section 1-2 Flashcards
Which of the following is the best way to secure an on-site data center against intrusion from an insider?
a.
Bollards.
b.
Access badge.
c.
Motion sensor.
d.
Video surveillance.
b.
Access badge.Correct Answer
An access badge is a security token that allows authorized individuals to enter restricted areas, ensuring that only those with the proper credentials can access sensitive areas like a data center.
Visitors to a secure facility are required to check in with a photo ID and enter the facility through an access control vestibule. Which of the following best describes this form of security control?
a.
Physical.
b.
Managerial.
c.
Technical.
d.
Operational.
a.
Physical.Correct Answer
Physical security controls include measures such as photo ID check-ins and access control vestibules that physically prevent unauthorized access to facilities.
A systems administrator wants to prevent users from being able to access data based on their responsibilities. The administrator also wants to apply the required access structure via a simplified format. Which of the following should the administrator apply to the site recovery resource group?
a.
RBAC.
b.
ACL.
c.
SAML.
d.
GPO.
a.
RBAC.Correct
Role-Based Access Control (RBAC) allows administrators to restrict system access to authorized users based on their roles within an organization, which simplifies the access control process.
A technician is deploying a new security camera. Which of the following should the technician do?
a.
Configure the correct VLAN.
b.
Perform a vulnerability scan.
c.
Disable unnecessary ports.
d.
Conduct a site survey.
d.
Conduct a site survey.Correct Answer
Conducting a site survey helps determine the optimal placement for the security camera to ensure maximum coverage and effectiveness.
A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use?
a.
Deploying PowerShell scripts.
b.
Pushing GPO update.
c.
Enabling PAP.
d.
Updating EDR profiles.
b.
Pushing GPO update.Correct Answer
Pushing a Group Policy Object (GPO) update allows the administrator to quickly and uniformly enforce new password policies across all systems in the enterprise environment.
A network administrator is working on a project to deploy a load balancer in the company’s cloud environment. Which of the following fundamental security requirements does this project fulfill?
a.
Privacy.
b.
Integrity.
c.
Confidentiality.
d.
Availability.
d.
Availability.Correct Answer
A load balancer distributes network or application traffic across multiple servers, increasing the availability and reliability of applications.
A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. Which of the following data classifications should be used to secure patient data?
a.
Private.
b.
Critical.
c.
Sensitive.
d.
Public.
c.
Sensitive.Correct Answer
Patient data, often referred to as Protected Health Information (PHI), is highly confidential and requires stringent security measures to protect it from unauthorized access and breaches. Classifying it as ‘Sensitive’ ensures that appropriate security controls and policies are applied to safeguard this critical information.
While troubleshooting a firewall configuration, a technician determined that a ‘deny any’ policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?
a.
Documenting the new policy in a change request and submitting the request to change management.
b.
Testing the policy in a non-production environment before enabling the policy in the production network.
c.
Disabling any intrusion prevention signatures on the ‘deny any’ policy prior to enabling the new policy.
d.
Including an ‘allow any’ policy above the ‘deny any’ policy.
b.
Testing the policy in a non-production environment before enabling the policy in the production network.Correct Answer
Testing the policy in a non-production environment allows the technician to observe the impact of the ‘deny any’ policy without affecting the production network. This step ensures that any unforeseen issues can be identified and addressed before the policy is applied to the live environment, preventing disruptions to company servers and services.
A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?
a.
Redundancy.
b.
Geographic dispersion.
c.
Tabletop exercise.
d.
Capacity planning.
d.
Capacity planning.Correct
Capacity planning involves determining the resources, including staff, required to sustain business operations during a disruption. This step is essential in developing a business continuity strategy to ensure that the company can maintain critical functions and services even in the face of adverse events. By understanding the necessary capacity, the company can better prepare and allocate resources to mitigate the impact of disruptions.
A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?
a.
Air gap the system.
b.
Move the system to a different network segment.
c.
Create a change control request.
d.
Apply the patch to the system.
c.
Create a change control request.Correct Answer
Before applying a high-priority patch to a production system, it is crucial to follow proper change management procedures. Creating a change control request ensures that the proposed change is documented, reviewed, and approved by the necessary stakeholders. This step helps in assessing the potential impact of the patch, planning for any necessary downtime, and ensuring that there are appropriate rollback procedures in case something goes wrong. Skipping this step could lead to unanticipated issues and disrupt production environments.
An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?
a.
Hardening.
b.
Employee monitoring.
c.
Configuration enforcement.
d.
Least privilege.
d.
Least privilege.Correct Answer
The principle of least privilege ensures that individuals only have the minimum levels of access—or permissions—needed to perform their job functions. By restricting access to the administrator console to only the IT manager and the help desk lead, the IT manager is implementing least privilege.
Which of the following security control types does an acceptable use policy best represent?
a.
Detective.
b.
Compensating.
c.
Corrective.
d.
Preventive.
d.
Preventive.Correct
A preventive control is designed to deter or stop unwanted actions. An acceptable use policy sets the rules and guidelines for appropriate use of company resources, helping to prevent misuse and ensuring compliance with organizational standards.
A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO’s report?
a.
Insider threat.
b.
Hacktivist.
c.
Nation-state.
d.
Organized crime.
d.
Organized crime.Correct Answer
Organized crime groups use ransomware to extort money from victims.
An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Choose two.)
a. Application.
b. Authentication.
c. DHCP.
d. Network.
e. Firewall.
f. Database.
c. DHCP.
e. Firewall.
Which of the following threat actors is the most likely to be motivated by profit?
a.
Hacktivist.
b.
Insider threat.
c.
Organized crime.
d.
Shadow IT.
c.
Organized crime.Correct Answer
Organized crime groups are typically motivated by financial gain, often engaging in activities like extortion, theft, and fraud.