CC exam
A cloud arrangement whereby the provider owns and manages the hardware, operating system, and applications in the cloud, and the customer owns the data
SaaS
Which of the following tools can be used to grant remote users access to the internal IT environment?
VPN (virtual private network)
intrusion
an attempt, successful or otherwise, to gain unauthorized access.
A security solution that detects, identifies and often quarantines potentially hostile software.
anti-malware
A set of security controls or system settings used to ensure uniformity of configuration through the IT environment.
baseline
Which of the following is often associated with DR planning?
checklist
Business Continuity plan i
designed to keep the organization operating through the crisis
components to z business continuity plan are:
details about how and when to enact the plan and notification systems and call trees for alerting the team members and organizational associates that the plan has been enacted. In addition, it includes contact numbers for contacting critical third-party partners, external emergency providers, vendors and customers.
Disaster Recovery (DR) plan may include
executive summary providing a high-level overview of the plan, department-specific plans, technical guides for IT personnel responsible for implementing and maintaining critical backup systems, full copies of the plan for critical disaster recovery team members, and checklists for certain individuals.
A common network device used to filter traffic
firewall
Ethernet
is a standard that defines wired connections of networked devices. This standard defines the way data is formatted over the wire to ensure disparate devices can communicate over the same cables.
MAC addresses
physical identifiers of devices
Common network device used to connect networks
router
Common network device used to connect networks.
router
Who is responsible for publishing and signing the organization's policies?
senior management
Which of the following is a subject?
A user
The common term used to describe the mechanisms that control the temperature and humidity in a data center. (D4.3 L4.3.1)
HVAC
A security solution installed on an endpoint in order to detect potentially anomalous activity
Host-based intrusion prevention system
What is meant by non-repudiation?
If a user does something, they can't later claim that they didn't do it.
Derrick logs on to a system in order to read a file. In this example, Derrick is the ______.
Subject
Is it possible to avoid risk?
yes
Incident Response plan
- responds to abnormal operating conditions to keep the business operating - four main components of Incident Response are: Preparation; Detection and Analysis; Containment, Eradication and Recovery; and Post-Incident Activity.
endpoint <------> Web server Which port number is associated with the protocol typically used in this connection?
80 (the port for the HTTP protocol, commonly used for Web traffic.)
zero day
A previously unknown system vulnerability with the potential of exploitation without risk of detection or prevention because it does not, in general, fit recognized patterns, signatures or methods.
Event
Any observable occurrence in a network or system. Source: NIST SP 800-61 Rev 2
Which of the following is very likely to be used in a disaster recovery effort?
Data backups
A portion of the organization's network that interfaces directly with the outside world; typically, this exposed area has more security controls and restrictions than the rest of the internal IT environment
Demilitarized zone (DMZ)
An attack against the availability of a network/system; typically uses many attacking machines to direct traffic against a given target
Distributed-denial-of-service (DDOS)
Which of these components is very likely to be instrumental to any disaster recovery (DR) effort?
Backups