Pg 17 Flashcards

1
Q

A systems administrator needs to ensure the secure communication of sensitive data within the organization’s private cloud. Which of the following is the best choice for the administrator to implement?

A. IPSec
B. SHA-1
C. RSA
D. TGT

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following should an internal auditor check for first when conducting an audit of the organization’s risk management program?

A. Policies and procedures
B. Asset management
C. Vulnerability assessment
D. Business impact analysis

A

Policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following activities are associated with vulnerability management? (Choose two.)

A. Reporting
B. Prioritization
C. Exploiting
D. Correlation
E. Containment
F. Tabletop exercise

A

A. Reporting
B. Prioritization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An administrator wants to perform a risk assessment without using proprietary company information. Which of the following methods should the administrator use to gather information?

A. Network scanning
B. Penetration testing
C. Open-source intelligence
D. Configuration auditing

A

Open-source intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A systems administrator is concerned about vulnerabilities within cloud computing instances. Which of the following is most important for the administrator to consider when architecting a cloud computing environment?

A. SQL injection
B. TOC/TOU
C. VM escape
D. Tokenization
E. Password spraying

A

VM escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A database administrator is updating the company’s SQL database, which stores credit card information for pending purchases. Which of the following is the best method to secure the data against a potential breach?

A. Hashing
B. Obfuscation
C. Tokenization
D. Masking

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a benefit of vendor diversity?

A. Patch availability
B. Zero-day resiliency
C. Secure configuration guide applicability
D. Load balancing

A

Zero-day resiliency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An employee used a company’s billing system to issue fraudulent checks. The administrator is looking for evidence of other occurrences of this activity. Which of the following should the administrator examine?

A. Application logs
B. Vulnerability scanner logs
C. IDS/IPS logs
D. Firewall logs

A

Application logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An organization is looking to optimize its environment and reduce the number of patches necessary for operating systems. Which of the following will best help to achieve this objective?

A. Microservices
B. Virtualization
C. Real-time operating system
D. Containers

A

Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following tasks is typically included in the BIA process?

A. Estimating the recovery time of systems
B. Identifying the communication strategy
C. Evaluating the risk management plan
D. Establishing the backup and recovery procedures
E. Developing the incident response plan

A

Estimating the recovery time of systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a risk of conducting a vulnerability assessment?

A. A disruption of business operations
B. Unauthorized access to the system
C. Reports of false positives
D. Finding security gaps in the system

A

A disruption of business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following techniques would attract the attention of a malicious attacker in an insider threat scenario?

A. Creating a false text file in /docs/salaries
B. Setting weak passwords in /etc/shadow
C. Scheduling vulnerable jobs in /etc/crontab
D. Adding a fake account to /etc/passwd

A

Creating a false text file in /docs/salaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An organization maintains intellectual property that it wants to protect. Which of the following concepts would be most beneficial to add to the company’s security awareness training program?

A. Insider threat detection
B. Simulated threats
C. Phishing awareness
D. Business continuity planning

A

Insider threat detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An organization plans to expand its operations internationally and needs to keep data at the new location secure. The organization wants to use the most secure architecture model possible. Which of the following models offers the highest level of security?

A. Cloud-based
B. Peer-to-peer
C. On-premises
D. Hybrid

A

On-premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the most relevant reason a DPO would develop a data inventory?

A. To manage data storage requirements better
B. To determine the impact in the event of a breach
C. To extend the length of time data can be retained
D. To automate the reduction of duplicated data

A

To determine the impact in the event of a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following cryptographic solutions protects data at rest?

A. Digital signatures
B. Full disk encryption
C. Private key
D. Steganography

A

Full disk encryption

17
Q

Which of the following should an organization use to protect its environment from external attacks conducted by an unauthorized hacker?

A. ACL
B. IDS
C. HIDS
D. NIPS

18
Q

Which of the following would enable a data center to remain operational through a multiday power outage?

A. Generator
B. Uninterruptible power supply
C. Replication
D. Parallel processing