CERTIFIED CYBER SECURITY PROFESSIONAL

Welcome to your CERTIFIED CYBER SECURITY PROFESSIONAL

1. Which of the following techniques MOST clearly indicates whether specific risk reduction controls should be implemented?

2. In the Open Systems Intercommunication (OSI) model, which protocol works at Layer 4?

3. Which protocol is used to connect to a secure web server?

4. Which one of the following elements of information is not considered personally identifiable information that would trigger most US state data breach laws?

5. In the Open Systems Intercommunication (OSI) model, which hardware works at Layer 3?

6. Angela is an information security architect at a bank and has been assigned to ensure that transactions are secure as they traverse the network. She recommends that all transactions use TLS. What threat is she most likely attempting to stop, and what method is she using to protect against it?

7. COBIT, Control Objectives for Information and Related Technology, is a framework for IT management and governance. Which data management role is most likely to select and apply COBIT to balance the need for security controls against business requirements?

8. What term is used to describe a starting point for a minimum security standard?

9. The primary goal of computer forensics is which of the following?

10. The need to protect sensitive data drives what administrative process?

11. Fran’s company is considering purchasing a web-based email service from a vendor and eliminating its own email server environment as a cost-saving measure. What type of cloud computing environment is Fran’s company considering?

12. Which one of the following refers to a series of characters used to verify a user's identity?

13. Sonia recently removed an encrypted hard drive from a laptop and moved it to a new device because of a hardware failure. She is having difficulty accessing encrypted content on the drive despite the fact that she knows the user’s password. What hardware security feature is likely causing this problem?

14. If Alice wishes to send Bob an encrypted message, what key does she use to encrypt the message?

Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority.

15. When Bob receives the encrypted message from Alice, what key does he use to decrypt the message?

Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority.

16. Which one of the following keys would Bob not possess in this scenario?

Alice and Bob would like to use an asymmetric cryptosystem to communicate with each other. They are located in different parts of the country but have exchanged encryption keys by using digital certificates signed by a mutually trusted certificate authority.

17. Alice would also like to digitally sign the message that she sends to Bob. What key should she use to create the digital signature?

18. What name is given to the random value added to a password in an attempt to defeat rainbow table attacks?

19. Ben has connected his laptop to his tablet PC using an 802.11g connection. What wireless network mode has he used to connect these devices?

20. What access control methodology facilitates frequent changes to data permissions for user groups?

21. What is the PRIMARY use of a password?

22. Gary is deploying a wireless network and wants to deploy the fastest possible wireless technology. Of the 802.11 standards listed below, which is the fastest 2.4 GHz option he has?

23. What applications are associated with each of the following TCP ports: 23, 25, and 143.

24. Attenuation is described as:

25. What network topology is shown in the image below?

26. Centralized authentication systems should provide which of the following services?

27. Under what conditions would use of a "Class C" hand-held fire extinguisher be preferable to use of a "Class A" hand-held fire extinguisher?

28. Voice pattern recognition is what type of authentication factor?

29. If Susan’s organization requires her to log in with her username, a PIN, a password, and a retina scan, how many distinct types of factor has she used?

30. Which of the following items are not commonly associated with restricted interfaces?

31. What major issue often results from decentralized access control?

32. What message logging standard is commonly used by network devices, Linux and Unix systems, and many other enterprise devices?

33. Jim has been contracted to perform a penetration test of a bank’s primary branch. In order to make the test as real as possible, he has not been given any information about the bank other than its name and address. What type of penetration test has Jim agreed to perform?

34. Which of the following statements is most accurate of digital signature?

35. What type of testing is used to ensure that separately developed software modules properly exchange data?

36. Key Clustering is defined as

37. Referring to the figure below, what technology is shown that provides fault tolerance for the database servers?

38. Joe is the security administrator for an ERP system. He is preparing to create accounts for several new employees. What default access should he give to all of the new employees as he creates the accounts?

39. Which one of the following is not a privileged administrative activity that should be automatically sent to a log of superuser actions?

40. Which one of the following individuals is most likely to lead a regulatory investigation?

41. An electrical device (AC or DC} which can generate coercive magnetic force for the purpose of reducing magnetic flux density to zero on storage media or other magnetic media is called:

42. Toni responds to the desk of a user who reports slow system activity. Upon checking outbound network connections from that system, Toni notices a large amount of social media traffic originating from the system. The user does not use social media, and when Toni checks the accounts in question, they contain strange messages that appear encrypted. What is the most likely cause of this traffic?

43. Which of the following is a common way that attackers leverage botnets?

44. Which one of the following statements is not true about code review?

45. The greatest risk to most organizations through portable computing is:

46. What is the first step in information protection?

47. When using the SDLC, which one of these steps should, you take before the others?

48. Which of the following defines the intent of a system security policy?

49. A signed user acknowledgment of the corporate security policy:

50. Which of the following backup processing alternatives describes a computing facility with telecommunications equipment, some systems, but minimal data?