Practice Test 1 Flashcards

1
Q

You have an asset that is valued at $1,000. The EF for this asset is 10 percent. The ARO is 2. What is the ALE?

A

The ALE is $200. The ALE is the ARO × SLE. The SLE is EF × AV. In this question, you have two equations to solve. The SLE is 10% × $1,000, which is $100. The ALE is 2 × $100.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are a consultant for a cybersecurity firm and have been tasked with quantifying risks associated with information technology when validating the abilities of new security controls and countermeasures. What is the best way to identify the risks?

A

Threat and Risk Assessment. Threat and risk assessments are the best way to identify the risks this company is facing. Pentesting will come after the controls are in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which security program is designed to provide employees with the knowledge they need to fulfill their job requirements and protect the organization?

A

Training. Training is the first line of defense against security risks. You cannot protect what you do not know exists. You will need training for compliance with regulatory requirements as well as organizational objectives. Awareness is achieved through cultural attitudes combined with training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Alice discovered a meterpreter shell running a keylogger on the CFO’s laptop. What security tenet is the keylogger mostly likely to break?

A

Confidentiality. A keylogger, by its very nature, is meant to steal the keystrokes that the victim makes on the keyboard. Using this information, the attacker can replay websites, usernames, and passwords typed in by the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are a security administrator for a network that uses Fibre Channel over Ethernet (FCoE). The network administrator would like to access raw data from the storage array and restore it to yet another host. Which of the following might be an issue to availability?

A

The data might not be in the same format and not be able to be restored to a different application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

As a network administrator, you are asked to connect a server to a storage-attached network. If availability and access control are the most important, which of the following fulfills the requirements?

A

Installing an HBA in the server, creating a LUN on the SAN.HBA is a host bus adapter. It is a hardware device, like a circuit board, that provides connectivity between a server and storage-attached network used to improve performance. LUN storage is important to the configuration. A LUN is a unique identifier given to separate devices so that they can be accessed in a storage disk array.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following confidentiality security models ensures that a subject with clearance level of Secret can write only to objects classified as Secret or Top Secret?

A

Bell-LaPadula. The goal of the confidentiality model Bell–LaPadula is to keep secret data secret and share secret data when it is allowed to be shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your organization needs a security model for integrity where the subject cannot send messages to object of higher integrity. Which of the following is unique to the Biba model and will accommodate that need?

A

Invocation. The Biba model is a state transition system for computer security. Data is grouped into ordered levels of integrity. The model was created so that subjects cannot corrupt the data. Invocation properties mean that a process from below cannot even request a higher access. It can only work with the same or lower levels. (Think of it as the inverse of Bell–LaPadula, which deals with security and people.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to assign permissions so that users can access only the resources they need to complete specific tasks. Which security tenet did you use to meet the need?

A

Least Privilege. Least privilege is assigning permissions so that users can access only those resources required to do their job. Job rotation, need to know, and separation of duties are also important to security. Job rotation avoids single points of failure, need to know promotes confidentiality, and separation of duties gives clear and direct roles to employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are tasked with hiring a third party to perform a security assessment of your manufacturing plant. What type of testing gives the most neutral review of your security profile?

A

Gray Box. A gray-box test is performed with limited knowledge. Gray-box testing is a good way of finding security flaws in programs. It can assist in discovering bugs or exploits due to incorrect code structure or incorrect use of applications. By combining white-box and black-box testing, gray-box testing tries to get the best out of the two techniques. A white-box test is performed with complete and full internal knowledge. Black-hat hackers have extensive knowledge about breaking into systems, which is usually for financial gain. Yes, there are blue-hat hackers. A blue-hat hacker is someone who typically tests systems before they launch, looking for bugs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Alice needs some help developing security policy documentation. She turns to you for help in developing a document that contains instructions or information on how to remain in compliance with regulations. What document do you need to develop?

A

Standards. A standard is a kind of security policy that defines how to remain in compliance with best practices and industry standards. Procedures are the step-by-step instructions on how to implement those best practices. Guidelines are used to create the procedures. Policies are at the highest level and describe the mission and goals. Policies are usually nonspecific and goal-oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Prioritization is an important part of your job as a security analyst. You are trying to calculate the ALE for all assets and risks. What purpose will this serve?

A

To prioritize countermeasures. The focus of ALE calculations is to prioritize countermeasures. A countermeasure is an action taken to counteract a danger or threat. The asset-risk pair with the largest ALE should be dealt with first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One of the software developers made a change in code that unintentionally diminishes security. Which of the following change control processes will be most effective in this situation?

A

Rollback. A rollback is a change control process that makes it possible to roll back any change that has a negative effect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your external auditor submitted the final report to the board of directors and upper management. Who is responsible for implementing the recommendations in this report?

A

Senior Management. Senior management is always responsible for security within an organization. They are responsible for following the recommendations of the auditor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security vulnerability was discovered while a system went through the accreditation process. What action should come next?

A

A. Start the accreditation process over again once the issue is fixed.

B. Restart the accreditation process from when the issue was discovered.
C. Reimage the system and start the accreditation process from the beginning.
D. Reimage the system and start from the current point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your department was tasked with implementing Bluetooth connectivity controls to mitigate risk. Which of these best describes the network you will create?

A

A. PAN

B. LAN
C. WAN
D. WLAN

17
Q

You are planning the site security for a new building. The network administrators would like the server room door to be secured with RFID. The security team would like to use a cipher lock. Loss of the data on these servers is high risk. What should your plan start with?

A

A. A meeting to discuss security options.
B. Smartcards
C. TFA, both cipher lock and RFID
D. A keyed lock only

18
Q

You are a systems analyst conducting a vulnerability assessment. Which of the following is not a requirement for you to know?

A. Access Controls
B. Understanding of the systems to be evaluated
C. Potential Threats
D. Passwords

A
19
Q

You are made aware of a threat that involves a hacking group holding large amounts of information about your company. What best describes the threat you face from this hacking group?

A

A. DOS
B. TCO
C. Latency
D. Data mining

20
Q

You are evaluating the risk for your data center. You assigned threat, vulnerability, and impact a score from 1 to 10. The data center scores are as follows: Threat: 4, Vulnerability: 2, Impact: 6. What is the risk?

A

A. 12
B. 16
C. 48
D. 35

21
Q

Your customer-facing website experiences some failures. The security engineer analyzed the situation and believes it is the web application firewall. Syslog shows that the WAF was down twice, for a total of 3 hours in the past 72 hours. Which of the following is your mean time to repair (MTTR)? 2.5 hours 1.5 hours 34.5 hours 3 hours

A

A. 2.5 hours
B. 1.5 hours
C. 34.5 hours
D. 3 hours

22
Q

Intrusions are usually detected in one of three basic ways. Which detection method can reassemble packets and look at higher-layer activity?

A

A. Signature recognition
B. Heuristic Detection
C. Anomaly detection
D. Protocol decoding

23
Q

What is the lookup table used to store MAC addresses on a switch called?

A

A. Content addressable memory
B. Random access memory
C. Read-only memory
D. Nonvolatile memory

24
Q

If loaded into a router, which set of commands allows a network engineer to log into it if they know the correct password?

A

A. Router>enable
Router# configure terminal
Router(config)#line vty 0 4
Router(config-line)#password secret

B. Router>enable
Router# configure terminal
Router(config)#line vty 0 4
Router(config-line)#password secret
Router(config-line)#login

C. Router>enable
Router# configure terminal
Router(config)#line vty 0 4
Router(config-line)#password
Router(config-line-password)#secret

D. Router>enable
Router# configure terminal
Router(config)#line vty 0 4
Router(config-line)#password secret
Router(config-line)#log in

25
Q

Several payload variables can be configured in a mobile device configuration profile—you can configure each mobile device and user to which you are giving the profile. If you wanted to include a unique identifier in the profile, which of these would you choose to populate?

A

A. $DEVICENAME
B. $SITENAME
C. $USERNAME
D. $UDID

26
Q
A