1. Some server products have certain capabilities (such as FTP), but those services may need to be enabled in order to function so that the service is not available to a hacker. What application security principle does this illustrate?
A) secure by design B) secure by accident C) secure by deployment D) secure by default
2. Which of the following is used to control the use of a device and, when applied to a device, makes changes to settings such as the passcode settings?
A) configuration profile B) container C) payload D) plug-in
3. Which of the following are used to steal proximity badge information?
A) rogue APs B) lock picks C) evil twins D) RFID tools
4. Which of the following refers to responsibilities that an organization has due to partnerships with other organizations andcustomers?
A) due diligence B) downstream liability C) due process D) indirect costs
5. Your organization has established a new security metrics policy to be more proactive in its security measures. As part of the policy, you have been tasked with collecting and comparing metrics on a day-to-day basis. Which of the following are you performing?
A) baselines B) daily workloads C) trends D) thresholds
1. Right Answer: D Explanation: Secure by default means that without changes, the application is secure. For example, some server products have certain capabilities (such as FTP), but the service has to be enabled. This ensures that the port is not open if it is not being used.
2. Right Answer: A Explanation: An MDM configuration profile is used to control the use of a device and, when applied to a device, make changes to settings such as the passcode settings, Wi-Fi passwords, VPN configurations, and more.
3. Right Answer: D Explanation: Malicious individuals use RFID tools to steal proximity badge information from an unsuspecting employee who physically walks near the concealed device.
4. Right Answer: B Explanation: Downstream liability refers to liability that an organization accrues due to partnerships with other organizations and customers.
5. Right Answer: B Explanation: When you are collecting and comparing metrics on a day-today basis, you are performing daily workloads.
Leave a comment