- Compliance
- Operational
- Technical
- Managerial
Q: A paid subscriber of a news website has access to exclusive content.
As a data owner, what should the subscriber be authorized to do with their
account? Select three answers.
- Review their username and password
- Update their payment details
- Stop their subscription
- Edit articles on the website
Q: What do symmetric encryption algorithms use to encrypt and decrypt
information?
- A single secret key
- A hash value
- A public and private key pair
- A digital certificate
Q: A security analyst is investigating a critical system file that may
have been tampered with. How might the analyst verify the integrity of the
system file?
- By brute forcing the system file using a rainbow table.
- By comparing the system files hash value to a known, trusted hash value.
- By decrypting the system files secret key using Advanced Encryption Standard (AES).
- By opening the system file in word processing application and checking its version history.
Q: Which of the following steps are part of the public key
infrastructure process? Select two answers.
- Establish trust using digital certificates
- Transfer hash digests
- Exchange of public and private keys
- Exchange of encrypted information
Q: What factors do authentication systems use to verify a user’s
identity? Select three answers.
- Ownership
- Accounting
- Characteristic
- Knowledge
Q: A business has one person who receives money from customers at the
register. At the end of the day, another person counts that money that was
received against the items sold and deposits it. Which security principles are
being implemented into business operations? Select two answers.
- Least privilege
- Separation of duties
- Single sign-on
- Multi-factor authentication
Q: What is the purpose of security controls?
- Encrypt information for privacy
- Create policies and procedures
- Establish incident response systems
- Reduce specific security risks
Q: A large hotel chain collects customer email addresses as part of a
national sweepstakes. As data custodians, what are the hotel chain’s
responsibilities to protect this information? Select three answers.
- To safely handle the data when it’s accessed
- To securely transport the data over networks
- To protect the data while in storage
- To edit the data when necessary
Q: You send an email to a friend. The service provider of your inbox
encrypts all messages that you send. What happens to the information in your
email when it’s encrypted?
- It’s converted from plaintext to ciphertext.
- It’s converted from ciphertext to plaintext.
- It’s converted from Caesar’s cipher to plaintext.
- It’s converted from a hash value to ciphertext.
Q: Fill in the blank: A _____ is used to prove the identity of users,
companies, and networks in public key infrastructure.
- digital signature
- access token
- access key
- digital certificate
Q: What is an advantage of using single sign-on (SSO) systems to
authenticate users?
- It prevents credential stuffing attacks.
- Users lose access to multiple platforms when the system is down.
- It makes the login process faster.
- Users must set multiple passwords.
Q: What types of user information does an API token contain? Select two
answers.
- A user’s site permissions
- A user’s identity
- A user’s secret key
- A user’s password
Q: A customer of an online retailer has complained that their account
contains an unauthorized purchase. You investigate the incident by reviewing
the retailer’s access logs. Which component of the user’s session that you
might review?
- Session certificate
- Session algorithm
- Session API key
- Session cookie
Q: Which functions would fall under the category of operational
security controls? Select two answers.
- Establishing trust using digital certificates
- Providing security awareness training
- Exchanging encrypted information
- Responding to an incident alert
Q: An employee reports that they cannot log into the payroll system
with their access credentials. The employee does not recall changing their
username or password. As a security analyst, you are asked to review access
logs to investigate whether a breach occurred. What information are you able to
review as a data custodian in this situation? Select two answers.
- The IP address of the computer used to log in
- Any coworkers’ contact information
- Any payroll access credentials the user has stored on the server
- The time the user signed in and out
Q: How is hashing primarily used by security professionals?
- To store data in the cloud
- To make data quickly available
- To decrypt sensitive data
- To determine data integrity
Q: What is a disadvantage of using single sign-on (SSO) technology for
user authentication?
- Employees are more vulnerable to attack.
- Customers receive an improved user experience.
- Username and password management is streamlined.
- Stolen credentials can give attackers access to multiple resources.
Q: A shipping company imports and exports materials around the world.
Their business operations include purchasing goods from suppliers, receiving
shipments, and distributing goods to retailers. How should the shipping company
protect their assets under the principle of separation of duties? Select two
answers.
- Have one employee approve purchase orders
- Have one employee file purchase orders
- Have one employee receive shipments and distribute goods
- Have one employee select goods and submit payments
Q: What is the practice of monitoring the access logs of a system?
- Authorization
- Accounting
- Authentication
- Auditing
Explanation: When conducting an audit, it is necessary to examine and examine logs, records, and other data sources to keep track of actions and events that occur inside a system. It is possible to detect unwanted access attempts, identify security incidents, and ensure compliance with security rules and laws by using access logs, which offer a record of who accessed the system when they did so, and from where they did so.