Security Flashcards
Phrenal is selling a used laptop in an online auction. Phrenal has estimated the value of the laptop to be $100, but has seen other laptops of similar type and quality sell for both more and less than that amount. Phrenal hopes that the laptop will sell for $100 or more, but is prepared to take less for it if nobody bids that amount. This is an example of ___________. (D1, L1.2.2)
Risk Tolerance
Grampon municipal code requires that all companies that operate within city limits will have a set of processes to ensure employees are safe while working with hazardous materials. Triffid Corporation creates a checklist of activities employees must follow while working with hazardous materials inside Grampon city limits. The municipal code is a ______, and the Triffid checklist is a ________. (D1, L1.4.2)
Law, Procedure
In risk management concepts, a(n) _________ is something a security practitioner might need to protect. (D1, L1.2.1)
Asset
Which of the following is an example of a “something you are” authentication factor? (D1, L1.1.1)
A photograph of your face
Which of the following probably poses the most risk? (D1, L1.2.1)
A high-liklihood, high-impact event
Which of the following is an example of a “something you know” authentication factor? (D1, L1.1.1)
Password
Steve is a security practitioner assigned to come up with a protective measure for ensuring cars don’t collide with pedestrians. What is probably the most effective type of control for this task? (D1, L1.3.1)
Physical
Of the following, which would probably not be considered a threat? (D1, L1.2.1)
A laptop with sensitive data on it
Triffid Corporation has a policy that all employees must receive security awareness instruction before using email; the company wants to make employees aware of potential phishing attempts that the employees might receive via email. What kind of control is this instruction? (D1, L1.3.1)
Administrative
Siobhan is an (ISC)² member who works for Triffid Corporation as a security analyst. Yesterday, Siobhan got a parking ticket while shopping after work. What should Siobhan do? (D1, L1.5.1)
Pay the parking ticket
Tina is an (ISC)² member and is invited to join an online group of IT security enthusiasts. After attending a few online sessions, Tina learns that some participants in the group are sharing malware with each other, in order to use it against other organizations online. What should Tina do? (D1, L1.5.1)
Stop participating in the group
In risk management concepts, a(n) ___________ is something or someone that poses risk to an organization or asset. (D1, L1.2.1)
Threat
Hoshi is an (ISC)2 member who works for the Triffid Corporation as a data manager. Triffid needs a new firewall solution, and Hoshi is asked to recommend a product for Triffid to acquire and implement. Hoshi’s cousin works for a firewall vendor; that vendor happens to make the best firewall available. What should Hoshi do? (D1, L1.5.1)
disclose the relationship, but recommend the vendor/product
The Triffid Corporation publishes a strategic overview of the company’s intent to secure all the data the company possesses. This document is signed by Triffid senior management. What kind of document is this? (D1, L1.4.1)
Policy
A vendor sells a particular operating system (OS). In order to deploy the OS securely on different platforms, the vendor publishes several sets of instructions on how to install it, depending on which platform the customer is using. This is an example of a ________. (D1, L1.4.2)
Procedure
The senior leadership of Triffid Corporation decides that the best way to minimize liability for the company is to demonstrate the company’s commitment to adopting best practices recognized throughout the industry. Triffid management issues a document that explains that Triffid will follow the best practices published by SANS, an industry body that addresses computer and information security.
The Triffid document is a ______, and the SANS documents are ________. (D1, L1.4.2)
Policy, standard
The city of Grampon wants to ensure that all of its citizens are protected from malware, so the city council creates a rule that anyone caught creating and launching malware within the city limits will receive a fine and go to jail. What kind of rule is this? (D1, L1.4.1)
Law
Kerpak works in the security office of a medium-sized entertainment company. Kerpak is asked to assess a particular threat, and he suggests that the best way to counter this threat would be to purchase and implement a particular security solution. This is an example of _______. (D1, L1.2.2)
Mitigation
For which of the following systems would the security concept of availability probably be most important? (D1, L1.1.1)
Medical systems that monitor patient condition in an intensive care unit
For which of the following assets is integrity probably the most important security aspect? (D1, L1.1.1)
The file that contains passwords used to authenticate users
What is the goal of an incident response effort? (D2, L2.1.1)
Reduce the impact of incidents on operations
What is the goal of Business Continuity efforts? (D2, L2.2.1)
Keep critical business functions operational
Business Continuity efforts are about sustaining critical business functions during periods of potential interruption, such as emergencies, incidents, and disasters.
What is the most important goal of a business continuity effort? (D2, L2.2.1)
Preserve health and human safety
Which of the following is likely to be included in the business continuity plan? (D2, L2.2.1)
Alternate work areas for personnel affected by a natural disaster
The business continuity plan should include provisions for alternate work sites, if the primary site is affected by an interruption, such as a natural disaster.
What is the risk associated with delaying resumption of full normal operations after a disaster? (D2, L2.3.1)
The impact of running alternate operations for extended periods
Alternate operations are typically more costly than normal operations, in terms of impact to the organization; extended alternate operations could harm the organization as much as a disaster.
You are reviewing log data from a router; there is an entry that shows a user sent traffic through the router at 11:45 am, local time, yesterday. This is an example of a(n) _______. (D2, L2.1.1)
Event
An event is any observable occurrence within the IT environment. (Any observable occurrence in a network or system. (Source: NIST SP 800-61 Rev 2)While an event might be part of an incident, attack, or threat, no other information about the event was given in the question.
An attacker outside the organization attempts to gain access to the organization’s internal files. This is an example of a(n) ______. (D2, L2.1.1)
Intrusion
An intrusion is an attempt (successful or otherwise) to gain unauthorized access.
Which of the following is not an appropriate control to add to privileged accounts? (D3, L3.1.1)
Security deposit
Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that employees who are assigned to new positions in the company do not retain whatever access they had in their old positions. Which method should Handel select? (D3, L3.3.1)
Role-based access controls
RBAC can aid in reducing “privilege creep,” where employees who stay with the company for a long period of time might get excess permissions within the environment.
Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that employees transferring from one department to another, getting promoted, or cross-training to new positions can get access to the different assets they’ll need for their new positions, in the most efficient manner. Which method should Handel select? (D3, L3.3.1)
Role-based access controls (RBAC)
RBAC is the most efficient way to assign permissions to users based on their job duties.