April 2022

Article

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Brianna is considering the placement of a new service her organization is developing from among different geographic data center options offered by her cloud provider. She is concerned about what legal jurisdictions would apply to the data. What principle most directly governs this concern? A. Data Classification B. Data Remnance C. Data Stewardship D. Data Sovereignty Correct Answer: D Data classification is a system used to identify the sensitivity and criticality levels of different types of information processed by the organization, which isn’t our correct answer here. Data remnance is the issue that occurs when data remains on a storage device after the user deletes it,also not the answer we are looking for. The principle of data sovereignty states that data may be subject to the laws of the jurisdictions where it is stored, processed, and transmitted, making it our correct answer here. Data stewardship programs are designed to create governance schemes around the different types of information used by an organization, which is not Brianna’s concern in this scenario. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Tom would like to send an encrypted message to Jerry using asymmetric cryptography. What key should Tom use to encrypt the message? A. His public key B. His private key C. Jerry’s public key D. Jerry’s private key Correct Answer: C When encrypting a message with asymmetric cryptography, the sender of the message always encrypts it using the recipient's own public key. The recipient being Jerry, can then decrypt the message using his own private key. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Which one of the following techniques is most likely to enable an attacker to engage in a man-in-the-middle attack, assuming that the attacker has access to the victim's local network? A. ARP spoofing B. Cross Site Scripting C. Buffer Overflow D. Directory Traversal Correct Answer: A By conducting an ARP spoofing attack, the attacker may fool the victim into thinking that a system controlled by the attacker is the local router or another piece of network infrastructure. They may then route traffic from that victim through their device, eavesdropping on communications and potentially engaging in a man-in-the-middle attack. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...