1What is the primary goal of the risk identification step in the risk management process?
Explain Risk Management Processes
Easy
A.To apply security controls to all systems
B.To purchase insurance for all assets
C.To choose a security software
D.To find, recognize, and describe risks that might affect a project or organization
Correct Answer: To find, recognize, and describe risks that might affect a project or organization
Explanation:
Risk identification is the foundational step where potential risks are discovered and documented. The other options are potential outcomes or actions taken in later stages of the process, not the goal of identification itself.
Incorrect! Try again.
2Which of the following describes the risk response strategy of 'risk acceptance'?
Explain Risk Management Processes
Easy
A.Buying cybersecurity insurance
B.Implementing a new security control
C.Deciding not to engage in an activity that is considered risky
D.Acknowledging a risk and making no specific effort to control it
Correct Answer: Acknowledging a risk and making no specific effort to control it
Explanation:
Risk acceptance is a conscious decision to accept the potential loss from a risk. This is often done when the cost of mitigation outweighs the potential loss.
Incorrect! Try again.
3In cybersecurity, what is a 'threat'?
Risk Management Processes and Concepts
Easy
A.A weakness in a system that can be exploited
B.The value of an asset to the organization
C.A security measure put in place to protect a system
D.Any potential for an event that could cause harm to an asset
Correct Answer: Any potential for an event that could cause harm to an asset
Explanation:
A threat is a potential danger or harmful event. A weakness is a vulnerability. The combination of a threat and a vulnerability creates a risk.
Incorrect! Try again.
4What does a 'vulnerability' represent in the context of risk management?
Risk Management Processes and Concepts
Easy
A.A flaw or weakness in a system or process
B.A potential danger that might exploit a weakness
C.The monetary value of a potential loss
D.A policy that prevents security breaches
Correct Answer: A flaw or weakness in a system or process
Explanation:
A vulnerability is a weakness that can be exploited by a threat. For example, unpatched software is a vulnerability that can be exploited by a virus (a threat).
Incorrect! Try again.
5Which term describes an organization's willingness to take on risk to achieve its objectives?
Risk Management Processes and Concepts
Easy
A.Risk appetite
B.Risk assessment
C.Risk mitigation
D.Risk register
Correct Answer: Risk appetite
Explanation:
Risk appetite is the level of risk that an organization is prepared to accept in pursuit of its strategic objectives before action is deemed necessary to reduce the risk.
Incorrect! Try again.
6What is the purpose of a Service Level Agreement (SLA) in vendor management?
Vendor Management Concepts
Easy
A.To list all employees of the vendor company
B.To define the specific terms and metrics for the service a vendor will provide
C.To act as a purchase order for new equipment
D.To serve as a non-disclosure agreement
Correct Answer: To define the specific terms and metrics for the service a vendor will provide
Explanation:
An SLA is a formal contract that specifies the performance metrics (like uptime, response time, etc.) that a vendor must meet.
Incorrect! Try again.
7The process of investigating a third-party vendor's security posture before entering into a contract is known as:
Vendor Management Concepts
Easy
A.Onboarding
B.Due diligence
C.Offboarding
D.Incident response
Correct Answer: Due diligence
Explanation:
Due diligence is the act of performing reasonable investigation or examination into a potential business partner or investment to understand their security practices and potential risks.
Incorrect! Try again.
8Why is it critical to have a vendor offboarding process?
Vendor Management Concepts
Easy
A.To ensure all vendor access to company systems and data is revoked
B.To negotiate a lower price for services
C.To hire the vendor's employees
D.To send a thank you note to the vendor
Correct Answer: To ensure all vendor access to company systems and data is revoked
Explanation:
A proper offboarding process is crucial for security. It ensures that when a contract ends, the vendor's access credentials and privileges are immediately and completely removed to prevent unauthorized access.
Incorrect! Try again.
9What is the primary goal of a security audit?
Audits and Assessments
Easy
A.To create a list of all company hardware
B.To measure an organization's practices against a specific set of criteria or standards
C.To find as many vulnerabilities as possible by actively trying to exploit them
D.To train the IT department on new software
Correct Answer: To measure an organization's practices against a specific set of criteria or standards
Explanation:
A security audit is a formal, often compliance-focused, process that compares an organization's security posture to a defined standard (like ISO 27001 or PCI DSS).
Incorrect! Try again.
10A penetration test is a type of security assessment where testers...
Audits and Assessments
Easy
A.interview employees about security procedures.
B.simulate an attack on a computer system to find vulnerabilities.
C.scan the network for open ports.
D.review security policies for completeness.
Correct Answer: simulate an attack on a computer system to find vulnerabilities.
Explanation:
A penetration test (or pen test) is an authorized, simulated cyberattack designed to evaluate the security of a system by actively exploiting its vulnerabilities.
Incorrect! Try again.
11Which of these would be considered an internal assessment?
Audits and Assessments
Easy
A.An assessment conducted by a government regulator
B.An assessment required by a client before signing a contract
C.An assessment performed by the company's own security team
D.An assessment performed by a paid third-party security firm
Correct Answer: An assessment performed by the company's own security team
Explanation:
An internal assessment is conducted by the organization's own staff, whereas external assessments are performed by outside parties.
Incorrect! Try again.
12Which of the following is a key principle of data protection?
Summarize Data Protection and Compliance Concepts
Easy
A.Data sharing (making all data publicly available)
B.Data maximization (collecting as much data as possible)
C.Data hiding (never telling users what data is collected)
D.Data minimization (collecting only necessary data)
Correct Answer: Data minimization (collecting only necessary data)
Explanation:
Data minimization is a core privacy principle which states that organizations should only collect and process personal data that is adequate, relevant, and necessary for the specified purpose.
Incorrect! Try again.
13What is the main purpose of regulations like GDPR and CCPA?
Summarize Data Protection and Compliance Concepts
Easy
A.To ensure fair competition between businesses
B.To regulate financial markets
C.To protect the privacy and rights of individuals regarding their personal data
D.To set standards for manufacturing products
Correct Answer: To protect the privacy and rights of individuals regarding their personal data
Explanation:
The General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are landmark regulations designed to give individuals more control over their personal data.
Incorrect! Try again.
14Personally Identifiable Information (PII) refers to any data that can be used to...
Summarize Data Protection and Compliance Concepts
Easy
A.identify a type of malware.
B.identify a piece of hardware on a network.
C.identify a company's profit margin.
D.identify a specific individual.
Correct Answer: identify a specific individual.
Explanation:
PII is the standard term for information, such as a name, Social Security number, or email address, that can be used on its own or with other information to identify, contact, or locate a single person.
Incorrect! Try again.
15What is the primary reason for classifying data into categories like 'Public', 'Internal', and 'Confidential'?
Data Classification and Compliance
Easy
A.To help with marketing efforts
B.To decide which data to delete first
C.To make the data look more organized
D.To determine the appropriate level of security controls needed to protect it
Correct Answer: To determine the appropriate level of security controls needed to protect it
Explanation:
Data classification assigns a value or sensitivity level to data, which then dictates the security requirements for storing, transmitting, and handling that data.
Incorrect! Try again.
16Which data classification level would be appropriate for information intended for public press releases?
Data Classification and Compliance
Easy
A.Public
B.Private
C.Top Secret
D.Confidential
Correct Answer: Public
Explanation:
The 'Public' classification is used for data that has no confidentiality requirements and is intended for public consumption. A press release is a perfect example.
Incorrect! Try again.
17A company's secret product formula would most likely be classified as:
Data Classification and Compliance
Easy
A.Public
B.Confidential or Restricted
C.Internal
D.Unclassified
Correct Answer: Confidential or Restricted
Explanation:
A secret formula is a trade secret and highly sensitive intellectual property. Its disclosure would cause significant harm to the company, so it requires the highest level of security, typically labeled 'Confidential,' 'Restricted,' or 'Top Secret'.
Incorrect! Try again.
18An Acceptable Use Policy (AUP) typically defines:
Personnel Policies
Easy
A.The rules for using company computers, networks, and internet access
B.The company's health insurance benefits
C.The procedure for requesting vacation time
D.The salary structure for employees
Correct Answer: The rules for using company computers, networks, and internet access
Explanation:
An AUP is a foundational security policy that outlines what employees are and are not allowed to do with company-owned IT assets to prevent misuse and protect the organization.
Incorrect! Try again.
19What is the principle of 'separation of duties'?
Personnel Policies
Easy
A.Dividing a critical task between two or more individuals to prevent fraud or error
B.Requiring all employees to take mandatory vacations
C.Ensuring that employees from different departments do not interact
D.Assigning all security responsibilities to a single person
Correct Answer: Dividing a critical task between two or more individuals to prevent fraud or error
Explanation:
Separation of duties is a security control that ensures no single individual has complete control over a critical process, thereby reducing the risk of unilateral malicious or accidental actions.
Incorrect! Try again.
20The 'Zero Trust' security model is based on which core principle?
Recent Trends in Security Governance and Data Protection
Easy
A.Trust everyone inside the network by default
B.Never trust, always verify
C.Eliminate the need for passwords
D.Only trust devices that are less than one year old
Correct Answer: Never trust, always verify
Explanation:
Zero Trust is a modern security framework that assumes no user or device is trusted by default, whether they are inside or outside the corporate network. Every access request must be authenticated and authorized.
Incorrect! Try again.
21A company calculates the Annualized Loss Expectancy (ALE) for a specific data breach threat to be 8,000 annually. From a purely financial standpoint, which risk response strategy is the most logical choice?
Risk Management Processes and Concepts
Medium
A.Transfer the risk by buying cybersecurity insurance.
B.Accept the risk and continue current operations.
C.Mitigate the risk by purchasing the firewall.
D.Avoid the risk by discontinuing the associated business activity.
Correct Answer: Accept the risk and continue current operations.
Explanation:
The cost of the control (mitigation) is 5,000. In this scenario, it is not cost-effective to implement the control. Therefore, accepting the risk is the most financially sound decision. Transferring or avoiding the risk might be options, but based on the provided financial data, acceptance is the most directly justified response.
Incorrect! Try again.
22During a due diligence review of a potential SaaS provider, your company's security team requests to see their latest third-party audit report. The provider offers a SOC 2 Type 2 report. What does this specific report signify to your team?
Vendor Management Concepts
Medium
A.The provider's security and availability controls were evaluated for operational effectiveness over a specified period.
B.The provider's financial reporting controls are designed properly at a single point in time.
C.The provider has successfully passed a PCI DSS compliance audit for processing credit card data.
D.The provider's security and availability controls were evaluated for design effectiveness at a single point in time.
Correct Answer: The provider's security and availability controls were evaluated for operational effectiveness over a specified period.
Explanation:
A SOC 2 report covers controls related to security, availability, processing integrity, confidentiality, and privacy. A Type 2 report specifically assesses the operational effectiveness of these controls over a period of time (typically 6-12 months), providing a higher level of assurance than a Type 1 report, which only assesses the design of controls at a specific point in time.
Incorrect! Try again.
23A security analyst is tasked with identifying potential weaknesses in a web application. The goal is to find as many vulnerabilities as possible using automated tools without actively trying to exploit them. Which of the following activities should the analyst perform?
Audits and Assessments
Medium
A.A social engineering audit
B.A code review
C.A vulnerability scan
D.A black-box penetration test
Correct Answer: A vulnerability scan
Explanation:
A vulnerability scan is an automated process that identifies potential weaknesses in systems and applications by comparing them against a database of known vulnerabilities. It is a non-intrusive process. In contrast, a penetration test is a more active and intrusive process that involves attempting to exploit vulnerabilities to determine the extent of a potential breach.
Incorrect! Try again.
24A hospital's IT department is implementing data loss prevention (DLP) rules. According to its data classification policy, patient medical records are classified as 'Restricted'. Which of the following handling requirements is most appropriate for this data classification level?
Data Classification and Compliance
Medium
A.Backed up to unencrypted portable hard drives for offsite storage.
B.Stored on a public-facing web server for easy access by doctors.
C.Encrypted at rest and in transit, with access restricted via role-based access control (RBAC).
D.Allowed to be shared freely on the internal company network.
Correct Answer: Encrypted at rest and in transit, with access restricted via role-based access control (RBAC).
Explanation:
'Restricted' is typically the highest level of data classification, reserved for the most sensitive data. Patient medical records (Protected Health Information - PHI) fall into this category. The appropriate handling requirement is to apply strong security controls, such as end-to-end encryption and strict access controls like RBAC, to prevent unauthorized disclosure.
Incorrect! Try again.
25To prevent a single employee from having the ability to both create a fictitious vendor in the payment system and approve invoices for that vendor, which security principle should be implemented?
Personnel Policies
Medium
A.Job Rotation
B.Mandatory Vacations
C.Principle of Least Privilege
D.Separation of Duties
Correct Answer: Separation of Duties
Explanation:
Separation of Duties is a foundational security principle that prevents fraud and errors by ensuring that no single individual has control over all aspects of a critical transaction. By separating the ability to create vendors from the ability to approve payments, the company reduces the risk of internal fraud.
Incorrect! Try again.
26A company is developing a new mobile application that collects user location data. The development team is building features to minimize data collection, anonymize data where possible, and provide users with clear, granular privacy controls from the very beginning of the design phase. This approach is a core example of:
Recent Trends in Security Governance and Data Protection
Medium
A.DevSecOps
B.Zero Trust
C.Defense in Depth
D.Privacy by Design
Correct Answer: Privacy by Design
Explanation:
Privacy by Design (PbD) is an approach where privacy is embedded into the design and architecture of IT systems and business practices from the outset, rather than being bolted on as an afterthought. The scenario describes proactively building privacy features into the application's core design, which is the essence of PbD.
Incorrect! Try again.
27A risk analyst is performing a qualitative risk assessment. The analyst identifies a risk and rates its impact as 'High' and its likelihood as 'Low'. How would this risk typically be represented on a risk matrix?
Risk Management Processes and Concepts
Medium
A.In a central area of the matrix indicating moderate overall risk.
B.In a corner of the matrix indicating high overall risk.
C.In a corner of the matrix indicating low overall risk.
D.It cannot be represented without a quantitative dollar value.
Correct Answer: In a central area of the matrix indicating moderate overall risk.
Explanation:
A risk matrix plots likelihood against impact. A risk with 'High' impact but 'Low' likelihood usually falls into a yellow or orange zone, signifying a moderate level of risk that requires monitoring and a potential response plan. It's not the highest risk (which would be High/High) nor the lowest (Low/Low).
Incorrect! Try again.
28A European Union citizen contacts a U.S.-based company that has customers in the EU and requests that all of their personal data be permanently deleted from the company's systems. Which specific right under the General Data Protection Regulation (GDPR) are they exercising?
Summarize Data Protection and Compliance Concepts
Medium
A.Right of Access
B.Right to Rectification
C.Right to Erasure (Right to be Forgotten)
D.Right to Data Portability
Correct Answer: Right to Erasure (Right to be Forgotten)
Explanation:
The GDPR's 'Right to Erasure,' also known as the 'Right to be Forgotten' (Article 17), gives individuals the right to have their personal data removed without undue delay under certain circumstances. This is a fundamental right for data subjects under GDPR, and companies that process data of EU citizens must have procedures to fulfill these requests.
Incorrect! Try again.
29A contract with a critical cloud storage vendor is being finalized. Why is it essential for the security team to insist on including a 'Right-to-Audit' clause in the agreement?
Vendor Management Concepts
Medium
A.To ensure the vendor provides 24/7 customer support.
B.To allow the company to legally resell the vendor's services.
C.To provide a legal basis for verifying the vendor's security controls and compliance.
D.To guarantee the lowest possible price for the service.
Correct Answer: To provide a legal basis for verifying the vendor's security controls and compliance.
Explanation:
A 'Right-to-Audit' clause grants a company the contractual right to assess a vendor's security practices, either directly or through a third party. This is a crucial component of vendor risk management, as it provides a mechanism for ongoing due diligence and ensures the vendor is adhering to the agreed-upon security standards.
Incorrect! Try again.
30An organization's internal audit team conducts an annual review of the IT department's access control procedures. What is the primary purpose of this type of audit?
Audits and Assessments
Medium
A.To fulfill a specific request from a law enforcement agency.
B.To provide an independent, external opinion for shareholders and customers.
C.To identify non-compliance with internal policies and opportunities for process improvement.
D.To prepare marketing materials highlighting the company's security posture.
Correct Answer: To identify non-compliance with internal policies and opportunities for process improvement.
Explanation:
Internal audits are conducted by an organization's own employees to provide independent assurance to management and the board of directors. Their primary goal is to evaluate and improve the effectiveness of risk management, control, and governance processes, including checking for compliance with internal policies.
Incorrect! Try again.
31An attacker exploits a known software flaw in a company's public-facing web server to gain unauthorized access. In the context of risk assessment, the 'known software flaw' represents a:
Risk Management Processes and Concepts
Medium
A.Vulnerability
B.Threat
C.Control
D.Risk
Correct Answer: Vulnerability
Explanation:
A vulnerability is a weakness or flaw in a system, process, or control that could be exploited by a threat. The 'known software flaw' is the weakness itself. The 'attacker' is the threat agent, and the 'unauthorized access' is the impact. The combination of these elements constitutes the 'risk'.
Incorrect! Try again.
32A company policy requires all employees in the finance department to take a continuous, uninterrupted five-day vacation each year, during which their access to all systems is temporarily revoked. What is the primary security benefit of this policy?
Personnel Policies
Medium
A.It reduces the cost of software licensing for the company.
B.It improves employee morale and prevents burnout.
C.It helps detect and deter fraudulent activities that require ongoing user intervention.
D.It allows for cross-training of other employees.
Correct Answer: It helps detect and deter fraudulent activities that require ongoing user intervention.
Explanation:
This policy is known as a mandatory vacation policy. Its primary security purpose is to uncover fraud. An employee engaged in illicit activities often needs to be present every day to manipulate records or cover their tracks. When they are forced to be away and another person takes over their duties, anomalies or fraudulent behavior are more likely to be discovered.
Incorrect! Try again.
33A company is shifting from a traditional network security model, where everything inside the corporate firewall is trusted, to a model that requires strict identity verification for every person and device seeking access to resources, regardless of their location. This strategic shift is known as adopting a:
Recent Trends in Security Governance and Data Protection
Medium
A.Defense in Depth strategy
B.Honeypot deployment
C.Zero Trust architecture
D.Bring Your Own Device (BYOD) policy
Correct Answer: Zero Trust architecture
Explanation:
Zero Trust is a security model centered on the belief that organizations should not automatically trust anything inside or outside their perimeters. It operates on the principle of 'never trust, always verify.' This involves verifying every access request as if it originates from an untrusted network, which is a significant shift from the traditional 'castle-and-moat' security model.
Incorrect! Try again.
34An organization implements data labeling for all its documents and emails. A document containing trade secrets is automatically labeled 'Restricted'. What is the primary function of this label in the context of a Data Loss Prevention (DLP) system?
Data Classification and Compliance
Medium
A.To allow anyone in the company to access the document.
B.To act as metadata that the DLP system can use to enforce a policy, such as blocking it from being emailed externally.
C.To inform the reader of the document's author.
D.To increase the file size of the document for archival purposes.
Correct Answer: To act as metadata that the DLP system can use to enforce a policy, such as blocking it from being emailed externally.
Explanation:
Data labels are a form of metadata that classifies the sensitivity of the data. Security systems, especially Data Loss Prevention (DLP) tools, read these labels to enforce policies. For example, a DLP policy might be configured to automatically block any email attachment with the 'Restricted' label from leaving the corporate network, thus preventing data exfiltration.
Incorrect! Try again.
35An e-commerce company processes, stores, and transmits credit card data for online payments. Which of the following compliance frameworks is mandatory for this company to adhere to?
Summarize Data Protection and Compliance Concepts
Medium
A.NIST Cybersecurity Framework (CSF)
B.Health Insurance Portability and Accountability Act (HIPAA)
C.Payment Card Industry Data Security Standard (PCI DSS)
D.ISO/IEC 27001
Correct Answer: Payment Card Industry Data Security Standard (PCI DSS)
Explanation:
PCI DSS is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment. Adherence is not a federal law but is mandated by the major card brands (Visa, MasterCard, etc.). Non-compliance can result in fines and the revocation of the ability to process credit card payments.
Incorrect! Try again.
36During a penetration test, the testing team is given full access to source code, network diagrams, and other internal documentation before the engagement begins. What type of penetration test is being conducted?
Audits and Assessments
Medium
A.Gray-Box Test
B.White-Box Test
C.Red Team Exercise
D.Black-Box Test
Correct Answer: White-Box Test
Explanation:
In a white-box (or crystal-box) penetration test, the testers are provided with extensive information about the target system. This full knowledge allows them to conduct a much more thorough and deep examination of the system's security, including code analysis and architectural review, which is not possible in black-box (no knowledge) or gray-box (some knowledge) testing.
Incorrect! Try again.
37A small business determines that the impact of a complete server failure is catastrophic, but the cost of building a fully redundant, geographically separate hot site is prohibitively expensive. They decide to purchase business interruption insurance to cover the financial losses that would result from such an outage. This is an example of which risk response strategy?
Risk Management Processes and Concepts
Medium
A.Risk Acceptance
B.Risk Mitigation
C.Risk Transfer
D.Risk Avoidance
Correct Answer: Risk Transfer
Explanation:
Risk transfer is the strategy of sharing or shifting the financial burden of a risk to a third party. Purchasing insurance is the classic example of risk transfer. The business is paying a premium to an insurance company, which in turn agrees to cover the financial losses if the specified risk (server failure) occurs.
Incorrect! Try again.
38When terminating a contract with a cloud service provider, which of the following is the most critical security concern that must be addressed in the vendor exit strategy?
Vendor Management Concepts
Medium
A.Publishing a press release about the change in partnership.
B.Migrating the company's email accounts to a new provider.
C.Receiving a final invoice for all services rendered.
D.Ensuring all company data is securely and verifiably deleted from the vendor's systems.
Correct Answer: Ensuring all company data is securely and verifiably deleted from the vendor's systems.
Explanation:
The most critical security step in vendor offboarding is data disposition. The exit strategy must include a process for securely migrating all data to a new system and then obtaining verifiable proof from the old vendor that all copies of the company's data have been permanently and securely destroyed from their environment. This prevents data remnants from becoming a future security risk.
Incorrect! Try again.
39Under GDPR, what is the primary role of a Data Protection Officer (DPO)?
Summarize Data Protection and Compliance Concepts
Medium
A.To independently oversee the organization's data protection strategy and ensure compliance.
B.To be the primary point of contact for marketing and sales activities.
C.To act as the lead software developer for security products.
D.To directly manage the IT help desk and user support tickets.
Correct Answer: To independently oversee the organization's data protection strategy and ensure compliance.
Explanation:
A Data Protection Officer (DPO) is a senior, independent role responsible for advising on and monitoring compliance with data protection laws like GDPR. Their tasks include informing and advising the company on its obligations, monitoring compliance, conducting data protection impact assessments (DPIAs), and acting as a point of contact for supervisory authorities and data subjects.
Incorrect! Try again.
40An employee mistakenly emails a spreadsheet containing 'Confidential' customer contact information to an external mailing list instead of an internal one. This event is best categorized as a:
Data Classification and Compliance
Medium
A.Data Breach
B.Risk Assessment
C.Vulnerability Scan
D.Security Policy
Correct Answer: Data Breach
Explanation:
A data breach is a security incident in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so. The accidental emailing of confidential data to an unauthorized external party fits this definition precisely, regardless of whether the intent was malicious or not.
Incorrect! Try again.
41A financial services firm calculated the Annualized Loss Expectancy (ALE) for a specific data exfiltration threat to be 40,000 annually. The solution is projected to reduce the ARO to 0.1. What is the Return on Security Investment (ROSI) for this DLP solution, and what critical factor might this calculation be overlooking?
Risk Management Processes and Concepts
Hard
A.ROSI is 50%. It overlooks the implementation and training costs associated with the new solution.
B.ROSI is 100%. It overlooks the residual risk that remains even after the control is implemented.
C.ROSI is 150%. It overlooks the possibility that the threat's ARO could increase due to new attack vectors, negating the control's effectiveness.
D.ROSI is 200%. It overlooks the potential for the control to reduce the Single Loss Expectancy (SLE) as well, by limiting the scope of a breach.
Correct Answer: ROSI is 200%. It overlooks the potential for the control to reduce the Single Loss Expectancy (SLE) as well, by limiting the scope of a breach.
Explanation:
First, calculate the Single Loss Expectancy (SLE): . The new ALE with the control is . The money saved (or mitigated ALE) is . The Return on Security Investment (ROSI) is calculated as . So, , which is 200%. The hard part of the question is identifying the overlooked factor. A pure quantitative analysis focusing only on ARO reduction misses that a control like DLP could also reduce the impact (SLE) of a successful breach by preventing the exfiltration of the most sensitive data, thus making the actual ROSI even higher.
Incorrect! Try again.
42Your company is engaging a cloud service provider (CSP) to host its new PII-processing application. The contract includes a right-to-audit clause, but the CSP, citing their multi-tenant architecture, will not allow on-site audits. Instead, they provide a recent SOC 2 Type II report and attestations from a reputable third-party auditor. From a risk management perspective, what is the most significant remaining risk that must be addressed through other contractual means?
Vendor Management Concepts
Hard
A.The risk that the CSP's employees are not adequately trained on data privacy.
B.The risk of the CSP going out of business, requiring a data migration plan.
C.The risk of the CSP refusing to provide evidence during a future security incident investigation.
D.The risk that the SOC 2 report's scope does not cover the specific services or controls relevant to your application.
Correct Answer: The risk that the SOC 2 report's scope does not cover the specific services or controls relevant to your application.
Explanation:
While all options are valid risks, the most significant and subtle risk in this scenario is a scope mismatch. A SOC 2 Type II report provides assurance about controls, but only for the systems and services in scope for that audit. If your application relies on a new or niche service from the CSP that was not part of their last audit, the report provides no assurance for it. This gap must be addressed contractually, perhaps by requiring the CSP to expand the scope of their next audit or by providing alternative evidence for the out-of-scope controls.
Incorrect! Try again.
43During a penetration test, an ethical hacker successfully executes a privilege escalation attack by exploiting a zero-day vulnerability in a third-party software component used by the client. The client's vulnerability management team argues that since it's a zero-day, it falls outside the scope of their responsibility. What is the most appropriate and mature response from the security auditor in their final report?
Audits and Assessments
Hard
A.Classify the finding as a high-risk vulnerability and recommend immediate implementation of compensating controls, such as application sandboxing or enhanced monitoring, and initiating contact with the vendor.
B.Acknowledge the finding as 'Informational' since no patch is available and the client cannot be held responsible for an unknown vulnerability.
C.Exclude the finding from the final report, as zero-day vulnerabilities are considered outside the scope of a standard penetration test focused on known vulnerabilities.
D.Report the finding as a critical risk but assign responsibility to the third-party vendor, absolving the client of direct remediation actions.
Correct Answer: Classify the finding as a high-risk vulnerability and recommend immediate implementation of compensating controls, such as application sandboxing or enhanced monitoring, and initiating contact with the vendor.
Explanation:
A mature security posture requires taking responsibility for the risk within one's own environment, regardless of the vulnerability's source. Simply blaming the vendor is insufficient. The correct auditor response is to report the risk based on its impact and likelihood (which is now proven to be non-zero) and recommend actionable compensating controls that the client can implement to mitigate the risk until a patch is available. This demonstrates a defense-in-depth approach and proactive risk management, which is the goal of such an assessment.
Incorrect! Try again.
44A pharmaceutical company classifies its new drug formula data as 'Confidential'. The compliance framework they must adhere to (e.g., HIPAA) requires specific encryption standards for data at rest. Their cloud storage provider uses AES-256 encryption by default for all data. However, the company's data handling policy for 'Confidential' data also mandates strict key management, including customer-managed keys (CMK) and key rotation every 90 days. The storage provider offers this, but it is not enabled by default. In case of a breach, what is the most likely point of compliance failure?
Data Classification and Compliance
Hard
A.The company's failure to implement its own policy's key management requirements, even though the provider's base encryption was compliant.
B.The cloud provider's failure to enable customer-managed keys by default for all customers.
C.The choice of AES-256 encryption, as a more advanced algorithm should have been used for such sensitive data.
D.The data classification of 'Confidential' was too low; it should have been 'Restricted' or 'Secret'.
Correct Answer: The company's failure to implement its own policy's key management requirements, even though the provider's base encryption was compliant.
Explanation:
This question highlights the critical link between internal policy and technical implementation for compliance. The base encryption standard (AES-256) meets the regulatory requirement. However, the company's own data handling policy, which is designed to enforce and potentially exceed that compliance standard, created a more stringent requirement for key management. The compliance failure is not on the cloud provider (who offered the feature) or the encryption standard itself, but on the company for failing to configure the service to meet its own internal policy, which is what auditors would check against.
Incorrect! Try again.
45A company enforces a mandatory two-week vacation policy for all IT administrators with privileged access. During one administrator's absence, a review of system logs reveals a series of unauthorized, sophisticated configuration changes made over the past six months using that administrator's credentials. The changes were cleverly disguised to look like routine maintenance. This discovery was a direct result of which two security principles working in tandem?
Personnel Policies
Hard
A.Least privilege and job rotation.
B.Separation of duties and least privilege.
C.Mandatory vacation and separation of duties.
D.Mandatory vacation and log review/auditing.
Correct Answer: Mandatory vacation and log review/auditing.
Explanation:
The key purpose of a mandatory vacation is to break the perpetrator's access to the system, making it impossible for them to continue their malicious activity or cover their tracks. This forces any illicit processes they established to either fail or be discovered by the person covering their duties. However, the discovery itself only happens if another process—in this case, log review and auditing—is actively looking for anomalies. The vacation created the opportunity for discovery, but the log review was the mechanism of discovery. Separation of duties is related but distinct; it's about splitting a task between two people to prevent unilateral fraud, which wasn't the direct discovery method here.
Incorrect! Try again.
46A company is implementing a Zero Trust Architecture (ZTA). A core tenant of their implementation is micro-segmentation, where workloads can only communicate with other explicitly authorized workloads. During a security review, an engineer points out that all traffic between segments is encrypted with TLS 1.3. However, the security architect flags a significant governance gap. What is the most likely gap the architect has identified?
Recent Trends in Security Governance and Data Protection
Hard
A.The use of TLS 1.3, as a newer protocol may have undiscovered vulnerabilities.
B.The failure to also implement a traditional perimeter firewall, as Zero Trust should augment, not replace, perimeter security.
C.The performance overhead caused by encrypting all internal traffic, which could impact application latency.
D.The lack of a deep packet inspection (DPI) capability that can decrypt and inspect the inter-segment traffic for threats, rendering the micro-segmentation less effective for threat detection.
Correct Answer: The lack of a deep packet inspection (DPI) capability that can decrypt and inspect the inter-segment traffic for threats, rendering the micro-segmentation less effective for threat detection.
Explanation:
This is a complex, real-world challenge in ZTA implementations. While encrypting all traffic (often called 'encrypt everywhere') is a pillar of Zero Trust, it creates a new problem: it blinds security monitoring tools. If you cannot inspect the content of the traffic, you cannot detect if an already authenticated and authorized workload has been compromised and is now attempting to move laterally or exfiltrate data. This is often referred to as the 'east-west' traffic inspection problem. A mature ZTA governance model must account for how to gain visibility into this encrypted traffic, often through dedicated DPI solutions at segment boundaries, without compromising the principles of Zero Trust.
Incorrect! Try again.
47A US-based healthcare provider uses a cloud platform to process patient data (ePHI). The provider has a signed Business Associate Agreement (BAA) with the cloud vendor as required by HIPAA. The cloud vendor suffers a ransomware attack, and the provider's ePHI is encrypted and rendered inaccessible for 72 hours. No data is confirmed to have been exfiltrated. According to the HIPAA Breach Notification Rule, what is the provider's primary compliance obligation?
Summarize Data Protection and Compliance Concepts
Hard
A.No reporting is required because the data was only encrypted (an availability issue) and not exfiltrated (a confidentiality issue).
B.Report the incident to law enforcement but not to HHS, as it is a criminal matter and not a privacy breach.
C.Only an internal incident report is required, as the BAA shifts the responsibility for external reporting to the cloud vendor.
D.Report the incident as a breach to the Department of Health and Human Services (HHS) and affected individuals, as unauthorized acquisition, access, use, or disclosure is presumed unless a low probability of compromise is demonstrated.
Correct Answer: Report the incident as a breach to the Department of Health and Human Services (HHS) and affected individuals, as unauthorized acquisition, access, use, or disclosure is presumed unless a low probability of compromise is demonstrated.
Explanation:
This is a common and difficult point of confusion regarding HIPAA. The HHS guidance is clear that a ransomware attack that renders ePHI inaccessible is considered a breach. The reasoning is that the attacker's unauthorized access to the system to deploy ransomware constitutes an 'unauthorized acquisition'. Under the Breach Notification Rule, such an event is presumed to be a reportable breach unless the covered entity can demonstrate, through a multi-factor risk assessment, that there was a low probability that the PHI was compromised. Given the severity and duration, it would be extremely difficult to prove a low probability, making notification the required action.
Incorrect! Try again.
48A company's risk register contains a high-impact, low-likelihood risk of a catastrophic data center failure due to a natural disaster. The company's risk appetite for operational downtime is extremely low. They have already implemented a robust daily backup solution. Which of the following risk treatment strategies represents the most appropriate next step, and why?
Risk Management Processes and Concepts
Hard
A.Risk Mitigation, by adding a secondary, redundant power supply to the existing data center.
B.Risk Acceptance, because the likelihood is very low and the cost of further mitigation is prohibitive.
C.Risk Avoidance, by migrating all critical services out of the data center to a geographically diverse, fully redundant public cloud infrastructure.
D.Risk Transference, by contracting with a cloud provider for a hot-site disaster recovery solution and purchasing business interruption insurance.
Correct Answer: Risk Avoidance, by migrating all critical services out of the data center to a geographically diverse, fully redundant public cloud infrastructure.
Explanation:
This question requires differentiating between Mitigation, Transference, and Avoidance in a complex scenario. Adding a power supply is Mitigation, but it only addresses one cause of failure and doesn't solve the core risk of a natural disaster. Contracting for a hot site and insurance is Transference (transferring the operational burden and financial risk). However, given the extremely low risk appetite for downtime, the most definitive strategy is Avoidance. Migrating to a geo-redundant cloud infrastructure fundamentally avoids the risk of a single data center being a single point of failure for a natural disaster. It's the most comprehensive solution that aligns with the stated low risk appetite.
Incorrect! Try again.
49A company is considering two SaaS vendors for a critical HR function. Vendor A is ISO 27001 certified and has a clean SOC 2 Type II report. Vendor B is not certified but offers a significant price discount and allows full, unrestricted right-to-audit by the company's internal audit team. The company has a mature and highly skilled audit team. From a pure supply chain risk management perspective, which vendor presents a more complex long-term challenge?
Vendor Management Concepts
Hard
A.Vendor B, because the burden of continuous assurance shifts from a trusted third-party auditor to the company's own team, creating a significant ongoing operational cost and resource drain that may not be sustainable.
B.Vendor A, because ISO 27001 certification is expensive, and those costs are passed on to the customer, affecting the total cost of ownership.
C.Vendor A, because reliance on third-party certifications can create a false sense of security, and the scope of the audits may not cover the specific controls most critical to the company.
D.Vendor B, because without standard certifications, it will be impossible to prove due diligence to regulators in the event of a breach.
Correct Answer: Vendor B, because the burden of continuous assurance shifts from a trusted third-party auditor to the company's own team, creating a significant ongoing operational cost and resource drain that may not be sustainable.
Explanation:
This question contrasts third-party assurance with first-party verification. While the right-to-audit clause from Vendor B seems attractive, it presents a major strategic and operational challenge. It makes the company directly responsible for performing the in-depth, continuous security assessments that a SOC 2 audit would normally provide. This is resource-intensive, costly, and may not be as rigorous as an audit by a specialized firm. Vendor A provides standardized, trusted, third-party assurance, which is a more scalable and predictable model for managing vendor risk over the long term, even if it requires careful scope validation.
Incorrect! Try again.
50A company is using a Security Orchestration, Automation, and Response (SOAR) platform to automate its incident response playbooks. For a phishing incident, the playbook automatically quarantines the email, blocks the sender's domain on the firewall, and suspends the recipient's user account. This process has drastically reduced response times. What is the most significant governance risk introduced by this high level of automation?
Recent Trends in Security Governance and Data Protection
Hard
A.The risk of a sophisticated false positive leading to the automatic suspension of a critical executive's account during a business-critical operation, causing significant disruption.
B.The risk that security analysts become de-skilled because they are no longer performing manual incident response tasks.
C.The risk that the SOAR platform is more expensive than manually performing the same tasks.
D.The risk that the automation script contains a vulnerability that could be exploited by an attacker.
Correct Answer: The risk of a sophisticated false positive leading to the automatic suspension of a critical executive's account during a business-critical operation, causing significant disruption.
Explanation:
The core challenge of SOAR is balancing speed with accuracy. Automation acts without human judgment. A well-crafted spear-phishing email from a legitimate but compromised partner account could be misidentified as malicious, triggering the playbook. If this action suspends a key user's account (like the CFO during a financial closing), the automated 'solution' creates a larger business problem than the original threat. Effective SOAR governance requires building in checks and balances, human approval steps for high-impact actions, and robust exception handling to manage the risk of false positives.
Incorrect! Try again.
51An organization is preparing for a CMMC (Cybersecurity Maturity Model Certification) Level 2 assessment. Their System Security Plan (SSP) documents all required controls, and their Plan of Action & Milestones (POAM) lists several outstanding items. The auditor discovers that one of the documented controls—multifactor authentication for all remote access—is described in the SSP but has not been fully implemented across all legacy systems. This gap is not listed on the POAM. What is the most likely outcome of the assessment?
Audits and Assessments
Hard
A.The auditor will add the item to the POAM on the organization's behalf and allow the assessment to proceed, as the intent to implement was clear from the SSP.
B.The assessment will pass with a conditional certification, requiring the organization to fix the MFA gap within 90 days.
C.The assessment will likely fail because a documented control was found to be not implemented, and this discrepancy was not tracked in the POAM, indicating a failure in the security governance process itself.
D.The assessment will be paused, and the organization will be given a 30-day grace period to implement the control before the final report is issued.
Correct Answer: The assessment will likely fail because a documented control was found to be not implemented, and this discrepancy was not tracked in the POAM, indicating a failure in the security governance process itself.
Explanation:
CMMC assessments are rigorous and focus not just on the implementation of controls but on the maturity of the processes governing them. The critical failure here is not just the missing MFA (which could potentially be a POAM item), but the fact that the organization's own governance documents (SSP and POAM) are inconsistent with reality. This demonstrates a breakdown in the process of identifying, tracking, and managing security gaps, which is a core tenet of maturity. An auditor would see this as a significant finding, indicating the security program is not operating as described, leading to a likely failure of the assessment.
Incorrect! Try again.
52A company's data classification policy defines 'Internal' data as 'data not for public release but which would cause minimal business impact if disclosed'. The policy allows for 'Internal' data to be shared with trusted partners via encrypted email. An employee sends a partner a document containing a list of all employee names and their internal-only email addresses, which is classified as 'Internal'. This partner then suffers a breach, and the employee list is posted online. What is the primary failure in the security governance process?
Data Classification and Compliance
Hard
A.The partner was not properly vetted and should not have been trusted with any internal data.
B.The employee who sent the email violated policy and requires disciplinary action.
C.The encrypted email control was insufficient; a secure file-sharing portal with access controls should have been used.
D.The data was misclassified. A full employee directory, while internal, represents a significant risk for social engineering and should have been classified at a higher level (e.g., 'Confidential') with stricter handling controls.
Correct Answer: The data was misclassified. A full employee directory, while internal, represents a significant risk for social engineering and should have been classified at a higher level (e.g., 'Confidential') with stricter handling controls.
Explanation:
This question demonstrates that the effectiveness of all other controls hinges on correct data classification. While the other options point to potential weaknesses, the root cause of the failure is the initial misclassification. An employee directory is a prime target for attackers to craft convincing phishing and social engineering attacks. Defining its disclosure impact as 'minimal' is a failure of risk assessment within the classification policy itself. Had the data been correctly classified as 'Confidential', it would have triggered more stringent handling controls, likely prohibiting it from being sent via email to an external partner in the first place.
Incorrect! Try again.
53Under GDPR, a Data Protection Impact Assessment (DPIA) is required for processing that is 'likely to result in a high risk to the rights and freedoms of natural persons.' Which of the following scenarios would most definitively trigger the mandatory requirement for a DPIA?
Summarize Data Protection and Compliance Concepts
Hard
A.A small e-commerce website implementing a standard analytics tool to track user browsing habits to recommend products.
B.A marketing department purchasing a publicly available list of business contacts for a B2B marketing campaign.
C.A hospital implementing a new system to process patient genetic data on a large scale for research purposes.
D.A company setting up a new CCTV system to monitor the entrance of its private office building for security purposes.
Correct Answer: A hospital implementing a new system to process patient genetic data on a large scale for research purposes.
Explanation:
The key triggers for a mandatory DPIA under GDPR include: processing of special categories of data (like health or genetic data) on a large scale, systematic monitoring of a publicly accessible area, or using new technologies. The hospital scenario ticks multiple boxes definitively: it involves a special category of data (genetic data), on a large scale, and likely involves a new system or technology. The other scenarios are less likely to meet the 'high risk' threshold. Standard analytics are common, limited CCTV monitoring is often considered a legitimate interest with manageable risk, and B2B marketing with public data has a lower impact on the 'rights and freedoms' of individuals compared to the processing of their genetic information.
Incorrect! Try again.
54A company is concerned about intellectual property theft by departing employees. They have an Acceptable Use Policy (AUP) and standard non-disclosure agreements (NDAs). Which of the following technical and procedural controls, when combined, provides the most effective preventative and detective capability against this specific threat?
Personnel Policies
Hard
A.Using User and Entity Behavior Analytics (UEBA) to monitor for baseline deviations, combined with a two-person integrity rule for accessing the most sensitive data repositories.
B.Implementing a Data Loss Prevention (DLP) solution that flags large data transfers to USB drives, combined with a formal, audited offboarding process that includes a final exit interview and immediate access revocation.
C.Encrypting all company laptops and enforcing a mandatory remote wipe for all departing employees' devices.
D.Requiring all employees to undergo annual security awareness training focused on IP theft and enforcing a strict clean desk policy.
Correct Answer: Implementing a Data Loss Prevention (DLP) solution that flags large data transfers to USB drives, combined with a formal, audited offboarding process that includes a final exit interview and immediate access revocation.
Explanation:
This is a multi-faceted problem requiring both technical prevention/detection and a strong procedural wrapper. The DLP solution is a direct technical control (preventative and detective) that can alert on or block the exfiltration of data. However, it's not foolproof. The formal, audited offboarding process is the critical procedural control that ensures access is revoked promptly upon departure, limiting the window of opportunity for theft. The exit interview serves as a final reminder of legal obligations under the NDA. This combination is the most comprehensive and directly addresses the threat of a departing employee.
Incorrect! Try again.
55When performing a qualitative risk assessment, a security analyst uses a 5x5 matrix of Likelihood and Impact. The analyst identifies two risks: Risk A has a 'Very High' Impact but 'Very Low' Likelihood. Risk B has a 'Moderate' Impact and 'Moderate' Likelihood. Based on the heatmap, both risks fall into a 'Medium' overall risk category. What is the primary limitation of this qualitative model that a quantitative analysis could address?
Risk Management Processes and Concepts
Hard
A.The model fails to account for the vastly different financial implications and remediation priorities between a catastrophic, rare event (Risk A) and a more frequent, less damaging event (Risk B), which an ALE calculation would clarify.
B.The 5x5 matrix is not granular enough; a 10x10 matrix would have placed Risk A in a higher category than Risk B.
C.The model does not incorporate the concept of risk velocity (how quickly a risk can manifest), which would show Risk B is a more immediate threat.
D.The model is subjective and relies on the analyst's opinion, whereas a quantitative analysis is purely objective.
Correct Answer: The model fails to account for the vastly different financial implications and remediation priorities between a catastrophic, rare event (Risk A) and a more frequent, less damaging event (Risk B), which an ALE calculation would clarify.
Explanation:
The core weakness of qualitative risk analysis is that it can create false equivalencies. While both risks might be mathematically plotted into a 'Medium' box on a heatmap, they represent fundamentally different business challenges. Risk A is a potential company-ending event that must be addressed with disaster recovery plans, while Risk B might be a routine operational issue. A quantitative analysis, by calculating the Annualized Loss Expectancy (ALE) for both, would assign a dollar value ($) to each. This would almost certainly show a significant difference in their financial impact over time, allowing for much more nuanced and data-driven prioritization of resources.
Incorrect! Try again.
56A company receives the results of an external vulnerability scan, which reports a critical 'Remote Code Execution' vulnerability on a public-facing web server. The system administrator investigates and determines that an upstream Web Application Firewall (WAF) has a specific rule that effectively blocks the exact exploit payload used by the scanner. The administrator argues the risk should be downgraded to 'Low'. What is the most accurate way for the risk manager to treat this situation?
Audits and Assessments
Hard
A.Mark the finding as a 'False Positive' because the exploit is not currently possible in the production environment.
B.Accept the administrator's assessment and downgrade the risk to 'Low' since a mitigating control is in place and has been proven effective.
C.Keep the risk rated as 'Critical' because compensating controls like a WAF can be bypassed and should not be considered when rating the underlying vulnerability.
D.Treat the vulnerability's 'Likelihood' as low due to the compensating control (WAF), but keep the 'Impact' as critical. The overall risk is reduced but not eliminated, and the vulnerability should still be patched on the server itself as a defense-in-depth measure.
Correct Answer: Treat the vulnerability's 'Likelihood' as low due to the compensating control (WAF), but keep the 'Impact' as critical. The overall risk is reduced but not eliminated, and the vulnerability should still be patched on the server itself as a defense-in-depth measure.
Explanation:
This scenario tests the understanding of risk treatment and defense-in-depth. The vulnerability on the server still exists, so its potential impact remains critical. The WAF is a compensating control that reduces the likelihood of a successful exploit. It does not eliminate the vulnerability itself. The most accurate risk management approach is to acknowledge the reduction in immediate likelihood but insist on patching the underlying vulnerability. Relying solely on the WAF is risky; a WAF misconfiguration, a new WAF bypass technique, or an internal threat could still exploit the unpatched server.
Incorrect! Try again.
57The EU's proposed AI Act classifies AI systems into risk categories (Unacceptable, High, Limited, Minimal). A bank wants to deploy an AI system to automate its loan approval process, which uses applicant data including income, credit history, and postal code. Under the proposed framework, what is the most significant governance obligation the bank would face before deploying this system?
Recent Trends in Security Governance and Data Protection
Hard
A.The system would be 'Limited Risk', requiring only that the bank be transparent with customers that they are interacting with an AI.
B.The system would be classified as 'High-Risk', mandating a conformity assessment, rigorous risk management, data governance checks for bias, and human oversight before it can be put into the market.
C.The system would be 'Unacceptable Risk' and banned outright because it uses social scoring.
D.The system would be 'Minimal Risk', as credit scoring is a standard and well-understood practice, freeing the bank from specific AI-related obligations.
Correct Answer: The system would be classified as 'High-Risk', mandating a conformity assessment, rigorous risk management, data governance checks for bias, and human oversight before it can be put into the market.
Explanation:
Under the EU AI Act's proposed text, AI systems that determine access to essential private services like credit are explicitly listed as a 'High-Risk' use case. This classification is the most critical governance factor because it triggers a cascade of demanding obligations. These include pre-market conformity assessments (similar to an audit), ongoing risk management, strict data governance to prevent bias (e.g., using postal codes as a proxy for race), logging, and ensuring effective human oversight is possible. The other options misinterpret the Act's risk categories for this specific, high-stakes application.
Incorrect! Try again.
58A data controller in the EU uses a US-based cloud provider (the data processor) to store customer data. Following the invalidation of the Privacy Shield framework, both parties sign Standard Contractual Clauses (SCCs) to legitimize the data transfer. However, the Court of Justice of the European Union (CJEU) in the Schrems II ruling added a critical requirement beyond just signing the SCCs. What is this additional, mandatory step?
Summarize Data Protection and Compliance Concepts
Hard
A.The data controller must conduct a case-by-case Transfer Impact Assessment (TIA) to verify that the laws in the recipient country (USA) do not undermine the protections offered by the SCCs, and implement supplementary measures if they do.
B.All data transferred to the US must be encrypted using quantum-resistant algorithms.
C.The data processor in the US must achieve ISO 27701 (Privacy Information Management System) certification.
D.The data controller must notify their local Data Protection Authority (DPA) of every individual data transfer made under the SCCs.
Correct Answer: The data controller must conduct a case-by-case Transfer Impact Assessment (TIA) to verify that the laws in the recipient country (USA) do not undermine the protections offered by the SCCs, and implement supplementary measures if they do.
Explanation:
This is a highly complex but critical aspect of modern data protection law. The Schrems II ruling established that simply signing SCCs is not enough. The data exporter (the controller) has an active obligation to assess whether the legal framework of the importer's country (e.g., US surveillance laws like FISA 702) would prevent the importer from actually upholding the contractual promises in the SCCs. If a risk is identified in this Transfer Impact Assessment (TIA), the controller must implement 'supplementary measures' (like advanced encryption or technical controls) to protect the data, or else halt the transfer. This shifted the burden of proof squarely onto the companies involved.
Incorrect! Try again.
59A company's data handling policy, derived from its classification scheme, states that any document tagged as 'Confidential' must be encrypted when stored in the cloud. An automated system tags a sales report containing quarterly revenue projections as 'Confidential'. An employee uploads this report to the company-approved cloud storage, which encrypts all data at rest by default. However, the employee also creates a public share link with 'view only' permissions to easily share it with an external partner, which is a feature of the cloud service. This action directly violates the spirit of the classification. What is the primary control failure?
Data Classification and Compliance
Hard
A.A failure of security awareness training, as the employee did not understand the implications of creating a public link.
B.A failure in the data classification engine, which should have tagged the document as 'Restricted' instead of 'Confidential'.
C.A failure in the technical configuration of the cloud storage service, which should have had its public sharing feature disabled or restricted for files tagged as 'Confidential'.
D.A failure of the encryption policy, as the data should have been encrypted before upload (client-side encryption) rather than relying on the service's server-side encryption.
Correct Answer: A failure in the technical configuration of the cloud storage service, which should have had its public sharing feature disabled or restricted for files tagged as 'Confidential'.
Explanation:
While employee error is a factor, the most robust and reliable solution lies in technical enforcement that aligns with the data classification policy. A mature security program does not rely solely on user awareness. The classification tag ('Confidential') should be used to automatically enforce handling rules. In this case, the Data Loss Prevention (DLP) or Cloud Access Security Broker (CASB) integrated with the cloud service should have been configured to recognize the 'Confidential' tag and programmatically block the creation of a public link for that file. This is a technical enforcement of the policy, which is more effective than relying on user behavior alone.
Incorrect! Try again.
60Your company is terminating a contract with a SaaS provider who stored and processed sensitive customer PII. The contract includes a 'right to data portability' and a 'data destruction' clause. The vendor provides an export of your data in a proprietary format and a certificate of destruction for the data on their primary servers. What is the most critical security assurance you must seek from the vendor beyond these two items?
Vendor Management Concepts
Hard
A.A final, discounted invoice to ensure all financial obligations are met before terminating the relationship.
B.A guarantee that the vendor will not use any aggregated, anonymized data derived from your PII for their own business intelligence purposes.
C.A detailed attestation that all data has also been purged from all secondary storage, including backup tapes, disaster recovery sites, and development/testing environments, and a timeline for their eventual destruction.
D.A copy of the vendor's most recent penetration test report to confirm they had no breaches during the contract period.
Correct Answer: A detailed attestation that all data has also been purged from all secondary storage, including backup tapes, disaster recovery sites, and development/testing environments, and a timeline for their eventual destruction.
Explanation:
This question addresses the full lifecycle of data in a vendor relationship. A certificate of destruction for primary servers is a good first step, but it's insufficient. Data remanence is a significant risk. Sensitive data often exists in multiple places beyond the live production database. A mature offboarding process requires assurance that the data has been securely and irretrievably purged from all potential locations, including backups (which could otherwise be restored) and non-production environments where it may have been used for testing. Obtaining a detailed attestation covering this full scope is critical for fulfilling your company's data protection obligations.