Unit 3 - Practice Quiz

INT242 60 Questions
0 Correct 0 Wrong 60 Left
0/60

1 What is the primary goal of implementing a secure cloud network architecture?

Secure Cloud Network Architecture Easy
A. To reduce the cost of monthly cloud subscriptions.
B. To protect data and resources hosted in the cloud from unauthorized access and threats.
C. To make websites look more visually appealing.
D. To increase the processing speed of virtual machines.

2 In cloud computing, what does "IaaS" stand for?

Cloud Infrastructure Easy
A. Information as a Service
B. Infrastructure as a Service
C. Internet as a Service
D. Identity as a Service

3 What is the core principle of a "Zero Trust" security model?

Embedded Systems and Zero Trust Architecture Easy
A. Never trust, always verify
B. Trust traffic only from known IP addresses
C. Trust all users inside the network
D. Verify users only once per day

4 In cybersecurity, what does "resiliency" mean?

Explain Resiliency and Site Security Concepts Easy
A. The number of users a system can support simultaneously.
B. The ability of a system to withstand, adapt to, and recover from disruptions.
C. The speed at which a computer can perform calculations.
D. The physical size of a data center.

5 What is the first critical step in a cybersecurity asset management program?

Asset Management Easy
A. Purchasing new equipment.
B. Decommissioning old assets.
C. Applying security patches to all servers.
D. Creating an inventory of all hardware, software, and data assets.

6 What is the primary purpose of implementing redundancy in a network?

Redundancy Strategies Easy
A. To increase the speed of a single connection.
B. To improve availability by eliminating single points of failure.
C. To simplify the network design.
D. To reduce the overall cost of the system.

7 Which of the following is an example of a physical security control?

Physical Security Easy
A. Security guards and fences
B. A software firewall
C. Antivirus software
D. A strong password policy

8 What is the main goal of a vulnerability management program?

Explain Vulnerability Management Easy
A. To respond only after a security breach has occurred.
B. To train employees on how to use software.
C. To block all incoming internet traffic.
D. To continuously identify, classify, and remediate security weaknesses.

9 What is one of the most common causes of operating system (OS) vulnerabilities?

Device and OS Vulnerabilities Easy
A. Missing security patches
B. Installing too many applications
C. Using a high-resolution monitor
D. Having a fast processor

10 A SQL Injection attack is an example of what type of vulnerability?

Application and Cloud Vulnerabilities Easy
A. Hardware vulnerability
B. Application vulnerability
C. Network protocol vulnerability
D. Physical vulnerability

11 What is the primary function of a vulnerability scanner?

Vulnerability Identification Methods Easy
A. To encrypt data stored on a computer.
B. To automatically probe systems for known security weaknesses.
C. To automatically fix all discovered security issues.
D. To act as a firewall to block attacks.

12 In the context of vulnerability management, what does "remediation" mean?

Vulnerability Analysis and Remediation Easy
A. The process of rating the severity of a vulnerability.
B. The process of discovering a new vulnerability.
C. The process of ignoring a low-risk vulnerability.
D. The process of fixing or eliminating a discovered vulnerability.

13 A Virtual Private Cloud (VPC) provides what key feature within a public cloud?

Cloud Infrastructure Easy
A. A free software marketplace.
B. A logically isolated section of the cloud network.
C. A direct, high-speed connection to the internet.
D. A physical server dedicated to a single customer.

14 The concept of having a fully equipped, duplicate data center that is always online and ready to take over immediately is known as:

Redundancy Strategies Easy
A. A hot site
B. A warm site
C. A cold site
D. A cloud site

15 What is the primary purpose of a mantrap at the entrance of a secure data center?

Physical Security Easy
A. To provide a place for visitors to wait before entry.
B. To scan visitors for metal objects.
C. To automatically sanitize individuals entering the facility.
D. To prevent tailgating by controlling entry one person at a time.

16 An ethical hacker hired to simulate an attack on a company's network to find weaknesses is performing what type of assessment?

Vulnerability Identification Methods Easy
A. Risk analysis
B. Asset inventory
C. Compliance audit
D. Penetration test

17 What is "failover"?

Explain Resiliency and Site Security Concepts Easy
A. A planned system shutdown for maintenance.
B. A process that automatically switches to a standby system when the primary system fails.
C. A type of cyberattack that causes a system to crash.
D. A security feature that locks an account after too many failed login attempts.

18 After identifying vulnerabilities, what is the next logical step in the analysis phase?

Vulnerability Analysis and Remediation Easy
A. Immediately rebooting all affected systems.
B. Deleting the scan results to save space.
C. Buying new hardware to replace the old systems.
D. Prioritizing vulnerabilities based on risk and impact.

19 Which of these is the best example of an embedded system?

Embedded Systems and Zero Trust Architecture Easy
A. A cloud database server
B. A desktop operating system like Windows 11
C. A web browser application
D. A smart refrigerator

20 What is a security group in a cloud environment?

Secure Cloud Network Architecture Easy
A. A virtual firewall that controls inbound and outbound traffic for a virtual machine.
B. A list of approved software for the company.
C. A team of cybersecurity professionals.
D. A physical cage for locking up servers.

21 A company hosts its production and development environments in separate Virtual Private Clouds (VPCs) within the same cloud region. They need to allow the development VPC to access a specific database service in the production VPC without exposing either VPC to the public internet. Which of the following is the most secure and efficient method to achieve this?

Secure Cloud Network Architecture Medium
A. Deploy a NAT Gateway in the production VPC to allow inbound traffic from the development VPC.
B. Configure VPC Peering between the two VPCs with restrictive routing rules.
C. Set up a VPN gateway in each VPC and connect them over the public internet.
D. Assign public IP addresses to the database and development instances and use an Internet Gateway.

22 An organization migrates its web application to a Platform-as-a-Service (PaaS) offering. A critical vulnerability is discovered in the underlying operating system of the servers hosting the PaaS environment. According to the shared responsibility model, who is primarily responsible for patching this OS vulnerability?

Cloud Infrastructure Medium
A. Both the customer and the provider share equal responsibility for patching
B. The third-party security auditor
C. The Cloud Provider
D. The Customer (the organization)

23 A manufacturing company is implementing a Zero Trust Architecture for its network of IoT-enabled factory sensors. Which of the following actions best embodies the core principle of 'never trust, always verify' in this context?

Embedded Systems and Zero Trust Architecture Medium
A. Encrypting all traffic between the sensors and the central data collector.
B. Requiring each sensor to present a unique, short-lived digital certificate to authenticate itself before any data transmission.
C. Conducting annual penetration tests on the sensor network.
D. Placing all sensors on a single, isolated VLAN with a firewall at the edge.

24 An e-commerce company wants to ensure its primary application remains available even if an entire cloud availability zone (AZ) fails. They require automatic failover with minimal downtime. Which redundancy strategy should they implement?

Redundancy Strategies Medium
A. Maintaining cold backups of the application and data in a different Region.
B. Deploying application instances across multiple Availability Zones within the same Region, behind a load balancer.
C. Creating daily snapshots of the server and storing them in the same Availability Zone.
D. Deploying the application in a single, large instance within one Availability Zone.

25 A company has successfully implemented a vulnerability scanning tool that regularly scans its assets and generates reports. However, the security team is overwhelmed with the number of findings, and the same critical vulnerabilities reappear in subsequent scans. Which phase of the vulnerability management lifecycle is most likely being neglected?

Explain Vulnerability Management Medium
A. Scanning and Identification
B. Remediation and Validation
C. Discovery and Asset Inventory
D. Reporting and Triage

26 A security alert is issued for a critical zero-day remote code execution (RCE) vulnerability in the OS of a company's public-facing web servers. The OS vendor has not yet released a patch. What is the most appropriate immediate action to mitigate the risk?

Device and OS Vulnerabilities Medium
A. Implement a virtual patch using a Web Application Firewall (WAF) or Intrusion Prevention System (IPS) to block exploit attempts.
B. Wait for the vendor to release an official patch to avoid system instability.
C. Immediately restore the servers from the most recent backup.
D. Take the servers offline until a patch is released by the vendor.

27 A cloud-hosted application uses a function that takes a URL provided by a user and fetches content from that URL to be displayed. A penetration tester discovers they can provide an internal IP address like http://169.254.169.254/latest/meta-data/ to retrieve sensitive instance metadata from the cloud provider. What is this vulnerability called?

Application and Cloud Vulnerabilities Medium
A. Cross-Site Scripting (XSS)
B. Server-Side Request Forgery (SSRF)
C. Insecure Direct Object Reference (IDOR)
D. SQL Injection (SQLi)

28 A development team wants to integrate security checks directly into their CI/CD pipeline to identify common coding errors and vulnerabilities in their Java application's source code before the application is ever compiled or run. Which method is most suitable for this purpose?

Vulnerability Identification Methods Medium
A. Dynamic Application Security Testing (DAST)
B. Penetration Testing
C. Static Application Security Testing (SAST)
D. Fuzzing

29 What is the primary challenge for traditional asset management programs when applied to a modern, auto-scaling cloud environment, and what is the best approach to address it?

Asset Management Medium
A. The variety of instance types; address by creating a manual spreadsheet of all possible types.
B. The lack of physical access to hardware; address with third-party audits.
C. The ephemeral nature of resources (e.g., containers, VMs); address with dynamic discovery and automated tagging.
D. The high cost of cloud assets; address by purchasing reserved instances.

30 A financial services company is evaluating a public cloud provider and needs to verify the provider's physical security controls for its data centers. Which of the following provides the most reliable and standardized assurance?

Physical Security Medium
A. Interviewing the provider's head of physical security over a video call.
B. Requesting a personal, on-site tour of the data center facility.
C. Reviewing the provider's third-party audit reports, such as SOC 2 Type 2 and ISO 27001 certifications.
D. Reading the marketing materials and whitepapers published on the provider's website.

31 A network administrator needs to enforce a security rule that blocks a specific malicious IP address from communicating with any instance within a particular subnet in their VPC. The rule must be applied regardless of any other firewall rules attached to individual instances. Which cloud networking component is best suited for this task?

Secure Cloud Network Architecture Medium
A. Security Group
B. Internet Gateway
C. NAT Gateway
D. Network Access Control List (NACL)

32 A security analyst discovers two vulnerabilities: Vulnerability A has a CVSS score of 9.8 (Critical) on an internal, air-gapped development server. Vulnerability B has a CVSS score of 6.5 (Medium) on a public-facing, payment processing web server. Which vulnerability should likely be prioritized for immediate remediation and why?

Vulnerability Analysis and Remediation Medium
A. Vulnerability B, because its location on a critical, internet-facing asset presents a much higher immediate business risk despite the lower CVSS score.
B. Neither, as one is internal and the other is only a medium risk; focus should be on high-risk public-facing vulnerabilities first.
C. Vulnerability A, because a CVSS score of 9.8 always takes precedence over any other factor.
D. Both should be remediated with equal priority as one is critical and the other is on a critical asset.

33 A global online service requires a disaster recovery strategy that can handle an entire cloud region becoming unavailable. The business has defined a Recovery Time Objective (RTO) of 15 minutes and a Recovery Point Objective (RPO) of 5 minutes. Which of the following strategies best meets these requirements?

Redundancy Strategies Medium
A. A multi-region, active-active architecture with continuous data replication.
B. A multi-availability zone deployment with nightly database snapshots.
C. A pilot light strategy where infrastructure is provisioned on-demand in a second region during a disaster.
D. A single-region deployment with backups taken every 24 hours.

34 A company's disaster recovery plan specifies a Recovery Point Objective (RPO) of 1 hour. What does this metric signify for their data backup and replication strategy?

Explain Resiliency and Site Security Concepts Medium
A. The company must have a data backup or replica that is, at most, 1 hour old, defining the maximum acceptable data loss.
B. The mean time between system failures must be greater than 1 hour.
C. The entire system must be fully restored and operational within 1 hour after a disaster is declared.
D. The time to detect a system failure and initiate the recovery process must be less than 1 hour.

35 A key component of implementing a Zero Trust Architecture is micro-segmentation. How does micro-segmentation improve security in a cloud environment compared to traditional network segmentation?

Embedded Systems and Zero Trust Architecture Medium
A. It applies fine-grained security policies to individual workloads or applications, drastically limiting lateral movement even within the same network segment.
B. It focuses exclusively on encrypting all data-in-transit between virtual machines.
C. It creates large, secure zones (e.g., DMZ, internal, database) separated by firewalls.
D. It relies on a single perimeter firewall to inspect all traffic entering and leaving the cloud network.

36 A security audit of a cloud environment finds an IAM role with the following policy attached: {"Effect": "Allow", "Action": "s3:*", "Resource": "*"}. This policy is assigned to a VM that only needs to read log files from a single bucket. Why is this policy a significant security risk?

Application and Cloud Vulnerabilities Medium
A. It only allows access to S3 and not other required services.
B. The Effect should be Deny to be secure.
C. It grants full administrative permissions to all S3 buckets in the account, violating the principle of least privilege.
D. The policy is invalid because Resource cannot be a wildcard.

37 A security team is tasked with assessing the security of a new, complex web application just before its production launch. They need to understand how a real-world attacker might exploit chained vulnerabilities and business logic flaws. Which method would be most effective for this assessment?

Vulnerability Identification Methods Medium
A. Code Review
B. Manual Penetration Testing
C. Automated DAST Scanning
D. Automated SAST Scanning

38 A company wants to gain visibility into and enforce policies on how its employees use third-party SaaS applications (e.g., Salesforce, Office 365, Dropbox), regardless of the user's location or device. Which security solution is specifically designed to address this requirement?

Cloud Infrastructure Medium
A. Network Intrusion Detection System (NIDS)
B. Virtual Private Network (VPN)
C. Web Application Firewall (WAF)
D. Cloud Access Security Broker (CASB)

39 During a security audit, it was found that the firmware on several critical network switches and routers has not been updated since their installation two years ago. Why does this represent a significant security risk?

Device and OS Vulnerabilities Medium
A. Outdated firmware can slow down network performance, leading to a denial-of-service condition.
B. Running old firmware violates the hardware warranty, making the devices unsupported.
C. Firmware can contain exploitable vulnerabilities, and a compromise of a network device could allow an attacker to monitor, redirect, or block all network traffic.
D. Firmware updates are primarily for adding new features, and the company is missing out on improved functionality.

40 After a vulnerability has been identified and prioritized, a patch is developed and deployed to the affected systems. What is the crucial final step in the remediation process for this specific vulnerability?

Vulnerability Analysis and Remediation Medium
A. Notify the system owners that the patching has been completed.
B. Update the asset inventory to reflect the new patch level of the systems.
C. Perform a validation scan or test to confirm that the patch has been applied correctly and the vulnerability is no longer present.
D. Close the ticket associated with the vulnerability in the tracking system.

41 A financial services company is architecting a multi-cloud strategy using AWS and Azure. They need to enforce a consistent, centralized security policy for all egress traffic from both clouds, including deep packet inspection (DPI) and IDS/IPS, without creating a performance bottleneck or routing all traffic back to on-premises. Which of the following designs is the most scalable and cloud-native solution?

Secure Cloud Network Architecture Hard
A. Deploying identical virtual firewall appliances in a dedicated 'security VPC/VNet' in each cloud and using native routing (e.g., Transit Gateway/vWAN) to force all traffic through them.
B. Configuring host-based firewalls on every VM and container, with a centralized management console to push identical rule sets to all instances across both clouds.
C. Establishing a high-bandwidth Direct Connect/ExpressRoute to an on-premises data center and routing all egress traffic through a centralized, physical security stack.
D. Utilizing a cloud-agnostic Secure Access Service Edge (SASE) provider, which inspects traffic at its global points of presence (PoPs) closest to the end-user or destination.

42 An organization is deploying a large fleet of resource-constrained IoT sensors in a hostile environment. To implement a Zero Trust model, each device must prove its identity and integrity before being allowed to communicate with the cloud backend. Which combination of technologies provides the most robust and scalable solution for this initial device attestation process?

Embedded Systems and Zero Trust Architecture Hard
A. Pre-shared keys (PSKs) stored in the device's firmware, authenticated over a TLS connection.
B. MAC address filtering on the network gateway combined with a unique API key embedded in the device's application code.
C. A Trusted Platform Module (TPM) performing a cryptographic quote of Platform Configuration Registers (PCRs), signed by an Attestation Identity Key (AIK), and verified by a cloud-based attestation service.
D. Client-side X.509 certificates issued by a private CA, where the device's private key is stored on its flash memory.

43 A security team uses the Exploit Prediction Scoring System (EPSS) and the Common Vulnerability Scoring System (CVSS) for vulnerability prioritization. They identify two critical vulnerabilities in their external-facing web servers:

Vulnerability A: CVSS v3.1 Score: 9.8 (Critical), EPSS Score: 1.5% (Probability of exploitation in next 30 days is 1.5%)
Vulnerability B: CVSS v3.1 Score: 7.5 (High), EPSS Score: 92% (Probability of exploitation in next 30 days is 92%)

Given limited resources for immediate patching, which statement represents the most effective risk-based remediation strategy?

Vulnerability Analysis and Remediation Hard
A. Deprioritize both vulnerabilities and focus on hardening the web server configuration, as patching is too resource-intensive.
B. Remediate both simultaneously, as one has high impact and the other has high likelihood, making them equal in priority.
C. Remediate Vulnerability B first, as the high EPSS score indicates it is actively being exploited or is highly likely to be exploited very soon, posing a more immediate threat.
D. Remediate Vulnerability A first, as its CVSS score of 9.8 indicates the highest potential impact and technical severity.

44 A company is designing a multi-region database architecture for a critical, stateful application requiring an RPO of zero and an RTO of less than 1 minute. They are evaluating two strategies: synchronous replication in an Active-Passive setup versus asynchronous replication in an Active-Active setup. What is the primary trade-off that makes the Active-Active asynchronous model potentially more resilient to a full region failure, despite the risk of data loss inherent in asynchronous replication?

Redundancy Strategies Hard
A. Active-Active with asynchronous replication allows for lower write latency during normal operations, improving user experience.
B. Active-Passive with synchronous replication is more expensive due to the need for high-bandwidth, low-latency links between regions.
C. Active-Passive synchronous replication can lead to a 'split-brain' scenario during a network partition, which is harder to resolve than data conflicts in an asynchronous system.
D. Active-Active can handle a region failure without any failover process, as the other regions are already serving traffic, thus achieving a near-zero RTO. The potential data loss is often managed at the application layer.

45 A serverless application deployed on AWS Lambda is found to be vulnerable to a Server-Side Request Forgery (SSRF) attack. The vulnerable function needs to make legitimate API calls to a set of predefined internal services running in a VPC. What is the most effective and least-privilege mitigation strategy to prevent exploitation while maintaining required functionality?

Application and Cloud Vulnerabilities Hard
A. Implement a Web Application Firewall (WAF) in front of the API Gateway that triggers the Lambda function, with a rule to block common SSRF payloads.
B. Place the Lambda function within a VPC with no internet access, use VPC Endpoints for the specific AWS services it needs, and configure the function's security group to only allow egress traffic to the security groups of the required internal services on the specific ports they use.
C. Configure the Lambda function's execution role with an IAM policy that denies all outbound network traffic (ec2:CreateNetworkInterface, ec2:DeleteNetworkInterface, etc.).
D. Place the Lambda function within a VPC, route all its egress traffic through a NAT Gateway, and use Network ACLs to whitelist only the IPs of the required internal services.

46 A large enterprise has a hybrid-cloud setup with an on-premises data center connected to an AWS cloud environment via Direct Connect. They need to architect a solution where multiple VPCs can communicate with the on-premises network and with each other, but without allowing direct VPC-to-VPC communication for certain 'production' VPCs. All traffic must be logged and inspected at a central point. Which AWS architecture correctly implements this policy?

Cloud Infrastructure Hard
A. A flat network model where every VPC has its own VPN connection back to the on-premises data center, and inter-VPC traffic is routed on-prem for inspection.
B. Deploying a software-defined WAN (SD-WAN) solution with virtual appliances in each VPC, creating a full mesh of tunnels and using the SD-WAN's central policy engine to restrict traffic flows.
C. A hub-and-spoke model using VPC Peering, where a central 'inspection' VPC is peered with all other VPCs and the on-prem network. Routing tables are manually configured to deny traffic between specific production VPCs.
D. A hub-and-spoke model using AWS Transit Gateway, where all VPCs and the Direct Connect Gateway are attached. A separate route table is associated with the production VPC attachments, only allowing routes to the inspection VPC and the on-prem network.

47 A zero-day memory corruption vulnerability is discovered in the Linux kernel's networking stack, allowing for remote code execution. A patch is not yet available. An administrator needs to mitigate this threat for a fleet of cloud VMs without taking them offline. Which of the following kernel-level security mechanisms would be the most effective in preventing the exploitation of this specific class of vulnerability by constraining the behavior of network-facing daemons?

Device and OS Vulnerabilities Hard
A. Enforcing a mandatory access control (MAC) policy using SELinux or AppArmor to confine the network daemon, preventing it from accessing unauthorized files.
B. Applying a seccomp-bpf filter to the network daemon to strictly whitelist the specific system calls it is permitted to make, thus blocking the unusual calls required by the exploit.
C. Enabling Address Space Layout Randomization (ASLR) at the highest level (kernel.randomize_va_space = 2).
D. Configuring stricter iptables rules to drop packets from untrusted sources.

48 An organization is conducting a chaos engineering experiment to test the resiliency of its microservices architecture against cascading failures. They want to simulate the real-world impact of a 'noisy neighbor'—a single service that suddenly consumes excessive database connections, starving other critical services. What is the most precise and realistic type of fault to inject to simulate this specific failure mode?

Explain Resiliency and Site Security Concepts Hard
A. A 'connection pool saturation' attack that injects logic into the 'noisy neighbor' service to rapidly open and hold database connections without closing them, while keeping other resources (CPU/memory) at normal levels.
B. A 'resource exhaustion' attack that injects a sidecar process to consume all CPU and memory on the database host.
C. A 'blackhole' attack that drops all network traffic to and from the database.
D. A 'shutdown' attack that terminates the database instances.

49 In a large, dynamic Kubernetes environment, a security team needs to maintain a real-time inventory of all running container images and associate them with known vulnerabilities (CVEs) and their respective application owners. Traditional CMDBs updated via nightly scans are proving inadequate due to the ephemeral nature of containers. What is the most effective modern approach to solve this asset management challenge?

Asset Management Hard
A. Run a nightly cron job on a bastion host that executes docker images and kubectl get pods commands, parsing the output to update a CSV file.
B. Use a Cloud Security Posture Management (CSPM) tool that periodically queries the cloud provider's container registry API to list all stored images.
C. Implement an admission controller in the Kubernetes cluster that integrates with an image scanner. The controller would annotate every pod with metadata including image digest, CVE scan results, and ownership info derived from the CI/CD pipeline, and store this data in a real-time security observability platform.
D. Mandate that all developers manually register their container images and application ownership in a central wiki before deployment.

50 A company is using a colocation facility that is certified as a Tier IV data center. While the facility provides robust controls against external threats, the company is concerned about a sophisticated insider threat from the data center's own staff. They want to implement a control that provides a high-assurance, non-repudiable log of who physically accessed their specific server rack and when. What is the most effective combination of controls to achieve this?

Physical Security Hard
A. Implementing a multi-factor access control system on their specific rack door that requires both a facility-issued smart card and a unique biometric (e.g., fingerprint) scan, coupled with a dedicated, motion-activated IP camera that records all access events to the company's private cloud storage.
B. Placing a tamper-evident seal on the rack door and inspecting it during weekly audits.
C. Requiring all data center staff to wear RFID badges that are logged when they enter the main data hall.
D. Installing a standard key lock on the server rack cage and keeping a manual, paper-based access log.

51 A security research team wants to proactively discover zero-day, logic-based vulnerabilities in a complex web application's transaction processing API. Standard Dynamic Application Security Testing (DAST) tools are failing to find issues because they don't understand the application's business logic. Which vulnerability identification method would be most effective in this scenario?

Vulnerability Identification Methods Hard
A. Using a next-generation static analysis (SAST) tool that can build a complete control flow graph of the application code.
B. Performing grey-box fuzzing, where the fuzzer is seeded with legitimate API request formats and traffic captures, and then uses a mutation-based engine to generate and send millions of semi-valid, unexpected inputs to the API endpoints.
C. Deploying a Web Application Firewall (WAF) with a machine-learning-based anomaly detection engine to monitor production traffic.
D. Running a Software Composition Analysis (SCA) tool to identify known vulnerabilities in the application's open-source dependencies.

52 A mature organization is implementing a quantitative risk model for its vulnerability management program. To calculate the annualized loss expectancy (ALE) for a specific vulnerability on a critical asset, they need to determine the Single Loss Expectancy (SLE). Given the following: Asset Value (AV) = $5,000,000, and the vulnerability could lead to a 40% loss of data integrity and availability for this asset. What is the correct formula and resulting SLE?

Explain Vulnerability Management Hard
A. SLE = AV / Exposure Factor (EF) = 12,500,000
B. SLE = Annualized Rate of Occurrence (ARO) AV = (Requires ARO) $5,000,000
C. SLE = CVSS Score AV = 8.5 42,500,000
D. SLE = AV * Exposure Factor (EF) = 2,000,000

53 An organization needs to provide private, secure access to its internal web applications, hosted in a cloud VPC, for its remote workforce. They want to avoid exposing any services to the public internet and adhere to Zero Trust principles by authenticating and authorizing every connection. Which solution best meets these requirements?

Secure Cloud Network Architecture Hard
A. A set of bastion hosts (jump boxes) in a public subnet, which users SSH into before accessing the internal applications.
B. Configuring the internal applications' security groups to allow access from a list of all employees' home IP addresses.
C. A traditional client-to-site VPN, where users connect to a VPN concentrator at the VPC edge, gaining full network access to the private subnets.
D. A Zero Trust Network Access (ZTNA) solution, where an agent on the user's device creates a secure, outbound-only micro-tunnel to a specific application, brokered by a cloud service that integrates with the company's Identity Provider (IdP) for authentication and posture checks.

54 A cloud architect is designing a system for high availability and must choose a redundancy model for a cluster of stateless web servers behind a load balancer. The requirement is to withstand the failure of any single server without performance degradation. The cluster currently requires 4 active servers to handle peak load. Which redundancy model is the most cost-effective while strictly meeting the requirement?

Redundancy Strategies Hard
A. N+1 redundancy, deploying 5 servers (4 required + 1 spare).
B. N+2 redundancy, deploying 6 servers (4 required + 2 spare).
C. 2N redundancy, deploying 8 servers (a full duplicate set).
D. N+N redundancy, deploying 8 servers in two separate Availability Zones (4 in each).

55 A containerized application running in a cloud Kubernetes service is found to be vulnerable to a time-of-check to time-of-use (TOCTOU) race condition vulnerability. The vulnerability occurs when the application checks a user's permissions for a file and then, in a separate operation, accesses that file, allowing an attacker to potentially swap the file in between the two operations. Which security control is most effective at mitigating this specific type of vulnerability at the infrastructure level?

Application and Cloud Vulnerabilities Hard
A. Using a read-only root filesystem for the container and mounting specific directories as writable volumes where necessary.
B. Enforcing a strict Pod Security Policy (or its successor) that disables privilege escalation (allowPrivilegeEscalation: false).
C. Implementing network micro-segmentation using a service mesh to restrict inter-pod communication.
D. Applying a Linux Security Module (LSM) profile like AppArmor or SELinux to the container that defines granular file access permissions and prevents the application process from accessing unexpected file paths.

56 A company is migrating a legacy monolithic application to the cloud. The application relies heavily on multicast networking for service discovery among its components. However, major public cloud providers like AWS and Azure do not support multicast routing within their standard VPC/VNet offerings. What is the most viable and least disruptive architectural solution to enable this application to function in the cloud?

Cloud Infrastructure Hard
A. Refactor the entire application to use a cloud-native service discovery mechanism like a service mesh or a registration service (e.g., Consul, Eureka).
B. Configure unicast-based static routes on every virtual machine to simulate the multicast group communication.
C. Encapsulate all application traffic in a GRE tunnel back to the on-premises data center, where multicast is supported, and route it back to the cloud.
D. Deploy a software-defined networking (SDN) overlay network on top of the cloud infrastructure. The virtual routers in the overlay network would be configured to support multicast routing within the overlay.

57 An architect is designing a system that must have a Recovery Point Objective (RPO) of 15 minutes and a Recovery Time Objective (RTO) of 1 hour. The system is deployed in a single cloud region. Which of the following disaster recovery strategies is the most appropriate and cost-effective for these specific requirements?

Explain Resiliency and Site Security Concepts Hard
A. Backup and Restore: Daily snapshots of databases and EBS volumes are taken and stored in a different region. In a disaster, new infrastructure is provisioned from IaC templates and data is restored from the snapshots.
B. Multi-Site Active-Active: The application is deployed in its full production scale in two or more regions, with a global load balancer distributing traffic between them. Data is replicated between regions.
C. Warm Standby: A scaled-down but fully functional version of the production environment is running in a second region, with data being actively replicated (e.g., asynchronous database replication). Failover involves redirecting traffic and potentially scaling up.
D. Pilot Light: A minimal version of the core infrastructure (e.g., small database instances, app servers) is kept running in a second region. In a disaster, this environment is scaled up to production size, and data is restored from replicated snapshots.

58 A security analyst is investigating a fileless malware attack on a cloud server. The malware exists only in memory and leverages legitimate system tools like PowerShell to execute its payload, evading traditional signature-based antivirus. Which data source and analysis technique would be most effective in detecting and tracing the activity of this malware?

Device and OS Vulnerabilities Hard
A. Analyzing network flow logs to identify anomalous traffic patterns originating from the server.
B. Reviewing the cloud provider's API access logs (e.g., CloudTrail) to see if the server's IAM role was used to access other cloud resources.
C. Performing a full disk forensic image analysis to search for indicators of compromise (IOCs) in the filesystem.
D. Analyzing logs from an Endpoint Detection and Response (EDR) agent that records process creation events, parent-child process relationships, and command-line arguments for all executed commands.

59 In a Zero Trust architecture for an industrial control system (ICS) network, a micro-segmentation strategy is being implemented to protect PLCs (Programmable Logic Controllers). The PLCs use a specific, non-IP-based industrial protocol (e.g., Profibus) on their local segment, which is connected to the corporate IT network via a gateway. What is the most effective way to enforce a least-privilege policy for communication to these PLCs?

Embedded Systems and Zero Trust Architecture Hard
A. Deploy an Intrusion Detection System (IDS) on a SPAN port to monitor the traffic and alert on any malicious communication patterns.
B. Require all engineers to connect through a VPN to the OT network segment before they can communicate with the PLCs.
C. Implement a next-generation firewall (NGFW) with deep packet inspection (DPI) capabilities for the specific ICS protocol. The policy should only allow specific commands (e.g., 'read_coils') from authorized sources to specific PLCs, while denying all others (e.g., 'write_program').
D. Place a standard Layer 4 firewall between the IT and OT networks and create rules based on the IP addresses of the engineering workstations that need access.

60 A security team has identified a critical vulnerability in a third-party library used by dozens of microservices. The patch from the vendor is available, but deploying it requires rebuilding, re-testing, and re-deploying all affected services, which will take several weeks. Management needs an immediate compensating control to mitigate the risk. The vulnerability is a remote code execution (RCE) flaw triggered by a specific, malformed HTTP header. What is the most effective and rapidly deployable compensating control?

Vulnerability Analysis and Remediation Hard
A. Isolate all affected microservices in a separate network segment and block all access to them until they are patched.
B. Perform a manual code review of all microservices to find and fix the vulnerable code without using the vendor's patch.
C. Apply a virtual patch using a Web Application Firewall (WAF) or a similar traffic inspection tool. The patch would be a rule that inspects all incoming traffic and blocks any request containing the specific malformed header that triggers the vulnerability.
D. Initiate an emergency change request to patch all microservices immediately, bypassing the standard QA process.