Chapter 15 Flashcards

1
Q

Which of the following threats would be classified as the actions of a hactivist

A

External threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these is NOT a response to risk?

Mitigation

Transference

Resistance

Avoidance

A

Resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Agnella was asked to create a report that listed the reasons why a contractor should be provided penetration testing authorization. Which of the follow would she NOT list in her report?
Legal authorization

Indemnification

Limit retaliation

Access to resources

A

Access to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following risk control types would use video surveillance systems and barricades to limit access to secure sites?

Operational

Managerial

Technical

Strategic

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following approaches to risk calculation typically assigns a numeric value (1–10) or label (High, Medium, or Low) represents a risk?

Quantitative risk calculation

Qualitative risk calculation

Rule-based risk calculation

Policy-based risk calculation

A

Qualitative risk calculation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is the average amount of time that it will take a device to recover from a failure that is not a terminal failure?

MTTF

MTTR

FIT

MTBF

A

MTTR (mean time to recover)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following covers the procedures of managing object authorizations?

Asset management

Task management

Privilege management

Threat management

A

Privilege management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which statement does NOT describe a characteristic of a policy?

Policies define appropriate user behavior.

Policies identify what tools and procedures are needed.

Policies communicate a unanimous agreement of judgment.

Policies may be helpful if it is necessary to prosecute violators.

A

Policies communicate a unanimous agreement of judgment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tomassa is asked to determine the expected monetary loss every time a risk occurs. Which formula will she use?

AV

ARO

ALE

SLE

A

SLE (single loss expectancy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Simona needs to research a control that attempts to discourage security violations before they occur. Which control will she research?

Deterrent control

Preventive control

Detective control

Corrective control

A

Deterrent control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement is NOT something that a security policy must do?

State reasons why the policy is necessary.

Balance protection with productivity.

Be capable of being implemented and enforced.

Be concise and easy to understand.

A

State reasons why the policy is necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a collection of suggestions that should be implemented?
Policy

Guideline

Standard

Code

A

Guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What describes the ability of an enterprise data center to revert to its former size after expanding?

Scalability

Elasticity

Contraction

Reduction

A

Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which policy defines the actions users may perform while accessing systems and networking equipment?

End-user policy

Acceptable use policy

Internet use policy

User permission policy

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

While traveling abroad, Giuseppe needs to use public Internet café computers to access the secure network. Which of the following non-persistence tools should he use?

Snapshot

Live boot media

Revert to known state

Secure Configuration

A

Live boot media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bria is reviewing the company’s updated personal email policy. Which of the following will she NOT find in it?

Employees should not use company email to send personal email messages.

Employees should not access personal email at work.

Employees should not forward company emails to a personal email account.

Employees should not give out their company email address unless requested.

A

Employees should not give out their company email address unless requested.

17
Q

For adult learners, which approach is often preferred?

Pedagogical

Andragogical

Institutional

Proactive

A

Andragogical

18
Q

Which of the following is NOT a security risk of social media sites for users?

Personal data can be used maliciously.

Users may be too trusting.

Social media security is lax or confusing.

Social media sites use popup ads.

A

Social media sites use popup ads.

19
Q

Which of the following is NOT a time employee training should be conducted?

After monthly patch updates.

When a new computer is installed.

During an annual department retreat.

When an employee is promoted.

A

Patch updates

20
Q

Bob needs to create an agreement between his company and a third-party organization that demonstrates a “convergence of will” between the parties so that they can work together. Which type of agreement will Bob use?

SLA (Service level agreement)

BPA (blanket purchase agreement)

ISA (interconnection security agreement)

MOU (memorandum of understanding)

A

MOU (memorandum of understanding)