Risk Management (2) Flashcards
You are the security administrator and have discovered a malware incident. Which of the following responses should you do first?
Recovery
Eradication
Containment
Containment
After identifying the malware incident, the next step you would perform based on the incident response process is to contain the malware to further study the incident and prevent it from spreading across the network
You are an IT administrator for a company and you are adding new employees to an organization’s identity and access management system. Which of the following best describes the process you are performing?
Onboarding
Offboarding
Adverse action
Onboarding
Onboarding is the process of adding an employee to a company’s identity and access management system
Your company is partnering with another company and requires systems to be shared. Which of the following agreements would outline how the shared systems should be interfaced?
BPA
SLA
ISA
ISA
An interconnection security agreement (ISA) is an agreement that specifies technical and security requirements for planning, establishing, maintaining, and disconnecting a secure connection between at least two companies
Mark is an office manager at a local bank branch. He wants to ensure customer information isn’t compromised when the deskside employees are away from their desks for the day. What security concept would Mark use to mitigate this concern?
Clean desk
Background checks
Continuing education
Clean desk
A clean desk policy ensures that all sensitive/confidential documents are removed from an end-user workstation and locked up when the documents are not in use
You are a security administrator and advise the web development team to include a CAPTCHA on the web page where users register for an account. Which of the following controls is this referring to?
Deterrent
Detective
Compensating
Deterrent
As users register for an account, they enter letters and numbers they are given on the web page before they can register. This is an example of a deterrent control as it prevents bots from registering and proves this is a real person
Which of the following is not a common security policy type?
Social media policy
Password policy
Parking policy
Parking policy
Parking policy generally outlines parking provisions for employees and visitors. This includes the criteria and procedures for allocating parking spaces for employees
As the IT security officer, you are configuring data label options for your company’s research and development file server. Regular users can label documents as contractor, public, or internal. Which label should be assigned to company trade secrets?
High
Top secret
Proprietary
Proprietary
Proprietary data is a form of confidential information, and if the information is revealed, it can have severe effects on the company’s competitive edge
Users are currently accessing their personal email through company computers, so you and your IT team have created a security policy for email use. What is the next step after creating and approving the email use policy?
Encrypt all user email messages.
Provide security user awareness training.
Provide every employee with their own device to access their personal email.
Provide security user awareness training.
Provide security user awareness training to all employees regarding the risk of using personal email through company computers. The ability to access personal email is a security risk because the company is unable to filter emails through the company’s Exchange server
Which of the following is not a physical security control?
Motion detector
Fence
Antivirus software
Antivirus software
Antivirus software is used to protect computer systems from malware and is not a physical security control
Which of the following might you find in a DRP?
Single point of failure
Prioritized list of critical computer systems
Exposure factor
Prioritized list of critical computer systems
A disaster recovery plan (DRP) is a plan that helps a company recover from an incident with minimal loss of time and money. It prioritizes critical computer systems
Your security manager wants to decide which risks to mitigate based on cost. What is this an example of?
Quantitative risk assessment
Qualitative risk assessment
Business impact analysis
Quantitative risk assessment
Quantitative risk assessment is the process of assigning numerical values to the probability an event will occur and what the impact of the event will have
Your company has outsourced its proprietary processes to Acme Corporation. Due to technical issues, Acme Corporation wants to include a third-party vendor to help resolve the technical issues. Which of the following must Acme Corporation consider before sending data to the third party?
This may constitute unauthorized data sharing.
This may violate the privileged user role-based awareness training.
This may violate a nondisclosure agreement.
This may violate a nondisclosure agreement.
A nondisclosure agreement (NDA) protects sensitive and intellectual data from getting into the wrong hands
Zack is a security administrator who has been given permission to run a vulnerability scan on the company’s wireless network infrastructure. The results show TCP ports 21 and 23 open on most hosts. What port numbers do these refer to? (Choose two.)
FTP
SMTP
Telnet
DNS
FTP
Telnet
FTP (File Transport Protocol) uses port 21 and Telnet uses port 23. These protocols are considered weak and are not recommended for use. They are susceptible to eavesdropping
Which of the following backup concepts is the quickest backup but slowest restore?
Incremental
Differential
Full
Incremental
Incremental backups are the quickest backup method but the slowest method to restore. Incremental backup backs up all new files and any files that have changed since the last full backup or incremental backup. To restore from incremental backups, you will need the full backup and every incremental backup in order
Which of the following operations should you undertake to avoid mishandling of tapes, removal drives, CDs, and DVDs?
Degaussing
Acceptable use
Data labeling
Data labeling
Data labeling policy includes how data is labeled such as confidential, private, or public. It should also include how the data is handled and disposed of for all classifications of data. Before data can be disposed of, you will need to destroy it with a data sanitization tool