In a large healthcare organization, multiple departments handle sensitive patient data. Each department requires access to different applications and systems to carry out its tasks efficiently. However, granting broad access rights through long-lived authentication tokens poses security risks. What solution should the IT department implement while adhering to the principle of least privilege and securing sensitive patient data?
Multi-Factor Authentication (MFA)
Open Authorization (OAuth)
JSON Web Token (JWT)
Kerberos
Open Authorization (OAuth)
OAuth (Open Authorization) is a widely used authentication framework that enables secure authorization between different services and aligns with the principle of least privilege.
To address the escalating operational costs and complexities stemming from multiple standalone applications, an organization plans to restructure its software deployment process. They want to minimize overhead, increase flexibility in development environments, and enhance the efficient use of system resources. What approach would be the MOST effective?
Hybrid cloud infrastructure
Containerization
Virtualization
Microservices
Containerization
A cyber group is reviewing its web filtering capabilities after a recent breach. Which centralized web-filtering technique groups websites into categories such as social networking, gambling, and webmail?
Content categorization
Uniform resource locators (URL) scanning
Reputation-based filtering
Block rules
Content categorization
Content categorization classifies websites into categories such as social networking, gambling, adult content, webmail, and many others.
Which feature of web filtering is the MOST effective for organizations aiming to reduce the risk of malware infections by blocking access to websites known for hosting malicious content?
Block rules
Content categorization
Uniform Resource Locator (URL) scanning
Reputation-based filtering
Uniform Resource Locator (URL) scanning
URL scanning examines the URLs requested by users and can block access to specific URLs known to host malicious content, be inappropriate, or violate the company’s Internet usage policy.
After a recent breach, an organization mandates increased monitoring of corporate email accounts. What can the organization use that mediates the copying of tagged data to restrict it to authorized media and services and monitors statistics for policy violations?
Antivirus (A-V)
Data loss prevention (DLP)
Simple Network Management Protocol (SNMP) trap
Security content automation protocol (SCAP)
Data loss prevention (DLP)
A cyber engineer enhances processes and controls surrounding exposures and vulnerabilities to meet all regulatory requirements before a year-end inspection. What focuses on key aspects of the organization’s cybersecurity strategy, including prioritization, considerations of exposure, and risk tolerance contexts?
open-source intelligence (OSINT)
Vulnerability analysis
Common Vulnerabilities and Exposures (CVE)
Common Vulnerability Scoring System (CVSS)
Vulnerability analysis
A manufacturing company’s security manager plans to implement corrective operational controls to mitigate potential security threats. Which of the following instances would be the appropriate control?
Regular penetration testing to uncover potential vulnerabilities
A firewall that prevents unauthorized access to the network
A security camera system monitoring the premises
Enabling continuous monitoring to disable abnormal accounts
Enabling continuous monitoring to disable abnormal accounts
Employees in a large financial institution regularly access their work accounts and systems to process transactions and manage client data. To enhance security, the IT department has implemented a password policy that requires employees to change their passwords every ninety days. However, some employees need help remembering new passwords, leading to frequent password reset requests. This process increases the workload for IT support and may lead to security risks if employees choose weak passwords to simplify the process. The IT department is exploring alternative password expiration concepts to balance security and user convenience. What concept should the IT department consider to address the challenges related to password expiration and enhance security while reducing password reset requests?
Enforcing complex password requirements
Password rotation with a longer expiration period
Implementing biometric authentication
Enabling Single Sign-On (SSO) for user convenience
Password rotation with a longer expiration period
A medium-sized organization is undergoing an audit for its information security practices. As a security analyst, the auditor seeks to assess the organization’s use of an Acceptable Use Policy (AUP). What crucial aspect of the AUP should the auditor focus on to ensure the organization meets the standards set for information security?
The AUP includes the number of allowed password attempts before locking an account.
The AUP includes clear consequences for noncompliance.
The AUP includes guidance for personal use of organizational resources.
The AUP includes a list of approved software for each department.
The AUP includes clear consequences for noncompliance.
A major corporation seeks to strengthen its security measures following a recent breach. The actor breached information regarding those not associated with the organization and exploited a weakness in the organization’s physical defenses to gain unauthorized access to sensitive data. What type of security threat did the corporation face?
Unassociated digital threat
Internal physical threat
Internal digital threat
External physical threat
External physical threat
A cybersecurity manager is preparing to begin working when a police officer comes through the door waving a subpoena. The officer states that the company is under investigation for suspicious activities relating to recent overseas sales, and they are taking the servers with them. What gives police officers the right to take the servers?
Due process
Legal hold
Digital forensics
Data acquisition
Legal hold
The IT director at a financial institution focuses on implementing compensating managerial controls to augment the institution’s existing security framework. If a mandated control cannot be put into place, which of the following compensating controls should an analyst recommend as a sufficient substitute?
Isolating a critical system that cannot be patched.
An automated system that scans and patches software vulnerabilities
Using biometric access controls on all company systems
Regular employee training on cybersecurity best practices
Isolating a critical system that cannot be patched.
A robotics company is developing autonomous drones for package delivery. The drones need to operate reliably in different weather conditions, navigate complex terrains, and respond rapidly to changing scenarios. Which choice should be given prime consideration for the selection and design of the system intended for these drones?
Embedded systems
Serverless system
Containerization
Cloud-based systems
Embedded systems
A healthcare organization is setting up a system to store patient data securely. To ensure that only authorized personnel can access the data and it cannot compromise the system during a breach, which technique should the organization implement?
Asymmetric encryption
Hashing
Symmetric encryption
Tokenization
Hashing
An attacker gains unauthorized access to an organization’s server and exploits a vulnerability in a web application. The attacker injects malicious code into the application’s memory space, gaining control over the server and compromising sensitive data. What security measure can help mitigate memory injection attacks on OS-based systems?
Configure the firewall to block incoming traffic.
Enable user account control (UAC) on the server.
Implement address space layout randomization (ASLR)
Install antivirus software to scan the web application.
Implement address space layout randomization (ASLR)
Implementing address space layout randomization (ASLR) is a preventive measure against memory injection attacks. ASLR randomizes the memory locations of processes, making it challenging for attackers to predict memory addresses for their malicious code.
A company is revamping its current IT infrastructure with a focus on enhancing its ability to operate under changing or harmful conditions without suffering a significant loss of functionality. What primary aspect of the system design should the team focus on to achieve this goal?
Load balancing
Availability
Resilience
Network segmentation
Resilience
Resilience refers to the capacity of a system to readily adapt and recover from adverse or harmful conditions. It extends beyond mere availability or recovery, encompassing the capability to function under sub-optimal conditions and to rebound from failure.
The security manager of a highly sensitive facility is evaluating options for intrusion detection systems to detect physical movement in its secured zones. The ideal technology the facility needs should be less prone to environmental interferences and preferably not depend on physical contact. Which technology should the security manager implement?
Microwave sensors
Ultrasonic sensors
Infrared sensors
Pressure sensors
Ultrasonic sensors
The IT department of a medium-sized company is in the process of finalizing agreements with various vendors. The legal team drafted the contracts to ensure proper arrangements. The team considers three types of agreements: an NDA, a BPA, and an MOU. The IT team wants to select the MOST appropriate agreement for each vendor to ensure smooth collaboration. Which of the following agreements protects sensitive information shared between the company and its vendors?
Non-disclosure agreement (NDA)
Business partnership agreement (BPA)
Memorandum of understanding (MOU)
Memorandum of agreement (MOA)
Non-disclosure agreement (NDA)
The non-disclosure agreement (NDA) is a suitable agreement for protecting sensitive information shared between parties and maintaining confidentiality.
A cybersecurity analyst for a large organization permits employees to use Instant Messaging (IM) services on their devices. Despite using encryption, the analyst’s concern is the potential software vulnerabilities and difficulty scanning messages and attachments for threats. Which actions should the cybersecurity analyst use to address this concern?
Regularly update and patch the Instant Messaging apps to address any known software vulnerabilities.
Allow employees to use Instant Messaging services without any changes since the encryption already provides sufficient security.
Implement additional encryption layers on top of the existing Instant Messaging (IM) services to enhance security further.
Disable all Instant Messaging services on Windows, Android, and iOS devices to prevent any potential security risks.
Regularly update and patch the Instant Messaging apps to address any known software vulnerabilities.
A small department at a company manages a server, separate from IT, for data access and backup purposes. What role does the department fulfill?
Data owner
Data processor
Data controller
Data custodian
Data custodian
The data custodian role manages the system on which the data assets reside. This role includes enforcing access control, encryption, and backup/recovery measures.
An organization notices an external actor trying to gain access to the company network. The attacker is not targeting a specific account but rather using the same password across a vast range of usernames in hopes that one might be correct. What type of attack BEST describes this scenario?
Dictionary
Brute force
Spraying
Rainbow table
Spraying
A cyber team implements new hardening techniques after a data loss prevention (DLP) audit revealed increased data exfiltration. What is a tenet of host-based firewalls?
It describes software tools that monitor and protect individual hosts.
It uses signature-based detection and anomaly detection.
It requires deploying and configuring specialized software agents.
It provides controls for incoming and outgoing network traffic.
It provides controls for incoming and outgoing network traffic.
A logistics company is contemplating certain steps for its data centers in its quest to fortify its systems against long-term power outages and improve the physical security of its equipment. What is the MOST suitable measure the company could undertake?
Implementing high-availability systems
Deploying onsite generators
Incorporating additional Uninterruptible Power Supplies (UPS)
Investing in geographic dispersion
Deploying onsite generators
A new IT security firm is partnering with an IT support company and is opening its business soon. The firm would like to be a reseller for a popular firewall. Which of the following options allows the firm to become an authorized reseller?
Memorandum of Agreement (MOA)
Business Partners Agreement (BPA)
Memorandum of Understanding (MOU)
Non-Disclosure Agreement (NDA)
Business Partners Agreement (BPA)
A BPA is a partner agreement that large IT companies set up with resellers and solution providers.