Cybersecurity - Chapter 11

¡Supera tus tareas y exámenes ahora con Quizwiz!

Araya has been tasked with implementing a new set of procedures for the onboarding and offboarding of employees. Which of the following types of controls does this new task fall into?

Administrative controls

Trita has been tasked with identifying risks that her organization faces and what the results would be if some form of attack or disaster was to negatively affect those assets, divisions, or processes including any monetary damages. Which of the following is she most likely to create?

BIA (Business Impact Analysis)

Karin has just finished crafting a policy that describes and defines what users are allowed to do on company owned computers and devices. Each new employee will be required to sign this document during the onboarding process. Which of the following is the type of document that she has created?

AUP

An outside consultant has been hired to perform a risk analysis for a company. As part of the report, he details the likelihood of certain events occurring, as well as the impact they would have. Which of the following could he use to display this information in his report?

Risk matrix

A telecommunications company has split its security team into two teams. One of them is responsible for attacking the company's infrastructure while the other should do everything they can to stop the attack. The management team will coordinate activities with both teams and ensure that there are no ill-timed attacks from outside that are not caught. Which of the following describes the defending team?

Blue team

Akine has just installed a new firewall that when it detects malicious traffic it automatically will create new rules to discard traffic that matches the source IP address of the attacker. Which of the following types of controls would this be considered?

Corrective

Penelope has just been hired as a cybersecurity manager for an organization. She has done an initial analysis of the organization's policies and sees there is no document outlining the duties and responsibilities of data custodians. Which of the following policies might she consider creating?

Data ownership policy

Agave has been asked to configure the Linux server with the following message: "ALERT: You are accessing a secured system. Your IP address has been logged. This server is for authorized personnel only. Any unauthorized access attempts will be reported to the appropriate law enforcement agencies." Which of the following best describes the type of control she is implementing?

Deterrent

A security specialist has been hired to find ways to harden an organization's infrastructure. One of the organization's concerns is that if someone gained physical access to the building, there are no detective controls installed. Which of the following might the company choose to implement to correct the security specialist's concerns?

Motion sensors

Hattie has just been promoted to the cybersecurity team within her organization. Her new manager recommends reading up on cybersecurity guidelines that have been published by the U.S. government. With which of the following should she become familiar?

NIST

Abdul has just discovered a successful brute force attack against one of the systems in his company's network that lasted for almost five months undetected. Which of the following might have prevented this attack from being successful?

Password policy

Tara has just discovered the John the Ripper tool on a workstation on her company's network, which is a direct violation of an existing policy that defines what users are allowed and not allowed to do on the network. She believes that if other instances of this tool are installed, the current policy protecting against attacks from such tools needs to be strengthened properly. Which of the following policies might she choose to update as a result?

Password policy

Dharma has just been hired to create the new cybersecurity team in a growing organization. Which of the following might be one of the first things she does?

Perform an audit

Penetration testers have made their way past a company's firewall by exploiting an unpatched vulnerability. They perform a quick ping sweep followed by a port scan so they can determine which services and operating systems may be in the company's environment. An hour into the breach, they get disconnected, and it appears that all of their traffic is being directed to another location when they try to reconnect. Which of the following roles did the penetration tester play in this exercise?

Red team


Conjuntos de estudio relacionados

Animal Care and Use Program -ACUP

View Set

Abeka Grade 9 World Geography Quiz 18

View Set

Personal Finance Unit 3 Taxes and Paychecks

View Set