What is a reason an organization would choose output-driven over input-driven SIEM collection?
ASearch performance
BReal-time alerting
CAttack detection
DHistorical analytics
An employee notices a suspicious person in the data center and immediately escalates their concern to a manager.
At which maturity model stage is their company’s security awareness program likely functioning?
AEnforcing Least Privilege
BPromoting Awareness and Change
CSegmentation and Compartmentalization
DCompliance Focused
A CISO reporting to the CEO gains which of the following benefits?
AA strategic understanding of risks and threats
BEase of communicating security requirements
CSupport for improving product security
DA primary focus on compliance and regulatory mandates
Which of the following is a typical responsibility for a Tier 1 SOC analyst?
AForensics and malware analysis
BMonitoring and triaging alerts
CSensor tuning and maintenance
DIncident coordination and response
Using a number line evaluation, which value would indicate that an employee is being undercompensated for their current level of contribution to the team?
A0
B-2
C2
DA range of -1 to +1
During which SDLC phase should a DAST tool be deployed to spider the application?
ADevelopment
BProduction
CTesting
DDesign
Notifying system owners, forcing password updates for affected user accounts, and increased monitoring to detect related malicious activity, occur as part of which process?
ARecovery from an incident
BEradication of an incident
CPreparing for an incident
DIdentification of an incident
Which member of a security awareness advisory board provides support for both scoping the target and enforcing program mandates?
AHelp Desk
BSecurity Operations
CMarketing and Communications
DHuman Resources
A job candidate agrees to accept a position with a lower salary than requested when the company increases the vacation time and training allowance in the job offer.
What type of negotiating strategy does this describe?
AIntegrative bargaining
BBottom line value
CDistributive bargaining
DZero sum value
How should Learning Objectives be developed in regard to an organization’s managed risks?
AA single learning objective document should be developed to address company goals for all managed risks
BA learning objective document should be developed for each department listing their managed risks
CAn individual learning objective document should be developed for each managed risk
DA learning objective document should be developed for each threat agent that poses a risk
Executives and business unit managers have been asked to review the organization's disaster recovery plan and provide feedback on whether the plans are accurate and complete for their departments.
What type of test is being conducted?
AFunctional
BChecklist
CWalkthrough
DTabletop
Which SIEM function is primarily used for redundancy to prevent data loss when more events are received than the processor can handle?
ALog aggregator
BLog archiving
CLog agent
DLog broker
Which of the following standards defines the iterative risk management process shown below?
ANIST CSF
BNIST 800-37
CISO 27005
DFAIR
What type of security metrics are used to illustrate results at the executive level shown below?
AKey performance indicators
BCVSS scores
CLearning objectives
DCritical path activities
What process is demonstrated in the diagram shown below?
AContinuous Delivery
BContinuous Integration
CContinuous Improvement
DContinuous Deployment
Based on the selection criterion and the vendor table shown below, what is the prioritized score for Features?
A0.6
B1.4
C2.8
D5.0
What can be determined from the NIST SP800-53 related screenshot below?
APrevious Logon (Access) Notification is required in all baselines
BAccount Management must be implemented before Unsuccessful Logon Attempts
CSession Lock has the most control enhancements
DAccount Management must be implemented before Separation of Duties
The model for the Three Lines of Defense in Effective Risk Management and Control prescribes which of the following?
ARisk Owners in the second line of defense should not delegate the day-to-day management of security controls
BSecurity teams should have complete responsibility for implementing security controls that catch unexpected events
CInternal auditors have a high level of independence that is not available in the second line of defense
DRisk Control and Compliance personnel can offer completely independent analysis to governing bodies in the final line of defense
At which stage of the Security Awareness Maturity Model is annual training first implemented?
ALong-term sustainment and cultural change
BMetrics framework
CCompliance-focused
DPromoting awareness and behavioral change
Which of the following is an example of a compliance metric for a security awareness program?
AWas there a decrease in the severity of incidents after the awareness program was initiated?
BHow many employees reported suspicious emails after awareness training compared to before training?
CWhich regulatory requirements will be addressed by deploying an organization wide awareness program?
DWhat percentage of employees assigned to an awareness training module have completed the training?