Security Policies and Standards Flashcards
our online retail business accepts PayPal and credit card payments. You need to ensure that your company is compliant with the relevant security standards. Which payment security standard should you focus on?
GDPR
PCI DSS
HIPAA
PCI DSS
The Payment Card Industry Data Security Standard (PCI DSS) provides guidance on securing environments where credit card information is processed
Your legal consulting services company is headquartered in Berlin with a branch office in Paris. You are determining how to comply with applicable data privacy regulations. Which of the following security standards must your company comply with?
GDPR
PCI DSS
HIPAA
GDPR
The GDPR is designed to protect sensitive EU citizen data
You have been hired to review security controls for a medical practice in rural Tennessee. Which of the following data privacy frameworks must the medical practice be compliant with?
GDPR
PCI DSS
HIPAA
HIPAA
HIPAA is American legislation designed to protect sensitive medical patient information
Which action will have the largest impact on mitigating against SQL injection attacks?
Enable HTTPS
Change default web server settings
Enable input validation
Enable input validation
Input validation is used to prevent unexpected characters or data from being sent to a server in a SQL injection attack. This can prevent sensitive data disclosure
You are planning the secure management of servers and network infrastructure devices on your corporate LAN. Which design will best protect these devices from RDP and SSH attacks?
Periodic vulnerability scanning
SSH public key authentication
Dedicated network management interface
Dedicated network management interface
A dedicated network management interface connects to a dedicated secure network used only for management purposes. Because no user traffic is present, this will protect devices from Remote Desktop Protocol (RDP) and Secure Shell (SSH) attacks
You need to manage cloud-based Windows virtual machines (VMs) from your on-premises network. Which option presents the most secure remote management solution?
Configure each VM with a public IPv6 address
Use PowerShell remoting for remote management
Manage the VMs through a jump box
Manage the VMs through a jump box
A jump box is a host with a connection to a public and a private network. After successfully authenticating to the jump box, administrators can remotely connect to hosts on the private network. This prevents the direct exposure of hosts to the public network
During customer support calls, customer service representatives periodically pull up customer details on their screens, including credit card numbers. What should be enabled to prevent the disclosure of credit card numbers?
Tokenization
Data minimization
Data masking
Data masking
Data masking replaces sensitive characters (such as credit card number digits) with other characters, such as asterisks (*). Normally, only the last four digits of a credit number are shown. Data masking is an option available in many database solutions
You have been tasked with creating a corporate security policy regarding smart phone usage for business purposes. What should you do first?
Issue smart phones to all employees.
Obtain support from management.
Get a legal opinion.
Obtain support from management.
Management support is crucial in the successful implementation of corporate security policies
Christine is the server administrator for your organization. Her manager provided step-by-step security policies outlining how servers should be configured to maximize security. Which type of security policy will Christine be implementing?
Mail server acceptable use policy
VPN server acceptable use policy
Procedural policy
Procedural policy
Procedural policies provide step-by-step instructions for configuring servers
Which of the following are examples of PII? (Choose two.)
Public IP address of a NAT router
Mobile phone number
Digital certificate
Gender
Mobile phone number
Digital certificate
Personally identifiable information (PII) is data that uniquely identifies a person, such as a mobile phone number or digital certificate. The appropriate security controls must be put in place to prevent identify theft, which can include pseudo-anonymization to prevent tracing data back to an individual
After a lengthy background check and interviewing process, your company hired a new payroll clerk named Tammy. Tammy will be using a web browser on a company computer at the office to access the payroll application on a public cloud provider web site over the Internet. Which type of document should Tammy read and sign?
Internet acceptable use policy
Password policy
Service level agreement
Internet acceptable use policy
Because Tammy will be using company equipment to access the Internet, she should read and sign an Internet acceptable use policy
You are configuring a password policy for users in the Berlin office. Passwords must be changed every 60 days. You must ensure that user passwords cannot be changed more than once within the 60-day interval. What should you configure?
Minimum password age
Maximum password age
Password complexity
Minimum password age
The minimum password age is a period of time that must elapse before a password can be changed. This prevents users from changing passwords multiple times in a short period to reuse old passwords
Your company has decided to adopt a public cloud device management solution whereby all devices are centrally managed from a web site hosted on servers in a data center. Management has instructed you to ensure that the solution is reliable and always available. Which type of document should you focus on?
Password policy
Service level agreement
Remote access acceptable use policy
Service level agreement
A service level agreement is a contract stipulating what level of service and availability can be expected from a third party
Which of the following options best describe the proper use of PII? (Choose two.)
Law enforcement tracking an Internet offender using a public IP address
Distributing an e-mail contact list to marketing firms
Logging into a secured laptop using a fingerprint scanner
Practicing due diligence
Law enforcement tracking an Internet offender using a public IP address
Logging into a secured laptop using a fingerprint scanner
Proper use of PII means not divulging a person’s or entity’s personal information to other parties. Law enforcement tracking criminals using IP addresses and logging in with a fingerprint scanner are proper uses of PII
Your company restricts firewall administrators from modifying firewall rules unless they make the modifications with a member of the IT security team. What is this an example of?
Due care
Separation of duties
Principle of least privilege
Separation of duties
Separation of duties requires more than one person to complete a process such as controlling a firewall and its rules