Risk Management (1) Flashcards
You are a manager of a bank and you suspect one of your tellers has stolen money from their station. After talking with your supervisor, you place the employee on leave with pay, suspend their computer account, and obtain their proximity card and keys to the building. Which of the following policies did you follow?
Mandatory vacations
Exit interviews
Adverse actions
Adverse actions
Adverse actions are administrative actions that are placed against employees. These actions include letters of reprimand, leave with or without pay, or termination. Along with these actions the policy should include actions such as disabling user accounts and revoking privileges, such as access to facilities to prevent data from being compromised. When an employee has been placed with administrative actions, the company shouldn’t worry about vindictive actions they will take against the company
Which of the following principles stipulates that multiple changes to a computer system should not be made at the same time?
Due diligence
Acceptable use
Change management
Change management
Change management is the process of documenting all changes made to a company’s network and computers. Avoiding making changes at the same time makes tracking any problems that can occur much simpler
Why are penetration test often not advised?
It can be disruptive for the business activities.
It’s able to find both known and unknown hardware or software weaknesses.
It permits the exploration of real risks and gives a precise depiction of a company’s IT infrastructure security posture at any given time.
It can be disruptive for the business activities.
The main reason to avoid penetration tests is answer A. It’s advised to perform vulnerability test often rather than penetration tests. Pentests can cause disruption to businesses. This is the main focus of the question
You are a security engineer and discovered an employee using the company’s computer systems to operate their small business. The employee installed their personal software on the company’s computer and is using the computer hardware, such as the USB port. What policy would you recommend the company implement to prevent any risk of the company’s data and network being compromised?
Acceptable use policy
Clean desk policy
Mandatory vacation policy
Acceptable use policy
Acceptable use policy is a document stating what a user may or may not have access to on a company’s network or the Internet
What should be done to back up tapes that are stored off-site?
Generate a file hash for each backup file.
Scan the backup data for viruses.
Encrypt the backup data.
Encrypt the backup data.
Encrypting the backup data before storing it off-site ensures data confidentiality
Which recovery site is the easiest to test?
Warm site
Cold site
Hot site
Hot site
A hot site contains all of the alternate computer and telecommunication equipment needed in a disaster. Testing this environment is simple
Katelyn is a network technician for a manufacturing company. She is testing a network forensic capturing software and plugs her laptop into an Ethernet switch port and begins capturing network traffic. Later she begins to analyze the data and notices some broadcast and multicast packets, as well as her own laptop’s network traffic. Which of the following statements best describes why Katelyn was unable to capture all network traffic on the switch?
Each port on the switch is an isolated broadcast domain.
Each port on the switch is an isolated collision domain.
Promiscuous mode must be enabled on the NIC.
Each port on the switch is an isolated collision domain.
Switches forwards data only to the devices that need to receive it, so when capturing network traffic the computer will see only broadcast and multicast packets along with traffic being sent and received to the connected computer
Which of the following is not a step of the incident response process?
Snapshot
Preparation
Recovery
Snapshot
A snapshot is the state of a system at a particular point in time. It’s also known as a system image and is not a step in the incident response process
Which of the following is another term for technical controls?
Access controls
Logical controls
Detective controls
Logical controls
Technical controls are used to restrict data access and operating system components, security applications, network devices, and encryption techniques. Logical controls use authentication mechanisms
You are a security manager for your company and need to reduce the risk of employees working in collusion to embezzle funds. Which of the following policies would you implement?
Mandatory vacations
Clean desk
NDA
Mandatory vacations
Companies will use mandatory vacations policies to detect fraud by having a second person, familiar with the duties, help discover any illicit activities
You are a security administrator, and your manager has asked you about protecting the privacy of personally identifiable information (PII) that is collected. Which of the following would be the best option to fulfill the request?
PIA
BIA
RTO
PIA
Privacy impact assessment (PIA) is a measurement of how a company can keep private information safe while the company is in possession of PII
Which of the following plans best identifies critical systems and components to ensure the assets are protected?
DRP
BCP
IT contingency plan
BCP
A business continuity plan is a policy that describes and approves the company’s overall business continuity strategy. This also includes identifying critical systems to protect
After your company implemented a clean desk policy, you have been asked to secure physical documents every night. Which of the following would be the best solution?
Department door lock
Locking cabinets and drawers
Proximity card
Locking cabinets and drawers
Locking cabinets and drawers is the best solution because the employee would be the only one with a key
Your manager has instructed the team to test certain systems based on the business continuity plan to ensure they are operating properly. The manager wants to ensure there are no overlaps in the plan before implementing the test. Which continuity of operation planning concept is your manager referring to?
After-action report
Eradication
Tabletop exercise
Tabletop exercise
The tabletop exercise test is considered a cost-effective and efficient way to identify areas of overlaps in a plan before implementing a test
Which of the following is an example of PHI?
Passport number
Criminal record
Fingerprints
Fingerprints
Fingerprints are considered PHI (Protected Health Information), according to HIPPA rules