Firewall, IAM, Log, and Risk PBQ Mini-Labs

Key Takeaways

  • Firewall PBQs usually test source, destination, protocol, direction, and rule order.
  • IAM PBQs reward least privilege, lifecycle cleanup, MFA, PAM, and separation of duties.
  • Log PBQs require correlation across identity, endpoint, network, and time fields.
  • Risk PBQs require matching likelihood, impact, control choice, owner, and residual risk.
  • Mini-lab practice should end with a written reason for each decision, not just an answer.
Last updated: April 2026

PBQ Mini-Labs

Use these labs as final-week drills. For each one, write the end state before checking the explanation. The goal is to practice how the exam thinks: apply secure defaults, meet the business need, and avoid unnecessary exposure.

Lab 1: Firewall Rule Cleanup

Scenario: A small retailer has a public web server, an application server, a database server, and an admin jump box.

Required business flows:

FlowRequirement
CustomersAccess the public website over HTTPS
Web serverSend application requests to the app server
App serverQuery the database
AdministratorsManage servers only through the jump box
MonitoringSend logs to the SIEM collector

Candidate rule set:

RuleSourceDestinationServiceAction
1InternetWeb serverTCP 443Allow
2InternetDatabase serverTCP 3306Allow
3Admin subnetJump boxTCP 22Allow
4Jump boxServersTCP 22, TCP 3389Allow
5ServersSIEMSyslogAllow
6AnyAnyAnyDeny

Fix: remove or deny rule 2. The database should not be reachable from the Internet. If the application uses MySQL, allow TCP 3306 only from the app server to the database server. Keep the explicit deny at the end.

Lab 2: IAM Least Privilege and Separation of Duties

Scenario: A payroll clerk needs to enter time corrections but must not approve payroll runs. A payroll manager can approve runs but should not change bank account records. A help desk analyst resets passwords but should not grant finance roles.

RoleAllowedNot allowed
Payroll clerkCreate and edit time correctionsApprove payroll run
Payroll managerApprove payroll runChange employee bank account
HR records specialistUpdate employee bank account after verificationApprove payroll run
Help desk analystReset password after identity verificationAdd finance or payroll roles

Secure PBQ answer: assign users to role-based groups that match job duties, require MFA for payroll access, log privileged actions, and require a ticket or workflow approval for role changes. Do not grant "finance admin" to everyone because it is convenient.

Lab 3: Log Triage

Review the events:

2026-04-29T09:10:03Z idp user=ajones result=success mfa=push source_ip=198.51.100.42 device=new
2026-04-29T09:12:44Z cloud user=ajones action=CreateAccessKey result=success
2026-04-29T09:15:01Z cloud user=ajones action=AttachAdminPolicy target=ajones result=success
2026-04-29T09:17:28Z proxy user=ajones dst=storage-sync-example.net bytes_out=734003200 action=allow

High-confidence findings:

FindingReason
New-device login followed by cloud key creationPossible account compromise or unauthorized persistence
Admin policy attachmentPrivilege escalation
Large outbound transferPossible exfiltration
Same user across eventsCorrelation strengthens severity

Best next actions: contain the account, revoke suspicious access keys and sessions, preserve logs, validate whether the activity was approved, and scope affected resources.

Lab 4: Risk Register PBQ

Scenario: A clinic uses an unsupported imaging workstation because a replacement requires vendor validation. It stores patient images locally and connects to the internal network.

Risk fieldGood entry
AssetImaging workstation IMG-07
ThreatMalware, unauthorized access, or data loss
VulnerabilityUnsupported OS and local sensitive data storage
ImpactPatient data exposure and clinical workflow disruption
LikelihoodMedium to high if connected broadly
TreatmentMitigate with segmentation, restricted access, backups, monitoring, and replacement plan
OwnerClinical technology manager or assigned system owner
Residual riskRemaining risk after compensating controls until replacement

Bad PBQ answers ignore ownership, claim the risk is eliminated by one firewall rule, or accept the risk without documented approval.

How to Grade Yourself

After each lab, ask:

  • Did I meet the business requirement?
  • Did I avoid broad permissions?
  • Did I choose secure protocols and paths?
  • Did I preserve or use evidence before changing too much?
  • Did I assign risk ownership and residual risk when the scenario required governance?

PBQs are practical. If your answer would make an auditor, incident handler, or network engineer ask "who approved this and why is it so broad," tighten it.

Test Your Knowledge

In the firewall mini-lab, which rule is the clearest problem?

A
B
C
D
Test Your KnowledgeMulti-Select

Which actions are appropriate after the log triage pattern shows new-device login, access key creation, admin policy attachment, and large outbound transfer? Select three.

Select all that apply

Contain the account and revoke suspicious sessions or keys
Preserve relevant logs for investigation
Validate whether the activity was approved
Delete all logs to reduce storage use
Grant the user more permanent privileges
Test Your Knowledge

A payroll clerk needs to enter time corrections but must not approve payroll runs. Which principle is most directly being applied?

A
B
C
D