Quiz 14 Flashcards

1
Q

Which of the following is a type of security audit? (Choose all that apply.)

Question 1 options:

A) operational

B) independent

C) automated

D) centralized

A

A) Operational
B) Independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is it important to protect the confidentiality of information you gather through auditing? (Choose all that apply.)

A) The information might become corrupted when you store it.

B) Viruses could infect it.

C) Intruders could discover passwords.

D) Employee privacy could be compromised.

A

C) Intruders could discover passwords.

D) Employee privacy could be compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When should you follow the procedure for carrying out change shown in
Figure 14-4?
Question 3 options:

whenever a change needs to be made to security configurations

when the change will have a substantial impact

when the change is needed urgently

when many employees will be affected by the change

A

when the change will have a substantial impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an auditing program in which current connections are scanned and alerts are
generated after suspicious logon attempts?
Question 4 options:

event monitoring

social engineering

port scan

Tinkerbell program

A

Tinkerbell program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following employees has primary responsibilities that include maintaining
and strengthening network defenses?
Question 5 options:

computer security manager

security incident response team leader

chief information officer

security auditor

A

computer security manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a realistic goal of ongoing security management? (Choose all that apply.)

Question 6 options:

A) tracing as many intrusion attempts as possible

B) tracing all attacks

C) continually strengthening and modifying defenses

D) blocking all suspicious packets

A

A) tracing as many intrusion attempts as possible

C) continually strengthening and modifying defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following describes a goal of a security event management program? (Choose all that apply.)
Question 7 options:

A) consolidating events from multiple sources x

B) conducting forensics to trace and prosecute offenders

C) managing IDPS signatures

D) responding to events as quickly as possible x

A

A) consolidating events from multiple sources

D) responding to events as quickly as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you gather information on a variety of security events and respond to
it quickly?
Question 8 options:

Assemble a large response team.*

Outsource security management.

Use distributed data collection.

Automate data collection and analysis.

A

Automate data collection and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an advantage of centralized data collection? (Choose all that apply.)
Question 9 options:

A) reduced traffic through network gateways x

B) only one person needed to review data x

C) reduced software and hardware costs X

D) reduced administrative costs X

A

A) reduced traffic through network gateways

B) only one person needed to review data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why would you choose distributed data collection rather than centralized data
collection?
Question 10 options:

to reduce hardware and software costs

to reduce the load on security managers

to reduce overall costs

to reduce traffic through gateways

A

to reduce traffic through gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Before installing new signatures for an IDPS, what do you need to do?

Question 11 options:

Stop the IDPS.

Change passwords.

Back up the IDPS.

Double-check to verify whether new signatures are necessary.

A

Back up the IDPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can happen if you change a security configuration too abruptly and without
proper authorization?
Question 12 options:

Employees might ignore the change.

You might be flooded with protests from employees.

The change might surprise other security managers.

You could face disciplinary action.

A

You might be flooded with protests from employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The change management process might apply when which of the following occurs? (Choose all that apply.)
Question 13 options:

A) You need to block access to DMZ servers.

B) A new VPN gateway is installed. X

C) You need to change a fragmentation rule in a packet filter. x

D) New password logon procedures are needed. X

A

B) A new VPN gateway is installed.

C) You need to change a fragmentation rule in a packet filter.

D) New password logon procedures are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security auditing involves which of the following? (Choose all that apply.)

Question 14 options:

A) reviewing hardware and software costs

B) rotating firewall logs

C) testing defenses

D) reviewing log files

A

B) rotating firewall logs

C) testing defenses

D) reviewing log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is nonrepudiation?

Question 15 options:

a legal defense used by employees whose privacy has allegedly been violated

the ability to rely on information gained through a security audit

the ability to validate transactions through electronic documentation

the ability of a system to authenticate users*

A

the ability to validate transactions through electronic documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly