SecurityPlus Flashcards

1
Q

In a high-security facility, guards are stationed at every entrance, and all visitors are logged and surveilled. Which type of control is primarily being utilized here?

A

Physical control

Physical control involves securing physical access to facilities, like guard stations and visitor logs, and is the primary control being utilized here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security manager at a software company is revising the SDLC process to include risk management strategies and compliance with legal requirements. Which category of controls is the manager focusing on?

A

Managerial controls

Managerial controls is the correct category because it encompasses decisions and management of risk, focusing on procedures, legal policies, and regulatory policies relevant to the software development lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Following a data breach, your company revises its network security protocols and enhances its incident response procedures. Which type of control does this revision represent?

A

Corrective control

Corrective controls include actions taken to repair damage and enhance procedures post-incident, like the network security protocol revision and incident response enhancements in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A retail company implements a new policy requiring all employees to undergo security awareness training annually. What type of control does this new policy exemplify?

A

Directive control

Directive controls involve guiding the operation and use of systems, like the mandatory security training policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your company sets up a network of simulated vulnerable systems in an effort to trap and study potential attackers. What type of setup does this best describe?

A

Honeynet

A honeynet is a network or system with intentional vulnerabilities to divert attackers from real systems and analyze their behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A global corporation with employees working remotely across different time zones decides to implement a policy where access to sensitive systems is granted based on the user’s role, time of access, and location. Which aspect of security does this approach primarily enhance?

A

Policy-driven access control

Policy-driven access control involves granting access based on predefined policies and information such as the user’s role, time, and location, which aligns with the corporation’s new policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You work in the IT department of a large international organization and are tasked with upgrading the authentication system to secure employee access to the company’s internal network better. Considering the increasing number of remote workers using various devices, which authentication model should you prioritize to enhance security without significantly impacting user convenience?

A

Utilizing multifactor authentication (MFA) for all employee access

Multifactor authentication (MFA) is the most suitable choice in this scenario, primarily because it significantly increases security by requiring users to provide two or more verification factors to gain access. This is particularly important given the diversity of devices and locations from which remote workers are accessing the internal network. MFA mitigates risks associated with compromised credentials, a common threat in remote work scenarios.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You were at a small regional bank that recently began receiving fraudulent claims that money was not correctly transferred to a designated bank account. Your institution implements a system ensuring that the authorship of a transaction cannot be denied or disputed once made. This measure primarily addresses which fundamental security concept?

A

Non-repudiation

Non-repudiation ensures that the authorship of a transaction cannot be denied, providing assurance of the origin and integrity of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A tech company regularly updates just its network diagrams to reflect recent changes in its IT infrastructure, which is crucial for maintaining an accurate understanding of the network’s current state. What is this practice known as?

A

Updating diagrams

Updating diagrams specifically refers to revising network diagrams to include recent changes in IT infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a financial organization, the IT team is assigned specific computers, servers, and network equipment to manage. They are responsible for defining the security requirements and managing the risk profile of this equipment. Which of the following best describes this scenario?

A

Ownership

Ownership involves responsibility for specific assets, ensuring security, and managing risk profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly