All Domains #1 Flashcards
Barbie maintains a collection of items in her boutique, including dresses, accessories, and furniture. These items represent what type of assets in her inventory?
1. Tangible
2. Both Tangible and Intangible
3. Neither Tangible nor Intangible
4. Intangible
Tangible
The correct answer: Tangible. The dresses, accessories, and furniture that Barbie maintains in her boutique are examples of Tangible assets. Tangible assets are physical items that have value and can be touched or held. The incorrect answers: Intangible: Intangible assets are non-physical assets, such as patents, copyrights, and trademarks. In this case, the assets mentioned (dresses, accessories, furniture) are physical items, so they are not intangible assets. Both Tangible and Intangible: While a business can have both types of assets, in this particular case, the assets mentioned are only tangible, physical items. Neither Tangible nor Intangible: This option is incorrect as the items mentioned are clearly tangible, physical assets.
Which of the following is the MOST likely definition of Data Terminal Equipment (DTE)?
1. Device that receives power from a network
2. Device that encrypts and decrypts data
3. Device that processes and stores data
4. Device that transmits and receives data over a network
A device that transmits and receives data over a network
The correct answer: Data Terminal Equipment (DTE) refers to any device or equipment that is used to transmit and receive data over a network. This includes devices such as computers, terminals, printers, and modems. These devices are connected to a Data Communications Equipment (DCE) device, such as a router or switch, to send and receive data over a network. The incorrect answers: While DTE does transmit and receive data, it does not necessarily process or store data. That function would be performed by a different device, such as a server or a storage device. Encrypting and decrypting data is not a core function of DTE. While some DTE devices may have the capability to encrypt and decrypt data, it is not a defining characteristic of DTE. DTE is not a device that receives power from a network. It is a device that transmits and receives data over a network, but it receives power from a different source, such as a power outlet or a battery.
Database transactions require atomicity, consistency, isolation, and durability, also referred to as the ACID model. What is atomicity focused on?
1. Ensuring that a transaction is completed only if all of its individual steps are successful.
2. Ensuring that a transaction cannot be interrupted by other transactions
3. Ensuring that a transaction can only be accessed by a single user at a time.
4. Ensuring that a transaction is completed only if all of its individual steps are completed in the correct order.
Ensuring that a transaction is completed only if all of its individual steps are successful.
The correct answer: Atomicity in the ACID model of database transactions refers to the ‘all or nothing’ principle. If a transaction consists of multiple steps, atomicity guarantees that either all the steps are executed successfully and the transaction is committed, or if any step fails, the entire transaction is rolled back. No intermediate state is acceptable, ensuring data integrity. The incorrect answers: While the order of operations may be important in a transaction, ensuring that operations are completed in the correct order isn’t the primary focus of atomicity. This is more related to the sequencing or scheduling of transactions, not atomicity. Ensuring that a transaction can only be accessed by a single user at a time is not what atomicity is about. This statement is more closely related to the concept of ‘Isolation’ in the ACID model, where each transaction is executed in a way as if it is the only operation being processed, independent of others. Ensuring that a transaction cannot be interrupted by other transactions is also not the primary focus of atomicity. This relates more to ‘Isolation’ in the ACID model, which ensures that each transaction is executed independently of others, and other transactions cannot affect it during its execution.
Which of the following is the PRIMARY indicator used in User Entity and Behavior Analytics (UEBA) to detect anomalies in user behavior?
1. Highest number of failed login attempts
2. Most frequently accessed data
3. First login time
4. Most recent login time
Most frequently accessed data
The correct answer: Most frequently accessed data: UEBA (User and Entity Behavior Analytics) is a cybersecurity process that takes note of the normal conduct of users and then detects any anomalous behavior or instances when they deviate from these patterns. The “most frequently accessed data” is a key indicator used by UEBA. The reason is that changes in the data a user regularly accesses can indicate potentially harmful actions. For instance, if a user who typically accesses a particular set of data suddenly starts accessing a different, more sensitive set of data, it could signify a compromised account or insider threat. UEBA systems detect such sudden changes in behavior and alert cybersecurity teams accordingly. The incorrect answers: The first login time isn’t a primary indicator used in UEBA. This is because it usually remains constant for a given user. It may be used as a secondary factor in the context of user behavior, such as tracking when a new user starts exhibiting unusual behavior, but it’s not the primary means of identifying anomalous actions. The highest number of failed login attempts could indicate a brute force attack or account compromise attempt, but it isn’t a primary indicator used in UEBA. Failed logins fall under the umbrella of traditional security tools and are usually monitored by intrusion detection systems (IDS) or security information and event management (SIEM) solutions. While it’s true that UEBA might consider failed logins in its broader behavioral analysis, it’s not the main method UEBA uses to identify abnormal behavior. Most recent login time is an important piece of information for various security practices, and can be used as a secondary indicator in UEBA, but it isn’t the primary indicator of abnormal behavior. The primary focus of UEBA is to understand consistent patterns in data access and other activities over time, not isolated incidents like a single login event. A sudden change in login time might be taken into account, but it’s the repetitive anomalies in behavior that UEBA systems chiefly look out for.
Which of these, if used right, is the MOST secure form of “something you have” authentication?
1. A security token with a One-time pwd
2. A key fob with a static pwd
3. A pwd protected USB drive
4. A biometric fingerprint scanner
When Governor Swann restricts access to the treasury room only to his trusted advisor and himself, which principle of access control is he implementing?
1. Mandatory access control
2. least privilege
3.Discretionary Access Control
4.Role-based access control
We need to get rid of some old hard drives, and we need to ensure proper data disposal and no data remanence. Which of these options has NO known tools that can restore the data once that specific disposal process has been used?
1. Encrypting
2. Physical Destruction
3. Degaussing
4. Overwriting
We use different risk analysis approaches and tools in our risk assessments. Which of the following risk analysis methods involves assigning a numerical value to the probability and impact of a risk?
1. Qualitative risk analysis
2. Vulnerability risk analysis
3. Quantitative risk analysis
4. Technical risk analysis
Which of the following is the MOST common type of investigation?
1. Internal investigation
2. Criminal investigation
3. Environmental ivestigation
4. Forensic investigation
What type of access control model is based on the concept of a trusted third party for authentication?
1. Federated Access Control
2. Multifactor Authentication
3. Role-based Access Control
4. Rule-based Access Control
Which of the following is NOT a characteristic of the Kerberos authentication protocol?
- It is a decentralized protocol
- It uses a trusted third party to authenticate users
- It uses symmetric key cryptography
- It provides single sign-on functionality
Which of the following is the MOST complex component of L2TP (Layer 2 Tunneling Protocol)?
- Authentication
- Encapsulation
- Tunnel Management
- Handshake
What type of security policy would be MOST effective for protecting sensitive data in a cloud environment?
- An encryption policy
- A perimeter security policy
- A user access control policy
- A data classification policy
You are the IT security manager at a large financial institution. You have recently implemented a new change management process, which includes a thorough evaluation of the risks associated with any proposed changes to the IT infrastructure. What is the primary goal of the change management process?
- to minimize the potential risks associated with any changes to the IT infra
- To ensure that all changes are implemented as quickly as possible
- To ensure that all changes are documents and tracked.
- To ensure that all changes are approved by the IT security team before they are implemented.
What is the best way to protect against a SQL (Structured Query Language) injection attack?
- Limit access to the database server to only a select few users
- Use firewalls to block all incoming traffic to the database server
- Input validation and sanitization on all user-supplied data
- Implement regular security updates and patches on all database systems
What is the FIRST step in protecting a company’s trademark?
- Conducting a trademark search
- Registering the trademark with the USPTO
- Implementing a trademark usage policy
- Monitoring the use of the trademark
In a regulatory investigation, which of the following is the PRIMARY objective?
- To collect evidence and build a case against individuals or orgs.
- To identify and punish individuals or orgs that have violated regulations.
- To evaluate the effectiveness of current regulations
- To prevent future violations of regulations.
Which encryption technique is considered to have the HIGHEST level of security?
- One-time pad
- AES
- RSA
- Blowfish
What is the MOST important step in the cryptography process?
- Hashing the message
- Encrypting the message
- Key exchange
- Establishing trust between the sender and the recipient
Which of the following is the HIGHEST level of asset classification?
- Unclassified
- Public
- Confidential
- Restricted
When an attacker has obtained our sensitive data and chooses to disclose it on a website, which leg of the CIA triad would be MOST affected?
- Integrity
- Authenticity
- Confidentiality
- Availability
Which of the following describes a system that uses a decentralized approach to control access to resources?
- Access control list
- Role-based Access Control
- Rule-based Access control
- Blockchain
In order to ensure the safety of ThorTeaches.com’s sensitive data, it is crucial to identify any potential vulnerabilities or threats in the system. Which of the following is a method of identifying potential vulnerabilities and threats in a system?
- Security audit
- Risk assessment
- Statistical analysis
- Attacker-centric threat modeling
Which of the following factors is NOT considered in the CWSS (Common Weakness Scoring System) scoring?
- the likelihood of exploitation
- The number of vendors affected by the weakness
- The length of time the weakness has existed
- The level of difficulty to fix the weakness.
Which of the following is NOT a benefit of using a Keyboard, Video Mouse (KVM)?
- Decreased performance of connected devices
- Increased security through separation of devices
- Improved accessibility to multiple computers
- Reduced cost of hardware.
Which of the following is the HIGHEST priority when reviewing facility security controls?
- Providing access badges and identification systems
- Implementing security cameras and surveillance systems
- Ensuring that all doors have locks.
- Conducting regular security assessments and audits.
ThorTeaches.com has recently undergone a major data breach, with sensitive customer information being stolen by hackers. You and your team are working on implementing new cybersecurity measures to prevent future attacks. Which of the following options is the most effective way to secure ThorTeaches.com’s data?
- Implementing two-factor authentication for all accs.
- Regularly updating software and applications
- Implementing a firewall
- Training employees on how to identify phishing emails.
When we are reviewing our audit logs, it is which type of control?
- Directive
- Preventive
- Corrective
- Detective
As the IT director of a mid-sized tech startup, your organization is setting up a remote site in a rural area. Due to the remote location, your internet connectivity options are limited. You need a solution that offers decent internet speeds for your team’s cloud-based workloads and video conferencing needs. The options available to you are DSL, Fiber (offered by a local power company), and Satellite Internet. Considering the location and the organization’s needs, which internet connectivity solution should you choose?
- DSL
- Satellite Internet
- Fiber
- Dialup
Which of the following is considered the MOST effective method for managing quantitative risk?
- Implementing access control measures.
- Implementing firewalls and IDS
- Regularly conducting vulnerability assessments
- Establishing risk tolerance levels and implementing risk mitigation strategies.
Which of the following is the PRIMARY indicator that a company has met the requirements of a SOC 2 audit?
- Regularly conducting risk assessment
- Implementing strong pwd policies
- Having a comprehensive data backup plan
- Establishing appropriate controls for security and availability
Which of the following is the MOST important aspect of CM (Configuration Management)?
- Ensuring that config changes are documented and approved.
- Implementing strict access controls to prevent unauthorized changes
- Regularly backing up config files
- Regularly testing and verifying the effectiveness of security controls.
Which of the following techniques is NOT commonly used by attackers in the MITRE ATT&CK framework?
- Malware
- Watering hole attacks
- Phishing
- Social engineering
We have had some tapes go missing from our inventory. We are unsure if they were stolen or just misplaced. Which of these should we ALWAYS use when dealing with sensitive tape backups?
- Proper marking
- All of these
- Proper destruction
- Proper handling
Which of the following is NOT considered PII (Personally Identifiable Information)?
- Full name
- Social security number
- User ID
- Address
Which of the following is the LEAST common type of cybercrime?
- Identity theft
- Phishing
- Ransomware
- DDoS attacks
Which of the following is the MOST effective method to prevent Spectre attacks?
- Enabling processor virtualization
- Installing a hardware-based firewall
- Updating OS
- Implementing regular software patches
Which of the following is the MOST important benefit of implementing dual control?
- Reduced error rates
- Improved security
- Increased productivity
- Enhanced data integrity
Which of the following is the MOST effective method for de-identifying personal data?
- Applying statistical techniques to remove identifying characteristics
- Encrypting data with a weak cipher
- Replacing names with random values
- Redacting sensitive information
As the Director of Information Security for ThorTeaches.com, you are reviewing a detailed report from a recently completed penetration test. The report highlights several significant vulnerabilities and provides recommendations for mitigating them. The vulnerabilities range from low-risk to high-risk, and the associated mitigations vary in terms of implementation effort, cost, and time. To ensure the company effectively addresses these vulnerabilities, you need to strategize a plan for prioritizing the mitigation actions. What should be the primary criterion for prioritizing the mitigation actions recommended in the penetration testing report?
- The ease of exploiting the identified vulnerabilities
- The estimated time it would take to implement the recommended mitigations measures.
- The severity of the vulnerabilities identified
- The cost of implementing the recommended mitigation measures.
As the IT Security Manager of a multinational corporation, you are overseeing the disposal of outdated server hardware, including spinning disk hard drives. The data on these drives includes proprietary information and sensitive client details. The drives are functioning, but some sectors are damaged. Your team proposes a number of approaches to ensure the data is completely eradicated. Given the sensitive nature of the data, the functioning status of the drives, and the fact that some sectors are damaged, which of the following methods will provide the most comprehensive destruction of data?
- Encrypting the data on the hard drives
- Degaussing followed by physical disk shredding
- Overwriting the data on the hard drives with random characters
- Using a software-based data sanitization method.
What is the primary benefit of implementing a security awareness program in an organization?
- To improve the overall security posture of the org
- To prevent employees from accidentally leaking sensitive info
- To ensure compliance with industry regulations
- To increase employee productivity
Which of these types of data destruction would we use to ensure there is no data remanence on our PROM, flash memory, and SSD drives?
- Overwriting
- Degaussing
- Shredding
- Incinerating
Which of the following metrics is the BEST indicator of the accuracy of a biometric system?
- False acceptance rate
- Crossing Error Rate (CER)
- False rejection rate
- Equal error rate
Which of the following is the FIRST principle that should be considered when assessing and implementing secure design principles in network architectures?
- Confidentiality
- Integrity
- Availability
- Lease privilege
Which is the WORST type of security breach for an organization?
- A data leakage
- A malware infection
- A social engineering attack
- A physical intrusion
Which of the following is the MOST important factor to consider when analyzing network device log files for security incidents?
- The source of the logs
- The severity of the logs
- The date and time of the logs
- The volume of the logs.
Which of the following is the FIRST step in responding to a network attack?
- Notify relevant parties
- Implement countermeasures
- Identify the type of attack
- Shut down the affected network
You are the Chief Information Security Officer (CISO) of a large financial organization. Recently, there has been a security incident that was traced back to a group account used by one of the teams within the organization. Given the nature of the group account, it is challenging to identify the individual responsible for the incident. You recognize the risks and challenges of non-repudiation associated with the use of group accounts and need to propose a measure to eliminate this security risk. What is the most effective measure to enhance accountability and non-repudiation in this context?
- Transition to a system that assigns individual accounts with unique identifies to all employees
- Provide employees with training on the risks associated with group accounts.
- Implement regular pwd changes for all group accs.
- Implement 2-factor auth for all group accs.
The finance department is implementing a new system for tracking expenses and needs to make sure that all data is correctly formatted and checked for errors before it is entered into the system. What is the layer of the OSI model that is responsible for providing services to the application layer, such as data formatting and error checking?
- Transport layer
- Physical layer
- Datalink layer
- Network layer