Domain 1 Questions Answers
Domain 1 Questions Answers
A directive control enforces a rule of behavior, such as a policy, best practice standard,
or standard operating procedure (SOP).
The company typically implements modern access control as an identity and access
management (IAM) system. The company would want to implement an IAM system to
ensure the proper creation of accounts and their associated permissions.
With confidentiality, integrity, and availability, also known as the CIA Triad, confidentiality
means that only people with explicit authorization to access the information can read it.
This type of authority involves setting permissions for files and folders.
The CISO would be preparing a gap analysis report. This report will show the defects in
the company’s current security posture against the NIST Cybersecurity Framework (or
any other baseline security framework).
5. After restoring a file from a backup, the owner of a small company wants to better
understand the purpose of permissions. A particular situation occurred, and even
though there are permissions on the shared drive, why does the company still not
know who deleted the file? The engineer explained that enabling file auditing
would help pinpoint all changes to the shared drive and who made them. How
would this help prevent the lack of knowing who changed the files?
A. Confidentiality
B. Non-remediation
C. Non-repudiation
D. Availability
Physical controls such as alarms, gateways, locks, lighting, and security cameras deter
and detect access to premises.
7. A newly hired chief information security officer (CISO) met with the human
resources (HR) department to discuss how to better manage the company’s
access to sensitive information. In what way does this meeting fall under the
responsibility of the new CISO?
A. Monitoring audit logs
B. Reviewing user permissions
C. Documenting access controls
D. Managing security-related incident response
Working with human resources to ensure the proper user permissions for their given
role falls under the security aspect of the chief information security officer.
8. After a company hires a new chief information security officer (CISO), the chief
executive officer (CEO) requests the CISO to hire staff for the new team. The
purview of the team will be for monitoring and protecting critical information
assets throughout the company. What BEST describes the location of this new
team within the structure of the company?
A. SOC
B. NOC
C. Help desk
D. MSP
10. What component of modern access controls determines what rights subjects
should have on each resource?
A. Authentication
B. Authorization
C. Identification
D. Accounting
Authorization refers to determining what rights subjects should have on each resource
and enforcing those rights. Authorization may involve permissions, individually, group,
or role-based.
11. After a server outage due to a security breach, a company has taken several
steps to recover from the incident. They have restored critical data from the latest
backups and applied urgent security patches to address the exploited
vulnerabilities. The security team has updated the incident response plan to
incorporate lessons learned from the breach. What category of security control
functional type BEST describes the function of these recent implementations?
A. Corrective
B. Preventive
C. Detective
D. Operational
The chief information security officer (CISO) is the title of the individual responsible for
managing security teams or departments within a company.
14. An accountant received a phone call from an individual requesting information for
an ongoing project. The individual stated to be from a known vendor the
company is working with. Before giving the information over, the accountant
should protect against what?
A. Typosquatting
B. Impersonation
C. Watering hole attack
D. Consensus technique
Coercion or the use of urgency refers to the intimidation of the target with a bogus
appeal to authority or penalty, such as getting fired or not acting quickly enough to
prevent some dire outcome.
16. A construction contractor received a phone call from a prospective client that the
contractor's website looked off from what they expected. After an investigation,
the construction company discovered that the prospect visited a similar-looking
website with a slightly different URL. What caused the client to go to an incorrect
website?
A. Phishing
B. Impersonation
C. Watering hole attack
D. Typosquatting
Typosquatting means that the threat actor registers a domain name very similar to a real
one, hoping that users will not notice the difference and assume they are browsing a
trusted site.
17. An accountant received a phone call from an individual requesting information for
an ongoing project. The call came from an unrecognized number, but the
individual seemed believable and persuasive. Before giving the information over,
what should the accountant protect against?
A. Social engineering
B. Coercion
C. Typosquatting
D. Brand impersonation
Social engineering refers to eliciting information from users or getting them to perform
some action for the threat actor.
18. A large organization’s security operations center (SOC) noticed in its Extended
Detection and Response (XDR) antivirus software that a phished email gained
access to the company ticketing system, then to the virtual private network (VPN)
software, and lastly, to the company’s file share. What did the SOC find?
A. Threat actor
B. Hacktivist
C. Threat vector
D. Service disruption
A threat vector is the path that a threat actor uses to execute a data exfiltration, service
disruption, or disinformation attack. Sophisticated threat actors will make use of multiple
vectors.
19. A recently terminated employee copied sensitive information from the company’s
shared drive right before permanently leaving. This employee is what kind of
threat to the company?
A. External
B. Nation-state
C. Hacktivist
D. Internal
20. A construction company that receives several emails with attachments from its
vendors ran into an issue with one of the emails it received. A malicious actor
created an email with an attachment that appeared to be from a known vendor.
As a result, the malicious actor tricked an employee into clicking on that
attachment. How did the malicious actor convince the employee to click on the
attachment?
A. The actor used an email lure.
B. The actor used a physical lure.
C. The actor offered help to improve employee workflow.
D. The actor exploited an outdated email encryption protocol.
Sending out an email with an attachment with similar wording as a company would
expect is an excellent way to get people to click them accidentally. Adding additional
content to the email can help add legitimacy to the malicious attachment.
21. An employee unknowingly clicked on a malicious attachment but did not notice
any issues right away and assumed nothing happened. A short while later, the
security operations center received a notification of a virus attempting to access
an IP address outside the company. What is the malicious attachment MOST
likely doing?
A. Attempting to disable a remote connection
B. Attempting to create a local connection
C. Attempting to disable a local connection
D. Attempting to create a remote connection
22. An information technology (IT) manager is trying to persuade the chief financial
officer (CFO) to sign off on a new support and update contract for the company’s
virtualized environment. The CFO sees this as a waste of money since the
company already has the environment up and running. The IT manager
explained to the CFO that the company will no longer receive security updates to
protect the environment. What describes the level of hazard posed by NOT
keeping the systems up-to-date?
A. Vulnerability
B. Threat
C. Risk
D. Insider threat
Risk is the level of hazard posed by vulnerabilities and threats. When a company
identifies a vulnerability, it calculates the risk as the likelihood of exploitation by a threat
actor and the impact of a successful exploitation.
23. A large multimedia company is in the process of creating a new marketing
campaign for a soon-to-be-released movie. However, before releasing the
campaign, the company noticed an increase in fake accounts mimicking it online
with a similarly-looking campaign. What could the company do to mitigate this
issue?
A. Check for typosquatting
B. Check for brand impersonation
C. Check for coercion
D. Check for consensus technique
Brand impersonation occurs when the threat actor commits resources to accurately
duplicating a company's logos and formatting to make a phishing message or pharming
website visually compelling.
24. An employee reported seeing an individual outside the office drop a few thumb
drives. The employee grabbed those devices and brought them to the
information technology (IT) department. After conducting forensics on the
devices using air-gapped machines, the IT team determined that the individual
was trying to trick employees into plugging the devices into their computers to
steal information. What was the malicious actor attempting on an unsuspecting
employee?
A. The actor used an email lure.
B. The actor tried to improve the company's security posture.
C. The actor used a physical lure.
D. The actor was not being malicious.
A physical lure can occur when an attacker leaves something, such as a removable
flash drive, in an area in which a targeted person would use the device in the work
environment.
25. An accounts payable clerk received a company-wide email requesting them to
click the link within the email to update their personnel information in the human
resources portal. At first glance, the email appears to be sent from a legitimate
company address. Before giving the information over, what should the clerk
protect against?
A. Typosquatting
B. Coercion
C. Phishing
D. Consensus technique
26. A company uses a popular password manager. It noticed unusual breaches in its
systems and forced a password reset on all employees' accounts. What is a
consideration when using third-party software for any computer function?
A. Costs can be cheaper than doing it all internally.
B. Every vendor is at risk of threats.
C. The risks outweigh the costs.
D. A company cannot hire employees with specific roles.
There are risks when using any software, including third-party vendor services or
software. It is important to analyze a vendor’s security posture to protect against
breaches.
27. A large financial firm recently brought its information technology (IT) back
in-house. It made this decision after facing issues with its third-party vendor not
properly securing its systems from outside threats. What consideration did the
financial firm deliberate regarding the managed service provider (MSP) and
returning to IT in-house services?
A. To reduce the risk of supply-chain attacks.
B. To reduce the risk of insider threats
C. To reduce the risk of nation-state threats
D. To improve the company's security posture
By bringing things in-house, a company can limit risk in relation to supply-chain attacks.
28. A local business received numerous complaints from frequent repeat customers
about fraud occurring after they ordered delivery through the company's website,
even though it was the legitimate website. What type of attack did the customers
become victims of?
A. Consensus technique
B. Watering hole attack
C. Typosquatting
D. Coercion
A watering hole attack relies on a group of targets that use an unsecured third-party
website, allowing the attacker to infect a company's computers.
Cybercrime is the overarching term for the organized criminal activity occurring online.
Hacktivists might attempt to use data exfiltration to obtain and release confidential
information to the public domain, perform service disruption attacks, or deface websites
to spread disinformation.
32. A recent security flaw allowed a malicious actor to access sensitive data even
though the data never left the server and there is full drive encryption. Which
data state did the malicious actor MOST likely compromise?
A. In transit
B. At rest
C. In use
D. Through Bluetooth
Data in Use (or data in processing) refers to the state in which data is present in volatile
memory, such as system Random Access Memory (RAM) or Central Processing Unit
(CPU) registers and cache. The security flaw allows for data exploitation while in use.
33. A small development company just set up a web server and must ensure a
secure customer connection. Regarding digital certificates, what is a file
containing the information that the subject wants to use in the certificate,
including its public key?
A. CA
B. CSR
C. CRL
D. PKI
The Certificate Signing Request (CSR) is a file containing the information that the
subject wants to use in the certificate, including its public key.
34. After deploying a mobile device management system to all its computers, a
company noticed a small subset failed to encrypt their hard drives. After
inspection, those devices do not have the correct component required for the
drive encryption to function. Which security component would the company need
to install for the drive encryption to work?
A. CRL
B. CPU
C. TPM
D. RAM
The Trusted Platform Module (TPM) chip holds the cryptographic secrets and hardware
state to help secure an encrypted hard drive.
35. A Certificate Authority (CA) had its issuing authority revoked, and its certificates
expired. How might those certificates still appear valid, even though they should
be on the Certificate Revocation List (CRL)?
A. The company was a Root CA.
B. The CA blocked companies from adding it to the CRL.
C. The company did not implement a CRL.
D. The CRL still requires updating.
37. A security engineer investigates the impacts of a recent breach in which a threat
actor was able to exfiltrate company data. What cryptographic solution serves as
a countermeasure that mitigates the impact of hash table attacks by adding a
random value to each plaintext input?
A. Trusted Platform Module
B. Salt
C. Internet Protocol Security
D. Plaintext
A salt is a security countermeasure that mitigates the impact of precomputed hash table
attacks by adding ("salting") a random value to each plaintext input.
38. A large certificate-issuing company lost its reputation due to poor business
practices. Its higher signing authority revoked the ability to issue new certificates,
and browsers now show it as invalid. What describes the position that the
company once had but has now lost?
A. Root Certificate Authority
B. Certificate Signing Request
C. Certificate Authority
D. Certificate Revocation List
40. A coffee chain hired a marketing firm to set up a website that allows sign-ups.
However, after running a test on the website, an error message in the browser
stated that the connection was insecure. What framework should the marketing
firm use to ensure this error message does not show up?
A. Public key infrastructure
B. Certificate authority
C. Cryptanalysis
D. Typosquatting
41. A coffee chain hired a marketing firm to set up a website that allows sign-ups.
However, after testing the website, an error message in the browser stated that
the connection was insecure. What should the marketing firm purchase and set
up so that the page shows that it is secure?
A. Digital certificate
B. Certificate Authority
C. Cryptoanalysis
D. Certificate Signing Request
A digital certificate is a wrapper for a subject's public key. It contains information about
the subject and the certificate's issuer. The certificate is digitally signed to prove it came
from a particular Certificate Authority (CA).
42. A chief executive officer pushed back against the information technology
department's proposal to set up disk encryption on all devices. What BEST
describes why the CEO should approve the proposal instead of pushing back
against it?
A. Disk encryption protects stolen devices from data theft.
B. Disk encryption slows down a computer's performance.
C. The cost of disk encryption is not worth incurring.
D. The company does not have enough sensitive data.
Disk encryption protects against data loss when a malicious actor steals a device. The
data remains safe as long as the malicious actor does not have the keys.
44. A cancer diagnostic clinic must transfer a large amount of data to a cloud vendor
to migrate from its on-premises server. However, the amount of data would make
the transfer over the internet take extensive time due to the limited bandwidth the
clinic’s internet provides. Instead, it wants to ship an encrypted copy of the data
to the vendor. What type of encryption would BEST fit the clinic’s needs?
A. Symmetric algorithm
B. Asymmetric algorithm
C. Plaintext
D. Cryptography
A symmetric algorithm is one in which the same secret key performs encryption and
decryption. Only authorized persons should know or have the secret key.
45. An indie game developer created a browser based on the Chromium project. The
developer must ensure that anyone using the browser is safe from invalid
certificates. What service should the developer use to ensure that the browser
blocks revoked certificates?
A. CRL
B. CA
C. CSR
D. PKI
A Certificate Authority (CA) or owner can revoke or suspend a certificate for many
reasons. A Certificate Revocation List (CRL) is a list of no longer valid certificates.
46. A small enterprise needs a key exchange method to ensure perfect forward
secrecy. It needs something that can help future-proof its security while it grows.
Which key exchange method would meet the needs of the enterprise?
A. Hash
B. Diffie-Hellman
C. Advanced Encryption Standard
D. Salt
Perfect Forward Secrecy (PFS) mitigates this risk from a basic key exchange. PFS uses
Diffie-Hellman (D-H) key agreement to create ephemeral session keys without using the
server's private key.
The purpose of encryption is to allow for confidentiality. It prevents third parties from
listening in and knowing what communication is occurring. Encryption is important for
things like whistleblower reporting.
48. A security consultant is working with a client to improve security practices. How
can the consultant describe cryptographic hashing so the client is more likely to
accept recommendations?
A. Hashing speeds up the encryption process.
B. Hashing slows down the encryption process.
C. Hashing allows any plaintext length to look the same length as
ciphertext
D. Hashing allows the same length of plaintext to be different lengths of
ciphertext.
Hashing encrypted data makes it much more difficult to break. Hashing takes any length
string and makes it the same length. A hashing algorithm is also useful for proving
integrity.