Introduction to Security Terminology Flashcards
Your company issues smart phones to employees for business use. Corporate policy dictates that all data stored on smart phones must be encrypted. To which fundamental security concept does this apply?
Confidentiality
Integrity
Availability
Confidentiality
Confidentiality ensures that data is accessible only to those parties who should be authorized to access the data. Encrypting data stored on smart phones protects that data if the phone is lost or stolen
You are the network administrator for your company. Your manager has asked you to evaluate cloud backup solutions for remote branch offices. To which fundamental security concept does this apply?
Confidentiality
Integrity
Availability
Availability
Backing up data is a safeguard in case data is corrupted or deleted, thus making that data available when required
Your company requires all desktop computers to run a malware detection program twice daily. You configure your network so that only the specific digital version of the executable program that you specify is allowed to run. To which fundamental security concept does this apply?
Confidentiality
Integrity
Availability
Integrity
Integrity ensures that data actually comes from the user or device it appears to have come from and that the data has not been altered. File hashing can be used to validate that a specific version of a file is being used
You store personal documents and spreadsheets with a cloud provider. You would like your data to be available only to people who have a special unlock key. What should you apply to your documents and spreadsheets?
File hashing
File backup
File encryption
File encryption
File encryption can be implemented using a passphrase or unlock key so that only parties with knowledge of the unlock key can decrypt the data
You would like to send a confidential message to a family member through e-mail, but you have no way of encrypting the message. What alternative method would enable you to achieve your goal?
PKI
File hashing
Steganography
Steganography
Steganography is the act of hiding a message within an innocent-looking medium. A common example would be storing invisible hidden messages within pictures such that the receiving party would have to extract the hidden messages. Unsuspecting parties would see only a picture
A corporate security policy emphasizes data confidentiality, and you must configure computing devices accordingly. What should you do? (Choose two.)
Install smartcard readers so users can identify themselves before sending important e-mail messages.
Enforce SD card encryption on smart phones issued to employees.
Configure a server failover cluster to ensure that sensitive documents are always available.
Set file and folder permissions to control user file access.
Enforce SD card encryption on smart phones issued to employees.
Set file and folder permissions to control user file access.
Encrypting data and setting file and folder permissions both keep data confidential. Remember that educating users about security and specific organization policies is crucial
Michel, an IT security expert, grants permissions to folders on a file server to enable Marketing users to modify Marketing documents. Which information security goal has been satisfied?
Confidentiality
Integrity
Availability
Confidentiality
Confidentiality is achieved by allowing only Marketing users to modify Marketing documents. User accounts for Marketing staff must be secured properly, including account lockout and password policy settings
You need to implement a solution that ensures data stored on a USB removable drive has not been tampered with. What should you implement?
Steganography
File backup
File hashing
File hashing
File hashing generates a unique value from a specific version of a file. When a file is modified and the hash value is computed once again, it will be different
Ana must send an important e-mail message to Glen, the director of Human Resources (HR). Corporate policy states that messages to HR must be digitally signed. Which of the following statements is correct?
Ana’s public key is used to create the digital signature.
Ana’s public key is used to verify the digital signature.
Glen’s private key is used to create the digital signature.
Ana’s public key is used to verify the digital signature.
Digital signatures are created with the sender’s private key and verified with the sender’s mathematically related public key
John is issuing a digital certificate for Carolyn’s computer. What can the certificate be used for? (Choose two.)
Setting permissions on sensitive files
Encrypting sensitive files
Verifying the computer’s identity to secure servers
Sending encrypted e-mail messages
Encrypting sensitive files
Verifying the computer’s identity to secure servers
The public and private key pair within a digital certificate can be used to encrypt and decrypt sensitive files. Digital certificates can also be used to authenticate a computer to a secure server or appliance, such as a VPN server
Every month, Gene downloads and tests the latest software patches before applying them to production smart phones. To which security goal does this example apply?
Confidentiality
Integrity
Availability
Availability
Patching devices helps ensure that they are available and secure
You are evaluating public cloud-based e-mail hosting solutions. All vendors state that multiple servers are always running to ensure mailboxes are available. What is this an example of?
Clustering
Steganography
Digital mailbox signatures
Clustering
Clustering makes network services, such as e-mail, always available even if a mail server goes down
Your network allows only trusted scripts to run on managed devices. You write a script that must run on all managed devices. What must you do? Place the following correct steps in proper order. (Choose three.)
Obtain a trusted digital certificate and install it on your computer.
Export the private key from your digital certificate to all managed devices.
Create the script.
Digitally sign the script.
On your computer, import digital certificates from all managed devices.
Obtain a trusted digital certificate and install it on your computer.
Create the script.
Digitally sign the script.
A trusted code-signing digital certificate must first be installed on your computer before you can sign a script. Target devices must trust the code-signing certificate to allow signed scripts to run. This prevents malicious code from threat actors from running
You would like to track the modification of sensitive trade secret files. What should you implement?
Auditing
Encryption
File hashing
Auditing
Auditing the modification of files will identify who made changes from a specific machine at a certain date and time
Which party determines how data labels are assigned?
Custodian
Owner
Privacy officer
Owner
Data owners decide how data should be labeled, such as top secret or publicly available
Which of the following organizes the appropriate identification methods from least secure to most secure?
Smartcard, retinal scan, password
Retinal scan, password, smartcard
Username and password, smartcard, retinal scan
Username and password, smartcard, retinal scan
Username/password is single-factor authentication (something you know). Smartcard authentication is multifactor (something you have and something you know), and retinal scans are something you are, which is difficult to forge
You are explaining how the corporate file auditing policy will work to a new IT employee. Place the following items in the correct order: ___, ___, ___, and ___.
A user opens a file, modifies the contents, and then saves the file.
A server validates a correct username and password combination.
A user provides a username and password at a logon screen.
The file activity generated by the user is logged.
A user provides a username and password at a logon screen.
A server validates a correct username and password combination.
A user opens a file, modifies the contents, and then saves the file.
The file activity generated by the user is logged.
After a user identifies himself with a username and password, authentication then occurs. Upon successful authentication, a user is then authorized to access the appropriate files. If the user’s current action is being audited for a given file, this information is logged
Your manager has asked you to implement a solution that will prevent users from viewing inappropriate web sites. Which solution should you employ?
Router ACLs
Web site permissions
Proxy server
Proxy server
Proxy servers retrieve content that users request. Because of this, proxy servers can easily prevent users from accessing inappropriate content
Trinity uses her building access card to enter a work facility after hours. She has access to only the second floor. What is this an example of?
Authorization
Authentication
Accountability
Authorization
Authorization means having legitimate access to specific resources such as web sites, files on a file server, or, in this case, access to a specific floor in a building
Sean is capturing Wi-Fi network traffic using a packet analyzer and is able to read the contents of network transmissions. What can be done to keep network transmissions private?
Install digital certificates on each transmitting device.
Use smartcard authentication.
Encrypt the Wi-Fi traffic.
Encrypt the Wi-Fi traffic.
The network transmissions can be kept private by encrypting all Wi-Fi traffic using Wi-Fi encryption protocols such as Wi-Fi Protected Access 2 (WPA2)
Which security mechanisms can be used for the purpose of nonrepudiation? (Choose two.)
Encryption
Clustering
Auditing
Digital signatures
Auditing
Digital signatures
Auditing can track activities from a specific user or computer. Digital signatures are unique in that they are created using a user’s or computer’s private key, which is accessible only to that user or computer. Both of these mechanisms invalidate any denials related to activities from the user or computer
You are the network administrator for a pharmaceutical firm. Last month, the company hired a third party to conduct a security audit. From the audit findings, you learn that customers’ confidential medical data is not properly secured. Which security concept has been ignored in this case?
Due diligence
Due care
Due process
Due care
Due care means taking steps to address a security problem, such as ensuring client data is kept confidential
Which of the following are the best examples of the Custodian security role? (Choose three.)
Human Resources department employee
Server backup operator
CEO
Law enforcement employee responsible for signing out evidence
Sales executive
Human Resources department employee
Server backup operator
Law enforcement employee responsible for signing out evidence
Custodians are responsible for maintaining access to and the integrity of data. Human Resources employees, server backup operators, and law enforcement employees all must ensure that data access and integrity are preserved
Franco, an accountant, accesses a shared network folder containing travel expense documents to which he has read and write access. What is this an example of?
Privilege escalation
Due care
Authorization
Authorization
Franco is accessing an item that he has legitimate access to; this is authorization