my class Flashcards
cram
A __________ consists of multiple servers using ______________.
web farm, network load balancing
Bob is the project manager for his company’s security countermeasure implementation project. Michael informs Bob that task #12 (implementing a failover cluster) will not finish on time. Because task #12 is on the project’s __________, Bob knows that the project will not complete on time and sets up a meeting to inform the stakeholders.
critical path
Which of the following is not commonly included in a cost-benefit analysis (CBA)?
A business continuity plan (BCP)
All of the following would be specified in a password policy, except:
password management.
Which tool is most commonly used to prioritize mitigation efforts?
Threat likelihood/impact matrix
What are overlapping countermeasures?
Different countermeasures that attempt to mitigate the same risk
What is the primary tool used to ensure countermeasures are implemented?
Plan of action and milestones (POAM)
Which approach to firewall rules starts off by blocking all traffic and then adding rules to allow approved traffic?
Implicit deny
After being fired, an employee becomes disgruntled. The managers never disabled his login information, and his best friend still works at the company. The disgruntled employee gives his friend his login information for the company’s private network and convinces the friend to delete important files from the company’s database. You are confused when you review the audit logs and see that the disgruntled employee has been logging in from within the office every day for the past week. What has been lost in this scenario?
Nonrepudiation
Which of the following terms is best defined as a weakness?
Vulnerability
___________ prevents individuals from denying they took an action.
Nonrepudiation
What is the purpose of a risk mitigation plan?
To implement countermeasures
The National Institute of Standards and Technology (NIST) publishes SP 800-53. This document describes a variety of IT security controls, such as access control, incident response, and configuration management. Controls are grouped into families. Which NIST control family helps an organization recover from failures and disasters?
Contingency Planning (CP)
Which of the following is a physical control that is most likely to be used with a proximity card?
A locked door
Purchasing insurance is the primary way for an organization to __________ or ___________ risk.
share, transfer
Which of the following is not a true statement about AES?
AES is the primary asymmetric encryption protocol used today.
A hacker wants to launch an attack on an organization. The hacker uses a tool to capture data sent over the network in cleartext, hoping to gather information that will help make the attack successful. What tool is the hacker using?
A packet analyzer
What changes plaintext data to ciphered data?
Encryption
__________ provide the detailed steps needed to carry out ___________.
Procedures, policies
Which of the following is not one of the three primary objectives of controls?
Eliminate
What is the purpose of nonrepudiation techniques?
To prevent people from denying they took actions
Some controls are identified based on the function they perform. What are the broad classes of controls based on function?
Preventative, detective, corrective
Which of the following is most likely to describe how to perform test restores?
A backup plan
A business continuity plan (BCP) is an example of a(n):
security plan.