Domain 2.0 Compliance & Op Security Flashcards
Which of the following is used to describe a situation where an alert is sent to an adminstrator when an event is mistakenly recognized as malicious?
A. True negative
B. True positive
C. False negative
D. False positive
D. False positive
Which of the following is implemented via technical control?
A. Business continuity planning
B. Principle of least privilige
C. Background checks
D. Perimeter breach detection
B. Principle of least privilige
What business security policy focuses on directing subjects to perform business tasks and avoid wasting resources?
A. Acceptable Use Policy
B. Service Level Agreement
C. Retention Policy
D. Business Continuity Plan
A. Acceptable Use Policy
Which of the following is a valid formula for calculating ALE?
A. Total risk + controls gap
B. Vulnerabilities & Asset Value & risk
C. AV x EF x ARO
D. 802.1x + x.500
C. AV x EF x ARO
This means
Annual Loss Expectancy =
Asset Value) x (Exposure Factor) x (Annual Rate of Occurence
Which of the following is not a valid response to risk?
A. Outsourcing
B. Implementing a safeguard
C. Ignore it until the next budget year
D. Obtaining insurance
C. Ignore it until the next budget year
After the security policy is written, inventories are crafted, and maps of the physical and logical layouts are drawn, what must be performed in order to allow for reasonable recovery in the event of a disaster years after the initial implementation of the infrastructure?
A. Online access to procedures
B. Maintaining change documentation
C. Weekly backups stored onsite
D. Paper copies of policies
B. Maintaining change documentation
What is the greatest threat to organizations from removable media that is used as part of normal day-to-day work tasks?
A. Intellectual property theft
B. Spread of email hoaxes
C. Data corruption
D. Social Engineering
A. Intellectual property theft
What is a primary goal of Auditing?
A. Check compliance with security policy
B. Prevent users from performing any personal tasks
C. Limiting information access to external entities
D. Training personal in regards to security
A. Check compliance with security policy
Which of the following forms of data is least volatile?
A. Data stored in cache
B. Network connections
C. Flash memory in a desk drawer
D. An internal hard drive
C. Flash memory in a desk drawer
What is the chain of custody?
A. Documentation of the owners since the original retail purchase date
B. An accounting of all responsible parties who handled or had access to the evidence
C. A computer lock used to prevent theft of portable devices
D. A forensic tool used to extract hidden data from hard drive slack space
B. An accounting of all responsible parties who handled or had access to the evidence
When an IDS alerts the administrator that an intrusion is taking place, what is often the first action the first responder should perform?
A. Containment
B. Reconstitution
C. Contact law enforcement
D. Restore files from backup
A. Containment
Which of the following does not represent PII?
A. Phone number
B. User name
C. Fingerprint
D. Favorite dessert
D. Favorite dessert
PII - Personally Identifiable Information
After awareness training, which of the following is the next best countermeasure against social engineering?
A. Implementing multi-factor authentication
B. Updating the disaster recovery plan
C. Restricting the flow of information through the use of security labels
D. Obtaining a certification through taking an exam
C. Restricting the flow of information through the use of security labels
What does a clean desk policy require?
A. Desks are free from debris or overt signs of wear and use
B. Anti-bacterial wipes are used to prevent the spread of germs and disease
C. Paperwork is files away at the end of every work period
D. A user desktop must only contain OS elements
C. Paperwork is files away at the end of every work period
Business impact analysis is the act of performing a risk assessment on what element or aspect of an organization?
A. SLAs
B. Processes
C. Assets
D. Finances
B. Processes
SLA - Service Level Agreements
When an organization experiences a security breach that results in a reduction but not interruption of throughput, what response is to be triggered?
A. Business continuity
B. Disaster recovery
C. Legal investigation
D. Privilege escalation
A. Business continuity
What is succession planning?
A. Planning the roll out of incremental improvements in a product over multiple sequential version releases
B. The act of configuring a bridge trust between two root certificate servers
C. A form os DoS that involves crashing systems to trigger a domino effect
D. Prepping candidates for the replacement of a senior executive
D. Prepping candidates for the replacement of a senior executive
Along with temperature, HVAC is used to manage what other important aspect of the environment?
A. Fire
B. Humidity
C. Magnetic fields
D. Capacitance
B. Humidity
What is the HVAC implementation that alternates airway passages located between walls of rack mounted systems as air vent and air return commonly known as?
A. Cyclone circulation
B. RAID C/F
C. Hot and cold aisles
D. Convection systems
C. Hot and cold aisles
Failing to manage humidity can result in condensation or what other problem?
A. Chip creep
B. ESD
C. Ionization and ozone accumulation
D. Overheating
B. ESD
ESD - Electrostatic Discharge
High availability of a resource could be achieved through the implementation of what service?
A. SSD storage
B. Offsite backups
C. Clustering
D. Optical network links
C. Clustering
Which of the following can be described as the amount of data loss that can be survived or accepted as measured in time?
A. Maximum tolerable downtime
B. Mean time between failures
C. Recovery time objective
D. Recovery point objective
D. Recovery point objective
Which of the following provides the most likely option for organizations to recover in the event of a disaster, but which is not considered cost effective?
A. Cold site
B. Service bureau
C. Hot Site
D. Reciprocal agreement
C. Hot Site
When malicious code corrupts data, what security service has been violated?
A. Privacy
B. Integrity
C. Confidentiality
D. Authentication
B. Integrity