Question
A company evaluates its security policies to prevent potential data leakage and malware infection through portable storage devices. Which action would MOST effectively reduce the risks associated with the unauthorized use of such devices?
A.Implementing a strict removable media policy
B.Regularly updating the company’s firewall settings
C.Increasing the frequency of employee cybersecurity training
D.Replacing all Ethernet cables with shielded versions
A.Implementing a strict removable media policy
Question
A tech startup has just suffered a data breach where sensitive customer financial data leaked. The chief executive officer (CEO) has an immediate concern about the tangible penalty the company will face due to violating data protection regulations. What is the CEO primarily concerned with in this situation?
A.Privacy policy updates
B.Reputational damage
C.Fines
D.Security infrastructure overhaul
C.Fines
A healthcare provider is modernizing its data storage solutions to comply with health information privacy laws. The chief information security officer (CISO) must ensure that sending data access logs to healthcare regulatory authorities is in a specific format. What kind of reporting is taking place?
A.Internal compliance reporting
B.External compliance reporting
C.Data retention policy enforcement
D.Privacy impact assessment
B.External compliance reporting
Question
A healthcare provider located in an EU member state must maintain comprehensive patient records while ensuring the privacy of individuals’ information. How can the provider navigate legal requirements for data retention with respect to patients who request that their information be amended?
A.Establishing a specific data retention policy
B.Maintaining extended data inventory
C.Complying with mandated regulations
D.Regularly reviewing and updating privacy policies
C.Complying with mandated regulations
As part of a business continuity plan, a company wants to create a resilient work model that securely allows employees to access critical network resources, regardless of physical location. This model must enforce strict access controls and multifactor authentication while facilitating on-site and remote work capabilities. What type of work environment mostly aligns with these requirements?
A.Fully remote work environment
B.Hybrid work environment
C.On-premises work environment
D.Third-party outsourced work environment
B.Hybrid work environment
A company is prioritizing the security of its sensitive financial information. With a diverse team of remote and in-office staff, the IT security team must ensure that this data is secure, whether on a server in the data center, sent via email to international partners, or actively used by an authorized user on the corporate network. Which two methods are MOST effective for securing this company’s data?
A.Encryption and hashing
B.Tokenization and masking
C.Obfuscation and segmentation
D.Permission restrictions and geographic restrictions
A.Encryption and hashing
Question
An organization has seen an uptick in phishing emails slipping through its security filters. It is enhancing technical security measures but is considering immediate actions to involve employees more effectively in its defense strategy to mitigate related risks. Which actions should the organization undergo? (Select the best three options.)
A.Conduct training sessions for employees to recognize phishing attempts
B.Implement a system for employees to report detected suspicious emails
C.Deploy a new firewall to inspect incoming email traffic
D.Enforce two-factor authentication for all company accounts
A.Conduct training sessions for employees to recognize phishing attempts
B.Implement a system for employees to report detected suspicious emails
D.Enforce two-factor authentication for all company accounts
Question
A large healthcare organization is considering an alliance with a third-party medical software provider. The organization wants to ensure they well-document all aspects of the alliance, with both parties understanding their roles and responsibilities. Which of the following should the healthcare organization prioritize to clearly define the parameters, the expectations for both parties, and the protocols for managing risks and security?
A.Business Partnership Agreement (BPA) and Rules of Engagement (RoE) B.Memorandum of Understanding (MOU) and nondisclosure agreement (NDA) C.Service level agreement (SLA) and statement of work (SOW) D.Questionnaires and master services agreement (MSA)
A.Business Partnership Agreement (BPA) and Rules of Engagement (RoE)
Note:
Parties usually use an MOU and NDA as initial steps before entering a more formal agreement.
Question
A risk manager for a company providing IT support services conducts a business impact analysis (BIA) and identifies a Mission Essential Function (MEF) that relies on a server with a Mean Time Between Failures (MTBF) of 2,500 hours and a Mean Time to Repair (MTTR) of 4 hours. Given a Maximum Tolerable Downtime (MTD) of 24 hours and a Recovery Time Objective (RTO) of 6 hours for this function, what should the risk manager prioritize in the risk management strategy?
A.Improving the MTBF of the server B.Reducing the MTTR of the server C.Increasing the MTD for the function D.Extending the RTO for the function
B.Reducing the MTTR of the server
Note:
Reducing the MTTR is crucial. With an RTO of 6 hours and an MTTR of 4 hours, other activities have limited time, such as recovery during the maximum tolerable downtime. Lowering the MTTR provides more time for those activities.
Question
A cybersecurity consultant is analyzing risks for a new e-commerce website. The consultant identifies potential risks, evaluates their impact and likelihood, and considers the organization’s ability to mitigate them. Which risk analysis methodology is the consultant MOST likely using?
A.Qualitative risk analysis B.Quantitative risk analysis C.Qualitative and quantitative risk analysis D.Ad hoc risk assessments
Qualitative and quantitative risk analysis
Note:
The consultant considers qualitative factors, such as impact and likelihood. However, the consultant must also consider the organization’s ability to mitigate risks involving quantitative factors, such as costs.
A small software development company is about to start a project with a new client. The client wants to understand what they can expect from the software development company in terms of the services it will provide and the timeline for the project. Which legal document would be MOST appropriate for outlining the project’s specific details, including the scope, deliverables, and timeline?
A.Memorandum of understanding (MOU) B.Nondisclosure agreement (NDA) C.Service level agreement (SLA) D.Statement of work (SOW)
D.Statement of work (SOW)
Note:
A statement of work details the scope of a project or engagement, the deliverables, timelines, and responsibilities. It clarifies the vendor’s tasks, the client’s expectations, and the agreed-upon deliverables.
A service level agreement defines the specific performance metrics, quality standards, and service levels expected from the vendor. While it is an important agreement, it does not specifically outline a project’s scope, deliverables, and timeline.
Question
A large financial institution is considering outsourcing its IT infrastructure to a third-party cloud service provider. The company has concerns about the risks of giving its sensitive financial data to an external vendor. What approach should the company use to ensure the vendor complies with the appropriate security standards and regulations?
A.Enter into a contract without clauses for regular assessments or audits of the vendor's security practices. B.Rely on the vendor's reputation in the industry without the need to conduct any further assessments. C.Ensure the vendor consents to and undergoes regular penetration testing to verify their security practices. D.Prioritize the vendor's cost and ease of use over security considerations based on their capabilities.
Ensure the vendor consents to and undergoes regular penetration testing to verify their security practices.
Note:
Penetration testing identifies potential vulnerabilities in a vendor’s systems, networks, and applications, assessing their security posture. The company gains insights into the vendor’s security resilience and vulnerabilities that attackers could exploit by conducting or requesting evidence of regular penetration tests.
Question
An organization is expanding its operations into a new region with unfamiliar regulatory requirements. The risk management team conducts a thorough risk assessment and identifies a need for robust controls to ensure compliance. Which of the following would be the MOST effective metric for tracking regulatory compliance risk in this situation?
A. The employee percentage who have received compliance training B. The total revenue the company generated from the new region C. The number of market competitors the company has identified D. The frequency of audits conducted by the regulatory authority
The employee percentage who have received compliance training
An organization plans to outsource its customer service operations to a third-party vendor. The organization needs to evaluate potential vendors based on their risk profiles to ensure data security and compliance with regulatory requirements. Which of the following considerations would be the MOST important in the vendor assessment process?
A. The vendor's market reputation and branding to check for reliability and quality B.The vendor's financial stability, operational reliability, and data security practices C. The vendor's geographical location and proximity to the company's headquarters D. Finding a vendor who can offer the lowest price for data security and compliance
The vendor’s financial stability, operational reliability, and data security practices
A company’s risk manager has recently identified a potential risk involving its inventory management software and has listed the risk in the risk register. As a result, the manager must decide on the most suitable response to this risk. Which of the following is the MOST appropriate step for the risk manager?
A.Identify and assess the potential vulnerabilities and threats associated with the risk B.Identify the mission essential functions of the company and assess the risk's impact on them C.Determine the likelihood and impact of the risk on the company's operations D.Update the risk register with the mitigation strategies and inform the stakeholders
Determine the likelihood and impact of the risk on the company’s operations
An earthquake occurred near the company HQ, causing severe damage in the area. The earthquake affected the building, which will not be usable for several weeks. What plan will the company follow to maintain its business? (Select the two best options.)
A.COOP B.Disaster recovery C.Incident response D.AUP
Is this right?
COOP
Incident response
Copilot Begs to differ,
COOP
Disaster recovery
An organization has hired an HR director to improve the performance of the HR Division. The director first identified a lack of digital-only exit processes for employees or contractors. What are some IT security areas an exit process should focus on? (Select the three best options.)
A.Account management B.Personal assets C.Physical security D.Company assets
A.Account management
B.Personal assets
D.Company assets
Any personal devices used for company activities must have the proprietary information removed, including the removal of any software purchased by the company.
.
Question
A manager reprimands an IT employee because the employee did not follow instructions on the server build. Each server’s configuration was different, including different software and settings. What should the employee have followed to build the server correctly?
A.Standards B.Access control models C.Policy D.Guidelines
Standards
A standard defines the expected outcome of a task, such as a particular configuration state for a server or performance baseline for a service. Following the standard for each build would ensure each server’s configuration would match.
Security governance relies heavily on specially designed and interdependent roles. Each role has unique responsibilities that contribute to effective security oversight and control. What are some of these roles? (Select the three best options.)
A.Owner B.Controller C.Processor D.Maintenance custodian
A.Owner
B.Controller
C.Processor
A company helps employees get up to speed quickly with correct documentation. Guidelines can be beneficial in accomplishing this goal. To ensure guidelines remain relevant, what must the company do to them? (Select the two best options.)
A.Mandatory employee review B.Continually update them C.Regular review D.Periodic assessments and updates
C.Regular review
D.Periodic assessments and updates
Question
An IT manager prepares a proposal to implement change management. Before being able to start the program, the manager needs support from key personnel within every department. What key personnel does the manager need support from?
A.Controller B.Owner C.Stakeholders D.Processor
C.Stakeholders
Stakeholders in change management are personnel with a vested interest in the change. Their participation fosters ownership and responsibility.
The controller role closely relates to the General Data Protection Regulation (GDPR) and identifies the purposes, conditions, and means of processing personal data. This position is not part of change management.
A nationwide company realizes its current standardized approach to security is not working. The different company business units need more autonomy and the ability to make decisions that meet their local needs and priorities. What type of security governance should they follow?
A.Decentralized security governance B.Centralized security governance C.Governance committees D.Data protection authorities
A.Decentralized security governance
Decentralized security governance distributes decision-making authority to different groups or departments to facilitate security-focused decisions based on localized needs and priorities.
In centralized security governance, decision-making authority primarily rests with a single core group or department that establishes policies, procedures, and guidelines and makes important security-focused decisions.
Question
A security analyst at a large financial institution must find areas of security operations that cannot maximize the advantages of automation and orchestration. The organization aims to enhance efficiency and combat operator fatigue. Which of the following areas will experience minimal improvement by implementing automation and orchestration?
A.Customization and application of vulnerability scanning B.Manually initiated threat detection and response C.Monitoring systems solely for anomalous activities D.Face-to-face cyber risk awareness training
D.Face-to-face cyber risk awareness training
Applying automation and orchestration may not bring as much efficiency and effectiveness to face-to-face cybersecurity risk awareness training due to the direct interaction between trainers and learners. It plays a critical role in effectively communicating and understanding complex cybersecurity issues.
Automation can significantly enhance the efficiency of vulnerability scanning and patch applications by performing these repetitive tasks swiftly and reliably, reducing the workload on the security team.
An incident response team member identifies an attack on the system network. Upon further analyses, it is determined that a threat actor was attempting to send data to the system in a manner that would change the commands being sent to the server. What type of attack is occurring in this situation?
A.Injection attack B.Replay attack C.Forgery attack D.Cross-site Scripting
A.Injection attack