IS 360 Cybersecurity in Business - Midterm

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is not true of gap analysis?

A gap analysis can be performed only through a formal investigation. (You can conduct many different types of gap analysis activities, ranging from formal investigations to informal surveys.)

Maria is the risk manager for a large organization and is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a 1 percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $2 million in damage to the facility, which has a $10 million value. Given this scenario, what is the exposure factor (EF)? A) 20 percent B) 10 percent C) 1 percent D) 50 percent

A) 20 percent

Isabella is in charge of the disaster recovery plan (DRP) team. She needs to ensure that data center operations will transfer smoothly to an alternate site in the event of a major interruption. She plans to run a complete test that will interrupt the primary data center and transfer processing capability to a hot site. What option is described in this scenario? A) Full-interruption test B) Simulation test C) Parallel test D) Structured walk-through

A) Full-interruption test

The Common Vulnerabilities and Exposures (CVE) list is maintained by the _____ and, together with NVD, provides information about vulnerabilities and how to _____them with software patches and updates. A) MITRE Corporation; mitigate B) NIST; mitigate C) MITRE Corporation; assess D) NIST; assess

A) MITRE Corporation; mitigate

Which type of attack involves capturing data packets from a network and retransmitting them to produce an unauthorized effect? The receipt of duplicate, authenticated Internet Protocol (IP) packets may disrupt service or produce another undesired consequence. A) Replay B) Man-in-the-middle C) IP Spoofing D) Hijacking

A) Replay

This section of a formal Penetration Test Report defines the restrictions on the aggressiveness of a penetration test, describes the methods that a pen tester will use to reach a target, and provides a list of the planned/executed tests. A) Scope section B) Target(s) section C) Summary of Findings section D) Conclusion section

A) Scope section

Unauthorized access to data centers and downtime of servers are risks to which domain of an IT infrastructure? A) System/Application Domain B) Remote Access Domain C) Wide Area Network (WAN) Domain D) Workstation Domain

A) System/Application Domain

User IDs and passwords sent through ______ are sent as ______ and are readable with Wireshark. A) Telnet; clear text B) Telnet; encrypted text C) SSHv2; clear text D) SSHv2; encrypted text

A) Telnet; clear text

Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is mandatory. Which type of document is Chris writing? A) Procedure B) Standard C)Policy D) Guideline

A)Procedure

Devaki is evaluating different biometric systems. She understands that users might not want to subject themselves to retinal scans due to privacy concerns. Which concern of a biometric system is she considering?

Acceptability (The measure of user comfort is the acceptability of a biometric system. Certain biometric measurements, such as retinal scans, are more objectionable to some users than other biometric measurements, such as signature dynamics. It is important to note that if users are not comfortable using a system, they may refuse to submit to it.)

Jackson is a cybercriminal. He is attempting to keep groups of a company's high-level users from accessing their work network accounts by abusing a policy designed to protect employee accounts. Jackson attempts to log in to their work accounts repeatedly using false passwords. What security method is he taking advantage of?

Account lockout policies (Account lockout policies are designed to lock a user out after so many failed logon attempts with a bad password)

____ is a centralized database of user credentials, computers, and configuration settings that allows administrators to define and manage organization groups of users and computers, called domains

Active Directory

What is the maximum value for any octet in an Internet Protocol version 4 (IPv4) address? A) 513 B) 255 C) 65 D) 129

B) 255

Carl recently joined a new organization. He noticed that the firewall technology used by the firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used? A) Stateful inspection B) Application proxying C) Network address translation D) Packet filtering

B) Application Proxying

Which security control is most helpful in protecting against eavesdropping on wide area network (WAN) transmissions? A) Deploying an intrusion detection systems/intrusion prevention system(IDS/IPS) B) Encrypting transmissions with virtual private networks (VPN) C) Applying filters on exterior Internet Protocol (IP) stateful firewalls D) Blocking Transmission Control Protocol (TCP) synchorize(SYN) open connections.

B) Encrypting transmissions with virtual private networks (VPN)

Which of the following is not a defining aspect of using TCP as a connection-orientated protocol? A) Three-way handshake between the sender and receiver B) Encryption of packet payload C) Sequence numbers assigned to each packet D) Acknowledgement packet sent for each packet received

B) Encryption of packet payload

Aditya recently assumed an information security role for a financial institution located in the United States. He is tasked with assessing the institution's risk profile and cybersecurity maturity level. What compliance regulation applies specifically to Aditya's institution? A) FISMA B) FFIEC C) PCI DSS D) HIPAA

B) FFIEC

Which type of attack involves eavesdropping on transmissions and redirecting them for unauthorized use? A) Fabrication B) Interception C) Interruption D) Modification

B) Interception

Zenmap and Nessus can identify devices, operating systems, applications, database servers, and services on those devices. Which of the two applications can also identify known vulnerabilities or bugs on the devices being scanned? A) Only Zenmap B) Only Nessus C) Both Zenmap and Nessus D) Neither Zenmap nor Nessus

B) Only Nessus

Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) Reference Model is she working? A) Application B) Physical C) Session D) Presentation

B) Physical

In OpenVAS, the _____ measures how reliable a vulnerability's severity score is. A) GSM B) QoD score C) CVSS score D) CVE Value

B) QoD score

Hajar is investigating a denial of service attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place? A) Land B) Smurf C) Teardrop D) Cross-site scripting (XSS)

B) Smurf

Forensics and incident response are examples of __________ controls. A) deterrent B) corrective C) detective D) preventive

B) corrective

Which of the following enables businesses to transform themselves into an Internet of Things (IoT) service offering?

Anything as a Service (AaaS) delivery model

Juan's web server was down for an entire day in April. It experienced no other downtime during that month. What represents the web server uptime for that month?

April has 30 days, so the web server had 29 days of uptime: 29/30 = 0.9667 or 96.67%

Maria is writing a policy that defines her organization's data classification standard. The policy designates the IT assets that are critical to the organization's mission and defines the organization's systems, uses, and data priorities. It also identifies assets within the seven domains of a typical IT infrastructure. Which policy is Maria writing?

Asset classification policy

Which Nmap switch would attempt to guess a target host's operating system? A) -sV B) -sS C) -O D) Nmap doesn't detect a host's operating system

C) -O

In Wireshark, which of the follow Protocol column filters would display only packets transported over a wireless network? A) TCP B) Telnet C) 802.11 D)ICMP

C) 802.11

The _____ allows you to tailor the thoroughness of a vulnerability scan and can affect whether a scan is quick or longer. A) basic network scan is Nessus B) SYN scan in Zenmap C) assessment option in Nessus D) discovery option in Zenmap

C) Assessment option in Nessus

When examining data in Wireshark, the presence of _____ in the Packet List pane indicates that the data comes from a wireless network. A) IP addresses B) TCP packets C) Beacon frames D) MAC addresses

C) Beacon frames

A Nessus scan report identifies vulnerabilities by a ____ A) NASL B) CVSS score C) Plugin ID D) CVE Value

C) Plugin ID

Which of the following is an example of devices associated with the Transport Layer? A) Routers B) CATS cables or with signals C) Ports D) Switches or bridges

C) Ports

To capture Ethernet-based frames addressed to any/all IP addresses on a LAN segment, you need to use Wireshark in _______ mode. A) Monitor B) Passive C) Promiscuous D) Managed

C) Promiscuous

What is the main purpose of risk identification in an organization? A) To create a disaster recovery plan (DRP) B) To understand threats to critical resources C) To make the organization's personnel aware of existing risk D) To create a business continuity plan (BCP)

C) To make the organization's personnel aware of existing risk

Wen is a network engineer. He would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology is best to use? A) Network access control (NAC) B) Virtual Private Network (VPN) C) Virtual LAN (VLAN) D) Transport Layer Security (TLS)

C) Virtual LAN (VLAN)

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows a cross-site scripting attack against the server. What term describes the issue that Adam discovered? A) Risk B) Impact C) Vulnerability D)Threat

C) Vulnerability

What type of attack against a web application uses a newly discovered vulnerability that is not patchable? A) Cross-site request forgery (CSRF) B) Cross-site scripting (XSS) C) Zero-day attack D) Structured Query Language (SQL) injection

C) Zero-day attack

Which Nmap command would you run to execute a Ping scan on all hosts on the 172.30.0.0/224 subnet? A) nmap -Pn 172.30.0.0/24 B) nmap -sL 172.30.0.0/24 C) nmap -T4 -A -v 172.30.0.0/24 D) Nmap doesn't Ping hosts.

C) nmap -T4 -A -v 172.30.0.0/24

A ______ is limited to the scanning and enumeration phase of the cyber kill chain, while a ______ encompasses the full kill chain. A) port scan in Zenmap; basic network scan in Nessus B) basic network scan in Nessus ; port scan in Zenmap C) vulnerability assessment; penetration test D) penetration test; vulnerability assessment

C) vulnerability assessment; penetration test

What compliance regulation is similar to the European Union(EU) General Data Protection Regulation of 2016 and focuses on individual privacy and rights of data owners?

California Consumer Privacy act(CCPA) of 2018

Rodrigo is a security professional. He is creating a policy that gives his organization control over mobile devices used by employees while giving them some options as to the type of device they will use. Which approach to mobile devices is Rodrigo focusing on in the policy?

Choose Your Own Device (CYOD)

In Mobile IP, what term describes a device that would like to communicate with a mobile node (MN)?

Correspondent node (CN) The CN is the node that wants to communicate with the MN. CNs send messages to the MN's IP address; those messages are then routed to the HA that is responsible for tracking the location of the MN.

A hacker has stolen logon IDs and passwords. The hacker is now attempting to gain unauthorized access to a public-facing web application by using the stolen credentials one by one. What type of attack is taking place?

Credential harvesting (Hackers attempt to gain unauthorized access by trying the stolen logon credentials on public-facing web applications, one logon ID and password at a time. This type of attack can be automated. Given enough time, hackers will be successful in gaining unauthorized access with one or several combinations of logon credentials)

Which of the following is the point at which two error rates of a biometric system are equal and is the measure of the system's accuracy expressed as a percentage?

Crossover error rate(CER) The CER is the point at which the FAR and FRR are equal

You should enumerate recommended mitigations or next steps in this section of a formal Penetration Test Report. A) Scope section B) Target(s) section C) Summary of Findings section D) Conclusion section

D) Conclusion section

The Link Layer in the TCP/IP corresponds to the _______ and ______ Layers of the OSI Reference Model. A) Network; Transport B) Transport; Physical C) Data Link; Network D) Physical; Data Link

D) Physical; Data Link

The Transport Layer uses source and destination _______ to address the proper services on the respective source and destination computers. A) switches B) routers C) IP Addresses D) ports

D) Ports

As a follow-up to her annual testing, Isabella would like to conduct quarterly disaster recovery tests. These tests should include role-playing and introduce as much realism as possible without affecting live operations. What type of test should Isabella conduct? A) Checklist test B) Parallel test C) Structured walk-through D) Simulation Test

D) Simulation Test

The Data Link Layer organizes bits into collections called ______, while the Network Layer encapsulates that information into units called ______. A) packets; frames B) ethernet; internet C) internet; ethernet D) frames; packets

D) frames; packets

Wireshark can be filtered to show ______ data by applying the _____filter. A) ping; TCP B) ssh; TCP C) ssh; ICMP D) ping; ICMP

D) ping; ICMP

Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?

Dictionary attack

Which risk is most effectively mitigated by an upstream Internet service provider (ISP)?

Distributed denial of service (DDoS)

The active directory database is hosted on a specialized Windows Server system referred to as a ____, which functions as the central authority within the network of user accounts and computers that compromise the _____.

Domain controller; domain

What protocol is responsible for assigning Internet Protocol (IP) addresses to hosts on many networks?

Dynamic Host Configuration Protocol (DHCP)

Which term best describes the sale of goods and services on the Internet, whereby online customers buy those goods and services from a vendor's website and enter private data and checking account or credit card information to pay for them?

E-commerce

Maria is using accounting software to compile sensitive financial information. She receives a phone call and then momentarily leaves her desk. While she's gone, Bill walks past her cubicle and sees that she has not locked her desktop and left data exposed. Bill uses his smartphone to take several photos of this data with the intent of selling it to the company's competitor. What access control compromise is taking place?

Eavesdropping by observation

Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?

Enables a 30-day password change policy

What is the first priority when responding to a disaster recovery effort?

Ensuring that everyone is safe

Which of the following is an example of a direct cost that might result from a business disruption?

Facility repair

True or False? A phishing attack "poisons" a domain name on a domain name server (DNS)

False

True or False? An information system is a safeguard or countermeasure an organization implements to help reduce risk.

False

True or False? Another name for a border firewall is a demilitarized zone (DMZ) firewall.

False

True or False? Authorization controls include biometric devices.

False

True or False? Bluejacking is an attack in which wireless traffic is sniffed between Bluetooth devices.

False

True or False? Corrective controls are implemented to address a threat in place that does not have a straightforward risk-mitigating solution.

False

True or False? Physical access to network equipment is required to eavesdrop on a network connection.

False

True or False? Preventive controls merely attempt to suggest that a subject not take a specific action, whereas corrective controls do not allow the action to occur.

False

True or False? Service-level agreements (SLAs) are a common part of the Local Area Network (LAN)-to-Wide Area Network (WAN) domain of a typical IT infrastructure

False

True or False? The business continuity plan (BCP) identifies the resources for which a business impact analysis (BIA) is necessary.

False

True or False? The term "risk methodology" refers to a list of identified risks that results from the risk identification process.

False

True or False? Voice pattern biometrics are accurate for authentication because voices cannot easily be replicated by computer software.

False

True or False? Authentication by characteristics/biometrics is based on something you have, such as a smart card, a key, a badge, or either a synchronous or asynchronous token.

False (Authentication by ownership is based on something you have, such as a smart card, a key, a badge, or either a synchronous or asynchronous token. Authentication by characteristics/biometrics involves measuring various unique parts of a person's anatomy or physical activities to identify and/or verify identity)

True or False? Passphrases are less secure than passwords.

False A passphrase is longer and generally harder to guess, so it is considered more secure than a password.

True or False? A smishing attack is a type of phishing attack involving voice communication.

False A vishing attack is a type of phishing attack performed by telephone.

True or False? In mandatory access control (MAC), access rules are closely managed by the security administrator and not by the system owner or ordinary users for their own files.

False In nondiscretionary access control, access rules are closely managed by the security administrator and not by the system owner or ordinary users for their own files.

True or False? A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource.

False Spoofing is a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource.

True or False? Facility automation uses Internet of Things (IoT) to integrate automation into business functions to reduce reliance on machinery.

False The intent of facility automation is to reduce reliance on humans.

True or False? The number of failed logon attempts that trigger an account action is called an audit logon event.

False Threshold Audit logon events provide you with a record of when every user logs on or off a computer.

True or False? Internet of Things (IoT) devices are typically physically secure.

False can be located anywhere in public areas or outside your house.

True or False? In most organizations, focusing on smaller issues rather than planning for the most wide-reaching disaster results in a more comprehensive disaster recovery plan.

False focus on wide reaching disaster

True or False? An authentication, authorization, and account server, such as Remote Authentication Dial in User Service(RADIUS) is a type of decentralized access control.

False its a type of centralized access control

True or False? Store-and-forward communications should be used when you need to talk to someone immediately.

False real time communication

True or False? The ping utility identifies the path that packets travel through a network.

False The ping utility checks connectivity between hosts.

True or False? Hypertext Transfer Protocol (HTTP) encrypts data transfers between secure browsers and secure webpages.

False (Transfer Protocol Secure) HTTPS is

Anya is a cybersecurity engineer for a high-secrecy government installation. She is configuring biometric security that will either admit or deny entry using facial recognition software. Biometric devices have error rates and certain types of accuracy errors that are more easily tolerated depending on need. In this circumstance, which error rate is she likely to allow to be relatively high?

False rejection rate (FRR) (An FRR is the rate at which valid subjects are rejected. In practice, biometric devices that protect very sensitive resources, such as top-secret military or government facilities, are generally configured to accept a high level of false rejections.)

True or False? Kerberos is an example of a biometric method.

False(Kerberos is a single sign-on method)

True or False? Temporal isolation is commonly used in combination with rule-based access control.

False(Temporal isolation restricts access to specific times and is commonly used in combination with role-based access control, not rule-based access control.)

True or False? A border route can provide enhanced features to internal networks and help keep subnet traffic separate.

False(internal router) An internal router can provide enhanced features to internal networks and help keep subnet traffic separate. A border router is subject to direct attack from an outside source.

True or False? A router is a security appliance that used to filter Internet protocol packets and block unwanted packets

False; a firewall is

Which regulation requires schools to receive written permission from a parent or an eligible student before releasing any information contained in a student's education record?

Family Education Rights and Privacy Act (FERPA)

Arturo would like to connect a fibre channel storage device to systems over a standard data network. What protocol should he use?

Fibre Channel over Ethernet (FCoE) Fibre channel was originally used in supercomputers to connect storage devices but has since spread into common use across many types of computers. The FCoE protocol makes it even easier to connect fibre channel-capable devices to an Ethernet network.

What type of firewall security feature limits the volume of traffic from individual hosts?

Flood Guard

With the use of Mobile IP, which device is responsible for assigning each mobile node (MN) a local address?

Foreign Agent(FA)

Which compliance obligation includes security requirements that apply specifically to the European Union?

General Data Protection Regulation (GDPR)

Bob is the information security and compliance manager for a financial institution. Which regulation is most likely to directly apply to Bob's employer?

Gramm-Leach-Bliley Act (GLBA)

Administrators can use Active directory in conjunction with ______ to enforce security policies surrounding passwords, antivirus, software updates and more.

Group Policy

Dawn is selecting an alternative processing facility for her organization's primary data center. She needs a facility with the least switchover time, even if it's the most expensive option. What is the most appropriate option in this situation?

HOT SITE A hot site is a facility with environmental utilities, hardware, software, and data that closely mirrors the original data center. It is the most expensive option but has the shortest switchover time.

Which of the following is an example of a business-to-consumer (B2C) application of the Internet of Things (IoT)?

Health monitoring are an example of IoT-enabled services provided to individual consumers, in a B2C approach. Video conferencing, infrastructure monitoring, and traffic monitoring are all IoT-enabled services, but they are business-to-business (B2B) services or for municipalities.

Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?

Infrastructure as a Service (IaaS)

Rachel is investigating an information security incident that took place at the high school where she works. She suspects that students may have broken into the student records system and altered their grades. If that is correct, which one of the tenets of information security did this attack violate?

Integrity

Which term best describes how a wide variety of objects, devices, sensors, and everyday items can connect and be accessed?

Internet of Things (IoT)

What is key to implementing a consistent Internet of Things (IoT) device, connectivity, and communications environment?

Interoperability and standards

Which network device is designed to block network connections that are identified as potentially malicious?

Intrusion prevention system (IPS)

Which of the following is an example of a reactive disaster recovery plan?

Moving to a warm site

Which of the following is another name for WIndow's security permissions that enforce the proper access controls for security groups.

NTFS

When adding a new Active directory group through a Powershell cmdlet, the ____option specifies the name of the user object in Active Directory.

Name

Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use?

Network access control (NAC)

What is not a commonly used endpoint security technique?

Network firewall (Full device encryption, remote wiping, and application control are all examples of endpoint device security controls)

Because network computers or devices may host several services, programs need a way to tell one service from another. To differentiate services running on a device, networking protocols use a(n) ________, which is a short number that tells a receiving device where to send messages it receives.

Network port

What level of technology infrastructure should you expect to find in a cold site alternative data center facility?

No technology infrastructure

Which type of authentication includes smart cards?

Ownership(Ownership authentication methods fit the criteria of "something you have." These include smart cards, keys, badges, and tokens)

What is an example of a logical access control?

Password

A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals?

Payment Card Industry Data Security Standard (PCI DSS)

Gwen's company is planning to accept credit cards over the Internet. What governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?

Payment Card Industry Data Security Standard (PCI DSS)

An automatic teller machine (ATM) uses a form of constrained user interface to limit the user's ability to access resources in the system. Specifically for ATMs, which method is being used?

Physically constrained user interfaces

Violet deployed an intrusion prevention system (IPS) on her network as a security control. What type of control has Violet deployed?

Preventive

Aditya is the security manager for a mid-sized business. The company has suffered several serious data losses when laptops were stolen. Aditya decides to implement full disk encryption on all laptops. What risk response did Aditya take?

Reduce

A brute-force password attack and the theft of a mobile worker's laptop are risks most likely found in which domain of a typical IT infrastructure?

Remote Access Domain

What term describes the risk that exists after an organization has performed all planned countermeasures and controls?

Residual Risk Residual risk is the risk that remains after you have deployed countermeasures and controls. Applying countermeasures and controls reduces but does not eliminate risk.

Which term describes the level of exposure to some event that has an effect on an asset, usually the likelihood that something bad will happen to an asset?

Risk

Which is the typical risk equation?

Risk = Threat x Vulnerability

Maria is the risk manager for a large organization and is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a 1 percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $2 million in damage to the facility, which has a $10 million value. If the exposure factor for a $10 million facility is 20%, waht is the single loss expectancy?

SLE is the amount of expected loss inn the event of a fire. In this case, the amount is $2,000,000.

The ____ makes a storage device available for remote users to use as a local disk drive.

SMB share

When creating a new group in active directory, the group ____ setting is used to define how and where a group can assign or be assigned permissions.

Scope

What firewall approach is shown in the figure, assuming the firewall has three network cards?

Screened subnet -In a screened subnet approach, the firewall has three network interfaces. Two are set up identically to a border firewall, with one connected to the Internet and another connected to the private network. The third interface connects to a special network known as the screened subnet, or demilitarized zone (DMZ). A DMZ is a semiprivate network used to host services that the public can access. Thus, users are allowed limited access from the Internet to systems in the DMZ but are blocked from gaining direct access from the Internet to the private network by a secure network.

What is a U.S. federal government classification level that applies to information that would cause serious damage to national security if it were disclosed?

Secret

There are a large number of protocols and programs that use port numbers to make computer connections? Of the following, which ones do not use port numbers?

Secure Socket Layer (SSL) or Transport Layer Security (TLS)

The _______ is the central part of a computing environment's hardware, software, and firmware that enforces access control.

Security kernel

Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different officers to enter their access codes before allowing the system to engage. Which principle of security is this following?

Separation of duties (Separation of duties is the process of dividing a task into a series of unique activities performed by different people, each of whom is allowed to execute only one part of the overall task.)

In which type of attack does the attacker attempt to take over an existing connection between two systems?

Session hijacking

Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a web browser. Which service delivery model is Kaira's company using?

Software as a Service (SaaS)

True or FAlse? OCTAVE is an approach to risk-based strategic assessment and planning.

True

True or False? A Chinese wall security policy defines a barrier and develops a set of rules to ensure that no subject gets to objects on the other side.

True

True or False? A business continuity plan directs all activities required to ensure that an organization's critical business functions continue when an interruption occurs that affects the organization's viability.

True

True or False? A degausser creates a magnetic field that erases data from magnetic storage media.

True

True or False? A disaster recovery plan (DRP) is part of a business continuity plan(BCP) and is necessary to ensure the restoration of resources required by the BCP to an available state.

True

True or False? A firewall can be used to segment a network

True

True or False? A home user connecting to a website over the Internet is an example of a wide area network (WAN) connection.

True

True or False? A man-in-the-middle attack takes advantage of the multihop process used by many types of networks.

True

True or False? A network protocol governs how networking equipment interacts to deliver data across the network

True

True or False? A protocol is a set of rules that govern the format of messages that computers exchange.

True

True or False? A social engineering consensus tactic relies on the position that "everyone else has been doing it" as proof that it is okay or acceptable to do.

True

True or False? A unified threat management (UTM) device can provide content inspection, where some or all network packet content is inspected to determine whether the packet should be allowed to pass.

True

True or False? A wireless access point (WAP) is the connection between a wired network and wireless devices.

True

True or False? Access Control lists are used to permit and deny traffic in an Internet Protocol(IP) router

True

True or False? An IT security policy framework is like an outline that identifies where security controls should be used.

True

True or False? An alteration threat violates information integrity.

True

True or False? Anti-malware programs and firewalls cannot detect most phishing scams because the scams do not contain suspect code.

True

True or False? Application service providers (ASPs) are software companies that build applications hosted in the cloud and on the Internet.

True

True or False? Authentication by action is based on something you do, such as typing.

True

True or False? Authentication controls include passwords and personal identification numbers (PINs).

True

True or False? Authorization is the process of granting rights to use an organization's IT assets, systems, applications, and data to a specific user.

True

True or False? Availability is the tenet of information security that deals with uptime and downtime.

True

True or False? E-commerce systems and applications demand strict confidentiality, integrity, and availability (C-I-A) security controls.

True

True or False? Each 5G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network.

True

True or False? Each layer of the Open Systems Interconnection (OSI) Reference Model needs to be able to talk to the layers above and below it.

True

True or False? Encrypting data within databases and storage devices gives an added layer of security.

True

True or False? For businesses and organizations under recent compliance laws, data classification standards typically include private, confidential, internal use only, and public-domain categories.

True

True or False? Impact refers to the amount of risk or harm caused by a threat or vulnerability that is exploited by a perpetrator.

True

True or False? In a browser or uniform resource locator (URL) hijacking attack, users are directed to websites other than what they requested, usually to fake pages that attackers have created.

True

True or False? In a masquerade attack, one user or computer pretends to be another user or computer.

True

True or False? In a watering-hole attack, a targeted user is lured to a commonly visited website on which malicious code has been planted.

True

True or False? Mobile device management (MDM) includes a software application that allows organizations to monitor, control, data wipe, or data delete business data from a personally owned device.

True

True or False? Networks, routers, and equipment require continuous monitoring and management to keep wide area network(WAN) service available.

True

True or False? Not all risks are inherently bad; some risks can lead to positive results

True

True or False? Physically disabled users might have difficulty with biometric system accessibility, specifically with performance-based biometrics.

True

True or False? Remote wiping is a device security control that allows an organization to remotely erase data or email in the event of loss or theft of the device.

True

True or False? Screen locks are a form of endpoint device security control.

True

True or False? Single sign-on (SSO) can provide for greater security because with only one password to remember, users are generally willing to use stronger passwords.

True

True or False? Storage segmentation is a mobile device control that physically separates personal data from business data.

True

True or False? The Data Link Layer of the Open Systems Interconnection (OSI) Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN).

True

True or False? The Local Area Network (LAN) Domain of a typical IT infrastructure includes both physical network components and logical configuration of services for users.

True

True or False? The Physical Layer of the Open Systems Interconnection (OSI) Reference Model must translate the binary ones and zeros of computer language into the language of the transport medium.

True

True or False? The User Domain of a typical IT infrastructure defines the people and processes that access and organization's information systems.

True

True or False? The ownership of Internet of Things (IoT) data, as well as the metadata of that data, is sometimes in question.

True

True or False? The recovery time objective (RTO) expresses the maximum allowable time in which to recover the function after a major interruption.

True

True or False? The term "risk management" describes the process of identifying, assessing, prioritizing, and addressing risks.

True

True or False? The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

True

True or False? Transmission Control Protocol/Internet Protocol(TCP/IP) is a suite of protocols that operates at both the Network and Transport layers of the Open Systems Interconnection(OSI) Reference Model.

True

True or False? Utility companies are incorporating Internet-connected sensors into their business functions.

True

True or False? When servers need operating system upgrades or patches, administrators take them offline intentionally so they can perform the necessary work without risking malicious attacks.

True

True or False? Cryptography is the practice of making data unreadable.

True ex) private passwords

What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain?

Unauthorized access to systems

An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Which type of social engineering attack is the attacker using?

Urgency In an urgency attack, the attacker uses some sort of urgent or emergency situation to get someone to perform an action or divulge information.

In which domain of a typical It infrastructure is the first layer of defense for a layered security strategy?

User Domain

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?

VPN concentrator

Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?

Verifies that requestors are who they claim to be

In active directory, the _____ group type is used in conjunction with email services such as Microsoft exchange.

distribution

Remote Access security controls help to ensure that the user connecting to an organization's network is whom the user claims to be. A username is commonly used for ____, whereas a biometric scan could be used for____.

identification; authorization

When adding a new Active directory group via the powershell command line interface, the ____ option specifies the group to which you want to add user account

identity

Giving HR managers full control access to files in a folder called HR Policies while giving HR representatives read-only access to the files in the same HR Policies folder is an example of ________ access controls.

role-based

On early Ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (LAN). Today, this situation is alleviated on larger networks because each computer has a dedicated wire connected to a ___________ that controls a portion of the LAN.

switch


Kaugnay na mga set ng pag-aaral

Español 322 - Capítulo 10 - Posición de los Adjetivos

View Set

PrepU 39: Management of Patients With Oral and Esophageal Disorders

View Set

Indirect questions - "Can you tell me" (from answers)

View Set

Chapter 1 Quiz - Introduction to Marketing - Vincennes University - Professor Murphy's Course

View Set

Maternity and Women's Health NGN Case Study

View Set

MEDSURG: AQ - Chapter 12, Assessment and Care of Patients With Problems of Acid-Base Balance

View Set