1. Which option removes the risk of multitenancy in cloud computing?
2. Which option tests code while it is in operation?
3. During a penetration test, you find a file containing hashed passwords for the system you are attempting to breach. Which type of attack is most likely to succeed in accessing the hashed passwords in a reasonable amount of time?
4. You have configured audit settings in your organization's cloud services in the event of a security incident. What type of security control is an audit trail?
5. Two competing online retailers process credit card transactions for customers in countries on every continent. One organization is based in the United States. The other is based in the Netherlands. With which regulation must both countries comply while ensuring the security of these transactions?
6. An attacker has discovered that they can deduce a sensitive piece of confidential information by analyzing multiple pieces of less sensitive public data. What type of security issue exists?
7. You are a security analyst, and you receive a text message alerting you of a possible attack. Which security control is the least likely to produce this type of alert?
8. Which type of vulnerability cannot be discovered in the course of a typical vulnerability assessment?
9. The DLP project team is about to classify your organization's data. Whats is the primary purpose of classifying data?
10. Which list correctly describes risk management techniques?
11. Which type of program uses Windows Hooks to capture keystrokes typed by the user, hides in the process list, and can compromise their system as well as their online access codes and password?
12. Your computer has been infected, and is sending out traffic to a targeted system upon receiving a command from a botmaster. What condition is your computer currently in?
13. You choose a cybersecurity framework for your financial organization that implements an effective and auditable set of governance and management processes for IT. Which framework are you choosing?
14. NIST issued a revision to SP 800-37 in December 2018. It provides a disciplined, structured, and flexible process for managing security and privacy risk. Which type of document is SP 800-37?
15. Where would you record risks that have been identified and their details, such as their ID and name, classification of information, and the risk owner?
16. To prevent an incident from overwhelming resources, _ is necessary.
17. FUD is expensive and often causes high drama over low risk. Which computer chip exploits were reported by CNN as needing to be completely replaced, but were later fixed with firmware updates?
18. The ASD Top Four are application whitelisting, patching of applications, patching of operating systems, and limiting administrative privileges. What percent of breaches do these account for?
19. You are working in the security operations center analyzing traffic on your network. You detect what you believe to be a port scan. What does this mean?
20. How often is the ISF Standard of Good Practice updated?
21. Your incident response team is unable to contain an incident because they lack authority to take action without management approval. Which critical step in the preparation phase did your team skip?
22. NIST SP 800-53 is one of two important control frameworks used in cybersecurity. What is the other one?
23. Which organization, established by NIST in 1990, runs workshops to foster coordination in incident prevention, stimulate rapid reaction to incidents, and allow experts to share information?
24. You have implemented controls to mitigate the threats, vulnerabilities, and impact to your business. Which type of risk is left over?
25. There are four possible treatments once an assessment has identified a risk. Which risk treatment implements controls to reduce risk?
26. Which security control scheme do vendors often submit their products to for evaluation, to provide an independent view of product assurance?
27. Which organization has published the most comprehensive set of controls in its security guideline for the Internet of Things?
28. Which main reference coupled with the Cloud Security Alliance Guidance comprise the Security Guidance for Critical Areas of Focus in Cloud Computing?
29. What are the essential characteristics of the reference monitor?
30. According to NIST, what is the first action required to take advantage of the cybersecurity framework?
31. You are implementing a cybersecurity program in your organization and want to use the
32. In 2014, 4,278 IP addresses of zombie computers were used to flood a business with over one million packets per minute for about one hour. What is this type of attack called?
33. You have just conducted a port scan of a network. There is no well-known port active. How do you find a webserver running on a host, which uses a random port number?
34. Executives in your organization exchange emails with external business partners when negotiating valuable business contracts. To ensure that these communications are legally defensible, the security team has recommended that a digital signature be added to these message. What are the primary goals of the digital signature in this scenario? (Choose the best answer.)
35. Which software development lifecycle approach is most compatible with DevSecOps?
36. Which option describes a core principle of DevSecOps?
37. Which option is a framework widely utilized by organizations in the development of security governance standards?
38. You are responsible for forensic investigations in your organization.You have been tasked with investigating a compromised virtual application server. Becase a revenue generating application runs on the server, the server needs to be returned to service as quickly as possible. What is the next step you should take to best fulfill your responsibilities and meet the needs of the business?
39. Site-to-site VPN provides access from one network address space (192.168.0.0/24) to another network address space _.Site-to-site VPN provides access from one network address space (192.168.0.0/24) to another network address space _.
40. Which action is most likely to simplify security staff training, improve integration between security components, and reduce risk to the business? (Choose the best answer.)Which action is most likely to simplify security staff training, improve integration between security components, and reduce risk to the business? (Choose the best answer.)
Cyber Security MCQs | Topic-wise