Q16 Flashcards

1
Q
An organization ensures that users are granted access to only the data they need to perform specific work tasks. What principle are they following?
A.   Principle of least permission
B.    Separation of duties
C.   Need to know
D.   Role-based access control
A

C. Need to know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
An administrator is granting permissions to a database. What is the default level of access the administrator should grant to new users?
A.   Read
B.    Modify
C.   Full access
D.   No access
A

D. No access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What is a primary benefit of job rotation and separation of duties policies?
A.   Preventing collusion
B.    Preventing fraud
C.   Encouraging collusion
D.   Correcting incidents
A

B. Preventing fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is one of the primary reasons an organization enforces a mandatory vacation policy?
A.   To rotate job responsibilities
B.    To detect fraud
C.    To increase employee productivity
D.   To reduce employee stress levels
A

B. To detect fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following identifies vendor responsibilities and can include monetary penalties if the vendor doesn’t meet the stated responsibilities?
A. Service level agreement (SLA)
B. Memorandum of understanding (MOU)
C. Interconnection security agreement (ISA)
D. Software as a Service (SaaS)

A

A. Service level agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An organization is planning the layout of a new building that will house a datacenter. Where is the most appropriate place to locate the datacenter?
A. In the center of the building
B. Closest to the outside wall where power enters the building
C. Closest to the outside wall where heating, ventilation, and air conditioning systems are located
D. At the back of the building

A

A. In the center of the building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backup tapes have reached the end of their life cycle and need to be disposed of. Which of the following is the most appropriate disposal method?
A. Throw them away. Because they are at the end of their life cycle, it is not possible to read data from them.
B. Purge the tapes of all data before disposing of them.
C. Erase data off the tapes before disposing of them.
D. Store the tapes in a storage facility.

A

B. Purge the tapes of all data before disposing of them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following can be an effective method of configuration management using a baseline?
A. Implementing change management
B. Using images
C. Implementing vulnerability management
D. Implementing patch management

A

B. Using images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
While troubleshooting a network problem, a technician realized it could be resolved by opening a port on a firewall. The technician opened the port and verified the system was now working. However, an attacker accessed this port and launched a successful attack. What could have prevented this problem?
A.   Patch management processes
B.    Vulnerability management processes
C.   Configuration management processes
D.   Change management processes
A

D. Change management processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
What would an administrator use to check systems for known issues that attackers may use to exploit the systems?
A.   Versioning tracker
B.    Vulnerability scanner
C.   Security audit
D.   Security review
A

B. Vulnerability scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly