9 - Resilience and Physical Security Flashcards

Be able to explain the importance of security concepts and security controls; given scenarios, implement proper cybersecurity resiliency measures

1
Q

Naomi wants to deploy a tool that can allow her to scale horizontally while also allowing her to patch systems without interfering with traffic to her web servers. What type of tech should she deploy?

A

Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rick is performing a backup that captures the changes since the last full backup. What type of backup has he performed?

A

Differential Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of recovery site has some or most systems in place but does not have the data needed to take over operations?

A

Warm Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ben wants to implement a RAID array that combines both read and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. What type of RAID should he use?

A

RAID 10 (1+0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cynthia wants to clone a virtual machine. What should she do to capture a live machine, including the machine state?

A

A Snapshot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sally is working to restore her org’s operations after a disaster took her datacenter offline. What critical document should she refer to as she restarts a system?

A

The Restoration Order Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mike wants to stop vehicles from traveling toward the entrance of his building. What physical security controls should he implement?

A

Bollards (eg. physical barriers such as metal pillars or concrete planters/barricades)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Amanda wants to securely destroy data held on DVDs. Which of the following options is NOT a suitable solution for this?

  • Degaussing
  • Burning
  • Pulverizing
  • Shredding
A

Degaussing (which only works on magnetic data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are Faraday cages deployed?

A

To prevent Electro Magnetic Interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What control specifically helps prevent insider threats?

A

Two-person Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Madhuri wants to implement a camera system but is concerned about the amount of storage space that the video recordings will require. What technology can help with this?

A

Motion-Detecting Cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What factor is a major reason organizations do not use security guards?

A

Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Michelle wants to ensure that attackers who breach her network security perimeter cannot gain control of the systems that run the industrial processes her org uses as a part of their business. What type of solution is best suited for this?

A

An Air Gap (physical separation of systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kathleen wants to discourage potential attackers from entering the facility she is responsible for. What are COMMON controls used for this type of prevention [think: what are basic physical deterrents]?

A

Fences, Lights, and Signs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does technology diversity help ensure cybersecurity resilience? [Recall the KEY WORDS.]

A

It ensures that a VULNERABILITY in a single company’s product with not impact the entire infrastructure; if a single VENDOR goes out of business, the company does not need to replace its entire system; and MISCONFIGURATION will not impact the entire network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Scott sends his backups to a company that keeps them in a secure vault. What type of backup solution has he implemented?

A

Offline

17
Q

Gabby want to implement a mirrored drive solution. What RAID level does this describe?

A

RAID 1

18
Q

Florian wants to ensure that systems on a protected network cannot be attacked via the org’s network. What design technique should he use to ensure this?

A

An Air Gap (physical separation of systems)

19
Q

What type of physical security control is a “Man Trap”?

A

An Access Control Vestibule

20
Q

Gurvinder identifies a third-party datacenter provider over 90 miles away to run his redundant datacenter operations. Why has he placed the data center that far away?

A

Geographic Dispersal