Practice Questions Flashcards

unofficial

1
Q

Which of the following is an example of a physical control?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary purpose of succession planning?

A

To define plans for how to handle the sudden loss of an executive or key employee to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A data center technician needs to securely dispose of several hard drives for systems that are being decommissioned. Which of the following techniques is not sufficient to ensure the data is not recoverable?

A

Erasure

Erasure occurs when you press the Delete key on a computer or empty the recycle bin on your desktop. When this occurs, the data is not actually removed from the hard drive and may be recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fortification of facilities, deployment of uninterruptible power supplies or generators, communication link redundancy, and fire detection and suppression systems are all examples of what?

A

Preventative controls

Controls designed to stop unwanted things from occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following techniques is not a method for identifying a security incident?

A

Disabling system accounts

This may be done as a containment strategy as part of the incident response process, however, this is not a method for identifying a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SIEM

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following would a hacker not usually learn by conducting scans against a targeted network?

A

Reveal user accounts on endpoints that have excessive privilege

Scanners cannot tell if user accounts have too many privileges since that is dependent upon the user’s role in the organization and their need to know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following best describes DAC?

A

Access control model that provides the owner of the resource (typically the creator) complete control to configure which subjects can access an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RBAC

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ABAC

A

Attribute Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which technology would an organization use to control which devices could connect to their network?

A

NAC

Network Access Control allows organizations to control which devices are permitted to connect to their network based on policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is not true regarding UDP?

A

UDP is a connection oriented protocol

User Datagram Protocol is a protocol for for transmitting data between computers. It does not establish a connection (three-way handshake) before transmitting data. This makes it less reliable but also faster than TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is a logical address assigned to devices connected to a network or the Internet?

A

Internet Protocol (IP) address

IP addresses are used for identifying devices for the purpose of routing traffic. They are referred to as a logical or software address as it is a virtual address and not hardcoded into the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is the bestt description of a computer virus?

A

Malware that infects a legitimate program and causes it to perform a function it was not intended to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A data center administrator installls a biometric authetication system that controls access to the data center. In oder for employees to ender the data center, they must scan their palm to gain access. What type of security control is this an example of?

A

Physical

22
Q

Which of the following describes a door system that is configured to automatically close and lock during a power outage?

A

Fail-secure

23
Q

Which access control model is commonly used in military and government environments to protect classified information?

A

MAC

24
Q

Which part of the access control mechanism provides information used by auditors and investigators?

A

Accountability

25
Q

Joe fell victim to a social engineering attach by a cybercriminal, then he remembered learning about a similar trick during his company’s security training. What feature of training and awareness programs did his organization likely fail to implement?

A

Practice testing

26
Q

A system’s administrator is assisting an employee with an issue they are having with their work laptop. When the employee attempts to connect to the company network they are unable to get an IP address assigned and thus cannot access company resources. Which of the following protocols is most relevant for the systems administrator when investigating and troubleshooting this issue?

A

DHCP

Dynamic Host Configuration Protocol is used to dynamically assign IP addresses to devices. A server checks for available IP addresses from a pool and automatically assigns them to client devices. The administrator should investigate to see whether DHCP is configured and working properly.

27
Q

HTTP

A

Hypertext Transfer Protocol

28
Q

SMTP

A

Simple Mail Transfer Protocol

29
Q

FTP

A

File Transfer Protocol

30
Q

Which of the following is not a category of social engineering?

A

Mantrap

Refers to a special kind of vestibule used to protect a secure area. It has two doors and requires a visitor to go through the first door and close it before going through the second door to gain entry to the secure area.

31
Q

Which of the following involves a sophisticated attack in which a hacker maintains a stealthy long term presence in a victim’s network?

A

Advanced persistent threat

32
Q

Which of the following is not an example of protecting data in transit?

A

Database encryption

33
Q

Which of the following is not commonly used to launch ransomware attacks?

A

Ping attack

A denial of service attack in which the attacker floods the victim system with pink requests. By itself it does not enable a ransomware attack

34
Q

Mary is conducting a risk analysis for her organization. Her boss, the CISO, feels strongly that the organization’s biggest risk is from hackers trying to steal intellectual property from their engineering database server so that is where their defensive focus should lie. This is an example of what kind of analysis?

A

Qualitative risk analysis

35
Q

What is the most important governance element for a customer to use to ensure a cloud service provider is delivering on expectations?

A

SLA

A service level agreement is a contractual agreement between a service provider and a customer that defines the level of service the customer can expect. Provisions around things like performance, availability, security, etc.

36
Q

When an employee is terminated, what is the best course of action regarding the provisioning of their user access accounts?

A

Disable the employee’s access to all accounts

37
Q

Joe is a network engineer who wants to deploy the most basic and least expensive firewall. All he needs is to set up Access Control Lists to accomplish his goals. Which type of firewall is best for his needs?

A

Packet filler

A packet filler (gen 1) is the simplest and least expensive type of firewall and uses Access Control Lists to control traffic

38
Q

A server admin wants to ensure that the server’s hard drive is encrypted to protect the sensitive data on the server in case the server is ever stolen. Which of the following would enable the best configuration for disk encryption?

A

AES

The Advanced Encryption Standard algorithm is the most commonly used symmetric encryption algorithm due to its maturity, security, and international recognition. Symmetric encryption (particularly AES) is most commonly used to encrypt data in bulk and large files, such as hard drive encryption.

39
Q

Which policy would normally include requirements for employees accessing their social media accounts on company owned computers?

A

AUP

The Acceptable Use Policy defines what employees may and may not do with company resources, usually stating such resources are to be used for official business purposes only.

40
Q

Which method of authentication factor is most likely to falsely reject a valid user?

A

Type 3

Something you are, uses biometrics which is an improving technology that is not perfect and can falsely reject a valid user or falsely accept an unknown user.

41
Q

Joe ran a vulnerability scan and posted the results on his organization’s unsecured website so it would be easy for his employees to see the results. Was this a good idea?

A

No, because scan results contain sensitive information which could be used by cybercriminals to launch attacks against the organization

42
Q

Which of the following is considered an “insecure” protocol?

A

HTTP

Hypertext Transfer Protocol is a communication protocol that serves as the primary way web browsers communicate with web servers to access web pages over the internet. It is considered an insecure protocol since the information is transmitted in plaintext between the client and the server. HTTPS is the secure alternative.

43
Q

Which of the following is considered the best practice regarding patch management?

A

Test patches before deploying them to production devices.

44
Q

Which of the following is a key benefit of using a SIEM?

A

Greater availability and monitoring

Security Information and Event Management systems allow greater security visibility and monitoring. The systems collect and analyze security related data from multiple sources, providing security analysts with a comprehensive view of the organization’s security posture.

45
Q

Which of the following best describes RBAC?

A

Access control model that enforces access based on predefined roles.

Roles are typically developed for similar users with the same access needs.

46
Q

A security engineer is trying to decide on the best course of action to take to block internet traffic from specific IP addresses at the perimeter of the company network. Which of the following controls would allow the security engineer to configure such rules

A

Network Firewall

A firewall is a network device used to enforce certain security rules that govern how traffic may flow.

47
Q

Which of the following is an example of a technical control?

A

Antivirus

48
Q

The IT director for a large organization is reviewing options to migrate their servers and infrastructure from their on-prem data center to the cloud. Which cloud service model best fits the organization’s needs?

A

IaaS

In the Infrastructure as a Service model the cloud provider gives customers self service access to a pool of infrastructure resources that can be virtually provisioned and deprovisioned on demand.

49
Q

SaaS

A

Software as a Service

A software service or application is hosted by a cloud provider and provided to customers (typically over the Internet). The cloud provider manages the infrastructure and platform, and the customer only needs to manage specific canfugurations within the application.

50
Q

The IT Director for an organization has revamped the organization’s identity management structure so that pre-built permission groups are developed for each department such as IT, Finance, Sales, HR, and so on. Users are then assigned to those corresponding groups depending on what team they are on. Which access control model is most likely being utilized?

A

RBAC

Role based access control enforces access based on roles that define permissions, and the level of access provided to any subjects assigned to that role.

51
Q

Which cloud deployment model consists of cloud resources that are available for purchase and consumption by the general public?

A

Public

Public cloud consists of computing resources operated by a third party that are deployed for use by the general public for purchase and consumption

52
Q
A