Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

Cybersecurity-Architecture-and-Engineering Questions and Answers

Question # 6

Which software allows the user to easily access the hardware of a computer?

A.

Productivity

B.

FTP client

C.

Application

D.

Operating system

Full Access
Question # 7

An organization wants to implement a new encryption solution for a real-time video conferencing application. The organization wants to ensure that the encryption solution provides protection for the video stream without causing significant delays or latency in the conference.

Which type of encryption will meet the needs of the organization?

A.

Block ciphers

B.

Asymmetric encryption

C.

Stream ciphers

D.

Hash functions

Full Access
Question # 8

Which block cipher mode of operation for encrypting data is simple and efficient but provides no confidentiality beyond that of the underlying block cipher?

A.

Counter (CTR)

B.

Electronic Codebook (ECB)

C.

Output Feedback (OFB)

D.

Cipher Block Chaining (CBC)

Full Access
Question # 9

A healthcare organization would like to interoperate with another healthcare organization without needing to maintain individual accounts for members of the other organization.

Which technology concept should the company use?

A.

Single Sign-On (SSO)

B.

Federated Authentication

C.

Multi-Factor Authentication (MFA)

D.

Cloud Identity Provider

Full Access
Question # 10

Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?

A.

ChaCha

B.

Cipher Block Chaining (CBC)

C.

Counter (CTR)

D.

Electronic Codebook (ECB)

Full Access
Question # 11

What are two differences between a handheld computer and a desktop?

Choose 2 answers.

A.

A handheld has more memory.

B.

A desktop has more memory.

C.

A desktop has more internal storage.

D.

A handheld has more internal storage.

Full Access
Question # 12

In which type of network topology are the networked devices connected to a central device like a hub or switch?

A.

Star

B.

Bus

C.

Mesh

D.

Ring

Full Access
Question # 13

A security team is investigating multiple man-in-the-middle attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

What is the best solution?

A.

Disabling Wi-Fi connections

B.

Enforcing password history

C.

Encrypting data

D.

Ensuring all users have complex passwords

Full Access
Question # 14

A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.

Which step of the risk management life cycle involves implementing security controls to prevent the risk?

A.

Assess

B.

Identify

C.

Control

D.

Review

Full Access
Question # 15

Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?

A.

Rivest–Shamir–Adleman (RSA)

B.

Data Encryption Standard (DES)

C.

Advanced Encryption Standard (AES)

D.

Secure Hash Algorithm 256 (SHA-256)

Full Access
Question # 16

An organization wants to secure remote access to its servers and is looking for a secure protocol that can provide encryption and strong authentication. The organization wants to ensure that its servers can only be accessed by authorized users and that the data exchanged during the session is encrypted.

Which protocol meets the needs of the organization?

A.

Hypertext Transfer Protocol (HTTP)

B.

File Transfer Protocol (FTP)

C.

Telnet

D.

Secure Shell (SSH)

Full Access
Question # 17

A company has discovered a vulnerability in its domain name system (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

A.

Restricting DNS access to trusted internet protocol (IP) addresses only

B.

Implementing domain name system security extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks

C.

Increasing the frequency of DNS server patching

D.

Conducting regular security awareness training for employees on the risks of phishing attacks

Full Access
Question # 18

Which two benefits do computer networks provide for businesses?

Choose 2 answers

A.

Lower IT operations costs

B.

Improved information security

C.

Increased Internet communications speed

D.

Organization cost savings

E.

Increased business efficiency

Full Access
Question # 19

A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.

Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?

A.

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for industrial control systems (ICS)

B.

MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)

C.

Cyber kill chain

D.

Diamond Model of Intrusion Analysis

Full Access
Question # 20

A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device.

A.

Firewall

B.

Data Loss Prevention

C.

Intrusion Prevention System (IPS)

Full Access
Question # 21

A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data.

Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?

A.

Implementing security patches and updates on a regular basis and using hybrid cloud topology

B.

Installing antivirus software on all endpoints and using on-premises topology

C.

Creating strong password policies and enforcing multifactor authentication and using public cloud topology

D.

Conducting regular security audits and penetration testing and using private cloud topology

Full Access
Question # 22

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization's security posture?

A.

They act as an initial defense layer for potential threats

B.

They protect from severe distributed denial-of-service (DDoS) attacks

C.

They act as a security information and event management (SIEM) module for a security operations center (SOC) analyst

D.

They are a set of trusted platform module (TPM) devices

Full Access
Question # 23

Which motherboard component is used for short-term storage of data?

A.

Hard Drive

B.

BIOS

C.

Read Only Memory

D.

RAM

Full Access
Question # 24

Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?

A.

Configuration of the system to disable universal serial bus (USB) ports on all workstations

B.

Encryption of all network traffic between the EHR system and external networks

C.

Implementation of role-based access controls and encryption of all sensitive data

D.

Implementation of a strict firewall policy to restrict access to the system's server

Full Access
Question # 25

The development team has requested permission to use several open-source libraries to build a corporate web application.

Which resource can the security team recommend to ensure these libraries can be trusted?

A.

Agile software development

B.

Waterfall software development

C.

Common Vulnerabilities and Exposures (CVE)

D.

Continuous delivery

Full Access
Question # 26

A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.

Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?

A.

Data Protection Impact Assessment (DPIA)

B.

Business Continuity Planning (BCP)

C.

Risk Management

D.

Disaster Recovery (DR)

Full Access
Question # 27

An engineer has noticed increased network traffic originating from an unknown internet protocol (IP) address.

Which action should be taken to analyze the unusual network traffic patterns?

A.

Permanently block all incoming traffic from the unknown IP address

B.

Compare the unknown address to known IP addresses to determine if it is a threat

C.

Temporarily block all incoming traffic from the unknown IP address

D.

Rate limit incoming traffic from the unknown IP address

Full Access
Question # 28

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization’s security posture?

A.

They act as an initial defense layer for potential threats

B.

They are a set of Trusted Platform Module (TPM) devices

C.

They protect from severe Distributed Denial-of-Service (DDoS) attacks

D.

They act as a Security Information and Event Management (SIEM) module for a SOC analyst

Full Access
Question # 29

A software company is reviewing its disaster recovery plan and wants to identify the criticality of its business processes to prioritize its recovery efforts.

Which will determine the criticality of its business processes?

A.

Business continuity planning (BCP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Incident response (IR)

Full Access
Question # 30

A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server. Which strategy should be used to prevent an attacker from gaining unauthorized information?

A.

Obfuscating error messages on the site or within the Uniform Resource Locator (URL)

B.

Enabling Hypertext Transfer Protocol Secure (HTTPS) over Domain Name Service (DNS)

C.

Using HTTPS for all page and content requests

D.

Becoming PCI-DSS compliant and certified

Full Access
Question # 31

A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials.

Which security measure will meet the needs of this company?

A.

Implementing two-factor authentication

B.

Conducting background checks on employees

C.

Providing regular security awareness training to employees

D.

Installing a security information and event management (SIEM) system

Full Access
Question # 32

A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient health information. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.

Which protocol will meet the needs of this provider?

A.

Wired Equivalent Privacy (WEP)

B.

Simple Mail Transfer Protocol (SMTP)

C.

Rivest–Shamir–Adleman (RSA)

D.

Advanced Encryption Standard (AES)

Full Access
Question # 33

A large technology company has discovered a known vulnerability in its network infrastructure.The infrastructure contains a number of retired assets that are no longer receiving security updates, which could potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

A.

Conducting regular vulnerability scans to identify potential weaknesses

B.

Implementing intrusion detection and prevention systems (IDPS)

C.

Enforcing strict access control policies for all network devices

D.

Removing all end-of-life devices from the network

Full Access
Question # 34

A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.

Which logging mechanism will create an audit trail?

A.

NetFlow logs

B.

Access logs

C.

Packet capture logs

D.

Router logs

Full Access
Question # 35

How does application software differ from operating systems?

Choose 2 answers

A.

Application software includes system utilities that run on demand of the user.

B.

Application software consists of programs that end users run to accomplish business or personal tasks, such as e-mail.

C.

Application software includes word processors and spreadsheet software that are useful to end users.

D.

Application software supports the computer hardware system directly.

Full Access
Question # 36

An organization wants to ensure that its website is free of certain vulnerabilities before the final handoff to the client. What testing method should the organization use to inspect traffic and detect potential issues?

A.

HTTP interceptor

B.

Port scanner

C.

Bastion scanner

Full Access
Question # 37

A company is developing a new mobile application to support external customers and contractors. The application needs to allow users to sign in using third-party social identities.

What is the best protocol?

A.

Security Assertion Markup Language (SAML)

B.

Kerberos

C.

Lightweight Directory Access Protocol (LDAP)

D.

Open Authorization (OAuth)

Full Access
Question # 38

What is a common characteristic of a proprietary software license?

A.

A business gains the right to modify the software's source code.

B.

A business gains the right to use the software.

C.

A business gains the right to own the software.

D.

A business gains the right to distribute the software freely.

Full Access
Question # 39

What is the role of the CPU in a computing environment?

Choose 2 answers

A.

Carrying out the instructions of a computer program

B.

Storing data as it is being processed

C.

Directing electrical current over the circuit board

D.

Connecting components to the system unit

E.

Containing an arithmetic logic unit (ALU) that performs arithmetic and logic operations

Full Access
Question # 40

While undergoing a security audit, it is determined that an organization has several backup repositories nested in the cloud without any level of protection. Which action should be taken to protect the backup repositories first?

A.

Restrict access to the backups

B.

Run a vulnerability scan

C.

Disable the backup repositories

D.

Audit access logs

Full Access
Question # 41

An IT team has been tasked with improving an organization's security posture to defend against potential malicious actors.

What is the first step when hunting for potential threats?

A.

Deploy an anti-malware solution

B.

Implement an intrusion detection system

C.

Form an incident response team

D.

Establish a baseline for normal activity

Full Access
Question # 42

What is a component of IT infrastructure?

A.

Data

B.

People

C.

Networks

D.

Printer

Full Access
Question # 43

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.

Which action should be taken to resolve the issue?

A.

Shut down and remove the end-of-life machines

B.

Disconnect the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

Full Access
Question # 44

Which risk management strategy will ensure the secure storage of data on a new document management system?

A.

Incorporation of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to require frequent password changes

C.

Implementation of encryption for all data stored in the system

D.

Implementation of a secure Virtual Private Network (VPN) connection for all remote access to the system

Full Access
Question # 45

Which risk management strategy will help prevent cheating using a learning management system as a platform?

A.

Enforcement of a strict firewall policy to restrict access to the system's server

B.

Configuration of the system to disable all Bluetooth services on all workstations

C.

Implementation of secure user authentication protocols

D.

Implementation of regular software updates and patch management

Full Access
Question # 46

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment. Which action should be taken to resolve the issue?

A.

Disconnect the end-of-life machines

B.

Shutdown and remove the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

Full Access
Question # 47

A cloud service provider is concerned about the potential risks associated with hardware-based attacks on its virtual machines. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

A.

Conducting regular vulnerability assessments and penetration testing

B.

Disabling central processing unit (CPU) virtualization support

C.

Implementing a web application firewall to monitor incoming traffic

D.

Enforcing strict access control policies for all users

Full Access
Question # 48

A cybersecurity analyst at a manufacturing company is tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the organization. While viewing the security information and event management (SIEM), the analyst notices an unknown IP address logging on to the company's Secure Shell (SSH) server.

Which potential vulnerability is the manufacturing company facing?

A.

Exfiltration

B.

Unpatched software

C.

Enumeration

D.

Weak passwords

Full Access
Question # 49

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = 'Arizona';

A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona

Full Access
Question # 50

A company is looking to monitor and detect any suspicious activity on its servers. The company wants to implement a security solution that can detect any unauthorized access or unusual activity on the servers.

Which security technology will meet the needs of this company?

A.

Hardware security module (HSM)

B.

Two-factor authentication

C.

Antivirus tools

D.

Host-based intrusion detection system (HIDS)

Full Access
Question # 51

The security team has been tasked with selecting a password complexity policy for the organization.

Which password complexity policy option should be recommended?

A.

Twelve characters with no symbols or numbers

B.

Sixteen characters with at least one letter, one number, and one symbol

C.

Four characters with at least one letter or one number

D.

Eight characters with no symbols or numbers

Full Access
Question # 52

An organization's engineering team is developing a mobile application that uses near-field communication (NFC) capabilities but wants to ensure that information communicated using this protocol remains confidential.

A.

Kerberos centralized server for token and certificate management

B.

Bluetooth device honing restrictions for increased-risk transactions

C.

Portable device management (PDM) to allow only authorized protocols

D.

Encryption to prevent man-in-the-middle and eavesdropping attacks

Full Access
Question # 53

A government agency needs to deploy a secure network connection between its offices in Chicago and New York.

What should be used to facilitate this connection?

A.

Virtual private network (VPN)

B.

Security information and event management (SIEM)

C.

Point-to-Point Tunneling Protocol (PPTP)

D.

Network access control (NAC)

Full Access
Question # 54

An organization needs to securely exchange confidential documents with a third-party vendor overan unsecured network connection. The organization wants to ensure that the documents can only be read by the intended recipient and cannot be intercepted or read by unauthorized parties.

Which type of encryption meets the needs of the organization?

A.

Stream ciphers

B.

Asymmetric encryption

C.

Block ciphers

D.

Hash functions

Full Access
Question # 55

A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.

What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?

A.

Use two-factor authentication for external users

B.

Define strict firewall rules

C.

Constantly scan for known signatures on every machine

D.

Implement a configuration management solution

Full Access
Question # 56

Which method is frequently used to protect software?

A.

Trademarks

B.

GNU General Public License

C.

Copyrights

D.

Fair use

Full Access
Question # 57

Which item information should be stored in a database to determine an order total?

A.

Item order line

B.

Item unit price

C.

Item description

D.

Item restock levels

Full Access
Question # 58

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers’ volatile memory. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

A.

Implementing secure encrypted enclaves and AMD Secure Memory Encryption

B.

Enforcing a strong password complexity policy for all user accounts

C.

Implementing a next-generation antivirus system to detect and prevent malware attacks

D.

Conducting regular security awareness training for all employees

Full Access
Question # 59

A company has recently failed a security audit. Many of the end users have passwords older than 365 days.

Which password policy type will prevent this issue?

A.

Expiration

B.

Length

C.

Recovery

D.

Complexity

Full Access
Question # 60

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to disable all universal serial bus (USB) ports on all workstations

C.

Implementation of regular vulnerability scans and patch management

D.

Implementation of multifactor authentication for all user accounts

Full Access
Question # 61

An IT organization is deploying a new secure Simple Mail Transfer Protocol (SMTP) server to handle email communications for the company. The company must ensure that the servers are secure and protected from external threats. The SMTP servers should be able to communicate with the internal network and the internet, but all incoming and outgoing traffic should be inspected and filtered to prevent cyberattacks.

A.

Block Transmission Control Protocol (TCP) port 25 on the firewall

B.

Open Transmission Control Protocol (TCP) port 25 on the firewall

C.

Deploy a firewall in front of the SMTP servers

D.

Deploy the SMTP servers in a demilitarized zone (DMZ) between two firewalls

Full Access
Question # 62

A healthcare organization is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which regulates the privacy and security of personal health information. The organization uses simple network management protocol (SNMP) to manage and monitor its network devices.

Which security control will protect the confidentiality of network device information within this organization?

A.

Access controls

B.

Network segmentation

C.

Encryption

D.

Security monitoring

Full Access
Question # 63

Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?

A.

Secure Sockets Layer (SSL)

B.

Private Information Retrieval (PIR)

C.

Secure Function Evaluation (SFE)

D.

Homomorphic encryption

Full Access
Question # 64

A company wants to secure its computer systems and prevent any unauthorized access to its network. The company wants to implement a security solution that can restrict network traffic to only approved services and applications.

Which security technology will meet the needs of this company?

A.

Antivirus tools

B.

Two-factor authentication

C.

Host-based firewall

D.

Hardware security module (HSM)

Full Access
Question # 65

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company’s servers. Thecompany has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

A.

Enforcing strict access control policies for all users

B.

Implementing a host-based intrusion detection and prevention system

C.

Conducting regular security assessments and penetration testing

D.

Implementing shell restrictions

Full Access
Question # 66

Which type of services are Google Apps, Dropbox. and GoToMeeling?

A.

Infrastructure-as-a-Service (laaS)

B.

Security-as-a-Service (SECaaS)

C.

Platform-as-a-Service (PaaS)

D.

Software-as-a-Service (SaaS)

Full Access
Question # 67

Which database has multiple tables with interrelated fields?

A.

Interrelated

B.

Hierarchical

C.

Flat file

D.

Relational

Full Access
Question # 68

An IT organization has recently suffered multiple data breaches. The security operations center (SOC) team has been tasked with preventing future breaches by implementing user monitoring. The proposed solution must provide insights about unusual user behaviors from a variety of internal corporate resources.

A.

Secure Shell (SSH) Protocol

B.

Security information and event management (SIEM)

C.

Virtual private network (VPN)

D.

Web application firewall (WAF)

Full Access
Question # 69

Which risk management strategy will help defeat piracy efforts on a new patient management system?

A.

Configuration of the patient management system to disable all external device connections on all workstations

B.

Incorporation of end-to-end encryption for all patient data

C.

Implementation of regular virus scanning for all workstations

D.

Implementation of licensing technologies in order to restrict unauthorized access to the system

Full Access