Unit 3 - Practice Quiz

INT242 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the primary goal of implementing a secure cloud network architecture?

Secure Cloud Network Architecture Easy
A. To increase the processing speed of virtual machines.
B. To make websites look more visually appealing.
C. To protect data and resources hosted in the cloud from unauthorized access and threats.
D. To reduce the cost of monthly cloud subscriptions.

2 In cloud computing, what does "IaaS" stand for?

Cloud Infrastructure Easy
A. Information as a Service
B. Internet as a Service
C. Identity as a Service
D. Infrastructure as a Service

3 What is the core principle of a "Zero Trust" security model?

Embedded Systems and Zero Trust Architecture Easy
A. Verify users only once per day
B. Never trust, always verify
C. Trust all users inside the network
D. Trust traffic only from known IP addresses

4 In cybersecurity, what does "resiliency" mean?

Explain Resiliency and Site Security Concepts Easy
A. The physical size of a data center.
B. The speed at which a computer can perform calculations.
C. The number of users a system can support simultaneously.
D. The ability of a system to withstand, adapt to, and recover from disruptions.

5 What is the first critical step in a cybersecurity asset management program?

Asset Management Easy
A. Decommissioning old assets.
B. Purchasing new equipment.
C. Applying security patches to all servers.
D. Creating an inventory of all hardware, software, and data assets.

6 What is the primary purpose of implementing redundancy in a network?

Redundancy Strategies Easy
A. To increase the speed of a single connection.
B. To simplify the network design.
C. To reduce the overall cost of the system.
D. To improve availability by eliminating single points of failure.

7 Which of the following is an example of a physical security control?

Physical Security Easy
A. Antivirus software
B. A strong password policy
C. Security guards and fences
D. A software firewall

8 What is the main goal of a vulnerability management program?

Explain Vulnerability Management Easy
A. To continuously identify, classify, and remediate security weaknesses.
B. To block all incoming internet traffic.
C. To respond only after a security breach has occurred.
D. To train employees on how to use software.

9 What is one of the most common causes of operating system (OS) vulnerabilities?

Device and OS Vulnerabilities Easy
A. Missing security patches
B. Using a high-resolution monitor
C. Installing too many applications
D. Having a fast processor

10 A SQL Injection attack is an example of what type of vulnerability?

Application and Cloud Vulnerabilities Easy
A. Application vulnerability
B. Hardware vulnerability
C. Network protocol vulnerability
D. Physical vulnerability

11 What is the primary function of a vulnerability scanner?

Vulnerability Identification Methods Easy
A. To act as a firewall to block attacks.
B. To automatically probe systems for known security weaknesses.
C. To automatically fix all discovered security issues.
D. To encrypt data stored on a computer.

12 In the context of vulnerability management, what does "remediation" mean?

Vulnerability Analysis and Remediation Easy
A. The process of fixing or eliminating a discovered vulnerability.
B. The process of ignoring a low-risk vulnerability.
C. The process of rating the severity of a vulnerability.
D. The process of discovering a new vulnerability.

13 A Virtual Private Cloud (VPC) provides what key feature within a public cloud?

Cloud Infrastructure Easy
A. A free software marketplace.
B. A direct, high-speed connection to the internet.
C. A physical server dedicated to a single customer.
D. A logically isolated section of the cloud network.

14 The concept of having a fully equipped, duplicate data center that is always online and ready to take over immediately is known as:

Redundancy Strategies Easy
A. A cold site
B. A cloud site
C. A hot site
D. A warm site

15 What is the primary purpose of a mantrap at the entrance of a secure data center?

Physical Security Easy
A. To prevent tailgating by controlling entry one person at a time.
B. To provide a place for visitors to wait before entry.
C. To automatically sanitize individuals entering the facility.
D. To scan visitors for metal objects.

16 An ethical hacker hired to simulate an attack on a company's network to find weaknesses is performing what type of assessment?

Vulnerability Identification Methods Easy
A. Risk analysis
B. Asset inventory
C. Penetration test
D. Compliance audit

17 What is "failover"?

Explain Resiliency and Site Security Concepts Easy
A. A planned system shutdown for maintenance.
B. A security feature that locks an account after too many failed login attempts.
C. A type of cyberattack that causes a system to crash.
D. A process that automatically switches to a standby system when the primary system fails.

18 After identifying vulnerabilities, what is the next logical step in the analysis phase?

Vulnerability Analysis and Remediation Easy
A. Prioritizing vulnerabilities based on risk and impact.
B. Buying new hardware to replace the old systems.
C. Immediately rebooting all affected systems.
D. Deleting the scan results to save space.

19 Which of these is the best example of an embedded system?

Embedded Systems and Zero Trust Architecture Easy
A. A cloud database server
B. A web browser application
C. A desktop operating system like Windows 11
D. A smart refrigerator

20 What is a security group in a cloud environment?

Secure Cloud Network Architecture Easy
A. A virtual firewall that controls inbound and outbound traffic for a virtual machine.
B. A list of approved software for the company.
C. A physical cage for locking up servers.
D. A team of cybersecurity professionals.

21 A company hosts its production and development environments in separate Virtual Private Clouds (VPCs) within the same cloud region. They need to allow the development VPC to access a specific database service in the production VPC without exposing either VPC to the public internet. Which of the following is the most secure and efficient method to achieve this?

Secure Cloud Network Architecture Medium
A. Configure VPC Peering between the two VPCs with restrictive routing rules.
B. Set up a VPN gateway in each VPC and connect them over the public internet.
C. Assign public IP addresses to the database and development instances and use an Internet Gateway.
D. Deploy a NAT Gateway in the production VPC to allow inbound traffic from the development VPC.

22 An organization migrates its web application to a Platform-as-a-Service (PaaS) offering. A critical vulnerability is discovered in the underlying operating system of the servers hosting the PaaS environment. According to the shared responsibility model, who is primarily responsible for patching this OS vulnerability?

Cloud Infrastructure Medium
A. The Customer (the organization)
B. The Cloud Provider
C. The third-party security auditor
D. Both the customer and the provider share equal responsibility for patching

23 A manufacturing company is implementing a Zero Trust Architecture for its network of IoT-enabled factory sensors. Which of the following actions best embodies the core principle of 'never trust, always verify' in this context?

Embedded Systems and Zero Trust Architecture Medium
A. Placing all sensors on a single, isolated VLAN with a firewall at the edge.
B. Encrypting all traffic between the sensors and the central data collector.
C. Conducting annual penetration tests on the sensor network.
D. Requiring each sensor to present a unique, short-lived digital certificate to authenticate itself before any data transmission.

24 An e-commerce company wants to ensure its primary application remains available even if an entire cloud availability zone (AZ) fails. They require automatic failover with minimal downtime. Which redundancy strategy should they implement?

Redundancy Strategies Medium
A. Deploying the application in a single, large instance within one Availability Zone.
B. Deploying application instances across multiple Availability Zones within the same Region, behind a load balancer.
C. Creating daily snapshots of the server and storing them in the same Availability Zone.
D. Maintaining cold backups of the application and data in a different Region.

25 A company has successfully implemented a vulnerability scanning tool that regularly scans its assets and generates reports. However, the security team is overwhelmed with the number of findings, and the same critical vulnerabilities reappear in subsequent scans. Which phase of the vulnerability management lifecycle is most likely being neglected?

Explain Vulnerability Management Medium
A. Scanning and Identification
B. Remediation and Validation
C. Reporting and Triage
D. Discovery and Asset Inventory

26 A security alert is issued for a critical zero-day remote code execution (RCE) vulnerability in the OS of a company's public-facing web servers. The OS vendor has not yet released a patch. What is the most appropriate immediate action to mitigate the risk?

Device and OS Vulnerabilities Medium
A. Immediately restore the servers from the most recent backup.
B. Take the servers offline until a patch is released by the vendor.
C. Wait for the vendor to release an official patch to avoid system instability.
D. Implement a virtual patch using a Web Application Firewall (WAF) or Intrusion Prevention System (IPS) to block exploit attempts.

27 A cloud-hosted application uses a function that takes a URL provided by a user and fetches content from that URL to be displayed. A penetration tester discovers they can provide an internal IP address like http://169.254.169.254/latest/meta-data/ to retrieve sensitive instance metadata from the cloud provider. What is this vulnerability called?

Application and Cloud Vulnerabilities Medium
A. SQL Injection (SQLi)
B. Server-Side Request Forgery (SSRF)
C. Cross-Site Scripting (XSS)
D. Insecure Direct Object Reference (IDOR)

28 A development team wants to integrate security checks directly into their CI/CD pipeline to identify common coding errors and vulnerabilities in their Java application's source code before the application is ever compiled or run. Which method is most suitable for this purpose?

Vulnerability Identification Methods Medium
A. Static Application Security Testing (SAST)
B. Fuzzing
C. Penetration Testing
D. Dynamic Application Security Testing (DAST)

29 What is the primary challenge for traditional asset management programs when applied to a modern, auto-scaling cloud environment, and what is the best approach to address it?

Asset Management Medium
A. The ephemeral nature of resources (e.g., containers, VMs); address with dynamic discovery and automated tagging.
B. The lack of physical access to hardware; address with third-party audits.
C. The high cost of cloud assets; address by purchasing reserved instances.
D. The variety of instance types; address by creating a manual spreadsheet of all possible types.

30 A financial services company is evaluating a public cloud provider and needs to verify the provider's physical security controls for its data centers. Which of the following provides the most reliable and standardized assurance?

Physical Security Medium
A. Reading the marketing materials and whitepapers published on the provider's website.
B. Interviewing the provider's head of physical security over a video call.
C. Reviewing the provider's third-party audit reports, such as SOC 2 Type 2 and ISO 27001 certifications.
D. Requesting a personal, on-site tour of the data center facility.

31 A network administrator needs to enforce a security rule that blocks a specific malicious IP address from communicating with any instance within a particular subnet in their VPC. The rule must be applied regardless of any other firewall rules attached to individual instances. Which cloud networking component is best suited for this task?

Secure Cloud Network Architecture Medium
A. Network Access Control List (NACL)
B. Security Group
C. NAT Gateway
D. Internet Gateway

32 A security analyst discovers two vulnerabilities: Vulnerability A has a CVSS score of 9.8 (Critical) on an internal, air-gapped development server. Vulnerability B has a CVSS score of 6.5 (Medium) on a public-facing, payment processing web server. Which vulnerability should likely be prioritized for immediate remediation and why?

Vulnerability Analysis and Remediation Medium
A. Vulnerability B, because its location on a critical, internet-facing asset presents a much higher immediate business risk despite the lower CVSS score.
B. Neither, as one is internal and the other is only a medium risk; focus should be on high-risk public-facing vulnerabilities first.
C. Vulnerability A, because a CVSS score of 9.8 always takes precedence over any other factor.
D. Both should be remediated with equal priority as one is critical and the other is on a critical asset.

33 A global online service requires a disaster recovery strategy that can handle an entire cloud region becoming unavailable. The business has defined a Recovery Time Objective (RTO) of 15 minutes and a Recovery Point Objective (RPO) of 5 minutes. Which of the following strategies best meets these requirements?

Redundancy Strategies Medium
A. A multi-region, active-active architecture with continuous data replication.
B. A multi-availability zone deployment with nightly database snapshots.
C. A pilot light strategy where infrastructure is provisioned on-demand in a second region during a disaster.
D. A single-region deployment with backups taken every 24 hours.

34 A company's disaster recovery plan specifies a Recovery Point Objective (RPO) of 1 hour. What does this metric signify for their data backup and replication strategy?

Explain Resiliency and Site Security Concepts Medium
A. The mean time between system failures must be greater than 1 hour.
B. The company must have a data backup or replica that is, at most, 1 hour old, defining the maximum acceptable data loss.
C. The time to detect a system failure and initiate the recovery process must be less than 1 hour.
D. The entire system must be fully restored and operational within 1 hour after a disaster is declared.

35 A key component of implementing a Zero Trust Architecture is micro-segmentation. How does micro-segmentation improve security in a cloud environment compared to traditional network segmentation?

Embedded Systems and Zero Trust Architecture Medium
A. It focuses exclusively on encrypting all data-in-transit between virtual machines.
B. It applies fine-grained security policies to individual workloads or applications, drastically limiting lateral movement even within the same network segment.
C. It creates large, secure zones (e.g., DMZ, internal, database) separated by firewalls.
D. It relies on a single perimeter firewall to inspect all traffic entering and leaving the cloud network.

36 A security audit of a cloud environment finds an IAM role with the following policy attached: {"Effect": "Allow", "Action": "s3:*", "Resource": "*"}. This policy is assigned to a VM that only needs to read log files from a single bucket. Why is this policy a significant security risk?

Application and Cloud Vulnerabilities Medium
A. It only allows access to S3 and not other required services.
B. It grants full administrative permissions to all S3 buckets in the account, violating the principle of least privilege.
C. The Effect should be Deny to be secure.
D. The policy is invalid because Resource cannot be a wildcard.

37 A security team is tasked with assessing the security of a new, complex web application just before its production launch. They need to understand how a real-world attacker might exploit chained vulnerabilities and business logic flaws. Which method would be most effective for this assessment?

Vulnerability Identification Methods Medium
A. Manual Penetration Testing
B. Code Review
C. Automated DAST Scanning
D. Automated SAST Scanning

38 A company wants to gain visibility into and enforce policies on how its employees use third-party SaaS applications (e.g., Salesforce, Office 365, Dropbox), regardless of the user's location or device. Which security solution is specifically designed to address this requirement?

Cloud Infrastructure Medium
A. Web Application Firewall (WAF)
B. Virtual Private Network (VPN)
C. Network Intrusion Detection System (NIDS)
D. Cloud Access Security Broker (CASB)

39 During a security audit, it was found that the firmware on several critical network switches and routers has not been updated since their installation two years ago. Why does this represent a significant security risk?

Device and OS Vulnerabilities Medium
A. Firmware can contain exploitable vulnerabilities, and a compromise of a network device could allow an attacker to monitor, redirect, or block all network traffic.
B. Outdated firmware can slow down network performance, leading to a denial-of-service condition.
C. Running old firmware violates the hardware warranty, making the devices unsupported.
D. Firmware updates are primarily for adding new features, and the company is missing out on improved functionality.

40 After a vulnerability has been identified and prioritized, a patch is developed and deployed to the affected systems. What is the crucial final step in the remediation process for this specific vulnerability?

Vulnerability Analysis and Remediation Medium
A. Update the asset inventory to reflect the new patch level of the systems.
B. Notify the system owners that the patching has been completed.
C. Perform a validation scan or test to confirm that the patch has been applied correctly and the vulnerability is no longer present.
D. Close the ticket associated with the vulnerability in the tracking system.

41 A financial services company is architecting a multi-cloud strategy using AWS and Azure. They need to enforce a consistent, centralized security policy for all egress traffic from both clouds, including deep packet inspection (DPI) and IDS/IPS, without creating a performance bottleneck or routing all traffic back to on-premises. Which of the following designs is the most scalable and cloud-native solution?

Secure Cloud Network Architecture Hard
A. Deploying identical virtual firewall appliances in a dedicated 'security VPC/VNet' in each cloud and using native routing (e.g., Transit Gateway/vWAN) to force all traffic through them.
B. Utilizing a cloud-agnostic Secure Access Service Edge (SASE) provider, which inspects traffic at its global points of presence (PoPs) closest to the end-user or destination.
C. Establishing a high-bandwidth Direct Connect/ExpressRoute to an on-premises data center and routing all egress traffic through a centralized, physical security stack.
D. Configuring host-based firewalls on every VM and container, with a centralized management console to push identical rule sets to all instances across both clouds.

42 An organization is deploying a large fleet of resource-constrained IoT sensors in a hostile environment. To implement a Zero Trust model, each device must prove its identity and integrity before being allowed to communicate with the cloud backend. Which combination of technologies provides the most robust and scalable solution for this initial device attestation process?

Embedded Systems and Zero Trust Architecture Hard
A. MAC address filtering on the network gateway combined with a unique API key embedded in the device's application code.
B. Pre-shared keys (PSKs) stored in the device's firmware, authenticated over a TLS connection.
C. Client-side X.509 certificates issued by a private CA, where the device's private key is stored on its flash memory.
D. A Trusted Platform Module (TPM) performing a cryptographic quote of Platform Configuration Registers (PCRs), signed by an Attestation Identity Key (AIK), and verified by a cloud-based attestation service.

43 A security team uses the Exploit Prediction Scoring System (EPSS) and the Common Vulnerability Scoring System (CVSS) for vulnerability prioritization. They identify two critical vulnerabilities in their external-facing web servers:

Vulnerability A: CVSS v3.1 Score: 9.8 (Critical), EPSS Score: 1.5% (Probability of exploitation in next 30 days is 1.5%)
Vulnerability B: CVSS v3.1 Score: 7.5 (High), EPSS Score: 92% (Probability of exploitation in next 30 days is 92%)

Given limited resources for immediate patching, which statement represents the most effective risk-based remediation strategy?

Vulnerability Analysis and Remediation Hard
A. Remediate Vulnerability A first, as its CVSS score of 9.8 indicates the highest potential impact and technical severity.
B. Remediate both simultaneously, as one has high impact and the other has high likelihood, making them equal in priority.
C. Deprioritize both vulnerabilities and focus on hardening the web server configuration, as patching is too resource-intensive.
D. Remediate Vulnerability B first, as the high EPSS score indicates it is actively being exploited or is highly likely to be exploited very soon, posing a more immediate threat.

44 A company is designing a multi-region database architecture for a critical, stateful application requiring an RPO of zero and an RTO of less than 1 minute. They are evaluating two strategies: synchronous replication in an Active-Passive setup versus asynchronous replication in an Active-Active setup. What is the primary trade-off that makes the Active-Active asynchronous model potentially more resilient to a full region failure, despite the risk of data loss inherent in asynchronous replication?

Redundancy Strategies Hard
A. Active-Active can handle a region failure without any failover process, as the other regions are already serving traffic, thus achieving a near-zero RTO. The potential data loss is often managed at the application layer.
B. Active-Passive synchronous replication can lead to a 'split-brain' scenario during a network partition, which is harder to resolve than data conflicts in an asynchronous system.
C. Active-Active with asynchronous replication allows for lower write latency during normal operations, improving user experience.
D. Active-Passive with synchronous replication is more expensive due to the need for high-bandwidth, low-latency links between regions.

45 A serverless application deployed on AWS Lambda is found to be vulnerable to a Server-Side Request Forgery (SSRF) attack. The vulnerable function needs to make legitimate API calls to a set of predefined internal services running in a VPC. What is the most effective and least-privilege mitigation strategy to prevent exploitation while maintaining required functionality?

Application and Cloud Vulnerabilities Hard
A. Place the Lambda function within a VPC, route all its egress traffic through a NAT Gateway, and use Network ACLs to whitelist only the IPs of the required internal services.
B. Configure the Lambda function's execution role with an IAM policy that denies all outbound network traffic (ec2:CreateNetworkInterface, ec2:DeleteNetworkInterface, etc.).
C. Implement a Web Application Firewall (WAF) in front of the API Gateway that triggers the Lambda function, with a rule to block common SSRF payloads.
D. Place the Lambda function within a VPC with no internet access, use VPC Endpoints for the specific AWS services it needs, and configure the function's security group to only allow egress traffic to the security groups of the required internal services on the specific ports they use.

46 A large enterprise has a hybrid-cloud setup with an on-premises data center connected to an AWS cloud environment via Direct Connect. They need to architect a solution where multiple VPCs can communicate with the on-premises network and with each other, but without allowing direct VPC-to-VPC communication for certain 'production' VPCs. All traffic must be logged and inspected at a central point. Which AWS architecture correctly implements this policy?

Cloud Infrastructure Hard
A. Deploying a software-defined WAN (SD-WAN) solution with virtual appliances in each VPC, creating a full mesh of tunnels and using the SD-WAN's central policy engine to restrict traffic flows.
B. A hub-and-spoke model using VPC Peering, where a central 'inspection' VPC is peered with all other VPCs and the on-prem network. Routing tables are manually configured to deny traffic between specific production VPCs.
C. A hub-and-spoke model using AWS Transit Gateway, where all VPCs and the Direct Connect Gateway are attached. A separate route table is associated with the production VPC attachments, only allowing routes to the inspection VPC and the on-prem network.
D. A flat network model where every VPC has its own VPN connection back to the on-premises data center, and inter-VPC traffic is routed on-prem for inspection.

47 A zero-day memory corruption vulnerability is discovered in the Linux kernel's networking stack, allowing for remote code execution. A patch is not yet available. An administrator needs to mitigate this threat for a fleet of cloud VMs without taking them offline. Which of the following kernel-level security mechanisms would be the most effective in preventing the exploitation of this specific class of vulnerability by constraining the behavior of network-facing daemons?

Device and OS Vulnerabilities Hard
A. Applying a seccomp-bpf filter to the network daemon to strictly whitelist the specific system calls it is permitted to make, thus blocking the unusual calls required by the exploit.
B. Configuring stricter iptables rules to drop packets from untrusted sources.
C. Enabling Address Space Layout Randomization (ASLR) at the highest level (kernel.randomize_va_space = 2).
D. Enforcing a mandatory access control (MAC) policy using SELinux or AppArmor to confine the network daemon, preventing it from accessing unauthorized files.

48 An organization is conducting a chaos engineering experiment to test the resiliency of its microservices architecture against cascading failures. They want to simulate the real-world impact of a 'noisy neighbor'—a single service that suddenly consumes excessive database connections, starving other critical services. What is the most precise and realistic type of fault to inject to simulate this specific failure mode?

Explain Resiliency and Site Security Concepts Hard
A. A 'shutdown' attack that terminates the database instances.
B. A 'connection pool saturation' attack that injects logic into the 'noisy neighbor' service to rapidly open and hold database connections without closing them, while keeping other resources (CPU/memory) at normal levels.
C. A 'blackhole' attack that drops all network traffic to and from the database.
D. A 'resource exhaustion' attack that injects a sidecar process to consume all CPU and memory on the database host.

49 In a large, dynamic Kubernetes environment, a security team needs to maintain a real-time inventory of all running container images and associate them with known vulnerabilities (CVEs) and their respective application owners. Traditional CMDBs updated via nightly scans are proving inadequate due to the ephemeral nature of containers. What is the most effective modern approach to solve this asset management challenge?

Asset Management Hard
A. Run a nightly cron job on a bastion host that executes docker images and kubectl get pods commands, parsing the output to update a CSV file.
B. Mandate that all developers manually register their container images and application ownership in a central wiki before deployment.
C. Implement an admission controller in the Kubernetes cluster that integrates with an image scanner. The controller would annotate every pod with metadata including image digest, CVE scan results, and ownership info derived from the CI/CD pipeline, and store this data in a real-time security observability platform.
D. Use a Cloud Security Posture Management (CSPM) tool that periodically queries the cloud provider's container registry API to list all stored images.

50 A company is using a colocation facility that is certified as a Tier IV data center. While the facility provides robust controls against external threats, the company is concerned about a sophisticated insider threat from the data center's own staff. They want to implement a control that provides a high-assurance, non-repudiable log of who physically accessed their specific server rack and when. What is the most effective combination of controls to achieve this?

Physical Security Hard
A. Placing a tamper-evident seal on the rack door and inspecting it during weekly audits.
B. Implementing a multi-factor access control system on their specific rack door that requires both a facility-issued smart card and a unique biometric (e.g., fingerprint) scan, coupled with a dedicated, motion-activated IP camera that records all access events to the company's private cloud storage.
C. Installing a standard key lock on the server rack cage and keeping a manual, paper-based access log.
D. Requiring all data center staff to wear RFID badges that are logged when they enter the main data hall.

51 A security research team wants to proactively discover zero-day, logic-based vulnerabilities in a complex web application's transaction processing API. Standard Dynamic Application Security Testing (DAST) tools are failing to find issues because they don't understand the application's business logic. Which vulnerability identification method would be most effective in this scenario?

Vulnerability Identification Methods Hard
A. Performing grey-box fuzzing, where the fuzzer is seeded with legitimate API request formats and traffic captures, and then uses a mutation-based engine to generate and send millions of semi-valid, unexpected inputs to the API endpoints.
B. Deploying a Web Application Firewall (WAF) with a machine-learning-based anomaly detection engine to monitor production traffic.
C. Running a Software Composition Analysis (SCA) tool to identify known vulnerabilities in the application's open-source dependencies.
D. Using a next-generation static analysis (SAST) tool that can build a complete control flow graph of the application code.

52 A mature organization is implementing a quantitative risk model for its vulnerability management program. To calculate the annualized loss expectancy (ALE) for a specific vulnerability on a critical asset, they need to determine the Single Loss Expectancy (SLE). Given the following: Asset Value (AV) = $5,000,000, and the vulnerability could lead to a 40% loss of data integrity and availability for this asset. What is the correct formula and resulting SLE?

Explain Vulnerability Management Hard
A. SLE = Annualized Rate of Occurrence (ARO) AV = (Requires ARO) $5,000,000
B. SLE = AV / Exposure Factor (EF) = 12,500,000
C. SLE = AV * Exposure Factor (EF) = 2,000,000
D. SLE = CVSS Score AV = 8.5 42,500,000

53 An organization needs to provide private, secure access to its internal web applications, hosted in a cloud VPC, for its remote workforce. They want to avoid exposing any services to the public internet and adhere to Zero Trust principles by authenticating and authorizing every connection. Which solution best meets these requirements?

Secure Cloud Network Architecture Hard
A. A Zero Trust Network Access (ZTNA) solution, where an agent on the user's device creates a secure, outbound-only micro-tunnel to a specific application, brokered by a cloud service that integrates with the company's Identity Provider (IdP) for authentication and posture checks.
B. A set of bastion hosts (jump boxes) in a public subnet, which users SSH into before accessing the internal applications.
C. A traditional client-to-site VPN, where users connect to a VPN concentrator at the VPC edge, gaining full network access to the private subnets.
D. Configuring the internal applications' security groups to allow access from a list of all employees' home IP addresses.

54 A cloud architect is designing a system for high availability and must choose a redundancy model for a cluster of stateless web servers behind a load balancer. The requirement is to withstand the failure of any single server without performance degradation. The cluster currently requires 4 active servers to handle peak load. Which redundancy model is the most cost-effective while strictly meeting the requirement?

Redundancy Strategies Hard
A. N+1 redundancy, deploying 5 servers (4 required + 1 spare).
B. N+2 redundancy, deploying 6 servers (4 required + 2 spare).
C. 2N redundancy, deploying 8 servers (a full duplicate set).
D. N+N redundancy, deploying 8 servers in two separate Availability Zones (4 in each).

55 A containerized application running in a cloud Kubernetes service is found to be vulnerable to a time-of-check to time-of-use (TOCTOU) race condition vulnerability. The vulnerability occurs when the application checks a user's permissions for a file and then, in a separate operation, accesses that file, allowing an attacker to potentially swap the file in between the two operations. Which security control is most effective at mitigating this specific type of vulnerability at the infrastructure level?

Application and Cloud Vulnerabilities Hard
A. Using a read-only root filesystem for the container and mounting specific directories as writable volumes where necessary.
B. Implementing network micro-segmentation using a service mesh to restrict inter-pod communication.
C. Applying a Linux Security Module (LSM) profile like AppArmor or SELinux to the container that defines granular file access permissions and prevents the application process from accessing unexpected file paths.
D. Enforcing a strict Pod Security Policy (or its successor) that disables privilege escalation (allowPrivilegeEscalation: false).

56 A company is migrating a legacy monolithic application to the cloud. The application relies heavily on multicast networking for service discovery among its components. However, major public cloud providers like AWS and Azure do not support multicast routing within their standard VPC/VNet offerings. What is the most viable and least disruptive architectural solution to enable this application to function in the cloud?

Cloud Infrastructure Hard
A. Encapsulate all application traffic in a GRE tunnel back to the on-premises data center, where multicast is supported, and route it back to the cloud.
B. Deploy a software-defined networking (SDN) overlay network on top of the cloud infrastructure. The virtual routers in the overlay network would be configured to support multicast routing within the overlay.
C. Refactor the entire application to use a cloud-native service discovery mechanism like a service mesh or a registration service (e.g., Consul, Eureka).
D. Configure unicast-based static routes on every virtual machine to simulate the multicast group communication.

57 An architect is designing a system that must have a Recovery Point Objective (RPO) of 15 minutes and a Recovery Time Objective (RTO) of 1 hour. The system is deployed in a single cloud region. Which of the following disaster recovery strategies is the most appropriate and cost-effective for these specific requirements?

Explain Resiliency and Site Security Concepts Hard
A. Multi-Site Active-Active: The application is deployed in its full production scale in two or more regions, with a global load balancer distributing traffic between them. Data is replicated between regions.
B. Pilot Light: A minimal version of the core infrastructure (e.g., small database instances, app servers) is kept running in a second region. In a disaster, this environment is scaled up to production size, and data is restored from replicated snapshots.
C. Warm Standby: A scaled-down but fully functional version of the production environment is running in a second region, with data being actively replicated (e.g., asynchronous database replication). Failover involves redirecting traffic and potentially scaling up.
D. Backup and Restore: Daily snapshots of databases and EBS volumes are taken and stored in a different region. In a disaster, new infrastructure is provisioned from IaC templates and data is restored from the snapshots.

58 A security analyst is investigating a fileless malware attack on a cloud server. The malware exists only in memory and leverages legitimate system tools like PowerShell to execute its payload, evading traditional signature-based antivirus. Which data source and analysis technique would be most effective in detecting and tracing the activity of this malware?

Device and OS Vulnerabilities Hard
A. Reviewing the cloud provider's API access logs (e.g., CloudTrail) to see if the server's IAM role was used to access other cloud resources.
B. Analyzing network flow logs to identify anomalous traffic patterns originating from the server.
C. Performing a full disk forensic image analysis to search for indicators of compromise (IOCs) in the filesystem.
D. Analyzing logs from an Endpoint Detection and Response (EDR) agent that records process creation events, parent-child process relationships, and command-line arguments for all executed commands.

59 In a Zero Trust architecture for an industrial control system (ICS) network, a micro-segmentation strategy is being implemented to protect PLCs (Programmable Logic Controllers). The PLCs use a specific, non-IP-based industrial protocol (e.g., Profibus) on their local segment, which is connected to the corporate IT network via a gateway. What is the most effective way to enforce a least-privilege policy for communication to these PLCs?

Embedded Systems and Zero Trust Architecture Hard
A. Require all engineers to connect through a VPN to the OT network segment before they can communicate with the PLCs.
B. Deploy an Intrusion Detection System (IDS) on a SPAN port to monitor the traffic and alert on any malicious communication patterns.
C. Place a standard Layer 4 firewall between the IT and OT networks and create rules based on the IP addresses of the engineering workstations that need access.
D. Implement a next-generation firewall (NGFW) with deep packet inspection (DPI) capabilities for the specific ICS protocol. The policy should only allow specific commands (e.g., 'read_coils') from authorized sources to specific PLCs, while denying all others (e.g., 'write_program').

60 A security team has identified a critical vulnerability in a third-party library used by dozens of microservices. The patch from the vendor is available, but deploying it requires rebuilding, re-testing, and re-deploying all affected services, which will take several weeks. Management needs an immediate compensating control to mitigate the risk. The vulnerability is a remote code execution (RCE) flaw triggered by a specific, malformed HTTP header. What is the most effective and rapidly deployable compensating control?

Vulnerability Analysis and Remediation Hard
A. Initiate an emergency change request to patch all microservices immediately, bypassing the standard QA process.
B. Isolate all affected microservices in a separate network segment and block all access to them until they are patched.
C. Perform a manual code review of all microservices to find and fix the vulnerable code without using the vendor's patch.
D. Apply a virtual patch using a Web Application Firewall (WAF) or a similar traffic inspection tool. The patch would be a rule that inspects all incoming traffic and blocks any request containing the specific malformed header that triggers the vulnerability.