PM SG 5-6 Flashcards

1
Q

Data in-transit, data in-use, or data at-rest
1.A point of sale terminal validates a credit card expiration date
2.A cloud app transaction sends data to multiple data centers
3.All backup tapes are stored at a secure facility
4.A database server stores all customer data in a RAID array
5.An email’s digital signature is validated when the message is opened
6.Encrypted data is sent over a VPN between remote sites

A

1.A point of sale terminal validates a credit card expiration date → Data in-use
2.A cloud app transaction sends data to multiple data centers → Data in-transit
3.All backup tapes are stored at a secure facility → Data at-rest
4.A database server stores all customer data in a RAID array → Data at-rest
5.An email’s digital signature is validated when the message is opened → Data in-use
6.Encrypted data is sent over a VPN between remote sites → Data in-transit

A:
Data in-use: Data actively being processed or manipulated (e.g., a credit card transaction).

Data in-transit: Data moving across a network (e.g., VPN transmission).

Data at-rest: Stored, inactive data (e.g., backups, RAID storage).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company would like to ensure all new software installations use unmodified code from the developers. Which of the following would provide this functionality?

1.Code signing
2.Input validation
3.Sandboxing
4.Static code analysis
5.Secure cookies

A

Correct Answer: 1.Code signing
A:

Code signing: Uses digital signatures to verify the integrity and authenticity of software.

Incorrect options:
2.Input validation: Prevents invalid input but doesn’t verify software authenticity.
3.Sandboxing: Isolates programs but doesn’t validate their integrity.
4.Static code analysis: Checks for vulnerabilities, not authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company’s IT department uses Google Analytics to produce reports for the CEO on the performance of their in-house web servers. Which of the following would best describe Google Analytics?

1.Data owner
2.Data retention
3.Data plane
4.Data processor
5.Data controller

A

Correct Answer: 4.Data processor
A:

Data processor: Processes data on behalf of a data controller (e.g., Google Analytics processing website data).

Incorrect options:
2.Data retention: Involves storage policies, not processing.
5.Data controller: Decides how data is processed (e.g., the company, not Google Analytics).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following technologies is commonly associated with making in-person credit card purchases from a phone or smart watch?

1.Tokenization
2.Key stretching
3.Salted hash
4.Hardware security module
5.Data masking

A

Correct Answer: 1.Tokenization
A:

Tokenization: Replaces credit card details with a temporary token for security.

Incorrect options:
2.Key stretching & salted hash: Secure passwords but don’t enable payments.
4.HSM: Protects cryptographic keys, not payments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following would be considered an loC?

1.Public key received via email
2.Login required an app confirmation
3.Server not responding to pings
4.Passwords stored with a salted hash
5.Laptop restarted after patching

A

Correct Answer: 3.Server not responding to pings
A:

IoC: Signs of a potential breach, such as network disruptions.

Incorrect options:
2.Login requiring app confirmation: A security measure, not an IoC.
4.Passwords stored with a salted hash: A security best practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Match the device to the description:
1) Sensor 2) WAF 3) NGFW 4) Load balancer
A) Backup and manage certificates for all company web servers
B) Use multiple servers to support a single application
C) Forward traffic based on destination IP address
D) Allow or block network traffic based on application name
E) Block application attacks to a web server
F) Access a protected network from an external connection
G) Gather performance metrics from network traffic flows

A

Match the device to the description:

1.Sensor → G. Gather performance metrics from network traffic flows
2.WAF (Web Application Firewall) → E. Block application attacks to a web server
3.NGFW (Next-Generation Firewall) → D. Allow or block network traffic based on application name
4.Load balancer → B. Use multiple servers to support a single application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A mail server digitally signs all outgoing messages. Which of the following is used to validate these digital signatures?

1.DKIM
2.NAC
3.SMTP
4.RADIUS
5.SPF

A

Correct Answer: 1.DKIM (DomainKeys Identified Mail)
A:

DKIM: Prevents email spoofing by signing emails.

Incorrect options:
5.SPF: Helps prevent spoofing but doesn’t validate signatures.
3.SMTP: Used for sending emails, not security validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company has begun to work with a local service provider and has created a broad set of goals associated with this relationship.
Which of the following would best describe this document?

1.NDA
2.SoW
3.SLA
4.MSA
5.MOU

A

Correct Answer: 5.MOU (Memorandum of Understanding)
A:

MOU: A non-binding agreement outlining goals.

Incorrect options:
3.SLA: Defines specific service guarantees.
1.NDA: Covers confidentiality, not service goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company is upgrading their external firewall to a new version. Which security control category would best apply to this firewall?

1.Technical
2.Physical
3.Operational
4.Occupational
5.Managerial

A

Correct Answer: 1.Technical
A:

Technical controls: Include firewalls, encryption, and authentication systems.

Incorrect options:
5.Managerial: Covers policies, not technology.
2.Physical: Refers to physical security (e.g., locks, cameras).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The hash values from two different inputs are identical. Which of the following would describe this situation?

1.Containerization
2.Spraying
3.Cloning
4.Collision
5.Reflection

A

Correct Answer: 4.Collision
A:

Collision: Occurs when two different inputs produce the same hash value.

Incorrect options:
3.Cloning: Duplicating data, unrelated to hashing.
2.Spraying: A brute-force attack method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Vice President of Sales has asked the IT team to create daily backups of the sales data. The Vice President is an example of a:

1.Data owner
2.Data controller
3.Data steward
4.Data processor

A

Correct Answer: 1.Data owner
A:

Data owner: Responsible for determining data handling policies.

Incorrect options:
3.Data steward: Manages data but doesn’t set policies.
4.Data processor: Processes data but doesn’t own it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly