access to its online library resources to students and staff only during specific hours and from authorized IP addresses. Which access control model would best meet these requirements?
The correct answer is C, Rule-Based Access Control, because Rule-Based Access Control allows the university to set rules that restrict access to online library resources based on conditions such as user status (student or staff), specific hours, and authorized IP addresses, ensuring controlled and secure access. Option A, Attribute-Based Access Control (ABAC), is incorrect as it involves a broader use of attributes and is more complex than necessary for this specific requirement. Option B, Role-Based Access Control (RBAC), is incorrect because it grants access based on roles, which does not provide the required control over access conditions like time and IP address. Option D, Discretionary Access Control (DAC), is incorrect because it allows users to control access permissions, which does not allow for automated, rule-based restrictions.
9 / 125
9. Which of the following is the best method to ensure non-repudiation of a contract signed electronically?
Using a public key infrastructure (PKI) for digital signatures ensures non-repudiation of a contract signed electronically by providing a reliable method to verify the signer’s identity and the authenticity of the document. Storing the contract on a secure server (A) ensures its security but does not provide proof of signing. Sending a copy of the contract via secure email (C) ensures secure transmission but not non-repudiation. Requiring a witness (D) adds a layer of verification but is not as reliable or practical as digital signatures for electronic documents.
10 / 125
10. A company has a complex network architecture with multiple domains. They want to establish a trust relationship such that if Domain A trusts Domain B, and Domain B trusts Domain C, then Domain A will automatically trust Domain C. Which type of trust relationship is necessary to achieve this configuration?
A transitive trust (C) is the correct option because it automatically extends the trust relationship between domains. In this scenario, if Domain A trusts Domain B and Domain B trusts Domain C, a transitive trust would mean that Domain A automatically trusts Domain C. One-way trust (A) and two-way trust (B) do not inherently extend trust relationships to other domains and would require manual configuration for each trust relationship. Zero trust (D) is irrelevant here as it refers to a security principle that does not rely on trust relationships between domains.
11 / 125
11. During the recovery phase of a security incident, which action is critical to ensure that systems are safe and secure before they are returned to operation?
Validating the integrity of all system components (B) is crucial to ensure that no malicious code or vulnerabilities remain before systems are brought back into operation. Reinstalling operating systems (A) is an extreme measure and typically unnecessary unless the systems are heavily compromised. Notifying regulatory bodies (C) is part of incident response and compliance but not directly related to system recovery. Reconnecting network segments (D) should only be done after ensuring system integrity.
12 / 125
12. A security analyst is reviewing system logs and notices that a user account has repeatedly failed login attempts from various locations within a short period. Which of the following actions should the analyst prioritize to address this event?
Temporarily disabling the user account and investigating further (A) is the best course of action to prevent potential unauthorized access while determining the cause of the failed login attempts. This prevents the attacker from succeeding if they obtain the correct credentials. Resetting the user's password and notifying the user (B) might be necessary eventually but doesn't immediately stop the potential threat. Logging the event and continuing to monitor for further activity (C) might delay immediate action needed to secure the account. Blocking the IP addresses associated with the failed attempts (D) might help, but if the attempts come from multiple sources, it is not a comprehensive solution.
13 / 125
13. An organization discovers that unauthorized modifications have been made to critical configuration files on a server. Which of the following controls is most effective in preventing such incidents?
Enforcing file integrity monitoring (FIM) is the most effective control for preventing unauthorized modifications to critical configuration files. FIM solutions monitor files for changes and alert administrators when modifications occur, helping to ensure the integrity of important files. While multifactor authentication (A) enhances security by requiring additional verification for access, it does not directly prevent unauthorized modifications to files. Regular security awareness training (C) is important but does not provide a technical solution to monitor file changes. Firewalls (D) help to block unauthorized access but do not protect against changes made by authorized users or intruders who bypass the firewall.
14 / 125
14. A company uses IoT devices for environmental monitoring. To protect the devices from unauthorized access, what practice should be implemented?
Implementing secure boot and firmware integrity checks (B) ensures that IoT devices boot with verified software and are protected from tampering and unauthorized access. Using default administrative credentials (A) is a significant security risk as they are commonly known and easily exploited. Connecting devices to public Wi-Fi networks (C) exposes them to potential attacks and unauthorized access. Disabling security features (D) compromises the security of the devices and increases vulnerability.
15 / 125
15. An organization is planning to deploy a new application across multiple servers. What configuration management practice should be implemented to ensure that the application deployment is consistent and secure?
Using a configuration management tool to automate deployment (B) ensures that the application is deployed consistently and securely across all servers. This approach minimizes human error and ensures compliance with security policies. Randomly checking servers (A) and manually configuring each server (C) can lead to inconsistencies. Installing on a test server and replicating manually (D) does not guarantee uniformity across all servers.
16 / 125
16. A company has detected a rootkit infection on multiple systems. To effectively eradicate the rootkit, which of the following steps should be taken?
Using specialized rootkit removal tools (A) is critical for detecting and eliminating rootkits, as they are often designed to hide from standard security measures. Disconnecting systems (B) is part of containment but does not eradicate the rootkit. Reformatting systems (C) is a more drastic measure and can be disruptive, although it may be necessary in severe cases. Notifying users (D) is part of communication but does not address eradication.
17 / 125
17. A security team needs to prevent data leaks from the shared storage in their virtual environment. What is the best method to enforce data confidentiality?
Implementing storage encryption with individual keys for each virtual machine (A) ensures that only authorized virtual machines can decrypt and access their specific data, thereby enforcing data confidentiality and preventing data leaks. Regularly defragmenting the shared storage (B) is related to performance, not confidentiality. Disabling shared storage access for non-administrative users (C) can prevent general access but does not specifically address the confidentiality of stored data. Keeping snapshots on shared storage (D) without additional security measures does not prevent data leaks.
18 / 125
18. An investigator is preparing to transport digital evidence to a forensic lab. What is the most appropriate method to ensure the evidence remains secure and untampered during transit?
Sealing the evidence in a tamper-evident bag and documenting the transfer (D) ensures that any tampering attempts are immediately noticeable, and the chain of custody is maintained. Using a standard courier service (A) may not provide sufficient security for sensitive evidence. Hand-carrying the evidence (B) can be secure but does not provide documentation or tamper evidence. Encrypting and sending electronically (C) is not suitable for physical evidence and does not maintain physical chain of custody. Therefore, sealing and documenting (D) is the most appropriate method.
19 / 125
19. A company needs a remote access solution for its sales team that travels frequently. The solution must be secure and provide full access to internal applications. Which solution is most appropriate?
The most appropriate solution for a frequently traveling sales team requiring secure and full access to internal applications is a client-to-site VPN. This allows individual remote users to securely connect to the corporate network and access internal resources as if they were on-site. Option A, a site-to-site VPN, connects different office networks and is not suitable for individual remote users. Option B, thin client access, would require a persistent connection to a server, which may not be feasible for traveling employees who need access to a wide range of applications. Option D, Secure Shell (SSH), is primarily used for secure command-line access to servers and does not provide comprehensive access to internal applications. Therefore, a client-to-site VPN is the ideal solution.
20 / 125
20. A company is considering implementing TPM on their devices. How does TPM contribute to the integrity of the system?
TPM enhances system integrity by securely storing and managing cryptographic keys (B) that are used for integrity checks, ensuring that the system has not been tampered with. Enforcing password policies (A), controlling access to external devices (C), and monitoring system files (D) are related to broader security policies and tools, not specifically to the role of TPM.
21 / 125
21. A healthcare organization uses a system that employs data analytics to monitor network traffic for signs of unusual activities, such as large file transfers outside the organization. How does data analytics contribute to identifying these activities?
Data analytics contributes to identifying unusual activities by using historical data to identify patterns and anomalies (B). By analyzing past network traffic, the system can establish what is considered normal and detect deviations such as large file transfers outside the organization. Data encryption (A) secures data but does not analyze network traffic for anomalies. Blocking all external connections (C) would prevent data loss but is not a method of analyzing activities. Installing security patches (D) addresses vulnerabilities but does not involve analyzing network traffic.
22 / 125
22. During an ongoing ransomware attack, which of the following containment actions should be taken first to limit the impact on an organization's data?
Identifying and isolating infected systems (C) is critical for containment as it prevents the ransomware from spreading to other parts of the network. Disabling external connections (A) can help but may disrupt legitimate operations. Informing stakeholders (B) and initiating data recovery (D) are important steps but follow containment to ensure the threat is controlled.
23 / 125
23. An organization is designing a hardware asset management plan and needs to include considerations for the initiation phase. Which of the following is most critical to address at this stage?
During the initiation phase of hardware asset management, defining asset classification criteria (B) is essential to categorize assets based on their importance, sensitivity, and usage. This foundational step informs subsequent processes, such as audits (A), which are typically part of the maintenance phase. Asset retirement procedures (C) come into play much later in the asset lifecycle, during the disposal phase. Implementing access control mechanisms (D) is also critical but is more relevant during the deployment or maintenance phases.
24 / 125
24. In a Web of Trust system, an employee, John, wants to verify a new colleague's, Sarah's, public key. He notices that several other trusted colleagues have signed Sarah's key. What should John do to ensure that he can trust Sarah's key?
The correct answer is B. Verifying Sarah's key fingerprint in person or through a secure channel ensures that John can trust the key's authenticity. Directly signing Sarah's key (A) without verification is not advisable, as it skips the necessary step of ensuring the key's authenticity. The key's metadata (C) does not provide sufficient information to determine trustworthiness. Assuming the key is trustworthy if signed by at least three colleagues (D) is risky, as John should personally verify the key to prevent potential security issues. Verifying the fingerprint directly with Sarah or through a trusted method ensures that the key truly belongs to her.
25 / 125
25. You are configuring a firewall to block a specific type of traffic. Which layer of the OSI model should you configure the firewall to inspect if you want to block HTTP traffic?
HTTP traffic operates at the Application layer (D), so configuring the firewall to inspect and block traffic at this layer would be the most effective. The Physical layer (A) deals with the actual hardware transmission and cannot block specific types of traffic. The Data link layer (B) handles node-to-node data transfers and is not specific to types of application traffic. The Transport layer (C) manages the transmission of data packets between hosts but does not handle specific application protocols like HTTP.
26 / 125
26. A security analyst is using a timeline visualization to track security events and notices a correlation between software updates and an increase in failed system checks. What should be the next step?
Rolling back the updates (A) allows the analyst to determine if the updates are causing the issues. Continuing to monitor (B) without action could prolong the problem. Notifying the vendor (C) is important but secondary to mitigating the immediate impact. Updating to the latest version (D) might introduce new issues without resolving the current ones.
27 / 125
27. A security analyst detects multiple unauthorized access attempts and needs to document and communicate these findings to the security manager. Which of the following best practices should the analyst follow?
The best practice is to provide a detailed timeline of events and suggest immediate countermeasures (A) to offer a clear, actionable report for the security manager. Summarizing with general observations (B) might be too vague for effective action. Including speculative causes (C) without evidence could mislead decision-making. A high-level overview (D) should be clear but also include necessary technical details for a comprehensive understanding.
28 / 125
28. An organization wants to simplify the user authentication process across multiple applications without compromising security. Which IAM feature should be implemented to achieve this goal?
The correct answer is A. Single sign-on (SSO) allows users to authenticate once and gain access to multiple applications without needing to log in separately for each, simplifying the user experience while maintaining security (A). Privileged access management (B) focuses on controlling and monitoring access to critical resources but does not simplify user authentication across applications. Access control lists (C) specify permissions for individual users or groups but do not streamline the authentication process. Biometric authentication (D) enhances security by verifying identity using unique physical characteristics but does not address single sign-on functionality.
29 / 125
29. In an effort to enhance security and performance, a medium-sized company wants to implement a network model that supports both centralized resource management and direct peer-to-peer file sharing. Which network relationship would be most appropriate?
A Hybrid network (C) is most appropriate for a medium-sized company looking to balance centralized resource management with direct peer-to-peer file sharing. This model combines the centralized control of client-server networks with the flexibility of peer-to-peer communication. A Peer-to-peer (P2P) (A) network alone lacks centralized management. The Client-server (B) model does not support direct peer-to-peer file sharing. A Distributed network (D) emphasizes resource distribution across multiple locations but does not specifically address the combination of centralized control and peer-to-peer sharing.
30 / 125
30. In a secure communication setup using asymmetric encryption, which scenario best demonstrates the application of the private key?
The private key in asymmetric encryption is primarily used for generating digital signatures, which are used to verify the authenticity and integrity of a document (B). Encrypting a large file (A) is typically done using symmetric encryption for efficiency. While asymmetric encryption can be used to encrypt session keys (C), the private key’s role in this context is decryption. Creating a backup of encrypted data (D) does not specifically involve the private key’s function for generating digital signatures.
31 / 125
31. A retail company identifies a risk associated with using outdated software. They decide to stop using the software and switch to a more secure, updated version. Which risk treatment strategy are they employing?
By stopping the use of outdated software and switching to a more secure version, the company is employing risk avoidance (C), as they are eliminating the risk entirely. Risk transfer (A) would involve shifting the risk to another entity, and risk acceptance (B) would mean acknowledging the risk without taking action. Risk mitigation (D) involves reducing the risk’s impact rather than eliminating it.
32 / 125
32. A legal firm needs to ensure that electronic contracts are binding and cannot be denied by the parties involved. Which of the following methods provides the best assurance for non-repudiation of these electronic contracts?
Digital signatures with a certificate authority provide the best assurance for non-repudiation by allowing the verification of the signer's identity and the integrity of the contract through a trusted third party (B). Using HMAC with a shared key (A) provides authentication and integrity but not non-repudiation, as shared keys can be exchanged. Encrypting contracts with a symmetric key (C) secures the data but does not link the action to a specific individual. Storing contracts in a blockchain ledger (D) can provide an immutable record, but it does not inherently provide non-repudiation of the individual action without additional authentication mechanisms.
33 / 125
33. After a security breach caused by a successful phishing attack, your organization decides to conduct a targeted training session for the affected department. Which approach will most effectively help employees learn how to identify phishing emails in the future?
Reviewing the details of the recent phishing attack and identifying red flags (A) provides a concrete example that employees can relate to, helping them understand specific signs of phishing. A general meeting on best practices (B) may cover too broad a range of topics to be effective. Distributing a checklist (C) is helpful but may not engage employees as effectively as discussing a real incident. Reminding employees to change passwords (D) is good practice but does not address the specific need to identify phishing emails.
34 / 125
34. An employee finds a USB drive labeled "Employee Salary Data" in the parking lot and, out of curiosity, plugs it into their work computer. The drive contains malware that infects the system. What type of social engineering attack does this represent?
The scenario describes a situation where the attacker leaves a tempting item, like a USB drive labeled "Employee Salary Data," to lure the victim into taking action that leads to system compromise. This is known as baiting (B), where the attacker offers something enticing to tempt the victim into a trap. Phishing (A) involves sending fraudulent emails to trick users into revealing personal information, which is not applicable here. Impersonation (C) involves pretending to be someone else to deceive the victim, which is not the case in this scenario. Spear phishing (D) is a targeted form of phishing and does not involve physical bait like a USB drive.
35 / 125
35. In a scenario where a company needs to verify that a received financial report is both from a trusted source and has not been altered, which cryptographic tool should they employ?
Digital signatures (D) are the appropriate cryptographic tool for verifying that a received financial report is from a trusted source (authenticity) and has not been altered (integrity). They provide a means to confirm both the origin and the unchanged nature of the report. Symmetric key encryption (A) focuses on data confidentiality and does not provide integrity or authenticity. Data masking (B) hides data content but does not verify authenticity or integrity. Hash functions (C) can ensure data integrity by generating a hash value but do not verify the authenticity of the source.
36 / 125
36. An organization is planning to archive data that must be retained for a minimum of ten years to comply with legal requirements. What is the most secure and reliable approach to ensure long-term data integrity?
Archiving data on a cloud platform with multi-region replication (C) is the most secure and reliable approach for ensuring long-term data integrity, as it provides redundancy, geographic diversity, and protection against data loss due to regional failures. Using tape backups stored offsite (A) provides a secure long-term solution but may have limitations in data accessibility and reliability over time. Storing data on a high-reliability NAS with RAID (B) offers local protection but lacks geographic redundancy. Keeping data on encrypted external SSDs (D) ensures security but is less reliable for long-term data integrity compared to cloud-based solutions with built-in redundancy.
37 / 125
37. An enterprise requires real-time inspection of network traffic to detect and respond to threats promptly. Where should an intrusion detection and prevention system (IDPS) be placed to fulfill this requirement without introducing significant latency?
Inline placement at the perimeter gateway (A) ensures that all incoming and outgoing traffic is inspected in real-time, providing immediate threat response. Passive placement (B) only detects threats without prevention. Virtual deployment (C) might not cover all physical traffic. Inline placement between web and database servers (D) could introduce latency in critical internal communications.
38 / 125
38. In the acquisition phase of data management, what is the key consideration for selecting a third-party data service provider?
The provider’s data encryption standards (C) are critical to ensure that sensitive data is protected during transit and at rest, which is essential for maintaining data security. The provider’s geographical location (A) may affect legal and compliance considerations but is not directly related to security. The cost of the service (B) is important for budget considerations but does not guarantee security. The speed of data access (D) affects performance but does not ensure the security of the data.
39 / 125
39. A healthcare organization is outsourcing its patient data management to a cloud provider. To ensure compliance with healthcare regulations, what document should the organization require from the provider?
The healthcare organization should require a Business Associate Agreement (BAA) (B) from the cloud provider to ensure compliance with healthcare regulations, such as HIPAA in the United States. The BAA outlines the provider’s responsibilities for safeguarding patient data and ensuring regulatory compliance. Data Encryption Policy (A) is important for protecting data but does not address regulatory compliance directly. The Service Level Agreement (SLA) (C) covers performance and service standards but may not include specific regulatory requirements. Data Backup Policy (D) details backup procedures but does not ensure regulatory compliance for patient data.
40 / 125
40. An organization is choosing a risk management framework to comply with international standards for information security. They require a framework that is globally recognized and provides a comprehensive approach to managing risk. Which framework should they select?
ISO/IEC 27005 (B) is a globally recognized framework that provides comprehensive guidelines for information security risk management within the context of an organization's overall information security management system (ISMS). COBIT (A) focuses on IT governance rather than risk management specifically. PCI DSS (C) is a standard for securing cardholder data, not a general risk management framework. FISMA (D) applies to federal agencies in the United States and does not offer a global approach.
41 / 125
41. A company is planning to upgrade its operating systems to a new version, which includes enhanced security features. What specific aspect of security impact analysis should be prioritized to ensure the upgrade does not introduce new vulnerabilities?
Assessing compatibility with existing security policies (B) should be prioritized in the security impact analysis to ensure that the upgrade does not introduce new vulnerabilities. This step helps confirm that the new operating system's security features align with the organization's security standards and policies. Evaluating the cost (A) and reviewing user interface changes (C) are important but not directly related to security impact. Analyzing potential performance degradation (D) is relevant but secondary to security policy compatibility.
42 / 125
42. A company is transitioning to a cloud service model and is concerned about maintaining compliance with data protection regulations. What is their primary responsibility under the shared responsibility model for IaaS?
Under the IaaS model, the company’s primary responsibility is Managing Data Encryption and Access Policies (B), ensuring that their data is encrypted, access policies are properly implemented, and compliance with data protection regulations is maintained. The cloud provider secures the network (A), ensures physical security of data centers (C), and maintains the virtualization platform (D). The company must focus on securing their data and managing how it is accessed and protected within the cloud environment.
43 / 125
43. Upon analyzing event logs, a security analyst discovers a series of login attempts using multiple user accounts within a short timeframe from a single IP address. The event data suggests an attempted brute-force attack. What should be the analyst’s immediate response?
Blocking the IP address (B) helps to immediately stop the brute-force attempts from continuing. Initiating an account lockout (A) might disrupt legitimate users. Notifying affected users (C) is important but secondary to stopping the attack. Increasing password complexity (D) is a long-term measure that does not address the immediate threat.
44 / 125
44. A new employee at a financial institution needs access to the company's internal financial systems. Which of the following actions ensures the employee is granted appropriate entitlements based on their job role?
The correct answer is B. Assigning the employee to a financial analyst role with specific access rights ensures they are granted appropriate entitlements, providing them with access to the necessary financial systems and data based on their job role (B). Provisioning the employee’s email account (A) is part of the onboarding process but does not involve entitlements related to job roles. Requiring the employee to sign a non-disclosure agreement (C) is important for confidentiality but not for granting access rights. Setting up a regular password expiration policy (D) enhances security but does not address entitlements based on roles.
45 / 125
45. During the implementation of a hardware asset tracking system, what is the most effective way to ensure all assets are accounted for?
Implementing real-time tracking of asset movements (B) is the most effective way to ensure all assets are accounted for during the implementation of a hardware asset tracking system. It provides up-to-date information on asset locations and status, reducing the risk of loss or misplacement. Conducting initial data entry using historical records (A) helps establish a baseline but may not be accurate or current. Assigning asset management responsibilities (C) improves accountability but does not ensure real-time tracking. Performing periodic manual reconciliation (D) is necessary for verification but is labor-intensive and less efficient than real-time tracking.
46 / 125
46. A healthcare organization is defining its risk tolerance regarding potential disruptions to patient data access. What is the primary factor they should consider when setting their risk tolerance level?
Regulatory requirements (A) are crucial in setting risk tolerance for a healthcare organization, as compliance with laws and regulations regarding patient data is mandatory. Competitors’ strategies (B) do not directly influence risk tolerance. Current security technologies (C) and historical security incidents (D) are factors in assessing risk but not primary considerations in defining risk tolerance.
47 / 125
47. A company's web server was compromised due to outdated software that had known vulnerabilities. To prevent future attacks, what action should the company prioritize?
Patching (D) is the process of updating software to fix known vulnerabilities. By keeping software up-to-date, the company can prevent exploitation of these vulnerabilities, thereby protecting against future attacks. User awareness training (A) is important but does not directly address software vulnerabilities. Data Loss Prevention (DLP) (B) focuses on preventing data leaks rather than securing software. System hardening (C) involves securing systems by reducing their vulnerability surface, but patching specifically addresses known vulnerabilities and is the most relevant countermeasure for this scenario.
48 / 125
48. To ensure business continuity, a company needs to implement a solution that maintains the availability of its critical applications in a virtual environment. Which solution should they prioritize?
High availability (HA) clustering for critical virtual machines (A) ensures that if one node fails, another can immediately take over, maintaining the availability of critical applications. This solution minimizes downtime and provides continuous service. Manual failover procedures (B) are slower and prone to error. Regular manual backups (C) are important for data recovery but do not ensure continuous application availability. Low-cost cloud storage (D) is useful for backup but does not address real-time availability needs.
49 / 125
49. During a large-scale natural disaster, a company's data center is flooded, and all systems go offline. The organization has an emergency response plan in place. Which of the following actions should be prioritized to ensure business continuity?
The correct answer is C. The priority during a disaster that affects critical systems is to ensure the continuity of essential business functions, which involves activating the alternative data center and rerouting processes to maintain operations. Initiating data restoration (A) is crucial but follows the activation of an alternative site to minimize downtime. Contacting emergency services (B) is part of crisis management but not directly related to continuity of operations. Informing customers (D) is important for communication but does not directly address business continuity and should follow the activation of backup systems.
50 / 125
50. An organization is required to retain security logs for a specific period to comply with regulatory requirements. Which log management practice would best ensure compliance and facilitate future log reviews?
Using a log retention policy that specifies the retention duration (C) is essential for ensuring compliance with regulatory requirements as it clearly defines how long logs should be retained and facilitates future log reviews by maintaining logs for the necessary period. Archiving old logs on removable media and storing them off-site (A) can aid in disaster recovery but does not inherently ensure compliance with retention requirements. Implementing a log rotation policy to manage log file size (B) helps in log management but does not address retention requirements directly. Encrypting all logs and storing them in a secure location (D) protects log confidentiality but is not directly related to retention compliance.
51 / 125
51. An organization is developing a mobile application that collects sensitive user information. To ensure user privacy, which practice should be prioritized?
Implementing data minimization principles is crucial for ensuring user privacy by collecting only the necessary data needed for specific purposes, thereby reducing the risk of data breaches and misuse. Collecting as much data as possible for future use (A) increases privacy risks and may violate regulations. Storing all collected data in plain text (C) compromises data security and privacy. Disabling user consent options (D) violates privacy regulations that require informed consent for data collection and processing.
52 / 125
52. A company operating in multiple jurisdictions needs to determine which country's laws apply to their cloud-stored data to address potential legal disputes. What should they assess to make this determination?
The company should assess Data Sovereignty (C), which refers to the concept that data is subject to the laws and regulations of the country in which it is located. This helps determine which country's laws apply to cloud-stored data, thereby addressing potential legal disputes. Data Ownership (A) pertains to the rights and responsibilities of data controllers and processors. Data Residency Requirements (B) specify where data must be stored but do not determine the applicable legal framework. Data Privacy Policies (D) are internal policies designed to protect user privacy but do not dictate legal jurisdiction.
53 / 125
53. After conducting a vulnerability scan, the report shows a critical vulnerability in the organization's email server. What should be your immediate next step?
The immediate next step after identifying a critical vulnerability is scheduling downtime to apply necessary patches (B). This addresses the vulnerability directly. Informing users to avoid the email server (A) does not resolve the issue. Rebooting the server (C) might clear some threats but does not fix the vulnerability. Disabling email services (D) may be necessary temporarily, but it should be done as part of a coordinated plan that includes patching.
54 / 125
54. During a disaster recovery test, a company finds that their backup systems are taking too long to restore data. What action should be taken to address this issue in their restoration plan?
The correct answer is B. Upgrading to faster, more efficient storage solutions will directly reduce restoration time by improving the speed of data retrieval and restoration. Increasing backup test frequency (A) helps in identifying issues but does not address the root cause of slow restoration. Simplifying the data structure (C) may help but is not a direct solution to hardware limitations. Improving staff training (D) is beneficial for efficiency but will not significantly impact the technical speed of data restoration.
55 / 125
55. A retail chain wants to secure customer transactions over their Wi-Fi network using a strong encryption protocol. Which protocol should they avoid, and why?
WEP (B) should be avoided as it has numerous well-known security vulnerabilities that can be easily exploited. WPA3 (A) is actually a good choice for secure transactions but might not be supported on older devices. EAP-TTLS (C) is secure and provides strong encryption but requires a more complex setup, which can be managed by an IT department. WPA2-Enterprise (D) is suitable for large networks and provides strong security, contrary to the incorrect assertion that it is only suitable for small networks.
56 / 125
56. An employee must present multiple forms of identification and undergo a biometric scan to confirm their identity before being granted access to sensitive information. What process is being carried out?
The correct answer is A. Identity proofing is the process of confirming an individual’s identity using multiple forms of identification and possibly biometric scans, ensuring they are legitimate before access to sensitive information is granted (A). Access provisioning (B) is about setting up user access. User authentication (C) verifies identity through credentials after identity proofing. Security compliance (D) ensures adherence to security policies but is not directly about identity verification.
57 / 125
57. During a security audit, it is found that an organization’s SSO implementation is not performing as expected. Users experience frequent login prompts when accessing different services. What could be the reason for this issue?
Incorrect token lifetime settings (A) could be causing users to experience frequent login prompts in an SSO implementation. If tokens expire too quickly, users will need to re-authenticate more often, disrupting the seamless access that SSO is meant to provide. Misconfigured password policies (B) do not typically cause frequent login prompts if SSO is set up correctly. Lack of multi-factor authentication (C) may affect security but does not directly relate to the frequency of login prompts in SSO. Insufficient network bandwidth (D) might cause performance issues but is not likely to be the primary reason for frequent login prompts.
58 / 125
58. During a routine security audit, you observe that the corporate network firewall is configured to allow all outbound traffic without restriction. What is the most appropriate course of action to enhance network security while maintaining functionality?
Restricting outbound traffic to only essential services (A) is the best approach to enhance security while maintaining necessary functionality. This limits potential attack vectors and reduces the risk of data exfiltration. Blocking all outbound traffic (B) is impractical and can disrupt legitimate business operations. Configuring the firewall to allow all outbound traffic from known sources (C) does not address the need to filter outbound traffic by service type, potentially allowing malicious traffic from compromised sources. Leaving the current configuration as it is (D) fails to address the security risk.
59 / 125
59. Which of the following scenarios best demonstrates the principle of least privilege?
A developer having access to source code repositories only demonstrates the principle of least privilege by limiting access to only the resources necessary to perform the developer's job functions. A receptionist having access to financial records (A) violates the PoLP. An IT administrator having access to all network resources (B) provides more access than necessary. A manager having access to all employee records (D) grants excessive access.
60 / 125
60. A network architect is designing a network with multiple segments to handle different types of traffic. Which technique would most effectively limit the interaction between these segments to only what is necessary for security reasons?
Micro-segmentation (B) provides granular control over traffic interactions, allowing security policies to be applied at a very detailed level, ensuring that segments only interact as necessary for security reasons. Physical segmentation (A) is less flexible and more complex to manage. Firewall zones (C) offer broad control but lack the granularity of micro-segmentation. Access control lists (D) control access but do not provide detailed interaction management between segments.
61 / 125
61. An organization regularly performs vulnerability assessments as part of its vulnerability management lifecycle. What is the primary benefit of this practice?
The primary benefit of regularly performing vulnerability assessments is identifying and addressing security gaps before they are exploited (B). This proactive approach helps prevent security incidents. Ensuring compliance with regulatory requirements (A) is a benefit but not the primary purpose. Improving the efficiency of IT operations (C) and enhancing employee awareness of security practices (D) are secondary benefits but do not address the core purpose of vulnerability assessments.
62 / 125
62. A company is unable to implement two-factor authentication due to a limitation in their current system. Instead, they increase password complexity requirements and enforce frequent password changes. What type of control are they using?
Increasing password complexity and enforcing frequent password changes serves as a compensating control (D) because it provides an alternative security measure to two-factor authentication, which the company cannot implement due to system limitations. Preventive control (A) would involve measures to stop unauthorized access, such as implementing two-factor authentication directly. Detective control (B) refers to identifying and reporting security incidents, and corrective control (C) involves actions to fix issues after they have occurred. The company uses password policies as a substitute to compensate for the lack of two-factor authentication.
63 / 125
63. A company deploys a log management system to collect and analyze logs from various systems. How does this system function as a security control?
A log management system functions as a detective control (B) by collecting logs from various systems and analyzing them to identify suspicious activities and potential security incidents. Preventive control (A) would involve measures like access controls or firewalls that block activities before they occur. Deterrent control (C) would discourage actions through visible warnings or policies. Compensating control (D) provides alternative measures when primary controls are insufficient, but the log management system’s main role is to detect and analyze activities to identify potential threats.
64 / 125
64. An organization needs to maintain data integrity and availability during the operation phase. Which practice is most effective in achieving this goal?
Performing regular data redundancy checks (B) is the most effective practice for maintaining data integrity and availability, as it ensures that multiple copies of data are maintained and can be quickly restored if the primary copy is compromised. Encrypting data (A) protects data confidentiality but does not ensure availability or integrity. Limiting access to critical data (C) enhances security but does not directly address integrity or availability. Conducting bi-annual data recovery drills (D) is useful for testing recovery procedures but is less frequent than needed to ensure continuous data integrity and availability.
65 / 125
65. During the deployment of MDM, a company wants to ensure that all data exchanged between corporate applications on mobile devices is encrypted. What technology would best meet this requirement?
TLS (A) encrypts data exchanged between applications, ensuring secure communication and protecting data from interception. Full-device encryption (B) protects data at rest but not data in transit. Biometric authentication (C) secures access to the device or applications but does not encrypt data. Application sandboxing (D) isolates applications but does not specifically provide encryption for data exchange between applications.
66 / 125
66. A network administrator notices that the Intrusion Detection System (IDS) is generating a large number of alerts, many of which are false positives. What is the best action to take to improve the efficiency of the IDS?
Analyzing and tuning the detection rules (D) allows the IDS to better differentiate between legitimate and malicious traffic, reducing the number of false positives while maintaining security. Increasing the threshold for alert generation (A) may reduce false positives but could also allow real threats to go undetected. Turning off the IDS (B) leaves the network without crucial monitoring capabilities. Ignoring the alerts (C) can lead to missing actual security incidents, which is not a responsible approach.
67 / 125
67. A financial institution must comply with Payment Card Industry Data Security Standards (PCI-DSS) to protect cardholder data. Which cryptographic practice is required by PCI-DSS for transmitting cardholder data over public networks?
PCI-DSS mandates the use of strong encryption, such as SSL/TLS (C), to protect cardholder data during transmission over public networks. SSL/TLS provides encryption that ensures confidentiality and integrity of the transmitted data. Hashing with SHA-256 (A) provides integrity checks but does not encrypt data for secure transmission. Symmetric key encryption (B) could protect data but requires a secure method for key exchange and is typically used for data at rest. Digital signatures (D) are used for verifying authenticity and integrity but are not specifically required for encrypting data in transit under PCI-DSS.
68 / 125
68. A company that uses BYOD policy is looking to enhance its data protection measures. How can containerization help in this scenario?
Containerization (B) separates corporate and personal data, which is crucial in a BYOD environment to protect corporate data without infringing on personal data. Option A focuses on app installation policies, which are less relevant to the concept of data separation. Option C limits application use, which is not related to data separation. Option D suggests a data backup strategy that might not respect personal data privacy.
69 / 125
69. A company’s cloud service provider offers several options for disaster recovery. They need to ensure their critical applications remain available in the event of a primary data center failure. Which disaster recovery option should they choose?
The company should choose a Hot Site (C) for disaster recovery to ensure their critical applications remain available in the event of a primary data center failure. A hot site is a fully operational, redundant setup that can take over immediately in case of a disaster, ensuring minimal downtime and business continuity. A Cold Site (A) has basic infrastructure but lacks immediate operational capability, resulting in longer recovery times. A Warm Site (B) is partially equipped and requires some setup, leading to moderate recovery times. Data Archiving (D) focuses on long-term storage of data and is not suitable for disaster recovery of critical applications.
70 / 125
70. During a security assessment, it is found that physical security measures at the data center include locked doors and ID badge verification. However, unauthorized personnel have been gaining access to restricted areas. What additional security measure should be implemented to prevent unauthorized access?
Installing a biometric access control system (B) should be implemented as it provides a higher level of security by ensuring that only individuals with pre-approved biometric credentials can access restricted areas, effectively preventing unauthorized access. Increasing the frequency of security patrols (A) can help monitor the area but may not always prevent unauthorized access. Enhancing the lighting around the perimeter (C) improves visibility but does not directly control access. Conducting background checks on all visitors (D) is important but does not address the immediate issue of controlling physical access to restricted areas.
71 / 125
71. An organization implements a system where employees must swipe a smart card and enter a PIN to gain access to the company's secure areas. Which authentication factors are used in this system?
The system requires the use of a smart card (something you have) and a PIN (something you know), aligning with possession and knowledge (A). Possession and biometric (B) would involve a smart card and a biometric trait like a fingerprint, which is not applicable here. Knowledge and biometric (C) would combine a PIN or password with biometric verification. Biometric and location (D) involve factors that are not used in this scenario.
72 / 125
72. A company’s virtual environment has multiple virtual machines running critical applications. They are concerned about the potential risks if one VM becomes compromised. Which security measure can they implement to minimize the impact of a compromised VM on the rest of the environment?
Virtual Machine Introspection (VMI) (A) is a security measure that allows monitoring and analysis of the internal state of VMs from outside the VM, providing a way to detect and respond to threats without compromising the isolation between VMs. This helps in identifying malicious activity within a VM and taking action to prevent it from affecting other VMs. Network Segmentation (B) helps in controlling and limiting network traffic but does not directly address the issue of a compromised VM. Virtual Machine Snapshots (C) are used for backup and recovery, not for security isolation. Hypervisor Hardening (D) involves securing the hypervisor itself, which is important but does not directly mitigate the risk of a compromised VM affecting other VMs.
73 / 125
73. A company has deployed several containers in production. To ensure security, what should be done to manage container images effectively?
Regularly updating container images to the latest versions (A) is essential to ensure that containers run with the latest security patches and mitigations against known vulnerabilities. Storing container images in a publicly accessible registry (B) increases the risk of tampering and should be avoided. Using only official images from trusted sources (C) is good practice but may not address the need for ongoing updates. Frequently restarting containers (D) does not guarantee that updates are applied unless the underlying image is also updated.
74 / 125
74. A company has implemented whole disk encryption on all employee laptops to protect sensitive data. An employee reports that their laptop is not booting after a sudden power failure. What is the most likely cause of this issue?
The most likely cause is that the encryption key has been corrupted due to the power failure (A), which can happen if the power is lost during a critical operation involving the key. This corruption can prevent the system from booting as the encrypted data cannot be decrypted without a valid key. While a hard drive replacement (B) or forgotten password (D) could cause access issues, they are less likely given the context. The encrypted operating system files (C) are normally accessible as part of the boot process if the key is intact.
75 / 125
75. During a data breach investigation, an organization discovers that personal data of EU citizens was accessed. What legal obligation must the organization fulfill?
Option (B) is correct as GDPR mandates notification of affected individuals and the relevant Data Protection Authority within 72 hours of discovering a data breach involving personal data. Option (A) is incorrect as GDPR applies to all personal data breaches, not just financial information. Option (C) is a violation of GDPR, which emphasizes transparency. Option (D) is incorrect because proactive reporting is required by law, regardless of a formal request.
76 / 125
76. An IT director discovers that a new software update violates the organization’s ethical commitment to open-source software usage. What should be the IT director’s next step according to the organizational code of ethics?
The organizational code of ethics requires adherence to stated commitments and values. Halting the update and reviewing alternatives (B) ensures compliance with the organization’s ethical guidelines regarding open-source software. Proceeding with the update (A) or ignoring the commitment (C) compromises the organization’s values. Applying the update and addressing concerns later (D) fails to uphold the immediate ethical commitment and could lead to longer-term issues.
77 / 125
77. You are tasked with enhancing the security of the company's internal network. One of the measures involves securing the network devices themselves. What is the best practice for securing access to routers and switches?
Implementing strong, unique passwords and limiting access to authorized personnel (B) is the best practice for securing access to routers and switches. Using default usernames and passwords (A) is insecure as they are commonly known and can be exploited by attackers. Enabling Telnet (C) is not secure due to its lack of encryption; SSH should be used instead. Opening all ports (D) increases the attack surface and is not recommended for security.
78 / 125
78. A company’s marketing department is using a new content management system where each user needs the ability to set access permissions for the content they create. The system should allow content creators to determine who can read or edit their content. Which access control model is appropriate for this scenario?
The correct answer is C, Discretionary Access Control (DAC), because DAC allows the content creators to set access permissions for their content, giving them the flexibility to decide who can read or edit their work. Option A, Mandatory Access Control (MAC), is incorrect because it uses a strict policy-based system that would not allow individual discretion. Option B, Role-Based Access Control (RBAC), is incorrect because it manages access based on user roles, which might not provide the granularity needed for individual content control. Option D, Rule-Based Access Control, is incorrect because it enforces access based on rules rather than user discretion.
79 / 125
79. A host-based firewall is configured to log all connection attempts. After analyzing the logs, the security team notices repeated connection attempts from an unknown IP address. What is the best immediate action to take?
Blocking the IP address in the firewall (A) is the best immediate action to prevent potential unauthorized access or attacks from the unknown source. Disabling logging (B) would prevent further monitoring. Increasing the logging level (C) captures more detail but doesn't stop the attempts. Allowing the IP address temporarily (D) poses a security risk without providing immediate benefits.
80 / 125
80. A data center has implemented a mechanism that requires individuals to pass through a secure, controlled entrance that limits entry to one person at a time. Which physical control is being described?
A mantrap is a physical control that consists of two doors with a small space between them, allowing only one person to enter at a time. This mechanism is effective in controlling access and preventing tailgating, where unauthorized individuals might try to follow an authorized person into a secure area. CCTV cameras (A) monitor activity but do not control physical entry, security guards (C) can oversee entry points but are not a mechanical barrier, and biometric access (D) verifies identity but does not restrict the physical flow of individuals like a mantrap does.
81 / 125
81. To ensure accountability in the use of privileged accounts, which of the following controls should be implemented?
Regularly reviewing and auditing privileged account activities ensures accountability by monitoring the actions performed by users with elevated permissions. This practice helps detect any misuse or unauthorized actions and provides a record for investigating incidents. Allowing shared use of privileged accounts (A) undermines accountability by making it difficult to attribute actions to specific users. Disabling logging for privileged accounts (C) removes the ability to monitor their activities, reducing accountability. Limiting access to business hours only (D) may improve security but does not directly enhance accountability.
82 / 125
82. An organization’s primary data center is compromised, and they must shift operations to an interim processing strategy. Which of the following ensures continuity with minimal disruption and no loss of transaction data?
The correct answer is C. A hot site ensures continuity with minimal disruption and no loss of transaction data because it maintains an up-to-date mirror of the primary data center. A cold site (A) lacks immediate resources for operation and would cause significant delays. A reciprocal agreement (B) relies on mutual arrangements which may not guarantee the immediate availability of resources. Cloud-based services (D) can also be an effective solution but might involve complexities related to data synchronization and security.
83 / 125
83. A security team has detected a potential vulnerability in a web application and needs to implement a patch to address it. During the change management meeting, it was noted that the patch may cause compatibility issues with certain database configurations. What is the most critical step the team should take next to ensure a smooth implementation?
Conducting a risk assessment and planning a rollback strategy (B) is the most critical step because it helps identify the potential impact of the patch on existing systems and ensures that there is a plan in place to revert the changes if something goes wrong. Skipping the patch (A) is not advisable as it leaves the vulnerability unaddressed. Applying the patch immediately (C) without assessing risks may lead to system issues. Informing end-users (D) is important but not the most critical immediate step.
84 / 125
84. An organization's network security monitoring system has detected unusual traffic patterns indicative of a possible data exfiltration attempt. Which of the following steps should be taken first to analyze and escalate the incident?
Gathering and reviewing relevant logs (C) is critical to analyze the extent and nature of the incident, which is essential for an effective response. Isolating the affected system (A) is important but should be based on initial analysis. Notifying senior management (B) and informing all employees (D) are part of the escalation and communication plan but should occur after preliminary analysis to provide accurate information.
85 / 125
85. In a software development company, access to the code repository should be restricted to only the development team and not to any other departments. Which authorization mechanism is most effective for this scenario?
The correct answer is A. Role-based access control (RBAC) is the most effective mechanism for restricting access to the code repository to only the development team. By assigning access permissions based on the role (e.g., developer), RBAC ensures that only authorized team members can access the repository (A). Implementing a firewall rule (B) controls network traffic but does not address user authorization for specific resources. Enforcing a complex password policy (C) strengthens authentication but does not control access to the code repository. Data encryption (D) protects data in transit or storage but does not manage access rights to the repository.
86 / 125
86. An organization must ensure that all employees follow a uniform process for reporting security incidents. Which administrative control is most appropriate to formalize this requirement?
An incident reporting procedure is an administrative control that formalizes the process employees must follow to report security incidents. This procedure ensures that incidents are reported consistently and managed effectively. A data encryption standard (B) outlines how data should be encrypted but does not cover reporting processes, a network security policy (C) addresses overall network security but not incident reporting specifically, and a password management guideline (D) provides instructions for creating and maintaining secure passwords, which is not relevant to incident reporting.
87 / 125
87. During a security audit, it is found that a certain network uses TACACS+ for authenticating administrative access to network devices. Which characteristic of TACACS+ makes it preferred over RADIUS for this use case?
TACACS+ is preferred over RADIUS for authenticating administrative access to network devices because it separates authentication, authorization, and accounting (AAA) functions. This allows for more granular control and management of access policies. Option A, while TACACS+ is an open standard, it is not the primary reason for its preference in this context. Option B, RADIUS only encrypts the password, which is less secure for administrative access compared to the full packet encryption provided by TACACS+. Option D, the use of a shared secret for encryption, is also a feature of RADIUS, but TACACS+'s ability to separately handle AAA functions offers more flexibility and security, making it ideal for managing access to network devices.
88 / 125
88. After a disaster recovery drill, an organization identifies several weaknesses in their response plan. What is the most effective way to address these weaknesses?
The correct answer is B. Immediately updating the disaster recovery plan and conducting follow-up drills ensures that weaknesses are addressed promptly and the plan is improved continuously. Documenting weaknesses (A) without action may delay necessary improvements. Conducting a formal audit (C) may be part of a thorough response but should not delay immediate updates and follow-up testing. Replacing team members (D) does not address the plan’s shortcomings and may not resolve the identified issues.
89 / 125
89. An enterprise is considering deploying a network solution that allows centralized control and automation of their network infrastructure across multiple sites. Which of the following technologies should they implement to achieve these goals?
Software-Defined Wide Area Network (SD-WAN) (B) enables centralized control and management of network infrastructure across multiple sites, providing enhanced flexibility, automation, and cost savings. Traditional WAN (A) does not provide the centralized control and flexibility offered by SD-WAN. A Virtual Private Network (VPN) (C) provides secure connections over the internet but does not offer centralized network management or automation capabilities. A Local Area Network (LAN) (D) is limited to a single location and does not address the needs of managing multiple sites.
90 / 125
90. A company has deployed a virtual appliance for web filtering. The IT team needs to ensure that the appliance is not compromised and remains effective in its role. Which security measure should be prioritized?
Regularly updating the appliance's software and definitions (A) ensures that the virtual appliance is protected against known vulnerabilities and can effectively filter web traffic. While isolating the appliance on a separate VLAN (B) enhances network security, it does not directly maintain the appliance's functionality and security posture. Using a complex password (C) is good practice but insufficient on its own to secure the appliance. Monitoring network traffic (D) is important for detecting issues but does not prevent vulnerabilities from being exploited.
91 / 125
91. An organization is experiencing a series of seemingly unrelated security incidents. Which feature of an event correlation system would best help in identifying if these incidents are related?
Pattern recognition (A) in an event correlation system helps in identifying if seemingly unrelated security incidents are actually connected by detecting recurring sequences or similarities in events across different sources. This allows for the identification of broader attack campaigns or multi-stage intrusions that might not be apparent from individual events alone. Real-time monitoring (B) provides immediate visibility into events but does not necessarily identify patterns or relationships. Data retention policies (C) ensure that logs are stored for a required duration, which is important for historical analysis but does not directly help in correlating current incidents. Compliance reporting (D) focuses on regulatory adherence and is not related to identifying connections between incidents.
92 / 125
92. A network administrator notices unusual ARP (Address Resolution Protocol) traffic suggesting that an attacker might be intercepting communications between hosts on a local network. What type of attack is this, and what is a recommended countermeasure?
Unusual ARP traffic indicating interception of communication between hosts suggests a Man-in-the-Middle (MITM) attack, where an attacker secretly relays and possibly alters the communication (B). ARP spoofing detection can help identify and block such malicious activities on the local network (B). DNS poisoning (A) involves altering DNS records, which does not align with ARP-related traffic. DDoS (C) attacks overwhelm network resources, unrelated to ARP traffic. Phishing (D) is an attack through social engineering, not network-level interception.
93 / 125
93. An organization wants to ensure maximum security for stored passwords. Which of the following practices should they adopt for salting?
Generating a new random salt for each password update ensures that even if a password remains the same, the resulting hash changes, thus enhancing security (C). Using a globally unique salt for each user (A) is not sufficient because it does not change with password updates. Using a short, fixed-length salt (B) can reduce security as longer, more random salts provide better protection against attacks. Using the same salt for each user (D) does not prevent attackers from using precomputed hash tables and significantly reduces the effectiveness of the salt.
94 / 125
94. After identifying a set of critical vulnerabilities in their network, an organization decides to document these along with their potential impact and mitigation strategies. Which tool would they use to maintain visibility and track the status of these vulnerabilities?
A risk register is specifically designed to document risks, including vulnerabilities, their potential impact, and mitigation strategies, and to track their status over time. An incident response plan (A) is focused on handling security incidents rather than tracking vulnerabilities. A security policy (B) sets out the rules and guidelines for securing an organization but does not track specific risks. A threat intelligence report (D) provides information on potential threats but does not track the management of vulnerabilities.
95 / 125
95. A company wants to allow its employees to use their corporate credentials to access a third-party cloud service. Which federated authentication method can be used to enable this, while ensuring secure and seamless access?
Security Assertion Markup Language (SAML) (B) is a standard for exchanging authentication and authorization data between an identity provider and a service provider. It allows users to authenticate once with their corporate credentials and access third-party services without needing to log in again, ensuring secure and seamless access. Simple Mail Transfer Protocol (SMTP) (A) is used for sending emails and is not related to federated authentication. File Transfer Protocol (FTP) (C) is used for transferring files over a network and does not handle authentication. Internet Protocol Security (IPsec) (D) is a protocol suite for securing Internet Protocol (IP) communications, not specifically for federated authentication.
96 / 125
96. During a post-incident review of a data leakage event, it was discovered that sensitive data was accessible due to insufficient access controls. What countermeasure should be implemented based on this lesson learned?
Implementing a data loss prevention (DLP) solution (A) directly addresses the issue of data leakage by monitoring and controlling data transfers to ensure sensitive information is not improperly accessed or shared. Increasing policy reviews (B) and conducting awareness campaigns (C) are important but do not specifically prevent data leakage. Enforcing a stricter password policy (D) is beneficial but not directly related to access control deficiencies.
97 / 125
97. A company is connecting with a new third-party logistics provider that requires access to inventory data. To secure this connection, the company needs to ensure data integrity and confidentiality. Which solution is most appropriate?
A VPN with SSL encryption (B) ensures data integrity and confidentiality by creating a secure tunnel for data transfer and encrypting the data end-to-end. This prevents unauthorized access and ensures that data is not tampered with during transit. Unencrypted FTP (A) does not provide encryption, exposing data to interception. An open internet connection with a shared password (C) is insecure and prone to unauthorized access. Cloud storage with public access (D) lacks the necessary security controls to protect sensitive inventory data.
98 / 125
98. During an assessment of a company’s Wi-Fi security, you discover that WPA3 is already in use. Which additional measure should be implemented to ensure maximum security?
Implementing a RADIUS server (B) provides robust authentication mechanisms, ensuring only authorized users can access the network. Using a single SSID for both staff and guests (A) is a security risk as it can lead to unauthorized access to sensitive network areas. Regularly changing the Wi-Fi channel (C) is aimed at avoiding interference, not improving security. Lowering the signal strength (D) can help minimize the Wi-Fi range but does not contribute significantly to overall security.
99 / 125
99. An SSCP-certified professional is offered a lucrative job at a competing firm but realizes that the new position would require sharing proprietary information from their current employer. What should they do according to the (ISC)² Code of Ethics?
The (ISC)² Code of Ethics requires maintaining confidentiality and acting honorably. Declining the job offer (B) avoids potential ethical conflicts and protects the current employer's proprietary information. Accepting the job and sharing information (A) is unethical and illegal. Accepting the job but refusing to share information (C) might not be feasible if the position inherently requires such knowledge. Negotiating with the new employer (D) could still pose risks of accidental disclosure or unethical pressure.
100 / 125
100. An organization needs to ensure that all installed software is properly licensed. What is the most effective approach to achieve this?
Implementing an automated software asset management tool (B) is the most effective approach to ensure that all installed software is properly licensed, as it provides continuous monitoring and can automatically detect non-compliance issues. Conducting a manual software inventory (A) is labor-intensive and prone to errors. Restricting software installation (C) can help, but it is not a comprehensive solution. Regularly purchasing new software licenses (D) is not efficient and does not address the need for accurate tracking and compliance.
101 / 125
101. During the planning of a new office network, you are asked to choose a topology that minimizes the impact of device failure and reduces the risk of network downtime. Which topology would you choose?
The Mesh topology (B) would be the best choice to minimize the impact of device failure and reduce network downtime due to its redundant paths between all nodes. The Star topology (A) has a central point of failure at the hub, which can cause downtime if the hub fails. The Bus topology (C) is vulnerable to a single point of failure in the main communication line. The Ring topology (D) can also suffer from a single point of failure that affects the whole network.
102 / 125
102. An organization is transitioning from an on-premises infrastructure to a cloud environment. They are concerned about data privacy and want to maintain control over their data while still leveraging cloud services. Which deployment model should they choose to best meet their needs?
The Hybrid Cloud model (C) combines both on-premises infrastructure (private cloud) and public cloud resources, allowing organizations to maintain control over their data while still leveraging the scalability and cost benefits of public cloud services. This model is ideal for organizations with concerns about data privacy and security, as it allows sensitive data to be kept in a private environment while using public cloud for less sensitive applications. The Public Cloud (A) is not suitable for organizations that want to maintain control over their data because it involves sharing resources with other users, which can increase security risks. The Private Cloud (B) offers full control over data but may not provide the same cost savings or flexibility as hybrid models. The Community Cloud (D) involves sharing infrastructure with other organizations with similar requirements, which may not meet the specific needs for control and privacy of a single organization.
103 / 125
103. A company needs to securely transmit data between two branches located in different cities over the internet. The requirement is to ensure that the data is encrypted and cannot be intercepted or tampered with during transmission. Which of the following protocols is most suitable for this use case?
The correct answer is B. IPsec (Internet Protocol Security) is ideal for securely transmitting data over the internet as it encrypts the data and provides integrity checks, ensuring that the data cannot be intercepted or tampered with during transmission. This makes it suitable for establishing a secure communication channel between two branches over the internet. SSH (A) is primarily used for secure remote access and command execution rather than for encrypting data transmission between networks. HTTP (C) is used for web communication and does not provide security features needed for encrypting sensitive data. POP3 (D) is used for email retrieval and does not address secure data transmission requirements.
104 / 125
104. To maintain the availability of a web application during periods of high traffic, what is the most effective measure an organization can implement?
Implementing load balancing is the most effective measure to maintain the availability of a web application during periods of high traffic. Load balancers distribute incoming traffic across multiple servers, preventing any single server from becoming overwhelmed and ensuring continuous availability. Enabling caching mechanisms (A) can improve performance but does not address load distribution. Conducting regular vulnerability scans (C) enhances security but does not directly impact availability. Using strong encryption protocols (D) protects data in transit but does not influence traffic handling and server load.
105 / 125
105. A company is concerned about attackers intercepting and modifying data in transit. They want to ensure that any tampering can be detected. Which cryptographic technique is best suited to address this concern?
HMAC provides a way to verify both the integrity and authenticity of a message by combining a cryptographic hash function with a secret key, making it possible to detect any tampering with the data in transit (B). RSA encryption (A) primarily ensures confidentiality and secure key exchange but does not inherently provide integrity checks. Elliptic curve cryptography (C) is used for secure key exchange and digital signatures but is not directly aimed at verifying message integrity like HMAC. Symmetric key encryption (D) ensures confidentiality but does not provide a mechanism for detecting message tampering without additional integrity checks.
106 / 125
106. A company places a "No Trespassing" sign at the entrance of its restricted area. How does this sign contribute to the company's security posture?
The "No Trespassing" sign serves as a deterrent control (B), aiming to discourage unauthorized individuals from entering the restricted area by clearly indicating that entry is forbidden and that there may be consequences for trespassing. Detective control (A) would involve systems to identify and report unauthorized access, which the sign does not do. Preventive control (C) physically restricts access, such as through barriers or locks, which is not the function of a sign. Compensating control (D) offers alternative measures when primary controls are lacking, but the sign’s primary purpose is to deter, not to compensate for other controls.
107 / 125
107. During a routine security check, the EDR system identifies several endpoints with anomalous behavior patterns. What should be the immediate next step?
The immediate next step should be to disconnect the affected endpoints from the network (A) to prevent potential spread of malware or further damage. This isolation helps contain the threat while further investigation is conducted. Performing a system reboot (B) may not resolve the issue and could disrupt evidence. Increasing the alert threshold (C) could overlook serious threats. Conducting an antivirus scan (D) is important but should follow containment measures.
108 / 125
108. Which of the following scenarios violates the principle of segregation of duties (SoD)?
This scenario violates the principle of segregation of duties (SoD) because the employee has control over both approving expenses and reconciling bank statements, which could lead to fraud or errors going undetected. The other scenarios (B, C, D) do not necessarily violate SoD as long as there are appropriate controls and oversight in place to mitigate risks.
109 / 125
109. To verify that its security measures comply with regulatory standards, an organization decides to conduct an internal audit. Which process is crucial for ensuring that the audit thoroughly assesses compliance?
Creating a compliance checklist is crucial for ensuring that an internal audit thoroughly assesses compliance with regulatory standards. This checklist helps auditors systematically review all relevant aspects of compliance and ensures that no critical areas are overlooked. Updating firewall configurations (B), implementing a new backup policy (C), and installing the latest antivirus software (D) are important security measures but do not directly ensure a comprehensive audit of compliance requirements.
110 / 125
110. An enterprise is upgrading its encryption infrastructure and needs to choose an appropriate key length for its AES encryption to ensure compliance with stringent security policies. What is the most suitable key length for maximizing security?
AES-256 is the most suitable key length for maximizing security, as it offers the highest level of protection against brute force attacks and is commonly used in environments requiring stringent security policies (C). AES-128 (A) and AES-192 (B) provide strong security but are less robust than AES-256. A 512-bit key (D) is not a standard option for AES encryption, which supports only 128, 192, and 256-bit key lengths.
111 / 125
111. An organization has a policy that requires secure browsing for all online transactions. Which practice should be implemented to enhance the security of these transactions?
Using a dedicated browser for online transactions (A) reduces the risk of cross-site tracking and minimizes exposure to potential threats from other activities. Disabling browser extensions (B) can improve security but is not specifically focused on online transactions. Clearing the browser cache (C) is good practice but does not specifically protect transactions. Blocking social media websites (D) does not directly enhance the security of online transactions.
112 / 125
112. To maintain compliance with regulatory requirements, an organization conducts periodic reviews of its security policies and procedures. Which activity is most critical during these reviews?
Benchmarking against industry standards is the most critical activity during periodic reviews of security policies and procedures to maintain compliance with regulatory requirements. This process involves comparing the organization's policies and procedures to accepted industry standards and best practices to identify areas for improvement and ensure compliance. Updating software applications (A), installing new firewall rules (C), and reassigning security responsibilities (D) are important activities for security management but are not specifically focused on reviewing and comparing policies and procedures for compliance.
113 / 125
113. A network administrator needs to ensure that video conferencing traffic is prioritized over other types of traffic on the network to prevent latency and jitter issues. Which device or feature should be implemented?
A QoS-enabled router (C) is the appropriate device to implement because it can prioritize video conferencing traffic over other types of traffic, reducing latency and jitter and ensuring a better quality of service. A firewall with content filtering (A) is used for security and does not prioritize traffic types. A load balancer with session persistence (B) ensures that sessions are consistently directed to the same server but does not prioritize traffic. An Intrusion Prevention System (IPS) (D) focuses on detecting and preventing network intrusions and is not designed for traffic prioritization.
114 / 125
114. During a supplier risk review, it was identified that a supplier has access to sensitive customer data without adequate encryption. What is the most effective action to take?
The most effective action to address the risk of a supplier having access to sensitive customer data without adequate encryption is to implement strong encryption protocols for data in transit and at rest (B). This ensures that the data is protected regardless of the supplier's practices. Requesting the supplier to stop using customer data (A) may not be feasible or effective. Monitoring the supplier's data access more closely (C) is important but does not mitigate the risk of unencrypted data. A confidentiality agreement (D) is a legal measure but does not address the technical risk of unencrypted data.
115 / 125
115. When implementing an MDM solution for a BYOD environment, which of the following measures is essential to ensure compliance with corporate security policies?
Device compliance checks (C) ensure that BYOD devices adhere to corporate security standards, such as up-to-date software and security patches, which is crucial for maintaining security. Restricting personal features (A) is impractical for BYOD and can reduce user acceptance. While regular security training (B) is important, it does not directly enforce compliance. Device encryption limited to corporate apps (D) is insufficient as it may leave other areas of the device vulnerable.
116 / 125
116. An organization has a baseline policy that requires encryption of all sensitive data at rest. A security audit reveals that one of the storage systems is storing sensitive data in plaintext. What should be the security analyst’s next step?
The immediate action should be to encrypt the sensitive data (A) to comply with the baseline policy and protect it from unauthorized access. Notifying the storage system administrator (B) is necessary but secondary to securing the data. Updating the baseline policy (C) does not address the current non-compliance. Conducting a risk assessment (D) is important but does not mitigate the immediate risk of unprotected data.
117 / 125
117. A company wants to minimize the risk of former employees accessing sensitive data after they leave. What is an essential step in the de-provisioning process to achieve this?
The correct answer is C. Deactivating user accounts and revoking access is essential in the de-provisioning process to ensure former employees cannot access sensitive data after leaving the company (C). Updating security policies (A) is important for governance but does not directly remove access. Performing a network assessment (B) helps identify vulnerabilities but does not de-provision users. Reviewing access logs regularly (D) is good for monitoring but does not actively remove access.
118 / 125
118. An organization is using IPsec to secure communication between their offices. The security team is concerned about IPsec’s susceptibility to certain types of attacks. Which of the following is a known vulnerability of IPsec?
The correct answer is B. IPsec can be vulnerable to replay attacks if anti-replay services are not enabled. Replay attacks involve intercepting and retransmitting valid data packets to create a malicious effect. Option A is incorrect as IPsec supports encryption. Option C is not directly related to IPsec; DNS spoofing attacks target domain name resolution rather than the IPsec protocol itself. Option D is incorrect because IPsec does provide data integrity through authentication headers and encapsulating security payloads.
119 / 125
119. When designing a system to store confidential medical records, which cryptographic practice is most crucial to ensure data confidentiality?
Encrypting data at rest with a secure algorithm (B) is crucial for ensuring the confidentiality of stored medical records, as it protects sensitive data from unauthorized access if the storage medium is compromised. Using a hash function with salt (A) helps prevent hash collisions and protect against dictionary attacks but does not encrypt data for confidentiality. Implementing SSL/TLS (C) is essential for protecting data in transit but does not address the confidentiality of stored data. Access control lists (ACLs) (D) help manage who can access data but do not provide encryption to protect the data itself from unauthorized access.
120 / 125
120. A large enterprise is looking to migrate its on-premises data center to the cloud. They need full control over their servers, storage, and network resources to run their legacy applications. Which cloud service model should they select?
Infrastructure as a Service (IaaS) (A) provides the most control over the underlying hardware, including servers, storage, and networking. This model is ideal for a large enterprise that needs to migrate legacy applications to the cloud and requires the ability to configure and manage the infrastructure. Platform as a Service (PaaS) (B) offers a higher level of abstraction, focusing on application development rather than infrastructure management, which is not suitable for running legacy applications that need full control. Software as a Service (SaaS) (C) provides fully managed applications, which would not be appropriate for legacy systems that require specific configurations. Function as a Service (FaaS) (D) is a serverless computing model for running small pieces of code, which is not suitable for the full-scale migration of a data center.
121 / 125
121. During a forensic investigation in a company, a security professional discovers that key evidence is located on a server in another country. To legally obtain this evidence, which action is most appropriate?
A Mutual Legal Assistance Treaty (MLAT) (C) provides a formal mechanism for obtaining evidence from another country, ensuring legal compliance and admissibility in court. Sending an informal request (A) does not guarantee legal compliance or evidence admissibility. Using a hacking tool (B) is illegal and unethical. Requesting assistance from a local law enforcement agency (D) is helpful but may not have jurisdiction over international matters. Thus, applying for an MLAT (C) is the appropriate action.
122 / 125
122. A company is experiencing issues with remote desktop connectivity. The IT team needs to ensure the correct port is open on the firewall to allow this service. Which port should they verify or open?
Remote Desktop Protocol (RDP) uses port 3389 (C) for remote desktop connectivity. Ensuring this port is open on the firewall will allow remote desktop services to function properly. Port 22 (A) is used for SSH, which provides secure shell access, not remote desktop. Port 443 (B) is used for HTTPS, which secures web traffic. Port 3306 (D) is used by MySQL databases for database connections, not remote desktop.
123 / 125
123. A company has a policy to destroy cryptographic keys once they are no longer needed. Which method ensures the secure destruction of cryptographic keys to prevent any potential future misuse?
The correct answer is B. Overwriting the keys with random data multiple times ensures secure destruction by making it extremely difficult to recover the original data. Deleting the keys from the filesystem (A) does not guarantee that the keys are irrecoverable, as they can often be restored using forensic techniques. Encrypting the keys before deletion (C) does not eliminate the need for proper destruction, as the encrypted keys themselves can be a target for decryption. Moving the keys to an archive location (D) is not a destruction method but rather a way to store the keys, which does not address the need for secure deletion.
124 / 125
124. During a backup process, an organization uses data deduplication to optimize storage. What is the primary benefit of using data deduplication in their backup strategy?
The correct answer is B. Data deduplication minimizes the storage space required for backups by eliminating duplicate copies of repeating data, thus optimizing the use of storage resources. Reducing backup time (A) can be a secondary benefit but is not the primary purpose. Ensuring data encryption (C) is not related to deduplication but to data security practices. Improving recovery speed (D) can be a benefit of having more efficient storage, but the primary advantage of deduplication is storage optimization.
125 / 125
125. During a security audit, it was discovered that sensitive company data has been accessed and copied by an employee without proper authorization. What type of malicious activity does this represent?
The scenario describes an employee accessing and copying sensitive data without authorization, which is indicative of an insider threat (C). Insider threats involve malicious activities performed by individuals within the organization who have access to sensitive data and systems. A zero-day exploit (A) takes advantage of vulnerabilities that are not yet known to the software vendor, but it does not typically involve authorized access by employees. A web-based attack (B) targets web applications and services from outside the organization. Distributed Denial of Service (DDoS) (D) attacks aim to disrupt services by overwhelming them with traffic but do not involve unauthorized access to sensitive data.
Your score is
Restart Exam