Architecture and Design (2) Flashcards
You have been asked to implement security for SCADA systems in your company. Which of the following standards will be most helpful to you?
NIST 800-82
PCI-DSS
NIST 800-30
NIST 800-82
The correct answer is NIST 800-82. Special Publication 800-82, Revision 2, “Guide to Industrial Control System (ICS) Security,” is specific to industrial control systems. Industrial systems include SCADA (Supervisor Control And Data Acquisition) and PLCs (primary logic controllers)
Joanne works for a large insurance company. Some employees have wearable technology, such as smart watches. What is the most significant security concern from such devices?
These devices can distract employees.
These devices can be used to carry data in and out of the company.
These devices may not have encrypted drives.
These devices can be used to carry data in and out of the company.
Wearable devices have storage and thus can be used to bring in files to a network, or to exfiltrate data from the network
John is installing an HVAC system in his datacenter. What will this HVAC have the most impact on?
Confidentiality
Availability
Fire suppression
Availability
A heating, ventilation, and air conditioning system will affect availability. By maintaining temperature and humidity, the servers in the datacenter are less likely to crash and thus be more available
Maria is a security engineer with a manufacturing company. During a recent investigation, she discovered that an engineer’s compromised workstation was being used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for administering the SCADA systems and cannot be blocked from connecting to them. What should Maria do to mitigate this threat?
Install host-based antivirus software on the engineer’s system.
Implement account usage auditing on the SCADA system.
Implement an NIPS on the SCADA system.
Implement account usage auditing on the SCADA system.
Maria should implement ongoing auditing of the account usage on the SCADA system. This will provide a warning that someone’s account is being used when they are not actually using it
Lucy works as a network administrator for a large company. She needs to administer several servers. Her objective is to make it easy to administer and secure these servers, as well as making the installation of new servers more streamlined. Which of the following best addresses these issues?
Setting up a cluster
Virtualizing the servers
Putting the servers on a VLAN
Virtualizing the servers
The correct answer is virtualization. By virtualizing the servers Lucy can administer them all in a single location, and it is very easy to set up a new virtual server, should it be needed
Gerard is responsible for secure communications with his company’s e-commerce server. All communications with the server use TLS. What is the most secure option for Gerard to store the private key on the e-commerce server?
HSM
FDE
SED
HSM
A hardware security module (HSM) is the most secure way to store private keys for the e-commerce server. An HSM is a physical device that safeguards and manages digital keys
You are the security officer for a large company. You have discovered malware on one of the workstations. You are concerned that the malware might have multiple functions and might have caused more security issues with the computer than you can currently detect. What is the best way to test this malware?
Leave the malware on that workstation until it is tested.
Place the malware in a sandbox environment for testing.
It is not important to test it; just remove it from the machine.
Place the malware in a sandbox environment for testing.
The correct answer is to use a sandboxed environment to test the malware and determine its complete functionality. A sandboxed system could be an isolated virtual machine or an actual physical machine that is entirely isolated from the network
Web developers in your company currently have direct access to the production server and can deploy code directly to it. This can lead to unsecure code, or simply code flaws being deployed to the live system. What would be the best change you could make to mitigate this risk?
Implement sandboxing.
Implement virtualized servers.
Implement a staging server.
Implement a staging server.
You should implement a staging server so that code can be deployed to an intermediate staging environment. This will allow testing of security features, as well as checking to see that the code integrates with the entire system. Using third-party libraries and SDKs can help reduce errors and vulnerabilities in the code
Denish is concerned about the security of embedded devices in his company. He is most concerned about the operating system security for such devices. Which of the following would be the best option for mitigating this threat?
RTOS
SCADA
FDE
RTOS
A real-time operating system is a secure system used for embedded devices. RTOSs were originally developed for military applications but were not available to the public
Which of the following 802.11 standards is supported in WPA2, but not in WEP or WPA?
- 11a
- 11b
- 11i
802.11i
The WPA2 standard fully implements the 802.11i security standard
Teresa is responsible for WiFi security in her company. Which wireless security protocol uses TKIP?
WPA
CCMP
WEP
WPA
The encryption technology associated with WPA is TKIP
Juan is responsible for wireless security in his company. He has decided to disable the SSID broadcast on the single AP the company uses. What will the effect be on client machines?
They will no longer be able to use wireless networking.
They will no longer see the SSID as a preferred network when they are connected.
They will no longer see the SSID as an available network.
They will no longer see the SSID as an available network.
Disabling the SSID broadcast keeps it from being seen in the list of available networks, but it is still possible to connect to it and use the wireless network
Which cloud service model provides the consumer with the infrastructure to create applications and host them?
SaaS
PaaS
IaaS
PaaS
In the Platform as a Service (PaaS) model, the consumer has access to the infrastructure to create applications and host them
Which cloud service model gives the consumer the ability to use applications provided by the cloud provider over the Internet?
SaaS
PaaS
IaaS
SaaS
With the Software as a Service (SaaS) model, the consumer has the ability to use applications provided by the cloud provider over the Internet. SaaS is a subscription service where software is licensed on a subscription basis
Which feature of cloud computing involves dynamically provisioning (or deprovisioning) resources as needed?
Multitenancy
Elasticity
CMDB
Elasticity
Elasticity is a feature of cloud computing that involves dynamically provisioning (or deprovisioning) resources as needed