Practice Questions Flashcards
unofficial
Which of the following is an example of a physical control?
What is the primary purpose of succession planning?
To define plans for how to handle the sudden loss of an executive or key employee to the organization
A data center technician needs to securely dispose of several hard drives for systems that are being decommissioned. Which of the following techniques is not sufficient to ensure the data is not recoverable?
Erasure
Erasure occurs when you press the Delete key on a computer or empty the recycle bin on your desktop. When this occurs, the data is not actually removed from the hard drive and may be recovered.
Fortification of facilities, deployment of uninterruptible power supplies or generators, communication link redundancy, and fire detection and suppression systems are all examples of what?
Preventative controls
Controls designed to stop unwanted things from occurring
Which of the following techniques is not a method for identifying a security incident?
Disabling system accounts
This may be done as a containment strategy as part of the incident response process, however, this is not a method for identifying a security incident.
IDS
Intrusion Detection System
SIEM
Security Information and Event Management
Which of the following would a hacker not usually learn by conducting scans against a targeted network?
Reveal user accounts on endpoints that have excessive privilege
Scanners cannot tell if user accounts have too many privileges since that is dependent upon the user’s role in the organization and their need to know
Which of the following best describes DAC?
Access control model that provides the owner of the resource (typically the creator) complete control to configure which subjects can access an object
DAC
Discretionary Access Control
MAC
Mandatory Access Control
RBAC
Role Based Access Control
ABAC
Attribute Based Access Control
Which technology would an organization use to control which devices could connect to their network?
NAC
Network Access Control allows organizations to control which devices are permitted to connect to their network based on policy
IDS
Intrusion Detection System
DMZ
Demilitarized Zone
Which of the following is not true regarding UDP?
UDP is a connection oriented protocol
User Datagram Protocol is a protocol for for transmitting data between computers. It does not establish a connection (three-way handshake) before transmitting data. This makes it less reliable but also faster than TCP.
TCP
Which of the following is a logical address assigned to devices connected to a network or the Internet?
Internet Protocol (IP) address
IP addresses are used for identifying devices for the purpose of routing traffic. They are referred to as a logical or software address as it is a virtual address and not hardcoded into the hardware
Which of the following is the bestt description of a computer virus?
Malware that infects a legitimate program and causes it to perform a function it was not intended to do