4.1 Security Architecture and Tool Sets Flashcards

1
Q

which audit category will audit all instances of users exercising their rights?

A

the audit privilege use audit category

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is another term for logical controls?

A

technical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which type of controls dictates how security policies are implemented to fulfill the company’s security goals?

A

administrative or management control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the name of the process for removing only the incriminating data from the audit logs?

A

scrubbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which type of controls is implemented to secure physical access to an object, such as building, a room, or a computer?

A

physical or operational control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which type of controls include developing policies and procedures, screening personnel, conducting security awareness training, and implementing change control?

A

administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the purpose of administrative controls?

A

to implement security policies based on procedures, standards, and guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the purpose of password complexity rules?

A

to ensure that users do not use passwords that are easy to guess using dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what must you do for an effective security auditing policy, besides creating security logs?

A

analyze the logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the purpose of physical controls?

A

to work with administrative and technical controls to enforce physical access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which audit category tracks access to all objects outside active directory?

A

the audit object access audit category

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which password attack does an account lockout policy protect against?

A

a brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

if a user needs administrative-level access, how many user accounts should be issued to the user?

A

two - one for normal tasks, one for administrative-level tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which setting ensures that accounts are not used beyond a certain data and/or time?

A

account expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are you trying to determine if you implement audit trails to ensure that users are not performing unauthorized functions?

A

accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

which setting ensures that users periodically change their account passwords?

A

password expiration

17
Q

what is the name for the process of tracking user activities by recording selected events in the server activity logs?

A

auditing

18
Q

which document is used when it is necessary to invoke legal action against an employee for inappropriate use of computer resources?

A

acceptable use policy

19
Q

which type of controls includes access control mechanisms, password management, identification methods, authentication methods, and security devices?

A

technical or logical controls

20
Q

what are the FIVE stages in the life cycle of the evidence or the chain of custody?

A
  1. collection of evidence from the site
  2. analysis of the evidence by a team of experts
  3. storage of the evidence in a secure place to ensure that the evidence is not tampered with
  4. presentation of the evidence by legal experts in a court of law
  5. returning the evidence to the owner after the proceedings are over
21
Q

what is the purpose of audit logs?

A

to document actions taken on a computer network and the party responsible for those actions

22
Q

which type of controls work to protect system access, network architecture and access, control zones, auditing, and encryption and protocols?

A

technical controls

23
Q

what is the purpose of technical controls?

A

to restrict access to objects and protect availability, confidentiality, and integrity

24
Q

when should an administrative account be used?

A

when performing administrative-level tasks

25
Q

which linux file contains encrypted user passwords that only the root user can read?

A

/etc/shadow

26
Q

what is the purpose of password age rules?

A

to ensure that users change their passwords on a regular basis

27
Q

which account should you rename immediately after installing a new operating system (OS) to harden the OS?

A

the administrator account

28
Q

which assessment examines whether network security practices follow a company’s security policy?

A

an audit

29
Q

which audit category monitors changes to user accounts and groups?

A

the audit account management audit category

30
Q

what is the purpose of the password history settings?

A

to ensure that users do not keep reusing the same passwords

31
Q

which setting ensures that repeated attempts to guess a user’s password is not possible beyond the configured value?

A

account lockout

32
Q

which account should you disable immediately after installing a new operating system (OS) to harden the OS?

A

the guest account

33
Q

which log in event viewer should you open to view events that are generated based on your auditing settings?

A

the security log

34
Q

what is a good password complexity policy?

A

a mixture of numbers, uppercase and lowercase letters, and special characters, such as rObin3*nest

35
Q

which audit category tracks all attempts to log on with a domain user account when enabled on domain controllers?

A

the audit account logon events audit category

36
Q

which type of controls includes controlling access to different parts of a building, implementing locking systems, installing fencing, implementing environmental controls, and protecting the facility perimeter?

A

physical controls