Modules 18-20 Flashcards

1
Q

Which type of access control applies the strictest access control and is commonly used in military or mission critical applications?

Non-discretionary access control
discretionary access control (DAC)
attribute-based access control (ABAC)
mandatory access control (MAC)

A

mandatory access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does BYOD change the way in which businesses implement networks?

BYOD requires organizations to purchase laptops rather than desktops.
BYOD provides flexibility in where and how users can access network resources.
BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.
BYOD devices are more expensive than devices that are purchased by an organization.

A

BYOD provides flexibility in where and how users can access network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)

total number of devices that attach to the wired and wireless network
assets that need protection
vulnerabilities in the system
location of attacker or attackers
past security breaches
threats to assets

A

assets that need protection
threats to assets
vulnerabilities in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is asset management a critical function of a growing organization against security threats?

It identifies the ever increasing attack surface to threats.
It allows for a build of a comprehensive AUP.
It serves to preserve an audit trail of all new purchases.
It prevents theft of older assets that are decommissioned.

A

It identifies the ever increasing attack surface to threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of business policy establishes the rules of conduct and the responsibilities of employees and employers?

employee
data
company
security

A

company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What device would be used as the third line of defense in a defense-in-depth approach?

host
firewall
internal router
edge router

A

internal router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the first line of defense when an organization is using a defense-in-depth approach to network security?

edge router
firewall
proxy server
IPS

A

edge router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary function of the Center for Internet Security (CIS)?

  • to maintain a list of common vulnerabilities and exposures (CVE) used by security organizations
  • to provide a security news portal that aggregates the latest breaking news pertaining to alerts, exploits, and vulnerabilities
  • to offer 24×7 cyberthreat warnings and advisories, vulnerability identification, and mitigation and incident responses
  • to provide vendor-neutral education products and career services to industry professionals worldwide
A

to offer 24×7 cyberthreat warnings and advisories, vulnerability identification, and mitigation and incident responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is CybOX?

  • It is a specification for an application layer protocol that allows the communication of CTI over HTTPS.
  • It is a set of standardized schemata for specifying, capturing, characterizing, and communicating events and properties of network operations.
  • It enables the real-time exchange of cyberthreat indicators between the U.S. Federal Government and the private sector.
  • It is a catalog of known security threats called Common Vulnerabilities and Exposures (CVE) for publicly known cybersecurity vulnerabilities.
A

It is a set of standardized schemata for specifying, capturing, characterizing, and communicating events and properties of network operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What three goals does a BYOD security policy accomplish? (Choose three.)

  • identify all malware signatures and synchronize them across corporate databases
  • identify which employees can bring their own devices
  • identify safeguards to put in place if a device is compromised
  • identify and prevent all heuristic virus signatures
  • identify a list of websites that users are not permitted to access
  • describe the rights to access and activities permitted to security personnel on the device
A

identify which employees can bring their own devices
identify safeguards to put in place if a device is compromised
describe the rights to access and activities permitted to security personnel on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the network. Which business goal will be addressed by this choice?

availability
manageability
security
scalability

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?

least privilege
network policy
password
audit

A

least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which component of the zero trust security model focuses on secure access when an API, a microservice, or a container is accessing a database within an application?

workflow
workforce
workload
workplace

A

workload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two options are security best practices that help mitigate BYOD risks? (Choose two.)

  • Use paint that reflects wireless signals and glass that prevents the signals from going outside the building.
  • Keep the device OS and software updated.
  • Only allow devices that have been approved by the corporate IT team.
  • Only turn on Wi-Fi when using the wireless network.
  • Decrease the wireless antenna gain level.
  • Use wireless MAC address filtering.
A

Keep the device OS and software updated.

Only turn on Wi-Fi when using the wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of mobile device management (MDM) software?

It is used to create a security policy.
It is used to implement security policies, setting, and software configurations on mobile devices.
It is used to identify potential mobile device vulnerabilities.
It is used by threat actors to penetrate the system.

A

It is used to implement security policies, setting, and software configurations on mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary purpose of the Forum of Incident Response and Security Teams (FIRST)?

  • to enable a variety of computer security incident response teams to collaborate, cooperate, and coordinate information sharing, incident prevention, and rapid reaction strategies
  • to provide a security news portal that aggregates the latest breaking news pertaining to alerts, exploits, and vulnerabilities
  • to offer 24×7 cyberthreat warnings and advisories, vulnerability identification, and mitigation and incident response
  • to provide vendor neutral education products and career services to industry professionals worldwide
A

to enable a variety of computer security incident response teams to collaborate, cooperate, and coordinate information sharing, incident prevention, and rapid reaction strategies

17
Q

What is the primary purpose of the Malware Information Sharing Platform (MISP) ?

  • to publish all informational materials on known and newly discovered cyberthreats
  • to enable automated sharing of IOCs between people and machines using the STIX and other exports formats
  • to provide a set of standardized schemata for specifying and capturing events and properties of network operations
  • to exchange all the response mechanisms to known threats
A

to enable automated sharing of IOCs between people and machines using the STIX and other exports formats

18
Q

Which organization defines unique CVE Identifiers for publicly known information-security vulnerabilities that make it easier to share data?

Cisco Talos
DHS
FireEye
MITRE

A

MITRE

19
Q

How does FireEye detect and prevent zero-day attacks?

by establishing an authentication parameter prior to any data exchange
by addressing all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis
by keeping a detailed analysis of all viruses and malware
by only accepting encrypted data packets that validate against their configured hash values

A

by addressing all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis

20
Q

A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?

availability
integrity
scalability
confidentiality

A

confidentiality

21
Q

What is the purpose of the network security accounting function?

to determine which resources a user can access
to provide challenge and response questions
to keep track of the actions of a user
to require users to prove who they are

A

to keep track of the actions of a user

22
Q

Which term describes the ability of a web server to keep a log of the users who access the server, as well as the length of time they use it?

authentication
accounting
assigning permissions
authorization

A

accounting

23
Q

What are two characteristics of the RADIUS protocol? (Choose two.)

encryption of the entire body of the packet
encryption of the password only
the use of UDP ports for authentication and accounting
the separation of the authentication and authorization processes
the use of TCP port 49

A

encryption of the password only
the use of UDP ports for authentication and accounting

24
Q

Which AAA component can be established using token cards?

accounting
authorization
authentication
auditing

A

authentication

25
Q

What is a characteristic of the security artichoke, defense-in-depth approach?

Threat actors can easily compromise all layers safeguarding the data or systems.
Threat actors no longer have to peel away each layer before reaching the target data or system.
Threat actors can no longer penetrate any layers safeguarding the data or system.
Each layer has to be penetrated before the threat actor can reach the target data or system.

A

Threat actors no longer have to peel away each layer before reaching the target data or system.

26
Q

What is a characteristic of a layered defense-in-depth security approach?

Three or more devices are used.
Routers are replaced with firewalls.
One safeguard failure does not affect the effectiveness of other safeguards.
When one device fails, another one takes over.

A

One safeguard failure does not affect the effectiveness of other safeguards.

27
Q

What is the principle behind the nondiscretionary access control model?

It applies the strictest access control possible.
It allows access decisions to be based on roles and responsibilities of a user within the organization.
It allows users to control access to their data as owners of that data.
It allows access based on attributes of the object be to accessed.

A

It allows access decisions to be based on roles and responsibilities of a user within the organization.

28
Q

Passwords, passphrases, and PINs are examples of which security term?

identification
access
authentication
authorization

A

authentication

29
Q

How does AIS address a newly discovered threat?

by creating response strategies against the new threat
by advising the U.S. Federal Government to publish internal response strategies
by enabling real-time exchange of cyberthreat indicators with U.S. Federal Government and the private sector
by mitigating the attack with active response defense mechanisms

A

by enabling real-time exchange of cyberthreat indicators with U.S. Federal Government and the private sector