Is the question specifically asking about malware that encrypts files, or could it also include threats that just block access without encryption? That might change whether C or another option is right.
Q: 1
What type of malware is used to take hostage a user's data and require a ransom payment for release?
Options
Discussion
Option C saw a similar question in exam reports.
Be respectful. No spam.
Q: 2
Which of the following principles states that individuals should be held to a standard of doing what a
reasonable person would do under similar circumstances?
Options
Discussion
Maybe C. Had something like this on my last mock, pretty sure due care is tied to the "reasonable person" standard.
Be respectful. No spam.
Q: 3
While performing background checks on new employees, which of these can NEVER be an attribute for
discrimination?
Options
Discussion
Not D, C. Saw this exact one on my exam, political affiliation can't ever be used.
Be respectful. No spam.
Q: 4
Which are the components of an incident response plan?
Options
Discussion
B tbh, had something like this in a mock and that was the answer.
Option A but if containment isn't grouped with eradication and recovery (as some frameworks split them), could be misleading. Seen it bundled both ways.
Be respectful. No spam.
Q: 5
Which of the following documents outlines the specific step-by-step instructions to achieve a task or process?
Options
Discussion
Not A, it's D. Policies set the overall direction but procedures lay out the step-by-step actions. Saw similar wordings in practice exams.
D
Nice clear question, matches what I've seen in similar practice sets.
Be respectful. No spam.
Q: 6
What kind of attack is likely to occur when a hacker intercepts and redirects traffic by spoofing the IP
address of a corporate server?
Options
Discussion
Option A makes sense. Spoofing an IP to intercept and redirect traffic screams on-path attack (aka MITM). B is tempting if they mention ongoing access, but here it's all about interception. Anyone disagree or think spyware fits here? I'm pretty sure this lines up with ISC2 lingo from practice.
Its A, had something like this in a mock before. Redirecting traffic with IP spoofing is a textbook on-path attack.
Sounds like classic MITM using IP spoofing, which lines up with A. Official study guide covers this type of scenario. Anyone else seen it phrased differently on practice tests?
Be respectful. No spam.
Q: 7
Which of the following is a PRIMARY objective of implementing physical access controls in an
organization?
Options
Discussion
Rowan, pretty sure it's C. Physical access controls block unauthorized people from entering restricted areas, which helps protect sensitive data and assets. D doesn't make sense-organizations never want public access to sensitive zones. Correct me if I'm missing something.
C or D? Leaning C since it's about stopping outsiders from getting in, but not 100% sure.
Be respectful. No spam.
Q: 8
What cloud service provides the highest level of flexibility and customization for the organization?
Options
Discussion
Had something like this in a mock, it's A for sure. IaaS offers the most flexibility compared to PaaS and SaaS.
Probably A. IaaS lets you tailor the OS, networking, and storage the way you want, unlike PaaS or SaaS where most of that is managed for you. Seen similar in practice tests too. Not 100% but pretty sure.
Be respectful. No spam.
Q: 9
What is the PRIMARY purpose of encryption?
Options
Discussion
D imo, feels like C is a distraction since secure storage is a side benefit but not the core point of encryption.
A for sure. Encryption mainly keeps data confidential from unauthorized access, not about storing or analyzing it. That’s always been the main use case, though I guess C is tempting if you’re new to this.
Be respectful. No spam.
Q: 10
Which of these terms refers to threats with unusually high technical and operational sophistication,
spanning months or even years?
Options
Discussion
Probably A, that's what matches threats sustained over months or years with high sophistication.
B tbh, I've seen ping of death mentioned in some practice questions as a serious threat. Not sure if it fits the 'long-term sophistication' part though. Anyone else check the official guide or practice test for this one?
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2