Section 11-12 Flashcards

1
Q

Which of the following describes a security alerting and monitoring tool that collects system, application, and network logs from multiple sources in a centralized system?

a.
SIEM.
b.
DLP.
c.
IDS.
d.
SNMP.

A

a.
SIEM.Correct
SIEM (Security Information and Event Management) systems collect and analyze security-related data from various sources to provide real-time monitoring, alerting, and analysis, helping to identify and respond to security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A systems administrator is working on a defense-in-depth strategy and needs to restrict activity from employees after hours. Which of the following should the systems administrator implement?

a.
Role-based restrictions.
b.
Attribute-based restrictions.
c.
Mandatory restrictions.
d.
Time-of-day restrictions.Correct
Time-of-day restrictions limit user access to systems and resources based on the time of day, ensuring that employees cannot access systems after hours, thereby enhancing security and reducing the risk of unauthorized activity.

A

d.
Time-of-day restrictions.Correct
Time-of-day restrictions limit user access to systems and resources based on the time of day, ensuring that employees cannot access systems after hours, thereby enhancing security and reducing the risk of unauthorized activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

During a recent breach, employee credentials were compromised when a service desk employee issued an MFA bypass code to an attacker who called and posed as an employee. Which of the following should be used to prevent this type of incident in the future?

a.
Hardware token MFA.
b.
Biometrics.
c.
Identity proofing.
d.
Least privilege.

A

c.
Identity proofing.Correct Answer
Identity proofing involves verifying the identity of individuals before granting them access to systems or resources, ensuring that the person requesting an MFA bypass is who they claim to be, thereby preventing social engineering attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network manager wants to protect the company’s VPN by implementing multifactor authentication that uses Something you know - Something you have - Something you are - Which of the following would accomplish the manager’s goal?

a.
Domain name, PKI, GeoIP lookup.
b.
VPN IP address, company ID, facial structure.
c.
Password, authentication token, thumbprint.
d.
Company URL, TLS certificate, home address.

A

c.
Password, authentication token, thumbprint.Correct Answer
Multifactor authentication (MFA) increases security by requiring users to provide multiple forms of verification something they know (password), something they have (authentication token), and something they are (biometric verification like a thumbprint).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Once the password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user’s intranet account? (Choose two.)

a. Federation.
b. Identity proofing.
c. Password complexity.
d. Default password changes.
e. Password manager.
f. Open authentication.

A

a. Federation.Your Answer: Correct
Federation allows for single sign-on (SSO) where a user’s credentials can be used across multiple systems and organizations.

c. Password complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following security concepts is the best reason for permissions on a human resources fileshare to follow the principle of least privilege?

a.
Integrity.
b.
Availability.
c.
Confidentiality.
d.
Non-repudiation.

A

c.
Confidentiality.Correct Answer
Confidentiality ensures that sensitive information is only accessible to those who need it, protecting personal and sensitive HR data from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following would be the best ways to ensure only authorized personnel can access a secure facility? (Choose two.)

a. Fencing.
b. Video surveillance.
c. Badge access.
d. Access control vestibule.
e. Sign-in sheet.
f. Sensor.

A

c. Badge access.

d. Access control vestibule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?

a.
Off-the-shelf software.
b.
Orchestration.
c.
Baseline.
d.
Policy enforcement.

A

b.
Orchestration.Correct Answer
Orchestration involves automating the deployment, management, and coordination of complex IT tasks, such as account creation, to save time and reduce human error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The management team notices that new accounts that are set up manually do not always have correct access or permissions. Which of the following automation techniques should a systems administrator use to streamline account creation?

a.
Guard rail script.
b.
Ticketing workflow.
c.
Escalation script.
d.
User provisioning script.

A

d.
User provisioning script.Correct Answer
A user provisioning script automates the correct access and permissions setup, ensuring that new accounts are configured consistently and accurately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

a.
SSO.
b.
LEAP.
c.
MFA.
d.
PEAP.

A

a.
SSO.Correct
SSO (Single Sign-On) enables users to log in once with their domain credentials and gain access to multiple applications without needing separate logins, reducing the number of credentials employees need to maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An organization disabled unneeded services and placed a firewall in front of a business-critical legacy system. Which of the following best describes the actions taken by the organization?

a.
Exception.
b.
Segmentation.
c.
Risk transfer.
d.
Compensating controls.

A

d.
Compensating controls.Correct Answer
Compensating controls are additional measures taken to enhance security for systems that cannot be fully secured due to limitations or constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A bank set up a new server that contains customers’ PII. Which of the following should the bank use to make sure the sensitive data is not modified?

a.
Full disk encryption.
b.
Network access control.
c.
File integrity monitoring.
d.
User behavior analytics.c.
File integrity monitoring.Correct Answer
File integrity monitoring ensures that sensitive data is not modified by tracking changes to files and alerting administrators to unauthorized modifications.

A

c.
File integrity monitoring.Correct Answer
File integrity monitoring ensures that sensitive data is not modified by tracking changes to files and alerting administrators to unauthorized modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A systems administrator would like to deploy a change to a production system. Which of the following must the administrator submit to demonstrate that the system can be restored to a working state in the event of a performance issue?

a.
Backout plan.
b.
Impact analysis.
c.
Test procedure.
d.
Approval procedure.

A

a.
Backout plan.Your Answer: Correct
A backout plan outlines steps to revert the system to its previous state if the new change causes issues, ensuring system stability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?

a.
Remote access points should fail closed.
b.
Logging controls should fail open.
c.
Safety controls should fail open.
d.
Logical security controls should fail closed.

A

c.
Safety controls should fail open.Correct Answer
Safety controls should fail open to ensure that safety mechanisms remain operational during failures, protecting human life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?

a.
Clustering servers.
b.
Geographic dispersion.
c.
Load balancers.
d.
Off-site backups.

A

b.
Geographic dispersion.Correct Answer
Geographic dispersion minimizes the impact of localized disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company is planning a disaster recovery site and needs to ensure that a single natural disaster would not result in the complete loss of regulated backup data. Which of the following should the company consider?

a.
Geographic dispersion.
b.
Platform diversity.
c.
Hot site.
d.
Load balancing.

A

a.
Geographic dispersion.Your Answer: Correct
Geographic dispersion ensures that backup data is stored in multiple, geographically diverse locations, protecting against data loss from a single regional disaster.

16
Q

Which of the following best ensures minimal downtime and data loss for organizations with critical computing equipment located in earthquake-prone areas?

a.
Generators and UPS.
b.
Off-site replication.
c.
Redundant cold sites.
d.
High availability networking.

A

b.
Off-site replication.Correct Answer
Off-site replication involves duplicating data and systems at a geographically separate location, ensuring that data and services can be quickly restored in the event of a disaster at the primary site.

17
Q

A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?

a.
Implementing a bastion host.
b.
Deploying a perimeter network.
c.
Installing a WAF.
d.
Utilizing single sign-on.

A

a.
Implementing a bastion host.Correct
A bastion host is a hardened server specifically designed to withstand attacks and serve as a secure gateway for accessing internal networks. It minimizes the exposed attack surface by limiting administrative traffic to a single, secured point.

18
Q

A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?

a.
Jump server.
b.
RADIUS.
c.
HSM.
d.
Load balancer.

A

a.
Jump server.Correct
A jump server provides a controlled access point for administrators to connect to critical systems, adding an extra layer of security by separating the administrative and operational environments.

19
Q

An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?

a.
RDP server.Incorrect
b.
Jump server.
c.
Proxy server.
d.
Hypervisor.

A

b.
Jump server.Correct Answer
A jump server acts as an intermediary, allowing administrators to access and manage servers securely without exposing them directly to external threats.