Policies and best practices Flashcards

1
Q

Which is one of the most commonly applied standards for information security?

A

ISO/IEC 27002

note - IEC = International Electrotechical Commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the 4 types of networks that should be segmented

A

Industrial Control Systems (SCADA)
Medianets
Legacy Systems
Testing Labs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 6 segmentation tactics?

A
Using NAT
Using ACLs on routers or firewalls
Using Honeynet/Honeypot
Using DMZ
Using VLANS
Virtualization (good for Testing labs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do you implement for Layer 2 segmentation?

A

VLANs and port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do you implement for Layer 3 segmentation

A

Access Control Lists on Routers or Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is it a good idea to segment part of your network controlling payment card information?

A

If you don’t you have to ensure your whole network complies with PCI DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BYOD initiatives can be successfully implemented by ensuring what type of security measure is used?

A

Network Access Control (Cisco) or Network Access Protection (Microsoft)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main goal of Network Access Control when someone wants to connect their personal device to the company WLAN?

A

The main goal is to allow people to connect their personal devices to the network that will not introduce a security threat by:

1) Examining the device for malware
2) Examining the device for missing security updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What security policies should be discussed with a new user during onboarding?

A

Password policy
BYOD policy
Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a software license defines the name of the user what type of license is this?

A

Per User license aka concurrent license

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a per seat user license typically used for?

A

For shift working employees using the same seat and therefore not having to be in at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To keep track of concurrent users of software, what service is employed?

A

Licensing service for centralized licensing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When would something be deemed an export control?

A

If it serves as a defense system, national security, foreign policy or interest of a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an outbound email filter is a procedural example of what security policy?

A

Data Loss Prevention. It prevents loss of sensitive documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

regards to employees working remotely. defining who has access, why they have access as it pertains to their job function is an example of ‘soft’ controls for what facet of security policy?

A

Remote access policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a network policy server and what security policy does it support?

A

an NPS is the Microsoft equivalent of RADIUS and performs authentication and authorization for users connecting via VPN. It supports the remote access policy

17
Q

What software supports the BYOD policy?

A

Mobile Device Management software. For example, when employees leave, it allows a secure remote wipe of any company data on the device.

18
Q

What security policy should be developed by the organizations legal counsel, HR and IT department?

A

Acceptable Usage Policy

19
Q

What the two main goals of asset disposal?

A

1) preventing data loss

2) ethical/legal disposal of the equipment

20
Q

In what document can you find information about the safe handling of materials? Where should it be stored?

A

Materials Safety Data Sheet (MSDS).

They should be stored next to the first aid kit

21
Q

What is a Class C fire and what type of fire extinguisher is used to put them out?

A

Class C fire is electric. Class C fire extinguishers using dry chemicals like Halon

22
Q

At what temperature does damage start to occur to magnetic media?

A

100 degrees

23
Q

At what temperature does damage start occurring to computers and peripherals

A

175 degrees

24
Q

At what temperature does damage start occuring to paper products (surprising this one)

A

350 degrees

25
Q

What should you consider if you have a fail-lock door system?

A

The effect it may have during an evacuation.

26
Q

What type of fire suppressant do most companies today use?

A

Halon

27
Q

What are the two methods of content filtering?

A

1) content based filtering using heuristic rules

2) URL based

28
Q

What layer does content filtering occur at?

A

Layer 7