Security policies and Standards Flashcards
Which of the following is not part of the AAA framework?
Authentication
Access
Authorization
Accounting
Access
Raul has been asked to serve as individuals to whom day-to-day actions have been assigned by the owner. What role is Raul taking?
Data custodian/steward
Which access control scheme is the most restrictive?
MAC
Which type of access control scheme uses predefined rules that makes it the most flexible scheme?
MAC
Which statement about rule-based access control is true?
It requires that a custodian set all rules
it is no longer considered secure
it dynamically assigns roles to subjects based on rules
it is considered a real-world approach by linking a user’s job function with security
it dynamically assigns roles to subjects based on rules
Which of these is a set of permission that is attached to an object? ACL SRE Object modifier Entity attribute (EnATT)
ACL
What can be used to provide both filesystem security and database security? RBASEs LDAPs CHAPs ACLs
ACLs
What is the amount of time added to or subtracted from Coordinated Universal time to determine local time?
Time offset
Cheryl has been asked to set up a user account explicitly to provide a security context for services running on a server. What type of account will she create?
Service Account
Which of these is not an incident response process step? Recovery Reporting Eradication Lessons learned
Reporting
Which of the following is typically a monthly discussion of a scenario conducted in an informal and stress-free environment to evaluate an incident response plan?
Walkthrough
Simulation
Tabletop
Incident response plan evaluation (IRP-E)
tabletop
Ella wants to research an attack framework that incorporates adversary, infrastructure, capability, and victim. Which of the following would she choose? Diamond model of intrusion analysis cyber kill chain Mitre ATT&CK basic-advanced incident (BAI) framework
diamond model of intrusion analysis
Blaise needs to create a document that is linear-style checklist of required manual steps and action needed to successfully respond to a specific type of incident. What does she need to create?
playbook
Which of the following should be performed in advance of an incident? containment segmentation isolation capture
segmentation
What is a platform used to provide telephony, video, and web conferences that can serve as an entry point to a threat actor?
Call manager