N2K - Quiz - General Security Concepts Flashcards
When planning physical security, which type of sensor would be appropriate to detect a person’s body heat when the person enters a controlled space such as a server room?
A)Pressure sensor
B)Infrared sensor
C)Microwave sensor
D)Ultrasonic sensor
Infrared Sensor
Which technique can tip off an investigator that data files have been altered from a previous version?
A)Salting
B)Sandboxing
C)Hashing
D)Nonce
Hashing
You are a cybersecurity advisor for your organization. In a recent audit conducted by an external party, it was found that your organization lacks a process to track and manage assets and their relation to one another.
To remediate the finding, you have been asked to suggest a solution. What should you suggest?
A)Maintain an Excel file for all the IT assets and resources.
B)Implement a change management process
C)Implement a release management process.
D)Implement a configuration management process.
Implement a configuration management process.
Which type of deception and disruption technology contains decoy data that the attacker exfiltrates from the system?
A)Honeynet
B)Honeypot
C)Honeyfile
D)Honeytoken
Honeytoken
An accounting job role requires separation of duties to reduce the risk of fraud, with tasks spread across two employees. Due to a staffing shortage, you only have one person available to perform all of the tasks. You ask your business’s bank to start sending you weekly statements instead of monthly, and to create an automated email that will alert you if a withdrawal above a certain threshold is made.
Which type or category of control did you implement? Choose the BEST answer.
A)Managerial category
B)Operational category
C)Deterrent type
D)Preventative type
E)Compensating type
Compensating Type
Which concepts are associated with the zero-trust data plane? (Select two.)
A)Implicit trust zones
B)Policy administrator
C)Subject/system
D)Policy-driven access control
Implicit trust zones
Subject/System
What concept is demonstrated by representing a credit card number as --**-1234?
A)Tokenization
B)Steganography
C)Hashing
D)Data masking
Data Masking
Which element is created to ensure that your company is able to resume operation after unplanned downtime in a timely manner?
A)disaster recovery plan
B)business impact analysis (BIA)
C)vulnerability analysis
D)business continuity plan
Disaster Recovery Plan
Which of the following encryption tools is also known as a trusted execution environment (TEE)?
A)HSM
B)Key management system
C)TPM
D)Secure enclave
Secure Enclave
Which of the following options could be affected during the course of the change management process and should be considered in the impact analysis? (Choose as many as apply.)
A)Restricted activities
B)Stakeholder interests
C)Service restart
D)Allow lists/deny lists
E)Dependencies
Restricted activities
Service restart
Allow lists/deny lists
Dependencies
What is a physical barrier that acts as the first line of defense against an intruder?
A)a fence
B)an access control vestibule
C)a turnstile
D)a lock
E)a bollard
A Fence
When connecting to a website using SSL/TLS, the client browser uses the root CA’s public key to decrypt the digital signature of each certificate until finally verifying the identity associated with the website’s certificate. Which term or phrase describes this public key infrastructure (PKI) concept?
A)Certificate revocation
B)Certificate chaining
C)Key escrow
D)Key pairing
Certificate Chaining
Which of the following encryption levels offers the most granular control?
A)Partition
B)Record
C)Database
D)Volume
Record
Management wants you to provide full disk encryption for several of your organization’s computers. You purchase specialized chips that will be plugged into the computers’ motherboards to provide the encryption. Which security protocol, practice, or mechanism does this represent?
A)TPM
B)PAP
C)GPG
D)TwoFish
E)RipeMD
TPM
Which concepts are associated with the Zero Trust control plane? (Select two.)
A)Threat scope reduction
B)Implicit trust zones
C)Adaptive identity
D)Policy enforcement point
Threat Scope Reduction
Adaptive Identity