Risk Management (4) Flashcards
Which of the following secures access to company data in agreement to management policies?
Technical controls
Administrative controls
HTTPS
Technical controls
Technical controls are applied through technology and may be deterrent, preventive, detective, or compensating. They include hardware or software solutions using access control in accordance with established security policies
You are a server administrator for your company’s private cloud. To provide service to employees, you are instructed to use reliable hard disks in the server to host a virtual environment. Which of the following best describes the reliability of hard drives?
MTTR
RPO
MTBF
MTBF
Mean time between failures (MTBF) is a measurement to show how reliable a hardware component is
You are replacing a number of devices with a mobile appliance that combines several functions. Which of the following describes the new implementation?
Cloud computing
Load balancing
Single point of failure
Single point of failure
Single point of failure is a single weakness that can bring an entire system down and prevent it from working
Which of the following can help mitigate adware intrusions?
Antivirus
Spyware
Pop-up blocker
Pop-up blocker
A pop-up blocker program can help prevent pop-ups from displaying in a user’s web browser. Pop-ups can contain adware or spyware
In the initial stages of a forensics investigation, Zack, a security administrator, was given the hard drive of the compromised workstation by the incident manager. Which of the following data acquisition procedures would Zack need to perform in order to begin the analysis? (Choose two.)
Take hashes
Take screenshots
Capture the system image
Start the order of volatility
Take hashes
Capture the system image
Taking hashes of the hard drive will preserve the evidence. If the hash has not been changed, the data hasn’t changed. Capturing the system image involves making an exact image of the drive so that it can be referenced later in the investigation
Which of the following best describes a Computer Incident Response Team (CIRT)?
Personnel who participate in exercises to practice incident response procedures
Personnel who promptly and correctly handle incidents so they can be quickly contained, investigated, and recovered from
A team to identify planning flaws before an actual incident occurs
Personnel who promptly and correctly handle incidents so they can be quickly contained, investigated, and recovered from
A Computer Incident Response Team (CIRT) includes personnel who promptly and correctly handle incidents so that they can be quickly contained, investigated, and recovered from
Which of the following decreases the success of brute-force attacks?
Password complexity
Account lockout threshold
Enforce password history
Account lockout threshold
The account lockout threshold setting defines the number of failed sign-in attempts that will cause a user account to be locked. This policy best mitigates brute-force password attacks
A warrant has been issued to investigate a file server that is suspected to be part of an organized crime to steal credit card information. You are instructed to follow the order of volatility. Which data would you collect first?
RAM
USB flash drive
Hard disk
RAM
Random access memory (RAM) data is lost when the device is powered off. Therefore, RAM must be properly collected first
What should human resources personnel be trained in regarding security policies?
Guidelines and enforcement
Order of volatility
Penetration assessment
Guidelines and enforcement
A standard operating procedure (SOP) is a document that details the processes that a company will have in place to ensure that routine operations are delivered consistently every time. Guidelines and enforcement are items that are included in a SOP
Which of the following is not a basic concept of computer forensics?
Preserve evidence
Determine if the suspect is guilty based on the findings
Track man-hours and expenses
Determine if the suspect is guilty based on the findings
Determining if the suspect is guilty is determined by the legal system and is not part of the basic concept of computer forensics
The Chief Information Officer (CIO) wants to set up a redundant server location so that the production server images can be moved within 36 hours and the servers can be restored quickly, should a catastrophic failure occur at the primary location. Which of the following can be implemented?
Hot site
Cold site
Warm site
Warm site
A warm site is harder to test because it contains only the equipment and no employees or company data
Choose the correct order of volatility when collecting digital evidence.
Hard disk drive, DVD-R, RAM, swap file
Swap file, RAM, DVD-R, hard disk drive
RAM, swap file, hard disk drive, DVD-R
RAM, swap file, hard disk drive, DVD-R
Digital evidence for forensic review must first be collected from the most volatile (not permanent) locations such as RAM and swap files. A swap file is a location on a hard disk drive used as the virtual memory extension of a computer’s RAM. A hard disk drive is the next least volatile, then DVD-R. Some digital evidence can be gathered by using a live boot media
Which of the following pieces of information would be summarized in the lessons learned phase of the incident response process? (Choose three.)
When the problem was first detected and by whom
How the problem was contained and eradicated
The work that was performed during the recovery
Preparing a company’s team to be ready to handle an incident at a moment’s notice
When the problem was first detected and by whom
How the problem was contained and eradicated
The work that was performed during the recovery
The lessons learned process is the most critical phase because it is the phase in which you complete any documentation that may be beneficial in future incidents. Documentation should include information such as when the problem was first detected and by whom, how the problem was contained and eradicated, the work that was performed during the recovery, and areas that may need improvement
You receive a phone call from an employee reporting that their workstation is acting strangely. You gather information from the intrusion detection system and notice unusual network traffic from the workstation, and you determine the event may be an incident. You report the event to your manager, who then begins to collect evidence and prepare for the next steps. Which phase of the incident response process is this?
Preparation
Identification
Containment
Identification
The identification phase deals with the discovery and determination of whether a deviation from normal operations within a company is an incident. This phase requires a person to collect events from various sources and report the incident as soon as possible
Your manager has asked you to recommend a way to transmit PII via email and maintain its confidentiality. Which of the following options is the best solution?
Hash the information before sending.
Protect the information by using RAID.
Encrypt the information before sending.
Encrypt the information before sending.
Encrypting PII ensures confidentiality.