Security Operations Flashcards
This domain represents 13 percent of the exam and covers many essential security concepts and routine operations, building on many of the other security domains, including security and risk management, assets, engineering, communication, and network security.
Q. 1 Which of the following is NOT a precaution that needs to be taken before monitoring email?
Coming up with strict procedures that define under what circumstances email may be searched Posting a notice visible to all stating that email is company information subject to search Issuing monitoring tools to all email administrators Making sure that all employees know that email is being monitored
Issuing monitoring tools to all email administrators
Note
Issuing monitoring tools to email administrators is not a precaution. The other answers are all prudent steps that need to be taken before any monitoring is performed.
Q. 2 Entrapment is defined as
Leading someone to commit a crime that he or she wouldn’t otherwise have committed Monitoring with the intent of recording a crime Paying someone to commit a crime Being caught with criminal evidence in one’s possession
Leading someone to commit a crime that he or she wouldn’t otherwise have committed
Note
Entrapment refers to the activities that lure an individual into committing a crime that he or she wouldn’t have otherwise committed.
Q. 3 A DRP checklist test
Is a basic review of disaster recovery procedures Is a test of backup system business resumption procedures Is a test of production system recovery procedures Is a test of business process failover procedures
Is a basic review of disaster recovery procedures
Note
A checklist test is the simplest form of DR test in which procedures are reviewed.
Q. 4 The primary difference between a hot site and a warm site is
A hot site is physically closer to the organization’s data centers than a warm site The warm site’s systems don’t have the organization’s data installed The warm site doesn’t have computer systems in it The warm site is powered down, but the hot site is powered up and ready to go
The warm site’s systems don’t have the organization’s data installed
Note
A warm site is the same as a hot site, except that applications and data aren’t installed on the warm site’s systems.
Q. 5 Which of the following are examples of a natural disaster? Drag and drop the correct answer(s) from top to bottom.
Flood
Terrorism
Pandemic
Tsunami
Flood
Pandemic
Tsunami
Note
Terrorism is a manmade disaster.
Q. 6 Forensics is the term that describes
Due process Tracking hackers from other countries Taking steps to preserve and record evidence Scrubbing a system in order to return it to service
Taking steps to preserve and record evidence
Note
Forensics is the study and activity of discovering, preserving, and recording evidence.
Q. 7 The Disaster Recovery Plan needs to be continuously maintained because
The organization’s software versions are constantly changing The organization’s business processes are constantly changing The available software patches are constantly changing The organization’s data is constantly changing
The organization’s business processes are constantly changing
Note
To be effective, a DRP must include all current critical business processes.
Q. 8 What’s considered the most effective form of magnetic media erasure?
Physical destruction Degaussing Overwriting Relabeling
Physical destruction
Note
Only complete physical destruction will positively guarantee that data cannot be recovered from magnetic storage media.
Q. 9 Least privilege means
An analysis determines which privileges are required to complete a task People who have high privileges delegate some of those privileges to others The people who have the fewest access rights do all the work Users should have the minimum privileges required to perform required tasks
Users should have the minimum privileges required to perform required tasks
Note
Least privilege means that users have access to only the data and functions required to perform their duties.
Q. 10 A data processing facility on truck trailers or in portable buildings is known as
A tornado magnet A migratory backup site A rolling backup site An semi-permanent backup site
A rolling backup site
**Note** A rolling (or mobile) backup site is a portable site located on a truck trailer or other portable facility.
Q. 11 What are the types of DRP tests? Drag and drop the correct answer(s) from top to bottom.
Checklist Full interruption Parallel Simulation Walkthrough
Checklist Full interruption Parallel Simulation Walkthrough
Note
The five types of DRP tests are checklist, walkthrough, simulation, parallel, and full interruption.
Q. 12 How is the organization’s DRP best kept up-to-date?
With random audits to identify changes in business processes By maintaining lists of current software versions, patches, and configurations By maintaining personnel contact lists By regularly testing the DRP
By regularly testing the DRP
Note
Audits are useful for revealing changes that may be needed in the DRP.
Q. 13 The practice of separation of duties
Provides variety by rotating personnel among various tasks Helps to prevent any single individual from compromising an information system Ensures that the most experienced persons get the best tasks Is used in large 24x7 operations
Helps to prevent any single individual from compromising an information system
Note
Separation of duties ensures that no single individual has too many privileges, which can lead to a security incident or fraud.
Q. 14 The process of identifying the reason for an incident is known as
Predictive analytics Quality control Finger pointing Root cause analysis
Root cause analysis
Note
Root cause analysis is used to find the reason that a problem or incident occurred.
Q. 15 A parallel DRP test
Is resource intensive and rarely used Tests the full responsiveness by shutting down production systems Runs in parallel with production processing Is a paper exercise to test theoretical response to a disaster
Runs in parallel with production processing
Note
A parallel test is a full test that DOES NOT shut down production systems.
Q. 16 Enticement is defined as
Being caught with criminal evidence in one’s possession Leading someone to commit a crime that they wouldn’t otherwise have committed Monitoring with the intent of recording a crime Leading someone toward evidence after a crime has already been committed
Leading someone toward evidence after a crime has already been committed
Note
Enticement is used to keep a criminal at the scene of a crime. In the context of computer crime, a honeypot is a great way to keep an intruder around while his or her origin is traced.
Both entrapment and enticement involve persuading or leading someone to commit an unlawful act. Entrapment involves causing someone to commit an unlawful act that that person would not otherwise have committed. Enticement involves causing someone to commit an unlawful act (such as attacking a honeypot that records further evidence of a crime) after that person has already committed a crime (such as hacking into the network where the honeypot is located). Entrapment is illegal; enticement is not illegal. However, evidence collected through enticement may or may not be admissible in court proceedings.