Introduction to Security Terminology Flashcards
Your company issues smart phones to employees for business use. Corporate policy dictates that all data stored on smart phones must be encrypted. To which fundamental security concept does this apply?
Confidentiality
Integrity
Availability
Confidentiality
Confidentiality ensures that data is accessible only to those parties who should be authorized to access the data. Encrypting data stored on smart phones protects that data if the phone is lost or stolen
You are the network administrator for your company. Your manager has asked you to evaluate cloud backup solutions for remote branch offices. To which fundamental security concept does this apply?
Confidentiality
Integrity
Availability
Availability
Backing up data is a safeguard in case data is corrupted or deleted, thus making that data available when required
Your company requires all desktop computers to run a malware detection program twice daily. You configure your network so that only the specific digital version of the executable program that you specify is allowed to run. To which fundamental security concept does this apply?
Confidentiality
Integrity
Availability
Integrity
Integrity ensures that data actually comes from the user or device it appears to have come from and that the data has not been altered. File hashing can be used to validate that a specific version of a file is being used
You store personal documents and spreadsheets with a cloud provider. You would like your data to be available only to people who have a special unlock key. What should you apply to your documents and spreadsheets?
File hashing
File backup
File encryption
File encryption
File encryption can be implemented using a passphrase or unlock key so that only parties with knowledge of the unlock key can decrypt the data
You would like to send a confidential message to a family member through e-mail, but you have no way of encrypting the message. What alternative method would enable you to achieve your goal?
PKI
File hashing
Steganography
Steganography
Steganography is the act of hiding a message within an innocent-looking medium. A common example would be storing invisible hidden messages within pictures such that the receiving party would have to extract the hidden messages. Unsuspecting parties would see only a picture
A corporate security policy emphasizes data confidentiality, and you must configure computing devices accordingly. What should you do? (Choose two.)
Install smartcard readers so users can identify themselves before sending important e-mail messages.
Enforce SD card encryption on smart phones issued to employees.
Configure a server failover cluster to ensure that sensitive documents are always available.
Set file and folder permissions to control user file access.
Enforce SD card encryption on smart phones issued to employees.
Set file and folder permissions to control user file access.
Encrypting data and setting file and folder permissions both keep data confidential. Remember that educating users about security and specific organization policies is crucial
Michel, an IT security expert, grants permissions to folders on a file server to enable Marketing users to modify Marketing documents. Which information security goal has been satisfied?
Confidentiality
Integrity
Availability
Confidentiality
Confidentiality is achieved by allowing only Marketing users to modify Marketing documents. User accounts for Marketing staff must be secured properly, including account lockout and password policy settings
You need to implement a solution that ensures data stored on a USB removable drive has not been tampered with. What should you implement?
Steganography
File backup
File hashing
File hashing
File hashing generates a unique value from a specific version of a file. When a file is modified and the hash value is computed once again, it will be different
Ana must send an important e-mail message to Glen, the director of Human Resources (HR). Corporate policy states that messages to HR must be digitally signed. Which of the following statements is correct?
Ana’s public key is used to create the digital signature.
Ana’s public key is used to verify the digital signature.
Glen’s private key is used to create the digital signature.
Ana’s public key is used to verify the digital signature.
Digital signatures are created with the sender’s private key and verified with the sender’s mathematically related public key
John is issuing a digital certificate for Carolyn’s computer. What can the certificate be used for? (Choose two.)
Setting permissions on sensitive files
Encrypting sensitive files
Verifying the computer’s identity to secure servers
Sending encrypted e-mail messages
Encrypting sensitive files
Verifying the computer’s identity to secure servers
The public and private key pair within a digital certificate can be used to encrypt and decrypt sensitive files. Digital certificates can also be used to authenticate a computer to a secure server or appliance, such as a VPN server
Every month, Gene downloads and tests the latest software patches before applying them to production smart phones. To which security goal does this example apply?
Confidentiality
Integrity
Availability
Availability
Patching devices helps ensure that they are available and secure
You are evaluating public cloud-based e-mail hosting solutions. All vendors state that multiple servers are always running to ensure mailboxes are available. What is this an example of?
Clustering
Steganography
Digital mailbox signatures
Clustering
Clustering makes network services, such as e-mail, always available even if a mail server goes down
Your network allows only trusted scripts to run on managed devices. You write a script that must run on all managed devices. What must you do? Place the following correct steps in proper order. (Choose three.)
Obtain a trusted digital certificate and install it on your computer.
Export the private key from your digital certificate to all managed devices.
Create the script.
Digitally sign the script.
On your computer, import digital certificates from all managed devices.
Obtain a trusted digital certificate and install it on your computer.
Create the script.
Digitally sign the script.
A trusted code-signing digital certificate must first be installed on your computer before you can sign a script. Target devices must trust the code-signing certificate to allow signed scripts to run. This prevents malicious code from threat actors from running
You would like to track the modification of sensitive trade secret files. What should you implement?
Auditing
Encryption
File hashing
Auditing
Auditing the modification of files will identify who made changes from a specific machine at a certain date and time
Which party determines how data labels are assigned?
Custodian
Owner
Privacy officer
Owner
Data owners decide how data should be labeled, such as top secret or publicly available
Which of the following organizes the appropriate identification methods from least secure to most secure?
Smartcard, retinal scan, password
Retinal scan, password, smartcard
Username and password, smartcard, retinal scan
Username and password, smartcard, retinal scan
Username/password is single-factor authentication (something you know). Smartcard authentication is multifactor (something you have and something you know), and retinal scans are something you are, which is difficult to forge