Section 23-24 Flashcards
Which of the following best practices gives administrators a set period to perform changes to an operational system to ensure availability and minimize business impacts?
a.
Impact analysis.
b.
Scheduled downtime.
c.
Backout plan.
d.
Change management boards.
b.
Scheduled downtime.Your Answer: Correct
Scheduled downtime allows administrators to plan and perform system maintenance or updates during a designated time, minimizing disruption to business operations and ensuring system availability.
A legacy device is being decommissioned and is no longer receiving updates or patches. Which of the following describes this scenario?
a.
End of business.
b.
End of testing.
c.
End of support.
d.
End of life.
c.
End of support.Correct Answer
End of support refers to the point when a manufacturer no longer provides updates, patches, or technical assistance for a product, making it vulnerable to security risks.
Which of the following are cases in which an engineer should recommend the decommissioning of a network device? (Choose two.)
a. The device has been moved from a production environment to a test environment.
b. The device is configured to use cleartext passwords.
c. The device is moved to an isolated segment on the enterprise network.
d. The device is moved to a different location in the enterprise.
e. The device’s encryption level cannot meet organizational standards.
f. The device is unable to receive authorized updates.
e. The device’s encryption level cannot meet organizational standards.Your Answer: Correct
Devices that cannot meet required encryption standards pose a security risk and should be decommissioned.
f. The device is unable to receive authorized updates.Your Answer: Correct
Devices that cannot receive updates are vulnerable to new threats and should be decommissioned.
Which of the following is the best reason to complete an audit in a banking environment?
a.
Regulatory requirement.
b.
Organizational change.
c.
Self-assessment requirement.
d.
Service-level requirement.
a.
Regulatory requirement.Correct
Ensures compliance with laws and regulations specific to the banking industry.
An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?
a.
Compromise.
b.
Retention.
c.
Analysis.
d.
Transfer.
e.
Inventory.
b.
Retention.Your Answer: Correct
Ensuring data is kept for a required period for legal and regulatory compliance.
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data. Which of the following should the administrator do first?
a.
Block access to cloud storage websites.
b.
Create a rule to block outgoing email attachments.
c.
Apply classifications to the data.
d.
Remove all user permissions from shares on the file s
c.
Apply classifications to the data.Your Answer: Correct
Identifies and categorizes data to implement appropriate protection measures.
Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?
a.
ARO.
b.
RTO.
c.
RPO.
d.
ALE.
e.
SLE.
d.
ALE.Your Answer: Correct
ALE (Annualized Loss Expectancy) helps quantify the expected loss from a risk over a year, making it useful for comparing the cost of mitigating or transferring the risk to the potential impact.
Which of the following is the most likely to be included as an element of communication in a security awareness program?
a.
Reporting phishing attempts or other suspicious activities.
b.
Detecting insider threats using anomalous behavior recognition.
c.
Verifying information when modifying wire transfer data.
d.
Performing social engineering as part of third-party penetration testing.
a.
Reporting phishing attempts or other suspicious activities.Your Answer: Correct
Encourages identifying and reporting potential threats.
Which of the following allows for the attribution of messages to individuals?
a.
Adaptive identity.
b.
Non-repudiation.
c.
Authentication.
d.
Access logs.
b.
Non-repudiation.Your Answer: Correct
Non-repudiation ensures that a sender cannot deny the authenticity of their message
A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations. Which of the following should the hosting provider consider first?
a.
Local data protection regulations.
b.
Risks from hackers residing in other countries.
c.
Impacts to existing contractual obligations.
d.
Time zone differences in log correlation.
a.
Local data protection regulations.Your Answer: Correct
When expanding to new international locations, understanding and complying with local data protection regulations is crucial.
A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?
a.
Enumeration.
b.
Sanitization.
c.
Destruction.
d.
Inventory.
b.
Sanitization.Your Answer: Correct
Sanitization refers to the process of securely and thoroughly removing data from storage devices to ensure that the data cannot be recovered.
A client demands at least 99.99% uptime from a service provider’s hosted security services. Which of the following documents includes the information the service provider should return to the client?
a.
MOA.
b.
SOW.
c.
MOU.
d.
SLA.
d.
SLA.Your Answer: Correct
A Service Level Agreement (SLA) is a contract that specifies the expected level of service, including uptime guarantees, between a service provider and a client
A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?
a.
A. Send out periodic security reminders.
b.
B. Update the content of new hire documentation.
c.
C. Modify the content of recurring training.
d.
D. Implement a phishing campaign.
c.
C. Modify the content of recurring training.Your Answer: Correct
This option ensures that all employees, not just new hires, receive up-to-date and relevant information about the changes in their working environment. Recurring training can be tailored to address specific situational and environmental awareness issues that may arise during the transition back to the office.
A company is discarding a classified storage array and hires an outside vendor to complete the disposal. Which of the following should the company request from the vendor?
a.
Certification.
b.
Inventory list.
c.
Classification.
d.
Proof of ownership.
a.
Certification.Your Answer: Correct
Certification ensures that the vendor has properly disposed of the storage array in compliance with legal and regulatory requirements, providing documentation that the disposal was handled securely.
Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?
a.
Fines.
b.
Audit findings.
c.
Sanctions.
d.
Reputation damage.
b.
Audit findings.Your Answer: Correct
Failing an internal PCI DSS compliance assessment typically results in audit findings. These findings highlight the specific areas where the bank is not meeting the required standards.