Security Officer Certification Exam – SOCE Practice
Exam Latest with 300 Questions and Correct
Verified Answers/ SOCE Exam Practice Qs and As
2025
ABAC - ...ANSWER...✓✓ You want to implement an access
control model that lets you easily assign users to a
combination of multiple roles, and also restrict access to
some actions based on the time of day and physical
location of the user. Which model is the best fit?
A domain local group - ...ANSWER...✓✓ In Active
Directory, where is the best place to assign permissions?
More Secure and More Trouble for Users -
...ANSWER...✓✓ During a discussion of user account
policies, someone suggests lowering the account lockout
threshold on the Windows domain. What would be the net
effect of this change?
To keep users from bypassing history requirements -
...ANSWER...✓✓ If a policy requires regular password
changes, why would you set a minimum password age?
,2|Page
Risk Transference - ...ANSWER...✓✓ After consulting with
the Chief Risk Officer (CRO), a manager decides to
acquire cybersecurity insurance for the company. Which
of the following risk management strategies is the
manager adopting?
Configure the perimeter firewall to deny inbound external
connections to SMB ports. - ...ANSWER...✓✓ A recently
discovered zero-day exploit utilizes an unknown
vulnerability in the SMB network protocol to rapidly infect
computers. Once infected, computers are encrypted and
held for ransom.
Offboarding - ...ANSWER...✓✓ A retail executive recently
accepted a job with a major competitor. The following
week, a security analyst reviews the security logs and
identifies successful login attempts to access the
departed executive's accounts. Which of the following
security practices would have addressed the issue?
DDoS - ...ANSWER...✓✓ Employees are having issues
accessing the company's website. Some employees
report very slow performance, which others cannot
access the website at all. The web and security
,3|Page
administrators search the logs and find millions of half-
open connections on port 443 on the web server. Further
analysis reveals thousands of different source IPs
initiating this traffic.
reconnaissance - ...ANSWER...✓✓ The process of
passively gathering information poor to launching a
cyberattack is called:
Zero Day - ...ANSWER...✓✓ An attacker is exploiting a
vulnerability that does not have a patch available. Which
of the following is the attacker exploiting?
The syslog server - ...ANSWER...✓✓ A privileged user at a
company stole several proprietary documents from a
server. The user also went into the log files and deleted
all records of the inncident. The systems administrator
has just informed investigators that other log files are
available for review. Which of the following did the
administrator MOST likely configure that will assist the
investigators?
The SNMP logs - ...ANSWER...✓✓ A host was infected
with malware. During the incident response, Joe, a user,
, 4|Page
reported that he did not receive any emails with links, but
he had been browsing the Internet all day. Which of the
following would MOST likely show where the malware
originated?
SNMPv2 SNMPv3
HTTP, HTTPS
Telnet SSH - ...ANSWER...✓✓ An analyst is trying to
identify insecure services that are running on the internal
network. After performing a port scan the analyst
identifies that a server has some insecure services
enabled on default ports Which of the following BEST
describes the services that are currently running and the
secure alternatives for replacing them?
Detective - ...ANSWER...✓✓ A network administrator has
been asked to install an IDS to improve the security
posture of an organization. Which of the following control
types is an IDS?
The vulnerabiltiy scan output - ...ANSWER...✓✓ After
reading a security bulletin, a network security manager is
concerned that a malicious actor may have breached the
network using the same software flaw. The exploit code is