Domain 4, Quiz 1 Flashcards

1
Q

When securing a cloud infrastructure, which of the following is a common initial step?

a. Conducting a site survey.
b. Enabling Bluetooth connectivity.
c. Enabling WPA3 on all devices.
d. Establishing a secure baseline.

A

Establishing a secure baseline.

Establishing a secure baseline is correct because it sets a standard of security configurations for the cloud infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which mobile solution deployment model involves employees using their own devices for work purposes?

a. Bring your own device (BYOD).
b. Choose your own device (CYOD).
c. Mobile device management (MDM).
d. Wi-Fi connectivity model.

A

Bring your own device (BYOD).

BYOD is correct because it refers to employees using their personal devices for work purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the context of application security, what is the primary purpose of input validation?

a. To prevent malicious data from being processed.
b. To enhance the user interface.
c. To generate heat maps.
d. To provide code signing.

A

To prevent malicious data from being processed.

Preventing malicious data from being processed is correct because input validation checks data for unexpected, incorrect, or malicious values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company is trying to ascertain if a detected vulnerability is present in their system. Which of the following terms best describes this process?

a. Prioritization.
b. Enumeration.
c. Confirmation.
d. Decommissioning.

A

Confirmation.

Confirmation is correct because it involves validating if a detected vulnerability is genuinely present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following vulnerability identification methods involves paying independent security researchers for discovering and reporting vulnerabilities?

a. Vulnerability scanning.
b. Penetration testing.
c. Threat feed.
d. Bug bounty program.

A

Bug bounty program.

Bug bounty program is correct because it rewards those who find and report vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After patching a system to address a known vulnerability, what should be done next to ensure the vulnerability has been resolved?

a. Activate compensating controls.
b. Prioritize other vulnerabilities.
c. Enumeration.
d. Validation of remediation.

A

Validation of remediation.

Validation of remediation is correct because it ensures that the applied patches or fixes have effectively addressed the vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which factor directly measures the maximum potential loss from a vulnerability?

a. Vulnerability classification.
b. Common Vulnerability Scoring System (CVSS).
c. Exposure factor.
d. Risk tolerance.

A

Exposure factor.

Exposure factor is correct because it represents the percentage of loss a realized threat would have on a particular asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For securing wireless devices, what primary authentication protocol uses a central server to authenticate wireless users?

a. AAA/RADIUS.
b. Secure cookies.
c. WPA3.
d. Static code analysis.

A

AAA/RADIUS.

AAA/RADIUS is correct because RADIUS (part of AAA) is used for remote authentication and is commonly used with wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In software asset management, what is the final stage after an application has reached the end of its lifecycle in an organization?

a. Procurement.
b. Monitoring.
c. Assignment.
d. Disposal/decommissioning.

A

Disposal/decommissioning.

Disposal/decommissioning is correct because it is the final stage when the software is no longer needed or used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is hardening particularly crucial for devices in Industrial Control Systems (ICS) and SCADA (Supervisory Control and Data Acquisition)?

a. To allow remote access.
b. To enable Bluetooth connectivity.
c. To mitigate risks from cyber-physical attacks.
d. To enhance device performance.

A

To mitigate risks from cyber-physical attacks.

Mitigating risks from cyber-physical attacks is correct because ICS/SCADA systems often control physical infrastructure, making them high-value targets.

SCADA (Supervisory Control and Data Acquisition)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary reason for conducting site surveys during wireless device installations?

a. To choose suitable colors for access points.
b. To enable cellular connectivity.
c. To ensure optimal signal coverage and minimal interference.
d. To harden the wireless devices.

A

To ensure optimal signal coverage and minimal interference.

Ensuring optimal signal coverage and minimal interference is correct because site surveys help identify the best placements for access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When implementing mobile solutions in a company, which method focuses on managing the policies, apps, and data on mobile devices?

a. Mobile device management (MDM).
b. Bring your own device (BYOD).
c. Site surveys.
d. Wi-Fi Protected Access 3 (WPA3).

A

Mobile device management (MDM).

MDM is correct because it is a solution specifically designed to manage policies, apps, and data on mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an open-source method for gathering data on potential vulnerabilities and threats?

a. Responsible disclosure program.
b. Dark web browsing.
c. Open-source intelligence (OSINT).
d. Proprietary/third-party software.

A

Open-source intelligence (OSINT).

OSINT is correct because it refers to the gathering of data from publicly available sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which term describes a result from a vulnerability scan that incorrectly indicates a vulnerability is present when it is not?

a. CVE.
b. Risk tolerance.
c. Exposure factor.
d. False positive.

A

False positive.

False positive is correct because it indicates an error where a vulnerability is flagged but does not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If an organization cannot immediately patch a discovered vulnerability, what might it implement as a temporary measure?

a. Vulnerability scanning.
b. Asset procurement.
c. Data enumeration.
d. Compensating controls.

A

Compensating controls.

Compensating controls are correct because they offer alternative security measures when direct solutions are not feasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly