CH.1 MASTERING SECURITY BASICS Flashcards
Which of the following controls BEST describes an administrative approach that involves assessing the ability to reduce risk and documenting policies?
a) Technical
b) Managerial
c) Operational
d) Physical
Answer: b) Managerial
Explanation: Managerial controls are administrative in nature, focusing on policies and assessments to manage risk. The correct answer is managerial, as this type of control includes things like risk assessments and policies, which are clearly administrative functions documented in an organization’s written policies.
A company installs video cameras throughout their office building. The main purpose of the cameras is to provide footage in case of unauthorized access. Which control type does this BEST describe?
a) Preventive
b) Detective
c) Compensating
d) Directive
Answer: b) Detective
Explanation: Video surveillance is primarily a detective control because it records events after they occur, allowing incidents to be identified after the fact. It does not prevent the incident but helps detect it.
What principle of the CIA Triad ensures that data remains accurate and unaltered?
a) Confidentiality
b) Integrity
c) Availability
d) Scalability
Answer: b) Integrity
Explanation: Integrity refers to maintaining the accuracy and consistency of data over its lifecycle, ensuring it is not altered through unauthorized actions or errors. This is distinct from confidentiality, which prevents unauthorized access, and availability, which ensures access to resources when needed.
John needs to access a secured database. He is required to prove his identity using his password and then gain access to only the specific files he needs. Which access control principles are being used here?
a) Identification and Authorization
b) Authentication and Least Privilege
c) Authorization and Integrity
d) Confidentiality and Availability
**Answer: **
b) Authentication: John must prove his identity using a password. This is the process of verifying that he is who he claims to be.
Least Privilege: John gains access only to the specific files he needs, which means he’s only given the minimum access required for his role. This principle minimizes the risk by restricting access to only the resources necessary for the task.
a) Identification is the process of claiming an identity, such as entering a username.
Authorization determines what resources a user can access after they are authenticated.
In this scenario, John uses a password, which is part of the authentication process, not just identification. The access to specific files relates to least privilege, not authorization alone, which makes this answer incorrect.
c) Authorization is the process of granting or denying specific permissions to access resources after the user is authenticated.
Integrity ensures that data has not been altered or tampered with.
d) Confidentiality ensures that sensitive information is accessible only to authorized individuals.
Availability means that resources are available when needed.
Which of the following methods enhances system availability by automatically adding resources during high demand periods?
a) Fault Tolerance
b) Vertical Scaling
c) Scalability
d) Elasticity
Answer: d) Elasticity
Explanation: Elasticity refers to the dynamic adjustment of resources, adding or removing resources as required during changes in demand. Scalability, while related, involves manually adding resources, whereas elasticity automates this process.
A security team identifies a potential threat involving employees mistakenly opening phishing emails. They decide to provide specialized training to help employees recognize these emails. Which type of control is this?
a) Preventive
b) Detective
c) Corrective
d) Compensating
Answer: a) Preventive
Explanation: Training is a preventive control aimed at stopping incidents (such as falling for phishing emails) before they occur. It helps reduce the risk of a successful phishing attack by increasing awareness among employees.
Which of the following controls aims to detect an incident after it has occurred by analyzing recorded data?
a) Preventive Control
b) Corrective Control
c) Detective Control
d) Deterrent Control
Answer: c) Detective Control
Explanation: Detective controls are used to identify incidents after they have occurred. Log monitoring falls under this category as it involves reviewing logs for signs of suspicious activities to determine if a security incident has taken place.
A new employee hasn’t received their smart card yet for authentication. As a temporary measure, the company decides to use Time-based One-Time Password (TOTP) for this employee. What type of control is this?
a) Corrective
b) Compensating
c) Preventive
d) Directive
Answer: b) Compensating
Explanation: A compensating control is used when the primary control is not feasible. In this case, TOTP is a compensating control, serving as an alternative while the employee waits for their smart card.
An organization implements SIEM tools to collect and analyze security alerts in real-time across its network. Which control type does this implementation primarily represent?
a) Technical Control
b) Physical Control
c) Operational Control
d) Directive Control
Answer: a) Technical Control
Explanation: SIEM (Security Information and Event Management) tools are technical controls that use technology to monitor network activity and manage security threats. This type of control is implemented automatically by systems rather than manually by individuals.
Which of the following describes a weakness that can be exploited by a threat to result in a security incident?
a) Threat
b) Vulnerability
c) Control
d) Exploit
Answer: b) Vulnerability
Explanation: A vulnerability is a weakness in hardware, software, or configuration that can be exploited by a threat. Understanding vulnerabilities is key to assessing risk and implementing effective security controls to mitigate them.
Which of the following BEST describes a physical control that also serves as a preventive measure?
a) Risk Assessment
b) Locked Door
c) Encryption
d) SIEM Dashboard
Answer: b) Locked Door
Explanation: A locked door is a physical control that serves as a preventive measure by restricting unauthorized physical access to an area. It prevents unauthorized personnel from entering a secure location.
Which of the following is an example of a technical control that helps to maintain the confidentiality of data?
a) Least Privilege
b) Awareness Training
c) Access Control Vestibule
d) Security Policy
Answer: a) Least Privilege
Explanation: Least privilege is a technical control that ensures users have only the permissions they need to perform their job. It helps maintain data confidentiality by reducing unnecessary access.
b) Awareness Training is an operational control that reduces human errors by training personnel.
c) Access Control Vestibule is a physical control that prevents unauthorized access.
d) Security Policy is a managerial control that defines an organization’s security strategy.
Your organization has recently hardened a critical server by disabling unnecessary services and applying strict security configurations. Which type of control BEST describes this action?
A. Detective
B. Compensating
C. Preventative
D. Directive
Answer: c) Preventive
Explanation: Hardening is a preventive control that reduces the likelihood of successful attacks by configuring systems securely.
a) Detective controls identify incidents after they occur, such as logging and monitoring.
b) Compensating controls are alternative measures when the primary control is not feasible.
d) Directive controls provide instructions, such as policies and procedures.
A security administrator is analyzing potential risks and determining the likelihood of them occurring in order to decide on appropriate security measures. What type of control is this?
a) Operational
b) Managerial
c) Physical
d) Technical
Answer: b) Managerial
Explanation: Managerial controls include risk assessments that help an organization understand and mitigate risks.
a) Operational controls focus on the day-to-day operations, such as user training and configuration management.
c) Physical controls prevent physical access to systems, such as fences and locks.
d) Technical controls use technology, like firewalls or antivirus software.
Which of the following BEST ensures data is available during high demand periods?
a) Encryption
b) Hashing
c) Vertical Scaling
d) Patching
Answer: c) Vertical Scaling
Explanation: Vertical scaling increases the capacity of a system by adding more resources, such as memory or processing power, which helps ensure availability.
a) Encryption protects confidentiality, not availability.
b) Hashing ensures data integrity, confirming that it hasn’t been altered.
d) Patching helps ensure availability but mainly addresses vulnerabilities rather than capacity.
Which data source BEST helps in understanding the sequence of events leading up to a security incident?
a) Packet Capture
b) Firewall Log
c) SIEM System
d) Operating System Log
Answer: c) SIEM System
Explanation: SIEM systems collect logs from multiple sources and provide a correlated analysis, making it easier to understand sequences of events.
a) Packet Capture helps analyze network traffic but lacks the full context across multiple devices.
b) Firewall Log only records network traffic filtered by the firewall.
d) Operating System Log provides system-specific information, not an overall view.
Which of the following is a physical control that also serves as a deterrent?
a) CCTV Cameras
b) Encryption
c) Network Firewall
d) Risk Assessment
Answer: a) CCTV Cameras
Explanation: CCTV cameras are a physical control that also acts as a deterrent by making potential attackers aware that their actions are being recorded.
b) Encryption is a technical control ensuring confidentiality.
c) Network Firewall is a technical control that filters network traffic.
d) Risk Assessment is a managerial control that helps analyze risk.
An organization adds a load balancer to its network to distribute traffic across multiple servers. Which principle is the organization trying to achieve?
a) Confidentiality
b) Integrity
c) Availability
d) Elasticity
Answer: c) Availability
Explanation: Adding a load balancer enhances availability by ensuring services remain operational even during high demand or server failure.
a) Confidentiality relates to preventing unauthorized data access.
b) Integrity ensures data isn’t modified.
d) Elasticity involves adding or removing resources automatically
Which of the following BEST describes a control that provides instructions on handling security incidents?
a) Compensating
b) Directive
c) Corrective
d) Detective
Answer: b) Directive
Explanation: Directive controls provide instructions, such as policies or guidelines, on how to handle security situations.
a) Compensating controls are alternatives when primary controls aren’t feasible.
c) Corrective controls help restore systems after incidents occur.
d) Detective controls identify incidents after they happen.
A server administrator uses a hashing algorithm to confirm that a file sent from one system to another has not been modified. What security principle is being addressed?
a) Confidentiality
b) Integrity
c) Availability
d) Authentication
Answer: b) Integrity
Explanation: Hashing helps ensure data integrity by verifying that the content has not changed during transmission.
a) Confidentiality protects data from unauthorized access.
c) Availability ensures systems are operational.
d) Authentication proves the identity of a user or device.
Which of the following is an example of a technical preventive control?
a) Hardening Systems
b) Awareness Training
c) Incident Handling Procedures
d) Bollards
Answer: a) Hardening Systems
Explanation: Hardening systems is a preventive technical control that involves securing systems against potential threats.
b) Awareness Training is an operational control aimed at reducing human error.
c) Incident Handling Procedures are corrective controls, as they deal with incidents after they happen.
d) Bollards are physical preventive controls that protect physical locations.
A company uses a Time-based One-Time Password (TOTP) because smart cards are not immediately available for new employees. What type of control is TOTP in this context?
a) Preventive
b) Corrective
c) Compensating
d) Detective
Answer: c) Compensating
Explanation: TOTP is a compensating control, providing authentication until smart cards become available.
a) Preventive controls are meant to prevent incidents initially.
b) Corrective controls mitigate damage after an incident.
d) Detective controls identify incidents.
Which of the following is NOT a component of a SIEM system?
a) Log Aggregation
b) Correlation Engine
c) Packet Captures
d) Automated Triggers
Answer: c) Packet Captures
Explanation: SIEM systems do not perform packet captures; they aggregate and analyze log data from different sources.
a) Log Aggregation is a key SIEM capability, combining data from multiple logs.
b) Correlation Engine analyzes the data for patterns.
d) Automated Triggers help in taking action based on the findings.
Your organization wants to prevent unauthorized access to sensitive areas of the building using automated technology. Which of the following controls should be implemented?
a) Managerial
b) Technical
c) Physical
d) Operational
c) Physical
Explanation: Physical controls include automated security measures such as biometric scanners or locks.
a) Managerial: Focuses on administrative functions like policies.
b) Technical: Uses technology like firewalls and encryption.
d) Operational: Focuses on processes and activities like training.
Which process is designed to evaluate an organization’s systems and identify weaknesses that could potentially be exploited by threats?
a) Preventive
b) Detective
c) Vulnerability Assessment
d) Risk Assessment
c) Vulnerability Assessment
Explanation: Vulnerability assessments identify weaknesses that can be mitigated to reduce risk.
a) Preventive: Tries to stop incidents before they occur.
b) Detective: Identifies incidents after they happen.
d) Risk Assessment: Evaluates risks and their potential impacts.
An organization needs to ensure that if one server fails, the service will continue without interruption. Which of the following concepts BEST addresses this need?
a) Fault Tolerance
b) Scalability
c) Integrity
d) Confidentiality
a) Fault Tolerance
Explanation: Fault tolerance allows a system to continue operating in the event of a component failure.
b) Scalability: Involves increasing resources to handle growth.
c) Integrity: Protects data from unauthorized changes.
d) Confidentiality: Protects data from unauthorized access.
During a forensic investigation, you want to verify that the files on a computer have not been altered since the last review. Which of the following would you use?
a) Encryption
b) Hashing
c) SIEM Analysis
d) Availability Testing
b) Hashing
Explanation: Hashing ensures data integrity by verifying that the content hasn’t been altered.
a) Encryption: Protects data confidentiality.
c) SIEM Analysis: Collects and analyzes security-related data.
d) Availability Testing: Ensures systems are operational.
Which control type BEST describes using security guards to verify identity before granting access to a building?
a) Physical Preventive
b) Operational Compensating
c) Detective Directive
d) Managerial Preventive
a) Physical Preventive
Explanation: Security guards are a physical preventive control, as they prevent unauthorized physical access.
b) Operational Compensating: Compensating controls are alternatives to primary controls.
c) Detective Directive: Detective identifies incidents after occurrence.
d) Managerial Preventive: Involves administrative functions.
What is the main difference between vertical scaling and elasticity?
a) Vertical scaling uses cloud resources; elasticity doesn’t.
b) Vertical scaling is manual, while elasticity is automatic.
c) Vertical scaling provides redundancy; elasticity does not.
d) Vertical scaling is related to bandwidth; elasticity is for storage.
b) Vertical scaling is manual, while elasticity is automatic.
Explanation: Vertical scaling involves manually adding resources, while elasticity automates this process based on demand.
a) Both scaling and elasticity can use cloud resources.
c) Redundancy is related to availability, not scaling type.
d) Both bandwidth and storage can benefit from either approach.
Which control type is MOST appropriate when an organization needs an alternative measure due to the unavailability of a primary control?
a) Corrective
b) Compensating
c) Directive
d) Preventive
b) Compensating
Explanation: Compensating controls provide alternative measures when the primary control is not feasible.
a) Corrective: Deals with incidents after occurrence.
c) Directive: Provides guidance on responding to security events.
d) Preventive: Prevents incidents before they happen.
An administrator sets up monitoring on all systems and configures it to alert security personnel when anomalies occur. What type of control is this?
a) Preventive
b) Compensating
c) Detective
d) Directive
c) Detective
Explanation: Monitoring and alerting are detective controls aimed at identifying incidents.
a) Preventive: Stops incidents from occurring.
b) Compensating: Provides alternative measures.
d) Directive: Provides guidance on handling situations.
What is the BEST way to maintain confidentiality during data transmission across a public network?
a) Hashing
b) Encryption
c) Redundancy
d) Monitoring
b) Encryption
Explanation: Encryption ensures confidentiality by scrambling data, making it unreadable to unauthorized users.
a) Hashing: Ensures integrity, not confidentiality.
c) Redundancy: Improves availability.
d) Monitoring: Detects incidents, not confidentiality.
Which of the following controls would MOST effectively reduce the risk of phishing attacks?
a) Encryption
b) Awareness Training
c) SIEM Tools
d) Physical Security Guards
b) Awareness Training
Explanation: Training is an operational control that helps reduce phishing risks by educating users.
a) Encryption: Protects confidentiality.
c) SIEM Tools: Aggregate and analyze log data.
d) Physical Security Guards: Control physical access.
What security concept refers to ensuring that data and systems are accessible by authorized users whenever needed?
a) Confidentiality
b) Integrity
c) Availability
d) Authentication
c) Availability
Explanation: Availability ensures that data and systems are accessible when needed.
a) Confidentiality: Protects information from unauthorized access.
b) Integrity: Ensures data accuracy and consistency.
d) Authentication: Verifies user identities.