Q: 1
Which risk management strategy will help prevent cheating using a learning management system as
a platform?
Options
Discussion
C tbh. Secure user authentication is key here because it stops students from logging in as someone else. MFA or strong passwords make impersonation way harder. Not 100% sure if that covers every angle but it’s the main control for cheating.
Be respectful. No spam.
Q: 2
A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities
including outdated software and weak password policies. The company also needs to implement a
new core banking system that can handle a large number of transactions while ensuring the security
of customer data.
Which risk mitigation process is the most effective approach to address these vulnerabilities, and
what is the best topology for the new core banking system?
Options
Discussion
Probably A, matches well with both the assessment findings and what core banking really needs for security and scalability. Clear scenario.
Be respectful. No spam.
Q: 3
A company has recently implemented a hybrid cloud deployment. The security team has been
notified about thousands of failed attempts to connect to routers and switches in the on-premises
network. A solution must be implemented to block connections after three unsuccessful SSH
attempts on any network device.
Which solution meets the requirements in this scenario?
Options
Discussion
C fits here. IPS can spot multiple failed SSH logins and take action like dropping/blocking the attempts automatically. Saw a similar question in some recent exam reports, so pretty sure C is it. Open to correction if I missed something.
Be respectful. No spam.
Q: 4
Which algorithm is suitable for ensuring the integrity of digital documents and detecting any
unauthorized modifications?
Options
Discussion
B
Hashing is the key for integrity here, not encryption. If the question mentioned digital signatures, then maybe RSA could be a contender, but as written it's definitely SHA-256.
Hashing is the key for integrity here, not encryption. If the question mentioned digital signatures, then maybe RSA could be a contender, but as written it's definitely SHA-256.
It’s B, SHA-256. Hash functions like SHA-256 are made exactly for checking integrity because they generate unique digests. Encryption (like DES or AES) protects confidentiality but doesn't verify if something changed. Pretty sure about this one, but open if anyone disagrees.
Be respectful. No spam.
Q: 5
An e-commerce company has recently experienced a data breach in which the personal and financial
information of its customers was stolen. The company is concerned about the potential for future
data breaches.
What is the most important factor to consider when evaluating the potential for future data breaches
in this scenario?
Options
Discussion
D vs B here. Both are key, but since the question is asking about the "potential" for future breaches, D (Likelihood) fits best-it's about how probable it is another incident happens. Official study guides and risk management practice questions explain this well if you want to review. Pretty sure on D but open if someone disagrees.
Be respectful. No spam.
Q: 6
A company is moving its applications to the cloud and is concerned about cyber security threats. The
security team has been tasked with providing a comprehensive view of how attackers gainaccess,
move through networks, and carry out attacks.
Which framework identifies the seven phases of an attack, from initial infiltration to post-
exploitation?
Options
Discussion
Its C. Cyber kill chain specifically breaks down attacks into seven stages from start to finish. MITRE ATT&CK lists techniques but doesn't use those phases, so it's a common trap option here. Are they asking for a phase-based model, or just for attack technique mapping? That would flip it.
Be respectful. No spam.
Q: 7
A company is developing a new system to process personal information about its customers,
including their names, addresses, and purchase histories.
Which term describes the process of identifying and evaluating the potential effects that the new
system may have on the privacy of personal information and developing strategies to mitigate those
risks?
Options
Discussion
C imo
Be respectful. No spam.
Q: 8
What is a component of IT infrastructure?
Options
Discussion
Probably C. Networks are actually a direct component of IT infrastructure, while people interact with it but aren't technically part of its architecture. The question's a bit tricky since people are crucial, but networks are the real infrastructure piece here. Seen similar wording in practice sets.
Its B. People are a big part of any IT operation since users and admins interact with the systems daily. I think they're considered a core part of the infrastructure because without people, nothing gets configured or maintained. Not totally sure though, maybe networks is more accurate officially. Anyone disagree?
Be respectful. No spam.
Q: 9
A company has discovered a vulnerability in its lightweight directory access protocol (LDAP)
implementation, which could potentially allow unauthorized access to sensitive information. The
company has decided to implement risk mitigation strategies to reduce the risk associated with this
vulnerability.
Which risk mitigation strategy will meet the needs of the company?
Options
Discussion
C tbh. IDPS can spot suspicious LDAP traffic and raise alerts for potential attacks, so it feels like a solid mitigation move if you want monitoring and rapid response. I think direct hardening (like D) is stronger, but based on the wording, C isn't a bad pick either. Open to pushback if I'm off.
C/D? If the question means the "most effective" way to address unauthorized LDAP access, D makes more sense, but if it's asking for the "first step" or something more general, C could also apply. Does it specify best or first?
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2