90 min timer Flashcards
What should a contract with a cloud provider include so that the customer may check that the cloud provider is adhering to their stated security requirements?
A
SLA
B
Clean desk policy
C
Right-to-audit clause
D
SOW
C
Right-to-audit clause
A company has a satellite office that needs a constant connection to the headquarters’ network. What type of solution should they implement to create a secure network channel between locations?
A
Remote access VPN
B
Network emulator
C
Site-to-site VPN
D
Managed switch
C
Site-to-site VPN
In which of the following exercises might participants be required to restore from backups or have systems turned off to emulate outages?
A
Simulation
B
Tabletop
C
Documentation review
D
Walkthrough
A
Simulation
An administrator has created a set of standard security settings that should be applied to all workstations. They realize that they need to make changes to the default security settings. Using a centralized management tool, they make adjustments to the security baseline.
What stage of the baseline lifecycle are they in?
A
Establishing a baseline
B
Patch management
C
Maintaining a baseline
D
Deploying a baseline
C
Maintaining a baseline
Which activity involves actively probing systems to discover vulnerabilities?
A
Reporting
B
Scanning
C
Log aggregation
D
Alerting
B
Scanning
Which framework is used to standardize the sharing of security-related information?
A
SCAP
B
EAP
C
RADIUS
D
OCSP
A
SCAP
A technician is on-site at a manufacturing plant attempting to troubleshoot a system that manages the industrial control system. The information from this system is piped to a booth where a human-interface component displays all the relevant information and warnings.
Which of the following is being described in this scenario?
A
SCADA
B
RTOS
C
IoT
D
SoC
A
SCADA
Which of the following types of security controls is a highly visible CCTV camera?
A
Corrective
B
Preventative
C
Deterrent
D
Compensating
C
Deterrent
Which type of attack does not get installed directly onto a system, but runs only in memory?
A
Backdoor
B
Spyware
C
Fileless
D
Rootkit
C
Fileless
An attack has just been discovered within a production server. The administrators scramble to collect information in a forensic manner while alerting the authorities. The concern now is how to ensure that evidence of the attack is preserved.
Which term is used to summarize the life expectancy of various types of data that should be captured during forensic analysis?
A
Order of volatility
B
Time of check
C
Chain of custody
D
Time of use
A
Order of volatility
An e-commerce site wants to allow users to store their credit card numbers without keeping the actual account numbers in their database. What security solution can they use that allows them to substitute the numbers for the real ones when needed?
A
Salting
B
Hashing
C
Tokenization
D
Attestation
C
Tokenization
The Coca-Cola secret recipe would likely be classified as which of the following?
A
Critical
B
Private
C
Proprietary
D
Sensitive
C
Proprietary
A company is making considerations for the infrastructure of their web application. They want to include a clause in the SLA with their cloud provider that guarantees that if there is a problem with the load balancer, they will fix it within 1 hour.
What type of factor are they looking to implement in this situation?
A
Ease of deployment
B
Inability to patch
C
Scalability
D
Risk transference
D
Risk transference
Which term describes the moment when a system accesses a resource it has been granted access to?
A
Time-of-check
B
Out-of-cycle
C
Target-of-evaluation
D
Time-of-use
D
Time-of-use
Which of the following is the amount of risk associated with an activity if NO risk mitigation is applied?
A
Control risk
B
Risk appetite
C
Inherent risk
D
Residual risk
C
Inherent risk
A computer manufacturer needs to select a supplier of memory modules. To do so, they are currently evaluating some vendors’ financial stability, business reputation, quality, and compliance with regulations.
What process are they engaged in?
A
Due diligence
B
Conflict of interest
C
Right-to-audit clause
D
Supply chain analysis
A
Due diligence
Which of the following techniques is commonly used on receipts to conceal credit card numbers?
A
Pseudo-anonymization
B
Data masking
C
Data minimization
D
Tokenization
B
Data masking
Which of the following attacks takes advantage of weaknesses in how passwords are stored?
A
Password spraying
B
Brute force
C
Rainbow table
D
Dictionary
C
Rainbow table
A security administrator is creating a plan that lays out the steps to perform to restore services in case there is a fire in their new data center. It outlines what to prioritize to return the system to its normal operating state.
Which of the following is the administrator creating?
A
DRP
B
BCP
C
SDLC
D
AUP
A
DRP
A security engineer has discovered a vulnerability in a web application they are testing. One of the fields for user input provides an ability for a user to run code against the database.
Which type of attack takes advantage of a website that runs malformed database code?
A
Session hijacking
B
SQL injection
C
XSS
D
Brute force
B
SQL injection
A company is evaluating biometric authentication devices. They discover that one type frequently authenticates users who should not be allowed in the system. What type of issue is that system experiencing?
A
UA
B
IAPMR
C
FAR
D
FRR
C
FAR
You are instructing a group of junior administrators on the OSI model. You’ve explained that the data link layer is the one that transfers information between adjacent network nodes. Several different protocols operate on this level, including the two sublayers, logical link control, and media access control. This layer also houses several authentication technologies.
What is an example of a data link layer authentication technology?
A
802.16
B
802.11
C
802.1x
D
802.3
C
802.1x