Security Operations Flashcards
The security admin should not report to the network admin. Why?
Conflict of interest
Network admins are more incentivized toward availability and performance
Concentrates on the products’ architecture, embedded features, and functionality that enable a customer to continually obtain the necessary level of protection when using the product.
A. Production assurance
B. Implementation assurance
C. Life-cycle assurance
D. Operational assurance
D
Takes place after the system shuts itself down in a controlled manner in response to a kernel failure.
A. system cold start
B. emergency system restart
C. system reload
D. system reboot
system reboot
Takes place after a system failure happens in an uncontrolled manner.
A. system cold start
B. emergency system restart
C. system reload
D. system reboot
emergency system restart
Takes place when an unexpected kernel or media failure happens and the regular recovery procedure cannot recover the system to a more consistent state. Intervention by the user or administrator may be required.
A. system cold start
B. emergency system restart
C. system reload
D. system reboot
system cold start
Transactions should be __________, meaning that they cannot be interrupted between the input being provided and the generation of the output.
atomic
Anti-virus and IDS signatures should be updated on a __________ basis.
A. Daily
B. Hourly
C. As-needed
D. Continual
D
Which of the following is not a key aspect of operational security?
A. Resource Protection B. Change Control C. Incident Management D. Hardware and software controls E. Trusted System Recovery D. Separation of duties E. Least Privilege
C
Intrusion detection devices include all but the following?
A. Vibration Sensors B. Electromechanical devices C. CCTVs D. Lighting E. Motion Detectors
D
Which of the following is not a drawback to Intrusion detection systems?
A. Expensive to install and maintain
B. Require human response
C. Subject to false alarm
D. Fails to detect physical intrusions
D
This type of secondary site does not have computers, but it does have some peripheral devices, such as disk drives, controllers, and tape drives.
Warm Site
The maximum time period within which a business process must be restored to a designated service level after a disaster to avoid unacceptable consequences.
A. MTD
B. RPO
C. RTO
D MTTR
RTO
The estimated amount of time it will take to get a device fixed and back into production after its failure.
A. MTD
B. RPO
C. RTO
D MTTR
MTTR
The acceptable amount of data loss measured in time.
A. MTD
B. RPO
C. RTO
D MTTR
RPO
When returning to the original site after a disaster, which organizational units should go back in first.
A. Most critical
B. Least Critical
C. Moderately critical
B
A method of risk transference, _______________ covers the lost of income that an organization suffers after a disaster while it is in its recovery stage.
Business Interruption Insurance
Which of the following might make evidence inadmissible in court? (Choose all that apply)
A. Proof of chain-of-custody
B. A document created specifically for the court case.
C. Documentation that the evidence was stored in a safe location.
D. Documentation that examination was performed on a copy of the evidence media. The copy is verifiable by a matching hash value.
E. The evidence is relevant, complete, sufficient, and reliable to the case at hand.
F. Evidence was not collected by an expert.
G. Evidence was taken without an employees permission or warrant from their personal cell phone.
B, G