Organizational Security Flashcards

0
Q

What does quantitative risk analysis include?

A

Quantitative risk analysis includes intangible factors such as a loss of potential business in determining costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is quantitative risk analysis.

A

Quantitative risk analysis is a dollar amount calculation of the exact cost of the loss due to a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you calculate in your Annual Loss Expectancy (ALE)?

A

ALE is calculated by multiplying the Annual Rate of Occurrence (ARO) in the single loss expectancy [SLE].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a false positive?

A

A false positive is a legitimate action that is perceived as a risk or threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a false negative?

A

A false-negative is a security issue that has passed your security controls as a legitimate action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is an acceptable use policy?

A

An acceptable use policy is a set of established guidelines for the appropriate use of computer networks within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should be done once a user has been terminated?

A

All user access including physical and network access controls needs to be disabled for an employee once they’ve been terminated this prevents the employee from accessing the facility or the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

After a few incidents where customer data was transmitted to a third-party, your organization is required to create and adhere to a policy that describes the distribution protection and confidentiality of customer data which policies do you create?

A

A privacy policy is created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are performing a risk analysis for a complex web-based application. Based on your conclusions regarding the probability, impact, and mitigation cost of an attack based on DNS manipulations or poisoning against your web domain, you decide to place the responsibility of the risk on your ISP, which handles your DNS service. Which risk-management option is this an example of?

A

Transference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is the centralize management location from which you provide Internet-based application services to several external clients, which policy do you provide to your clients as an agreement for service uptime?

A

Service level agreement [SLA]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There is a suspicion that a specific employee is performing illegal activities on your computer’s networks. In an effort to gather evidence about his activities, which principle and technique could you employ?

A

Mandatory vacation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

As part of a risk analysis of a very large and extensive back end database, you need to calculate the probability and impact of data corruption to the data. Which impact factor allows you to calculate your annual loss due to data corruption?

A

Annual loss expectancy [ALE] describes how much money you expect to lose on an annual basis because of the impact from the occurrence of a specific risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You need to create an overall policy for your organization that describes how your users can properly make use of company communications services, such as Web browsing, email and FTP services which policy do you implement?

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After the initial configuration of an anti-spam email filtering appliance on your network, users are complaining that too many legitimate messages are being flagged as spam in their mailbox. Which concept is this an example of?

A

False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your organization deals with sensitive health insurance information for patients that is covered by the HIPAA compliance policies. Which DLP security technologies would you implement to help protect the confidentiality and privacy of your patient’s health insurance data when communicating the information between healthcare facilities?

A

Encryption of outbound data containing health insurance information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It has been discovered that a former member of the IT department who switched to the development team still has administrative access to many major network infrastructure devices and servers. Which mitigation techniques should be implemented to help reduce the risk of this event reoccurring?

A

Regular user permission and rights reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A high-level executive has been terminated due to sharing company confidential data with competitors. Which action should be immediately performed?

A

Change the password and disable all user accounts for the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a privacy policy?

A

A privacy policy concerns the protection and distribution of private customer data. Any company, especially one engaged in online activities or e-commerce, has a responsibility to adopt and implement a policy for protecting the privacy of individually identifiable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a service level agreement [SLA]?

A

A service level agreement is an understanding among a supplier of services and the clients of those services that the service in question will be available for a specific percentage of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a zero day attack?

A

A zero day attack takes advantage of existing software security vulnerabilities before a security fix his been developed or applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name the three risk control types

A

1 management - An ongoing high-level function within your organization
2 operational - how you conduct your daily organizational business to minimize the security risks to your organization and its business activities.
3 technical -actual technical measures used to prevent security risks in your organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name the four access control policies

A

1 least privilege
2 separation of duties
3 job rotation
4 mandatory vacation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is quantitative risk analysis?

A

Quantitative risk analysis is a strict dollar amount calculation of the exact cost of the loss or a specific company asset because of a disaster.

23
Q

what is a single loss expectancy [SLE]?

A

The single loss expectancy is the potential loss of revenue based on a specific period of downtime.

24
Q

What is the annual rate of occurrence [ARO]?

A

The annual rate of occurrence is the chance of a risk occurring

25
Q

What is a P2P application?

A

Peer-to-peer [P2P] networking allows two computers to connect to each other directly and share files rather than through an intermediary server or service.

26
Q

What is phishing?

A

A phishing scam is a type of email or web security threat that tries to use social engineering to trick an unsuspecting user into visiting a website or replying to an email with confidential personal information such as username address login password and banking or credit card details.

27
Q

What is spear phishing?

A

Spear phishing is a targeted type of attack that includes information familiar to the user and could appear to be from a trusted source such as a company that the user has previously purchased a product from or a financial service that the victim has used previously or even a specific trusted user.

28
Q

What is whaling?

A

Whaling is a type of phishing attack that is targeted at a specific high-level user such as a CEO of a company.

29
Q

what is pharming?

A

Pharming is a type of social engineering attack where a user is misdirected to an attacker’s website without his knowledge.

30
Q

How does pharming occur?

A

Pharming occurs when code is installed on the computer that actually modifies the destination URL to that of the attacker even if the URL is entered correctly or chosen from a web browser bookmark.

31
Q

What is spim?

A

Spim is instant messaging spam. A user receives an unsolicited instant message from another user including users that are known and in the clients contact list.

32
Q

what is vishing?

A

Vishing is when a hacker can program their autodialers to send recorded messages from spoofed voice addresses these messages can claim they are from bank call centers to retrieve personal information.

33
Q

How do you handle an email hoax?

A

An email hoax usually is an attempt to clog up the network. Delete the email and do nothing else.

34
Q

What is a first responder?

A

A first responder is the person or persons who are notified and respond to a security incident.

35
Q

What is forensics?

A

Forensics is the act of collecting and preserving evidence to use in a court of law for legal proceedings.u

36
Q

When collecting forensic evidence which data should you preserve first?

A

The most volatile data should be saved first. You should focus on system memory or crash dump files, error messages on screens and log files.

37
Q

How do you preserve data integrity on forensic evidence?

A

To help preserve data integrity you can create an MD5 hash of the file immediately after the incident.

38
Q

What method is used to reserve data integrity?

A

Hashing preserves the message integrity by ensuring that the original data has not been tampered with.

39
Q

You have enacted a new policy to combat the issue of confidential data and documents being stolen or leaked internally within the office after a user had confidential papers taken from their office. Which policy do you use?

A

Clean desk policy

40
Q
Redundancy planning is a crucial part of business continuity planning. Which two factors are important in redundancy planning?
A. Backup strategy
B. Fault tolerance
C. Self sustaining
D. High availability
A

B. Fault tolerance

D. High availability

41
Q
Which values are assigned to a critical function as part of a business impact analysis?
A. Performance baseline
B. Recovery time objective
C. Recovery point objective
D. Performance trend
E. Mean time between failure
A

B. Recovery time objective

C. Recovery point objective

42
Q
In an attempt to boost overall network security, a company hired you as a consultant. Which type of review should be performed on a reguar basis
A. User disk quota reviews
B. Security footage reviews
C. User password reviews
D. User permissions review
A

D. User permissions review

43
Q
What type of environment are hot/cold aisles deployed in?
A. Server rooms
B. Mantrap
C. Honeypot
D. Wiring closet
A

A. Server rooms

44
Q
Your organization wants to prevent unintended outages caused from changes to systems. What could they use?
(A) Patch management
(B) Regression testing
(C) Change management
(D) Security template
A

C
A change management system helps prevent unintended outages from unauthorized changes, and provides a method of documenting all changes.

45
Q
Your organization is addressing single points of failure as potential risks to security. What are they addressing?
(A) Confidentiality
(B) Integrity
(C) Availability
(D) Authentication
A

C
By addressing a single point of failure (SPOF), you increase availability. An SPOF can be a drive, a server, power, cooling or any other item whose failure will cause the entire system to fail.

46
Q

What is the top-most level of the LDAP hierarchy?

A

Root

47
Q

Which assessment examines physical and electronic information handling issues to determine whether security weaknesses exist?

A

An organizational risk assessment

48
Q

What is the first step in a business impact analysis?

A

Identify all of the organization’s business units

49
Q

What is the purpose of Network Access Control (NAC)?

A

It ensures that the computer on the network meets an organization’s security policies.

50
Q

Who is responsible for most security incidents in an organization?

A

Employees

51
Q

Which type of risk analysis is based on the expert

judgment and intuition of members of an organization?

A

Qualitative Risk Analysis

52
Q

Which risk response strategy involves purchasing
insurance to protect the organization should the risk
occur?

A

Transference

53
Q

In which location should all changes made to your

organization’s network and computers be listed?

A

In the change management system

54
Q

What is the primary goal of business continuity planning?

A

Maintain the organization