Module 13: Incident Preparation, Response, & Investigation Q Flashcards
While talking to a new client, the client asked you why access control is mostly used in enterprise networks rather than home networks.
How should you reply?
An enterprise network will have more sensitive and confidential information
When multiple individuals could potentially have access to sensitive information in an enterprise, access control is essential
Who implements access control based on the security level determined by the data owner?
Data custodian
Data custodians, or stewards, implement access control based on the security level determined by the data owner
You are working as a security admin in an enterprise and have been asked to choose an access control method so that all users can access multiple systems without crossing their limit of access. Which of the following access control methods is the best fit?
Rule-based access control
Rule-based access control is the best fit in this case, as rule-based access control dynamically assigns roles to subjects based on a set of rules defined by a custodian
Which of the following access control schemes is most secure?
Mandatory access control
MAC is the most restrictive and most secure access control scheme, as the end user has no control over the objects
In a security meeting, you are asked to suggest access control schemes in which you have high flexibility when configuring access to the enterprise resources.
Which of the following should you suggest?
Attribute-based access control
Attribute-based access control is highly flexible, as it uses policies that can combine different attributes
The devices in your enterprise are configured with mandatory access control in which salaries.xlsx is labeled “secret,” transactions.xlsx is labeled “top secret,” and employees.xlsx is labeled “confidential.” You were asked to configure the user clearance so that User A can access all three files, while User B can only access employees.xlsx.
How should you configure the user clearance?
User A: top secret; User B: confidential
Top secret clearance allows User A to access all three files, and confidential clearance only allows User B to access employees.xlsx
Who ensures the enterprise complies with data privacy laws and its own privacy policies?
Data privacy officer
The data privacy officer oversees data privacy compliance and manages data risk
Which of the following access management controls best fits a home network?
Discretionary access control
DAS best fits a home network since it can be easily managed, and there are fewer restrictions imposed on home networks
Windows switches to Secure Desktop Mode when the UAC prompt appears. What is the objective of Secure Desktop Mode?
To prevent malware from tricking users by spoofing what appears on the screen
Secure Desktop Mode allows only integrity level system-trusted processes to run. This prevents malware from spoofing what appears on the screen to trick users
You are working as a security administrator. Your enterprise has asked you to choose an access control scheme in which a user is authorized to access the resources if the user has a specific attribute and denied if they don’t.
Which of the following access control schemes should you choose?
Attribute-based access control
Attribute-based access control rules can be formatted using an if-then-else structure
You are a data steward. You have been asked to restrict User A, who has an access clearance of “top secret” in a MAC-enabled network, from accessing files with the access label “secret.” This, in turn, does not affect any other user.
What action should you take?
Change the access clearance of User A to “confidential”
Changing User A’s access clearance to “confidential” will restrict User A from accessing “secret” files
You are a senior security admin in your enterprise. You have been asked to perform an incident response exercise so that you and your colleagues can analyze every possible scenario in case of an attack in the most realistic manner.
Which of the following actions should you take?
You should run a plausible simulated attack on the network
Simulating an attack using a realistic scenario allows for the most realistic analysis of every possible attack scenario
Which of the following attack frameworks illustrate that attacks are an integrated end-to-end process, and disrupting any one of the steps will interrupt the entire attack process?
Cyber Kill Chain
Cyber Kill Chain illustrates that attacks are an integrated end-to-end process, and disrupting any one of the steps will interrupt the entire attack process
In a security review meeting, you are asked to make sure that the cybersecurity team is constantly updated on the tactics used by threat actors when they interact with systems during an attack. To which of the following attack frameworks will you refer to meet the goal?
MITRE ATT&CK
MITRE ATT&CK is a knowledge base of attacker techniques that have been broken down and classified in detail. MITRE ATT&CK focuses on how threat actors interact with systems during an operation
Containment is most effective when the network is properly designed. Which of the following contributes to effective network design?
Network segmentation
Network segmentation helps contain attacks in properly designed networks