Security policies and Standards Flashcards

1
Q

Which of the following is not part of the AAA framework?

Authentication
Access
Authorization
Accounting

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Raul has been asked to serve as individuals to whom day-to-day actions have been assigned by the owner. What role is Raul taking?

A

Data custodian/steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which access control scheme is the most restrictive?

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of access control scheme uses predefined rules that makes it the most flexible scheme?

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which statement about rule-based access control is true?
It requires that a custodian set all rules
it is no longer considered secure
it dynamically assigns roles to subjects based on rules
it is considered a real-world approach by linking a user’s job function with security

A

it dynamically assigns roles to subjects based on rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of these is a set of permission that is attached to an object?
ACL
SRE
Object modifier
Entity attribute (EnATT)
A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
What can be used to provide both filesystem security and database security?
RBASEs
LDAPs
CHAPs
ACLs
A

ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the amount of time added to or subtracted from Coordinated Universal time to determine local time?

A

Time offset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cheryl has been asked to set up a user account explicitly to provide a security context for services running on a server. What type of account will she create?

A

Service Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of these is not an incident response process step?
Recovery
Reporting
Eradication
Lessons learned
A

Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is typically a monthly discussion of a scenario conducted in an informal and stress-free environment to evaluate an incident response plan?
Walkthrough
Simulation
Tabletop
Incident response plan evaluation (IRP-E)

A

tabletop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Ella wants to research an attack framework that incorporates adversary, infrastructure, capability, and victim. Which of the following would she choose?
Diamond model of intrusion analysis
cyber kill chain
Mitre ATT&CK
basic-advanced incident (BAI) framework
A

diamond model of intrusion analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blaise needs to create a document that is linear-style checklist of required manual steps and action needed to successfully respond to a specific type of incident. What does she need to create?

A

playbook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following should be performed in advance of an incident?
containment
segmentation
isolation
capture
A

segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a platform used to provide telephony, video, and web conferences that can serve as an entry point to a threat actor?

A

Call manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is not a problem associated with log management?
multiple devices generating logs
large volume of log data
different log formats
time-stamped log data
A

time-stamped log data

17
Q

Which tool is an open source utility for UNIX devices that includes content filtering?

A

syslog-ng

18
Q
Which of the following is a packet sampling protocol that gives a statistical sample instead of the actual flow of packets? 
NetFlow
sFlow
IPFIX
journalctl
A

sFlow

19
Q
Which of the following is the most fragile and should be captured first in a forensics investigation?
ARP cache
kernel statistics
CPU cache
RAM
A

CPU cache

20
Q
Which of the following is a Linux utility that displays the contents of system memory?
Autopsy
winhex
dd
memdump
A

memdump