Test 2 Flashcards
Which of the following is the FIRST step in implementing a secure network?
Conducting a risk assessment
What is the primary function of a security management process?
To assess and minimize risk to an organization
the MOST secure way to transmit a secret message using public key cryptography?
Encrypting the message with the recipient’s public key and transmitting it over a public network
the MOST important consideration when updating firmware on a device?
Compatibility with the device’s hardware
the FIRST indicator of effective communication in DR (Disaster Recovery)?
Ensuring all stakeholders understand the plan and their roles
the MOST commonly used for data transmission in the transport layer of the OSI (Open Systems Interconnection) reference model?
TCP
We are using the OSI model to categorize attacks and threats. Which of these are COMMON layer 2 threats?
ARP spoofing
the BEST way to ensure that physical addresses are unique and not duplicated in a network?
Use MAC addresses
What is the FIRST step in implementing a secure network?
Conduct a thorough security assessment
What is the MOST important factor to consider when installing network cabling?
The speed and bandwidth of the cables
cloud services is the MOST cost cost-effective for a small community organization?
Community cloud
the MOST important factor when considering the risk of a security vulnerability?
The potential impact of the vulnerability being exploited
What is the primary difference between a white hat hacker and a black hat hacker?
White hat hackers operate with the goal of uncovering vulnerabilities and fixing them, while black hat hackers operate with the goal of exploiting vulnerabilities for personal gain.
the PRIMARY indicator for conducting a risk analysis as a step in risk assessment?
Impact of potential loss
In the context of cryptography, what is the main purpose of a hash function?
To create a unique representation of data
the FIRST indicator to consider when evaluating the effectiveness of a biometric authentication system?
LOWEST CER
What is the MOST effective way to capture and store large amounts of data?
Automated data capture
the MOST important indicator of effective governance in an organization?
Development of a strong and clear code of ethics
What is the FIRST step in implementing a successful disaster recovery plan for personnel?
Identifying and prioritizing critical personnel roles and functions.
Which of the following is the PRIMARY benefit of using Software as a Service (SaaS)?
It reduces IT costs and maintenance.
Which of the following is the PRIMARY security concern when using Remote Desktop Protocol (RDP)?
Inefficient
Unauthorized access to the network
Which cloud service model is considered the MOST flexible in terms of customization and management options?
Infrastructure as a Service (IaaS)
Which of the following is the MOST important factor when implementing a baseline security policy?
Considering the organization’s unique needs
A new network administrator is asking questions about a security audit we are having done. What would you explain to her it is?
A security audit is a review of an organization’s security measures to ensure they are effective and compliant with industry standards.