2024 CERTMASTER CE SECURITY SECURITY
OPERATIONS EXAM WITH 80+ QUESTIONS &
CORRECT ANSWERS
The chief information officer (CIO) wants to expand the company's ability to
accurately identify vulnerabilities across the company. The CIO wants to be able to
scan client PCs, mobile devices, servers, routers, and switches. What type of
scanner are they looking to institute? - ANSWER-A. Network vulnerability
scanner
A financial services company is decommissioning many servers that contain highly
sensitive financial information. The company's data protection policy stipulates the
need to use the most secure data destruction methods and comply with strict
regulatory requirements. The company also has a significant environmental
sustainability commitment and seeks to minimize waste wherever possible. What
should the company's primary course of action be during this process? -
ANSWER-D. Degaussing the servers, rendering the data irretrievable, followed by
reselling or recycling the servers after certification
A cyber technician pulls logs on the new Apple iMacs to ensure the company's
employees adhere to the policy. What log can provide the technician with the
computer's attempted logins or denial when an employee attempts to access a file?
- ANSWER-B. Operating system-specific security logs
A large multinational company uses a cloud-based document storage system. The
system provides access to documents by considering a combination of factors: the
user's department, geographic location, the document's sensitivity level, and the
current date and time. For example, only the finance department of a specific
region can access its financial reports, and they can do so only during business
hours. Which access control model does the company MOST likely use to manage
this complex access control - ANSWER-C. Attribute-based access control
,The IT team at a medium-sized company is upgrading its wireless network security
to protect sensitive data and ensure secure communication between devices. They
have decided to implement Wi-Fi Protected Access 3 (WPA3). What is the primary
purpose of implementing WPA3 on the company's wireless network? - ANSWER-
C .To enhance wireless network security with the latest encryption standards
A security specialist is drafting a memorandum on secure data destruction for the
organization after a recent breach. What benefit does the certification concept offer
when evaluating appropriate disposal/decommissioning? - ANSWER-B. It refers to
the documentation and verification of the data sanitization or destruction process.
The IT security team at a large company is implementing more robust
authentication measures to safeguard sensitive data and systems. The team is
exploring multifactor authentication (MFA) options to bolster security. The
company deals with highly confidential information and requires a robust solution.
The team has narrowed the choices and is evaluating which aligns BEST with their
security needs. Which multi-factor authentication method utilizes unique physical
characteristics of individuals to - ANSWER-C. Biometrics
Following an incident in which a company's incident response plan (IRP) failed,
the response team made several updates and changes to the IRP. The CEO wants to
test the IRP with a realistic incident that allows for hands-on demonstrations
without engaging in a full-blown simulation and that doesn't require extensive
investment and planning. Which IRP exercise is the BEST option for this
company? - ANSWER-D. Walkthrough
A technology firm's network security specialist notices a sudden increase in
unidentified activities on the firm's Security Event and Incident Management
(SIEM) incident tracking system. An unknown entity or process also increases the
number of reported incidents. The specialist decides to investigate these incidents.
Which combination of data sources would provide a balanced perspective to
support the investigation? - ANSWER-B. System-specific security logs, which
, track system-level operations; logs generated by applications running on hosts; and
real-time reports from the SIEM solution, summarizing incidents.
A proprietary software remains mission-critical ten years after its in-house
creation. The software requires an exception to the rules as it cannot use the latest
in-use operating system (OS) version. How can the IT department protect this
mission-critical software and reduce its exposure factor? (Select the two best
options.) - ANSWER-A. Network segmentation
C. Compensating controls
A system administrator has seen repeated positive vulnerability messages only to
discover that no vulnerability exists. The vulnerability messages repeat daily for
several days, causing the system administrators to ignore them. What can the
system administrator do to combat false positives? (Select the two best options.) -
ANSWER-A. Review logs
B. Use different scanners
A global financial institution with a vast network of offices and data centers has
faced increasing cybersecurity threats. The organization's IT team realizes that
privileged accounts are a prime target for hackers, and manually managing them
poses a significant risk. The company implemented a Privileged Access
Management (PAM) solution to strengthen its security posture. As part of the
implementation, the IT team focuses on password vaulting, a critical component of
PAM. As part of the advanced - ANSWER-B. Securely store and manage
privileged account credentials
An IT admin has been testing a newly released software patch and discovered an
exploitable vulnerability. The manager directs the IT admin to immediately report
to Common Vulnerability Enumeration (CVE), utilizing the common vulnerability
scoring system (CVSS) to base the score for the vulnerability. What could happen
if there are delays in completing the report? (Select the two best options.) -
ANSWER-A. Can lead to delays in remediation
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller NurseSue. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $20.99. You're not tied to anything after your purchase.