Business Continuity & Security Flashcards
You need to ensure that sensitive data on stolen disks from a data centre cannot be accessed by unauthorized parties. What should you do?
- Enable disk wiping
- Enable disk integrity
- Enable disk encryption
- Enable disk backups
Enable disk encryption
Which IT security role is roughly equivalent to the data owner role?
- CISO
- Privacy officer
- Security engineer
- CEO
Privacy officer
Company A is acquiring Company B. What is the most important task that must be undertaken by Company A’s IT department?
- Determine existing Company B contractual obligations
- Receive clear communication of Company B’s security policies
- Determine the version of firewall firmware used in Company B
- Receive the most recent quarterly earnings report
Receive clear communication of Company B’s security policies
Which Microsoft Azure configuration determines how admins receive alert notifications?
- Alert configuration
- Action group
- Monitor configuration
- Virtual machine
Action group
What do IT security baselines facilitate?
- The merger of two companies
- Detection of security anomalies
- The reduction of security-related costs
- The performance improvement of slow applications
Detection of security anomalies
You are deploying a new antimalware program to user smartphones. Which type of security control is this?
- Detective
- Preventative
- Administrative
- Compensating
Preventative
Detective
What is a common primary use of a Windows Data Collector Set (DCS)?
- Apply patches
- Quarantine malware infections
- Detect security anomalies
- Establish a host performance baseline
Establish a host performance baseline
A business manager determines that smart card authentication is required before allowing VPN access to a sensitive network where patient data is retained. The occupant of which role makes this decision?
- Cloud technician
- Security engineer
- Data custodian
- Data owner
Data owner
You need to ensure that backups of mission-critical data are taken every hour to ensure no more than 1 hours’ worth of potential data loss. To which disaster recovery item does this apply?
- RPO
- BIA
- MTTR
- RTO
RPO
What do IT security baselines facilitate?
- The merger of two companies
- Detection of security anomalies
- The reduction of security-related costs
- The performance improvement of slow applications
Detection of security anomalies
You need to ensure that a mission-critical server supporting customer orders is down for no longer than 20 minutes. To which disaster recovery item does this apply?
- MTTR
- BIA
- RTO
- RPO
RTO
Company A is acquiring Company B. What is the most important task that must be undertaken by Company A’s IT department?
- Determine existing Company B contractual obligations
- Receive clear communication of Company B’s security policies
- Determine the version of firewall firmware used in Company B
- Receive the most recent quarterly earnings report
Receive clear communication of Company B’s securit policies