Q: 11
Which of the following is NOT an ethical canon of the ISC2?
Options
Discussion
B/C? Seen a similar question in some exam dumps and wasn't sure if "active and qualified" is actually part of the canons.
B
I'm a bit lost but pretty sure that's not the exact wording in the ISC2 canons. I remember it's more like "diligent and competent" for serving principals, not "active and qualified." Can anyone else confirm?
Be respectful. No spam.
Q: 12
What is the main purpose of an Acceptable Use Policy (AUP)?
Options
Discussion
Option A. The main purpose of an AUP is to set expectations for user behavior, not actively secure systems or just password guidelines. D is tempting but that's more about overall security policy, whereas AUPs focus on informing users what they can/can't do. I've seen similar in official practice-A fits best here.
Anyone else see this exact wording in the official practice or guide? Feels super similar to what I studied.
Be respectful. No spam.
Q: 13
Suppose that an organization wants to implement measures to strengthen its detective access controls.
Which one of these tools should they implement?
Options
Discussion
C imo, IDS fits the detective control role since it's about alerting on suspicious activity. Encryption is more for preventing access, not detecting events. Pretty sure C is what they're looking for here.
I don’t think B or D fit the detective category. C (IDS) is classic for monitoring and alerting on unauthorized access, which is exactly what a detective control does. D (Encryption) can prevent but won’t tell you about the breach. Anyone see a reason to pick D over C here? I’m pretty sure C is right.
C or D. Encryption feels right for protecting data but IDS (C) might be more about detection, not prevention.
Be respectful. No spam.
Q: 14
Which of these is the PRIMARY objective of the PCI-DSS standard?
Options
Discussion
Option D is right here. PCI-DSS is all about securing credit card transactions, nothing to do with PHI or PII.
D is right, but I can see some folks confusing it with B since PCI-DSS does handle cardholder data which overlaps a bit with PII. But the main focus really is credit card payments, not general personal info.
D imo, PCI-DSS is about credit card security only, not PII or PHI. Super common exam point.
Not A, it's D. PCI-DSS is written specifically to lock down credit card payment security, not general PII or health info. Seen this pop up on other practice exams too.
Not B or C, those cover personal or health info and are different standards (like HIPAA for PHI). D is right, PCI-DSS is only about securing credit card transactions. Seen similar wording in practice sets, pretty confident.
Its D, PCI-DSS is focused on protecting credit card payments not PII or PHI.
Be respectful. No spam.
Q: 15
Which category of cloud services does a ready-to-use email service fall into?
Options
Discussion
C tbh
Not B. C is the better fit. Ready-made email like Gmail is classic SaaS, since users just log in and use it, no platform or infra management required. PaaS is more development-focused. Let me know if I missed something.
C or D? I’m pretty sure it’s C since SaaS covers ready-made apps like email where you just use the software, no setup needed. PaaS is more for dev environments. Correct me if you think otherwise.
Maybe B. A ready-to-use email service feels like a platform because you don’t manage the servers, just the app itself. I usually think of PaaS for things hosted and managed but not quite pure software. Not totally sure so open to other ideas.
Be respectful. No spam.
Q: 16
In unified cloud storage, which solution can be used to separate access to patient records from
administrative data without moving servers into different networks?
Options
Discussion
Option B VLAN segmentation. Super clear scenario in the question, VLANs are great for logical separation in shared cloud setups.
B tbh, VLAN segmentation is made for this. Lets you split traffic and apply policies even if servers share the same physical network. I get what you mean about zero trust being more secure, but the question says "without moving servers into different networks," which points to VLANs over actual network isolation. Open to other thoughts if I'm missing something.
Yeah, I'm pretty sure it's B here. VLAN segmentation lets you logically split up access even if the servers are on the same physical network. Doesn’t need separate networks physically, so this fits best.
Had exactly this question on my exam, 100% B. VLAN segmentation lets you keep traffic apart without changing networks.
Be respectful. No spam.
Q: 17
What is the best technology for detecting unauthorized storage of sensitive data on hard drives?
Options
Discussion
DLP (A) is built for this-it scans drives for sensitive data at rest, not just network traffic. IDS and IPS focus more on network threats. Pretty sure A fits best here, but open if anyone disagrees.
I’d say A here. DLP tools scan storage for sensitive data, which is what the question wants, not IDS or IPS.
A DLP
For me, A. DLP is built for catching sensitive data at rest on drives, not IDS or IPS.
Be respectful. No spam.
Q: 18
In which of the following access control models can the creator of an object delegate permission?
Options
Discussion
Not D, it's C. DAC lets the owner assign permissions, while MAC is too restrictive and ABAC is attribute-driven not creator controlled.
Object creator delegation is classic DAC behavior so C fits here. MAC doesn't allow that kind of flexibility, and RBAC/ABAC are more about roles and attributes than ownership. Pretty sure it's C but open to debate.
D imo, but does the question mean "best suited for delegation" or just "can technically delegate"? If they're asking about actual owner control, that rules out MAC right away.
Be respectful. No spam.
Q: 19
Which of the following is NOT a feature of a cryptographic hash function?
Options
Discussion
C , since cryptographic hashes must be one-way, not reversible. That's a core property according to every exam prep source I've seen. Reversibility breaks the whole security model for hashes.
Not reversible, so C fits here.
C
Hash functions aren’t reversible, that’s kind of the whole point. Once data is hashed you can’t get the original input back. The other choices are all typical properties for a good hash function. Pretty sure it’s C.
Be respectful. No spam.
Q: 20
Which of the following is an example of a technical security control?
Options
Discussion
Official practice exams cover these control types, C.
Call it C, is it. Had something like this in a mock, CCTV uses tech to monitor access so it's a technical control. The others are policy or training, which are administrative. Pretty sure that's right but open to corrections.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2