Q: 1
[Governance, Risk, and Compliance (GRC)]
A security engineer is assisting a DevOps team that has the following requirements for container
images:
Ensure container images are hashed and use version controls.
Ensure container images are up to date and scanned for vulnerabilities.
Which of the following should the security engineer do to meet these requirements?
Options
Discussion
Option B. saw a similar question in a practice set. Fits what they're asking for on image controls and vulnerability checks.
I don’t think it’s C. B fits because adding security and quality checks to the CI/CD pipeline is how you actually get hashing, version control, and vulnerability scans done before deploying containers. C is more about ongoing monitoring.
B
If the requirement was just about auditing changes after deploy, would C be better?
Be respectful. No spam.
Q: 2
[Governance, Risk, and Compliance (GRC)]
An audit finding reveals that a legacy platform has not retained loos for more than 30 days The
platform has been segmented due to its interoperability with newer technology. As a
temporarysolution, the IT department changed the log retention to 120 days. Which of the following
should the security engineer do to ensure the logs are being properly retained?
Options
Discussion
C. SIEM is purpose-built for aggregating and retaining logs, so it aligns with GRC requirements here. Pretty sure that's what real audits expect. Agree?
Be respectful. No spam.
Q: 3
[Security Architecture]
A developer makes a small change to a resource allocation module on a popular social media
website and causes a memory leak. During a peak utilization period, several web servers crash,
causing the website to go offline. Which of the following testing techniques is the most efficient way
to prevent this from reoccurring?
Options
Discussion
Option C fits best. Regression testing specifically checks if new code changes break existing things, like memory handling. The memory leak could’ve been caught with good regression tests. Pretty sure that's what they're looking for here, but open to other thoughts.
C, Nice straightforward scenario, regression is the go-to here from what I remember reading in similar exam questions.
C vs A. Even though load testing can reveal some issues under heavy usage, it doesn't specifically catch bugs introduced by code changes like regression testing does. Regression tests are designed to flag problems like memory leaks after updates. So I think C is more efficient for preventing this exact scenario, unless I'm missing something.
Its C, regression. Had something like this pop up in a mock and it was definitely about catching bugs from recent changes, like memory leaks. Load or smoke testing won’t cover that specific module issue as directly.
Be respectful. No spam.
Q: 4
[Emerging Technologies and Threats]
Which of the following best explains the business requirement a healthcare provider fulfills by
encrypting patient data at rest?
Options
Discussion
D imo. Encrypting data at rest is all about protecting patient privacy even when records get moved or stored elsewhere. Healthcare needs both privacy and data portability, especially with HIPAA in play. Pretty sure that's what they're after here, right?
Be respectful. No spam.
Q: 5
[Emerging Technologies and Threats]
A security engineer wants to reduce the attack surface of a public-facing containerized application
Which of the following will best reduce the application's privilege escalation attack surface?
Options
Discussion
Feels like this is same as a common exam questions. on a practice exam, pretty sure it's A. Limiting the container to a non-root user cuts down privilege escalation risk. Anyone see it differently?
Its A, running containers as non-root limits privilege escalation. Pretty standard hardening step for Docker. Anyone see a catch here?
C or D here. Splitting remediation to separate containers (C) sounds like it'd limit compromise if one gets hit. Not totally sure if that blocks privilege escalation directly though. Anyone disagree?
A tbh, not super sure but looks like least privilege in Docker. Can someone confirm?
Be respectful. No spam.
Q: 6
[Governance, Risk, and Compliance (GRC)]
A compliance officer isfacilitating abusiness impact analysis (BIA)and wantsbusiness unit leadersto
collect meaningful dat
a. Several business unit leaders want more information about the types of data the officer needs.
Which of the following data types would be the most beneficial for the compliance officer?(Select
two)
Options
Discussion
C or F make sense. Saw a similar question in some exam reports.
C and F tbh, those are what a BIA really needs from business units. That's what I've seen in most practice stuff.
Be respectful. No spam.
Q: 7
[Security Architecture]
A senior security engineer flags the following log file snippet as having likely facilitated an attacker’s
lateral movement in a recent breach:
qry_source: 19.27.214.22 TCP/53
qry_dest: 199.105.22.13 TCP/53
qry_type: AXFR
| in comptia.org
------------ directoryserver1 A 10.80.8.10
------------directoryserver2 A 10.80.8.11
------------ directoryserver3 A 10.80.8.12
------------ internal-dns A 10.80.9.1
----------- www-int A 10.80.9.3
------------ fshare A 10.80.9.4
------------ sip A 10.80.9.5
------------ msn-crit-apcs A 10.81.22.33
Which of the following solutions, if implemented, would mitigate the risk of this issue reoccurring?
Options
Discussion
Option D Limiting DNS queries to internal clients should stop outside parties from getting this info, right?
D or B. Based on exam reports, internal-only DNS queries and restricting traffic to UDP/53 are both mentioned as fixes for DNS issues, so either might work. The official guide's security best practices chapter covers this scenario too.
Be respectful. No spam.
Q: 8
[Security Assessments and Testing]
During a vulnerability assessment, a scan reveals the following finding:
Windows Server 2016 Missing hotfix KB87728 - CVSS 3.1 Score: 8.1
[High] - Affected host 172.16.15.2
Later in the review process, the remediation team marks the finding as a false positive. Which of the
following is the best way toavoid this issue on future scans?
Options
Discussion
B but only if your scanner creds are up-to-date and have the right access! Otherwise it might still miss some stuff. Seen this trip people up on practice, pretty sure that's what flips the answer here.
Its B, seen similar on exam reports. Authenticated scans read patch info directly and avoid false positives like this.
Be respectful. No spam.
Q: 9
[Security Architecture]
Which of the following supports the process of collecting a large pool of behavioral observations to
inform decision-making?
Options
Discussion
Option C. since Big Data is what actually enables collecting massive behavioral datasets, not D unless you're processing them.
Probably C, since Big Data is all about gathering and storing massive behavioral datasets. D is tempting, but that's more about analysis.
Be respectful. No spam.
Q: 10
[Security Operations]
An organization found a significant vulnerability associated with a commonly used package in a
variety of operating systems. The organization develops a registry of software dependencies to
facilitate incident response activities. As part of the registry, the organization creates hashes of
packages that have been formally vetted. Which of the following attack vectors does this registry
address?
Options
Discussion
A. C is tempting but the registry with vetted hashes is really about stopping supply chain risk, not side channels.
Don't think it's B. Option C makes more sense to me here because side-channel analysis can look at how software interacts, and keeping hashes helps track changes. I saw similar advice in some official guides. Disagree?
I see why you'd think C but D looks closer to me since on-path attacks mess with data in transit, and verified hashes could catch tampering. Might be missing something here.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2