IS3220 CHAPTER 6 Flashcards

1
Q

Less rigorous than training or education this security training focuses on common or basic security elements that all employees must know and abide by. This is called ___?

A

AWARENESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This process of making copies of data onto other storage media is called ___?
The purpose is to protect against data loss by having additional onsite or offsite copies of data that can be restored when necessary.

A

BACKUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A plan to maintain the mission-critical functions of the organization in the event of a problem that threatens to take business processes offline is called ___?
The goal is to prevent the interruption of business tasks, even with a damaged environment and reduced resources.

A

BUSINESS CONTINUITY PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A detailed and thorough review of the deployed security infrastructure compared with the organization’s security policy and any applicable laws and regulations is called ___?

A

COMPLIANCE AUDIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security stance that blocks all access to all resources until a valid authorized explicit exemption is defined is called ___?

A

DEFAULT DENY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security stance that allows all access to all resources until an explicit exception is defined is called ___?

A

DEFAULT PERMIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A plan to restore the mission-critical functions of the organization once they have been interrupted by an adverse event is called ___?
The goal of this is to return the business to functional operation within a limited time to prevent the failure of the organization to the incident.

A

DISASTER RECOVERY PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The third and highest level of obtaining security knowledge that leads to career advancement is called ___?
This is broad and not necessarily focused on specific job tasks or assignments. More rigorous than awareness or training.

A

EDUCATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A form of security protection that protects individual files by scrambling the contents in such a way as to render them unusable by unauthorized third parties is called ___?

A

FILE ENCRYPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A collection of multiple honey pots in a network for the purposes of luring and trapping hackers is called ___?

A

HONEYNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A predefined procedure to react to security breaches to limit damage, contain the spread of malicious content, stop compromise of information, and promptly restore the environment to a normal state. This is called ___?

A

INCIDENT RESPONSE PLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The state or condition of an asset or process vitally important to the long-term existence and stability of an organization is called ___?
If this element is interrupted or removed, it often results in the failure of the organization.

A

MISSION-CRITICAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Specialized host used to place an attacker into a system where the intruder cannot do any harm is called ___?

A

PADDED CELL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The guideline that all users should be granted only the minimum level of access and permission required to perform their assigned job tasks and responsibilities is called ___?

A

PRINCIPLE OF LEAST PRIVILEGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security guideline, procedure, or recommendation manual is called ___?

A

SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An administrative rule whereby no single individual possesses sufficient rights to perform certain actions is called ___?
Achieved by dividing administrative level tasks and powers among compartmentalized administrators.

A

SEPARATION OF DUTIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The use of only a single element of validation or verification to prove the identity of a subject and considered much weaker than multi-factor authentication is called ___?

A

SINGLE-FACTOR AUTHENTICATION

18
Q

The second level of knowledge distribution offered by an organization to educate users about job task focused security concerns is called ___?
More rigorous than awareness: less rigorous than education.

A

TRAINING

19
Q

A dedicated microchip found on some motherboards that host and protect the encryption key for whole hard drive encryption is called ___?

A

TRUSTED PLATFORM MODULE (TPM)

20
Q

A form of investigation that aims at checking whether or not a target system is subject to attack based on a database of test, scripts, and simulated exploits is called ___?

A

VULNERABILITY SCANNING

21
Q

The process of encrypting an entire hard drive rather than just individual files is called ___?
In most cases, this provides better security against unauthorized access than file encryption, because it encrypts temporary directories and slack space.

A

WHOLE HARD DRIVE ENCRYPTION

22
Q
  1. All of the following are examples of network security management best practices EXCEPT:
  2. Write a security policy
  3. Obtain senior management endorsement
  4. Filter Internet connectivity
  5. Provide fast response time to customers
  6. Implement defense-in-depth
A

Provide fast response time to customers

23
Q
  1. All of the following are examples of network security management best practices EXCEPT:
  2. Avoid remote access
  3. Purchase equipment from a single vendor
  4. Use whole heard drive encryption
  5. Implement IPSec
  6. Harden internal and border devices
A

Purchase equipment from a single vendor

24
Q
  1. All the following are examples of network security management best practices EXCEPT:
  2. Use multi-factor authentication
  3. Backup
  4. Have a business continuity plan
  5. Prioritize
  6. Spend each year’s budget in full
A

Spend each year’s budget in full

25
Q
  1. A firewall host that fails and reverts to a state where all communication between the Internet and the DMZ is cut off displays a type of defense known as:
  2. Default permit
  3. Explicit deny
  4. Fail-close
  5. Egress filtering
  6. Security through obscurity
A

Fail-close

26
Q
  1. The purpose of physical security access control is to:
  2. Grant access to external entities
  3. Prevent external attacks from coming through the firewall
  4. Provide teachable scenarios for training
  5. Limit interaction between people and devices
  6. Protect against authorized communications over external devices
A

Protect against authorized communications over external devices

27
Q
  1. A complete and comprehensive security approach needs to address or perform two main functions, the first is to secure assets and the second is:
  2. Watch for violation attempts
  3. Prevent downtime
  4. Verify identity
  5. control access to resources
  6. Design the infrastructure based on the organization’s mission
A

Watch for violation attempts

28
Q
  1. Incident response is the planned reaction to negative situations or events. Which of the following is NOT a common step or phase in an incident response?
  2. Containment
  3. Recovery
  4. Eradication
  5. Detection
  6. Assessment
A

Assessment

29
Q
  1. All of the following are elements of an effective network security installation EXCEPT:
  2. Backup
  3. Recovery
  4. Eradication
  5. Detection
  6. Assessment
A

Assessment

30
Q
  1. The task of compartmentalization is focused on as siting with what overarching security concern?
  2. Limiting damage caused by intruders
  3. Filtering traffic based on volume
  4. Controlling access based on location
  5. Supporting transactions through utilization
  6. Assess security
A

Limiting damage caused by intruders

31
Q
  1. Which of the following types of security components are important to install on all hosts?
  2. Firewall
  3. Antivirus
  4. Whole hard drive encryption
  5. Spyware defense
  6. All the above
A

Firewall
Antivirus
Whole hard drive encryption
Spyware defense

32
Q
  1. What is the only protection against data loss?
  2. Integrity checking
  3. Encryption
  4. Traffic filtering
  5. Backup and recovery
  6. Auditing
A

Backup and recovery

33
Q
  1. All the following are common mistakes or security problems that should be addressed in awareness training EXCEPT:
  2. Opening email attachments from unknown sources
  3. Using resources from other subnets of which the host is not a member
  4. Installing unapproved software on work computers
  5. Failing to make backups of personal data
  6. Walking awry from a computer while still logged in
A

Using resources from other subnets of which the host is not a member

34
Q
  1. The best network security management tools include all of the following EXCEPT:
  2. Complete inventory of equipment
  3. Written security policy
  4. Expensive commercial products
  5. Logical organization map
  6. Change documentation
A

Expensive commercial products

35
Q
  1. The purpose of a security checklist is:
  2. To keep an inventory of equipment
  3. To create shopping list for replacement parts
  4. To ensure that all security elements are still effective
  5. To complete the security documentation for the organization
  6. To assess the completeness of the infrastructure
A

To ensure that all security elements are still effective

36
Q
  1. Which of the following is NOT a potential hazard when installing patches or updates?
  2. Resetting configuration back to factory defaults
  3. Reducing security
  4. Bricking the device
  5. Installing untested code
  6. Improving resiliency against exploits
A

Improving resiliency against exploits

37
Q
  1. Which of the following is a true statement in regards to compliance auditing?
  2. Compliance auditing is a legally mandated task for every organization
  3. Compliance auditing ensures that all best practices are followed
  4. Compliance auditing creates a security policy
  5. Compliance auditing is an optional function for the financial and medical industries
  6. Compliance auditing verifies that industry specific regulations and laws are followed
A

Compliance auditing verifies that industry specific regulations and laws are followed

38
Q
  1. Which of the following is not typically considered a form of network security assessment in terms of how well existing security stands up to current threats?
  2. Configuration scan
  3. Compliance
  4. Vulnerability assessment
  5. Ethical hacking
  6. Penetration testing
A

Compliance

39
Q
  1. Which of the following cannot be performed adequately using an automated tool?
  2. Checking for current patches
  3. Confirming configuration settings
  4. Vulnerability assessment
  5. Scanning for known weaknesses
  6. Ethical hacking
A

Ethical hacking

40
Q
  1. What is the key factor that determines how valuable and relevant a vulnerability assessment’s report is?
  2. Timeliness of the database
  3. Whether the product is open sourced
  4. The platform hosting the scanning engine
  5. The time of day the scan is performed
  6. The available bandwidth on the network
A

Timeliness of the database

41
Q
  1. What is the primary purpose of a post-mortem assessment review?
  2. Reducing costs
  3. Adding new tools and resources
  4. Placing blame on an individual
  5. Learning from mistakes
  6. Extending the length of time consumed by a task
A

Learning from mistakes

42
Q

The procedure of watching for the release of new updates from vendors is called ___?
This includes testing the patches, obtain approval, then overseeing the deployment and implementation of updates across the production environment.

A

PATCH MANAGEMENT