Implementation Flashcards
Your organization is implementing a secure backup strategy. What is a best practice for ensuring the security of backup data?
A) store backup data in an unencrypted, publicly accessible cloud storage
B) implement regular, automated backups with versioning
C) share backup data with external partners
D) keep backup data on the same server as the original data
Implement regular, automated backups with versioning
Regular, automated backups with versioning ensure data recovery and security. Versioning allows the restoration of data to a specific point in time, which can be critical in case of data loss or breaches.
You are tasked with securing a web server. Which of the following is a recommended practice for protecting against web server vulnerabilities?
A) disable all security updates to maintain stability
B) regularly update the web server software and plugins
C) allow unrestricted access to sensitive configuration files
D) set weak, easily guess guessable passwords for server access
Regularly update the web server software and plugins
Regularly updating the web server software and plugins is essential to patch known vulnerabilities and maintain the security of the server.
You are configuring a firewall to enhance network security. What is a key consideration when implementing firewall rules?
A) allow all incoming and outgoing traffic for simplicity
B) block all network traffic from external sources
C) create specific rules to allow necessary traffic and deny all else
D) disable the firewall to avoid network complexity
Create specific rules to allow necessary traffic and deny all else
When configuring firewall rules, it’s important to follow the principle of least privilege and create specific rules to allow only necessary traffic while denying all other traffic, which enhances security.
Your organization is implementing a Bring Your Own Device (BYOD) policy. What is a recommended security measure to ensure the security of employee-owned devices?
A) allow employees to install any applications they choose
B) implement mobile device management (MDM) software
C) share sensitive company data openly with all devices
D) disable all security features to improve device performance
Implement mobile device management (MDM) software
Implementing MDM software helps organizations manage and secure employee-owned devices, enforce security policies, and protect company data on those devices.
A network administrator is responsible for securing a web server. What is a key consideration when implementing secure communication with HTTPS?
A) use a self-signed certificate for simplicity
B) enable plain HTTP for public-facing content
C) purchase a valid SSL/TLS certificate from a trusted certificate authority
D) store sensitive data in clear text on the web server
Purchase a valid SSL/ TLS certificate from a trusted certificate authority
Using a valid SSL/TLS certificate from a trusted certificate authority ensures secure communication and data integrity, which is crucial for web server security.
A Database Administrator (DBA) is tasked with securing a database server. What is a recommended practice for database security?
A) use easily guessable database passwords for user accounts
B) implement role-based access control (RBAC) to restrict user privileges
C) share the entire database with external partners
D) store sensitive data without encryption
Implement role-based access control (RBAC) to restrict user privileges
Implementing RBAC helps restrict user privileges within the database, ensuring that users can only access data and perform actions necessary for their roles.
You’re managing identity and account controls for a corporate network. What’s a primary consideration when implementing a robust password policy for user accounts?
A) enforcing the reuse of passwords to simplify password management
B) allow employees to choose easily memorable passwords
C) requiring frequent password changes without any complexity requirements
D) implementing complex, unique, and regularly updated passwords
Implementing complex, unique, and regularly updated passwords
Implementing complex, unique, and regularly updated passwords is crucial for a robust password policy. This strategy helps enhance security by making passwords more difficult to crack and reduces the likelihood of password reuse.
You are enhancing access control measures for a corporate network. What technology is specifically designed for centralized access control in network environments, providing a separate authentication system?
A) OAuth
B) kerberos
C) discretionary access control (DAC)
D) MAC
Kerberos
Kerberos is a network authentication protocol specifically designed for centralized access control, offering a separate authentication system. It uses tickets and a Key Distribution Center (KDC) to authenticate users and provide secure access to network resources.
Which technology standardizes authentication without exposing user credentials to the service provider?
A) root
B) TACACS+
C) openID
D) domain validation
OpenID
OpenID is a technology that standardizes authentication, allowing users to access multiple services with a single set of credentials without disclosing their credentials to service providers. It’s commonly used for single sign-on solutions.
Which protocol provides a method for a client to request services from a network server without exposing user credentials?
A) OAuth
B) TACACS+ (terminal access controller access-control system plus)
C) root
D) openID
TACACS+
TACACS+ (Terminal Access Controller Access-Control System Plus) provides a method for a client to request services from a network server without exposing user credentials. It’s a protocol for centralized authentication, authorization, and accounting (AAA) services.
What entity is responsible for verifying the identity of certificate holders and issuing digital certificates?
A) certificate revocation list (CRL)
B) intermediate CA
C) certificate authority (CA)
D) registration authority (RA)
Certificate authority (CA)
A Certificate Authority (CA) is responsible for verifying the identity of certificate holders and issuing digital certificates. It validates the identity of entities and binds their public keys to their identity through a digital signature.
You’re setting up a public key infrastructure. What element performs the critical task of confirming the validity of a digital certificate, facilitating real-time status checks?
A) certificate signing request (CSR)
B) online certificate status protocol (OCSP)
C) key management
D) CN (common name)
Online certificate status protocol (OCSP)
The Online Certificate Status Protocol (OCSP) performs the critical task of confirming the validity of a digital certificate by providing real-time status checks. It enables systems to verify if a certificate is valid or revoked.
What specific data field in a certificate identifies the entity associated with the public key contained in the certificate?
A) certificate signing request (CSR)
B) intermediate CA
C) CN (common name)
D) certificate revocation list (CRL)
CN (common name)
The Common Name (CN) field in a certificate identifies the entity associated with the public key contained in the certificate. It’s a naming attribute associated with the subject of the certificate.
Which intrusion detection system primarily identifies attacks by comparing traffic patterns against a pre-established set of rules or signatures?
A) anomaly-based IDS
B) signature-based IDS
C) IPSec
D) SSL/TLS
Signature-based IDS
A Signature-based Intrusion Detection System (IDS) identifies attacks by comparing traffic patterns against a pre-established set of rules or signatures. It works by matching known attack patterns against network traffic to detect threats.
A network admin is establishing secure communication channels over the internet. What cryptographic protocol suite provides authentication, integrity, and confidentiality for VPN connections, including site-to-site connections?
A) SSL/TLS
B) IPSec
C) network-based intrusion detection system (NIDS)
D) remote access
IPSec
IPSec (Internet Protocol Security) is a cryptographic protocol suite that provides authentication, integrity, and confidentiality for VPN connections, including site-to-site connections, securing communication over the internet.
What intrusion detection method primarily detects attacks by identifying deviations from established baselines?
A) heuristic/behavior-based IDS
B) network-based intrusion prevention system (NIPS)
C) signature-based IDS
D) SSL/TLS
Heuristic/ behavior-based IDS
Heuristic/Behavior-based IDS primarily detects attacks by identifying deviations from established baselines or normal behavior within network traffic, flagging anomalies that could indicate potential threats.