Exam 20 Flashcards

1
Q
  1. A software development company is adopting Infrastructure as Code (IaC) to manage and provision its cloud-based resources. The company aims to improve efficiency and consistency in its infrastructure deployment. However, there is concern about potential security risks associated with IaC. In this context, which of the following measures should be prioritized to mitigate security risks inherent in the use of IaC?
A

A. Reducing the frequency of infrastructure updates to minimize changes.
B. Using a manual review process for all IaC scripts and configurations.
C. Implementing version control and regular code audits for IaC scripts.
D. Focusing on the physical security of the servers hosting the IaC platform.

Infrastructure as Code (IaC) brings several benefits, but it also introduces unique security risks, particularly related to the code that defines and provisions infrastructure. Implementing version control and regular code audits for IaC scripts (Option C) is crucial in mitigating these risks. Version control ensures that changes to the infrastructure are tracked, reviewed, and can be rolled back if necessary. Regular audits of the IaC scripts help identify potential security vulnerabilities, misconfigurations, or non-compliance with best practices before they are deployed. Reducing the frequency of updates (Option A) could hinder the agility and responsiveness that IaC aims to provide. A manual review process (Option B) can be beneficial but may not be scalable or efficient in isolation and does not provide the same level of control and oversight as version control and automated audits. Physical security of servers (Option D) is important but is not directly related to the security risks inherent in the use of IaC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. An online banking platform uses an Intrusion Prevention System (IPS) configured to fail-closed for protecting its transaction processing system. If the IPS encounters an error or a breach is detected, what is the expected behavior regarding transaction processing, and how does this configuration benefit the platform?
A

A. Transaction processing continues with additional verification steps for users.
B. Transaction processing is halted, reducing the risk of fraudulent activities.
C. The IPS switches to a passive monitoring mode, recording potential threats.
D. Transaction processing is diverted to a secondary, less secure system.

In a fail-closed setup, when the IPS encounters an error or detects a breach, it automatically stops transaction processing to prevent potential security threats from affecting the system (Option B). This behavior is crucial for an online banking platform, as it significantly reduces the risk of fraudulent activities and data breaches during periods of vulnerability. The primary benefit of this configuration is the assurance that, in case of a system compromise, sensitive financial transactions are protected, albeit at the expense of temporarily disrupting the service. Options A, C, and D describe alternative measures or behaviors that do not align with the fundamental principle of a fail-closed system, which is to cease operations to maintain security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A software development company is undergoing a third-party security audit to comply with ISO/IEC 27001 standards. During the audit, it is discovered that the company lacks formal procedures for handling customer data breaches. What should the company prioritize to align with effective external security compliance?

A

A. Developing a comprehensive incident response plan.
B. Purchasing cyber insurance for potential data breaches.
C. Increasing the budget for IT security infrastructure.
D. Conducting regular employee training on data handling.

Developing a comprehensive incident response plan (Option A) is crucial for complying with ISO/IEC 27001 standards, which require organizations to have formal procedures for managing information security incidents, including data breaches. This plan should detail the steps for detecting, reporting, and responding to incidents, ensuring that the organization can effectively handle and mitigate the impact of data breaches. Purchasing cyber insurance (Option B) is a risk management strategy but does not address the lack of formal procedures. Increasing the budget for IT security infrastructure (Option C) may improve overall security but does not directly address the specific compliance issue identified. Regular employee training (Option D) is important for awareness but is not sufficient to meet the specific requirement for incident handling procedures. A comprehensive incident response plan demonstrates adherence to external compliance standards by establishing a structured approach to managing security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company, TechSavvy Inc., uses a proprietary software developed by a third-party vendor for their customer relationship management (CRM). The IT department receives a notification about a critical vulnerability in the software, which the vendor has not yet addressed with a patch. Given the situation, what is the most appropriate action for TechSavvy Inc. to ensure the security of their CRM system?

A

A. Disconnect the CRM system from the network until a patch is released.
B. Implement additional security controls as a temporary mitigation measure.
C. Continue to use the software as usual while waiting for the vendor’s patch.
D. Replace the proprietary software with an open-source alternative.

When dealing with a critical vulnerability in proprietary software for which a patch is not immediately available, it is essential to mitigate the risk while maintaining operational continuity. Implementing additional security controls, such as network segmentation, access controls, or intrusion detection systems, can provide temporary protection against potential exploitation of the vulnerability. This approach allows the company to continue using the CRM system with reduced risk until the vendor releases a patch. Option A, disconnecting the CRM system from the network, could disrupt business operations and is not always feasible. Option C, continuing to use the software as usual, is risky as it leaves the system vulnerable to potential attacks. Option D, replacing the proprietary software with an open-source alternative, is a longer-term solution that may not be practical or desirable depending on the specific requirements and integration of the CRM system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A global financial institution implemented automation in its security operations to manage the complexity of its vast and diverse IT infrastructure. Despite the automation, the institution faced a major security breach. Post-incident analysis revealed that certain parts of the infrastructure were not covered by the automated security controls. What is the MOST likely reason for this gap in security coverage?
A

A. Lack of employee cybersecurity awareness.
B. Incomplete integration of automation across all IT systems.
C. The automated system was unable to detect advanced persistent threats.
D. Insufficient funding for cybersecurity initiatives.

The most likely reason for the gap in security coverage, leading to a major breach despite the implementation of automation, is the incomplete integration of automation across all IT systems (option B). In a complex and diverse IT infrastructure, it’s crucial to ensure that automation is comprehensively integrated to cover all systems and components. Failing to do so can leave parts of the infrastructure vulnerable to attacks. While employee cybersecurity awareness (option A) and funding (option D) are important, they are less directly related to the issue of integrating automation in complex environments. The capability of the automated system to detect threats (option C) is also important, but the primary issue here is the coverage of the automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A multinational corporation communicates sensitive business strategies via email. To protect this information, the company implements end-to-end email encryption. After implementation, an employee notices that even if their email account is accessed from an unsecured network, the content of the emails remains confidential. What is the primary security benefit of using end-to-end email encryption in this scenario?
A

A. It ensures only authorized recipients can read the email content.
B. It increases the email system’s resilience to high traffic volumes.
C. It automates the archiving process for email communications.
D. It enhances the efficiency of email delivery across global networks.

The primary security benefit of implementing end-to-end email encryption in this scenario is to ensure that only authorized recipients can read the email content. End-to-end encryption encrypts the content at the sender’s end and decrypts it only at the recipient’s end, making it unreadable to anyone else, including those who might gain unauthorized access to an email account or intercept the email during transit. This provides a high level of confidentiality for sensitive business communications, protecting them from eavesdropping or unauthorized access, regardless of the security of the network used for accessing the emails. The other options, such as increasing resilience to traffic volumes (Option B), automating archiving (Option C), or enhancing email delivery efficiency (Option D), are not directly related to the security benefits of end-to-end encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. During a routine network scan, a security tool identifies and quarantines a server due to suspicious activity resembling a malware infection. Subsequent investigation reveals that the server is running a new application that exhibits network behavior similar to malware. What is the MOST appropriate next step to ensure network security while minimizing business disruption?
A

A. Keep the server in quarantine and investigate all other servers for similar infections
B. Remove the server from quarantine and exclude it from future scans
C. Update the security tool’s configuration to recognize the application’s behavior as benign
D. Format the server and reinstall the operating system and applications

Since the investigation reveals that the server is not actually infected but is running an application with behavior similar to malware, the most appropriate action is to update the security tool’s configuration. This update should recognize the application’s behavior as benign, preventing future false positives while maintaining network security. Option A (Keeping the server in quarantine) and Option D (Formatting the server) are excessive and disruptive actions given that no actual infection was found. Option B (Removing the server from quarantine and excluding it from future scans) may expose the network to potential risks if the behavior was indeed malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. In designing IT systems with a focus on power-related security implications, which two of the following practices should be prioritized? (SELECT TWO)
A

A. Solely relying on the local power grid for all power needs.
B. Regularly testing and maintaining backup power systems to ensure their reliability.
C. Implementing power usage monitoring to identify and address inefficiencies.
D. Ignoring power considerations in favor of investing in advanced software solutions.

Regularly testing and maintaining backup power systems (Option B) is essential to ensure their reliability and effectiveness in the event of a power outage. This helps in preventing downtime and maintaining the security and availability of IT systems. Implementing power usage monitoring (Option C) is also important, as it allows for the identification and addressing of inefficiencies in power consumption, which can improve the overall resilience and sustainability of the IT infrastructure. Solely relying on the local power grid (Option A) is risky, as it does not provide a backup in case of power failures. Ignoring power considerations in favor of advanced software solutions (Option D) is not advisable, as power issues can critically impact the functionality and security of IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. To effectively manage and respond to out-of-cycle logging and similar anomalies, which TWO of the following strategies should be prioritized? (SELECT TWO)
A

A. Regularly update and review log management policies to ensure comprehensive coverage of critical systems.
B. Train staff on recognizing and responding to unusual log activities and potential security incidents.
C. Deploy advanced analytics tools for automated anomaly detection in log data.
D. Increase the frequency of security audits to identify and address logging irregularities.

To effectively manage and respond to out-of-cycle logging and similar anomalies, it’s important to focus on strategies that enhance log management and automated detection. Regularly updating and reviewing log management policies (Option A) ensures that logging is effectively capturing activities across critical systems and that the policies remain relevant and effective. Deploying advanced analytics tools for automated anomaly detection (Option C) enables the organization to quickly identify unusual log patterns, facilitating timely investigation and response. While training staff (Option B) is important for overall cybersecurity awareness, it does not provide the technical solution for detecting anomalies in log data. Increasing the frequency of security audits (Option D) is beneficial but is more of a periodic review process and may not provide the immediate detection and response capabilities of automated tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. In a passive security assessment, it is observed that an organization’s email system does not filter out spam and phishing emails effectively. What is the most appropriate action for the organization to take to enhance email security?
A

A. Implementing a robust email filtering and anti-phishing solution.
B. Increasing the bandwidth of the organization’s internet connection.
C. Deploying an additional firewall to protect the email server.
D. Training employees on advanced cybersecurity techniques.

A passive security assessment involves monitoring and analyzing existing security practices. The observation that the organization’s email system is ineffective at filtering out spam and phishing emails suggests a vulnerability to email-based threats. The most appropriate action to enhance email security is to implement a robust email filtering and anti-phishing solution (Option A). This solution will help to identify and block malicious emails, reducing the risk of phishing attacks and spam. While increasing internet bandwidth (Option B), deploying an additional firewall (Option C), and training employees (Option D) are valuable for overall cybersecurity, they do not directly address the specific issue of inadequate email filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly