Q: Fill in the blank: Security posture refers to an organization’s ability to react to change and manage its defense of _____ and critical assets.
- data
- domains
- consequences
- gaps
Q: Which of the following examples are key focus areas of the security and
risk management domain? Select three answers.
- Define security goals
- Follow legal regulations
- Maintain business continuity
- Conduct control testing
Q: How does business continuity enable an organization to maintain everyday
productivity?
- By ensuring return on investment
- By establishing risk disaster recovery plans
- By exploiting vulnerabilities
- By outlining faults to business policies
Q: Fill in the blank: According to the concept of shared responsibility,
employees can help lower risk to physical and virtual security by _____. Select
two answers.
- taking an active role
- meeting productivity goals
- recognizing and reporting security concerns
- limiting their communication with team members
Q: A security analyst ensures that employees are able to review only the
data they need to do their jobs. Which security domain does this scenario
relate to?
- Communication and network security
- Identity and access management
- Software development security
- Security assessment and testing
Q: Which of the following activities may be part of establishing security
controls? Select three answers.
- Implement multi-factor authentication
- Collect and analyze security data regularly
- Evaluate whether current controls help achieve business goals
- Monitor and record user requests
Q: When working in the software development security domain, which of the
following are tasks that security team members may complete during various
phases of the software development lifecycle? Select three answers.
- Initiating a secure design review
- Participating in incident investigations
- Performing penetration testing
- Conducting secure code reviews
Q: Which of the following statements accurately describe risk? Select all
that apply.
- If compromised, a medium-risk asset may cause some damage to an organization’s finances.
- Website content or published research data are examples of low-risk assets.
- Organizations often rate risks at different levels: low, medium, and high.
- If compromised, a high-risk asset is unlikely to cause financial damage.
Q: A business experiences an attack. As a result, a major news outlet
reports the attack, which creates bad press for the organization. What type of
consequence does this scenario describe?
- Loss of identity
- Increase in profits
- Lack of engagement
- Damage to reputation
Q: Fill in the blank: In the Risk Management Framework (RMF), the _____
step might involve implementing a plan to change password requirements in order
to reduce requests to reset employee passwords.
- implement
- categorize
- prepare
- authorize
Q: Fill in the blank: Security _____ refers to an organization’s ability to
manage its defense of critical assets and data, as well as its ability to react
to change.
- architecture
- hardening
- governance
- posture
Q: Which of the following examples are key focus areas of the security and
risk management domain? Select three answers.
- Store data properly
- Maintain business continuity
- Mitigate risk
- Follow legal regulations
Q: What term describes an organization’s ability to maintain its everyday
productivity by establishing risk disaster recovery plans?
- Recovery
- Business continuity
- Mitigation
- Daily defense
Q: A security analyst verifies users and monitors employees’ login
attempts. The goal is to keep the business’s assets secure. Which security
domain does this scenario describe?
- Communication and network security
- Security operations
- Security assessment and testing
- Identity and access management
Q: Fill in the blank: In the Risk Management Framework (RMF), the _____
step involves knowing how systems are operating and assessing whether or not
those systems support the organization’s security goals.
- monitor
- implement
- categorize
- authorize
Q: What security concept involves all individuals in an organization taking
an active role in reducing risk and maintaining security?
- Remote services
- Employee retention
- Secure coding
- Shared responsibility
Q: A security analyst is asked to conduct a security audit to identify
vulnerabilities. Which security domain is this task related to?
- Communication and network security
- Software development security
- Security assessment and testing
- Security architecture and engineering
Q: Fill in the blank: When working in the software development security
domain, security team members can use each phase of the software development
_____ to conduct security reviews and ensure that security can be fully
integrated into software products.
- operations
- sequencing
- lifecycle
- handling
Q: Which of the following statements accurately describe risk? Select all
that apply.
- Another way to think of risk is the likelihood of a threat occurring.
- If compromised, a low-risk asset would have a severe negative impact on an organization’s ongoing reputation.
- If compromised, a medium-risk asset may cause some damage to an organization’s ongoing operations.
- A high-risk asset is any information protected by regulations or laws.
Q: A business experiences an attack. As a result, its critical business
operations are interrupted and it faces regulatory fines. What type of
consequence does this scenario describe?
- Practical
- Reputation
- Identity
- Financial