Pocket Prep 2 Flashcards
The CISO asks you to assess the maturity of their security operations center. Which of the following is the most applicable model to use for the assessment?
A. GDPR
B. NIST
C. CMMI
D. COPPA
C. CMMI
Explanation:
Capability Maturity Model Integration is a method improvement tool that groups projects and organizational units into one of five maturity levels. From lwoest to highest the five maturity levels are:
- Initial
- Managed
- Defined
- Qualitatively managed
- Optimized
Which of the following does asymmetric cryptography provide?
A. Nonrepudiation and integrity only
B. Confidentiality only
C. Nonrepudiation, authentication, integrity and confidentiality
D. Authentication only
C. Nonrepudiation, authentication, integrity and confidentiality
Explanation:
Which of the following is true about RPO and backup frequency?
A. Backup frequency + RPO = RTO
B. RPO should be less than or equal to backup frequency
C. RTO + RPO = backup frequency
D. Backup frequency should be less than or equal to RPO
D. Backup frequency should be less than or equal to RPO
Explanation:
RPO is the maximum amoujnt of allowable lost data in the event of a service disruption. Therefore, organizations should ensure their backups occur no longer than their RPO. Otherwise, even with an instaneous RTO, an unacceptable amount of data loss may occur
What is the formula for calculating ALE?
A. ALE = SLE x AV
B. ALE = SLE x ARO
C. ALE = SLE x EF
D. ALE = AV x EF
B. ALE = SLE x ARO
Explanation:
The formula for calculating ALE (Annualized loss expectancy) is:
ALE = SLE x ARO
SLE (Single Loss Expectancy) is calculated by multiplying AV and exposure factor
Two companies share the same office building and have determine thats its in both their best financial intertests to share hardware and infrastructure to save on costs.
They have drafted and signed an agreement stating the required controls for defense of the hardware and networking components.
What kind of agreement is this?
A. Operation level agreement
B. Interconnection security agreemennt
C. Nondisclosure agreement
D. Business partnership agreement
B. Interconnection security agreemennt
Explanation:
An ISA is a specific contract realted to network connections and exchanging traffic
An OLA (Operational Level Agreement) is an agreement about responsibilities between different support teams
How is firmware patching different from application patching?
A. Firmware patchees are applied from within thee OS
B. Firmware patches are more frequent than application patches
C. Firmware patching updates instructions in EEPROM
D. Firmware patches apply to software such as web browsers and word processors
C. Firmware patching updates instructions in EEPROM
Explanation:
Patching firmware is a move involved process than patching application because it updates the underlying hardware=
The expected risk factor of an annual threat event is referred to as what?
A. EF
B. SLE
C. AV
D. ALE
D. ALE
Explanation:
Annualized loss expectancy is the expected risk factor for a threat event on a yearly basis. To calculate ALE, you must know the SLE (single loss expectancy) and the ARO (annualized rate of occurrence). ALE is calculated as follows:
ALE = SLE x ARO
Why do cloud service providers have availability zones?
A. To provide independent locations within a geographic region for failover and redundancy
B. To provide geographgically diverse servers to improve the performance, reliability and availability for delivering content
C. To provide logically isolated resources in a virtual network environment
D. To provide an environment for final testing before poutting an application into production
A. To provide independent locations within a geographic region for failover and redundancy
Explanation:
An availability zone is a unique location within a region that has indepedent power, cooling, and networking. It allows for increased availability and fault tolerance.
Which is an application layer protocol used to retrieve email from an email server that can replace POP3?
A. IMAP
B. SMTP
C. POP6
D. HTTP
A. IMAP
Explanation:
Internet Message Access Protocol (IMAP) is an application layer email protocol. Unlike POP3, IMAP enables email download without deleting the copy of the email on the server, which is a useful feature for remote clieents. IMAP uses port 143. The secure version of IMAP uses SSL/TLS encryption and port 993
When is it possible to perform passive sniffing with a packet sniffer?
A. When it is connected to a hub
B. When it is connected to an unmanaged switch
C. When it is connected to a VLAN
D. When it is connected to a managed switch
A. When it is connected to a hub
Explanation:
Network hubs do not break up collision domains and send all traffic to all ports. Therrefore, a packet sniffer can passively sniff all traffic sent to a hub
Which of thew following is a document that details security requirements and supporting documents?
A. DAST
B. SAST
C. SRTM
D. CDN
C. SRTM
Explanation:
A security requirements traceability matrix is a document that contains security requirements and support documentation. It includes details such as requirement numbers, descriptions, and how to validate requirements
Of the following, whichc specifically is a type of distributed infrastructure that emphasizes interoperability across applications?
A. CRM
B. GRC
C. ESB
D. SOA
D. SOA
Explanation:
A service oriented architecture (SOA) is a type of distributed infrastructure that emphasizes interoperability across applications and services
What term describes information about data like EXIF information in a .jpeg file?
A. Metadata
B. Superdata
C. XOR data
D. CMDB data
A. Metadata
Explanation:
Metadata is information about data. EXIF information in a .jpeg file is one example of metadata. Another example is email headers
Which of the following is NOT a risk related to PBX systems and traditional analog telephony?
A. Default passwords
B. SPIT
C. Slamming
D. Cramming
B. SPIT
Explanation:
Spam over Internet Telephony is a spam technique that targets VoIP, not legacy PBX and traditional analog telephony
Which is a correct matching of the secure versions of the email protocols and their default ports?
A. IMAP: 993, POP:995, SMTP: 465 and 587
B. IMAP: 995 and 587, POP:993, SMTP: 465
C. IMAP: 465 and 587, POP: 993, SMTP: 995
D. IMAP: 993, POP: 465 and 587, SMTP: 995
A. IMAP: 993, POP:995, SMTP: 465 and 587
Explanation:
These email protocols and their default ports are IMAP: 143, POP: 110 and SMTP: 25
The protocols also support encryption on these ports: IMAP: 993, POP:995 and SMTP: 465 (implicit encryption) and 587 (explicit encryption)
Which of the following is a difference between a SAN and a NAS?
A. Clients view a SAN as a local disk or volume and view a NAS as an independent file server
B. Clients can connect to a SAN via a network, but cannot connect to a NAS via a network
C. NAS is an authentication protocol; SAN is a privacy protocol
D. Clients view a NAS as a local disk or volume and view a SAN as an independent file server
A. Clients view a SAN as a local disk or volume and view a NAS as an independent file server
Explanation:
Clients view a SAn as a local disk or volume and view a NAS as an indepdent file server
SAN and NAS
Which of the statements below about signature based and heuristic based antivirus programs is FALSE?
A. Signature based antivirus needs regular updates
B. Heuristic based antivirus is better at detecting zero day threats
C. Heuristic based antivirus often uses AI
D. Signature based antivirus is better at detecting polymorphic viruses
D. Signature based antivirus is better at detecting polymorphic viruses
Explanation:
Heuristic based AV detects threats based on behavior pattenrs. THis makes heuristic based AV better at detecting zero day and polymorphic threats that do not have a known signature.
You manage a website that provides collaboration for several researches and analysts and currently allows everyone to work onn each others documents. You have been approached with some concerns by some of the group members that their documents should not be available to some individuals, and that they want to provide compelte access ot others.
Which of the following control methods should you implement?
A. MAC
B. DAC
C. RBAC
D. DNSSEC
B. DAC
Explanation:
With discretionary access control the owner of a file decides who is granted access to it.
Mandatory access control controls access based policies that use security levels to determine access
Role Based Access Control grants access based on user roles and permissions
When it comes to data classification, who is responsible for technical controls?
A. Vector admin
B. Data owner
C. Vector enclave
D. Data custodian
D. Data custodian
Explanation:
Data custodians have technical control of data. Data owners have administrative control of data