Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = 'Arizona';

A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona

Full Access
Question # 5

Why should an information technology (IT) professional be aware of professional associations?

A.

Professional associations provide up-to-date training.

B.

Professional associations will ensure higher quality work.

C.

Professional associations upgrade the company's network.

D.

Professional associations give feedback to management.

Full Access
Question # 6

What signals the development of scope creep?

A.

Programmers are focused on a single feature.

B.

Many unplanned features have been added to the original project.

C.

The product does not satisfy all the requirements of the plan.

D.

An extension to the deadline of the project is requested.

Full Access
Question # 7

Which risk management strategy will help prevent cheating using a learning management system as a platform?

A.

Enforcement of a strict firewall policy to restrict access to the system's server

B.

Configuration of the system to disable all Bluetooth services on all workstations

C.

Implementation of secure user authentication protocols

D.

Implementation of regular software updates and patch management

Full Access
Question # 8

What is scope creep?

A.

Realization that the organization staffing is inadequate

B.

The extent of the project that lacks needed requirements

C.

Small changes in a project that lead to bigger changes

D.

When the project is completed in less than the required time

Full Access
Question # 9

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to disable all universal serial bus (USB) ports on all workstations

C.

Implementation of regular vulnerability scans and patch management

D.

Implementation of multifactor authentication for all user accounts

Full Access
Question # 10

A large healthcare provider is acquiring a small clinic and has identified a full understanding of the clinic's organizational risks. The large provider has several tools it can implement to reduce the clinic's identified risks.

Which type of risk response should the healthcare provider use?

A.

Risk acceptance

B.

Risk mitigation

C.

Risk transference

D.

Risk avoidance

Full Access
Question # 11

A security analyst for a financial institution is in the process of planning to upgrade the institution’s IT infrastructure to meet current industry standards. There are various potential risks associated with the upgrade, including data breaches, system outages, and cost overruns. The analyst is tasked with managing these risks to ensure a successful upgrade.

What is the first step in the risk management life cycle in this scenario?

A.

Assess

B.

Control

C.

Review

D.

Identify

Full Access
Question # 12

An IT organization recently implemented a hybrid cloud deployment. The security team must be able to correlate event data combined from different sources in a central location.

What is the best solution?

A.

File integrity monitoring (FIM)

B.

Data loss prevention (DLP)

C.

Intrusion detection system (IDS)

D.

Security information and event management (SIEM)

Full Access
Question # 13

How can the organizational culture support ethical guidelines?

A.

By outlining the roles of IT specialists in the organization

B.

By outlining the protocols to support security and privacy of data

C.

By creating the system requirements for computers in the organization

D.

By creating the government regulations that apply to the organization

Full Access
Question # 14

Which task is the responsibility of a database administrator?

A.

Installing and configuring databases

B.

Compiling code into an executable file

C.

Deciding on database applications for the company

D.

Troubleshooting network security issues

Full Access
Question # 15

What is the purpose of the feature that allows only one user to modify a document at a time in collaboration software?

A.

Data availability

B.

Data integrity

C.

Data confidentiality

D.

Data accessibility

Full Access
Question # 16

An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.

Which solution should be implemented to meet the requirements?

A.

Two-step verification

B.

Challenge-Handshake Authentication Protocol (CHAP)

C.

Privileged identity management

D.

Identity federation

Full Access
Question # 17

Which life cycle is part of the process for planning, creating, testing, and deploying information systems?

A.

Network Development Life Cycle (NDLC)

B.

System Development Life Cycle (SDLC)

C.

Database Creation System Life Cycle (DCSLC)

D.

Software Test Life Cycle (STLC)

Full Access
Question # 18

A government agency needs to deploy a secure network connection between its offices in Chicago and New York.

What should be used to facilitate this connection?

A.

Virtual private network (VPN)

B.

Security information and event management (SIEM)

C.

Point-to-Point Tunneling Protocol (PPTP)

D.

Network access control (NAC)

Full Access
Question # 19

What are two roles of a DNS?

Choose 2 answers

A.

Creating IP addresses if it cannot find an alias

B.

Storing the IP address

C.

Translating an IP alias to an actual IP address

D.

Sending packets along a pathway that connects it to the Internet

Full Access
Question # 20

Which two languages are scripted?

Choose 2 answers

A.

Python

B.

Ada

C.

PHP

D.

C

Full Access
Question # 21

An organization wants to implement a new encryption solution for a real-time video conferencing application. The organization wants to ensure that the encryption solution provides protection for the video stream without causing significant delays or latency in the conference.

Which type of encryption will meet the needs of the organization?

A.

Block ciphers

B.

Asymmetric encryption

C.

Stream ciphers

D.

Hash functions

Full Access
Question # 22

Which characteristic identifies intranet application software?

A.

Hosted by an outsourced provider

B.

Hosted in the internal business network

C.

Hosted by a third-party web portal

D.

Hosted on an individual computer

Full Access
Question # 23

An IT organization has seen a surge of ransomware and Trojan horse attacks recently.

Which action should the security team recommend to protect the IT infrastructure from commodity malware threats?

A.

Installing a firewall to identify malicious traffic

B.

Rerouting suspicious communications to a remote machine

C.

Implementing a two-factor authentication system

D.

Installing endpoint protection software

Full Access
Question # 24

Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?

A.

Homomorphic encryption

B.

Secure function evaluation (SFE)

C.

Secure Sockets Layer (SSL)

D.

Private information retrieval (PIR)

Full Access
Question # 25

Which motherboard component is used for short-term storage of data?

A.

Hard Drive

B.

BIOS

C.

Read Only Memory

D.

RAM

Full Access
Question # 26

A company wants to improve the security of its software development process and reduce the risk of vulnerabilities in its applications. The company is looking for a solution that can isolate its applications and provide a secure environment for development and testing.

Which security technology meets the needs of this company?

A.

Data loss prevention (DLP)

B.

Virtual private network (VPN)

C.

Firewall

D.

Containerization

Full Access
Question # 27

Which risk management strategy will secure an application from potential malware and advanced persistent threats?

A.

Encryption of all sensitive data stored within the application

B.

Configuration of the application to require strong, unique passwords for all user accounts

C.

Installation of the latest antivirus software on all computers that will access the application

D.

Implementation of a strict firewall policy to restrict access to the application's server

Full Access
Question # 28

How does application software differ from operating systems?

Choose 2 answers

A.

Application software includes system utilities that run on demand of the user.

B.

Application software consists of programs that end users run to accomplish business or personal tasks, such as e-mail.

C.

Application software includes word processors and spreadsheet software that are useful to end users.

D.

Application software supports the computer hardware system directly.

Full Access
Question # 29

A healthcare organization has experienced a ransomware attack that has resulted in the encryption of all patient medical records. The organization has backups, but restoring the data will take severaldays, and during that time, patient care will be significantly diminished.

What is the most important factor to consider when evaluating the severity of the ransomware attack?

A.

Threat actors

B.

Risk

C.

Impact

D.

Likelihood

Full Access
Question # 30

A company is concerned about the potential risks associated with unauthorized modifications to the basic input/output system (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which technique will prevent unauthorized modifications to the BIOS firmware on a server?

A.

BIOS monitoring

B.

Using an intrusion detection system to detect and prevent attacks

C.

Conducting regular backups of the server's data

D.

BIOS protection

Full Access
Question # 31

How are IT and globalization related?

A.

IT allows businesses to have a global reach.

B.

IT allows businesses to reach global HIPAA compliance.

C.

IT allows businesses to create tax havens for global companies.

D.

IT allows businesses to create a global common gateway interface (CGI).

Full Access
Question # 32

Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?

A.

Configuration of the system to disable universal serial bus (USB) ports on all workstations

B.

Encryption of all network traffic between the EHR system and external networks

C.

Implementation of role-based access controls and encryption of all sensitive data

D.

Implementation of a strict firewall policy to restrict access to the system's server

Full Access
Question # 33

Match the legislative purpose with the corresponding legislation.

Answer options may be used more than once or not at all.

Full Access
Question # 34

A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.

Which step will ensure the effectiveness of the DRP?

A.

Developing and implementing a testing plan for the DRP

B.

Reviewing and updating the DRP regularly to ensure it remains relevant

C.

Performing a risk assessment of the company's information assets

D.

Training employees on their roles and responsibilities during a disaster

Full Access
Question # 35

A small online retailer stores customer information, product inventory, and financial data on its local servers.

What are the necessary components of a business continuity and disaster recovery plan for this company?

A.

A detailed evacuation plan, frequent data backups, and regular cybersecurity training for employees

B.

Redundant backups, a communication plan, and a designated off-site location for data storage and recovery

C.

A comprehensive insurance policy, a list of emergency contacts, and a system for continuous monitoring of network activity

D.

Routine maintenance of servers, an emergency generator, and a policy for employees to work remotely in case of a disaster

Full Access
Question # 36

What allows a user to query information from an online database with a web application without revealing what they are viewing?

A.

Secure function evaluation (SFE)

B.

Private function evaluation (PFE)

C.

Homomorphic encryption

D.

Private information retrieval (PIR)

Full Access
Question # 37

Which item information should be stored in a database to determine an order total?

A.

Item order line

B.

Item unit price

C.

Item description

D.

Item restock levels

Full Access
Question # 38

The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.

Which type of file should the analyst use to inspect the traffic?

A.

Web server access log

B.

Syslog messages

C.

Operating system event log

D.

Packet capture

Full Access
Question # 39

An IT team must allow on-premises users to log in to the Azure portal using their corporate credentials.

Which strategy should be used to enable identity federation in this scenario?

A.

Encrypting with Transport Layer Security (TLS)

B.

Deploying a hardware-based two-factor authentication (2FA) solution

C.

Integrating with lightweight directory access protocol (LDAP)

D.

Configuring third-party authentication with Security Assertion Markup Language (SAML)

Full Access
Question # 40

Which two benefits do computer networks provide for businesses?

Choose 2 answers

A.

Lower IT operations costs

B.

Improved information security

C.

Increased Internet communications speed

D.

Organization cost savings

E.

Increased business efficiency

Full Access
Question # 41

A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.

Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?

A.

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for industrial control systems (ICS)

B.

MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)

C.

Cyber kill chain

D.

Diamond Model of Intrusion Analysis

Full Access
Question # 42

A company has discovered a vulnerability in its lightweight directory access protocol (LDAP) implementation, which could potentially allow unauthorized access to sensitive information. The company has decided to implement risk mitigation strategies to reduce the risk associated with this vulnerability.

Which risk mitigation strategy will meet the needs of the company?

A.

Conducting regular security awareness training for employees to prevent social engineering attacks targeting LDAP credentials

B.

Regularly backing up data stored in the LDAP server to prevent data loss in the event of a breach

C.

Implementing intrusion detection and prevention systems (IDPS) to monitor for suspicious activities and potential LDAP attacks

D.

Implementing strong authentication mechanisms and encryption protocols to secure communication between the LDAP server and clients

Full Access
Question # 43

What type of software utilizes a commercial software license?

A.

Public Domain

B.

Proprietary

C.

Open Source

D.

Shareware

Full Access
Question # 44

Which type of services are Google Apps, Dropbox. and GoToMeeling?

A.

Infrastructure-as-a-Service (laaS)

B.

Security-as-a-Service (SECaaS)

C.

Platform-as-a-Service (PaaS)

D.

Software-as-a-Service (SaaS)

Full Access
Question # 45

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Which solution fulfills these requirements?

A.

Security information and event management (SIEM)

B.

Wireless intrusion prevention system (WIPS)

C.

Inline network encryptor

D.

Layer 3 switch

Full Access
Question # 46

A company is concerned about the security of its users’ passwords and is looking for a solution to ensure that user credentials are kept safe.

What is the best solution?

A.

Object storage

B.

Password policies

C.

Removable storage

D.

Hardware key manager

Full Access
Question # 47

An insurance agency is concerned that some employees could be mishandling funds and covering it up. The agency wants to temporarily block these employees from working and ensure that operations continue.

Which strategy should the agency implement?

A.

Separation of duties

B.

Mandatory vacation

C.

Job rotation

D.

Least privilege

Full Access
Question # 48

Which system conversion method deploys the new system while the old system is still operational in order to compare output?

A.

Phased

B.

Direct

C.

Parallel

D.

Pilot

Full Access
Question # 49

Which technique allows someone to obtain a password while it is in transit?

A.

Packet sniffing

B.

Buffer overflow

C.

Phishing

D.

Black hat

Full Access
Question # 50

What is the correct order of project phases?

A.

1)Initiation2)Executing3)Planning4)Monitoring and Controllings) Closing

B.

1) Planning2) InitiationAMonitoring and Controlling4) Executings) Closing

C.

1) Executing2) Monitoring and Controlling3) Initiation4) Planning5) Closing

D.

1) Initiation2) Planning° 3) Executing4) Monitoring and Controllings) Closing

Full Access
Question # 51

Which IT role is responsible for installing new hardware and troubleshooting existing hardware?

A.

Web administrator

B.

System administrator

C.

Security administrator

D.

Network administrator

Full Access
Question # 52

A security team has been informed that user data on the network has been compromised.

What is the first step the organization should take to respond to this data breach?

A.

Notify affected users of the incident

B.

Implement an access control policy

C.

Increase encryption levels

D.

Publicly announce the breach

Full Access
Question # 53

What is a common characteristic of a proprietary software license?

A.

A business gains the right to modify the software's source code.

B.

A business gains the right to use the software.

C.

A business gains the right to own the software.

D.

A business gains the right to distribute the software freely.

Full Access
Question # 54

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.

Which action should be taken to resolve the issue?

A.

Shut down and remove the end-of-life machines

B.

Disconnect the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

Full Access
Question # 55

In which state is data considered information?

A.

Raw

B.

Input

C.

Unprocessed

D.

Processed

Full Access
Question # 56

Which risk management strategy will ensure that data stored on an enterprise resource planning (ERP) system is secure from exploitation in the event of a data breach?

A.

Enforcement of a strict firewall policy to restrict access to the ERP system's server

B.

Configuration of the ERP system to disable all printing services on all workstations

C.

Implementation of regular backup and disaster recovery planning

D.

Implementation of data encryption

Full Access