Cyber Security Flashcards
For which of the following assets is integrity probably the most important security aspect?
A. “One frame of a streaming video”
B. “The file that contains passwords used to authenticate users”
C. “The color scheme of a marketing website”
D. “Software that checks the spelling of product descriptions for a retail website”
“The file that contains passwords used to authenticate users” (B)
Glen is an ISC2 member. Glen receives an email from a company offering a set of answers for an ISC2 certification exam. What should Glen do?
A. “Nothing”
B. “Inform ISC2”
C. “Inform law enforcement”
D. “Inform Glen’s employer”
“Inform ISC2” (B)
In risk management concepts, a(n) ___________ is something or someone that poses risk to an organization or asset.
A. “Fear”
B. “Threat”
C. “Control”
D. “Asset”
“Threat” (B)
Steve is a security practitioner assigned to come up with a protective measure for ensuring cars don’t collide with pedestrians. What is probably the most effective type of control for this task?
A. “Administrative”
B. “Technical”
C. “Physical”
D. “Nuanced”
“Physical” ゥ
The city of Grampon wants to know where all its public vehicles (garbage trucks, police cars, etc.) are at all times, so the city has GPS transmitters installed in all the vehicles. What kind of control is this?
A. “Administrative”
B. “Entrenched”
C. “Physical”
D. “Technical”
“Technical” (D)
Zarma is an ISC2 member and a security analyst for Triffid Corporation. One of Zarma’s colleagues is interested in getting an ISC2 certification and asks Zarma what the test questions are like. What should Zarma do?
A. “Inform ISC2”
B. “Explain the style and format of the questions, but no detail”
C. “Inform the colleague’s supervisor”
D. “Nothing”
“Explain the style and format of the questions, but no detail” (B)
Which of the following probably poses the most risk?
A. “A high-likelihood, high-impact event”
B. “A high-likelihood, low-impact event”
C. “A low-likelihood, high-impact event”
D. “A low-likelihood, low-impact event”
“A high-likelihood, high-impact event” (A)
Tina is an ISC2 member and is invited to join an online group of IT security enthusiasts. After attending a few online sessions, Tina learns that some participants in the group are sharing malware with each other, in order to use it against other organizations online. What should Tina do?
A. “Nothing”
B. “Stop participating in the group”
C. “Report the group to law enforcement”
D. “Report the group to ISC2”
“Stop participating in the group” (B)
ISC2 publishes a Common Body of Knowledge (CBK) that IT security practitioners should be familiar with; this is recognized throughout the industry as a set of material that is useful for practitioners to refer to. Certifications can be issued for demonstrating expertise in this Common Body of Knowledge. What kind of document is the Common Body of Knowledge?
A. “Policy”
B. “Procedure”
C. “Standard”
D. “Law”
“Standard” (C)
Siobhan is an ISC2 member who works for Triffid Corporation. Yesterday, Siobhan got a parking ticket while shopping after work. What should Siobhan do?
A. “Inform ISC2”
B. “Pay the parking ticket”
C. “Inform supervisors at Triffid”
D. “Resign employment from Triffid”
“Pay the parking ticket” (B)
Kerpak works in the security office of a medium-sized entertainment company. Kerpak is asked to assess a particular risk, and he suggests that the best way to counter this risk would be to purchase and implement a particular security solution. This is an example of _______.
A. “Acceptance”
B. “Avoidance”
C. “Mitigation”
D. “Transference”
“Mitigation” (C)
The city of Grampon wants to ensure that all of its citizens are protected from malware, so the city council creates a rule that anyone caught creating and launching malware within the city limits will receive a fine and go to jail. What kind of rule is this?
A. “Policy”
B. “Procedure”
C. “Standard”
D. “Law”
“Law” (D)
A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing _________.
A. “Non-repudiation”
B. “Multifactor authentication”
C. “Biometrics”
D. “Privacy”
“Non-repudiation” (A)
Aphrodite is a member of ISC2 and a data analyst for Triffid Corporation. While Aphrodite is reviewing user log data, Aphrodite discovers that another Triffid employee is violating the acceptable use policy and watching streaming videos during work hours. What should Aphrodite do?
A. “Inform ISC2”
B. “Inform law enforcement”
C. “Inform Triffid management”
D. “Nothing”
“Inform Triffid management” (C)
Druna is a security practitioner tasked with ensuring that laptops are not stolen from the organization’s offices. Which sort of security control would probably be best for this purpose?
A. “Technical”
B. “Obverse”
C. “Physical”
D. “Administrative”
“Physical” (C)
Olaf is a member of ISC2 and a security analyst for Triffid Corporation. During an audit, Olaf is asked whether Triffid is currently following a particular security practice. Olaf knows that Triffid is not adhering to that standard in that particular situation, but that saying this to the auditors will reflect poorly on Triffid. What should Olaf do?
A. “Tell the auditors the truth”
B. “Ask supervisors for guidance”
C. “Ask ISC2 for guidance”
D. “Lie to the auditors”
“Tell the auditors the truth” (A)
A bollard is a post set securely in the ground to prevent a vehicle from entering an area or driving past a certain point. Bollards are an example of ______ controls.
A. “Physical”
B. “Administrative”
C. “Drastic”
D. “Technical”
“Physical” (A)
Within the organization, who can identify risk?
A. “The security manager”
B. “Any security team member”
C. “Senior management”
D. “Anyone”
“Anyone” (D)
The Payment Card Industry (PCI) Council is a committee made up of representatives from major credit card providers (Visa, Mastercard, American Express) in the United States. The PCI Council issues rules that merchants must follow if the merchants choose to accept payment via credit card. These rules describe best practices for securing credit card processing technology, activities for securing credit card information, and how to protect customers’ personal data. This set of rules is a ____.
A. “Law”
B. “Policy”
C. “Standard”
D. “Procedure”
“Standard” ゥ
The Triffid Corporation publishes a strategic overview of the company’s intent to secure all the data the company possesses. This document is signed by Triffid senior management. What kind of document is this?
A. “Policy”
B. “Procedure”
C. “Standard”
D. “Law”
“Policy” (A)
What is the goal of Business Continuity efforts?
A. “Save money”
B. “Impress customers”
C. “Ensure all IT systems continue to operate”
D. “Keep critical business functions operational”
“Keep critical business functions operational” (D)
What is the overall objective of a disaster recovery (DR) effort?
A. “Save money”
B. “Return to normal, full operations”
C. “Preserve critical business functions during a disaster”
D. “Enhance public perception of the organization”
“Return to normal, full operations” (B)
What is the risk associated with delaying resumption of full normal operations after a disaster?
A. “People might be put in danger”
B. “The impact of running alternate operations for extended periods”
C. “A new disaster might emerge”
D. “Competition”
“The impact of running alternate operations for extended periods” (B)
What is the goal of an incident response effort?
A. “No incidents ever happen”
B. “Reduce the impact of incidents on operations”
C. “Punish wrongdoers”
D. “Save money”
“Reduce the impact of incidents on operations” (B)
When should a business continuity plan (BCP) be activated?
A. “As soon as possible”
B. “At the very beginning of a disaster”
C. “When senior management authorizes”
D. “When instructed to do so by regulators”
“When senior management authorizes” (C)
Which of the following are not typically involved in incident detection?
A. “Users”
B. “Security analysts”
C. “Automated tools”
D. “Regulators”
“Regulators” (D)
Suvid works at Triffid, Inc. When Suvid attempts to log in to the production environment, a message appears stating that Suvid has to reset the password. What may have occurred to cause this?
A. “Suvid broke the law”
B. “Suvid’s password has expired”
C. “Suvid made the manager angry”
D. “Someone hacked Suvid’s machine”
“Suvid’s password has expired” (B)
Which of the following would be considered a logical access control?
A. “An iris reader that allows an employee to enter a controlled area”
B. “A fingerprint reader that allows an employee to enter a controlled area”
C. “A fingerprint reader that allows an employee to access a laptop computer”
D. “A chain attached to a laptop computer that connects it to furniture so it cannot be taken”
“A fingerprint reader that allows an employee to access a laptop computer” ゥ
In this situation, what is the ACL?
A. “The subject”
B. “The object”
C. “The rule”
D. “The firmware”
“The rule” ゥ
Which of the following is probably most useful at the perimeter of a property?
A. “A safe”
B. “A fence”
C. “A data center”
D. “A centralized log storage facility”
“A fence” (B)
All visitors to a secure facility should be _______.
A. “Fingerprinted”
B. “Photographed”
C. “Escorted”
D. “Required to wear protective equipment
“Escorted” ゥ
Which of these is an example of a physical access control mechanism?
A. “Software-based firewall at the perimeter of the network”
B. “A lock on a door”
C. “Network switches that filter according to MAC addresses”
D. “A process that requires two people to act at the same time to perform a function”
“A lock on a door” (B)
Which of the following will have the most impact on determining the duration of log retention?
A. “Personal preference”
B. “Applicable laws”
C. “Industry standards”
D. “Type of storage media”
“Applicable laws” (B)
A human guard monitoring a hidden camera could be considered a ______ control.
A. “Detective”
B. “Preventive”
C. “Deterrent”
D. “Logical”
“Detective” (A)
Tekila works for a government agency. All data in the agency is assigned a particular sensitivity level, called a “classification.” Every person in the agency is assigned a “clearance” level, which determines the classification of data each person can access. What is the access control model being implemented in Tekila’s agency?
A. “MAC (mandatory access control)”
B. “DAC (discretionary access control)”
C. “RBAC (role-based access control)”
D. “FAC (formal access control)”
“MAC (mandatory access control)” (A)
Prachi works as a database administrator for Triffid, Inc. Prachi is allowed to add or delete users, but is not allowed to read or modify the data in the database itself. When Prachi logs onto the system, an access control list (ACL) checks to determine which permissions Prachi has. In this situation, what is the database?
A. “The subject”
B. “The object”
C. “The rule”
D. “The site”
“The object” (A)
Visitors to a secure facility need to be controlled. Controls useful for managing visitors include all of the following except:
A. “Sign-in sheet/tracking log”
B. “Fence”
C. “Badges that differ from employee badges”
D. “Receptionist”
“Fence” (B)
Which of the following is a biometric access control mechanism?
A. “A badge reader”
B. “A copper key”
C. “A fence with razor tape on it”
D. “A door locked by a voiceprint identifier”
“A door locked by a voiceprint identifier” (D)
Guillermo logs onto a system and opens a document file. In this example, Guillermo is:
A. “The subject”
B. “The object”
C. “The process”
D. “The software”
“The subject” (A)
Which of the following roles does not typically require privileged account access?
A. “Security administrator”
B. “Data entry professional”
C. “System administrator”
D. “Help Desk technician”
“Data entry professional” (B)
Gary is unable to log in to the production environment. Gary tries three times and is then locked out of trying again for one hour. Why?
A. “Gary is being punished”
B. “The network is tired”
C. “Users remember their credentials if they are given time to think about it”
D. “Gary’s actions look like an attack”
“Gary’s actions look like an attack” (D)
Prina is a database manager. Prina is allowed to add new users to the database, remove current users and create new usage functions for the users. Prina is not allowed to read the data in the fields of the database itself. This is an example of:
A. “Role-based access controls (RBAC)”
B. “Mandatory access controls (MAC)”
C. “Discretionary access controls (DAC)”
D. “Alleviating threat access controls (ATAC)”
“Role-based access controls (RBAC)” (A)
What is the common term for systems that ensure proper temperature and humidity in the data center?
A. “RBAC”
B. “HVAC”
C. “MAC”
“HVAC” (B) “heating, ventilation and air conditioning”
A tool that filters inbound traffic to reduce potential threats.
A. “NIDS (network-based intrusion-detection systems)”
B. “Anti-malware”
C. “DLP (data loss prevention)”
D. “Firewall”
“Firewall” (D)
Which of the following is one of the common ways potential attacks are often identified?
A. “The attackers contact the target prior to the attack, in order to threaten and frighten the target”
B. “Victims notice excessive heat coming from their systems”
C. “The power utility company warns customers that the grid will be down and the internet won’t be accessible”
D. “Users report unusual systems activity/response to Help Desk or the security office”
“Users report unusual systems activity/response to Help Desk or the security office” (D)
A device that is commonly useful to have on the perimeter between two networks.
A. “User laptop”
B. “IoT”
C. “Camera”
D. “Firewall”
“Firewall” (D)
An IoT (Internet of Things) device is typified by its effect on or use of the _____ environment.
A. “Philosophical”
B. “Remote”
C. “Internal”
D. “Physical”
“Physical” (D)
Which common cloud service model only offers the customer access to a given application?
A. “Lunch as a service (LaaS)”
B. “Infrastructure as a service (IaaS)”
C. “Platform as a service (PaaS)”
D. “Software as a service (SaaS)”
“Software as a service (SaaS)” (D)
Which of the following would be best placed in the DMZ of an IT environment?
A. “User’s workplace laptop”
B. “Mail server”
C. “Database engine”
D. “SIEM log storage”
“Mail server” (B)
Bert wants to add a flashlight capability to a smartphone. What kind of app is this?
A. “DDOS”
B. “Trojan”
C. “Side channel”
D. “On-path”
“Trojan” (B)
A tool that monitors local devices to reduce potential threats from hostile software.
A. “NIDS (network-based intrusion-detection systems)”
B. “Anti-malware”
C. “DLP (data loss prevention)”
D. “Firewall”
“Anti-malware” (B)
A VLAN is a _____ method of segmenting networks.
A. “Secret”
B. “Physical”
C. “Regulated”
D. “Logical”
“Logical” (D)
Which of the following activities is usually part of the configuration management process, but is also extremely helpful in countering potential attacks?
A. “Annual budgeting”
B. “Conferences with senior leadership”
C. “Updating and patching systems”
D. “The annual shareholders’ meeting”
“Updating and patching systems” ゥ
To adequately ensure availability for a data center, it is best to plan for both resilience and _______ of the elements in the facility.
A. “Uniqueness”
B. “Destruction”
C. “Redundancy”
D. “Hue”
“Redundancy” (C)
A tool that aggregates log data from multiple sources, and typically analyzes it and reports potential threats.
A. “HIDS”
B. “Anti-malware”
C. “Router”
D. “SIEM”
“SIEM” (D)
“Wiring _____” is a common term meaning “a place where wires/conduits are often run, and equipment can be placed, in order to facilitate the use of local networks.”
A. “Shelf”
B. “Closet”
C. “Bracket”
D. “House”
“Closet” (B)
Cyril wants to ensure all the devices on his company’s internal IT environment are properly synchronized. Which of the following protocols would aid in this effort?
A. “FTP (File Transfer Protocol)”
B. “NTP (Network Time Protocol)”
C. “SMTP (Simple Mail Transfer Protocol)”
D. “HTTP (Hypertext Transfer Protocol)”
“NTP (Network Time Protocol)” (B)
Triffid, Inc., has deployed anti-malware solutions across its internal IT environment. What is an additional task necessary to ensure this control will function properly?
A. “Pay all employees a bonus for allowing anti-malware solutions to be run on their systems”
B. “Update the anti-malware solution regularly”
C. “Install a monitoring solution to check the anti-malware solution”
D. “Alert the public that this protective measure has been taken”
“Update the anti-malware solution regularly” (B)
The concept that the deployment of multiple types of controls provides better security than using a single type of control.
A. “VPN”
B. “Least privilege”
C. “Internet”
D. “Defense in depth”
“Defense in depth” (D)
Ludwig is a security analyst at Triffid, Inc. Which of the following might be the attack Ludwig sees?
A. “DDOS (distributed denial of service)”
B. “Spoofing”
C. “Exfiltrating stolen data”
D. “An insider sabotaging the power supply”
“DDOS (distributed denial of service)” (A)
Data retention periods apply to ____ data.
A. “Medical”
B. “Sensitive”
C. “All”
D. “Secret”
“All” ゥ
Security needs to be provided to ____ data.
A. “Restricted”
B. “Illegal”
C. “Private”
D. “All”
“All” (D)
Archiving is typically done when _________.
A. “Data is ready to be destroyed”
B. “Data has lost all value”
C. “Data is not needed for regular work purposes”
D. “Data has become illegal”
“Data is not needed for regular work purposes” ゥ