A project manager’s assistant received an email requesting information for an ongoing project. The email attempted to convince the assistant that the project would fail to complete on time if they did not receive the information. Before giving the information over, what should the assistant protect against?
A.Urgency B.Typosquatting C.Consensus technique D.Brand impersonation
A.Urgency
A company uses a popular password manager. It noticed unusual breaches in its systems and forced a password reset on all employees’ accounts. What is a primary consideration when using third-party software for any computer function?
A.Costs can be cheaper than doing it all internally. B.Every vendor is at risk of threats. C.The risks outweigh the costs. D.A company cannot hire employees with specific roles.
B.Every vendor is at risk of threats.
- There are risks when using any software, including third-party vendor services or software. It is important to analyze a vendor’s security posture to protect against breaches.
A large multimedia company is in the process of creating a new marketing campaign for a soon-to-be-released movie. However, before releasing the campaign, the company noticed an increase in fake accounts mimicking it online with a similar-looking campaign. What could the company do to mitigate this issue?
A.Check for typosquatting B.Check for brand impersonation C.Check for coercion D.Check for consensus technique
B.Check for brand impersonation
A large multinational software company experienced a ransomware attack. After running a forensic audit and recovering data from backups, the company found that it was an organized, illicit, nonpolitical group that attempted to extort it. What describes the attack that occurred to the company?
A.Insider threat B.Hacktivism C.Service disruption D.Cybercrime
D.Cybercrime
A large financial firm recently brought its information technology (IT) back in-house. It made this decision after facing issues with its third-party vendor not properly securing its systems from outside threats. Which of the following was the primary consideration for the financial firm’s return to in-house IT services?
A.To reduce the risk of supply-chain attacks. B.To reduce the risk of insider threats C.To reduce the risk of nation-state threats D.To improve the company's security posture
A.To reduce the risk of supply-chain attacks.
An information technology (IT) manager is trying to persuade the chief financial officer (CFO) to sign off on a new support and update contract for the company’s virtualized environment. The CFO sees this as a waste of money since the company already has the environment up and running. The IT manager explained to the CFO that the company will no longer receive security updates to protect the environment. What describes the level of hazard posed by NOT keeping the systems up-to-date?
A.Vulnerability B.Threat C.Risk D.Insider threat
C.Risk
A company policy states that any wire transfer above a certain value must be authorized by two employees, who must separately perform due diligence to verify invoice details. What specific type of social engineering is this policy designed to mitigate?
Business email compromise
❔A purchasing manager is browsing a list of products on a vendor’s website when a window opens claiming that antimalware software has detected several thousand files on their computer that are infected with viruses. Instructions in the official-looking window indicate the user should click a link to install software that will remove these infections. What type of social engineering attempt is this, or is it a false alarm?
This is a social engineering attempt utilizing a watering hole attack and brand impersonation.
A multinational company manages a large amount of valuable intellectual property (IP) data, plus personal data for its customers and account holders. What type of business unit can be used to manage such important and complex security requirements?
A security operations center (SOC)
If a security control is described as operational and compensating, what can you determine about its nature and function?
The control is enforced by a person rather than a technical system, and the control has been developed to replicate the functionality of a primary control, as required by a security standard.
A firewall appliance intercepts a packet that violates policy. It automatically updates its access control list to block all further packets from the source IP. What TWO functions did the security control perform?
Preventive and corrective
How does accounting provide non-repudiation?
A user’s actions are logged on the system. Each user is associated with a unique computer account. As long as the user’s authentication is secure and the logging system is tamperproof, they cannot deny having performed the action.
What is the difference between authorization and authentication?
Authorization means granting the account that has been configured for the user on the computer system the right to make use of a resource. Authorization manages the privileges granted on the resource. Authentication protects the validity of the user account by testing that the person accessing that account is who they say they are.
What process within an access control framework is responsible for logging actions performed by subjects?
Accounting
What term is used to describe the property of a secure network where a sender cannot deny having sent a messge?
Non-repudiation
A copmany provides a statement of deviations from framework best practices to a regulator. What process has the company performed?
Gap analysis
What are the properties of a secure information processing system?
C.I.A (and non-repudiation)
As part of a business continuity plan, a company wants to create a resilient work model that securely allows employees to access critical network resources, regardless of physical location. This model must enforce strict access controls and multifactor authentication while facilitating on-site and remote work capabilities. What type of work environment mostly aligns with these requirements?
A.Fully remote work environment B.Hybrid work environment C.On-premises work environment D.Third-party outsourced work environment
Hybrid work environment
An organization has seen an uptick in phishing emails slipping through its security filters. It is enhancing technical security measures but is considering immediate actions to involve employees more effectively in its defense strategy to mitigate related risks. Which actions should the organization undergo? (Select the best three options.)
A.Conduct training sessions for employees to recognize phishing attempts B.Implement a system for employees to report detected suspicious emails C.Deploy a new firewall to inspect incoming email traffic D.Enforce two-factor authentication for all company accounts
Conduct training sessions for employees to recognize phishing attempts
Implement a system for employees to report detected suspicious emails
Enforce two-factor authentication for all company accounts
A company is prioritizing the security of its sensitive financial information. With a diverse team of remote and in-office staff, the IT security team must ensure that this data is secure, whether on a server in the data center, sent via email to international partners, or actively used by an authorized user on the corporate network. Which two methods are MOST effective for securing this company’s data?
A.Encryption and hashing B.Tokenization and masking C.Obfuscation and segmentation D.Permission restrictions and geographic restrictions
Encryption and hashing
A healthcare provider located in an EU member state must maintain comprehensive patient records while ensuring the privacy of individuals’ information. How can the provider navigate legal requirements for data retention with respect to patients who request that their information be amended?
A.Establishing a specific data retention policy B.Maintaining extended data inventory C.Complying with mandated regulations D.Regularly reviewing and updating privacy policies
Complying with mandated regulations
A healthcare provider is modernizing its data storage solutions to comply with health information privacy laws. The chief information security officer (CISO) must ensure that sending data access logs to healthcare regulatory authorities is in a specific format. What kind of reporting is taking place?
A.Internal compliance reporting B.External compliance reporting C.Data retention policy enforcement D.Privacy impact assessment
External compliance reporting
A tech startup has just suffered a data breach where sensitive customer financial data leaked. The chief executive officer (CEO) has an immediate concern about the tangible penalty the company will face due to violating data protection regulations. What is the CEO primarily concerned with in this situation?
A.Privacy policy updates B.Reputational damage C.Fines D.Security infrastructure overhaul
Fines
A company evaluates its security policies to prevent potential data leakage and malware infection through portable storage devices. Which action would MOST effectively reduce the risks associated with the unauthorized use of such devices?
A.Implementing a strict removable media policy B.Regularly updating the company's firewall settings C.Increasing the frequency of employee cybersecurity training D.Replacing all Ethernet cables with shielded versions
Implementing a strict removable media policy