Chapter 2 - Intro To Security Terminology Flashcards

1
Q

As requested by your manager, you purchase two servers to participate in a server cluster so that if one server fails, the other server will take over the workload. Which of the following goals security has been met?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have protected the contents of a highly sensitive file by encrypting the data. Which of the following goals of security has been satisfied?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have managed the file permissions on a file so that unauthorized persons cannot make modifications to the file. What goal of security has been met?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have configured your network so that each person on the network must provide a username and password to gain access. Presenting a username is an example of ____________

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have configured the permissions on the accounting folder so that the accounting group can create, modify, and delete content in the folder; the Managers group can read the contents of the folder; and all other users are denied access. This is an example of which of the following?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are considered biometrics?(Choose 2)

A. Username and Password
B. Smart card
C. PIN number
D. Fingerprint
E. Retina scan
A

D. Fingerprint

E. Retina scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Before an individual is authorized to access resources on the network, they are first ______________ with the network.

A

Authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have taken the time to create and implement security policies within your organization. This is an example of what?

A

Due care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All accountants need to be able to modify the accounting data except for Bob. Due to Bob’s job requirements, you have ensured that Bon receives only the read permission to the accounting data. This is an example of what?

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following represents the reasoning for implementing rotation of duties in your environment?

A. To limit fraudulent activities within the organization

B. To keep data private to the appropriate individuals

C. To make information available

D. To ensure the secrecy of the information

A

A. To limit fraudulent activities within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Within most organizations, the person who writes the check is not the person who signs the check. What is this an example of?

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

After creating and implementing the company security policy, you verify that policies are being followed on a regular basis by performing regular audits. What is this an example of?

A

Due diligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of hacker learns hacking techniques so that they can better defend against a malicious hacker?

A

White-hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following vulnerability types directly relate to the programmer of the software?

A. Improper input handling
B. Misconfiguration/weak configuration
C. Improper error handling
D. Race condition
E. Improperly configured account
A

A. Improper input handling

C. Improper error handling

D. Race condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The entity that is responsible for deciding the level of protection that is placed on data and that is ultimately responsible for the security of that data is which of the following?

A. Custodian
B. Owner
C. User
D. Administrator

A

B. Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The entity that is responsible for implementing the appropriate security controls to protect an asset is which of the following?

A. Custodian
B. Owner
C. User
D. Administrator

A

A. Custodian