Module 13 Flashcards
Which of the following is NOT part of the AAA framework?
a. Authentication
b. Access
c. Authorization
d. Accounting
b. Access
Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking?
a. Data custodian/steward
b. Data privacy officer
c. Data controller
d. Data processor
a. Data custodian/steward
Which access control scheme is the most restrictive?
a. Role-Based Access Control
b. DAC
c. Rule-Based Access Control
d. MAC
d. MAC
Which type of access control scheme uses predefined rules that makes it the most flexible scheme?
a. ABAC
b. DAC
c. MAC
d. NAC
a. ABAC
Which statement about Rule-Based Access Control is true?
a. It requires that a custodian set all rules.
b. It is no longer considered secure.
c. It dynamically assigns roles to subjects based on rules.
d. It is considered a real-world approach by linking a user’s job function with security
a. It requires that a custodian set all rules.
Which of these is a set of permissions that is attached to an object?
a. ACL
b. SRE
c. Object modifier
d. Entity attribute (EnATT)
a. ACL
What can be used to provide both filesystem security and database security?
a. RBASEs
b. LDAPs
c. CHAPs
d. ACLs
d. ACLs
What is the amount of time added to or subtracted from Coordinated Universal Time to determine local time?
a. Greenwich Mean Time (GMT)
b. Civil time
c. Daylight savings time
d. Time offset
d. Time offset
Cheryl has been asked to set up a user account explicitly to provide a security context for services running on a server. What type of account will she create?
a. Generic account
b. Service account
c. User account
d. Privilege account
b. Service account
Which of these is NOT an incident response process step?
a. Recovery
b. Reporting
c. Eradication
d. Lessons learned
b. Reporting
Which of the following is typically a monthly discussion of a scenario conducted in an informal and stress-free environment to evaluate an incident response plan?
a. Walkthrough
b. Simulation
c. Tabletop
d. Incident Response Plan Evaluation (IRP-E)
c. Tabletop
Ella wants to research an attack framework that incorporates adversary, infrastructure, capability, and victim. Which of the following would she choose?
a. Diamond Model of Intrusion Analysis
b. Cyber Kill Chain
c. Mitre ATT&CK
d. Basic-Advanced Incident (BAI) Framework
a. Diamond Model of Intrusion
Blaise needs to create a document that is a linear-style checklist of required manual steps and actions needed to successfully respond to a specific type of incident. What does she need to create?
a. Playbook
b. Runbook
c. SIEM-book
d. ARC Codebook
a. Playbook
Which of the following should be performed in advance of an incident?
a. Containment
b. Segmentation
c. Isolation
d. Capture
b. Segmentation
What is a platform used to provide telephony, video, and web conferences that can serve as an entry point to a threat actor?
a. SIP
b. VoIP
c. Call manager
d. IP voice
c. Call manager
Which of the following is NOT a problem associated with log management?
a. Multiple devices generating logs
b. Large volume of log data
c. Different log formats
d. Time-stamped log data
d. Time-stamped log data
Which tool is an open source utility for UNIX devices that includes content filtering?
a. syslog
b. nxlog
c. rsyslog
d. syslog-ng
a. syslog
Which of the following is a packet sampling protocol that gives a statistical sample instead of the actual flow of packets?
a. NetFlow
b. sFlow
c. IPFIX
d. journalctl
b. sFlow
Which of the following is the most fragile and should be captured first in a forensics investigation?
a. ARP cache
b. Kernel statistics
c. CPU cache
d. RAM
c. CPU cache
Which of the following is a Linux utility that displays the contents of system memory?
a. Autopsy
b. WinHex
c. dd
d. memdump
d. memdump
- Which of the following log management tools has content filtering?
journalctl
rsyslog
nxlog
syslog-ng
syslog-ng is an open-source utility for UNIX devices that includes content filtering.
In a security meeting, you are asked to suggest access control schemes in which you have high flexibility when configuring access to the enterprise resources.
Which of the following should you suggest?
- Attribute-based access control
- Role-based access control
- Rule-based access control
- Mandatory access control
Attribute-based access control is highly flexible, as it uses policies that can combine different attributes.
A security breach recently occurred in your enterprise. During the incident investigation, you are asked to examine network-based device logs. Which of the following network devices should you examine first?
- DNS
- Routers and switches
- Firewall
- NIDS and NIPS
Firewall log files should be examined first, as the firewall is the primary network device through which traffic passes.
Which of the following is a legal complication related to forensics that should be considered when creating a cloud platform?
- Total unavailability of digital evidence
- Jurisdictional applicability
- Time elapsed before noticing an incident
- High legal expenses
Legal procedures will be based on the jurisdiction where the cloud resources are located, making legal actions on cloud forensics complicated because those laws will likely not be applicable in another jurisdiction in another country.