Test 2 Flashcards
Which of the following is the FIRST step in implementing a secure network?
Conducting a risk assessment
What is the primary function of a security management process?
To assess and minimize risk to an organization
the MOST secure way to transmit a secret message using public key cryptography?
Encrypting the message with the recipient’s public key and transmitting it over a public network
the MOST important consideration when updating firmware on a device?
Compatibility with the device’s hardware
the FIRST indicator of effective communication in DR (Disaster Recovery)?
Ensuring all stakeholders understand the plan and their roles
the MOST commonly used for data transmission in the transport layer of the OSI (Open Systems Interconnection) reference model?
TCP
We are using the OSI model to categorize attacks and threats. Which of these are COMMON layer 2 threats?
ARP spoofing
the BEST way to ensure that physical addresses are unique and not duplicated in a network?
Use MAC addresses
What is the FIRST step in implementing a secure network?
Conduct a thorough security assessment
What is the MOST important factor to consider when installing network cabling?
The speed and bandwidth of the cables
cloud services is the MOST cost cost-effective for a small community organization?
Community cloud
the MOST important factor when considering the risk of a security vulnerability?
The potential impact of the vulnerability being exploited
What is the primary difference between a white hat hacker and a black hat hacker?
White hat hackers operate with the goal of uncovering vulnerabilities and fixing them, while black hat hackers operate with the goal of exploiting vulnerabilities for personal gain.
the PRIMARY indicator for conducting a risk analysis as a step in risk assessment?
Impact of potential loss
In the context of cryptography, what is the main purpose of a hash function?
To create a unique representation of data