Test 2 Flashcards

1
Q

Which of the following is the FIRST step in implementing a secure network?

A

Conducting a risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary function of a security management process?

A

To assess and minimize risk to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the MOST secure way to transmit a secret message using public key cryptography?

A

Encrypting the message with the recipient’s public key and transmitting it over a public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the MOST important consideration when updating firmware on a device?

A

Compatibility with the device’s hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the FIRST indicator of effective communication in DR (Disaster Recovery)?

A

Ensuring all stakeholders understand the plan and their roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the MOST commonly used for data transmission in the transport layer of the OSI (Open Systems Interconnection) reference model?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

We are using the OSI model to categorize attacks and threats. Which of these are COMMON layer 2 threats?

A

ARP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the BEST way to ensure that physical addresses are unique and not duplicated in a network?

A

Use MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the FIRST step in implementing a secure network?

A

Conduct a thorough security assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the MOST important factor to consider when installing network cabling?

A

The speed and bandwidth of the cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cloud services is the MOST cost cost-effective for a small community organization?

A

Community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the MOST important factor when considering the risk of a security vulnerability?

A

The potential impact of the vulnerability being exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary difference between a white hat hacker and a black hat hacker?

A

White hat hackers operate with the goal of uncovering vulnerabilities and fixing them, while black hat hackers operate with the goal of exploiting vulnerabilities for personal gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the PRIMARY indicator for conducting a risk analysis as a step in risk assessment?

A

Impact of potential loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the context of cryptography, what is the main purpose of a hash function?

A

To create a unique representation of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the FIRST indicator to consider when evaluating the effectiveness of a biometric authentication system?

A

LOWEST CER

14
Q

What is the MOST effective way to capture and store large amounts of data?

A

Automated data capture

15
Q

the MOST important indicator of effective governance in an organization?

A

Development of a strong and clear code of ethics

16
Q

What is the FIRST step in implementing a successful disaster recovery plan for personnel?

A

Identifying and prioritizing critical personnel roles and functions.

17
Q

Which of the following is the PRIMARY benefit of using Software as a Service (SaaS)?

A

It reduces IT costs and maintenance.

18
Q

Which of the following is the PRIMARY security concern when using Remote Desktop Protocol (RDP)?
Inefficient

A

Unauthorized access to the network

19
Q

Which cloud service model is considered the MOST flexible in terms of customization and management options?

A

Infrastructure as a Service (IaaS)

20
Q

Which of the following is the MOST important factor when implementing a baseline security policy?

A

Considering the organization’s unique needs

21
Q

A new network administrator is asking questions about a security audit we are having done. What would you explain to her it is?

A

A security audit is a review of an organization’s security measures to ensure they are effective and compliant with industry standards.

22
Q

DAD

A

Disclosure, Alteration, and Destruction

23
Q

What is the HIGHEST priority in incident management?

A

Restoring normal operations

24
Q

the LEAST effective method for securing a network from unauthorized access?

A

Disabling guest accounts