201-250 Flashcards
An organization has three divisions: Accounting, Sales, and Human Resources. Users in the Accounting division require access to a server in the Sales division, but no users in the Human Resources division should have access to resources in any other division, nor should any users in the Sales division have access to resources in the Accounting division.
Which of the following network segmentation schemas would BEST meet this objective?
D.
Create three separate VLANS, one for each division.
A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function.
A retail store uses a wireless network for its employees to access inventory from anywhere in the store. Due to concerns regarding the aging wireless network, the store manager has brought in a consultant to harden the network. During the site survey, the consultant discovers that the network was using WEP encryption.
Which of the following would be the BEST course of action for the consultant to recommend?
B.
Change the encryption used so that the encryption protocol is CCMP-based.
CCMP is the standard encryption protocol for use with the WPA2 standard and is much more secure than the WEP protocol and TKIP protocol of WPA. CCMP provides the following security services:
A server is configured to communicate on both VLAN 1 and VLAN 12. VLAN 1 communication works fine, but VLAN 12 does not.
Which of the following MUST happen before the server can communicate on VLAN 12?
D.
The server’s network switch port must be 802.1q tagged for VLAN 12.
802.1q is a standard that defines a system of VLAN tagging for Ethernet frames. The purpose of a tagged port is to pass traffic for multiple VLAN’s.
What are three of the primary security control types that can be implemented?
C.
Operational, technical, and management.
The National Institute of Standards and Technology (NIST) places controls into various types. The control types fall into three categories: Management, Operational, and Technical.
Which of the following technical controls is BEST used to define which applications a user can install and run on a company issued mobile device?
C.
Whitelisting
White lists are closely related to ACLs and essentially, a white list is a list of items that are allowed.
To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity.
Which of the following controls is being described in this situation?
C.
Technical
Controls such as preventing unauthorized access to PC’s and applying screensavers that lock the PC after five minutes of inactivity is a technical control type, the same as Identification and Authentication, Access Control, Audit and Accountability as well as System and Communication Protection.
Which of the following is a management control?
B.
Written security policy
Management control types include risk assessment, planning, systems and Services Acquisition as well as Certification, Accreditation and Security Assessment; and written security policy falls in this category.
Which of the following can result in significant administrative overhead from incorrect reporting?
C.
False positives
False positives are essentially events that are mistakenly flagged and are not really events to be concerned about. This causes a significant administrative overhead because the reporting is what results in the false positives.
A vulnerability scan is reporting that patches are missing on a server. After a review, it is determined that the application requiring the patch does not exist on the operating system.
Which of the following describes this cause?
B.
False positives
False positives are essentially events that are mistakenly flagged and are not really events to be concerned about.
Ann, a security technician, is reviewing the IDS log files. She notices a large number of alerts for multicast packets from the switches on the network. After investigation, she discovers that this is normal activity for her network.
Which of the following BEST describes these results?
C.
False positives
False positives are essentially events that are mistakenly flagged and are not really events to be concerned about.
Which of the following is an example of a false negative?
A.
The IDS does not identify a buffer overflow.
With a false negative, you are not alerted to a situation when you should be alerted.
A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data.
Which of the following administrative controls should be implemented to BEST achieve this?
C.
Warning banners
Within Microsoft Windows, you have the ability to put signs (in the form of onscreen pop-up banners) that appear before the login telling similar information—authorized access only, violators will be prosecuted, and so forth. Such banners convey warnings or regulatory information to the user that they must “accept” in order to use the machine or network. You need to make staff aware that they may legally be prosecuted and a message is best given via a banner so that all staff using workstation will get notification.
Joe, a security analyst, asks each employee of an organization to sign a statement saying that they understand how their activities may be monitored.
Which of the following BEST describes this statement? (Choose two.)
A. Acceptable use policy
C. Privacy policy
Privacy policies define what controls are required to implement and maintain the sanctity of data privacy in the work environment. Privacy policy is a legal document that outlines how data collected is secured. It should encompass information regarding the information the company collects, privacy choices you have based on your account, potential information sharing of your data with other parties, security measures in place, and enforcement.
Acceptable use policies (AUPs) describe how the employees in an organization can use company systems and resources, both software and hardware.
Joe, a newly hired employee, has a corporate workstation that has been compromised due to several visits to P2P sites. Joe insisted that he was not aware of any company policy that prohibits the use of such websites.
Which of the following is the BEST method to deter employees from the improper use of the company’s information systems?
A.
Acceptable Use Policy
Acceptable use policies (AUPs) describe how the employees in an organization can use company systems and resources, both software and hardware.
Pete, a security analyst, has been informed that the development team has plans to develop an application which does not meet the company’s password policy.
Which of the following should Pete do NEXT?
B.
Tell the application development manager to code the application to adhere to the company’s password policy.
Since the application is violating the security policy, it should be coded differently to comply with the password policy.
A major security risk with co-mingling of hosts with different security requirements is:
A.
Security policy violations
The entire network is only as strong as the weakest host. Thus, with the co-mingling of hosts with different security requirements would be risking security policy violations.
Which of the following provides the BEST explanation regarding why an organization needs to implement IT security policies?
C.
To reduce the organizational risk
Once risks have been identified and assessed then there are five possible actions that should be taken. These are: Risk avoidance, Risk transference, Risk mitigation, Risk deterrence and Risk acceptance. Anytime you engage in steps to reduce risk, you are busy with risk mitigation and implementing IT security policy is a risk mitigation strategy.
Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company?
D.
Mandatory vacations
A mandatory vacation policy requires all users to take time away from work to refresh. But not only does mandatory vacation give the employee a chance to refresh, but it also gives the company a chance to make sure that others can fill in any gaps in skills and satisfies the need to have replication or duplication at all levels as well as an opportunity to discover fraud.
Two members of the finance department have access to sensitive information. The company is concerned they may work together to steal information.
Which of the following controls could be implemented to discover if they are working together?
D.
Mandatory vacations
A mandatory vacation policy requires all users to take time away from work to refresh. Mandatory vacation gives the employee a chance to refresh, but it also gives the company a chance to make sure that others can fill in any gaps in skills and satisfies the need to have replication or duplication at all levels. Mandatory vacations also provide an opportunity to discover fraud. In this case mandatory vacations can prevent the two members from colluding to steal the information that they have access to.
Mandatory vacations are a security control which can be used to uncover the following:
A.
Fraud committed by a system administrator
Mandatory vacations also provide an opportunity to discover fraud apart from the obvious benefits of giving employees a chance to refresh and making sure that others in the company can fill those positions and make the company less dependent on those persons; a sort pf replication and duplication at all levels.