Module 13 Flashcards
Which of the following is NOT part of the AAA framework?
a. Authentication
b. Access
c. Authorization
d. Accounting
b. Access
Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking?
a. Data custodian/steward
b. Data privacy officer
c. Data controller
d. Data processor
a. Data custodian/steward
Which access control scheme is the most restrictive?
a. Role-Based Access Control
b. DAC
c. Rule-Based Access Control
d. MAC
d. MAC
Which type of access control scheme uses predefined rules that makes it the most flexible scheme?
a. ABAC
b. DAC
c. MAC
d. NAC
a. ABAC
Which statement about Rule-Based Access Control is true?
a. It requires that a custodian set all rules.
b. It is no longer considered secure.
c. It dynamically assigns roles to subjects based on rules.
d. It is considered a real-world approach by linking a user’s job function with security
a. It requires that a custodian set all rules.
Which of these is a set of permissions that is attached to an object?
a. ACL
b. SRE
c. Object modifier
d. Entity attribute (EnATT)
a. ACL
What can be used to provide both filesystem security and database security?
a. RBASEs
b. LDAPs
c. CHAPs
d. ACLs
d. ACLs
What is the amount of time added to or subtracted from Coordinated Universal Time to determine local time?
a. Greenwich Mean Time (GMT)
b. Civil time
c. Daylight savings time
d. Time offset
d. Time offset
Cheryl has been asked to set up a user account explicitly to provide a security context for services running on a server. What type of account will she create?
a. Generic account
b. Service account
c. User account
d. Privilege account
b. Service account
Which of these is NOT an incident response process step?
a. Recovery
b. Reporting
c. Eradication
d. Lessons learned
b. Reporting
Which of the following is typically a monthly discussion of a scenario conducted in an informal and stress-free environment to evaluate an incident response plan?
a. Walkthrough
b. Simulation
c. Tabletop
d. Incident Response Plan Evaluation (IRP-E)
c. Tabletop
Ella wants to research an attack framework that incorporates adversary, infrastructure, capability, and victim. Which of the following would she choose?
a. Diamond Model of Intrusion Analysis
b. Cyber Kill Chain
c. Mitre ATT&CK
d. Basic-Advanced Incident (BAI) Framework
a. Diamond Model of Intrusion
Blaise needs to create a document that is a linear-style checklist of required manual steps and actions needed to successfully respond to a specific type of incident. What does she need to create?
a. Playbook
b. Runbook
c. SIEM-book
d. ARC Codebook
a. Playbook
Which of the following should be performed in advance of an incident?
a. Containment
b. Segmentation
c. Isolation
d. Capture
b. Segmentation
What is a platform used to provide telephony, video, and web conferences that can serve as an entry point to a threat actor?
a. SIP
b. VoIP
c. Call manager
d. IP voice
c. Call manager