Practice Questions Flashcards

unofficial miscellaneous source, linkedin exams, etc.

1
Q

Bollard is an example of which type of control?

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary purpose of succession planning?

A

To define plans for how to handle the sudden loss of an executive or key employee to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A data center technician needs to securely dispose of several hard drives for systems that are being decommissioned. Which of the following techniques is not sufficient to ensure the data is not recoverable?

A

Erasure

Erasure occurs when you press the Delete key on a computer or empty the recycle bin on your desktop. When this occurs, the data is not actually removed from the hard drive and may be recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fortification of facilities, deployment of uninterruptible power supplies or generators, communication link redundancy, and fire detection and suppression systems are all examples of what?

A

Preventative controls

Controls designed to stop unwanted things from occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following techniques is not a method for identifying a security incident?

A

Disabling system accounts

This may be done as a containment strategy as part of the incident response process, however, this is not a method for identifying a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SIEM

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following would a hacker not usually learn by conducting scans against a targeted network?

A

Reveal user accounts on endpoints that have excessive privilege

Scanners cannot tell if user accounts have too many privileges since that is dependent upon the user’s role in the organization and their need to know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following best describes DAC?

A

Access control model that provides the owner of the resource (typically the creator) complete control to configure which subjects can access an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RBAC

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ABAC

A

Attribute Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What technology would an organization use to control which devices could connect to their network?

A

NAC

Network Access Control allows organizations to control which devices are permitted to connect to their network based on policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is not true regarding UDP?

A

UDP is a connection oriented protocol

User Datagram Protocol is a protocol for for transmitting data between computers. It does not establish a connection (three-way handshake) before transmitting data. This makes it less reliable but also faster than TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is a logical address assigned to devices connected to a network or the Internet?

A

Internet Protocol (IP) address

IP addresses are used for identifying devices for the purpose of routing traffic. They are referred to as a logical or software address as it is a virtual address and not hardcoded into the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is the bestt description of a computer virus?

A

Malware that infects a legitimate program and causes it to perform a function it was not intended to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A data center administrator installls a biometric authetication system that controls access to the data center. In oder for employees to ender the data center, they must scan their palm to gain access. What type of security control is this an example of?

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following describes a door system that is configured to automatically close and lock during a power outage?

A

Fail-secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which access control model is commonly used in military and government environments to protect classified information?

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which part of the access control mechanism provides information used by auditors and investigators?

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Joe fell victim to a social engineering attach by a cybercriminal, then he remembered learning about a similar trick during his company’s security training. What feature of training and awareness programs did his organization likely fail to implement?

A

Practice testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A system’s administrator is assisting an employee with an issue they are having with their work laptop. When the employee attempts to connect to the company network they are unable to get an IP address assigned and thus cannot access company resources. Which of the following protocols is most relevant for the systems administrator when investigating and troubleshooting this issue?

A

DHCP

Dynamic Host Configuration Protocol is used to dynamically assign IP addresses to devices. A server checks for available IP addresses from a pool and automatically assigns them to client devices. The administrator should investigate to see whether DHCP is configured and working properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

HTTP

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SMTP

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is not a category of social engineering?

A

Mantrap

Refers to a special kind of vestibule used to protect a secure area. It has two doors and requires a visitor to go through the first door and close it before going through the second door to gain entry to the secure area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following involves a sophisticated attack in which a hacker maintains a stealthy long term presence in a victim’s network?

A

Advanced persistent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is not an example of protecting data in transit?

A

Database encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is not commonly used to launch ransomware attacks?

A

Ping attack

A denial of service attack in which the attacker floods the victim system with pink requests. By itself it does not enable a ransomware attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Mary is conducting a risk analysis for her organization. Her boss, the CISO, feels strongly that the organization’s biggest risk is from hackers trying to steal intellectual property from their engineering database server so that is where their defensive focus should lie. This is an example of what kind of analysis?

A

Qualitative risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the most important governance element for a customer to use to ensure a cloud service provider is delivering on expectations?

A

SLA

A service level agreement is a contractual agreement between a service provider and a customer that defines the level of service the customer can expect. Provisions around things like performance, availability, security, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When an employee is terminated, what is the best course of action regarding the provisioning of their user access accounts?

A

Disable the employee’s access to all accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Joe is a network engineer who wants to deploy the most basic and least expensive firewall. All he needs is to set up Access Control Lists to accomplish his goals. Which type of firewall is best for his needs?

A

Packet filler

A packet filler (gen 1) is the simplest and least expensive type of firewall and uses Access Control Lists to control traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A server admin wants to ensure that the server’s hard drive is encrypted to protect the sensitive data on the server in case the server is ever stolen. Which of the following would enable the best configuration for disk encryption?

A

AES

The Advanced Encryption Standard algorithm is the most commonly used symmetric encryption algorithm due to its maturity, security, and international recognition. Symmetric encryption (particularly AES) is most commonly used to encrypt data in bulk and large files, such as hard drive encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which policy would normally include requirements for employees accessing their social media accounts on company owned computers?

A

AUP

The Acceptable Use Policy defines what employees may and may not do with company resources, usually stating such resources are to be used for official business purposes only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which method of authentication factor is most likely to falsely reject a valid user?

A

Type 3

Something you are, uses biometrics which is an improving technology that is not perfect and can falsely reject a valid user or falsely accept an unknown user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Joe ran a vulnerability scan and posted the results on his organization’s unsecured website so it would be easy for his employees to see the results. Was this a good idea?

A

No, because scan results contain sensitive information which could be used by cybercriminals to launch attacks against the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following is considered an “insecure” protocol?

A

HTTP

Hypertext Transfer Protocol is a communication protocol that serves as the primary way web browsers communicate with web servers to access web pages over the internet. It is considered an insecure protocol since the information is transmitted in plaintext between the client and the server. HTTPS is the secure alternative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following is considered the best practice regarding patch management?

A

Test patches before deploying them to production devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following is a key benefit of using a SIEM?

A

Greater availability and monitoring

Security Information and Event Management systems allow greater security visibility and monitoring. The systems collect and analyze security related data from multiple sources, providing security analysts with a comprehensive view of the organization’s security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the following best describes RBAC?

A

Access control model that enforces access based on predefined roles.

Roles are typically developed for similar users with the same access needs.

45
Q

A security engineer is trying to decide on the best course of action to take to block internet traffic from specific IP addresses at the perimeter of the company network. Which of the following controls would allow the security engineer to configure such rules

A

Network Firewall

A firewall is a network device used to enforce certain security rules that govern how traffic may flow.

46
Q

Which of the following is an example of a technical control?

A

Antivirus

47
Q

The IT director for a large organization is reviewing options to migrate their servers and infrastructure from their on-prem data center to the cloud. Which cloud service model best fits the organization’s needs?

A

IaaS

In the Infrastructure as a Service model the cloud provider gives customers self service access to a pool of infrastructure resources that can be virtually provisioned and deprovisioned on demand.

48
Q

SaaS

A

Software as a Service

A software service or application is hosted by a cloud provider and provided to customers (typically over the Internet). The cloud provider manages the infrastructure and platform, and the customer only needs to manage specific canfugurations within the application.

49
Q

The IT Director for an organization has revamped the organization’s identity management structure so that pre-built permission groups are developed for each department such as IT, Finance, Sales, HR, and so on. Users are then assigned to those corresponding groups depending on what team they are on. Which access control model is most likely being utilized?

A

RBAC

Role based access control enforces access based on roles that define permissions, and the level of access provided to any subjects assigned to that role.

50
Q

Which cloud deployment model consists of cloud resources that are available for purchase and consumption by the general public?

A

Public

Public cloud consists of computing resources operated by a third party that are deployed for use by the general public for purchase and consumption

51
Q

A security engineer has designed the organization’s network to have multiple layers of controls in place including antivirus on endpoints, network segmentation through the use of firewalls, and MFA for all administrative access to systems. What is this an example of?

A

Defense-in-depth

52
Q

A company has purchased a subscription-based customer relationship management service that is accessible over the Internet. The service is developed by a third party that manages the infrastructure and platform while the customer manages specific configurations within the web application. Which type of cloud service model is this an example of?

A

SaaS

Software as a Service

53
Q

Which of the following focuses on plans and processes to ensure the business can continue to perform essential business functions in the event of a disaster or security incident?

A

Business continuity

54
Q

Of the choices listed, which quantitative measure indicates how much money an organization is predicted to lose if a given threat occurs one time?

A

Single Loss Expectancy

55
Q

A security analyst is reviewing system logs and notices that another employee has been copying large amounts of sensitive data from the system. What is the best next step for the security analyst to take?

A

Notify management

56
Q

What security control provides non-repudiation for messages?

A

digital signatures

56
Q

Which type of attack uses an email that looks legitimate but is really fake to trick the recipient into revealing information?

A

Phishing

57
Q

Which one of the following is an example of multifactor authentication?
-password and security questions
-retinal scan and fingerprint
-ID card and PIN
-ID card and key

A

ID card and PIN

58
Q

What US law regulates the protection of health information?

A

HIPAA

59
Q

What security tool can be configured to prevent DDoS attacks?

A

firewall

60
Q

Your organization requires that passwords contain a mixture of uppercase characters, lowercase characters, digits, and symbols. What type of password policy is this?

A

complexity

61
Q

During what phase of the access control process does a user prove his or her identity?

A

authentication

62
Q

In what type of attack does the attacker capture and then reuse login information?

A

replay attack

63
Q

What is the best defense against dumpster diving attacks?

A

shredding

64
Q

Purchasing an insurance policy is an example of which risk management strategy?

A

risk transference

65
Q

What two factors are used to evaluate a risk?

A

likelihood and impact

66
Q

What term best describes making a snapshot of a system or application at a point in time for later comparison?

A

baselining

67
Q

What type of security control is designed to stop a security issue from occurring in the first place?

A

preventive

68
Q

What term describes risks that originate inside the organization?

A

internal

69
Q

Which element of the security policy framework includes suggestions that are not mandatory?

A

guidelines

70
Q

What law applies to the use of personal information belonging to European Union residents?

A

GDPR

71
Q

What type of security policy normally describes how users may access business information with their own devices?

A

BYOD policy

72
Q

What is the minimum number of disk required to perform RAID level 5?

A

3

73
Q

What goal of security is enhanced by a strong business continuity program?

A

availability

74
Q

What type of control are we using if we supplement a single firewall with a second standby firewall ready to assume responsibility if the primary firewall fails?

A

high availability

75
Q

SSO

A

single sign on
The process of authenticating once to many systems

76
Q

Which of the following methods can be used to ensure message authenticity?

A

Digital signatures

77
Q

Which of the following is the best definition of configuration management?

A

The process of establishing consistency in engineering, implementation, and operations by establishing and controlling baselines of all supporting data and documentation

78
Q

Which of the following is a value that is added as an input to a cryptographic algorithm that enables it to perform its cryptographic function?

A

Cryptographic key

79
Q

Which of the following devices operates at the network layer (Layer 3) of the OSI model?

A

Router

80
Q

What is cross-site scripting?

A

An attack that allows an attacker to execute malicious code via a victim’s browser

81
Q

Which of the following access control models allows the owner of the resource to configure which subjects can access the object?

A

Discretionary access control (DAC)

82
Q

The most common approach to being able to recover data in the event of a disaster or incident is to use a data backup solution. Which type of backup solution backs up all files that have changed since the last backup?

A

Differential

83
Q

A(n) _____ backup backs up all files that have changed since the last full backup.

A

Differential backup

84
Q

A(n) _____ backup stores a backup of all of the files on the system each time the backup process is run

A

Full backup

85
Q

A(n) _____ backup backs up all files that have changed since the last backup of any type

A

Incremental backup

86
Q

Which of the following steps is not part of risk identification within the risk management process?

A

Identifying recovery strategies for each asset in the environment.

This is part of business continuity planning.

87
Q

In the context of access controls, what does an access control matrix represent?

A

A table containing a set of subjects, objects, and permissions

88
Q

What is the potential impact of a botnet attack on an organization?

A

All of these answers:
-Disruption of business operations and loss of revenue
-Damage to reputation and loss of customer trust
-Theft of sensitive information and intellectual property

89
Q

What is the primary difference between logical access controls and physical access controls?

A

Logical access controls protect computer and network resources, while physical access controls protect physical resources such as data centers.

90
Q

Sally works on her organization’s business continuity planning team. They have decided that in the event of a disaster it is acceptable for their organization to lose the last two days’ worth of data but no more. This is an example of what measure?

A

Recovery point objective (RPO)

The amount of data that is acceptable to be lost in the event of a disaster

91
Q

Recovery time objective (RTO)

A

The time target for restoring a business process or service after a disruption caused by a disaster or security event

92
Q

Work recovery time (WRT)

A

The amount of time to restore the data and perform testing to ensure the capability is fully operational after a disaster

93
Q

In the context of logical access control, which of the following best describes the capabilities list?

A

A list that shows all objects a specific subject can access the subject’s corresponding permissions over each object

The access control list (ACL)

94
Q

How would the default subnet mask of a class A range be noted with CIDR notation?

A

/8

95
Q

Which access control model provides the owner of the resource, typically the creator, full control over configuring which subjects can access the object?

A

Discretionary access control (DAC)

96
Q

What layer of the OSI model do TCP and UDP operate at?

A

Layer 4: Transport Layer

This layer handles end-to-end transport services and the establishment of logical connections between two computers

97
Q

The OSI model layer focused on the connection between the connections between the applications on each computer

A

Session Layer

98
Q

The OSI model layer dealing with how bits are transmitted and received

A

Layer 1: Physical Layer

99
Q

The OSI model layer responsible for transmitting and delivering frames throughout a LAN based on the unique physical MAC addresses on the devices on the network

A

Layer 2: Data Link Layer

100
Q

The OSI model layer responsible for the routing and route selection for network packets based on logical IP addresses

A

Layer 3: Network Layer

101
Q

How can organizations protect against buffer overflow attacks?

A

All of these answers:
-Use code analysis tools to identify and mitigate vulnerabilities
-Regularly patch and update software
-Use intrusion detection/prevention systems to monitor network traffic

102
Q

Which of the following is a benefit of using CIDR?

A

It provides more flexibility for splitting IP address space

103
Q

Which of the following is the best description of the purpose of a vulnerability assessment?

A

Reduce the risk of successful cyberattacks

104
Q

What is the primary purpose of a business impact analysis (BIA)?

A

To fully understand the organization’s critical business functions and establish recovery priorities for them

105
Q

Which of the following is an example of a technical control?

A

Access controls

106
Q

Controls that are hardware or software components that protect computing and network resources within a system

A

Technical controls

107
Q
A