Protecting the Organization Flashcards

1
Q

Which of the following tools can be used to provide a list of open ports on network devices?

(a) Ping

(b) Whois

(c) Nmap

(d) Tracert

A

Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

‘Today, there are single security appliances that will solve all the network security needs of an organization.’

Is this statement true or false?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the correct definition of risk management?

(a) The process of identifying and assessing risk to determine the severity of threats

(b) The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities

(c) The process of transferring risks that cannot be eliminated or mitigated

(d) The process of accepting risks that cannot be eliminated, mitigated or transferred

A

The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?

(a) NetFlow

(b) Nmap

(c) Snort

(d) SIEM

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Behavior-based analysis involves using baseline information to detect what?

(a) Backdoors

(b) Vulnerabilities

(c) Risk

(d) Anomalies

A

Anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol is used to collect information about traffic traversing a network?

(a) HTTPS

(b) NAT

(c) NetFlow

(d) Telnet

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following actions should an organization take in the event of a security breach?

Select two correct answers

(a) Advise employees to be more careful

(b) Assume this type of breach won’t happen again

(c) Communicate a call to action to all employees

(d) Carry out research to uncover what caused the breach

(e) Contain the information so that it does not go public

A

Communicate a call to action to all employees

Carry out research to uncover what caused the breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a security playbook?

(a) A collection of security alerts, logs and historical data from the network

(b) A step-by-step guide on how to carry out IT-related procedures

(c) A collection of repeatable queries or reports that outline a standardized process for incident detection and response

A

A collection of repeatable queries or reports that outline a standardized process for incident detection and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly