Domain 7 - Security Operations Flashcards
- Assuming a working IDS is in place, which of the following groups is BEST capable of stealing sensitive information due to the absence of system auditing?
A. Malicious software (malware)
B. Hacker or cracker
C. Disgruntled employee
D. Auditors
C
- Which of the following provides controlled and un-intercepted interfaces into privileged user functions?
A. Ring protection
B. Anti-malware
C. Maintenance hooks
D. Trusted paths
D
- The doors of a data center spring open in the event of a fire. This is an example of…
A. Fail-safe
B. Fail-secure
C. Fail-proof
D. Fail-closed
A
- Which of the following ensures constant redundancy and fault-tolerance?
A. Cold spare
B. Warm spare
C. Hot spare
D. Archives
C
- If speed is preferred over resilience, which of the following RAID configuration is the most suited?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
A
- Updating records in multiple locations or copying an entire database on to a remote location as a means to ensure the appropriate levels of fault-tolerance and redundancy is known as…
A. Data mirroring
B. Shadowing
C. Backup
D. Archiving
B
- When the backup window is not long enough to backup all of the data and the restoration of backup must be as fast as possible. Which of the following type of high-availability backup strategy is BEST?
A. Full
B. Incremental
C. Differential
D. Increase the backup window so a full backup can be performed
C
- At a restricted facility, visitors are requested to provide identification and verified against a pre-approved list by the guard at the front gate before being let in. This is an example of checking for…
A. Least privilege
B. Separation of duties
C. Fail-safe
D. Psychological acceptability
A
- When sensitive information is no longer critical but still within scope of a record retention policy, that information is BEST…
A. Destroyed
B. Re-categorized
C. Degaussed
D. Released
B
- Which of the following BEST determines access and suitability of an individual?
A. Job rank or title
B. Partnership with the security team
C. Role
D. Background investigation
D
- Which of the following can help with ensuring that only the needed logs are collected for monitoring?
A. Clipping level
B. Aggregation
C. XML Parsing
D. Inference
A
- The main difference between a Security Event Information Management (SEIM) system and a log management system is that SEIM systems are useful for log collection, collation, and analysis…
A. In real time
B. For historical purposes
C. For admissibility in court
D. In discerning patterns
A
- The best way to ensure that there is no data remnant of sensitive information that was once stored on a DVD-R media is by…
A. Deletion
B. Degaussing
C. Destruction
D. Overwriting
C
- Which of the following processes is concerned with not only identifying the root cause but also addressing the underlying issue?
A. Incident management
B. Problem management
C. Change management
D. Configuration management
B
- Before applying a software update to production systems, it is MOST important that…
A. Full disclosure information about the threat that the patch addresses is available
B. The patching process is documented
C. The production systems are backed up
D. An independent third party attests the validity of the patch
C