NDE Certification Practice Questions (CyberQ)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Sam, a professional hacker, targeted a cloud server to damage the reputation of an organization. He performed an image forgery attack to change the image files and a replay attack to provide outdated content to legitimate users. Which of the following types of attack Sam has performed in the above scenario?

Docker registry attacks

In which of the following locking systems is locking and unlocking achieved by supplying and eliminating power and the locking system mainly uses motors to activate or deactivate the locks?

Electromagnetic

Which of the following types of light system is used during power failures or when normal lighting systems do not operate properly?

Emergency lighting

Identify the access control model in which the access permissions are beyond the user control, which implies that users cannot amend the access policies created by the system.

Role-Based access control

Benson, a security professional plans to implement more stringent security practices in his organization. For this reason, he uses a protocol that provides cryptographic security by encrypting the email messages and digitally signing them to ensure confidentiality, integrity, and nonrepudiation of messages. Which of the following protocols was employed by Benson in the above scenario?

S/MIME

Which of the following protocols is an application layer protocol used for sending digitally signed and encrypted email messages?

S/MIME

Johana, the HR of a renowned consultancy, was hired to recruit right candidates online for their clients. Her work involves scheduling interviews online and shortlisting candidates. Johana, often schedules interviews using web-based applications such as Calendar that automatically notifies her when and which candidate is supposed to be interviewed. Which of the following types of cloud computing service Johana has employed in the above

SaaS

Which of the following objects of a container network model contains the configuration of a container's network stack such as routing table, management of container's interfaces, and DNS settings?

Sandbox

Williams, a programmer, has developed an authentication mechanism for his eCommerce application by using Google services. This allows the application users to access the website through their Google account. Which of the following authentication methods Williams has implemented in the above scenario?

Single sign-on authentication (SSO)

Benila, a security professional, implemented cryptography-based authentication to ensure strong authentication in her organization. She employed an authentication mechanism that needs a device embedded with a small computer chip that stores personal information of the employee for identification. Identify the type of authentication employed by Benila in the above scenario.

Smart card authentication

In an organization, employees' incoming and outgoing status is being tracked and monitored via a small computer chip implanted on their ID card, which stores their personal information for identification. Which of the following authentication methods the organization has implemented in the above scenario?

Smart card authentication

Smith, a professional hacker, has decided to perform an attack on the target organization's employees. He tricked the employees to access specific links, which when clicked redirected the victim to a malicious page. The victim is lured to enter their personal information on the malicious page; this information is then retrieved by Smith. Identify the type of attack performed by Smith in the above scenario.

Social Engineering

Given below are the various steps to deal with fire incidents. 1.) Notify the fire and safety department regarding the fire 2.) Detect fire 3.) Evacuate occupants in the building to another safe location 4.) Close all electrical and electronic systems in order to prevent the fire from spreading 5.) What is the correct sequence of steps involved?

2-3-1-4

Which of the following components of technical network security controls examines the network devices and identifies weaknesses in the network?

Auditing

John, a network specialist, was instructed to secure the physical environment of an organization. He installed a CCTV camera to cover a certain distance over the main entrance, doorways, and other entry points. The CCTV camera also allows John to use different lenses to cover areas beyond specific distances. Which of the following types of CCTV camera was installed by John in the above scenario?

C-Mount CCTV camera

Harvey, a system administrator, is assigned a task to create access permissions for users as well as verify the access permissions created for each employee in his organization. For this purpose, he used a type of authorization that maintains a separate database for each resource. Further, for better flexibility, it also enables the employees to provide access to other employees. Which of the following types of authorization was employed by Harvey in the above scenario?

Decentralized Authorization

Identify the type of authorization that maintains a separate database for each resource and the database contains the details of all users who are permitted to access a particular resource.

Decentralized Authorization

Clark, a thief, escaped from the civil forces and tried to enter the nearest company's premises. The security systems installed at the entrance identified the unauthorized entry into the organization's premises and triggered an alarm to activate security teams. Which of the following types of security control system triggered an alarm in the above scenario when the unauthorized intrusion attempt was made?

Detection Controls

Richard, a security professional, implements physical security controls according to the needs of the organization. As part of this, he implemented controls that do not prevent access directly but can discourage the attackers by sending warning messages about an intrusion attempt. Which of the following types of physical security controls was implemented by Richard in the above scenario?

Deterrent controls

Which of the following types of physical security controls is used to discourage attackers and send warning messages to them to discourage against intrusion attempts?

Deterrent controls

Steve, a professional in an organization, targeted his colleague James to access his mobile device and steal all the data stored in it. When James left the mobile on his desk, Steve tried to access it but failed to do so as the device was asking either for a fingerprint or valid PIN number to authenticate. Which of the following types of physical lock system James has implemented on his device?

Digital lock

Which of the following components of technical security controls protects the information passing through the network and preserves the privacy and reliability of the data?

Encryption and Protocols

Which of the following practices should be followed by a cloud administrator to secure the container environment?

Ensure the authenticated access to registries

Which of the following types of cable is made of glass or plastic and is least susceptible to wiretapping threats?

Fiber optic

Williams, an infrastructure designer, was assigned to design the arrangement of servers in a data center. The requirement is that the arrangement of equipment should maintain airflow to save energy. The arrangement designed by Williams can save the hardware from humidity and heat and increases hardware performance. Which of the following options was employed by Williams in the above scenario?

Hot and cold aisles

In which of the following types of virtualization approach, the guest OS adopts the functionality of para virtualization and uses the VMM for binary translation to different types of hardware resources?

Hybrid virtualization

Which of the following components of virtualization is an application or firmware that enables multiple guest operating systems to share a host's hardware resources?

Hypervisor

Identify the type of cloud computing service that offers authentication services to the subscribed enterprises and is managed by a third-party vendor to provide identity and access management services.

IDaaS

Which of the following information assurance principles ensures that the information is not modified or tampered by any unauthorized parties?

Integrity

Sally, a security professional, implemented a protocol for authenticating requests in computer networks. The protocol implemented by Sally is based on the client-server model, and uses encryption technology and a "ticket" mechanism to prove the identity of a user on a non-secure network. Identify the protocol implemented by Sally in the above scenario.

Kerberos

Which of the following Docker native network driver helps in creating a network connection between container interfaces and its parent host interface or sub-interfaces?

MACVLAN

James, a network administrator, was assigned a task to create a standard access control model for the organization's confidential data. He implemented an access control model that determines the usage and access policies for the users. After its implementation, only users with appropriate access rights can access the resource. Which of the following access control models James has implemented in the above scenario?

Mandatory access control (MAC)

John, a security guard at an organization, was instructed to lock the server room and handover the keys to the administrative department. As the administrative team was in meeting with the manager, John kept the keys with him and handed them over after completion of the meeting. Which of the following lock systems is demonstrated in the above scenario?

Mechanical lock

Which of the following practices is NOT a measure for strengthening the physical security of an organization?

Never follow copyright rules and licensing restrictions

Which of the following protocols is an application layer protocol that provides cryptographic privacy and authentication for network communication and enhances the security of emails?

PGP

Which of the following types of HVAC system are used in locations where the space required for fixing all the components of a split system is available?

Packaged heating and air-conditioning system

Which of the following layers in the OSI model includes all cabling and network systems, power support for cables and systems, and environment supporting the systems?

Physical Layer

Clark, a network security specialist, was assigned to secure an organization's network. Clark implemented a network defense approach that can tackle network attacks such as DoS and DDoS and includes security monitoring methods such as IDS, SIMS, TRS, and IPS. Which of the following network defense approaches did Clark implement in the above scenario?

Reactive Approach

Which of the following network defense techniques examines the causes for attacks in networks by using fault-finding mechanisms, security forensics techniques, and post-mortem analysis?

Retrospective Approach

Identify the type of UPS used for server rooms as it supplies power below 10 kVA.

Standby on-line hybrid

Which of the following UPS systems is no longer commonly used as it could become unstable when operating a modern computer power supply load?

Standby-Ferro

Identify the fire-fighting system that provides a pre-piped water system for organizations and provides water supply to hose lines in certain locations.

Standpipe system

Bob, an employee at an organization, was assigned with responsibilities of training and monitoring guards, assisting guards during crisis situations, handle crowds, and maintaining facilities such as keys and locks. Identify the position held by Bob in the above scenario.

The plant's security officer

Which of the following activities is a physical security measure implemented for maintaining servers and backup devices?

Use rack mount servers

Which of the following practices helps network administrators overcome the risks associated with network cabling?

Use transparent conduits for cabling in highly sensitive areas

Identify the type of man-made threat that includes former employees who try to compromise the system by willingly harming the system components.

Vandalism

Which of the following components in a Kubernetes cluster architecture is a backing store for the data in the Kubernetes cluster?

etcd

Bob has recently joined an organization. He was provided with his access card to access only the third and ground floors of the organization building. When Bob tried to access the second floor by swiping his access card against the reader near the entrance, he was unable to open the door. Which of the following high-level security requirements the organization has employed in the above scenario?

Discipline security requirements

Which of the following access control models can be termed as need-to-know access model where the decision can be taken by an owner to provide or deny access to specific user or a group of users?

Discretionary access control (DAC)

Which of the following sections of typical policy document content ensures that policies are conveyed correctly throughout?

Distribution

Which of the following components of Docker engine manages the Docker images, containers, networks, and storage volume, and processes the requests of the Docker API?

Docker Daemon

Stella, a security team member, was instructed to train new employees on securing the organization from unwanted issues. As a primary part of training, she instructed employees not to throw sensitive documents in the trash, and also trained them on how to shred documents and erase magnetic data before putting them into the trash. Which of the following attacks were mitigated by grooming employees on the above techniques?

Dumpster diving

Stephen, a security professional, was instructed to design a secure IoT framework for an organization. In the IoT framework implemented by Stephen, one of the physical devices is configured to interact with surroundings that contain various components such as sensors, actuators, operating systems, hardware and network, and communication capabilities. Which of the following physical devices in the IoT ecosystem is described in the above scenario?

Edge

Which of the following measures is NOT a best practice for security of the IoT environment?

Enable the UPnP port on routers

Sam is trying to create a complete IoT network at his office building and wanted to monitor and control the environment from remote locations. He connected the network with an interface that can help him access and communicate with edge devices from anywhere. Which of the following devices in the IoT ecosystem helps Sam in monitoring the IoT network from a remote location?

Mobile

Identify the cloud deployment model that is a dynamic heterogeneous environment that combines workloads across multiple cloud vendors that are managed via one proprietary interface to achieve long-term business goals.

Multi Cloud

Bob has recently purchased a new laptop and enabled all the required security controls. The next day while verifying whether all the security mechanisms were enabled on his system or not, he found that the "firewall" was disabled. He immediately enabled the firewall option on his laptop. Identify the component of technical security controls that Bob enabled to protect his laptop from network-related threats.

Network security devices

Identify the component of access management that involves tracking the actions performed by a user on a network and keeps track of who, when, and how the users access the network.

Accounting

Which of the following practices helps security professionals strengthen the physical security of an organization?

Always advise employees to swipe the card at the entrance

Identify the best practice that helps cloud providers in securing a cloud environment from malicious activity.

Enforce legal contracts in employee behavior policy

James, a software engineer, is working from a remote location and connects his laptop to the company's server through a VPN. The company has implemented a security protocol that provides authentication as well as encryption of the data passing through the VPN tunnels. Identify the network security protocol implemented by the company for secure communication.

IPsec

Which of the following ISO/IEC standards provides ISMS implementation guide for the telecom industry that was developed jointly by ITU Telecommunication Standardization Sector (ITU-T) and ISO/IEC JTC1/SC 27?

ISO/IEC 27011

Williams, a network administrator, was assigned a duty to configure network security devices such as intrusion detection system (IDS) and intrusion prevention system (IPS) to protect the organization network from intrusion and block hackers' traffic from entering the network. Which of the following ISO/IES standards Williams must follow while configuring or modifying these security devices?

ISO/IEC 27039

Williams, a cloud administrator, was assigned a task to deploy a cloud computing service that provides role-based access control to the employees of an organization for accessing critical information within the enterprise. Which of the following elements of cloud security was implemented by Williams in the above scenario?

Identity and access management

Which of the following practices should be adopted by network defenders to secure smart devices from IoT threats?

Implement IPS and IDS in the network

Which of the following components of IoT technology is used to bridge the gap between an IoT device and the end user, thereby allowing them to communicate with each other?

IoT gateway

Identify the type of security policy that directs the audience on the usage of technology-based systems with the help of guidelines and also defines remote access and wireless policies, incident response plan, password policies, and policies for personal devices.

Issue-specific security policy (ISSP)

Kevin, a cloud security architect, was planning to automate the deployment, scaling, and management of containerized applications. He deployed a platform that groups different containers into several logical units for easy management and discovery. Which of the following technologies was utilized by Kevin in the above scenario?

Kubernetes

Identify the layer of the IoT architecture that includes the hardware that constitutes IoT devices such as sensors, microcontroller units, and mobile devices.

Layer 1

Which of the following types of service enables the deployment of containers and container management through orchestrators and using which subscribers can develop rich, scalable containerized applications through the cloud or on-site data centers?

CaaS

In an organization, CyberSol.org, the administrator implemented an authorization method that contains a single database. Using this method, the administrator can allow or deny access to the applications and resources to their employees based on the policies. Identify the authorization technique implemented by the administrator in the above scenario.

Centralized Authorization

Which of the following entities in the NIST cloud deployment reference architecture acts as an intermediary and provides connectivity and transport services between CSPs and cloud consumers?

Cloud Carrier

Which of the following components of an IoT framework is referred to as the central point of data aggregation for most of the data in the ecosystem?

Cloud Platform

Williams has created an IoT environment for his home by connecting all the devices such as lights, temperature controllers, and CCTVs. These devices constantly send sensed data over the network for processing. The data collected from these devices is sent to a remote storage location where it undergoes analysis. Identify the component of IoT technology that performs analysis over the data collected from IoT devices.

Cloud Server

John wanted to recharge his smart TV using an app installed on the smart TV. He initiated the process by clicking on proceed to recharge option; then, he was navigated to the payment page. During the payment process, John received an OTP on his mobile, entered it on the payment gateway, and the recharge was successful. Which of the following stack-wise IoT security layers allowed John to successfully recharge his smart TV?

Cloud layer

Which of the following layers of the IoT architecture provides information dashboards for administrators to monitor, analyze, and implement proactive decisions?

Cloud layer

Johana established a start-up firm close to her residence and installed a biometric device to track candidates' login/logout details. When a candidate logs in, the biometric sensor data is forwarded to an IoT component where it undergoes analysis. The analyzed data is then transmitted to Johana for review. Which of the following components of IoT infrastructure analyzed and processed the biometric data before sending it to Johana?

Cloud server

In which of the following IoT communication models the data from the IoT devices can be accessed by authorized third parties?

Cloud-to cloud

Ronnie, a network engineer, implemented a IoT communication model in his organization to reduce the company's expenditure on energy. For this purpose, he used a communication model that extends device-to-cloud communication such that the data from the IoT devices can be accessed by authorized third parties so that they can analyze the energy consumption periodically and employ any energy-harvesting techniques. Which of the following IoT communication models was utilized by Ronnie in the above scenario?

Cloud-to-cloud

Which of the following types of cable is made up of a single copper conductor at its center, a plastic layer providing an insulated center conductor, and a braided metal shield?

Coaxial

Identify the stack-wise IoT security layer in which the user must enforce lightweight message-based protocols for IoT devices that consist of options for double encryption, filtering, and queuing.

Communication layer

Brian, a cloud architect, plans to share a pool of resources with another organization through the Internet to reduce costs. For this reason, he uses a cloud deployment model where the infrastructure is shared among organizations with common computing concerns, such as security, regulatory compliance, performance requirements, and jurisdiction. Which of the following cloud deployment models helps Brian in the above scenario?

Community Cloud

Identify the type of physical security control that includes hot site and backup power system and is used as an alternative control when the intended controls fail or cannot be used.

Compensating controls

Which of the following types of physical security controls are known as alternative controls that are used when the intended controls fail or cannot be used?

Compensating controls

Abey, a software developer, is working on a prestigious project. John, a colleague of Abey, is a disgruntled employee in the same company. John, with malicious intent, decides to access confidential information regarding the project, which Abey is sharing with the higher management. For this purpose, he uses sniffing programs and captures the traffic originating from Abey's system. As a result, he is able to obtain crucial project details. Identify the information assurance principle on which John has performed the attack in the above scenario.

Confidentiality

Which of the following information assurance principles ensures that a party in a communication cannot deny sending the message?

Nonrepudiation

Identify the access control terminology that is referred to as an explicit resource on which an access restriction is imposed.

Object

Which of the following PCI-DSS regulatory requirements do not allow unauthorized outbound traffic from the cardholder data environment to the Internet?

PCI-DSS Requirement No 1.3.5

ApTech Sol Inc., an MNC company, is following a regulatory requirement that states that every system should have antivirus software particularly in personal computers and servers to ensure that it is actively running and cannot be disabled or altered by users, unless specifically authorized by management. Which of the following PCI-DSS requirement states the above regulatory requirement?

PCI-DSS requirement no 5.1 and no 5.3

David has recently joined an organization and was assigned a company's laptop. One day, David tried to access his social media account from the organization's laptop but was not able to access it as the company had blocked access to all social media sites. Which of the following types of Internet access policy was implemented by the organization in the above scenario?

Paranoid policy

Don, a professional hacker, targeted Bob's email account to access his emails. He initiated brute-force and dictionary attacks from two different systems with an impression that any one of these methods can compromise the Bob email account at the earliest possible time. Which of the following types of authentication method Don has been trying to bypass in the above scenario?

Password authentication

Which of the following acts is a proprietary information security standard for organizations that handles cardholder information for major debit, credit, prepaid, e-purse, ATM, and POS cards?

Payment Card Industry-Data Security Standard

Which of the following types of Internet policy accepts a majority of Internet traffic and only blocks known dangerous services/attacks?

Permissive policy

Manuel, a security trainer, was hired by an organization to provide social engineering awareness among their employees. Manuel initiated the training by explaining to them various defensive measures against fake emails and malicious attachments. He gave instructions on how to differentiate legitimate email and a targeted fake email. Which of the following attacks were mitigated by grooming employees on the above techniques?

Phishing

Jeffry, an IT administrator wants to monitor, manage the IoT devices to detect flaws and diagnose operational issues and update the firmware remotely. He installed a solution that can perform the above-mentioned functions. Which of the following solutions was utilized by Jeffry for the IoT device management?

Predix

John, an employee at an organization, was provided with an access ID card to access only specific portions of the organization's building. He can enter specific areas by swiping his ID card against the card reader at the entrance. One day, John wanted to meet his friend Bob who works on the second floor of the same building where he has no access to enter. John swiped his ID card against the access reader on the second floor but the door remained closed. Which of the following types of physical security controls prevented John from entering the second floor?

Preventative controls

Don, an amateur hacker, targeted an organization and attempted to gain access to organization's cloud infrastructure. Don made multiple attempts but failed to gain access to it as the cloud environment was implemented within a corporate firewall. Identify the type of cloud deployment model used by the organization in the above scenario.

Private cloud

Steve, a security specialist at a cement manufacturing plant, was monitoring the functioning of the plant from the control room. Suddenly, Steve received an emergency alert regarding small fire incident within the plant that was detected by the SIEM system interfaced with the IoT monitoring system. John immediately activated an automatic water sprinkler system to bring down the plant's temperature. Which of the followings tack-wise IoT security layers allowed Steve to remotely activate the sprinkler system in the plant?

Process layer

Which of the following goals provided by security policies forms the foundation of a security infrastructure?

Protect confidential and proprietary information from theft or modification

Peter, a network administrator, restricts the actions and Internet usage of certain employees based on their job roles and responsibilities. He implements a policy that provides maximum security and logs all activity such as system and network activities and all the nonessential services/procedures that cannot be made safe are not allowed. Which of the following types of Internet access policy was employed by Peter in the above scenario?

Prudent Policy

Which of the following Internet access policy starts with all services blocked and enables safe and necessary services individually?

Prudent policy

Which of the following protocols provides centralized authentication, authorization, and accounting (AAA) for remote access servers to communicate with a central server?

RADIUS

Which of the following security labels is given to a data or object that is only accessible by few people in the organization because of its technical, business, and personal issues?

Restricted

Which of the following cloud computing service provides services such as penetration testing, authentication, intrusion detection, and anti-malware?

SECaaS

James, a security professional, was instructed to protect the organization network from evolving cyber threats. He implemented high-level security requirements for the organization that included protective measures for access control, malware protection, audit, availability, confidentiality, integrity, cryptography, identification, and authentication. Identify the security policy requirement implemented by James in the above scenario.

Safeguard security requirements

Which of the following acts contains Title IV as a key requirement for financial disclosures to describe enhanced reporting requirements for financial transactions, including off-balance-sheet transactions, pro-forma figures, and the stock transactions of corporate officers?

Sarbanes-Oxley Act

Which of the following HIPAA rules requires appropriate administrative, physical, and technical safeguards to ensure confidentiality, integrity, and security of electronically protected health information?

Security Rule

Thomas, a security professional, implements security policies to thwart cyberattacks and keep malicious users at bay from the organization. As part of this, he implements an aspect of security policy that focuses on mission, communications, encryption, user and maintenance rules, idle time management, privately owned versus public domain, shareware software rules, and virus protection policy. Which of the following aspect of security policy was implemented by Thomas in the above scenario?

Security concept of operation

Jack, a cloud administrator, was using Kubernetes resilient framework to manage the applications running in a container. Due to certain technical issues, the container failed to restart and also stopped responding to the user-defined health checks. The Kubernetes that Jack was using has automatically replaced and rescheduled the containers. Which of the following feature of Kubernetes has solved the container issue in the above scenario?

Self-healing

Freddy, a network engineer, detects that the network cabling of his organization was flawed and insecure. To implement secure network cabling, he installed a type of cable where each pair of wires is individually guarded with foil and is less susceptible to external interference. Identify the type of cable utilized by Freddy in the above scenario.

Shielded twisted pair

John purchased a new Apple phone and added his Apple ID and password to access the device. John can now access multiple Apple application services such as App Books, Apple fitness+, and Siri through his Apple device using the ID. John can access all these application services without providing individual credentials for each application. Which of the following types of authentication method was demonstrated in the above scenario?

Single sign-on authentication

John, an employee at an organization, was provided with a physical badge that provides access only for the second floor out of five floors in the organization building and that physical badge also tracks John's working hours and break times on the floor based on a record of swipes made by him. Which of the following types of authentication method allowed the organization to record John's total working hours on the floor in the above scenario?

Smart card authentication

Identify the type of employee awareness and training that includes training the employees on differentiating between legitimate email and a targeted phishing email, not downloading malicious attachment, and shredding document before putting into the trash

Social engineering

Which of the following IoT functions ensures that no data can be lost or corrupted by handling an effective input data transition and application control?

Streaming data processors

Lauriel, a system administrator, wants to implement a policy that can direct the employees to configure and maintain a system and to increase overall security in an organization. He implements a policy that also focuses on DMZ policy, encryption policy, acceptable use policy, policies for secure cloud computing, policies for intrusion detection and prevention, and access control policy. Identify the type of security policy implemented by Lauriel in the above scenario.

System-specific security policy

Sam, a system administrator, was assigned to configure the information security policy that focuses on the overall security of a particular system in an organization. Jack selected a security policy that includes DMZ policy, encryption policy, policies for IDS/IPS implementation, and acceptable use policy. Which of the following security policies Jack has implemented in the above scenario?

System-specific security policy (SSSP)

Margaret, a system administrator, regularly administers the devices connected to the organizational network. She found that certain devices are vulnerable to sniffing attacks. To protect the device from such attacks, Margaret employed a protocol that encrypts the entire communication between the client and the server, including the user's password, which protects it from sniffing attacks. Identify the protocol employed by Margaret in the above scenario.

TACACS+

Which of the following titles of the Sarbanes Oxley Act consists of nine sections and establishes the Public Company Accounting Oversight Board (PCAOB) to provide independent oversight of public accounting firms that provide audit services?

Title I

Smith, a security specialist, was appointed by an organization to set a physical security barrier at the organization entrance. He installed a physical security control that allows only one employee at a time via the insertion of a coin, ticket, or a pass provided to them. Identify the type of physical security control implemented by Smith in the above scenario.

Turnstiles

Which of the following physical security barriers can affect the fast evacuation of occupants in case of a fire emergency as it allows entry of only one person at a time?

Turnstiles

Alice, a shopping freak, logged into an ecommerce app and added certain favorite items to her cart list. Before placing the order, she added her shipping address and debit card details along with the CVV number on the app. After adding her card details, Alice clicked on the proceed option to pay the bill. During the bill payment, Alice received an OTP on her mobile phone. Upon providing a valid OTP on the payment gateway, Alice's order was successfully accepted. Which of the following types of authentication method was demonstrated in the above scenario?

Two-factor authentication

Rachel, a security professional plans to implement an added layer of defense to protect critical assets from sophisticated cyberattacks. She implemented an authentication technique that uses a physical entity such as a security token as one of the credentials and the other credential can include security codes. Identify the type of authentication implemented by Rachel in the above scenario.

Two-factor authentication

Smith, a developer in a software company, has designed a banking application. For security reasons, he created an authentication mechanism that requires logging-in with user credentials as well as an OTP, which is sent to the user's mobile number. Which of the following authentication methods Smith has implemented in the above scenario?

Two-factor authentication

Which of the following security labels requires no access permissions to access the documents, which means that any person at any level can access these documents?

Unclassified

Which of the following countries holds the "Online Copyright Infringement Liability Limitation Act"?

United States

Which of the following features of a good security policy describes that the policies must be written and designed appropriately, so they can be accessed easily across various sections of an organization?

Usable

Jack, an AWS IAM administrator, was assigned a task to categorize the users based on their job roles and define specific rights or permissions for each category to reduce the access management complexity for a subscribed organization that has multiple departments. Which of the following features of AWS IAM Jack has employed in the above scenario?

Use groups to assign permissions to IAM users

Which of the following practices help security professionals in protecting the cloud environment?

Vendors should regularly undergo AICPA SAS 70 Type II audits

Given below are the steps involved in the working of mantrap. 1.) Authenticates the person trying to access 2.) First door closes soon after the person enters the room and signals the second door to get unlocked 3.) The first door opens after authentication allows the person to walk in 4.) The second door gets into locked state soon after the person walks out the second door 5.) The second door opens with the person walking out of the room. The first door gets automatically locked soon after the second door opens What is the correct sequence of steps followed in man trapping?

1-3-2-5-4

Given below are the steps involved in the access control mechanism. 1.) Once the identification is successful, the system provides the user access to use the system 2.) A user provides their credentials while logging into the system 3.) The system then allows the user to perform only those operations for which the user has been authorized 4.) The system validates the user with the database on the basis of the provided credentials Identify the correct sequence of steps involved in the access control mechanism.

2-4-1-3

TACACS+ authentication involves the following steps: 1.) The router and the user exchange authentication parameters 2.) The server responds with the REPLY message based on the provided information 3.) A user initiates the connection for authentication 4.) The router sends the parameters to the server for authentication I dentify the correct order of steps involved.

3-1-4-2

James, a network specialist joined an organization. He was provided with administrator privileges, through which he can access the files and servers and perform administrative activities. Which of the following information assurance principles authorizes James to access the server or system files?

Authentication

Which of the following feature of Kubernetes enables the user to change the actual state of the container to the desired state of the container at a controlled rate?

Automated rollouts and rollbacks

David, a new employee at an organization, received a call from HR on one Saturday (weekend) to upload his certificates on the shared drive. David connects to the corporate network to access the drive online from his residence. Which of the following information assurance principles was demonstrated in the above scenario?

Availability

Which of the following practices helps security professionals strengthen the physical security of an organization?

Avoid storing confidential information on mobile devices

Which of the following practices is to be considered by a user while creating or updating their password?

Avoid using personal information

Sam, a network administrator, implemented an IoT architecture for the industrial sector, which includes several layers that are connected to save and process data. The architecture implemented by Sam has a main functional building block that stores context information about the things and devices. Identify the functional building block discussed in the above scenario.

Big data warehouse

Jack, a security specialist was appointed by an organization to implement a highly secured authentication method at the entrance of their science and research center. To accomplish the responsibility, Jack created an authentication method that identifies a person based on the facial features from an image or a video source. Which of the following authentication methods Jack has implemented in the above scenario?

Biometric authentication

Ronnie, a security professional got many tickets stating that certain miscreants have been accessing the files with the credentials of the employees and they are creating havoc in the organization. To prevent such incidents, Ronnie implemented an authentication mechanism that identifies human characteristics for authenticating people. Which of the following types of authentication did Ronnie implement in the above scenario?

Biometric authentication

Identify the physical barrier that may be defined as a short vertical post which controls and restricts motor vehicles to the parking areas, offices etc. and are mainly used in building entrances, pedestrian areas and areas that require safety and security.

Bollards

Teena, a security administrator, plans to tighten the physical security of the organization to protect against malicious intruders. She deployed video surveillance cameras that consist of detachable lenses, provide surveillance for more than 40 ft, and use different lenses according to the distance to be covered. Which of the following types of video surveillance camera is mentioned in the above scenario?

C-Mount CCTV camera

An organization has recently leased an online cloud service. Using these services, subscribers can develop rich, scalable containerized applications through the cloud or on-site data centers. Identify the type of cloud computing service deployed by the organization in the above scenario

CaaS

Which of the following acts allows a provision for the regulation of the processing of information relating to individuals and to make provision in connection with the Information Commissioner's functions under certain regulations relating to information?

Data Protection Act

Which of the following features of an IoT-enabled IT environment involves the exchange of data between IoT-enabled organizations using different communication protocols?

Data collection

Identify the IoT function that stores the data produced by the connected devices in the natural format, which will be then extracted and loaded to a big data warehouse.

Data lake

John, a new employee at an organization, has completed his training. His work involves dealing with important documents of the organization. On one Sunday, he connected to the corporate server from his residence, accessed and updated the important documents, and saved them on to the cloud. Subsequently, David (the manager) accessed and edited (approved) John's documents from a different location. Which of the following types of virtualization was demonstrated in the above scenario?

Desktop virtualization

Jack, a security inspector, was assigned to install a physical security control in the company premises to defend against intrusion attempts. He implemented a security control that contains motion sensors connected with video surveillance to monitor and identify illegitimate intrusion attempts. Which of the following types of physical security control Jack has implemented in the above scenario?

Detective controls

Jack implemented an IoT environment at his home by connecting all the IoT devices to an intermediate device, which in turn communicates with the cloud service and also provides security features and data translation functions. Which of the following IoT communication models is demonstrated in the above scenario?

Device -to-Gateway

In which of the following communication model IoT devices first communicate with the remote server rather than directly communicating with the client to send or receive data or commands?

Device -to-cloud

The organization TechSoft Solutions has deployed smart smoke detection and extinguisher system on every floor of the building. The embedded sensors within the smart system detect smoke and send emergency alerts to the security teams to take immediate actions. Which of the following tiers of an IoT-enabled IT environment gathers an outbreak of smoke on the organization floor?

Device tier

Bob, a patient with a paralyzed, wanted to turn on smart lights and AC in his room. As he cannot stand, Bob requested the hospital management to connect those device sensors to his mobile so that he can turn on/off the smart devices whenever he wants. Which of the following IoT communication models was demonstrated in the above scenario?

Device-to-device

Bob, a policy management member, has decided to modify and add new designs to protect the original design according to the Vessel Hull Design Protection Act (VHDPA). Bob was provided with the right to design hulls (including the decks) of vessels only up to 200 feet using a duplicate of the original design. Which of the following acts was demonstrated in the above scenario?

Digital Millennium Copyright Act

Which of the following acts is the American copyright law that implements two 1996 treaties from the World Intellectual Property Organization (WIPO) such as the WIPO copyright treaty and the WIPO performances and phonograms treaty?

Digital Millennium Copyright Act

Which of the following points should be considered while designing the infrastructure and architecture for an organization or industry?

Establish procedures explaining how they should be protected

Which of the following levels of virtualization makes the virtual devices independent of the physical computer hardware and creates a massive pool of storage areas for different virtual machines running on the hardware?

Fabric virtualization

Sam, an employee at organization, works in a file storage facility that manages the company's documents and files. Due to a short circuit in the storage facility, a small fire broke out at the corner of the room. As Sam is already located on the site, he used a manual fire-suppression system that discharges an agent from a cylindrical vessel to stop the initial fire from spreading to other rooms. Identify the type of fire-suppression system Sam has used in the above scenario.

Fire extinguisher

Which of the following acts provides the public with the right to request access to records from any federal agency and is often described as the law that keeps citizens informed about their government?

Freedom of Information Act

Identify the virtualization approach in which the guest OS is not aware that it is running in a virtualized environment and sends commands to the virtual machine manager (VMM) to interact with the computer hardware.

Full virtualization

Hannes, a cloud security professional in an organization was instructed to deploy a cloud service for developing applications for microservices. He leased a cloud computing service that provides a platform for developing, running, and managing application functionalities. Identify the type of cloud computing service deployed by Hannes in the above scenario.

Function-as-a-service

Jack, a security specialist, implemented an IoT network in his organization; it includes a communication aggregator in one of the parts of network that communicates with a trusted local network as well as with an untrusted public network through a secure connection. Which of the following devices in the IoT ecosystem was demonstrated in the above scenario?

Gateway

Which of the following devices in the IoT ecosystem is designed in such a way that it authenticates multi-directionally to carry out trusted communication between the edge and the cloud?

Gateway

Identify the tier of an IoT-enabled IT environment that focuses on communication, offload processing functions, and facilitates efficient communication through a PAN, LAN, Bluetooth, Zigbee, MQTT/TCP, and micro-computing.

Gateway tier

Which of the following sections of the typical policy document lists the different terms and abbreviations used in the policy?

Glossary

Identify the act that is a United States federal law that requires financial institutions to explain how they share and protect their customers' private information.

Gramm-Leach-Bliley Act (GLBA)

Which of the following features in AWS IAM initially provides minimum permissions to the user to ensure security and the permissions can be extended based on the requirement?

Grant least privilege

Which of the following points an organization should NOT consider while designing their infrastructure and architecture?

Have a single location for the server and storage rooms

Which of the following points need be considered by the organization while designing the infrastructure and architecture?

Have emergency exits

Which of the following acts contains the simplification standard known as National Provider Identifier (NPI), which is a unique identification number assigned to each beneficiary?

Health Insurance Portability and Accountability Act

Which of the following types of fire detection system is used to detect and respond to the thermal energy generated due to fire incidents?

Heat detectors

Which of the following cloud deployment models is a combination of two or more clouds that remain unique entities but are bound together, where an organization makes available and manages certain resources in-house and provides other resources externally?

Hybrid cloud

Hoshea, a security professional, has adopted cloud computing technology that provides authentication services such as single-sign-on, multi-factor-authentication, identity governance and administration, access management, and intelligence collection to the subscribed enterprises. Identify the type of cloud computing service deployed by Hoshea in the above scenario.

IDaaS

Which of the following environmental threats affects electrical and electronic appliances, can lead to issues such as corrosion and short-circuits, and damages magnetic tapes and optical storage media?

Temperature and humidity

Which of the following types of physical threat involves activities such as planting a vehicle bomb, human bomb, or a postal bomb in and around the organization's premises that impacts the physical security of the organization?

Terrorism


Conjuntos de estudio relacionados

Chapter 6: Interpersonal Communication

View Set

LifePac Grade 12, matching: U9 P1, P2, and P3

View Set

Grignard reagents (13.6), oxidation of alcohols (13.10), retrosynthetic analysis (12.5)

View Set

MU 3100 Unit 7 Quiz 2021 - HB Quizlet PDF

View Set