ログイン

Conquest Book 1
100問 • 1年前
  • critical flaw
  • 通報

    問題一覧

  • 1

    With respect to risk management, which of the following options should be prioritized?

    The frequency of occurrence is low, and the expected impact value is high

  • 2

    Which of these is NOT a change management component?

    Governance

  • 3

    According to ISC2, which are the six phases of data handling?

    Create → Store → Use → Share → Archive → Destroy

  • 4

    Which of the following is NOT a feature of a cryptographic hash function?

    Reversible

  • 5

    Which of these tools is commonly used to crack passwords? (★)

    John the Ripper

  • 6

    Which concept describes an information security strategy that integrates people, technology and operations in order to establish security controls across multiple layers of the organization?

    Defense in Depth

  • 7

    Which tool is commonly used to sniff network traffic? (★)

    Wireshark

  • 8

    The predetermined set of instructions or procedures to sustain business operations after a disaster is commonly known as:

    Business Continuity Plan

  • 9

    Sensitivity is a measure of the …:

    … importance assigned to information by its owner, or the purpose of representing its need for protection

  • 10

    Which of the following cloud models allows access to fundamental computer resources? (★)

    IaaS

  • 11

    Which device is used to connect a LAN to the Internet?

    Router

  • 12

    When a company hires an insurance company to mitigate risk, which risk management technique is being applied?

    Risk transfer

  • 13

    Which of the following attacks take advantage of poor input validation in websites?

    Cross-Site Scripting

  • 14

    Which of the following is NOT an element of System Security Configuration Management?

    Audit logs

  • 15

    In order to find out whether personal tablet devices are allowed in the office, which of the following policies would be helpful to read?

    BYOD

  • 16

    An exploitable weakness or flaw in a system or component is a:

    Vulnerability

  • 17

    Which of these is the PRIMARY objective of a Disaster Recovery Plan?

    Restore company operation to the last-known reliable operation state

  • 18

    Which type of attack embeds malicious payload inside a reputable or trusted software?

    Trojans

  • 19

    In which of these activities are security posters PRIMARILY used? (★)

    Security Awareness

  • 20

    Which type of attack attempts to gain information by observing the device's power consumption? (★)

    Side Channels

  • 21

    A web server that accepts requests from external clients should be placed in which network?

    DMZ

  • 22

    How many layers does the OSI model have?

    7

  • 23

    In which cloud model does the cloud customer have LESS responsibility over the infrastructure? (★)

    SaaS

  • 24

    What type of security control is the biometric reader that grants access to the data center building?

    Physical Control

  • 25

    Which of these would be the best option if a network administrator needs to control access to a network?

    NAC

  • 26

    Which of the following is a public IP?

    13.16.123.1

  • 27

    Which of these has the PRIMARY objective of identifying and prioritizing critical business processes?

    Business Impact Analysis

  • 28

    Which access control is more effective at protecting a door against unauthorized access?

    Locks

  • 29

    Which of these is not an attack against an IP network?

    Side-channel Attack

  • 30

    Which devices have the PRIMARY objective of collecting and analyzing security events?

    SIEM

  • 31

    Which type of attack PRIMARILY aims to make a resource inaccessible to its intended users?

    Denial of Service

  • 32

    What is an effective way of hardening a system?

    Patch the system

  • 33

    Which of the following areas is connected to PII?

    Confidentiality

  • 34

    Which type of attack has the PRIMARY objective controlling the system from outside?

    Backdoors

  • 35

    Which access control model can grant access to a given object based on complex rules?

    ABAC

  • 36

    Which of the following properties is NOT guaranteed by Digital Signatures?

    Confidentiality

  • 37

    Which devices would be more effective in detecting an intrusion into a network?

    NIDS

  • 38

    The address 8be2:4382:8d84:7ce2:ec0f:3908:d29a:903a is an:

    IPv6 address

  • 39

    In incident terminology, the meaning of Zero Day is:

    A previously unknown system vulnerability

  • 40

    Which of the following is LESS likely to be part of an Incident Response Team (IRT)?

    Human Resources

  • 41

    A best practice of patch management is to:

    Test patches before applying them

  • 42

    Which of the following principles aims primarily at fraud detection?

    Separation of Duties

  • 43

    After an earthquake disrupting business operations, which document contains the procedures required to return business to normal operation?

    The Disaster Recovery Plan

  • 44

    If there is no time constraint, which protocol should be employed to establish a reliable connection between two devices?

    TCP

  • 45

    Which of the following is NOT a protocol of the OSI Level 3?

    SNMP

  • 46

    Which of the following is a detection control?

    Smoke sensors

  • 47

    Which regulations address data protection and privacy in Europe?

    GDPR

  • 48

    Which of these is the most efficient and effective way to test a business continuity plan?

    Simulations

  • 49

    Governments can impose financial penalties as a consequence of breaking a:

    Regulation

  • 50

    An entity that acts to exploit a target organization’s system vulnerabilities is a:

    Threat Actor

  • 51

    In which of the following access control models can the creator of an object delegate permission?

    DAC

  • 52

    The magnitude of the harm expected as a result of the consequences of an unauthorized disclosure, modification, destruction, or loss of information, is known as the:

    Impact

  • 53

    Which of the following is NOT an example of a physical security control?

    Firewalls

  • 54

    Which of the following is an example of an administrative security control?

    Acceptable Use Policies

  • 55

    Which of the following is a data handling policy procedure?

    Destroy

  • 56

    What does SIEM mean?

    Security Information and Event Manager

  • 57

    Which cloud deployment model is suited to companies with similar needs and concerns?

    Community cloud

  • 58

    Which access control model specifies access to an object based on the subject's role in the organization?

    RBAC

  • 59

    The Bell and LaPadula access control model is a form of: (★)

    MAC

  • 60

    In the event of a disaster, which of these should be the PRIMARY objective? (★)

    Guarantee the safety of people

  • 61

    Which of the following is an example of 2FA?

    One-Time passwords (OTA)

  • 62

    The implementation of Security Controls is a form of:

    Risk reduction

  • 63

    Which of the following is NOT a possible model for an Incident Response Team (IRT)?

    Pre-existing

  • 64

    Which protocol uses a three-way handshake to establish a reliable connection?

    TCP

  • 65

    In Change Management, which component addresses the procedures needed to undo changes?

    Rollback

  • 66

    Which of the following documents contains elements that are NOT mandatory?

    Guidelines

  • 67

    Which type of attack has the PRIMARY objective of encrypting devices and their data, and then demanding a ransom payment for the decryption key?

    Ransomware

  • 68

    The last phase in the data security cycle is:

    Destruction

  • 69

    Which security principle states that a user should only have the necessary permission to execute a task?

    Least Privilege

  • 70

    The process that ensures that system changes do not adversely impact business operations is known as:

    Change Management

  • 71

    Malicious emails that aim to attack company executives are an example of:

    Whaling

  • 72

    Which type of attack will most effectively provide privileged access (root access in Unix/Linux platforms) to a computer while hiding its presence?

    Rootkits

  • 73

    Which of the following areas is the most distinctive property of PHI?

    Confidentiality

  • 74

    Risk Management is:

    The identification, evaluation and prioritization of risks

  • 75

    Which of the following is NOT a social engineering technique? (★)

    Segregation

  • 76

    A device found not to comply with the security baseline should be:

    Disabled or isolated into a quarantine area until it can be checked and updated

  • 77

    A security safeguard is the same as a:

    Security control

  • 78

    Which of the following types of devices inspect packet header information to either allow or deny network traffic?

    Firewalls

  • 79

    The process of verifying or proving the user's identification is known as:

    Authentication

  • 80

    How many data labels are considered manageable?

    2 – 3

  • 81

    In which of the following phases of an Incident Recovery Plan are incident responses prioritized?

    Detection and Analysis

  • 82

    Which are the three packets used on the TCP connection handshake? (★)

    SYN → SYN/ACK → ACK

  • 83

    Which of the following is NOT an ethical canon of the ISC2?

    Provide active and qualified service to principal

  • 84

    The cloud deployment model where a company has resources on-premise and in the cloud is known as:

    Hybrid cloud

  • 85

    What is the consequence of a Denial of Service attack?

    Exhaustion of device resources

  • 86

    The detailed steps to complete tasks supporting departmental or organizational policies are typically documented in:

    Procedures

  • 87

    Which of the following is NOT a type of learning activity used in Security Awareness?

    Tutorial

  • 88

    Which type of attack attempts to trick the user into revealing personal information by sending a fraudulent message?

    Phishing

  • 89

    Which of the following canons is found in the ISC2 code of ethics?

    Provide diligent and competent service to principals

  • 90

    Which physical access control would be MOST effective against tailgating?

    Turnstiles

  • 91

    The SMTP protocol operates at OSI Level:

    7

  • 92

    Which type of key can be used to both encrypt and decrypt the same message?

    A symmetric key

  • 93

    Which port is used to secure communication over the web (HTTPS)?

    443

  • 94

    Which of these types of user is LESS likely to have a privileged account?

    External Worker

  • 95

    Logging and monitoring systems are essential to:

    Identifying inefficient performing systems, detecting compromises, and providing a record of how systems are used

  • 96

    According to the canon "Provide diligent and competent service to principals", ISC2 professionals are to:

    Avoid apparent or actual conflicts of interest

  • 97

    Which of the following is an example of a technical security control?

    Access control lists

  • 98

    Which are the components of an incident response plan?

    Preparation → Detection and Analysis → Containment, Eradication and Recovery → Post-Incident Activity

  • 99

    Which of the following Cybersecurity concepts guarantees that information is accessible only to those authorized to access it?

    Confidentiality

  • 100

    Which of the following are NOT types of security controls?

    Storage controls

  • xj9 - 19628 - a

    xj9 - 19628 - a

    critical flaw · 98問 · 2年前

    xj9 - 19628 - a

    xj9 - 19628 - a

    98問 • 2年前
    critical flaw

    xj9 - 19628 - b

    xj9 - 19628 - b

    critical flaw · 30問 · 2年前

    xj9 - 19628 - b

    xj9 - 19628 - b

    30問 • 2年前
    critical flaw

    xj9 - 19628 - c

    xj9 - 19628 - c

    critical flaw · 99問 · 1年前

    xj9 - 19628 - c

    xj9 - 19628 - c

    99問 • 1年前
    critical flaw

    xj9 - 19628 - d1

    xj9 - 19628 - d1

    critical flaw · 99問 · 1年前

    xj9 - 19628 - d1

    xj9 - 19628 - d1

    99問 • 1年前
    critical flaw

    xj9 - 19628 - d2

    xj9 - 19628 - d2

    critical flaw · 98問 · 1年前

    xj9 - 19628 - d2

    xj9 - 19628 - d2

    98問 • 1年前
    critical flaw

    1. Shattershot

    1. Shattershot

    critical flaw · 50問 · 1年前

    1. Shattershot

    1. Shattershot

    50問 • 1年前
    critical flaw

    k3ch - 2910116 - D1 - A

    k3ch - 2910116 - D1 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D1 - A

    k3ch - 2910116 - D1 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D1 - B

    k3ch - 2910116 - D1 - B

    critical flaw · 65問 · 1年前

    k3ch - 2910116 - D1 - B

    k3ch - 2910116 - D1 - B

    65問 • 1年前
    critical flaw

    k3ch - 2910116 - D2 - A

    k3ch - 2910116 - D2 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D2 - A

    k3ch - 2910116 - D2 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D2 - B

    k3ch - 2910116 - D2 - B

    critical flaw · 55問 · 1年前

    k3ch - 2910116 - D2 - B

    k3ch - 2910116 - D2 - B

    55問 • 1年前
    critical flaw

    k3ch - 2910116 - D3 - A

    k3ch - 2910116 - D3 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D3 - A

    k3ch - 2910116 - D3 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D3 - B

    k3ch - 2910116 - D3 - B

    critical flaw · 63問 · 1年前

    k3ch - 2910116 - D3 - B

    k3ch - 2910116 - D3 - B

    63問 • 1年前
    critical flaw

    k3ch - 2910116 - D4 - A

    k3ch - 2910116 - D4 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D4 - A

    k3ch - 2910116 - D4 - A

    100問 • 1年前
    critical flaw

    1. X-Tinction Agenda

    1. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    1. X-Tinction Agenda

    1. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    2. X-Tinction Agenda

    2. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    2. X-Tinction Agenda

    2. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    3. X-Tinction Agenda

    3. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    3. X-Tinction Agenda

    3. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    4. X-Tinction Agenda

    4. X-Tinction Agenda

    critical flaw · 90問 · 1年前

    4. X-Tinction Agenda

    4. X-Tinction Agenda

    90問 • 1年前
    critical flaw

    Executioner's Song Book 1

    Executioner's Song Book 1

    critical flaw · 30問 · 1年前

    Executioner's Song Book 1

    Executioner's Song Book 1

    30問 • 1年前
    critical flaw

    問題一覧

  • 1

    With respect to risk management, which of the following options should be prioritized?

    The frequency of occurrence is low, and the expected impact value is high

  • 2

    Which of these is NOT a change management component?

    Governance

  • 3

    According to ISC2, which are the six phases of data handling?

    Create → Store → Use → Share → Archive → Destroy

  • 4

    Which of the following is NOT a feature of a cryptographic hash function?

    Reversible

  • 5

    Which of these tools is commonly used to crack passwords? (★)

    John the Ripper

  • 6

    Which concept describes an information security strategy that integrates people, technology and operations in order to establish security controls across multiple layers of the organization?

    Defense in Depth

  • 7

    Which tool is commonly used to sniff network traffic? (★)

    Wireshark

  • 8

    The predetermined set of instructions or procedures to sustain business operations after a disaster is commonly known as:

    Business Continuity Plan

  • 9

    Sensitivity is a measure of the …:

    … importance assigned to information by its owner, or the purpose of representing its need for protection

  • 10

    Which of the following cloud models allows access to fundamental computer resources? (★)

    IaaS

  • 11

    Which device is used to connect a LAN to the Internet?

    Router

  • 12

    When a company hires an insurance company to mitigate risk, which risk management technique is being applied?

    Risk transfer

  • 13

    Which of the following attacks take advantage of poor input validation in websites?

    Cross-Site Scripting

  • 14

    Which of the following is NOT an element of System Security Configuration Management?

    Audit logs

  • 15

    In order to find out whether personal tablet devices are allowed in the office, which of the following policies would be helpful to read?

    BYOD

  • 16

    An exploitable weakness or flaw in a system or component is a:

    Vulnerability

  • 17

    Which of these is the PRIMARY objective of a Disaster Recovery Plan?

    Restore company operation to the last-known reliable operation state

  • 18

    Which type of attack embeds malicious payload inside a reputable or trusted software?

    Trojans

  • 19

    In which of these activities are security posters PRIMARILY used? (★)

    Security Awareness

  • 20

    Which type of attack attempts to gain information by observing the device's power consumption? (★)

    Side Channels

  • 21

    A web server that accepts requests from external clients should be placed in which network?

    DMZ

  • 22

    How many layers does the OSI model have?

    7

  • 23

    In which cloud model does the cloud customer have LESS responsibility over the infrastructure? (★)

    SaaS

  • 24

    What type of security control is the biometric reader that grants access to the data center building?

    Physical Control

  • 25

    Which of these would be the best option if a network administrator needs to control access to a network?

    NAC

  • 26

    Which of the following is a public IP?

    13.16.123.1

  • 27

    Which of these has the PRIMARY objective of identifying and prioritizing critical business processes?

    Business Impact Analysis

  • 28

    Which access control is more effective at protecting a door against unauthorized access?

    Locks

  • 29

    Which of these is not an attack against an IP network?

    Side-channel Attack

  • 30

    Which devices have the PRIMARY objective of collecting and analyzing security events?

    SIEM

  • 31

    Which type of attack PRIMARILY aims to make a resource inaccessible to its intended users?

    Denial of Service

  • 32

    What is an effective way of hardening a system?

    Patch the system

  • 33

    Which of the following areas is connected to PII?

    Confidentiality

  • 34

    Which type of attack has the PRIMARY objective controlling the system from outside?

    Backdoors

  • 35

    Which access control model can grant access to a given object based on complex rules?

    ABAC

  • 36

    Which of the following properties is NOT guaranteed by Digital Signatures?

    Confidentiality

  • 37

    Which devices would be more effective in detecting an intrusion into a network?

    NIDS

  • 38

    The address 8be2:4382:8d84:7ce2:ec0f:3908:d29a:903a is an:

    IPv6 address

  • 39

    In incident terminology, the meaning of Zero Day is:

    A previously unknown system vulnerability

  • 40

    Which of the following is LESS likely to be part of an Incident Response Team (IRT)?

    Human Resources

  • 41

    A best practice of patch management is to:

    Test patches before applying them

  • 42

    Which of the following principles aims primarily at fraud detection?

    Separation of Duties

  • 43

    After an earthquake disrupting business operations, which document contains the procedures required to return business to normal operation?

    The Disaster Recovery Plan

  • 44

    If there is no time constraint, which protocol should be employed to establish a reliable connection between two devices?

    TCP

  • 45

    Which of the following is NOT a protocol of the OSI Level 3?

    SNMP

  • 46

    Which of the following is a detection control?

    Smoke sensors

  • 47

    Which regulations address data protection and privacy in Europe?

    GDPR

  • 48

    Which of these is the most efficient and effective way to test a business continuity plan?

    Simulations

  • 49

    Governments can impose financial penalties as a consequence of breaking a:

    Regulation

  • 50

    An entity that acts to exploit a target organization’s system vulnerabilities is a:

    Threat Actor

  • 51

    In which of the following access control models can the creator of an object delegate permission?

    DAC

  • 52

    The magnitude of the harm expected as a result of the consequences of an unauthorized disclosure, modification, destruction, or loss of information, is known as the:

    Impact

  • 53

    Which of the following is NOT an example of a physical security control?

    Firewalls

  • 54

    Which of the following is an example of an administrative security control?

    Acceptable Use Policies

  • 55

    Which of the following is a data handling policy procedure?

    Destroy

  • 56

    What does SIEM mean?

    Security Information and Event Manager

  • 57

    Which cloud deployment model is suited to companies with similar needs and concerns?

    Community cloud

  • 58

    Which access control model specifies access to an object based on the subject's role in the organization?

    RBAC

  • 59

    The Bell and LaPadula access control model is a form of: (★)

    MAC

  • 60

    In the event of a disaster, which of these should be the PRIMARY objective? (★)

    Guarantee the safety of people

  • 61

    Which of the following is an example of 2FA?

    One-Time passwords (OTA)

  • 62

    The implementation of Security Controls is a form of:

    Risk reduction

  • 63

    Which of the following is NOT a possible model for an Incident Response Team (IRT)?

    Pre-existing

  • 64

    Which protocol uses a three-way handshake to establish a reliable connection?

    TCP

  • 65

    In Change Management, which component addresses the procedures needed to undo changes?

    Rollback

  • 66

    Which of the following documents contains elements that are NOT mandatory?

    Guidelines

  • 67

    Which type of attack has the PRIMARY objective of encrypting devices and their data, and then demanding a ransom payment for the decryption key?

    Ransomware

  • 68

    The last phase in the data security cycle is:

    Destruction

  • 69

    Which security principle states that a user should only have the necessary permission to execute a task?

    Least Privilege

  • 70

    The process that ensures that system changes do not adversely impact business operations is known as:

    Change Management

  • 71

    Malicious emails that aim to attack company executives are an example of:

    Whaling

  • 72

    Which type of attack will most effectively provide privileged access (root access in Unix/Linux platforms) to a computer while hiding its presence?

    Rootkits

  • 73

    Which of the following areas is the most distinctive property of PHI?

    Confidentiality

  • 74

    Risk Management is:

    The identification, evaluation and prioritization of risks

  • 75

    Which of the following is NOT a social engineering technique? (★)

    Segregation

  • 76

    A device found not to comply with the security baseline should be:

    Disabled or isolated into a quarantine area until it can be checked and updated

  • 77

    A security safeguard is the same as a:

    Security control

  • 78

    Which of the following types of devices inspect packet header information to either allow or deny network traffic?

    Firewalls

  • 79

    The process of verifying or proving the user's identification is known as:

    Authentication

  • 80

    How many data labels are considered manageable?

    2 – 3

  • 81

    In which of the following phases of an Incident Recovery Plan are incident responses prioritized?

    Detection and Analysis

  • 82

    Which are the three packets used on the TCP connection handshake? (★)

    SYN → SYN/ACK → ACK

  • 83

    Which of the following is NOT an ethical canon of the ISC2?

    Provide active and qualified service to principal

  • 84

    The cloud deployment model where a company has resources on-premise and in the cloud is known as:

    Hybrid cloud

  • 85

    What is the consequence of a Denial of Service attack?

    Exhaustion of device resources

  • 86

    The detailed steps to complete tasks supporting departmental or organizational policies are typically documented in:

    Procedures

  • 87

    Which of the following is NOT a type of learning activity used in Security Awareness?

    Tutorial

  • 88

    Which type of attack attempts to trick the user into revealing personal information by sending a fraudulent message?

    Phishing

  • 89

    Which of the following canons is found in the ISC2 code of ethics?

    Provide diligent and competent service to principals

  • 90

    Which physical access control would be MOST effective against tailgating?

    Turnstiles

  • 91

    The SMTP protocol operates at OSI Level:

    7

  • 92

    Which type of key can be used to both encrypt and decrypt the same message?

    A symmetric key

  • 93

    Which port is used to secure communication over the web (HTTPS)?

    443

  • 94

    Which of these types of user is LESS likely to have a privileged account?

    External Worker

  • 95

    Logging and monitoring systems are essential to:

    Identifying inefficient performing systems, detecting compromises, and providing a record of how systems are used

  • 96

    According to the canon "Provide diligent and competent service to principals", ISC2 professionals are to:

    Avoid apparent or actual conflicts of interest

  • 97

    Which of the following is an example of a technical security control?

    Access control lists

  • 98

    Which are the components of an incident response plan?

    Preparation → Detection and Analysis → Containment, Eradication and Recovery → Post-Incident Activity

  • 99

    Which of the following Cybersecurity concepts guarantees that information is accessible only to those authorized to access it?

    Confidentiality

  • 100

    Which of the following are NOT types of security controls?

    Storage controls