Test 1 Flashcards
In the TCP/IP model, packets are the Protocol Data Units (PDUs) of which layer?
Internetworks
a secure computer system architecture for enforcing the separation of duties and the integrity of high-value transactions?
Clark-Wilson model
As the IT Security Manager of a large financial institution, Aamir is working on implementing a new security system to protect against cyber attacks. He has the option of choosing between four different solutions. Which of the following options would be the most effective in preventing cyber-attacks?
Employing a full-time, dedicated cybersecurity team
We are in a court where the evidence must be “the majority of the proof.” Which type of law does that relate to?
Civil law
As the Chief Information Security Officer, you are responsible for conducting regular risk assessments to identify potential vulnerabilities in the company’s systems. What is a quantitative measure used in risk assessments to determine the potential impact of a security breach on an organization’s assets?
Asset Value (AV)
When we are building a new server, if we want fault tolerance, which of these would we NOT use?
Single disks
(Fault tolerance is a system’s ability to continue operating normally even if it experiences failures or malfunctions)
In order to ensure the safety of ThorTeaches.com’s sensitive data, it is crucial to identify any potential vulnerabilities or threats in the system. Which of the following is a method of identifying potential vulnerabilities and threats in a system?
Security audit
What is the MOST important factor when implementing a security strategy for a new network?
Regular security audits
What is the main difference between access control and identity and access management?
Access control is a subset of identity and access management, while identity and access management is a broader concept.
What can we use digital signatures to provide?
Confidentiality, Integrity, Authentication
What is the MOST important factor to consider when conducting digital forensics?
The integrity of the evidence
As an IT Security professional, you are expected to perform due care. What does this mean?
You are expected to take reasonable steps to protect your organization’s data and assets from unauthorized access or harm.
When assessing the accuracy of security control, which of the following indicators is the PRIMARY consideration?
The LOWEST number of false negatives
What is the MOST common type of storage media used in WORM (Write Once, Read Many) systems?
Optical disc
What type of authentication is used when a user’s password is hashed and compared to the stored hash value?
Single-factor authentication