Test 1 Flashcards

1
Q

In the TCP/IP model, packets are the Protocol Data Units (PDUs) of which layer?

A

Internetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a secure computer system architecture for enforcing the separation of duties and the integrity of high-value transactions?

A

Clark-Wilson model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As the IT Security Manager of a large financial institution, Aamir is working on implementing a new security system to protect against cyber attacks. He has the option of choosing between four different solutions. Which of the following options would be the most effective in preventing cyber-attacks?

A

Employing a full-time, dedicated cybersecurity team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

We are in a court where the evidence must be “the majority of the proof.” Which type of law does that relate to?

A

Civil law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As the Chief Information Security Officer, you are responsible for conducting regular risk assessments to identify potential vulnerabilities in the company’s systems. What is a quantitative measure used in risk assessments to determine the potential impact of a security breach on an organization’s assets?

A

Asset Value (AV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When we are building a new server, if we want fault tolerance, which of these would we NOT use?

A

Single disks
(Fault tolerance is a system’s ability to continue operating normally even if it experiences failures or malfunctions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In order to ensure the safety of ThorTeaches.com’s sensitive data, it is crucial to identify any potential vulnerabilities or threats in the system. Which of the following is a method of identifying potential vulnerabilities and threats in a system?

A

Security audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the MOST important factor when implementing a security strategy for a new network?

A

Regular security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main difference between access control and identity and access management?

A

Access control is a subset of identity and access management, while identity and access management is a broader concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can we use digital signatures to provide?

A

Confidentiality, Integrity, Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the MOST important factor to consider when conducting digital forensics?

A

The integrity of the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As an IT Security professional, you are expected to perform due care. What does this mean?

A

You are expected to take reasonable steps to protect your organization’s data and assets from unauthorized access or harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When assessing the accuracy of security control, which of the following indicators is the PRIMARY consideration?

A

The LOWEST number of false negatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the MOST common type of storage media used in WORM (Write Once, Read Many) systems?

A

Optical disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of authentication is used when a user’s password is hashed and compared to the stored hash value?

A

Single-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the process of identifying and analyzing the weaknesses of a system?

A

Threat modeling

17
Q

When would we deploy honeypots?

A

To collect information about potential attackers.

18
Q

Which of the following is the LOWEST layer of the OSI (Open Systems Interconnection) reference model?

A

Physical layer

19
Q

Which of the following is the HIGHEST layer in the TCP/IP model?

A

Application

20
Q

Your team has been tasked with evaluating the company’s current cybersecurity measures and identifying areas for improvement. What is the primary factor that determines the value of an asset in terms of its impact on an organization’s cyber security?

A

The asset’s potential to cause harm to the organization

21
Q

definition of MAO (Maximum Acceptable Outage)

A

The longest period of time that a system or service can be offline without causing significant damage to the organization.

22
Q

How do Identity and Access Management (IAM) and Encryption of Data at Rest (EDR) differ in terms of cloud security?

A

IAM ensures that only authorized users have access to data, while EDR ensures that data is encrypted when stored on cloud servers.

23
Q

Which of the following methods is the FIRST and LOWEST cost option for data destruction?

A

Overwriting

24
Q

What is Mandatory Access Control (MAC) based on?

A

Sensitivity labels

25
Q

What protocol is used to resolve the IP address to a physical address in a LAN (Local Area Network)?

A

ARP

26
Q

In a new implementation, we have chosen to use a Redundant Array of Independent Disks (RAID) 0 on a server; what does it tell us about the disk configuration?

A

The server has multiple disks, but no data redundancy

27
Q

Which of the following is the MOST effective way to prevent hash collision attacks in a cryptographic system?

A

Using a longer hash value

28
Q

When implementing a new security policy, what should be done FIRST?

A

Train employees on the new policy

29
Q

What is the term used to describe the process of granting permission for a system to operate within an organization’s network?

A

Accreditation

30
Q

What is the main difference between a positive list and a negative list in cyber security?

A

A positive list only allows certain IP addresses, while a negative list blocks them.

31
Q

What is the main difference between a vulnerability and a threat?

A

A vulnerability is a weakness in a system, while a threat is a potential consequence of that weakness.

32
Q

Which of the following is the BEST approach for managing code in a repository?

A

Implementing strict access controls and regularly updating the code

33
Q

Which of the following is NOT a factor that should be considered when developing a data retention policy?

A

The amount of storage space available on the company’s servers

34
Q

the MOST important factor to consider when implementing a records retention security policy?

A

The type of information being stored

35
Q

What is the primary function of a VPN (Virtual Private Network)?

A

To encrypt data in transit

36
Q
A