Implementation Flashcards

1
Q

Your organization is implementing a secure backup strategy. What is a best practice for ensuring the security of backup data?

A) store backup data in an unencrypted, publicly accessible cloud storage
B) implement regular, automated backups with versioning
C) share backup data with external partners
D) keep backup data on the same server as the original data

A

Implement regular, automated backups with versioning

Regular, automated backups with versioning ensure data recovery and security. Versioning allows the restoration of data to a specific point in time, which can be critical in case of data loss or breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are tasked with securing a web server. Which of the following is a recommended practice for protecting against web server vulnerabilities?

A) disable all security updates to maintain stability
B) regularly update the web server software and plugins
C) allow unrestricted access to sensitive configuration files
D) set weak, easily guess guessable passwords for server access

A

Regularly update the web server software and plugins

Regularly updating the web server software and plugins is essential to patch known vulnerabilities and maintain the security of the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are configuring a firewall to enhance network security. What is a key consideration when implementing firewall rules?

A) allow all incoming and outgoing traffic for simplicity
B) block all network traffic from external sources
C) create specific rules to allow necessary traffic and deny all else
D) disable the firewall to avoid network complexity

A

Create specific rules to allow necessary traffic and deny all else

When configuring firewall rules, it’s important to follow the principle of least privilege and create specific rules to allow only necessary traffic while denying all other traffic, which enhances security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your organization is implementing a Bring Your Own Device (BYOD) policy. What is a recommended security measure to ensure the security of employee-owned devices?

A) allow employees to install any applications they choose
B) implement mobile device management (MDM) software
C) share sensitive company data openly with all devices
D) disable all security features to improve device performance

A

Implement mobile device management (MDM) software

Implementing MDM software helps organizations manage and secure employee-owned devices, enforce security policies, and protect company data on those devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network administrator is responsible for securing a web server. What is a key consideration when implementing secure communication with HTTPS?

A) use a self-signed certificate for simplicity
B) enable plain HTTP for public-facing content
C) purchase a valid SSL/TLS certificate from a trusted certificate authority
D) store sensitive data in clear text on the web server

A

Purchase a valid SSL/ TLS certificate from a trusted certificate authority

Using a valid SSL/TLS certificate from a trusted certificate authority ensures secure communication and data integrity, which is crucial for web server security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Database Administrator (DBA) is tasked with securing a database server. What is a recommended practice for database security?

A) use easily guessable database passwords for user accounts
B) implement role-based access control (RBAC) to restrict user privileges
C) share the entire database with external partners
D) store sensitive data without encryption

A

Implement role-based access control (RBAC) to restrict user privileges

Implementing RBAC helps restrict user privileges within the database, ensuring that users can only access data and perform actions necessary for their roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You’re managing identity and account controls for a corporate network. What’s a primary consideration when implementing a robust password policy for user accounts?

A) enforcing the reuse of passwords to simplify password management
B) allow employees to choose easily memorable passwords
C) requiring frequent password changes without any complexity requirements
D) implementing complex, unique, and regularly updated passwords

A

Implementing complex, unique, and regularly updated passwords

Implementing complex, unique, and regularly updated passwords is crucial for a robust password policy. This strategy helps enhance security by making passwords more difficult to crack and reduces the likelihood of password reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are enhancing access control measures for a corporate network. What technology is specifically designed for centralized access control in network environments, providing a separate authentication system?

A) OAuth
B) kerberos
C) discretionary access control (DAC)
D) MAC

A

Kerberos

Kerberos is a network authentication protocol specifically designed for centralized access control, offering a separate authentication system. It uses tickets and a Key Distribution Center (KDC) to authenticate users and provide secure access to network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which technology standardizes authentication without exposing user credentials to the service provider?

A) root
B) TACACS+
C) openID
D) domain validation

A

OpenID

OpenID is a technology that standardizes authentication, allowing users to access multiple services with a single set of credentials without disclosing their credentials to service providers. It’s commonly used for single sign-on solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which protocol provides a method for a client to request services from a network server without exposing user credentials?

A) OAuth
B) TACACS+ (terminal access controller access-control system plus)
C) root
D) openID

A

TACACS+

TACACS+ (Terminal Access Controller Access-Control System Plus) provides a method for a client to request services from a network server without exposing user credentials. It’s a protocol for centralized authentication, authorization, and accounting (AAA) services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What entity is responsible for verifying the identity of certificate holders and issuing digital certificates?

A) certificate revocation list (CRL)
B) intermediate CA
C) certificate authority (CA)
D) registration authority (RA)

A

Certificate authority (CA)

A Certificate Authority (CA) is responsible for verifying the identity of certificate holders and issuing digital certificates. It validates the identity of entities and binds their public keys to their identity through a digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You’re setting up a public key infrastructure. What element performs the critical task of confirming the validity of a digital certificate, facilitating real-time status checks?

A) certificate signing request (CSR)
B) online certificate status protocol (OCSP)
C) key management
D) CN (common name)

A

Online certificate status protocol (OCSP)

The Online Certificate Status Protocol (OCSP) performs the critical task of confirming the validity of a digital certificate by providing real-time status checks. It enables systems to verify if a certificate is valid or revoked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What specific data field in a certificate identifies the entity associated with the public key contained in the certificate?

A) certificate signing request (CSR)
B) intermediate CA
C) CN (common name)
D) certificate revocation list (CRL)

A

CN (common name)

The Common Name (CN) field in a certificate identifies the entity associated with the public key contained in the certificate. It’s a naming attribute associated with the subject of the certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which intrusion detection system primarily identifies attacks by comparing traffic patterns against a pre-established set of rules or signatures?

A) anomaly-based IDS
B) signature-based IDS
C) IPSec
D) SSL/TLS

A

Signature-based IDS

A Signature-based Intrusion Detection System (IDS) identifies attacks by comparing traffic patterns against a pre-established set of rules or signatures. It works by matching known attack patterns against network traffic to detect threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network admin is establishing secure communication channels over the internet. What cryptographic protocol suite provides authentication, integrity, and confidentiality for VPN connections, including site-to-site connections?

A) SSL/TLS
B) IPSec
C) network-based intrusion detection system (NIDS)
D) remote access

A

IPSec

IPSec (Internet Protocol Security) is a cryptographic protocol suite that provides authentication, integrity, and confidentiality for VPN connections, including site-to-site connections, securing communication over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What intrusion detection method primarily detects attacks by identifying deviations from established baselines?

A) heuristic/behavior-based IDS
B) network-based intrusion prevention system (NIPS)
C) signature-based IDS
D) SSL/TLS

A

Heuristic/ behavior-based IDS

Heuristic/Behavior-based IDS primarily detects attacks by identifying deviations from established baselines or normal behavior within network traffic, flagging anomalies that could indicate potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What system provides a secure, encrypted method for remote access users to connect to the corporate network?

A) anomaly-based IDS
B) IPSec
C) signature-based IDS
D) heuristic/ behavior-based IDS

A

IPSec

IPSec provides a secure, encrypted method for remote access users to connect to the corporate network. It establishes a VPN to securely transmit data over the internet and connect remote users to the corporate network.

18
Q

What protocol ensures secure transmission of data between a web server and a browser?

A) IPSec
B) remote access
C) SSL/TLS
D) CN (common name)

A

SSL/TLS

Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS), ensure secure transmission of data between a web server and a browser, providing encryption and security for web browsing.

19
Q

An organization is assessing the security of a system and need to identify what should be controlled to minimize potential attack vectors. What common cybersecurity measure involves closing unnecessary communication entry points into a system?

A) patch management
B) open ports and services
C) disk encryption
D) OS

A

Open ports and services

Open ports and services involve controlling unnecessary communication entry points into a system. Closing or securing these ports helps minimize potential attack vectors by limiting entry points for unauthorized access.

20
Q

What component is primarily responsible for storing configurations, settings, and options for the operating system and other software?

A) OS
B) registry
C) anti-malware
D) endpoint detection

A

Registry

The Registry is primarily responsible for storing configurations, settings, and options for the operating system and other software, managing system integrity and various configurations.

21
Q

What practice involves regularly updating and fixing security vulnerabilities in software to prevent exploitation?

A) endpoint detection
B) anti-malware
C) OS
D) patch management

A

Patch management

Patch management involves regularly updating and fixing security vulnerabilities in software, serving to prevent exploitation and enhance system security by addressing identified vulnerabilities.

22
Q

To ensure seamless internet usage within the organization. What system converts domain names into IP addresses, allowing users to access websites through recognizable domain names?

A) file transfer
B) directory services
C) remote access
D) domain name resolution (DNS)

A

Domain name resolution (DNS)

Domain name resolution involves converting domain names into IP addresses, allowing users to access websites through recognizable domain names.

23
Q

What service or protocol primarily enables this automatic assignment of IP addresses?

A) directory services
B) DHCP (dynamic host configuration protocol)
C) network address allocation
D) routing and switching

A

DHCP (dynamic host configuration protocol)

DHCP is the service or protocol that primarily enables the automatic assignment of IP addresses to devices connected to the network, allowing for dynamic allocation of IP addresses.

24
Q

When implementing encryption for data protection, what is the primary goal of a symmetric key algorithm?

A) to accelerate data transfer rates
B) to enhance network aesthetics
C) to ensure confidentiality and integrity of data
D) to centralize data storage

A

To ensure confidentiality and integrity of data

The primary goal of a symmetric key algorithm in encryption is to ensure the confidentiality and integrity of data by using a single key for both encryption and decryption.

25
Q

When implementing encryption for data protection, what is the primary goal of a public-key infrastructure (PKI)?

A) to accelerate data transfer rates
B) to enhance network aesthetics
C) to ensure confidentiality and data integrity
D) to centralize data storage

A

To ensure confidentiality and data integrity

The primary goal of a public-key infrastructure (PKI) in encryption is to ensure the confidentiality and data integrity of information through the use of public and private keys for encryption and digital signatures.

26
Q

In the implementation of secure coding practices, which principle focuses on validating and sanitizing user input to prevent common vulnerabilities?

A) to optimize network performance
B) to ensure proper data entry in forms
C) to enhance network aesthetics
D) to protect against injection attacks and invalid data

A

To protect against injection attacks and invalid data

The principle of validating and sanitizing user input primarily focuses on protecting against injection attacks and ensuring that data entered by users is free from vulnerabilities.

27
Q

When implementing secure network designs, which security solution is typically used to separate a network into multiple broadcast domains, enhancing security and network management?

A) intrusion detection system (IDS)
B) network access control (NAC)
C) virtual LAN (VLAN)
D) firewall

A

Virtual LAN (VLAN)

Virtual LAN (VLAN) is typically used to separate a network into multiple broadcast domains, enhancing security and network management by isolating groups of devices from one another.

28
Q

Which protocol is commonly used to secure email communications by providing message encryption and authentication?

A) HTTP
B) FTP
C) SMTP
D) TLS

A

TLS

TLS (Transport Layer Security) is commonly used to secure email communications by providing message encryption and authentication, ensuring the confidentiality and integrity of email content.

29
Q

When implementing host or application security solutions, what is the primary purpose of antivirus software?

A) to encrypt network traffic
B) to protect against unauthorized access to servers
C) to detect and remove malware and viruses from the host system
D) to optimize network performance

A

To detect and remove malware and viruses from the host system

The primary purpose of antivirus software is to detect and remove malware and viruses from the host system, enhancing security by preventing malicious software from executing.

30
Q

In secure network designs, what is the primary goal of implementing network segmentation and access controls?

A) to accelerate data transfer rates
B) to centralize user authentication and authorization
C) to enhance network aesthetics
D) to reduce the attack surface and limit lateral movement of threats

A

To reduce the attack surface and limit lateral movement of threats

The primary goal of implementing network segmentation and access controls is to reduce the attack surface, limiting lateral movement of threats within a network, and enhancing overall security.

31
Q

In the context of implementing secure network designs, what is the primary goal of a demilitarized zone (DMZ)?

A) to centralize user authentication and authorization
B) to enhance network aesthetics
C) to protect internal network resources by isolating public-facing servers
D) to optimize network performance

A

To protect internal network resources by isolating public-facing servers

The primary goal of a Demilitarized Zone (DMZ) is to protect internal network resources by isolating public-facing servers from the internal network, enhancing security.

32
Q

A financial institution is implementing host-based intrusion detection systems (HIDS) on its critical servers. Why is this practice crucial for the institution’s security?

A) to optimize network performance for efficient transactions
B) to ensure that security threats and unauthorization access to sensitive financial data are detected and mitigated on individual servers
C) to centralize user authentication and authorization
D) to enhance the aesthetics of the server room

A

To ensure that security threats and unauthorization access to sensitive financial data are detected and mitigated on individual servers

In this scenario, the primary purpose of HIDS is to detect and respond to security threats and unauthorized access on individual servers, providing an essential layer of security for sensitive financial data.

33
Q

you work for an e-commerce company, and you’re responsible for implementing a Web Application Firewall (WAF) for your online store. In this scenario, why is a WAF essential to protect your business?

A) to encrypt all incoming and outgoing traffic
B) to enhance the aesthetics of your website
C) to protect your online store from cyberattacks, such as SQL injection and cross-site scripting
D) to centralize data storage for efficient access

A

To protect your online store from cyberattacks, such as SQL injection and cross-site scripting

the primary purpose of a WAF is to protect the online store from cyberattacks, ensuring the security of customer data and transactions.

34
Q

A government agency is implementing data loss prevention (DLP) software. What is the primary purpose of DLP in this context?

A) to centralize user authentication and authorization for government employees
B) to protect sensitive government data by preventing unauthorized data leaks and ensuring compliance and regulations
C) to optimize network performance for efficient data transmission
D) to accelerate data transfer rates for government communication

A

To protect sensitive government data by preventing unauthorized data leaks and ensuring compliance and regulations

In this scenario, the primary purpose of DLP implementation is to protect sensitive government data by preventing unauthorized data leaks and ensuring compliance with regulations and data security policies.

35
Q

You’re setting up a secure Wi-Fi network for your office. What is a key consideration when implementing a strong wireless security protocol?

A) use WEP (wired equivalent privacy) for backward compatibility
B) implement WPA3 (Wi-Fi protected access 3) with strong encryption
C) disable SSID broadcast for network obscurity
D) utilize MAC address filtering to allow specific devices

A

Implement WPA3 (Wi-Fi protected access 3) with strong encryption

In an office setting, implementing WPA3 with strong encryption is crucial for ensuring the security of your Wi-Fi network and the data transmitted over it. WEP is outdated and insecure.

36
Q

You’ve been tasked with encrypting a company laptop to protect sensitive data. What is essential to protect the decryption key?

A) store the decryption key in plain text on the device
B) use a strong passphrase to protect the decryption key
C) share the decryption key with trusted colleagues
D) publish the decryption key on a public website

A

Use a strong passphrase to protect the decryption key

37
Q

Your organization aims to enhance network security. What is the primary objective of implementing an intrusion detection system (IDS)?

A) to prevent all network attacks and unauthorization access
B) to detect and alert on suspicious or malicious activity
C) to block all network traffic from external sources
D) to encrypt all network communications

A

To detect and alert on suspicious or malicious activity

An IDS’s primary role is to identify and alert on unusual or potentially harmful network activity, helping organizations respond to security threats. It doesn’t prevent all attacks.

38
Q

You’re responsible for setting up access controls in your organization’s IT systems. What does the principle of least privilege (POLP) aim to achieve?

A) grant the maximum access to all users
B) grant access based on job titles
C) grant users the minimum access necessary to perform their tasks
D) grant unrestricted access to all administrative accounts

A

Grant users the minimum access necessary to perform their tasks

POLP ensures that users are granted the least amount of access required to perform their job functions, reducing the risk of unauthorized access and security breaches.

39
Q

When implementing a secure password policy, which of the following is a recommended practice to enhance security?

A) allow users to reuse their previous passwords
B) require complex passwords that include a combination of letters, numbers and special characters
C) set a default password for all new user accounts
D) implement password rotation every six months

A

Require complex passwords that include a combination of letters, numbers and special characters

Requiring complex passwords with a mix of letters, numbers, and special characters increases the difficulty for attackers to guess or crack passwords, enhancing security.

40
Q

Which technology should be implemented to provide a secure and encrypted connection for remote users to access internal resources?

A) virtual private network (VPN)
B) telnet
C) remote desktop protocol (RDP)
D) FTP ( file transfer protocol)

A

Virtual private network (VPN)

A VPN provides a secure and encrypted connection for remote users to access internal resources, ensuring data confidentiality and integrity.