Protecting the Organization Flashcards
Which of the following tools can be used to provide a list of open ports on network devices?
(a) Ping
(b) Whois
(c) Nmap
(d) Tracert
Nmap
‘Today, there are single security appliances that will solve all the network security needs of an organization.’
Is this statement true or false?
False
What is the correct definition of risk management?
(a) The process of identifying and assessing risk to determine the severity of threats
(b) The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities
(c) The process of transferring risks that cannot be eliminated or mitigated
(d) The process of accepting risks that cannot be eliminated, mitigated or transferred
The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities
Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
(a) NetFlow
(b) Nmap
(c) Snort
(d) SIEM
Behavior-based analysis involves using baseline information to detect what?
(a) Backdoors
(b) Vulnerabilities
(c) Risk
(d) Anomalies
Anomalies
What protocol is used to collect information about traffic traversing a network?
(a) HTTPS
(b) NAT
(c) NetFlow
(d) Telnet
Which of the following actions should an organization take in the event of a security breach?
Select two correct answers
(a) Advise employees to be more careful
(b) Assume this type of breach won’t happen again
(c) Communicate a call to action to all employees
(d) Carry out research to uncover what caused the breach
(e) Contain the information so that it does not go public
Communicate a call to action to all employees
Carry out research to uncover what caused the breach
What is a security playbook?
(a) A collection of security alerts, logs and historical data from the network
(b) A step-by-step guide on how to carry out IT-related procedures
(c) A collection of repeatable queries or reports that outline a standardized process for incident detection and response
A collection of repeatable queries or reports that outline a standardized process for incident detection and response