All Domains #1 Flashcards
Barbie maintains a collection of items in her boutique, including dresses, accessories, and furniture. These items represent what type of assets in her inventory?
1. Tangible
2. Both Tangible and Intangible
3. Neither Tangible nor Intangible
4. Intangible
Tangible
The correct answer: Tangible. The dresses, accessories, and furniture that Barbie maintains in her boutique are examples of Tangible assets. Tangible assets are physical items that have value and can be touched or held. The incorrect answers: Intangible: Intangible assets are non-physical assets, such as patents, copyrights, and trademarks. In this case, the assets mentioned (dresses, accessories, furniture) are physical items, so they are not intangible assets. Both Tangible and Intangible: While a business can have both types of assets, in this particular case, the assets mentioned are only tangible, physical items. Neither Tangible nor Intangible: This option is incorrect as the items mentioned are clearly tangible, physical assets.
Which of the following is the MOST likely definition of Data Terminal Equipment (DTE)?
1. Device that receives power from a network
2. Device that encrypts and decrypts data
3. Device that processes and stores data
4. Device that transmits and receives data over a network
A device that transmits and receives data over a network
The correct answer: Data Terminal Equipment (DTE) refers to any device or equipment that is used to transmit and receive data over a network. This includes devices such as computers, terminals, printers, and modems. These devices are connected to a Data Communications Equipment (DCE) device, such as a router or switch, to send and receive data over a network. The incorrect answers: While DTE does transmit and receive data, it does not necessarily process or store data. That function would be performed by a different device, such as a server or a storage device. Encrypting and decrypting data is not a core function of DTE. While some DTE devices may have the capability to encrypt and decrypt data, it is not a defining characteristic of DTE. DTE is not a device that receives power from a network. It is a device that transmits and receives data over a network, but it receives power from a different source, such as a power outlet or a battery.
Database transactions require atomicity, consistency, isolation, and durability, also referred to as the ACID model. What is atomicity focused on?
1. Ensuring that a transaction is completed only if all of its individual steps are successful.
2. Ensuring that a transaction cannot be interrupted by other transactions
3. Ensuring that a transaction can only be accessed by a single user at a time.
4. Ensuring that a transaction is completed only if all of its individual steps are completed in the correct order.
Ensuring that a transaction is completed only if all of its individual steps are successful.
The correct answer: Atomicity in the ACID model of database transactions refers to the ‘all or nothing’ principle. If a transaction consists of multiple steps, atomicity guarantees that either all the steps are executed successfully and the transaction is committed, or if any step fails, the entire transaction is rolled back. No intermediate state is acceptable, ensuring data integrity. The incorrect answers: While the order of operations may be important in a transaction, ensuring that operations are completed in the correct order isn’t the primary focus of atomicity. This is more related to the sequencing or scheduling of transactions, not atomicity. Ensuring that a transaction can only be accessed by a single user at a time is not what atomicity is about. This statement is more closely related to the concept of ‘Isolation’ in the ACID model, where each transaction is executed in a way as if it is the only operation being processed, independent of others. Ensuring that a transaction cannot be interrupted by other transactions is also not the primary focus of atomicity. This relates more to ‘Isolation’ in the ACID model, which ensures that each transaction is executed independently of others, and other transactions cannot affect it during its execution.
Which of the following is the PRIMARY indicator used in User Entity and Behavior Analytics (UEBA) to detect anomalies in user behavior?
1. Highest number of failed login attempts
2. Most frequently accessed data
3. First login time
4. Most recent login time
Most frequently accessed data
The correct answer: Most frequently accessed data: UEBA (User and Entity Behavior Analytics) is a cybersecurity process that takes note of the normal conduct of users and then detects any anomalous behavior or instances when they deviate from these patterns. The “most frequently accessed data” is a key indicator used by UEBA. The reason is that changes in the data a user regularly accesses can indicate potentially harmful actions. For instance, if a user who typically accesses a particular set of data suddenly starts accessing a different, more sensitive set of data, it could signify a compromised account or insider threat. UEBA systems detect such sudden changes in behavior and alert cybersecurity teams accordingly. The incorrect answers: The first login time isn’t a primary indicator used in UEBA. This is because it usually remains constant for a given user. It may be used as a secondary factor in the context of user behavior, such as tracking when a new user starts exhibiting unusual behavior, but it’s not the primary means of identifying anomalous actions. The highest number of failed login attempts could indicate a brute force attack or account compromise attempt, but it isn’t a primary indicator used in UEBA. Failed logins fall under the umbrella of traditional security tools and are usually monitored by intrusion detection systems (IDS) or security information and event management (SIEM) solutions. While it’s true that UEBA might consider failed logins in its broader behavioral analysis, it’s not the main method UEBA uses to identify abnormal behavior. Most recent login time is an important piece of information for various security practices, and can be used as a secondary indicator in UEBA, but it isn’t the primary indicator of abnormal behavior. The primary focus of UEBA is to understand consistent patterns in data access and other activities over time, not isolated incidents like a single login event. A sudden change in login time might be taken into account, but it’s the repetitive anomalies in behavior that UEBA systems chiefly look out for.
Which of these, if used right, is the MOST secure form of “something you have” authentication?
1. A security token with a One-time pwd
2. A key fob with a static pwd
3. A pwd protected USB drive
4. A biometric fingerprint scanner
When Governor Swann restricts access to the treasury room only to his trusted advisor and himself, which principle of access control is he implementing?
1. Mandatory access control
2. least privilege
3.Discretionary Access Control
4.Role-based access control
We need to get rid of some old hard drives, and we need to ensure proper data disposal and no data remanence. Which of these options has NO known tools that can restore the data once that specific disposal process has been used?
1. Encrypting
2. Physical Destruction
3. Degaussing
4. Overwriting
We use different risk analysis approaches and tools in our risk assessments. Which of the following risk analysis methods involves assigning a numerical value to the probability and impact of a risk?
1. Qualitative risk analysis
2. Vulnerability risk analysis
3. Quantitative risk analysis
4. Technical risk analysis
Which of the following is the MOST common type of investigation?
1. Internal investigation
2. Criminal investigation
3. Environmental ivestigation
4. Forensic investigation
What type of access control model is based on the concept of a trusted third party for authentication?
1. Federated Access Control
2. Multifactor Authentication
3. Role-based Access Control
4. Rule-based Access Control
Which of the following is NOT a characteristic of the Kerberos authentication protocol?
- It is a decentralized protocol
- It uses a trusted third party to authenticate users
- It uses symmetric key cryptography
- It provides single sign-on functionality
Which of the following is the MOST complex component of L2TP (Layer 2 Tunneling Protocol)?
- Authentication
- Encapsulation
- Tunnel Management
- Handshake
What type of security policy would be MOST effective for protecting sensitive data in a cloud environment?
- An encryption policy
- A perimeter security policy
- A user access control policy
- A data classification policy
You are the IT security manager at a large financial institution. You have recently implemented a new change management process, which includes a thorough evaluation of the risks associated with any proposed changes to the IT infrastructure. What is the primary goal of the change management process?
- to minimize the potential risks associated with any changes to the IT infra
- To ensure that all changes are implemented as quickly as possible
- To ensure that all changes are documents and tracked.
- To ensure that all changes are approved by the IT security team before they are implemented.
What is the best way to protect against a SQL (Structured Query Language) injection attack?
- Limit access to the database server to only a select few users
- Use firewalls to block all incoming traffic to the database server
- Input validation and sanitization on all user-supplied data
- Implement regular security updates and patches on all database systems
What is the FIRST step in protecting a company’s trademark?
- Conducting a trademark search
- Registering the trademark with the USPTO
- Implementing a trademark usage policy
- Monitoring the use of the trademark
In a regulatory investigation, which of the following is the PRIMARY objective?
- To collect evidence and build a case against individuals or orgs.
- To identify and punish individuals or orgs that have violated regulations.
- To evaluate the effectiveness of current regulations
- To prevent future violations of regulations.
Which encryption technique is considered to have the HIGHEST level of security?
- One-time pad
- AES
- RSA
- Blowfish
What is the MOST important step in the cryptography process?
- Hashing the message
- Encrypting the message
- Key exchange
- Establishing trust between the sender and the recipient
Which of the following is the HIGHEST level of asset classification?
- Unclassified
- Public
- Confidential
- Restricted
When an attacker has obtained our sensitive data and chooses to disclose it on a website, which leg of the CIA triad would be MOST affected?
- Integrity
- Authenticity
- Confidentiality
- Availability
Which of the following describes a system that uses a decentralized approach to control access to resources?
- Access control list
- Role-based Access Control
- Rule-based Access control
- Blockchain
In order to ensure the safety of ThorTeaches.com’s sensitive data, it is crucial to identify any potential vulnerabilities or threats in the system. Which of the following is a method of identifying potential vulnerabilities and threats in a system?
- Security audit
- Risk assessment
- Statistical analysis
- Attacker-centric threat modeling
Which of the following factors is NOT considered in the CWSS (Common Weakness Scoring System) scoring?
- the likelihood of exploitation
- The number of vendors affected by the weakness
- The length of time the weakness has existed
- The level of difficulty to fix the weakness.