751-800 Flashcards

1
Q

The process of making certain that an entity (operating system, application, etc.) is as secure as it can be known as:

A

C.

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vendors typically ship software applications with security settings disabled by default to ensure a wide range of interoperability with other applications and devices.
Which of the following should a security administrator perform before deploying new software?

A

C.

Application hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following describes the process of removing unnecessary accounts and services from an application to reduce risk exposure?

A

B.

Application hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates.

Which of the following processes could MOST effectively mitigate these risks?

A

C.

Application patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A recently installed application update caused a vital application to crash during the middle of the workday. The application remained down until a previous version could be reinstalled on the server, and this resulted in a significant loss of data and revenue.

Which of the following could BEST prevent this issue from occurring again?

A

D.

Application patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An administrator finds that non-production servers are being frequently compromised, production servers are rebooting at unplanned times and kernel versions are several releases behind the version with all current security fixes.

Which of the following should the administrator implement?

A

C.

Patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is the term for a fix for a known software problem?

A

B.

Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following practices is used to mitigate a known security vulnerability?

A

B.

Patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following can a security administrator implement on mobile devices that will help prevent unwanted people from viewing the data if the device is left unattended?

A

A.

Screen lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen? (Choose two.)

A

C.
Remote wipe

F.
Device encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following controls can be implemented together to prevent data loss in the event of
theft of a mobile device storing sensitive information? (Select TWO).

A

A.
Full device encryption

B.
Screen locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A way to assure data at-rest is secure even in the event of loss or theft is to use:

A

A.

Full device encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly