Architecture and Design (1) Flashcards
Caroline has been asked to find a standard to guide her company’s choices in implementing information security management systems. She is looking for a standard that is international. Which of the following would be the best choice for her?
ISO 27002
ISO 27017
NIST 800-12
ISO 27002
The correct answer is ISO 27002. ISO 27002 is an international standard for implementing and maintaining information security systems
You are responsible for network security at an e-commerce company. You want to ensure that you are using best practices for the e-commerce website your company hosts. What standard would be the best for you to review?
OWASP
NERC
NIST
OWASP
The correct answer is the Open Web Application Security Project. It is the de facto standard for web application security
Cheryl is responsible for cybersecurity at a mid-sized insurance company. She has decided to utilize a different vendor for network antimalware than she uses for host antimalware. Is this a recommended action, and why or why not?
This is not recommended; you should use a single vendor for a particular security control.
This is recommended; this is described as vendor diversity.
It is neutral. This does not improve or detract from security.
This is recommended; this is described as vendor diversity.
Vendor diversity gives two security benefits. The first is that there is not a single point of failure should one vendor cease operations. The second benefit is that each vendor has a specific methodology and algorithms used for detecting malware. If you use the same vendor at all points where you need malware detection, any flaw or weakness in that vendor’s methodology will persist across the network
Maria is a security administrator for a large bank. She is concerned about malware, particularly spyware that could compromise customer data. Which of the following would be the best approach for her to mitigate the threat of spyware?
Computer usage policies, network antimalware, and host antimalware
Host and network antimalware, computer usage policies, and website whitelisting
Host and network antimalware, computer usage policies, and employee training
Host and network antimalware, computer usage policies, and employee training
Control diversity means utilizing different controls to mitigate the same threat. For malware, the use of technical controls, such as anti-malware, is critical. But it is also important to have administrative controls, such as good policies, and to ensure employees are properly trained
Gabriel is setting up a new e-commerce server. He is concerned about security issues. Which of the following would be the best location to place an e-commerce server?
DMZ
Intranet
Guest network
DMZ
The demilitarized zone (DMZ) is a zone between an outer firewall and an inner firewall. It is specifically designed as a place to locate public-facing servers. The outer firewall is more permissive, thus allowing public access to the servers in the DMZ. However, the inner firewall is more secure, thus preventing outside access to the corporate network
Enrique is concerned about backup data being infected by malware. The company backs up key servers to digital storage on a backup server. Which of the following would be most effective in preventing the backup data being infected by malware?
Place the backup server on a separate VLAN.
Air-gap the backup server.
Use a honeynet.
Air-gap the backup server.
Air gapping refers to the server not being on a network. This means literally that there is “air” between the server and the network. This prevents malware from infecting the backup server
Janelle is the security administrator for a small company. She is trying to improve security throughout the network. Which of the following steps should she take first?
Implement antimalware on all computers.
Turn off unneeded services on all computers.
Turn on host-based firewalls on all computers.
Turn off unneeded services on all computers.
The first step in security is hardening the operating system, and one of the most elementary aspects of that is turning off unneeded services. This is true regardless of the operating system
Mary is the CISO for a mid-sized company. She is attempting to mitigate the danger of computer viruses. Which administrative control can she implement to help achieve this goal?
Implement host-based antimalware.
Implement policies regarding email attachments and file downloads.
Implement network-based antimalware.
Implement network-based antimalware.
Administrative controls are policies and processes designed to mitigate some threat. The use of policies that govern the opening of email attachments and the downloading of files is an administrative control for malware
You are the network administrator for a large company. Your company frequently has nonemployees in the company such as clients and vendors. You have been directed to provide these nonemployees with access to the Internet. Which of the following is the best way to implement this?
Establish a guest network.
Allow nonemployees to connect only to the DMZ.
Establish limited accounts on your network for nonemployees to use.
Establish a guest network.
A guest network is separate from your production network; therefore, even if there is some breach of that network, it won’t affect your production network. It is a common security practice to establish a guest network so that guests can access the Internet, without providing them with access to the corporate network resources
Juan is a network administrator for an insurance company. His company has a number of traveling salespeople. He is concerned about confidential data on their laptops. What is the best way for him to address this?
FDE
TPM
SDN
FDE
Full disk encryption fully encrypts the hard drive on a computer. This is an effective method for ensuring the security of data on a computer
Terrance is responsible for secure communications on his company’s network. The company has a number of traveling salespeople who need to connect to network resources. What technology would be most helpful in addressing this need?
VPN concentrator
SSL accelerator
DMZ
VPN concentrator
A VPN concentrator is a hardware device used to create remote access VPNs. The concentrator creates encrypted tunnel sessions between hosts, and many use two-factor authentication for additional security
Mohaned is concerned about malware infecting machines on his network. One of his concerns is that malware would be able to access sensitive system functionality that requires administrative access. What technique would best address this issue?
Implementing host-based antimalware
Using a nonadministrative account for normal activities
Implementing FDE
Using a nonadministrative account for normal activities
If a system is infected with malware, the malware will operate with the privileges of the current user. If you use nonadministrative accounts, with least privileges, then the malware won’t be able to access administrative functionality
John works for an insurance company. His company uses a number of operating systems, including Windows and Linux. In this mixed environment, what determines the network operating system?
The OS of the domain controller
The OS of the majority of servers
The OS of the majority of client computers
The OS of the domain controller
The network operating system is determined by the operating system running on a domain controller. A network could be mostly Windows, but as long as the domain controller is Unix, the network operating system is Unix
Juanita is implementing virtualized systems in her network. She is using Type I hypervisors. What operating system should be on the machines for her to install the hypervisor?
None
Windows
Any operating system
Windows or Linux
None
A Type I hypervisor is also known as a bare-metal hypervisor. It installs directly onto hardware and does not require an operating system to be installed first
You are responsible for security at your company. You want to improve cloud security by following the guidelines of an established international standard. What standard would be most helpful?
NIST 800-53
ISO 27017
ISO 27002
ISO 27002
ISO 27017 is an international standard for cloud security