--:--
đ CISSP Practice - Full CISSP Exam Simulation (125 questions, 3 hours)
Question
1
of 125
Question 1
Q1. A global retailerâs SOC has been running a legacy SIEM that cannot parse JSON logs from the companyâs new cloud-native payment application. During the first week of deployment, an attacker makes 200,000 micro-refund requests that individually fall below the dollar limit that would trigger the rule-based fraud engine. The SIEM shows âunknown log formatâ alerts, but analysts discard them as noise. Which security-monitoring principle has MOST clearly failed?
A. Non-repudiation
B. Asset identification
C. Timely patching
D. Visibility
Correct Answer: D
Visibility is the ability to collect, normalize, and interpret relevant security data in real time. Because the SIEM could not parse the JSON logs, the malicious traffic was effectively invisible to the SOC, allowing the fraud to proceed unnoticed. None of the other choices describe the root cause; non-repudiation is about proof of action, asset identification is inventory-focused, and patching is unrelated to log-format support.
Question 2
Q4. A company routes all Internet-bound traffic through a secure web gateway (SWG) using an explicit proxy PAC file. Remote users now report that TLS 1.3 websites intermittently fail to load. Packet captures show the SWG returns a TCP RST immediately after the ClientHello. Which change will MOST reliably restore connectivity while maintaining inspection?
A. Downgrade the browser to TLS 1.2 only.
B. Deploy a client-side SSL/TLS forward-proxy certificate and force cipher suites that support RSA key exchange.
C. Enable TLS 1.3 middlebox compatibility on the SWG and push the latest trusted CA certificate to endpoints.
D. Configure the PAC file to bypass the proxy for any site advertising TLS 1.3 in the SNI extension.
Correct Answer: C
TLS 1.3 encrypts most of the handshake, breaking legacy âpass-through-then-re-encryptâ proxies. Modern SWGs implement TLS 1.3 middlebox compatibility (RFC 8446 Appendix D.4) that rewrites the ClientHello to indicate an earlier version so the proxy can still perform MITM inspection with its own certificate. Downgrading browsers (A) is a temporary hack and reduces security. RSA key exchange (B) is deprecated in TLS 1.3. Bypassing (D) defeats inspection policy.
Question 3
Q6. A hospitalâs medical device network is air-gapped except for a one-way diode that exports HL7 messages to the billing VLAN. During a ransomware event the MRI controllers display the ransom note, yet the diode logs show zero outbound packets. Which security-operation principle is MOST likely violated?
A. Network segmentation failureâdiode is actually bidirectional
B. Least-functionality baselineâSMB shares were left enabled on MRI
C. Patch-management gapâWannaCry exploited EternalBlue
D. Media sanitizationâold patient records were not cryptographically erased
Correct Answer: A
A true unidirectional diode cannot carry return traffic; therefore the presence of the ransom note implies the âair-gapâ is bridged. The immediate operational failure is architecturalâeither the diode is misconfigured or a covert channel (e.g., USB, RF) exists. While SMB and EternalBlue are plausible attack vectors, the question asks which principle is violated by the diodeâs behavior, not the exploit itself.
Question 4
Q9. A manufacturer ships IoT gateways with an ARM TrustZone secure world that stores a device-unique private key in e-fuses and a public key certificate signed by the manufacturerâs CA. Which step is MOST critical to prevent cloned devices from joining the service?
A. Disable the JTAG interface in the insecure world.
B. Enable Trustzoneâs secure boot to verify the kernel image signature.
C. Perform mutual TLS authentication using the device certificate and check revocation online during onboarding.
D. Store the CA public key in the gatewayâs TPM NVRAM.
Correct Answer: C
Only online certificate verification with revocation checking prevents cloned devices with valid-looking certificates from authenticating. A and B protect the firmware but do not detect cloned keys. D is pointless because the CA public key is already public.
Question 5
Q4. A hospitalâs medical-device VLAN is air-gapped except for a weekly one-hour window when a vendor support laptop is connected to push firmware updates. During a quarterly audit, the SOC finds that the laptopâs antivirus pattern file is 14 months old and the OS last patched 18 months ago. The vendor claims the laptop is never online, therefore âunhackable.â Which security-operations concept BEST refutes the vendorâs assertion?
A. Attack-surface reduction
B. Island-hopping / pivot risk
C. Zero-trust architecture
D. Mean time to failure
Correct Answer: B
The laptop is a pivot point; even brief connectivity allows malware implanted elsewhere to move into the high-value VLAN. This is classic âisland hopping,â a core concern in security operations. Zero-trust (C) is a broader philosophy, not the best rebuttal to the specific claim.
Question 6
Q8. A financial exchange offers colocated traders 10 Gbps Ethernet with sub-100 ns latency. The exchange recently added MACsec (IEEE 802.1AE) between every server and the top-of-rack switch. A high-frequency trading firm claims that latency increased 6 Âľs per hop and wants to remove encryption. Which argument BEST justifies keeping MACsec without violating the 100 ns budget?
A. Enable MACsec confidentiality-only (no integrity check) to save time
B. Use a hardware-security-module (HSM) offload on the NIC so encryption overlaps cut-through switching
C. Switch to 256-bit GCM to reduce tag size and latency
D. Disable MACsec and move encryption to the application to regain latency
Correct Answer: B
Modern 10 G NICs perform MACsec in ASIC with cut-through; the added latency is <40 ns when offloaded, well under the 100 ns budget. Confidentiality-only (A) is non-standard and breaks integrity; longer GCM (C) increases latency; application crypto (D) adds CPU context switches and jitter, harming determinism more than MACsec.
Question 7
Q4. An IoT manufacturer wants to ensure that only authorized firmware runs on its new thermostat. The device has a low-power Cortex-M0 microcontroller, 64 kB ROM, 32 kB RAM, and no TPM. Which root-of-trust approach is MOST feasible?
A. Store a 2048-bit RSA public key in ROM and verify firmware signature at every boot.
B. Use AES-CBC encryption of the firmware image and decrypt in place at boot.
C. Implement a chain-of-trust starting with a custom bootloader that hashes the image with SHA-256 and compares it against a value fused in one-time-programmable (OTP) eFuses.
D. Embed a symmetric key in ROM and perform a MAC check over the entire image.
Correct Answer: C
An immutable hash in OTP eFuses plus a secure bootloader provides an inexpensive root-of-trust: the device refuses to run any image whose hash does not match the fused value. RSA (A) is computationally heavy for the M0 and still needs trusted key storage; AES-CBC (B) provides confidentiality but no integrity/authenticity; a ROM symmetric key (D) cannot be revoked if leaked and offers no authenticity of origin.
Question 8
Q7. A smart-card OS implements RSA signature generation in a secure element that is certified FIPS 140-2 Level 3. The card emits the exact same byte pattern for every 1024-bit RSA signature of the same message. Which security principle is MOST clearly violated?
A. Collision resistance.
B. Deterministic encryption.
C. Key-ceremony integrity.
D. Semantic security / randomness.
Correct Answer: D
RSA signatures must use a random padding scheme (e.g., PSS); deterministic output leaks that the same message was signed, violating semantic security and enabling some attacks. A is about hash functions. B is a non-issue for signatures. C is unrelated.
Question 9
Q4. A defense contractor runs a classified enclave that requires PIV card-based TLS mutual authentication. Users frequently move between the enclave and an adjacent unclassified network that relies on username/password. The CISO wants a single logical access-control system that can enforce âhigh-assurance only inside the enclaveâ without re-creating user accounts. Which design BEST achieves this goal?
A. Issue shadow accounts in the unclassified domain and use transitive forest trust
B. Store PIV-derived user certificates in a single LDAP directory and perform certificate-to-account mapping on both networks
C. Deploy a centralized RADIUS server that returns different VLAN attributes based on authentication strength
D. Keep separate directories and synchronize the userCertificate attribute hourly
Correct Answer: B
Mapping certificates to a single identity store (LDAP/AD) allows the same account to be used everywhere while the relying systems enforce authentication strength appropriate to the zone. RADIUS only handles network admission, not application logins. Shadow accounts and trusts double the attack surface, and hourly sync creates windows of inconsistency.
Question 10
Q3. A penetration-testing firm delivers a red-team report that contains five critical findings. The CISO wants to validate that the fixes actually block the attack paths before the report is accepted. Which security-testing concept is MOST appropriate to apply next?
A. Regression testing
B. Re-testing (verifying fixes)
C. Post-implementation review
D. User-acceptance testing
Correct Answer: B
The question describes the need to confirm that remediation measures neutralize the identified vulnerabilities. This is precisely âre-testingâ (B), sometimes called âfix validation.â Regression testing (A) would ensure new code did not break existing functionality, while a post-implementation review (C) is broader and not attack-focused. User-acceptance testing (D) is concerned with business requirements, not security controls.
Question 11
Q7. A financial regulator requires that trading firms keep âimmutable logsâ for seven years. A firm implements WORM (write-once-read-many) S3 buckets with object-lock in compliance mode for 2,555 days. Six months later, an attacker compromises a cloud admin account and creates a new bucket lifecycle rule that moves objects to Glacier Deep Archive, then deletes the bucket policy. The firm argues the logs are still immutable because object-lock is intact. Which security-operations concern BEST refutes the firmâs claim?
A. Availability of logs for regulatory inquiry
B. Confidentiality impact due to Glacier encryption
C. Integrity hash algorithm collision risk
D. Non-repudiation of administrative actions
Correct Answer: A
While object-lock preserves the bytes, moving logs to Glacier Deep Archive can delay retrieval for weeks, impeding a regulatorâs request for timely access. This violates the spirit of âreadily producibleâ evidence. Confidentiality is not at issue (Glacier encrypts), hash collision is theoretical, and non-repudiation is unrelated to storage tier.
Question 12
Q5. A zero-trust vendor claims their SDP controller can âhideâ TCP services until mutual TLS is complete. During a PoC, the clientâs vulnerability scanner still discovers open port 443 on the gateway. Which control BEST explains why the scannerâs finding does NOT invalidate the claim?
A. The gateway responds with a TLS handshake that reveals no application-layer banners
B. Port 443 must remain open to initiate the mutual TLS bootstrap required by the SDP specification
C. The scanner is whitelisted by the controller to simplify PoC troubleshooting
D. A secondary firewall rule blocks SYN-ACK for any source not presenting a valid SPA packet
Correct Answer: B
SDP âhidingâ refers to application services, not the TLS port itself; the controller must expose 443 to begin mutual TLS. Once TLS completes, the controller issues tokens for micro-tunnels. Option A is true but secondary. Whitelisting (C) and SPA (D) are deployment choices, not normative SDP behavior.
Question 13
Q1. A multinational cloud-storage provider is preparing to migrate legacy customer data from on-premise tape archives to a new multi-region object-storage service. The tapes contain mixed data classifications (Confidential, Private, Internal, Public) that were originally assigned by different business units using inconsistent criteria. The CISO has asked the security team to produce a single data-classification scheme for the new environment that will satisfy both GDPR and PCI DSS requirements. Which action is MOST critical before any data are moved?
A. Decrypt all tapes, re-encrypt them with the cloud providerâs KMS, and then label each object with the original business-unit classification.
B. Perform an data-discovery and data-mapping exercise to inventory every data element and assign a consistent enterprise classification.
C. Accept the highest classification found on any tape and apply that label to the entire data set to avoid under-protection.
D. Hash every file on the tapes and store the hashes as metadata so customers can later prove integrity regardless of classification.
Correct Answer: B
A consistent, enterprise-wide classification scheme is the prerequisite for applying appropriate controls in the cloud (Domain 2). Option B builds the inventory and mapping needed to satisfy GDPR (lawful basis, data-minimization) and PCI DSS (scope-reduction). A only perpetuates inconsistent labels and does not address scope. C over-protects, driving unnecessary cost and complexity. D provides integrity assurance but does nothing for classification or jurisdictional requirements.
Question 14
Q4. A SIEM rule fires: âMultiple AWS Console logins from the same Identity Center user but two different browser fingerprints within 5 min.â The source IPs are both in the AWS-owned EC2 address space and geolocated to us-east-1. The user swears she only uses her corporate laptop with Chrome. CloudTrail shows AssumeRole events with externalId matching the corporate IdP.
A. Deactivate the userâs SSO account; the account is clearly compromised.
B. Block all logins from EC2 public IP ranges via IAM policy.
C. Open an AWS support case; the traffic is likely a proxy misrouting through VPC endpoints.
D. Create a CloudWatch metric filter to suppress alerts when sourceIPAddress resolves to âec2-*.compute.amazonaws.comâ.
Correct Answer: C
AWS Console logins from EC2 IPs usually indicate the user launched an in-browser VPC endpoint (AWS Systems Manager Session Manager, AWS CloudShell, or AppStream). The identical externalId and valid IdP signature mean the role assumption is legitimate. Suppressing or blocking would break valid workflows; instead verify proxy routing and, if confirmed, tune the rule to exclude corporate EC2 proxy ranges.
Question 15
Q4. A Fortune-500 company is adopting a micro-service architecture orchestrated by Kubernetes. The security team wants to prevent compromised containers from harvesting secrets stored in environment variables. The company already uses a commercial secrets vault with dynamic secrets and short TTLs. Which Kubernetes-native feature BEST complements the vault to keep secrets out of the process environment?
A. Use Kubernetes Secrets mounted as tmpfs volumes and referenced via volumeMounts in the pod spec.
B. Store secrets in etcd encrypted with a KMS provider and rely on RBAC to limit access.
C. Use a MutatingAdmissionWebhook that injects secrets directly into the applicationâs configuration file on startup.
D. Run the container with the ââread-onlyâ flag and copy secrets through docker exec at runtime.
Correct Answer: A
Mounting secrets as memory-only tmpfs volumes keeps them out of the containerâs environment block and off the union filesystem, while still allowing the application to read them as files. Option B protects data at rest but not at runtime, Option C still leaves secrets in a file that might be committed or logged, and Option D is manual and non-scalable.
Question 16
Q9. A manufacturer stamps QR codes on engine parts to track warranty claims. A competitor photographs the codes in transit and clones legitimate parts. The security team recommends changing the identifier format. Which data-security principle is PRIMARILY being violated?
A. Integrity
B. Confidentiality
C. Availability
D. Non-repudiation
Correct Answer: B
The QR code data itself is public, but its value relies on secrecy of the issuance process (i.e., the ability to counterfeit depends on knowing valid codes). The violation is disclosure of authentic identifiersâan issue of confidentiality, not integrity (data is unchanged) or availability (service is up).
Question 17
Q8. A software vendor is pursuing ISO 27034 certification. The auditor asks for evidence that the organization has implemented âcontrol A.10.3 â Secure Coding Practicesâ across all development teams. Which artifact BEST demonstrates compliance?
A. A Confluence wiki page titled âSecure Coding Guidelinesâ last updated three years ago.
B. A centrally enforced IDE plugin that flags non-compliant code in real time with dashboards showing 95 % adoption and remediation metrics.
C. A one-time classroom training slide deck delivered to new hires.
D. Penetration-test reports showing no high-severity vulnerabilities in the past year.
Correct Answer: B
ISO 27034 expects continuous, measurable implementation of security controls within the application lifecycle. An enforced IDE plugin with metrics provides ongoing evidence that secure-coding rules are embedded in day-to-day engineering, not merely documented (A) or trained once (C). Pen-test absence (D) is circumstantial and could result from scope limitations or tester skill.
Question 18
Q4. A hospital chain wants to outsource medical-transcription services to a vendor that uses offshore staff in a country with no HIPAA-equivalent law. The contract will include HIPAA Business Associate Agreement (BAA) language, but the vendor refuses to allow on-site audits citing COVID restrictions. Which control combination BEST satisfies the âsecurity ruleâ requirement for reasonable assurance?
A. Right-to-audit clause, annual SOC 2 Type II report from an independent CPA, and contractual requirement for encryption of PHI in transit and at rest.
B. Force-majeure waiver that shifts all liability to the vendor if PHI is breached.
C. Purchase of a cyber-liability policy with a USD 10 M limit naming the hospital as beneficiary.
D. Require the vendor to obtain a PCI-DSS ROC because it covers card data and therefore implies strong security.
Correct Answer: A
SOC 2 + right-to-audit + encryption (A) gives verifiable, ongoing assurance when physical audits are impractical. Force-majeure waiver (B) is unenforceable and does not demonstrate due diligence. Insurance (C) is only financial recovery, not assurance. PCI-DSS (D) is irrelevant to PHI.
Question 19
Q9. A manufacturer uses RFID badges for physical access. An attacker is caught cloning badges by walking behind employees and sniffing the UID. The security team wants to add cryptographic authentication without replacing the entire badge stock. Which upgrade path BEST preserves the existing reader infrastructure while defeating cloning?
A. Issue new badges that support MIFARE DESFire EV3; configure readers to challenge the badgeâs symmetric key; store master key in an HSM.
B. Add a second factor: require employees to type a PIN into the reader keypad.
C. Replace readers with Bluetooth Low Energy (BLE) and use smartphone-based tokens.
D. Install turnstile cameras and perform facial recognition after each badge swipe.
Correct Answer: A
DESFire EV3 operates at 13.56 MHz and is backward-compatible with most existing prox reader wiring; by simply updating firmware and adding a key diversification scheme, the reader can perform a challenge-response that proves the badge holds a secret, not just a UID. Cloned UIDs without the key will fail. Adding a PIN (B) helps but does not bind the badge to the user and is subject to tailgating. BLE (C) and facial recognition (D) are forklift upgrades that scrap the existing badge investment.
Question 20
Q7. A tech start-up has 120 AWS accounts. Developers frequently open support tickets such as âI need S3 full-access for 2 hours to troubleshoot.â The IAM team is drowning in ad-hoc grants and wants to eliminate standing privileges while still letting devs help themselves.
A. AWS IAM Identity Center (SSO) + AWS IAM Identity Center delegated admin + PermissionSet with S3FullAccess and 2-hour maximum session duration.
B. Create an IAM user in each account with S3FullAccess and a 2-hour password policy.
C. Add all developers to an AD group called âS3-Fullâ and use AWS Config rule to remove them after 2 hours.
D. Issue root-account passwords to senior developers only.
Correct Answer: A
IAM Identity Center permission sets can be configured with 2-hour session duration and no persistent credentials; upon console/CLI expiry the access is gone, eliminating standing privileges. Config rule (C) is reactive and race-prone; individual IAM users (B) and root (D) create permanent attack surface.
Question 21
Q5. A fintech start-upâs board has adopted the NIST CSF as its âsingle source of truth.â During a Series-B due-diligence review, investors discover that the company has implemented 85 % of CSF sub-category controls but has not produced a single policy document longer than two pages. Which principle is MOST violated?
A. Alignment to the CSF Inform function
B. Governance through âtone at the topâ
C. Due care versus due diligence
D. Transparency to shareholders
Correct Answer: A
The Inform function requires that policies, processes, and procedures be documented and communicated; absence of documentation violates this regardless of control implementation. Tone at the top (B) is present but undocumented. Due care (C) is broader and less specific. Transparency (D) is secondary to operational evidence.
Question 22
Q2. While reviewing firewall logs, an engineer sees repeated inbound TCP packets with the SYN flag set and the FIN flag simultaneously set, arriving from random source IPs to the companyâs public web server. Which attack is MOST likely occurring?
A. SYN flood
B. Christmas-tree scan
C. TCP session hijack
D. Low-rate DoS
Correct Answer: B
A packet with SYN and FIN both set is nonsensical in normal TCP operation and is characteristic of a âChristmas-treeâ or âX-masâ scan (flags lit up like a Christmas tree). The goal is to probe how the target TCP stack responds to illegal flag combinations, thereby inferring open/closed ports. A pure SYN flood (A) would not set FIN. Session hijack (C) requires an existing connection, and low-rate DoS (D) manipulates timing, not flags.
Question 23
Q1. A global retailer is preparing for its annual PCI-DSS assessment. The QSA has requested evidence that the internal vulnerability-scanning program is âsufficiently independentâ of the infrastructure team. Currently, scans are launched from an engineerâs laptop that is domain-joined to the same Active Directory forest that runs the card-holder data environment (CDE).
A. Provide the QSA with the engineerâs job description showing a dotted-line reporting relationship to Security.
B. Move the scanning laptop into a separate OU and apply a GPO that removes local-admin rights from the engineer.
C. Purchase a managed scanning service operated by a different company and have that vendor attest independence.
D. Configure the existing laptop to use a local account that is not joined to the domain and document the separation in the procedure guide.
Correct Answer: C
PCI-DSS requires that âpersonnel who conduct the internal vulnerability scans have organizational independence.â A dotted-line report (A) or GPO restrictions (B) do not remove the conflict of interest inherent in the same AD forest. Using a local account (D) still leaves control of the scanning platform inside the same team. Retaining an external managed service (C) provides true third-party independence that satisfies both DSS v4.0 requirement 11.3.1 and the QSAâs expectation.
Question 24
Q5. A companyâs bug-bounty program has paid multiple researchers for the same SQL-injection flaw in a legacy PHP application. The security team discovers the root cause is a single shared library used by three different customer-facing sites. Which security-testing key-performance indicator (KPI) is MOST directly affected by this situation?
A. Mean time to detect (MTTD)
B. Defect duplication rate
C. False-positive ratio
D. Patch latency
Correct Answer: B
Duplicate submissions of the same underlying flaw inflate bounty costs and skew metrics. Defect duplication rate (B) measures how often the same vulnerability is reported multiple times. MTTD (A) gauges detection speed, false positives (C) measure incorrect findings, and patch latency (D) measures fix speedânone capture the âsame bug, many reportsâ problem.
Question 25
Q6. A manufacturing plant deploys 300 IIoT sensors on an internal IPv6-only network. The firewall rule âipv6 any any allowâ is intentionally used because the sensors are on an isolated L2 segment. During a penetration test, the assessor is able to reach the sensors from the corporate Wi-Fi. Which misconfiguration is the MOST likely avenue?
A. The access switch is acting as an IPv6 router and has a global unicast address on the same VLAN.
B. The sensors are using SLAAC with privacy extensions, creating temporary addresses.
C. The firewall has a link-local rule that permits neighbor-discovery packets.
D. The Wi-Fi VLAN and sensor VLAN share the same flood domain due to a missing VLAN tag.
Correct Answer: A
If the switch (or any dual-homed device) has IPv6 routing enabled and an interface in both the sensor VLAN and the Wi-Fi VLAN, it can forward packets between them even when the firewall rule is âany any allowâ inside only one zone. The attacker simply routes through the switch, bypassing intended segmentation. Shared flood domain (D) would require L2 adjacency, which is less common if VLANs are configured. SLAAC privacy (B) and ND rules (C) do not create cross-VLAN reachability.
Question 26
Q8. A company runs an internal CA and wants to prevent users from bypassing its forward-proxy by typing https://1.1.1.1 (IP address literal). Which TLS proxy feature must be enabled?
A. SNI inspection and block when SNI is missing or equals the IP
B. Certificate pinning
C. OCSP stapling
D. TLS session resumption
Correct Answer: A
When a browser uses an IP literal, the TLS ClientHello either omits the SNI extension or contains the IP as SNI value. A proxy that inspects SNI can drop such handshakes, forcing the user through the proxy where policy is enforced. Certificate pinning (B) is for integrity of specific sites. OCSP (C) and session resumption (D) do not control IP-literal bypass.
Question 27
Q4. A FinTech startup developed a mobile wallet that stores truncated PANs (last four digits) and tokens on the device. The security team needs to classify these data for the mobile-app secure-development guide. Which classification is MOST appropriate?
A. Public â because truncated PANs are not regulated cardholder data.
B. Internal â because tokens have no exploitable value.
C. Confidential â because tokens can be replayed if compromised in combination with other metadata.
D. Restricted â because any card-related data must retain the same classification as the full PAN.
Correct Answer: C
Even truncated PANs plus tokens can be replayed in certain contexts (PCI DSS SAQ guidance). âConfidentialâ reflects the need for encryption at rest and key protection. A ignores residual risk. B underestimates token replay. D over-classifies; full PAN is âRestricted,â but tokens are not PANs.
Question 28
Q3. A U.S.-based cloud company is negotiating with a European utility to process smart-grid data. The utility insists that the provider become âGDPR art. 28 compliantâ and âcertified under the EU-U.S. Data Privacy Framework (DPF).â The providerâs GC notes that DPF certification is optional and GDPR Article 28 is only one of several lawful paths. The CISO recommends instead signing Standard Contractual Clauses (SCCs) and encrypting data at rest with keys kept in the United States. Which concept is MOST relevant to determining whether the CISOâs recommendation introduces unacceptable residual risk?
A. Due care versus due diligence
B. Legal precedent in Schrems II
C. Safe-harbour sunset provisions
D. NIST SP 800-53 control baselines
Correct Answer: B
Schrems II (B) invalidated Privacy Shield and cast doubt on SCCs absent âsupplementary measuresâ for U.S. government surveillance risk, directly impacting the CISOâs plan. Due care/diligence (A) is too generic. Safe-harbour (C) is obsolete. NIST baselines (D) are technical and do not address cross-border transfer law.
Question 29
Q3. A hospital system is negotiating cyber-insurance coverage. The insurer offers a 25 % premium reduction if the hospital can demonstrate that it has âimplemented an organization-wide risk management framework aligned to ISO 27005.â Which document will BEST satisfy the insurerâs requirement?
A. The hospitalâs balanced scorecard showing KPI trends for the last four quarters
B. A signed attestation from the CIO that HIPAA controls are âeffectively deployedâ
C. The hospitalâs most recent risk assessment report with an executive summary mapping methodology to ISO 27005
D. A spreadsheet listing every CVE patched in the prior month
Correct Answer: C
The risk assessment report (C) explicitly shows the hospital follows ISO 27005 scoping, risk identification, analysis, and treatment steps. A balanced scorecard (A) is too high-level, a CIO attestation (B) lacks objective evidence, and a CVE list (D) addresses only vulnerability management, not enterprise risk.
Question 30
Q10. A conglomerate with four autonomous divisions wants to create an enterprise-wide risk appetite statement. The CISOâs first draft is rejected by the board because it lists only technical IT risks. Which addition would BEST satisfy governance expectations?
A. Include a risk tolerance table for reputation, regulatory, financial, and strategic risk categories.
B. Attach the NIST 800-53 control catalog as an appendix.
C. Quantify every risk in monetary terms using FAIR.
D. Require divisions to adopt the same risk-scoring matrix (1â5).
Correct Answer: A
A board-level appetite statement must cover all material risk categories, not just IT. Tolerance tables translate risk into business terms. B is too tactical; C is useful but not the only dimension; D standardizes scoring but does not articulate appetite.
Question 31
Q3. A smart-card issuance system uses a three-tier certificate authority (offline root, online policy-CA, online issuing-CA). The operations team wants to automate day-to-day issuance without weakening the rootâs security posture. Which control combination best preserves the rootâs offline status while allowing automated enrollment?
A. Keep the root offline; delegate certificate issuance to the issuing-CA and use an online OCSP responder signed by the root.
B. Issue a cross-certification certificate from the root directly to each subscriber, then bring the root online only during business hours.
C. Generate a long-lived (20-year) CRL signed by the root so that subordinate CAs can operate without further root interaction.
D. Place the root private key inside a network-attached HSM and restrict SSH access to two senior operators.
Correct Answer: A
An offline root signs only the subordinate CA certificates; day-to-day validity information is provided by OCSP/CRL produced by the online issuing-CA or a responder, so the root never comes online. B violates the offline principle. C creates an unmanageable CRL and still requires periodic root signatures. D makes the root technically online even if access is restricted.
Question 32
Q5. A Tier-1 analyst receives an alert that a production Linux web server executed âchmod 4777 /usr/bin/viâ at 02:13 local time. The change was rolled back four minutes later. The server is fully patched, and AIDE logs show no other file modifications.
A. Close the alert; the rollback indicates an authorized administrator correcting a mistake.
B. Escalate to Tier-2; the set-UID bit on vi is a classic backdoor allowing priv-esc by any account.
C. Add a cron job every minute to reset /usr/bin/vi permissions to 755.
D. Re-image the server; rootkit behavior is confirmed.
Correct Answer: B
Setting set-UID root on vi grants any user root when exiting the shell (â:shellâ). The four-minute window is enough for an attacker to plant a cron job or add an SSH key and then remove the bit to cover tracks. AIDE would miss in-memory or credential changes. Treat as potential compromise and escalate for timeline analysis, auditd review, and volatile capture.
Question 33
Q1. A global pharmaceutical company is about to acquire a smaller competitor that has a promising drug pipeline but a history of compliance violations. The CISO has been asked to provide a security opinion to the M&A steering committee within five business days. The due-diligence data room contains only high-level policy documents and last yearâs SOC-2 Type II report. Which of the following is the MOST important next step before forming an opinion?
A. Accept the SOC-2 report at face value and note no critical findings.
B. Request the right to perform a targeted security assessment of the competitorâs R&D network.
C. Calculate the annualized loss expectancy (ALE) for each drug patent.
D. Draft a memorandum of understanding (MOU) requiring the competitor to adopt the parentâs security policy on Day 1.
Correct Answer: B
A targeted assessment (B) provides the evidence needed to judge residual risk before the company is legally and financially committed. Accepting the SOC-2 (A) ignores the competitorâs compliance history and the limited scope of SOC-2. Calculating ALE (C) is premature without understanding the actual control gaps. Drafting an MOU (D) is a post-deal activity and does not inform the current risk decision.
Question 34
Q8. A startup uses object storage with lifecycle policies that move data to cheaper tiers after 30 days and delete it after 1 year. Pen-testing reports warn that snapshots of deleted volumes remain in the cloud providerâs backup system for an additional 35 days. Which policy element isMISSING?
A. Data retention schedule
B. Secure destruction policy
C. Version-control baseline
D. Encryption-key escrow
Correct Answer: B
The secure destruction policy (B) must explicitly cover provider-side backups and snapshots; otherwise data remains recoverable. Retention schedule (A) already exists (1 year). Version-control baseline (C) and key escrow (D) are unrelated to residual snapshots.
Question 35
Q5. A SOC manager wants to measure how quickly analysts can triage phishing emails. She configures the mail gateway to inject 10 benign âcanaryâ messages per day that contain known-bad URLs hosted by the security team. After 30 days, only 83 % of the canaries have generated user-reported tickets, and the median user-report time is 4 h 12 m. Which metric is she actually calculating?
A. Phish-click rate
B. User-reporting efficacy
C. Mean time to awareness
D. Mean time to detect (MTTD) for email-borne threats
Correct Answer: D
The experiment measures how long it takes the human sensor network to detect and report a phishâi.e., MTTD for that vector. It is not measuring who clicked (A), overall efficacy (B), or awareness (C).
Question 36
Q9. A firm is disposing of 1000 used SSDs that once stored âConfidentialâ HR files. The internal audit team requires a sanitisation method that is verifiable and meets NIST SP 800-88 Revision 1. Which option is the MOST appropriate?
A. Run a single-pass overwrite with zeros and document the completion time.
B. Use the SSD vendorâs secure-erase command and retain the command output for audit.
C. Physically shred the drives to 5 mm particles and keep the destruction certificate.
D. Encrypt the drives with BitLocker and throw away the recovery keys.
Correct Answer: C
For Confidential data on SSDs, destruction (shred to < 5 mm) provides the highest assurance because overwrite and vendor secure-erase may be circumvented by spare-area remapping. B is acceptable for lower classifications but not for Confidential without additional verification. A is insufficient on flash media. D is not recognised sanitisationâkey loss â data destruction.
Question 37
Q10. A quantum-computing start-up wants to protect its long-term research data (10+ years) against âharvest-now-decrypt-laterâ attacks. Data is exchanged between on-prem data centres and AWS VPCs. Which combination of controls provides the STRONGEST defence today?
A. Use classical ECDH P-384 for key exchange and AES-256-GCM for bulk data, then re-encrypt archives annually.
B. Replace ECDH with CRYSTALS-KYBER (NIST Round-3 KEM) and use AES-256-GCM; store encrypted data as-is.
C. Deploy IPsec with RFC 8784 post-quantum preshared keys and continue using AES-256-GCM.
D. Layer classical TLS 1.3 with pre-shared AES-256 keys plus periodic key rotation every 24 h.
Correct Answer: B
KYBER provides confidential key exchange even against future quantum adversaries, and AES-256 is currently considered quantum-resistant (Groverâs halves the key space to 128-bit, still safe). A keeps classical key exchange vulnerable. C only protects the IKE/IPsec tunnel, not object-level storage. D still uses classical key exchange for the initial TLS handshake.
Question 38
Q2. A penetration-test report shows that an attacker on the corporate guest Wi-Fi sent forged 802.1X EAPOL-Logoff frames, forcing user laptops to re-authenticate and capturing the EAP identity response in clear text. The company uses WPA2-Enterprise with PEAP (EAP-PEAPv0/EAP-MSCHAPv2) and has no endpoint NAC agent. Which hardening step removes this specific attack vector?
A. Enable 802.11w (Management Frame Protection) on all access points and require it in the WLAN profile.
B. Replace PEAP with EAP-TLS and deploy machine certificates to all corporate laptops.
C. Move the guest network to a separate VLAN and enforce MAC ACLs on the APs.
D. Reconfigure the RADIUS server to require EAP-TTLS with PAP inside the TLS tunnel.
Correct Answer: A
802.11w cryptographically protects de-authentication and disassociation frames, making forged EAPOL-Logoff frames impossible. Option B stops credential theft but does not prevent the forced re-auth itself. Option C is segmentation, not a Wi-Fi-layer control. Option D still allows the attacker to force re-authentication and see the EAP identity in clear text.
Question 39
Q8. A SOC analyst is building a playbook for âcredential-stuffing against customer portal.â Which metric BEST measures the EFFECTIVENESS of the playbookâs containment step?
A. Mean time to acknowledge (MTTA) the alert.
B. Percentage of abused accounts disabled within 15 min of first successful login.
C. Number of IPs added to the block-list per hour.
D. Percentage of playbook steps executed without human intervention.
Correct Answer: B
Effectiveness is outcome-based: reducing fraudulent access. Disabling compromised accounts quickly stops attacker lateral movement. MTTA (A) is responsiveness, not containment; block-list size (C) is activity, not impact; automation ratio (D) is efficiency, not effectiveness.
Question 40
Q4. A smart-city IoT gateway collects 4 KB sensor readings every 5 s from 10 000 devices. Each reading must be authenticated, non-repudiable, and verifiable by third-party auditors, yet battery life is constrained. Which cryptographic approach best balances security and power?
A. ECDSA signatures over P-256 on the device plus ECDH session keys
B. HMAC-SHA256 keyed with a unique 256-bit device secret stored in fused ROM
C. AES-GCM 128-bit with 96-bit IV derived from monotonic counter
D. Ed25519 signatures computed on the gateway after aggregating cleartext data
Correct Answer: A
ECDSA on a low-power device (e.g., ARM Cortex-M with crypto accelerator) gives strong non-repudiation with 64-byte signatures, far smaller than RSA and feasible for 4 KB payloads. HMAC (B) lacks non-repudiation. AES-GCM (C) provides only confidentiality+integrity, not third-party verifiability. Gateway-level signing (D) removes device-level non-repudiation.
Question 41
Q7. A security analyst is building a data-life-cycle diagram for âProprietaryâ CAD files shared with external fabrication partners. The diagram must show how classification changes at each phase. Which statement is TRUE?
A. Classification drops to âInternalâ once the file leaves the organizationâs network perimeter.
B. Classification remains âProprietaryâ throughout the life cycle regardless of location or format.
C. Classification can be lowered to âExternalâ if the file is converted to a read-only format.
D. Classification is temporarily elevated to âRestrictedâ during transit over the internet.
Correct Answer: B
Classification is tied to the assetâs value and legal protection, not location or format. A, C, and D erroneously tie classification to network location or transport encryption level.
Question 42
Q5. A manufacturing firm runs a legacy MRP system that stores 15-year-old supplier contracts on optical WORM media. New privacy regulations require that âpersonal data be deleted once the business purpose expires.â The compliance team asks security to âensure erasure.â Which statement is MOST accurate?
A. Optical WORM cannot be overwritten; therefore physical destruction is the only acceptable sanitization method.
B. Because the data is on WORM, no erasure is possible and the firm must relocate the media to a country with weaker privacy laws.
C. Overwriting the media three times with random data meets regulatory requirements.
D. Degaussing the optical platters will render the data unreadable.
Correct Answer: A
Write-Once-Read-Many media is, by definition, non-erasable. Regulatory âright to be forgottenâ still applies, so the only compliant path is destruction (shredding/incineration). B is illegal. C is technically impossible. D is ineffective because optical media is not magnetic.
Question 43
Q1. Your SOC has deployed an AI-powered user-behavior analytics (UBA) engine that baselines every employeeâs keyboard cadence, file-touch volume, and VPN-connect times. On a Saturday at 02:14 local time, the model alerts that the CFOâs credentialed session just exfiltrated 3.2 GB of compressed files to an IP in Moldovaâsomething the CFO has never done. The SIEM shows no malware alert, and the EDR platform marks the endpoint âclean.â Which FIRST action best follows the SANS PICERL incident-handling continuum?
A. Isolate the CFO laptop from the network to preserve evidence integrity.
B. Immediately call the CFO on her registered phone to verify the transfer.
C. Create a hash of the endpoint drive before the user returns on Monday.
D. Escalate the alert to law-enforcement because a nation-state is suspected.
Correct Answer: B
The alert is anomalous but not yet confirmed malicious (no malware, no failed auth). Per PICERL âIdentificationâ phase, the first goal is to classify the event while avoiding disruption that could destroy evidence or business function. Calling the data owner (the CFO) is the least-intrusive, fastest way to determine if the activity is legitimate (e.g., emergency board presentation) without tipping off an intruder or destroying volatile evidence. Isolation (A) would be correct only after confirmation of compromise; imaging (C) is premature; external escalation (D) skips internal verification.
Question 44
Q6. A critical Windows domain controller is scheduled for its monthly patch cycle. The security team runs an unauthenticated Nessus scan before maintenance windows and again after reboot. The second scan shows the same âCriticalâ plugin ID that was present before patching. Which conclusion is MOST defensible?
A. The plugin is a false positive because Microsoft patches cannot be rolled back.
B. The plugin may be a false positive if the scanner was not supplied domain credentials to verify the patch level accurately.
C. The plugin definitively proves the patch failed to install.
D. The plugin indicates a zero-day vulnerability for which no patch exists.
Correct Answer: B
Unauthenticated scans check banner information that can be misleading if the service did not update its version string or if the scanner lacks privileges to confirm the actual file versions. Without credentials, the scanner cannot reliably determine whether the patch is installed, making a false positive the most defensible explanation.
Question 45
Q1. A global SaaS provider has deployed an anycast-based DDoS-scrubbing service that advertises the same /24 prefix from 12 scrubbing centers. During a volumetric attack, the providerâs SOC notices that traffic destined to the scrubbed IP range is being black-holed in APAC although the scrubbing nodes in that region are operational and the BGP advertisements look stable. Which of the following anycast routing characteristics is the MOST likely root cause?
A. Local preference manipulation by an upstream APAC carrier is overriding the AS-path length.
B. The scrubbing centers are using TCP-MD5 passwords that are mismatched with the upstream providers.
C. A ROV (Route Origin Validation) filter is rejecting the anycast prefix in APAC because the RPKI ROA covers only the ARIN region.
D. The anycast nodes are advertising the /24 with the BGP NO_EXPORT community, preventing propagation outside each IBGP mesh.
Correct Answer: C
Route Origin Validation (RPKI) is increasingly enforced by regional carriers. If the ROA signed by the SaaS provider only lists ARIN-route origins, APAC carriers with strict ROV filters will drop the anycast announcement, causing the prefix to be unreachable (black-holed) even though the scrubbing nodes are up and the BGP session is stable. Local preference (A) would affect path selection but not cause outright black-holing. TCP-MD5 (B) would break the BGP session entirely, which the stem says is not happening. NO_EXPORT (D) would keep the prefix inside each providerâs AS, but the symptom described is black-holing, not lack of global reachability.
Question 46
Q5. A payment-card company is implementing a new Android mobile app that will store sensitive customer authentication data (SAD) temporarily in encrypted SharedPreferences while waiting for network connectivity. The app must remain PCI DSS compliant. The lead developer proposes using Androidâs Keystore-generated 256-bit AES key, encrypted with an RSA 2048-bit key also stored in the Keystore, and setting KeyGenParameterSpec.Builder.setUserAuthenticationRequired(true) with an authorization timeout of 30 seconds. The QSA objects that the solution may still violate PCI DSS requirement 3.2 (no storage of SAD after authorization). Which additional control BEST addresses the QSAâs concern?
A. Set setUserAuthenticationRequired(true) without any timeout so the key is unusable unless the user is present.
B. Store the data in RAM only and wipe the byte array once the network call succeeds.
C. Encrypt the data with a key derived from both the Keystore key and a server-side component, then delete the server component after authorization.
D. Use hardware-backed StrongBox and set setInvalidatedByBiometricEnrollment(true).
Correct Answer: C
By splitting the key so that the server supplies an ephemeral component that is destroyed after authorization, the mobile device can no longer decrypt SAD, thereby satisfying PCI DSS 3.2. Option A still allows local decryption within 30 s, Option B risks memory dumps, and Option D is a hardware requirement that does not guarantee post-authorization deletion.
Question 47
Q4. A manufacturer tags every laptop with an RFID label containing the serial number and employee name. An attacker walks through the cafeteria with a high-gain reader and harvests asset data. Which countermeasure BEST reduces the confidentiality risk without impeding legitimate inventory scans?
A. Replace RFID with barcodes so optical line-of-sight is required.
B. Store only a random 128-bit asset ID in the RFID tag and keep the mapping table in the CMDB.
C. Encrypt the serial number with AES-128 and put the ciphertext on the tag.
D. Shield the cafeteria with a Faraday cage to block unauthorised RF.
Correct Answer: B
A random surrogate identifier prevents disclosure of business-relevant data while still allowing quick inventory sweeps; the CMDB provides the correlation when needed. A eliminates RF risk but slows down inventory. C leaks metadata length and still exposes ciphertext that can be brute-forced. D is impractical and does not protect assets outside the cafeteria.
Question 48
Q7. A start-up stores customer selfies for facial recognition.
A. Encrypt the selfies with AES-256 and store the key in an HSM
B. Store only the biometric template (feature vector) produced by a one-way transformation keyed with a secret salt
C. Tokenise the selfie file name and store the mapping in a separate database
D. Use homomorphic encryption so matching can occur on ciphertext
Correct Answer: B
A salted, one-way transformation of the raw image into a feature vector irreversibly removes the ability to reconstruct the original face, yet the vector can still be used for comparison. AES (A) is reversible if the key is compromised. Tokenisation (C) does not change the biometric data itself. Homomorphic encryption (D) is still largely experimental and slow for 1:N.
Question 49
Q1. Your companyâs cloud-first initiative requires that all on-prem Active Directory (AD) accounts be synchronised to Azure AD.
A. Password hash sync with seamless SSO
B. Pass-through authentication (PTA) and password write-back
C. AD FS federation with token-signing certificate rollover
D. Azure AD Connect âdevice write-backâ and PTA
Correct Answer: B
Pass-through authentication keeps the on-prem AD as the sole credential validator; password write-back forces password changes made on-prem to be pushed immediately to Azure AD, which in turn invalidates existing SAML tokens and refresh tokens at the SaaS providers. Password hash sync (A) would still allow cached passwords to live for up to 10 min. AD FS (C) does not shorten SaaS-side caches. Device write-back (D) is irrelevant to password lifetime.
Question 50
Q10. A government agency runs a classified collaboration portal that enforces need-to-know using dynamic âcommunity of interestâ (COI) labels. Users can create ad-hoc COIs and invite others, but invitations must be approved by the data owner within 24 hours or the inviteeâs access is automatically rescinded. Which IAM pattern BEST implements this requirement in a way that is audit-friendly and resilient to clock skew?
A. Create an OAuth2 âurn:ietf:params:oauth:grant-type:device_codeâ flow; set the device-code lifetime to 24 hours; embed COI name in the scope; require data-owner callback to extend scope.
B. Use XACML policies with obligation expressions; issue 24-hour SAML assertions; policy enforcement point (PEP) queries policy information point (PIP) for approval flag before each access.
C. Store pending invitations in a blockchain smart contract; auto-revoke if not signed by data-owner within 1440 blocks.
D. Generate 24-hour X.509 attribute certificates; include COI attribute; run a cron job every minute to check approval table and publish new CRL.
Correct Answer: B
XACML obligations let the PEP enforce the âapprove within 24 h or denyâ rule in real time, while the PIP can consult a database timestamped with NTP to handle clock skew. All decisions are logged centrally for audit. Device-code flow (A) is designed for input-constrained devices, not document COIs, and offers no built-in approval hook. Blockchain (C) is overkill and cannot guarantee block time accuracy. Attribute certificates (D) require a heavyweight PKI and frequent CRL updates that still leave a window where revoked certs are considered valid.
Question 51
Q7. A SaaS company has 50,000 paying customers. Each customer can invite internal employees to use the SaaS. The product team wants to avoid storing any employee passwords and instead âlog in with your company credentials.â The Identity Engineer must pick a protocol that minimizes customer setup (no whitelist of IP addresses, no shared secrets) and works for customers that use Okta, AD FS, or Google Workspace. Which technology best fits?
A. SAML 2.0 with SP-initiated POST binding and automatic IdP discovery via email domain.
B. OAuth 2.0 Resource-Owner Password Credentials (ROPC) with customer-supplied client secrets.
C. LDAPS over the Internet tunneled through mutual TLS.
D. RADIUS with Microsoft NPS and customer-specific shared secrets.
Correct Answer: A
SAML with SP-initiated flow and email-domain-driven IdP discovery allows each customer to keep using its existing IdP (Okta, AD FS, Google) without exposing passwords to the SaaS and without pre-shared secrets. ROPC (B) requires the SaaS to handle passwords, violating the goal. LDAPS (C) and RADIUS (D) both need network-level trust and shared secrets, which the scenario forbids.
Question 52
Q5. A software companyâs board wants to measure the effectiveness of the security-awareness program. The company runs monthly phishing simulations; over six months the click-through rate dropped from 18 % to 5 %, yet two employees who never clicked still leaked credentials via a fake LinkedIn survey. Which metric should the CISO recommend to the board?
A. Replace click-through rate with mean time to report phishing (MTTR-P).
B. Add a lagging indicator: number of incidents traced to human error.
C. Switch to measuring training completion percentage only.
D. Stop simulations and invest in technical filters only.
Correct Answer: B
A lagging indicator (incidents caused by human error) captures credential leaks that bypass click-through tests, giving the board a risk-based outcome metric. A is useful but still leading; C ignores behavior change; D abandons human controls entirely.
Question 53
Q4. A manufacturer tags every CAD file with âConfidentialâ in the DLP system, but engineers routinely upload files to a partner extranet that is labeled âInternal.â End-users see no pop-up warnings and incidents are not logged. Which missing control is the PRIMARY cause of this policy violation?
A. Data ownership assignments are not documented in the asset inventory.
B. The DLP tool is not integrated with the classification metadata repository.
C. Role-based access control (RBAC) is missing from the extranet.
D. The retention schedule for CAD files has not been approved by Legal.
Correct Answer: B
If the DLP engine cannot read the fileâs classification label it cannot enforce the âConfidential â Internalâ rule. A, C, and D are good practices but are not the root cause of the silent failure.
Question 54
Q4. A SaaS provider offers a managed site-to-site VPN service that terminates IPSec inside its multitenant gateway. The provider supplies customers with a pre-configured ASA image that uses IKEv2, AES-GCM-256, PFS-group-21 and SHA-256 for integrity. The customerâs CISSP-certified architect is concerned that the provider could decrypt the traffic. Which IKEv2 parameter must the customer insist on generating and managing themselves to prevent provider decryption?
A. The DH-group-21 public value exchanged in IKE_SA_INIT.
B. The pre-shared-key (PSK) used in IKE_AUTH.
C. The ESP initialization vector (IV) for each SA.
D. The traffic-selective proxy certificate used for TLS inspection.
Correct Answer: B
With IKEv2 the pre-shared key (or the private key of a certificate) is the sole secret used to derive all session keys. If the provider knows the PSK it can derive the keys and decrypt the ESP traffic. The DH public value (A) is public by design; the IV (C) is random but not secret; TLS inspection certs (D) are irrelevant for IPSec.
Question 55
Q3. A company wants to replace its legacy SHA-1 HMAC-based one-time-password tokens. The new tokens must remain offline, cost under $8 each, and resist attacks even if the attacker gains physical possession of the token for several days. Which of the following token technologies BEST satisfies these constraints?
A. TOTP based on SHA-256 with a secure element
B. Event-based HOTP with a user-programmable EEPROM
C. U2F token with ECDSA private key stored in non-exportable memory
D. SMS-delivered OTP with PKI-based mutual authentication
Correct Answer: C
U2F tokens contain an ECC private key that cannot be extracted, resist replay and phishing, and remain under $8 in volume. SHA-256 TOTP (A) still exposes shared symmetric secrets to extraction. HOTP with EEPROM (B) allows key cloning. SMS (D) is online, not offline, and more expensive.
Question 56
Q2. During a crypto-agility audit you discover that a legacy e-commerce application hard-codes RSA-2048 for digital signatures and cannot be changed for 18 months. NIST predicts that RSA-2048 will drop to 112-bit security equivalence within 5 years. The business will not accept a shutdown. Which is the most risk-appropriate architectural step today?
A. Immediately turn off all digital-signature functionality until the code can be rewritten.
B. Layer an ECDSA-P256 signature on top of every existing RSA-2048 signature (dual signing) so that the weaker RSA can be dropped later.
C. Re-compile the application inside an SGX enclave so that the RSA key is âhardware protectedâ and therefore considered secure.
D. Generate a new 4096-bit RSA key pair, re-sign the old certificates, and continue using the same hard-coded algorithm.
Correct Answer: B
Dual signing with ECDSA-P256 provides a crypto-agile bridge: the existing RSA-2048 signatures remain verifiable while the stronger ECDSA layer assures long-term authenticity; RSA can be retired later without breaking compatibility. A is an availability killer. C does not strengthen the algorithm, only the storage. D doubles key size but keeps the same algorithmic weakness and may break compatibility with legacy clients that only support 2048-bit keys.
Question 57
Q4. A nation-state attack group is rumored to be targeting the power-grid sector with zero-day malware. A regional utilityâs risk register already lists ânation-state cyber attackâ as a very high impact but very low likelihood event. The board is concerned that the likelihood estimate is outdated. Which of the following sources would BEST support an updated, defensible likelihood estimate?
A. The companyâs historical incident database over the past five years
B. Industry-wide threat-intelligence sharing portals specific to energy-sector ICS attacks
C. The annual loss expectancy (ALE) calculated from last yearâs penetration-test findings
D. The vendor-selected CVSS scores of patches deployed in the last quarter
Correct Answer: B
Likelihood for low-frequency, high-impact events is best informed by sector-specific threat intelligence. Historical internal data (A) will be sparse for events that have not yet occurred. C relates to known vulnerabilities, not adversary intent. D measures severity of existing vulnerabilities, not probability of a nation-state attack.
Question 58
Q7. A multinational firm must comply with Schrems II and keep EU personal data inside the EU. Employees worldwide need low-latency access to a SaaS HR portal hosted in the U.S. Which architecture BEST satisfies both privacy and performance?
A. Regional MPLS to U.S. SaaS with TLS 1.3
B. Peer the SaaS provider with a local EU IaaS, store EU data there, and use a private L2VPN between SaaS POPs
C. Host a second instance of the HR portal in EU cloud and use geo-DNS with data-sync that keeps EU data in-region; global users hit nearest POP
D. Force all users through a U.S. VPN concentrator and log every query
Correct Answer: C
Data residency requires EU data to stay in the EU. Option C achieves this by running a separate instance in-region and using geo-DNS so EU users (and only EU data) stay local, while still giving global users low latency. Private L2VPN (B) still ships data to the U.S. VPN concentrator (D) fails residency and adds latency.
Question 59
Q1. A mobile-payment start-up is designing a new architecture that must allow micro-payments (⤠$0.50) to be approved even if the back-end is temporarily unreachable from the point-of-sale terminal. Which security engineering principle BEST supports the decision to cache a small, digitally signed âspending balanceâ on the terminal itself?
A. Economy of mechanism
B. Open design
C. Separation of duties
D. Psychological acceptability
Correct Answer: A
âEconomy of mechanismâ (keep the design as simple and small as possible) justifies storing only the minimal, signed data object needed to authorise micro-payments while offline. Open design (B) is about publishing algorithmsâirrelevant here. Separation of duties (C) addresses split authorization, not offline resilience. Psychological acceptability (D) concerns user convenience, not offline security logic.
Question 60
Q5. A software companyâs board wants to quantify cyber-risk in monetary terms for the annual report. The CISO proposes a FAIR analysis. Which FAIR component estimates the probable frequency of a threat event?
A. LEF (Loss Event Frequency)
B. TEF (Threat Event Frequency)
C. Vuln (Vulnerability)
D. TCap (Threat Capability)
Correct Answer: B
TEF is the rate at which a specific threat actor is expected to act against an asset. LEF is the subset of those events that become loss events after accounting for controls and vulnerability. Vuln describes the assetâs susceptibility, and TCap describes the attackerâs strength.
Question 61
Q8. A small SOC has two analysts on the night shift. A worm propagates at 01:48, generating 1,800 new alerts per minute. The SIEM auto-creates tickets, but the analysts spend 30 minutes trying to suppress the alert storm instead of containing the worm. After-action review shows the top three alert types were identical except for source IP. Which SOAR playbook component would BEST optimize future response?
A. Alert deduplication with sliding-window correlation
B. Threat-hunting hypothesis library
C. Manual approval step for firewall changes
D. Full packet-capture retention for 30 days
Correct Answer: A
Deduplication collapses identical alerts into a single ticket with a count, freeing analysts to act on the incident rather than wade through noise. A hunting library is proactive, manual approval slows response, and packet retention is forensic storage, none of which address alert volume.
Question 62
Q9. A smart-city command centre collects 30 000 events/second from roadside sensors. The architecture buffers events in Kafka, then a stream processor computes SHA-256 hashes and writes them to an immutable log for non-repudiation. An auditor warns that the design lacks âproof of integrity order.â Which additional cryptographic component BEST satisfies the auditor at the lowest performance cost?
A. Digitally sign every individual event with the sensorâs RSA private key
B. Compute a running SHA-256-chain (each hash includes the previous hash) and sign the chain tip every minute
C. Replace SHA-256 with SHA-3-512 to increase collision resistance
D. Encrypt each event with AES-GCM using a 96-bit IV
Correct Answer: B
A running hash chain (similar to blockchain linking) provides ordered integrity; periodic signing of the tip keeps asymmetric operations low (1 sign per minute vs 30 000/sec). Individual signing (A) is computationally prohibitive. SHA-3 (C) does not address order. AES-GCM encryption (D) provides confidentiality, not ordered non-repudiation.
Question 63
Q1. A global retailerâs CISO has mandated that every new mobile-point-of-sale (mPOS) application pass an independent security assessment before production release. The assessors are given only the compiled application package, a production-like device, and the public API documentationâno source code or design documents. Which type of assessment is being performed?
A. White-box
B. Gray-box
C. Black-box
D. Crystal-box
Correct Answer: C
The testers have zero internal knowledge (no source, no design); they must discover vulnerabilities solely through external interaction. This is the definition of black-box testing. White-box (A) and crystal-box (D) both imply full source access, while gray-box (B) would supply partial internal detail.
Question 64
Q7. A cloud SaaS vendor offers to sign ISO 27001 certification instead of answering a 300-line security questionnaire. The CISO needs to decide whether the certificate provides âadequate assurance.â Which of the following is the MOST reliable next step?
A. Accept the certificate because ISO 27001 covers all security controls.
B. Request the vendorâs most recent Statement of Applicability (SoA) and external audit report.
C. Require the vendor to obtain SOC 2 Type II instead.
D. Insist the vendor still complete the questionnaire.
Correct Answer: B
The SoA and independent audit report detail which Annex-A controls are in scope, any non-conformities, and compensating controls, giving the CISO evidence to map to the firmâs risk appetite. ISO 27001 does not prescribe specific controls, so A is false. C is redundantâboth ISO and SOC can provide assurance. D ignores efficient reuse of audit artifacts.
Question 65
Q9. A zero-trust architecture working group must choose a secure design for internal service-to-service RPC traffic that traverses a shared Layer-3 network. Requirements are mutual authentication, session confidentiality, and perfect-forward secrecy. All services already have x.509 certs from the corporate CA. Which approach BEST meets the goals with the LEAST operational change?
A. IPsec in tunnel mode with IKEv2 and ECDHE
B. Mutual TLS (mTLS) with TLS 1.3 and ECDHE key exchange
C. GRE over DMVPN with pre-shared keys
D. L2TPv3 with certificate-based EAP-TLS
Correct Answer: B
mTLS with TLS 1.3 natively provides mutual authentication, session encryption, and ECDHE-based perfect-forward secrecy using the existing certificates and requires no new tunnel overlay. IPsec tunnel (A) adds extra headers and complexity; DMVPN (C) is designed for site-to-site, not east-west service traffic, and pre-shared keys violate PFS if ever leaked; L2TPv3 (D) is a Layer-2 tunnel rarely used for service mesh and lacks native crypto.
Question 66
Q2. A hospitalâs internal audit department wants to verify that the newly deployed radiology picture-archiving system (PACS) enforces the same âneed-to-knowâ access rules that are documented in the HIPAA security policy. Which control-testing approach will give the auditors the highest assurance that the policy is effective for every active user account?
A. Interviewing the PACS administrator about how role-based access is configured
B. Inspecting the vendorâs white paper on embedded RBAC functionality
C. Selecting a random sample of user IDs and attempting to access restricted DICOM files
D. Reviewing the quarterly vulnerability-scan report for missing patches
Correct Answer: C
Only option C is a substantive test of operational effectivenessâauditors physically try to violate the policy and observe whether the system blocks them. Interviews (A) and vendor documents (B) are inquiry/inspection procedures that do not prove the control is working. Vulnerability scans (D) test patch state, not access control.
Question 67
Q3. A cloud-first enterprise uses a virtual firewall cluster in an IaaS VPC. The vendor states the cluster supports âactive-active high availability using gratuitous ARP.â During a patch window, both nodes briefly go offline because the cloud providerâs L2 fabric drops the gratuitous ARP frames. Which cloud networking characteristic caused the failure?
A. Multicast is not propagated inside the VPC.
B. The virtual switch ignores unsolicited ARP replies.
C. BGP route reflectors reset the ARP cache.
D. The provider uses proxy ARP with static MAC locking.
Correct Answer: B
Most public-cloud virtual networks silently discard gratuitous ARP to prevent MAC spoofing between tenants. The HA feature depended on G-ARP to move the floating MAC, so failover failed. Multicast (A) is unrelated to ARP. BGP (C) is Layer-3. Proxy ARP (D) would actually answer ARP, not drop it.
Question 68
Q6. [Scenario] A startup stores customer passwords using Argon2id with 1 MB memory cost, 8 parallelism, 3 iterations, and 32-byte salt. A penetration tester recovers the salt and hash for a single user and budgets USD 5,000 of AWS g4dn GPU time for cracking. Which single change to the password policy MOST reduces the probability of compromise without increasing user friction significantly?
A. Require 15-character minimum with no complexity rules
B. Add a 16-byte pepper stored in an HSM
C. Double the Argon2id iterations to 6
D. Force users to change passwords every 30 days
Correct Answer: B
A pepper (secret key) stored outside the authentication DB (ideally in an HSM) means the attacker cannot perform an offline brute-force attack even with the hash and salt. 15-char passphrases (A) help but are not as strong as a secret parameter unknown to the attacker; doubling iterations (C) only linearly increases cost; 30-day expiry (D) increases friction and does little against offline attacks.
Question 69
Q1. A multinational bank runs a legacy SWIFT gateway that still negotiates TLS 1.0 because two correspondent banks have not upgraded. The security team has placed the gateway in an isolated VLAN with strict ACLs, full-packet capture, and an inline TLS-aware IPS that can strip weak ciphers. During a routine audit, which residual risk remains the HIGHEST despite these compensating controls?
A. Downgrade attacks that force the session to SSL 3.0, exposing the transaction to POODLE
B. The IPS certificate-outage causing asymmetric routing and transaction replay
C. VLAN hopping via double-tagged 802.1Q frames that lets an attacker reach the gateway
D. Weak 3DES keys that let an attacker recover the plaintext after collecting 2³² blocks
Correct Answer: A
The IPS can strip weak ciphers but cannot prevent a man-in-the-middle from downgrading the handshake to SSL 3.0 if both ends still offer it (TLS 1.0 implementations often retain SSL 3.0 for âinteropâ). POODLE then recovers session cookies or credentials. The VLAN ACLs and packet capture do not stop ciphertext recovery at the endpoints; they only limit lateral movement and provide evidence. 3DES risk (D) is real but requires huge volumes; VLAN hopping (C) is mitigated by the switch configuration; IPS outage (B) is operational, not cryptographic.
Question 70
Q9. A mobile-only FinTech startup uses OAuth 2.0 Authorization Code with PKCE to obtain access tokens from its own authorization server. The server supports refresh-token rotation (new refresh token with each access-token request). Pen-testers demonstrated that if an attacker steals a single refresh token he can replay it repeatedly within the 60-second network race window and obtain multiple valid access/refresh-token pairs, defeating rotation.
A. Reject the old refresh token only after the response is committed to the client, and implement a 5-second reuse grace period tied to the tokenâs jti claim.
B. Stop issuing refresh tokens; force users to re-login every hour.
C. Bind each refresh token to the deviceâs hardware fingerprint in the tokenâs hash.
D. Switch to implicit grant.
Correct Answer: A
A short grace period (jti replay cache) allows the client to receive the new pair while safely invalidating the old one, closing the concurrency window. Binding (C) mitigates theft but not replay from the same device; hourly login (B) hurts UX; implicit grant (D) is deprecated and removes refresh entirely.
Question 71
Q8. A cloud-native team is building a CI/CD pipeline in AWS. The buildspec.yml file needs to retrieve the database password from AWS Secrets Manager, run integration tests, then destroy the RDS instance. The team wants to minimize the risk of accidental password leakage in build logs. Which approach is the MOST secure and operationally simple?
A. Export the password as an environment variable and mark the CodeBuild project with âsecure-environment-variablesâ set to true.
B. Use the Secrets Manager GetSecretValue API inside the build script, assign the value to a bash variable, and overwrite it with an empty string after the test step.
C. Store the password in AWS Systems Manager Parameter Store (SecureString) and reference it directly in the buildspec using ââparameter-overrideâ without printing it.
D. Let the build job assume an IAM role that can only read the secret, retrieve the secret, mask the variable in CodeBuild logs, and unset it after use.
Correct Answer: D
AWS CodeBuild can automatically mask secrets retrieved via the Secrets Manager plugin when the build job assumes an IAM role with least privilege. This keeps the plaintext out of logs and avoids custom overwrite code. Option A still risks echoing the variable, Option B relies on developer discipline, and Option C does not natively mask values.
Question 72
Q4. A cloud-native company uses QUIC for its public API. The CISO wants to block outbound data exfiltration without decrypting end-to-end encrypted streams. Which control gives the BEST trade-off between privacy and visibility?
A. Deploy a transparent proxy that strips QUIC and falls back to HTTP/2 for inspection
B. Force UDP/443 to TCP/443 via a firewall and inspect standard TLS
C. Use eBPF on the host to sample QUIC SNI and entropy of first application data to detect tunneling
D. Block QUIC entirely and whitelist only CDNs that support TCP-TLS
Correct Answer: C
eBPF can read unencrypted parts of QUIC (SNI, length, timing) and apply heuristics (high entropy, long duration) to flag C2 or exfil without full MiTM, preserving end-to-end encryption. Stripping QUIC (A) breaks the protocol and user experience; TCP fallback (B) is unreliable and still needs certificates; blanket block (D) harms performance and does not stop other UDP tunnels.
Question 73
Q3. Your organization uses a single Active Directory forest with fine-grained password policies. A red-team exercise discovers that 11 service accounts are configured with âPassword never expiresâ and are members of Domain Admins. The accounts have SPNs defined and show no failed logins in 400 days. Management refuses to disable them because âlegacy billing needs them.â
A. Convert each account to a group Managed Service Account (gMSA) and force Kerberos delegation restrictions.
B. Schedule a quarterly 90-character password change and require smart-card pre-authentication.
C. Document the risk as accepted and add compensating detective controls (SIU alerts on any new interactive logon).
D. Remove SPNs, lower rights to Domain User, and create new dedicated user accounts for billing.
Correct Answer: A
gMSAs give automatic, cryptographically random 240-byte passwords managed by the domain, eliminating manual expiry management while retaining the ability to use Kerberos SPNs. gMSAs cannot be used interactively, reducing lateral-movement risk, and can be scoped to specific hosts via msDS-HostServiceAccount. This solves both the ânever expiresâ and the âDomain Adminâ issues without breaking the billing service.
Question 74
Q7. A cloud vendor offers a âshared responsibility matrixâ that states: âCustomer is responsible for encrypting data in transit; provider is responsible for encrypting data at rest.â The customer CISO discovers that the providerâs âat-rest encryptionâ uses transparent disk encryption with keys held in the same tenant account. Government subpoenas could therefore compel the provider to hand over unencrypted data. Which risk remains despite the providerâs claim of âencryption at restâ?
A. Jurisdictional insider threat
B. Residual data remanence
C. Vendor lock-in
D. Key-custodian conflict of interest
Correct Answer: D
The provider is both data processor and key custodian, creating a conflict (D) that negates the protective value of encryption against lawful access requests. Insider threat (A) is broader and less specific. Remanence (B) is irrelevant to live data. Lock-in (C) is an economic, not confidentiality, risk.
Question 75
Q9. A security guard making night rounds notices a cardboard box labeled âHP Tonerâ sitting outside the secure print-room door. The next morning the CFOâs printer is found to have a hardware key-logger installed inside the device.
A. Review CCTV for anyone accessing the printer after toner delivery; treat the box as potential evidence and secure it.
B. Dispose of the box; it is unrelated to the key-logger found 12 h later.
C. Scan the box for fingerprints; if none, discard.
D. Alert procurement; HP must have shipped a counterfeit cartridge.
Correct Answer: A
The box is physical evidence that may contain fingerprints, DNA, or tracking numbers linking to the adversary. CCTV correlation can establish timeline and attribution. Chain-of-custody must start immediately.
Question 76
Q1. A global retailer is about to begin its first fully-remote PCI-DSS assessment because auditors are not allowed on-site due to a pandemic travel ban. The QSA firm proposes using video-conference walk-throughs, screen-share configuration reviews, and a couriered âevidence-collection laptopâ that will be shipped back encrypted. Which of the following findings should concern the retailerâs CISO the MOST before the assessment begins?
A. The QSA will rely on screenshots provided by internal IT staff instead of direct console access.
B. The couriered laptop uses a consumer-grade cloud backup service that is not in the retailerâs approved vendor list.
C. The video-conference sessions will be recorded and stored on the QSAâs European servers, potentially violating the retailerâs data-residency policy.
D. The QSA contract does not require the firm to maintain an attestation that all original video evidence was destroyed after the report is issued.
Correct Answer: A
Screenshot evidence that is collected and curated by the staff being audited breaks the basic audit principle of independence and reliable evidence (PCI DSS Req. 11.3.4 and ISA 500). Options B, C, and D introduce secondary risk (vendor management, privacy, retention), but the inability to obtain objective, first-hand evidence directly under the QSAâs control is the most fundamental threat to the validity of the assessment.
Question 77
Q1. A multinational retailer is preparing to migrate its on-premise customer-analytics platform to a public PaaS offering. The data set includes 30 million customer records classified as âConfidential â EU Residents.â The cloud providerâs shared-responsibility brief states that the customer is responsible for âdata classification, labeling, and privacy controls.â Which action is MOST critical before the migration kicks off?
A. Negotiate a right to audit clause into the new cloud contract so internal auditors can re-classify the data after it lands in the providerâs object store.
B. Re-label every field in every database with the providerâs proprietary taxonomy so that object tags follow the retailerâs data dictionary.
C. Map each GDPR data category to the providerâs labels, then tag data at the object level so retention, locality and deletion obligations travel with the asset.
D. Export the data to an encrypted tape archive so the original classification labels remain intact in off-line storage.
Correct Answer: C
Asset Security (Domain 2) requires that classification and labeling persist throughout the life-cycle, especially when responsibility shifts to a cloud shared-responsibility model. Option C ensures that EU-privacy obligations remain bound to the data set even when it moves to the PaaS object store. A is useful but reactive; classification must already be in place before migration. B merely adopts the vendorâs taxonomy without guaranteeing alignment to GDPR categories. D removes the data from the architecture instead of securing it in its intended environment.
Question 78
Q8. A public certificate authority is creating a new root CA that must remain valid for 25 years but wants to reduce the impact of a future cryptographic break against RSA-4096. Which key-management technique BEST aligns with NIST SP 800-57 guidance for long-lived trust anchors?
A. Generate a single RSA-4096 root key and publish a 25-year CRL expiry
B. Generate an RSA-4096 root key and an offline ECDSA P-521 standby key, with the root certificate containing both public keys
C. Use a 2048-bit RSA key rolled every 3 years via re-issuance of the root
D. Store the root private key in an HSM and delete the public key from all repositories
Correct Answer: B
Dual-key root with algorithms of different mathematical problems (RSA vs ECC) provides crypto-agility without requiring immediate rollover. Single long-lived RSA (A) has no agility. 2048-bit (C) is below current best practice for 25-year roots. Deleting the public key (D) breaks the chain of trust.
Question 79
Q3. A SaaS providerâs customer demands a right-to-penetrate clause in the new contract. The providerâs data-center is hosted in AWS, and the customer wants to run unrestricted âRed Teamâ exercises including brute-force, DDoS, and social-engineering against production. Which of the following is the PRIMARY control the provider should insist upon BEFORE authorizing the test?
A. A signed ârules of engagementâ document that includes emergency contacts, escalation paths, and a âget-out-of-jail-freeâ letter.
B. Proof that the customer maintains a standalone cyber-insurance policy with a minimum limit of USD 5 million.
B. (duplicate) A requirement that the customer use only (ISC)²-certified testers.
D. A clause that any findings must be reported within 24 hours under NDA.
Correct Answer: A
A formal rules-of-engagement (RoE) document is the primary safeguard to prevent collateral damage, define scope, and provide legal authorization (sometimes called âget-out-of-jail-freeâ). Insurance (B) is secondary, certification (C) is not required by CISSP best practice, and timely reporting (D) is good but does not mitigate operational/legal risk during the test.
Question 80
Q6. A critical ERP system has been in production for ten years; original developers are no longer with the company. Penetration testers discover a SQL-injection flaw in a proprietary module. Source-code escrow exists, but the escrow agent reports the deposit package is âincomplete â no build instructions.â Which type of assessment is MOST appropriate BEFORE the vendor can issue an emergency patch?
A. White-box fuzzing on the provided source fragments.
B. Black-box dynamic testing combined with reverse engineering.
C. Gray-box testing with read-only access to the production database.
D. Static binary analysis on the compiled libraries.
Correct Answer: B
With incomplete source, testers must treat the system as a black box and use dynamic testing plus reverse engineering to understand the flaw and verify any compensating controls. White-box (A) is impossible without buildable code, gray-box (C) does not address the module layer, and static binary analysis (D) alone may miss runtime behavior.
Question 81
Q10. A company is evaluating two static-analysis solutions for its Java codebase. Tool X reports 300 findings per KLOC with a false-positive rate of 45 %. Tool Y reports 30 findings per KLOC with a false-positive rate of 5 %. The development team has limited bandwidth to triage findings. Which tool BETTER aligns with the ârisk-basedâ secure-code strategy advocated by CISSP?
A. Tool X, because more findings indicate deeper analysis and therefore higher security coverage.
B. Tool Y, because a low false-positive rate encourages developer trust and rapid remediation of true positives.
C. Tool X, after tuning its rules to reduce false positives, because it covers more vulnerability categories.
D. Neither; static analysis should be abandoned in favor of manual code review.
Correct Answer: B
Risk-based security prioritizes actionable intelligence. A 45 % false-positive rate erodes developer confidence and wastes scarce resources, leading to âalert fatigueâ and ignored true positives. Tool Yâs low noise ratio ensures that each flagged issue is likely real and worth fixing, aligning with the CISSP principle of cost-effective control selection. Tuning (C) is possible but not guaranteed; the question asks which is better âas-is.â Abandoning SAST (D) contradicts defense-in-depth.
Question 82
Q4. A multi-national bank operates its own PKI. A new regulation requires that private keys for TLS server certificates be stored in FIPS 140-2 Level 3 hardware and that no individual operator can generate, approve, and install a certificate alone.
A. HSM with m-of-n smart-card split-knowledge for the HSMâs authentication key plus certificate-template approval workflows in the CA.
B. Store keys in software and require two-person approval in the ITSM ticket before the Linux admin runs openssl req.
C. Use a cloud KMS and enable IAM policy requiring two service-account roles to sign a CSR.
D. Implement ACME protocol with DNS-01 challenge and require two DNS admins to approve the TXT record.
Correct Answer: A
Only an on-prem HSM (or cloud HSM) provides FIPS 140-2 Level 3 key storage; m-of-n split-knowledge enforces dual control for key usage, while CA workflow enforces separation of duties for certificate issuance. Software keys (B) fail Level 3, cloud KMS (C) is usually Level 2, and ACME (D) does not govern key generation.
Question 83
Q1. A multinational bank is designing a new public-cloud-based payment platform that must remain available 24Ă7 even if an entire AWS region fails. The solution must guarantee that no customerâs ledger record can ever be lost or rolled back after a transaction is acknowledged to the customer.
A. Deploy the ledger service in Multi-AZ RDS with automated daily snapshots.
B. Use a containerized ledger micro-service fronted by an ALB and backed by S3 cross-region replication.
C. Replicate the ledger across three regional DynamoDB tables that use global tables with write-through to an immutable write-ahead log stored in S3 Object Lock.
D. Mirror the ledger database to a standby EC2 instance in a second AZ using block-level replication.
Correct Answer: C
Global tables give multi-region active-active availability; S3 Object Lock with write-through logging provides non-repudiation and prevents loss or rollback. A and D are single-region and can lose data during a regional outage. B offers no strong consistency or durability guarantee for financial records.
Question 84
Q5. During a control self-assessment workshop, the facilitator asks business-unit owners to rate fraud-detection controls as âadequateâ or âinadequate.â Historically, 95 % are marked âadequate,â but external audit findings repeatedly cite fraud-control gaps. Which facilitation technique would BEST reduce this rating bias?
A. Replace the binary rating with a 1â5 Likert scale
B. Introduce anonymous, electronic voting with pre-work that includes actual fraud-incident data
C. Invite the internal audit team to present last yearâs findings at the start of the workshop
D. Require every âadequateâ vote to be accompanied by a compensating control narrative
Correct Answer: B
Anonymous voting plus data-driven pre-work minimizes groupthink and social-desirability bias, producing more honest self-assessments. A Likert scale (A) still allows inflated scoring, merely with more granularity. While IA presentations (C) and control narratives (D) help, they do not eliminate the pressure to conform that anonymity addresses.
Question 85
Q2. During a secure-code review of a new REST API, the security architect discovers that the â/admin/backupâ endpoint accepts a âpathâ query parameter which is concatenated directly with a base directory and passed to the operating system to create a zipped backup. The developer argues the code is safe because it strips â..â sequences and because the service runs as a low-privilege account. Which attack is STILL possible against the endpoint?
A. Server-Side Request Forgery (SSRF)
B. Local File Inclusion / Path Traversal
C. XML External Entity (XXE)
D. Insecure Direct Object Reference (IDOR)
Correct Answer: B
Black-list filtering of â..â is notoriously insufficient; alternate encodings (e.g., â..%252fâ, Unicode overlong sequences, or absolute symlinks) can still traverse outside the intended directory. Because the parameter ultimately reaches the OS file system API, the flaw is a classic path traversal / local file inclusion. SSRF (A) requires the app to fetch remote URLs, XXE (C) requires XML parsing with external entities enabled, and IDOR (D) is about access-control on objects, not file-system traversal.
Question 86
Q7. A gaming company collects player biometric data (face & gait) for anti-cheating. Regulations require that personal data be deleted once the âprocessing purposeâ ends. The company keeps hashes of the biometric templates because engineers claim âhashes canât be reversed.â Which statement creates the GREATEST compliance risk?
A. Hashed biometric data are still considered personal data because they can be used to single out individuals.
B. Deletion of the original images satisfies the purpose-limitation principle.
C. Salting the hashes would make the data non-personal.
D. Hashes reduce storage cost and therefore align with data-minimization.
Correct Answer: A
Under most modern privacy laws, any identifier that can be linked back to an individualâeven irreversible hashesâremains personal data. Therefore retaining the hashes still triggers deletion obligations. B is wrong because templates remain; C is wrong because salting does not anonymize biometrics; D confuses cost with legal minimization.
Question 87
Q9. A retail chain performs quarterly PCI DSS wireless scans at all 800 stores. The QSA discovers that two new pop-up stores were opened for the holiday season but were not scanned. Which control failure MOST contributed to this gap?
A. Lack of an updated asset inventory that triggers inclusion in the scan schedule
B. Use of WPA3 encryption instead of WPA2
C. Absence of an intrusion-detection system on the pop-up store network
D. Failure to rotate default SNMP community strings
Correct Answer: A
PCI DSS req. 11.1 mandates a quarterly wireless scan of all in-scope facilities. An accurate, up-to-date asset inventory (including new pop-up stores) is the trigger that ensures these sites are added to the scan schedule. Without it, the stores were simply overlooked. Encryption choice (B), IDS (C), or SNMP strings (D) are unrelated to scan coverage.
Question 88
Q4. A start-up uses a serverless (Lambda) architecture. A developer inadvertently hard-coded AWS access keys in a public GitHub repo. Within 10 minutes, an attacker used the keys to spin up 500 EC2 instances for crypto-mining, costing USD 8,000. Which preventative control would have MOST effectively stopped the exploit?
A. Rotate IAM access keys every 24 hours via an automated Lambda job.
B. Attach an IAM permissions boundary that denies ec2:RunInstances regardless of the user or key.
C. Enable AWS CloudTrail and configure billing alerts.
D. Store secrets in AWS Systems Manager Parameter Store and reference them via an environment variable encrypted with KMS.
Correct Answer: B
A permissions boundary acts as an IAM âsandbox,â capping the maximum permissions even if credentials leak. Denying ec2:RunInstances would have neutered the attacker immediately. Rotation (A) shortens exposure but does not prevent exploitation within the window. CloudTrail and billing alerts (C) are detective, not preventative. Secure secret storage (D) is good practice but does not constrain what legitimate (or stolen) credentials can do.
Question 89
Q4. An organization uses a risk-based approach to determine how often critical servers are scanned for vulnerabilities. Last quarter the vulnerability-management team discovered that a critical Apache Struts flaw was patched on only 30 % of servers within the SLA window. Management has now mandated more frequent scanning. Which metric BEST justifies the additional resources being requested?
A. Mean time to remediate (MTTR)
B. Percentage of high-risk findings open longer than SLA
C. Number of assets scanned per week
D. CVSS average score of vulnerabilities discovered
Correct Answer: B
The failure to meet the patching SLA is directly captured by the percentage of high-risk findings open longer than SLA (B). MTTR (A) is a time-based average but does not show compliance with policy. Scanning more assets (C) or the average CVSS (D) does not measure remediation performance.
Question 90
Q6. A city government is deploying body-worn cameras for police officers. Civil-rights groups worry that footage could be used for unauthorized facial-recognition surveillance. Legally, the police department can record in public spaces, but the mayor wants to demonstrate ethical data use. Which risk treatment option BEST addresses ethical concerns while remaining compliant with the law?
A. Avoid the risk by canceling the camera program entirely
B. Transfer the risk by requiring the camera vendor to indemnify the city against privacy lawsuits
C. Mitigate the risk through policy prohibiting facial-recognition processing of footage without court order and conduct annual audits
D. Accept the risk because the recording activity itself is legal
Correct Answer: C
Ethical risk is still risk; mitigation via policy and audit demonstrates due care and maintains public trust. A is an extreme business-negative. B does not prevent reputational damage. D ignores stakeholder trust and could increase liability if misuse occurs.
Question 91
Q4. A hospitalâs medical-device VLAN is air-gapped except for a one-way diode that exports syslog UDP packets to the SOCâs log lake. During an unannounced audit, the assessor plugs a laptop into the diodeâs receive port and successfully sends SNMP set commands back to an MRI machine, changing its field-strength calibration. Which security-operations control has MOST clearly failed?
A. Data integrity of logs
B. Unidirectional security gateway enforcement
C. Media sanitization
D. Continuous vulnerability management
Correct Answer: B
A true data-diode hardware enforces unidirectional flow at the physical layer (optical or electrical). The fact that the auditor could send commands back proves the diode was misconfigured or was actually a bidirectional bridge, defeating the control. Log integrity, media sanitization, and vulnerability management are not relevant to the failure of enforced one-way traffic.
Question 92
Q6. An organisation runs a legacy web application that can only support static 56-bit DES keys for TLS. Compliance requires âadequate cryptographic strength.â Which compensating control is MOST acceptable from a risk-management perspective?
A. Place the application behind a TLS 1.3 reverse proxy that re-encrypts traffic to the backend using 128-bit AES.
B. Tunnel all browser connections through an IPsec VPN using AES-256, then allow plain HTTP on the LAN segment.
C. Accept the risk and document it in the risk register because DES is still resistant to brute force for short sessions.
D. Upgrade the application to support 3DES-168.
Correct Answer: A
A modern reverse proxy offloads strong cryptography to the client while speaking legacy crypto only on the trusted backend link. B creates an extra VPN hurdle for users and still leaves internal traffic unencrypted. C ignores compliance. D may be impossible (legacy binaries) and 3DES is also deprecated.
Question 93
Q1. A global retailer is migrating its PCI-DSS in-scope payment traffic from dedicated 1 Gbps MPLS links to an SD-WAN fabric that dynamically chooses between multiple underlay transports (MPLS, DIA, LTE). The CISO is concerned that, on some paths, traffic will traverse the public Internet without encryption. Which SD-WAN feature should the architect enable to ensure continuous confidentiality no matter which path is selected?
A. Application-aware QoS policies
B. Always-on, transport-independent AES-256 VPN tunnels
C. Dynamic path selection based on SLA probes
D. Split tunneling for card-holder-data traffic
Correct Answer: B
SD-WAN creates an overlay; to guarantee confidentiality when traffic may traverse untrusted networks (e.g., DIA or LTE), the overlay must be encrypted end-to-end with a cipher such as AES-256. Option B provides that persistent encryption regardless of the underlay. QoS (A) and path selection (C) do not address confidentiality. Split tunneling (D) would actually expose traffic.
Question 94
Q10. A CISO commissions a continuous control-monitoring dashboard that pulls logs from firewalls, IAM, and vulnerability scanners. After launch, the number of open âcriticalâ findings spikes from 30 to 300, triggering board concern. An independent review finds that the new data sources use different severity taxonomies. Which security-assessment foundational step was missed?
A. Control mapping
B. Data normalization
C. Threat-modeling update
D. Key-risk-indicator baselining
Correct Answer: B
Combining data without normalizing severity scales produces an apples-to-oranges aggregation that invalidates the metric. Control mapping (A) relates controls to frameworks, threat modeling (C) identifies new risks, and baselining (D) sets reference points, but none address the immediate comparability problem.
Question 95
Q4. An enterprise 802.1X WLAN uses EAP-TLS with client certificates issued by the internal PKI. A new BYOD policy allows employees to onboard their personal phones using EAP-TTLS-PAP so that only user credentials (not device certs) are required. The security team discovers that a supplicant configured with TTLS can still connect to the original SSID that is intended for EAP-TLS only. Which hardening step BEST prevents this protocol downgrade?
A. Deploy a separate physical WLC for BYOD and anchor it to a DMZ controller.
B. Configure the AAA server to return different Filter-Id attributes based on EAP method.
C. Create two different RADIUS policy sets on the NPS server and enforce EAP-TLS in the first set.
D. Enable âEAP chainingâ so that both user and machine auth are mandatory.
Correct Answer: C
On Microsoft NPS (or any AAA server) you can create policy sets that tie an SSID to a specific EAP type. By restricting the corporate SSID policy set to only EAP-TLS, any client attempting TTLS will hit no matching policy and be rejected. Separate WLCs (A) adds cost and complexity without addressing the protocol negotiation. Filter-Id (B) can assign VLANs post-auth but cannot reject the wrong EAP method. EAP chaining (D) is a Cisco proprietary feature that still allows TTLS if the client doesnât support chaining, so it does not enforce TLS-only.
Question 96
Q1. A global e-commerce company is adopting a DevSecOps model. The CISO wants to ensure every pull request to the âmainâ branch is automatically assessed for security defects before human code review.
A. Configure static application security testing (SAST) in the CI pipeline gated by a quality gate that fails the build on high-severity findings.
B. Run dynamic application security testing (DAST) immediately after each microservice is deployed to staging.
C. Require two-person manual code review for every pull request and document the review in the ticketing system.
D. Schedule quarterly third-party penetration tests and block releases until high findings are retested.
Correct Answer: A
DevSecOps demands âshift-leftâ security that is automated, fast, and developer-centric. SAST analyzes source code or compiled artifacts without executing the program and can run in milliseconds inside the CI pipeline, gating the merge via quality gates. DAST (B) occurs too late; manual review (C) is human-intensive and inconsistent; quarterly pen tests (D) are point-in-time and cannot block every pull request.
Question 97
Q5. A SaaS vendor offers a multi-tenant HR platform. Each corporate customer wants to provision users from its own on-premise AD and enforce group-based access inside the SaaS. The vendorâs database has a single âUsersâ table that uses a UUID primary key. Which data-modeling approach BEST preserves referential integrity while allowing customers to bring their own identity provider?
A. Add a âcustomer_idâ column and store the customerâs internal AD DN as the authoritative external_id
B. Create one database schema per customer and replicate the SaaS authorization tables inside each schema
C. Introduce a federated-linking table that maps (customer_id, external_id) to the platform-wide UUID
D. Hash the userâs email address and use that as the global primary key
Correct Answer: C
A federated-linking table isolates the vendorâs internal UUID from every customerâs external identifier, supporting multiple IdPs, mergers, and email changes without altering core tables. Per-customer schemas explode operational cost, DN storage ties the app to LDAP specifics, and email hashing collides when employees change employers.
Question 98
Q8. A companyâs IoT deployment uses LoRaWAN Class A devices that only transmit after receiving two clear-channel acknowledgements. The security audit shows that an attacker with a cheap SDR can replay the join-accept message and hijack the session. Which LoRaWAN 1.1 feature prevents this replay attack?
A. AppNonce randomised by the join server and signed with the device-specific AppKey.
B. JoinNonce incremented by the network server and verified by the device.
C. MIC (Message Integrity Code) computed over the entire join-request frame.
D. AppSKey rotated every 24 hours by the application server.
Correct Answer: B
LoRaWAN 1.1 mandates that the network server increment JoinNonce for every join-accept; the device rejects any JoinNonce value it has already seen, preventing replay. AppNonce (A) is random but not sequential. MIC (C) protects integrity, not replay. AppSKey rotation (D) is after session establishment and does not stop join-accept replay.
Question 99
Q2. A hospital uses IEEE 802.11ac Wi-Fi for both guest Internet and patient-monitors that transmit HL7 messages. The CIO wants to segment the two traffic types without deploying a second set of APs. The solution must prevent a guest user from sending malicious packets to a patient-monitor and must work with existing tablets that only support WPA2-PSK.
A. Broadcast two SSIDs, map each to a different VLAN, and use a firewall between VLANs.
B. Deploy WPA3-Enterprise on the same SSID and assign group policies through a NAC.
C. Force all tablets to use 802.1X with EAP-TLS, then tag traffic with VXLAN.
D. Enable Wi-Fi Multimedia (WMM) power-save to reduce the duty cycle of guest traffic.
Correct Answer: A
Dual-SSID designs are the simplest way to achieve Layer-3 segmentation on a single AP infrastructure. Each SSID is mapped to a unique VLAN; an inline firewall filters inter-VLAN traffic, blocking guests from reaching the medical device subnet. WPA3-Enterprise (B) and 802.1X/EAP-TLS (C) are incompatible with the stated tablet limitation (WPA2-PSK only). WMM power-save (D) affects battery life, not segmentation or security policy.
Question 100
Q4. A company is implementing a zero-trust network architecture. All east-west traffic between micro-services inside the same Kubernetes cluster must be mutually authenticated and encrypted. Which technology BEST fulfills the requirement without changing application code?
A. Overlay network using VXLAN with AES-GMAC.
B. Service mesh (e.g., Istio) with mTLS between sidecar proxies.
C. IPSec tunnels between each worker node.
D. TLS passthrough on an ingress controller.
Correct Answer: B
A service mesh injects sidecars that perform mutual TLS transparently to the workload. A only gives network segmentation, not mutual authentication. C encrypts node-to-node but not pod-to-pod. D terminates TLS at the edge, not inside the cluster.
Question 101
Q1. A multinational bank is preparing to enter a new Asian market where the regulator requires all customer data to be âkept in-countryâ and accessible to domestic intelligence services on demand. The CISOâs risk assessment shows that the local data-centre operator has never obtained an ISO 27001 certification and the countryâs corruption index is rated âhigh.â Executive management still wants to proceed for strategic-reasons. Which risk-handling option is MOST consistent with fiduciary duty to shareholders?
A. Accept the risk and document the rationale in the risk register once the contract is signed.
B. Avoid the risk by abandoning the market entry and surrendering first-mover advantage.
C. Transfer the risk by buying an insurance policy that covers regulatory fines and civil damages.
D. Mitigate the risk by negotiating contractual security controls, right-to-audit clauses, and a comprehensive cyber-insurance policy that names the bank as loss-payee.
Correct Answer: D
Mitigation (D) reduces likelihood and impact to a level commensurate with the strategic reward while preserving market entry; residual risk can then be accepted by the board. Accept (A) without first lowering the risk would breach fiduciary duty given the high inherent risk. Avoid (B) is unnecessarily conservative and ignores business strategy. Transfer alone (C) does not satisfy the regulatory requirement that the bank remain ultimately responsible for data protection; insurance is only a financial back-stop, not a control.
Question 102
Q3. During a secure-boot review of an embedded point-of-sale device, the security architect discovers the vendorâs UEFI firmware accepts firmware-signed updates using 1024-bit RSA and SHA-1. Which attack is MOST likely to succeed against this device?
A. Collision attack on the SHA-1 firmware hash allowing malicious firmware to load with a valid RSA signature.
B. Timing attack on the 1024-bit RSA decryption routine that recovers the deviceâs private update key.
C. Fault-injection attack that downgrades the firmware to an older, vulnerable version still signed with SHA-1.
D. Birthday attack against the 1024-bit RSA modulus that factorises the public key in tractable time.
Correct Answer: D
1024-bit RSA is within reach of nation-state factorisation; once the modulus is factored, an attacker can sign any malicious firmware. A is wrong because SHA-1 collisions do not break RSA signaturesâan attacker still needs to forge the RSA signature. B is a side-channel but much harder to exploit remotely. C is possible but not the most likely given the weak RSA key length.
Question 103
Q5. A company runs a bug-bounty program that has received over 500 valid submissions in the last year. The CISO wants to integrate vulnerability data into the annual risk assessment. Which step is MOST critical to ensure the data is suitable for risk-scoring?
A. Map each bug to the affected asset in the CMDB and re-calculate likelihood based on exploitability
B. Publish the top-ten researchers on the corporate web site to encourage participation
C. Cross-reference each bounty submission with internal penetration-test findings and discard duplicates
D. Request that researchers provide a CVSS v4 environmental score
Correct Answer: A
Risk assessment requires asset-centric, likelihood, and impact data. Mapping bounties to configuration items in the CMDB and adjusting likelihood with real-world exploitability converts raw bug data into risk input. Publicizing researchers (B) is marketing; de-duplication (C) is good hygiene but insufficient for risk scoring; and researchers cannot realistically provide environmental scores (D) without inside knowledge.
Question 104
Q1. A multinational bank is designing a new public-cloud-based payment platform that must process transactions in 28 countries with differing data-sovereignty laws. The lead architect proposes a single âunified data fabricâ that replicates all transaction logs to five global zones for performance and resiliency. The CISO objects, arguing the design violates several jurisdictional requirements that forbid certain account data from leaving its country of origin. Which security principle is MOST clearly at risk if the design is approved as proposed?
A. Layering
B. Abstraction
C. Privacy as a component of security
D. Least common mechanism
Correct Answer: C
Privacy as a component of security requires that personal data be handled according to the legal privacy rules of the jurisdiction in which it is collected. Replicating data across borders without regard to sovereignty laws directly threatens this principle. Layering (A) is about multiple controls, not data residency. Abstraction (B) hides complexity but does not address legal data placement. Least common mechanism (D) is about avoiding shared resources that can create single points of compromise, irrelevant here.
Question 105
Q6. A SaaS vendor offers an âattribute-based access controlâ (ABAC) engine that evaluates XACML policies. Your organization wants to grant contractors access to engineering documents only when (1) they are on-site, (2) using a corporate laptop, and (3) connected to the trusted VLAN. Which attribute category is MOST likely to be missing or unreliable in the XACML request, and how should it be obtained?
A. Subject attribute âon-siteâ â query the contractorâs smartphone GPS.
B. Resource attribute âclassificationâ â scrape the document footer with NLP.
C. Environment attribute âtrusted VLANâ â embed the VLAN ID in a SAML assertion.
D. Action attribute âreadâ â hard-code it in the policy because it is static.
Correct Answer: C
The VLAN ID is an environment attribute that the PEP (Policy Enforcement Point) must assert. Because the userâs deviceânot the userâmust be on the VLAN, the most reliable method is for the network switch or 802.1X service to embed that fact in a security assertion consumed by the PEP. GPS (A) is spoofable and privacy-invasive. Resource classification (B) is irrelevant to the scenarioâs constraints. Action âreadâ (D) is already known by the PEP and does not solve the trust problem.
Question 106
Q1. A global manufacturing firm is replacing its MPLS WAN with an SD-WAN overlay that will send all branch-to-branch traffic through encrypted tunnels across the public Internet. The CISO wants to ensure that the change does not create a âpassive-decrypt-then-re-encryptâ point inside the providerâs cloud. Which architectural control best meets this requirement?
A. Require TLS 1.3 with perfect-forward-secrecy cipher suites on every overlay tunnel.
B. Mandate end-to-end encryption that originates and terminates inside the enterprise-owned SD-WAN appliances at each site.
C. Choose a provider that offers FIPS-140-3-certified Layer-2 encryption on every physical link.
D. Deploy a cloud-based next-generation firewall that performs deep TLS inspection for all overlay traffic.
Correct Answer: B
End-to-end encryption that originates and terminates inside the enterpriseâs own SD-WAN appliances guarantees that no intermediate SD-WAN controller or service-provider element ever sees plaintext. Option A only protects application sessions, not the overlay itself. Option C encrypts the physical hop but still allows the SD-WAN controller to hold the tunnel keys. Option D intentionally breaks encryption for inspection, creating the exact âdecrypt-then-re-encryptâ point the CISO wants to avoid.
Question 107
Q4. A financial-services firm labels data âPublic,â âInternal,â âConfidential,â and âRestricted.â The CISO discovers that trading algorithms classified âRestrictedâ are stored in the same SAN tier as âInternalâ marketing videos. What is the PRIMARY risk?
A. Inadequate media-sanitization controls when disks are retired.
B. Over-exposure to loss of availability due to co-mingled backups.
C. Insufficient granularity in access-control lists (ACLs) on the SAN.
D. Inability to apply cost-effective, tiered protective controls.
Correct Answer: D
When high- and low-value assets share infrastructure, the organization must protect everything to the highest level or accept under-protection; either choice is inefficient. The scenario does not mention disposal (A), availability (B), or ACL detail (C)âthe core issue is misalignment of controls to classification.
Question 108
Q7. [Scenario] A U.S. federal agency must comply with FIPS 140-3 and uses PIV smart cards for user authentication. The agency wants to extend the same credential to command-line SSH access on RHEL 8 servers. Which configuration BEST satisfies the requirement while keeping private keys non-exportable?
A. Copy the PIV private key into ssh-agent
B. Use PKCS#11 engine in OpenSSH to call the on-card key via the PIV applet
C. Issue a separate SSH key pair and store it in ~/.ssh/id_rsa with 600 permissions
D. Convert the PIV certificate to OpenSSH format and place the private key in hardware security module (HSM) attached to each server
Correct Answer: B
OpenSSH supports PKCS#11, allowing the SSH client to invoke the private key on the smart card without exporting it. This preserves non-repudiation and FIPS compliance. A exports the key; C abandons PIV; D misplaces the userâs private key on a server-side HSM, which does not help client authentication.
Question 109
Q4. A cloud-first retailer runs a serverless checkout flow in AWS Lambda. During a flash-sale event the SOC notices that 5 % of payment transactions trigger the âInvoke-From-Unknown-Regionâ CloudWatch alarm. The Lambda execution role has `s3:GetObject` privileges to a bucket that stores full credit-card magnetic-stripe images for troubleshooting. Which **FIRST** responder action is MOST aligned with ISC²âs âcontain, eradicate, recoverâ philosophy?
A. Revoke the Lambda roleâs `s3:GetObject` permission with an inline SCP
B. Snapshot the S3 bucket for chain-of-custody before any changes
C. Increase the Lambda concurrency limit to reduce queue time
D. Open a Sev-1 ticket with AWS Support to roll back API Gateway
Correct Answer: A
Immediate containment is achieved by removing the excessive privilege that allows Lambda to access sensitive card data (violating PCI DSS 3.2.1 Req. 7). Snapshots come after the attack surface is closed; concurrency and API Gateway changes do not address the data-exposure vector.
Question 110
Q10. A software company is adopting the Biba integrity model for its build pipeline. The security team labels source code âLOW,â compiled binaries âHIGH,â and the build server âMEDIUM.â Which action is explicitly FORBIDDEN under Biba strict *-property?
A. A developer labelled LOW writes new source code
B. The MEDIUM build server reads LOW source code
C. The MEDIUM build server writes HIGH binaries
D. A HIGH binary is downloaded by a LOW-end user device
Correct Answer: C
Biba *-property (no write-up) forbids a MEDIUM subject from writing to a HIGH object. Reading LOW (B) is allowed (simple security property). LOW writing code (A) is a subject write to LOW objectâallowed. HIGH downloaded to LOW device (D) is a read-downâalso allowed.
Question 111
Q2. During a secure-code review of a RESTful microservice written in Spring Boot, you discover the following method:
A. Input validation using a whitelist of allowed path values plus moving the container to a gVisor sandbox.
B. Re-write the endpoint to use a safer language (Rust) and re-deploy the entire service.
C. Upgrade Spring Boot to the latest release and add a WAF rule that blocks the string â&&â.
D. Set the containerâs seccomp profile to âunconfinedâ so the backup script can run without kernel restrictions.
Correct Answer: A
Whitelist input validation removes attacker-controlled metacharacters, while gVisor adds a second-layer kernel sandbox that confines the process even if injection occurs. Rewriting in Rust (B) is a long-term strategy but not an immediate fix. A WAF (C) is bypassable and does not protect against encoded payloads. Removing seccomp (D) increases, not decreases, risk.
Question 112
Q8. A startup practicing Infrastructure-as-Code (IaC) uses Terraform to spin up AWS workloads. A developer accidentally commits an AWS access key and secret to the public GitHub repo. Within one minute the credential is detected by an external attacker and used to launch 500 large EC2 instances for crypto-mining, costing $8 000. Which control would have MOST economically prevented the incident?
A. AWS CloudTrail anomaly detection alerting the SOC within 15 minutes
B. A pre-commit git hook that runs the open-source tool âgit-secretsâ to block any AWS key pattern
C. Mandatory vCPU service quotas in the AWS account set to the startupâs baseline need
D. GuardDuty runtime alert that terminates instances tagged as crypto-miners
Correct Answer: B
Blocking the secret at the moment of commit (pre-commit hook) prevents exposure entirely and costs virtually nothing. CloudTrail/GuardDuty (A, D) are detective and would still incur cost before remediation. Service quotas (C) limit blast radius but do not prevent unauthorized API calls or data theft.
Question 113
Q8. A nuclear facilityâs safety engineer must validate that the reactor-control network remains isolated from the corporate LAN. Which testing method provides the STRONGEST evidence that the isolation is effective against both malicious and accidental bridging?
A. Reviewing the layer-3 switch configuration printouts
B. Observing a network technician draw the network diagram in Visio
C. Performing packet injection on the corporate VLAN and confirming packets never appear on the control VLAN
D. Interviewing the network architect about firewall rule design
Correct Answer: C
Active testing (packet injection) empirically proves that no forwarding path exists. Configuration reviews (A) and interviews (D) are useful but cannot guarantee the running state matches the intended design. Diagram observation (B) is purely documentary.
Question 114
Q2. A zero-trust architecture project requires that every east-west flow between containerized microservices is mutually authenticated with SPIFFE IDs and encrypted with mTLS. The DevOps team complains that CPU spikes 35 % when service-A calls service-B 4 000 times per second. Which control BEST preserves the security model while reducing load?
A. Replace mTLS with IPSec tunnels between worker nodes so payloads remain encrypted
B. Issue 24-hour SPIFFE SVIDs and cache the TLS session with session-resumption tickets
C. Terminate mTLS at a sidecar proxy and run clear-text HTTP/2 over the loopback interface
D. Move authentication to JWT signed by the node-level Envoy and disable TLS inside the cluster
Correct Answer: B
Session-resumption (RFC 8446) reduces full-handshake RSA/ECDSA operations by â80 % while keeping mutual authentication and short-lived SVIDs. IPSec (A) still encrypts but does not give per-service identity; loopback cleartext (C) violates the zero-trust âencrypt every hopâ principle; JWT without TLS (D) leaks metadata and is replayable if keys rotate slowly.
Question 115
Q4. An IoT gateway performs firmware updates by verifying an RSA-2048 signature on the new image. To save bandwidth, the vendor ships only the 256-byte signature instead of signing the entire multi-megabyte image with RSA. Which cryptographic construct MOST likely enables this shortcut while preserving authenticity?
A. RSA blind signature
B. RSA-PSS with MGF1
C. Hash-based Merkle tree root signed by RSA
D. Optimal Asymmetric Encryption Padding (OAEP)
Correct Answer: C
Signing a Merkle-tree root (or simply signing the hash of the firmware) allows a 256-byte RSA signature to cover a large image; the gateway recomputes the hash/tree and verifies the signature. Blind signatures (A) are for anonymity. RSA-PSS (B) is a padding scheme, not a bandwidth saver. OAEP (D) is for encryption, not signatures.
Question 116
Q6. A provincial government is drafting legislation that would require every critical-infrastructure operator to report âmaterial cyber incidentsâ within six hours of discovery. The CISO of a regional power utility argues that the proposed timeline is âunrealistic and creates legal risk.â Which risk management technique is the CISO attempting to use?
A. Risk avoidance
B. Risk transference
C. Risk acceptance
D. Risk rejection
Correct Answer: D
By lobbying to change the regulation, the CISO is attempting to reject (D) the risk (i.e., eliminate the requirement) rather than avoid, transfer, or accept it. Avoidance (A) would mean exiting the critical-infrastructure sector. Transference (B) would involve insurance. Acceptance (C) would be quietly complying.
Question 117
Q9. A global logistics firm is exposing a new GraphQL endpoint to replace legacy REST services. During a design review, the security team notes that nested queries could lead to denial-of-service through excessive database joins. The developers propose limiting query depth to 7 levels and disabling introspection in production. Which additional control BEST mitigates remaining GraphQL-specific abuse without breaking legitimate clients?
A. Implement server-side query-complexity analysis that assigns cost points to each field and rejects requests that exceed a budget.
B. Require mutual TLS so only known clients can connect.
C. Enable schema-stitching to split the graph into federated subgraphs.
D. Convert all GraphQL mutations back to REST endpoints and expose only read queries.
Correct Answer: A
Query-complexity analysis (a.k.a. âcost analysisâ) quantifies the server work implied by a query and blocks expensive requests regardless of depth, addressing the DoS vector. mTLS (B) is transport-layer, schema-stitching (C) does not limit cost, and reverting to REST (D) negates the architectural benefits.
Question 118
Q7. A financial-exchange company keeps a âgoldenâ configuration repository for all trading algorithms. Version-control metadata shows classification âPublicâ because the repo is labeled open-source, but embedded API keys make the actual content âRestricted.â Which control failure allowed the discrepancy?
A. Lack of mandatory metadata review during code promotion.
B. Absence of role-based access control on the repo.
C. Failure to implement pull-request approvals.
D. Insecure direct object references in the web-GUI.
Correct Answer: A
Classification metadata should be validated whenever content changes. Because the promotion process did not re-check the true sensitivity, keys remained in a âPublicâ repo. B, C and D are generic access or coding issues; only A addresses the asset-classification gap.
Question 119
Q1. A multinational retailer is preparing to migrate its on-premise customer-analytics database to a PaaS offering. The dataset contains 30 million customer records with credit-card tokens, geolocation histories and loyalty-point balances. Regulations in three of the countries where the retailer operates require that âpersonal data must remain within the jurisdiction where it was collected unless the data subjectâs explicit consent is on file.â Which of the following is the MOST important asset-security activity to perform before contract signature with the cloud vendor?
A. Map every data field to the country of collection and build a data-flow diagram that shows which logical servers in the providerâs region will store each field.
B. Require the vendor to supply a SOC 2 Type II report and place the findings into the corporate risk register.
C. Encrypt all fields with AES-256 and keep the keys on-premise so that data is unreadable outside the home country.
D. Run a vulnerability scan against the providerâs API endpoints to confirm that CVSS scores are below 4.0.
Correct Answer: A
Jurisdiction-based data-locality requirements are essentially data-classification and location questions. Until you know exactly which data elements belong to which country (and can prove where they will reside, be processed and backed up) you cannot determine compliance. Option A is the only choice that creates the evidence needed to decide whether the PaaS architecture itself is lawful. B is useful but does not prove data-location compliance. C does not satisfy most data-locality laws because encrypted personal data is still considered âexported.â D is unrelated to residency obligations.
Question 120
Q5. [Scenario] A SaaS provider practices continuous deployment, pushing code to production 50Ă daily. The firm adds a âcanaryâ stage wherein 5 % of traffic hits new builds. After three minutes, if error rates stay below 0.1 %, the build proceeds to 100 %. One Friday, an engineer inadvertently commits credentials that are baked into JSON config and exposed via an info leak bug. The credentials are not detected by unit tests or SAST. Within four minutes, automated rollback occurs because the canary triggers 0.3 % 5xx errors. Which DevSecOps benefit is PRIMARILY demonstrated?
A. Immutable infrastructure
B. Fast feedback and fail-fast
C. Blue/green environment parity
D. Infrastructure as Code version control
Correct Answer: B
The canary environment provided rapid telemetry that the defective build introduced faults, prompting automatic rollbackâan example of fast feedback and fail-fast culture. Immutable infra (A) refers to replacing rather than patching servers; blue/green (C) is a different deployment pattern; IaC version control (D) is unrelated to runtime defect detection.
Question 121
Q1. A global e-commerce firm is adopting a âshift-leftâ DevSecOps model. During sprint planning, the product owner insists that new microservices must be built with reusable in-house libraries that have not been updated in three years. The security team runs an automated software-composition analysis (SCA) scan and discovers 17 CVEs rated HIGH or CRITICAL in those libraries. The DevOps lead argues that the libraries are âinternal,â so the CVEs do not represent real risk. Which secure-coding principle is being violated MOST severely?
A. Defense in depth
B. Safe reuse of trusted components
C. Psychological acceptability
D. Complete mediation
Correct Answer: B
Safe reuse demands that any componentâinternal or externalâbe free of known, exploitable vulnerabilities before integration. Ignoring 17 high/critical CVEs in shared libraries violates this principle and propagates risk across every consuming microservice. Defense in depth (A) is a broader architecture concept; psychological acceptability (C) relates to usability; complete mediation (D) refers to authorization checks on every accessânone are the primary issue here.
Question 122
Q1. A global e-commerce company is migrating its monolithic storefront to a micro-services architecture. During a threat-modeling workshop, the team identifies that the new âcheckoutâ service will invoke the âpaymentâ service over mTLS, but the payment service still needs to call a 15-year-old mainframe CICS module through a proprietary binary protocol. The mainframe module runs as a single batch ID with *ALLOBJ authority.
A. Accept the risk; the mainframe has never been breached.
B. Place both services behind a single API gateway and let the gateway terminate mTLS.
C. Wrap the CICS module with a new least-privilege âfacadeâ service that uses role-based access and input validation, then expose only the facade to the payment service.
D. Re-write the CICS module in Java and deploy it in a container on OpenShift.
Correct Answer: C
Domain 8 stresses secure software design and interfacing with legacy systems. Option C applies the security principles of least privilege, abstraction, and input validation while preserving the investment in the mainframe. A is a dangerous risk acceptance with no compensating control. B only moves the TLS termination point and does not address the excessive authority or protocol mismatch. D is ideal but not always feasible in the real world due to cost, schedule, or lack of source code; CISSP expects âbest practicalâ security, not academic perfection.
Question 123
Q7. A university research lab shares genomic data with external partners under strict data-use agreements that prohibit re-identification attempts. The DLP system alerts that a partnerâs IP has downloaded the entire dataset to a laptop. Which is the BEST first response from an asset-security perspective?
A. Revoke the partnerâs VPN certificate and wipe the laptop remotely.
B. Immediately re-classify the dataset as âTop Secretâ and move it to a higher security zone.
C. Suspend the data-sharing agreement, image the laptop for forensics, and start contractual remediation.
D. Encrypt the dataset with a new key and re-upload it to the secure file-share.
Correct Answer: C
The priority is to stop the contractual breach, preserve evidence, and enforce the agreement; suspension and forensics achieve this. A is aggressive and may destroy evidence. B is reactive and does not address the partnerâs mis-use. D does nothing about the copy already on the laptop.
Question 124
Q5. A company is disposing of 2000 used SSDs from R&D laptops that contained both unclassified prototype code and export-controlled encryption libraries. The security policy states âcrypto-shred or physically destroy media containing Restricted data.â Which method BEST meets the policy while allowing maximum resale value for the hardware?
A. Apply the vendorâs secure-erase command that resets the internal encryption keys, then sell the drives.
B. Degauss with a 2-Tesla coil, then shred the PCB.
C. Overwrite every logical block with 0x00, followed by 0xFF, followed by random pattern.
D. Remove and incinerate only the NAND chips; sell the remaining aluminum housing.
Correct Answer: A
Crypto-shredding (changing the media-encryption key) instantly renders all previous data unrecoverable on modern self-encrypting drives and preserves resale value. Degaussing (B) is ineffective on SSDs and destroys the drive. Multi-pass overwrite (C) is unreliable due to over-provisioning and wear-leveling. D is overkill and still leaves no resale value.
Question 125
Q6. A cloud-native e-commerce site runs in AWS. A Lambda function triggered by S3 âPUTâ events suddenly begins executing 100Ă normal volume, driving 50 TB/month of data-transfer charges. CloudTrail shows the calls originate from 4,000 unique access keys that do NOT belong to your AWS account. Which detective mechanism would have identified the issue FIRST?
A. GuardDuty finding for âS3 API requests from IPs on custom threat list.â
B. Config rule detecting S3 bucket policy change that grants public âPutObject.â
C. CloudWatch metric alarm on âNumberOfObjectsâ in the bucket.
D. Cost-explorer budget alert set at 120 % of forecast.
Correct Answer: B
The attacker is uploading objects into your bucket, causing Lambda invocations. The root cause is a bucket policy (or ACL) that allowed public writesâdetectable by a Config rule evaluating policy JSON. GuardDuty (A) is second-line; CloudWatch (C) is lagging; cost alert (D) is too late and purely financial.
Submit Quiz
Quiz Complete!
0%