Chapter 4 (SYbex) Flashcards
Your senior management wants to measure how risky an activity will be. This metric is used to provide a signal of increasing risk exposure. You need to identify which of the following?
A. Key Risk Indicators (KRIs)
B. Key Performance Indicators
C. Total Cost of Ownership
D. Risk Assessment
A. Key Risk Indicators (KRIs)
Explanation:
KRI identification measures how risky an activity can be. TO identify a KRI, you need to identify existing metrics, assess gaps, establish a control environment and track changes in the risk profile
With traditional network architecture, one best practice is to limit network access points. This limitation allowed for a concentration of network security resources and a protected attack surface. With the introduction of 802.11x into enterprise network architecture, what was introduced into the network?
A. Increased capability and increased risk and higher TCO
B. Decreased capability and increased risk and higher TCO
C. Increased capability and decreased risk and lower TCO
D. Decreased capability and decreased risk and lower TCO
A. Increased capability and increased risk and higher TCO
Explanation:
With the evolution of adding wireless access (802.11x) to any network, you have increased capability due to its ease of use and movement. You also have an increased risk due to your data traveling over the airwaves, a higher total cost of ownership due to more security, increased head count and more assets being purchased and maintained on the network
One of the requirements for a new device you’re adding to the network is an availability of 99.8 percent. According to the vendor, the newly acquired device has been rated with an MTBF of 20,000 hours and an MTTR of 3 hours. What is the most accurate statement?
A. The device will meet availability because it will be at 99.985 percent
B. The device will not meet availability because it will be at 99.85 percent
D. The device will meet availability because it will be at 99.958 percent
A. The device will meet availability because it will be at 99.985 percent
Explanation:
Mean time between failures = Total up time/Number of breakdowns
Mean time to repair = Total downtime/number of breakdowns
Availability od device = MTBF / MTBF + MTTR
You need to calculate the annual loss expectancy (ALE) for an important server on your network. Which of these is the proper formula?
A. ARO X EF X AV
B. ARO X AV
C. EF X SLE
D. EF X SLE X AV
A. ARO X EF X AV
Explanation: The asset can be hardware, software or people. The value of the asset (AV) is assessed first. The Single Loss Expectancy contains information about the potential loss when a threat occurs. It is calculated as follows: SLE = AV x EF, where EF is exposure factor. Exposure factor describes the loss that will happen to the asset as a result of the threat which will be a percentage
Your company began the process of evaluating different technologies for a technical security focused project. You narrowed down the selection to three organizations from which you received formal requests for information (RFIs)
What is the next request that you will make of those three vendors if you want to discover the total value required for purchase with items and deliverables?
A. RFQ
B. RFP
C. RFC
D. RFI
A. RFQ
Explanation:
After you receive the RFI, you can then request a quote (RFQ) so that you know approximately how much the service/asset will cost. After you decided on a vendor, you can formally ask them for a request for proposal (RFP) which should supply a firm cost, an SLA and other requirements
Edgar has been tasked with reviewing existing technology security policies. Which of these should not be covered in his security policy?
A. Details and procedures
B. Exceptions to the policy
C. Password policy
D. Scope
B. Exceptions to the policy
Explanation:
A procedure consists of step by step instructions. it defines the technical aspects of your program, in addition to any hardware or software that is required. A baseline is a fixed point of reference so that you can make comparisons. Scope is the requirements and objectives of a project
If you wanted to require that employees follow certain steps to avoid malware, you would create a procedure. If you wanted to require employees to use specific software to avoid malware, which of the following would you create?
A. Policy
B. Standard
C. Baseline
D. Scope
B. Standard
Explanation:
A procedure consists of step by step instructions. It defines the technical aspects of your program, in addition to any hardware or software that is required. A baseline is a fixed point of reference so that you can make comparisons. Scope is the requirements and objectives of a project
What is the customary practice2 of responsible of an asset that affects an organization or community?
A. Due diligence
B. Risk mitigation
C. Insurance
D. Due care
D. Due care
Explanation:
Due diligence is verifying that those responsible are doing the right thing. Due care is acting responsible. It is creating policies, procedures and guidelines to protect information or assets in a way that is reasonable.
Your department started to plan for next year. You need to clarify what your key performance indicators are for the current year. Which of the following is not found in a KPI?
A. Measurement
B. Target
C. Risk register
D. Data source
C. Risk register
Explanation:
Every KPI has a measure, a target that matches your measure, and a time period, as well as a clearly defined data source so that you know how each is being measured and tracked. Examples of KPI are growth in revenue, percentage of market share, and time to market. A risk register is a document used as a risk management tool to fulfill regulatory compliance. It can act as a repo for all risks identified and includes additional information like the nature of the risk and mitigation measures.
Your company purchased new computers and wants consistent reliability and performance out of them. You recommend that an operating system and software application configuration be installed on these systems prior to the addition programs. What is this process called?
A. Base configuration
B. Production operating environment
C. Standard operating environment
D. Standard configuration
D. Standard configuration
Explanation:
A standard operating environment (SOE) is a standardized base configuration of systems that normally consists of a basic operating system and software application installation. The SOE is installed on the computers, and additional features are added
You live and work in an area with many hurricanes. What best describes the consequence of a disruption due to this natural disaster?
A. Business impact analysis
B. Risk assessment
C. Tabletop exercise
D. Mitigating control analysis
A. Business impact analysis
Explanation:
A hurricane is a natural disaster that should be accounted for in a business impact analysis document (BIA) document. The risk appetite or risk tolerance of an organization should be considered in a BIA. A BIA should provide a plan for resuming operations after a disaster and identify which events could impact the organizations operations
Your organization has a new policy to implement security based on least privilege and separation of duties. A key component is deciding on data access. They decided it is best made by which of the following roles?
A. Data steward
B. Data owner
C. User/manager
D. Senior management
B. Data owner
Explanation:
The data owner has administrative control over the data and is accountable for who has access. A data custodian has technical control of that data
You are leading a project for your organization moving to a thin client with the server architecture hosted in the cloud. You are meeting with upper management, and they have asked for your advice of using thin clients. Which of the following is a security advantage?
A. Thin clients are economical and require less security. There is no storage, and the server is protected in the cloud.
B. Thin clients are encrypted with AES, both at rest and in transit.
C. Attackers will have less opportunity to extract data from thin clients
D. Thin clients do not require external security auditing.
A. Thin clients are economical and require less security. There is no storage, and the server is protected in the cloud.
Explanation:
A thin client is economical because you do not have to purchase a lot of processing power; in addition IT support costs are negligible because there is no PC to support. There is no storage, and the server is protected through cloud management features and settings
You need an agreement that lets your business implement a comprehensive risk allocation strategy and provides indemnification, the methods that holds one party harmless against existing or future losses. What contract should you negotiate?
A. Master service agreement
B. Business impact agreement
C. Interconnection security agreement
D. Memorandum of understanding
A. Master service agreement
Explanation:
A master service agreement (MSA) provides a strong foundation for future business. It typically specifies payment terms, warranties, geographic location and intellectual property ownership
As a security engineer, you were asked to recommend a disk encryption technology that your end users can use to secure an entire disk or partition. All the end users have Microsoft Windows 10 systems. Which of the following is the best option available?
A. EFS
B. FAT32
C. NTFS
D.BitLocker
D.BitLocker
Explanation:
BitLocker is a Microsoft file encryption technology that enables a user to encrypt an entire disk and/or partitions