Exam Sim - 701 Flashcards
You are incorporating a perimeter network into a network redesign and are adding several new devices to enhance security. Which of these would not be best placed in the new network perimiter?
DDoS mitigation
Aggregation switches
VPN concentrators
Proxies
Aggregation switches are not best placed in the perimeter network because they are best used to connect other switches together. They can be placed anywhere they are needed. Aggregation switches create a single bandwidth stream from multiple sources. A DDoS mitigator should be placed in the perimeter network so that it can detect and mitigate a DDoS attack.
In security operations, which of the following would provide well-defined operational guidelines for processes such as incident response, security policy, vulnerability management, and security awareness?
Windows registry
System Hardening
System Processes
Logging Levels
System processes provide well-defined operational guidelines for processes such as incident response, security policy, vulnerability management and security awareness to name a few. A security operations center (SOC) operates 23x7 to maintain the organisations security posture.
What vendor assessment evaluates the security controls and practices of third-party vendors through a external evaluation process?
In an independent assessment, third-party auditors or assessors are engaged to evaluate the security posture of a vendor independently. These assessments are conducted by impartial and qualified professionals who review the vendor’s security controls, policies and procedures against industry standards, best practices and regulatory requirements. Independent assessment provide an objective evaluation of the vendors security practices and help validate their compliance with security standards and contractual obligations.
In security awareness training session, employees are taught to recognise various types of behaviour that may indicate a security threat. Which type of behaviour involves actions that are not in line with established security policies or procedures, potentially putting sensitive information at risk?
Unexplained behaviour involves actions that are not in line with established security policies or procedures. This type of behaviour lacks a clear justification or explanation within the context of an individuals job responsibilities or typical behaviour patterns. As an example, accessing files or systems that are unrelated to one’s role, attempting to modify critical settings without proper authorisation, or logging into the network at odd hours without a valid reason could all be considered unexplained behaviour. Behaviour such as this may indicate a potential security threat or unauthorised access attempt.
You are the security administrator for your company. you identify a security risk. You decide to continue with the current security plan. However, you develop a contingency plan to implement if the security risk occurs. which type of risk response strategy are you demonstrating?
You are demonstrating a risk response strategy of acceptance. Acceptance involves accepting the risk and leaving the security plan unchanged. examples of acceptance would include taking no action at all or leaving the plan unchanged and developing a contingency or fallback plan. It is recommended that you accept a risk when the cost of the safeguard exceeds the amount of the potential loss.
You need to incorporate SAML and SSO into a web application. What would you use?
Shibboleth use Security Assertion Markup Language (SAML), which defines security authorisations on web pages as opposed to web page elements in HTML. Shibboleth is a single sign-on (SSO) system that uses an identity provider and a hardwareAuth is Open Authorisation.
Which of these requirements would indicate that you needed to install a router as opposed to a NIPS/NIDS?
in-band vs out-of-band
Rules
Inline vs passive
Anti-spoofing
Antispoofing is a router function, where an application campares the incoming or outgoing IP address to an ACL. Other types of antispoofing perform similar functions on MAC addresses or switch ports. A NIDS or NIPS would not check IP address traffic for spoofing.
An attacker carried out an IP spoofing that included saturating your network with ICMP messages. Which attack occurred?
A smurf attack is a combination of Internet Protocol (IP) spoofing and the saturation of a network with Internet Control Message Protocol (ICMP) messages. To initiate a smurf attack a hacker sends ICMP messages from a computer outside a network with a spoofed IP address of a computer inside the network. The ICMP message is broadcast on the network and the hosts on the network attempt to reply to the spurious ICMP message. A smurf attack causes a denial-of-service (DoS) on a network because computers are busy responding to the ICMP messages. The IP spoofing part of a smurf attack can be countered by configuring a router to ensure that messages with IP addresses inside the network originate on the private network side of the router.
Why is it important to report the potential losses arising from a risk when reporting risk assessment results?
To enable risk-based decision making - When reporting risk assessment results to senior management it is important to include potential losses compared to treatment cost. This helps to frame the risk in terms of its impact on business objectives and leads to decision-making at high levels that is risk based and not performance based.
You are considering cloud services and you are concerned about the interaction of your security policies and those of the hosting provider. What can alleviate your concern?
Cloud access security broker would alleviate your concern because they enforce security policies, whether on-premises or cloud-based. They often sit between the cloud service users and providers, merging the security policies of the user and the provider.
When calculating risks by using the quantitative method, what is the result of multiplying the asset values by the exposure factor (EF)?
The result of multiplying the asset values by the exposure factor (EF) is the single loss expectancy (SLE) value. SLE refers to the quantitative amount of loss incurred by a single event when a threat takes place. the formula for calculating SLE is:
SLE = assett value x EF
EF is defined as the percentage of the expected loss when an event occurs.
Your company decides to implement a RADI-5 array on several file servers. Which feature is provided by this deployment?
A RAID-5 array provides high availability. Redundant Array of Independent Disks (RAID) combines multiple hard drives for redundancy, performance and fault tolerance. There are several levels of RAID varying in configuration based on need.
When connecting to a website using SSL/TLS, the client browser uses the root CA’s public key to decrypt the digital signature of each certificate until finally verifying the identity associated with the websites certificate. Which term or phrase describes this public key infrastructure (PKI) concept?
Certificate chaining refers to the trust relationships between CAs and helps determine which certificate has the highest-level trust. For example, if you get a certificate from “A”, and “A” trusts the root certificate, the highest-level trust is the root certificate.
A large financial institution needs to securely manage and grant temporary access to privileged accounts for third-party contractors performing system maintenance. Of the choices given, which solution would be most appropriate for privileged access management?
Time-limited Authorisation
Just-in-time permissions
Ephemeral credentials
Password vaulting
Ephemeral credentials would be the most appropriate solution for privileged access management. Ephemeral credentials refer to temporary, short-lived credentials generated dynamically for accessing privileged accounts or resources. Ephemeral credentials can be generated on-demand and automatically revoked after a predefined period reducing the risk of credential theft, misuse or exposure. this ensures that third-party contractors have access only for the duration required to perform system maintenance tasks, enhancing security and compliance.
What asset management activity typically involves scanning to locate assests?
Enumeration is the asset management activity that typically involves scanning to locate assets. Unlike inventory management, which relies on existing records or information, enumeration actively scans systems and networks to identify and list all of the technology resources and devices within the organisation. This process helps ensure that all assets are discovered and accounted for, even when they were not previously documented in the inventory.
when planning physical security, which type of sensor would be appropriate to detect a person’s body heat when the person enters a controlled space such as a server room?
Infrared sensor - looks for changes in infrared or heat radiation