ITM 350 midterm study guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Maria is the risk manager for a large organization and is evaluating whether the organization should purchase a fire suppression system. She consulted several subject matter experts and determined that there is a 1 percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $2 million in damage to the facility, which has a $10 million value. If the exposure factor (EF) for a $10 million facility is 20 percent, what is the single loss expectancy (SLE)? Answers: A.$2,000 B.$200,000 C.$2,000,000 D.$20,000

2,000,000 given

Maria is the risk manager for a large organization and is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a 1 percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $2 million in damage to the facility, which has a $10 million value. Given this scenario, what is the exposure factor (EF)? Answers: A.10 percent B.1 percent C.20 percent D.50 percent

20 % $mill

Maria is the risk manager for a large organization and is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a 1 percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $2 million in damage to the facility, which has a $10 million value. Given this scenario, what is the annualized loss expectancy (ALE)? Answers: A.$2,000,000 B.$2,000 C.$20,000 D.$200,000

20,000 1%(2,000,000)

Devaki is capturing traffic on her network. She notices connections using ports 20, 22, 23, and 80. Which port normally hosts a protocol that uses secure, encrypted connections? A.80 B.23 C.20 D.22

22 Reason: The Secure Shell (SSH) protocol uses port 22. SSH is a network protocol for performing remote terminal access to another device. SSH encrypts data for maintaining the confidentiality of communications. Port 20 corresponds to the File Transfer Protocol (FTP), which is a cleartext protocol. Port 23 corresponds to the Telnet protocol, which is a cleartext protocol. Port 80 corresponds to the Hypertext Transfer Protocol (HTTP), which is a cleartext protocol.

What network port number is used for unencrypted web-based communication by default?

80

Juan's web server was down for an entire day in April. It experienced no other downtime during that month. What represents the web server uptime for that month? A.96.67% B.3.33% C.1.03% D.99.96%

96.67% reason: April has 30 days, so the web server had 29 days of uptime: 29/30 = 0.9667 or 96.67%.

Devaki is evaluating different biometric systems. She understands that users might not want to subject themselves to retinal scans due to privacy concerns. Which concern of a biometric system is she considering?

Acceptability

Jackson is a cybercriminal. He is attempting to keep groups of a company's high-level users from accessing their work network accounts by abusing a policy designed to protect employee accounts. Jackson attempts to log in to their work accounts repeatedly using false passwords. What security method is he taking advantage of?

Account lockout policies

A hacker has stolen logon IDs and passwords. The hacker is now attempting to gain unauthorized access to a public-facing web application by using the stolen credentials one by one. What type of attack is taking place? A. Birthday attack B. Replay attack C. Phreaking D. Credential harvesting

Credential harvesting

Which attack is typically used specifically against password files that contain cryptographic hashes?

Birthday

Tom is the IT manager for an organization that experienced a server failure that affected a single business function. What type of plan should guide the organization's recovery effort? A. Disaster recovery plan (DRP) B. Business continuity plan (BCP) C. Service-level agreement (SLA) D. Business impact analysis (BIA)

Business continuity plan (BCP)

A company's IT manager has advised the business's executives to use a method of decentralized access control rather than centralized to avoid creating a single point of failure. She selects a common protocol that hashes passwords with a one-time challenge number to defeat eavesdropping-based replay attacks. What is this protocol?

Challenge-Handshake Authentication Protocol (CHAP)

A hacker has stolen logon IDs and passwords. The hacker is now attempting to gain unauthorized access to a public-facing web application by using the stolen credentials one by one. What type of attack is taking place?

Credential harvesting

Arturo is a network engineer. He wants to implement an access control system in which the owner of the resource decides who can change permissions, and permission levels can be granted to specific users, groups of people in the same or similar job roles, or by project. Which of the following should Arturo choose?

Discretionary access control (DAC)

Maria is using accounting software to compile sensitive financial information. She receives a phone call and then momentarily leaves her desk. While she's gone, Bill walks past her cubicle and sees that she has not locked her desktop and left data exposed. Bill uses his smartphone to take several photos of this data with the intent of selling it to the company's competitor. What access control compromise is taking place?

Eavesdropping by observation

Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?

Enables a 30-day password change policy

Aditya recently assumed an information security role for a financial institution located in the United States. He is tasked with assessing the institution's risk profile and cybersecurity maturity level. What compliance regulation applies specifically to Aditya's institution? A. HIPAA B. FISMA C. PCI DSS D. FFIEC

FFIEC

True or False? An information system is a safeguard or countermeasure an organization implements to help reduce risk.

False

True or False? Bluejacking is an attack in which wireless traffic is sniffed between Bluetooth devices.

False

True or False? Corrective controls are implemented to address a threat in place that does not have a straightforward risk-mitigating solution.

False

True or False? Hypertext Transfer Protocol (HTTP) encrypts data transfers between secure browsers and secure webpages.

False

Anya is a cybersecurity engineer for a high-secrecy government installation. She is configuring biometric security that will either admit or deny entry using facial recognition software. Biometric devices have error rates and certain types of accuracy errors that are more easily tolerated depending on need. In this circumstance, which error rate is she likely to allow to be relatively high?

False rejection rate (FRR)

Bob is the information security and compliance manager for a financial institution. Which regulation is most likely to directly apply to Bob's employer? A.Gramm-Leach-Bliley Act (GLBA) B.Federal Information Security Management Act (FISMA) C.Children's Internet Protection Act (CIPA) D.Health Insurance Portability and Accountability Act (HIPAA)

Federal information security management act (FISMA) reason: GLBA requires all types of financial institutions to protect customer's private financial information.

Arturo would like to connect a fibre channel storage device to systems over a standard data network. What protocol should he use? A. Secure Shell (SSH) B. Fibre Channel (FC) C. Internet Small Computer System Interface (iSCSI) D. Fibre Channel over Ethernet (FCoE)

Fibre Channel over Ethernet (FCoE)

Isabella is in charge of the disaster recovery plan (DRP) team. She needs to ensure that data center operations will transfer smoothly to an alternate site in the event of a major interruption. She plans to run a complete test that will interrupt the primary data center and transfer processing capability to a hot site. What option is described in this scenario? A. Parallel test B. Simulation test C. Structured walk-through D. Full-interruption test

Full-interruption test

Carrie is a network technician developing the Internet Protocol (IP) addressing roadmap for her company. While IP version 4 (IPv4) has been the standard for decades, IP version 6 (IPv6) can provide a much greater number of unique IP addresses. Which addressing system should she designate for primary use on her roadmap and why? A. IPv6 is only slowly being adopted. She should make IPv4 the primary addressing scheme in her roadmap until IPv6 is more widely adopted. B. IPv6 is rapidly replacing IPv4 worldwide. She should make IPv6 the primary addressing scheme in her roadmap. C. There will be adequate IPv4 addresses available well into the future. She should make IPv4 the primary addressing scheme. D. Few commercial businesses still use IPv4. She should feature IPv6 strongly in her roadmap rather than have her company fall behind technologically.

IPv6 is only slowly being adopted. She should make IPv4 the primary addressing scheme in her roadmap until IPv6 is more widely adopted.

Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?

Infrastructure as a Service (IaaS)

Rachel is investigating an information security incident that took place at the high school where she works. She suspects that students may have broken into the student records system and altered their grades. If that is correct, which one of the tenets of information security did this attack violate? A.Nonrepudiation B.Integrity C.Confidentiality D.Availability

Integrity

What is a single sign-on (SSO) approach that relies upon the use of key distribution centers (KDCs) and ticket-granting servers (TGSs)?

Kerberos

A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals? A. Payment Card Industry Data Security Standard (PCI DSS) B. Federal Information Security Management Act (FISMA) C. Federal Financial Institutions Examination Council (FFIEC) D. Health Insurance Portability and Accountability Act (HIPAA)

Payment Card Industry Data Security Standard (PCI DSS)

An automatic teller machine (ATM) uses a form of constrained user interface to limit the user's ability to access resources in the system. Specifically for ATMs, which method is being used?

Physically constrained user interfaces

Hajar is developing a business impact assessment for her organization. She is working with business units to determine the target state of recovered data that allows the organization to continue normal processing after a major interruption. Which of the following is Hajar determining? A. Recovery point objective (RPO) B. Recovery time objective (RTO) C. Business recovery requirements D. Technical recovery requirements

Recovery point objective (RPO)

A brute-force password attack and the theft of a mobile worker's laptop are risks most likely found in which domain of a typical IT infrastructure? A.Remote Access Domain B.User Domain C.Local Area Network (LAN) Domain D.Workstation Domain

Remote Access Domain

Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different officers to enter their access codes before allowing the system to engage. Which principle of security is this following?

Separation of duties

As a follow-up to her annual testing, Isabella would like to conduct quarterly disaster recovery tests. These tests should include role-playing and introduce as much realism as possible without affecting live operations. What type of test should Isabella conduct? A. Checklist test B. Simulation test C. Parallel test D. Structured walk-through

Simulation test

What is an example of two-factor authentication (2FA)?

Smart card and personal identification number (PIN)

Hajar is investigating a denial of service attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place? A. Land B. Smurf C. Teardrop D. Cross-site scripting (XSS)

Smurf

Which of the following principles is not a component of the Biba integrity model? A subject may not ask for service from subjects that have a higher integrity level. B. Subjects cannot read objects that have a lower level of integrity than the subject C. Subjects cannot change objects that have a lower integrity level. D. Subjects at a given integrity level can call up only subjects at the same integrity level or lower.

Subjects cannot change objects that have a lower integrity level.

True or False? A data classification standard provides a consistent definition for how an organization should handle and secure different types of data.

True

True or False? Impact refers to the amount of risk or harm caused by a threat or vulnerability that is exploited by a perpetrator.

True

True or False? A social engineering consensus tactic relies on the position that "everyone else has been doing it" as proof that it is okay or acceptable to do.

True

True or False? An IT security policy framework is like an outline that identifies where security controls should be used.

True

True or False? An alteration threat violates information integrity.

True

True or False? Authorization is the process of granting rights to use an organization's IT assets, systems, applications, and data to a specific user.

True

True or False? Availability is the tenet of information security that deals with uptime and downtime.

True

True or False? Hypertext Transfer Protocol (HTTP) is the communications protocol between web browsers and websites with data in cleartext.

True

True or False? In a browser or uniform resource locator (URL) hijacking attack, users are directed to websites other than what they requested, usually to fake pages that attackers have created.

True

True or False? In a masquerade attack, one user or computer pretends to be another user or computer.

True

True or False? Networks, routers, and equipment require continuous monitoring and management to keep wide area network (WAN) service available.

True

True or false: A functional policy declares an organization's management direction for security in such specific functional areas as email, remote access, and Internet surfing.

True

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use? A. Router B. Firewall C. VPN concentrator D. Unified threat management (UTM)

VPN concentrator

Wen is a network engineer. For several months, he has been designing a system of controls to allow and restrict access to network assets based on various methods and information. He is currently configuring the authentication method. What does this method do?

Verifies that requestors are who they claim to be

Which of the following is used to perform a scan of the network and create a network topology chart?

Zenmap

Brian notices an attack taking place on his network. When he digs deeper, he realizes that the attacker has a physical presence on the local network and is forging Media Access Control (MAC) addresses. Which type of attack is most likely taking place? Answers: A.Internet Protocol (IP) address spoofing B.Address resolution protocol (ARP) poisoning C.Christmas attack D.Uniform resource locator (URL) hijacking

address resolution protocol (ARP) poisoning

Carl recently joined a new organization. He noticed that the firewall technology used by the firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used? A. Application proxying B. Packet filtering C. Stateful inspection D. Network address translation

application proxy firewall

Maria is writing a policy that defines her organization's data classification standard. The policy designates the IT assets that are critical to the organization's mission and defines the organization's systems, uses, and data priorities. It also identifies assets within the seven domains of a typical IT infrastructure. Which policy is Maria writing? A.Asset protection policy B.Asset classification policy C.Security awareness policy D.Asset management policy

asset classification policy

Ann is creating a template for the configuration of Windows servers in her organization. It includes the basic security settings that should apply to all systems. What type of document should she create? Guideline Policy Procedure Baseline

baseline

Which security model does not protect the integrity of information? Clark-Wilson Brewer-Nash Biba Bell-LaPadula

bell-laPadula

True or False? Common methods used to identify a user to a system include username, smart card, and biometrics.

true

Miriam is a network administrator. She would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy? A. Lightweight Extensible Authentication Protocol (LEAP) B. Protected Extensible Authentication Protocol (PEAP) C. Captive portal D. Remote Authentication Dial-In User Service (RADIUS)

captive portal

Rodrigo is a security professional. He is creating a policy that gives his organization control over mobile devices used by employees while giving them some options as to the type of device they will use. Which approach to mobile devices is Rodrigo focusing on in the policy? A. Choose Your Own Device (CYOD) B. Bring Your Own Device (BYOD) C. Company-owned business-only (COBO) D. Company-owned/personally enabled (COPE)

choose your own device (CYOD)

Forensics and incident response are examples of __________ controls. Answers: A.deterrent B.detective C.preventive D.corrective

corrective

Which of the following is the point at which two error rates of a biometric system are equal and is the measure of the system's accuracy expressed as a percentage?

crossover error rate (CER)

The ___________ is the central part of a computing environment's hardware, software, and firmware that enforces access control.

security kernel

Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?

dictionary attack

Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcasting the security set identifier (SSID) of an open network owned by the coffee shop in his lobby. Which type of attack is likely taking place?

evil twin

Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcasting the security set identifier (SSID) of an open network owned by the coffee shop in his lobby. Which type of attack is likely taking place? Answers: A.Jamming/interference B.Evil twin C.Near field communication D.Bluesnarfing

evil twin

True or False? A border router can provide enhanced features to internal networks and help keep subnet traffic separate.

false

True or False? A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource.

false

True or False? A packet-filtering firewall remembers information about the status of a network communication.

false

True or False? A router is a security appliance that is used to filter Internet Protocol (IP) packets and block unwanted packets.

false

True or False? A smart card is an example of a logical access control.

false

True or False? An authentication, authorization, and accounting (AAA) server, such as Remote Authentication Dial-In User Service (RADIUS), is a type of decentralized access control.

false

True or False? An uninterruptible power supply (UPS) is an example of a reactive component of a disaster recovery plan (DRP).

false

True or False? Another name for a border firewall is a demilitarized zone (DMZ) firewall.

false

True or False? Authentication by characteristics/biometrics is based on something you have, such as a smart card, a key, a badge, or either a synchronous or asynchronous token.

false

True or False? Authorization controls include biometric devices.

false

True or False? In mandatory access control (MAC), access rules are closely managed by the security administrator and not by the system owner or ordinary users for their own files.

false

True or False? In most organizations, focusing on smaller issues rather than planning for the most wide-reaching disaster results in a more comprehensive disaster recovery plan.

false

True or False? Internet Protocol version 4 (IPv4) uses the Internet Control Message Protocol (ICMP) within a network to automatically assign an Internet Protocol (IP) address to each computer.

false

True or False? Kerberos is an example of a biometric method.

false

True or False? Passphrases are less secure than passwords.

false

True or False? Regarding data-center alternatives for disaster recovery, a mobile site is the least expensive option but at the cost of the longest switchover time.

false

True or False? Service-level agreements (SLAs) are a common part of the Local Area Network (LAN)-to-Wide Area Network (WAN) Domain of a typical IT infrastructure.

false

True or False? Temporal isolation is commonly used in combination with rule-based access control.

false

True or False? The business continuity plan (BCP) identifies the resources for which a business impact analysis (BIA) is necessary.

false

True or False? The four central components of access control are users, resources, actions, and features.

false

True or False? The number of failed logon attempts that trigger an account action is called an audit logon event.

false

True or False? Voice pattern biometrics are accurate for authentication because voices cannot easily be replicated by computer software.

false

true or false: Configuration changes can be made at any time during a system life cycle and no process is required.

false

true or false: Denial of service (DoS) attacks are larger in scope than distributed denial of service (DDoS) attacks.

false

True or False? A phishing attack "poisons" a domain name on a domain name server (DNS).

false Pharming is another type of attack that seeks to obtain personal or private financial information through domain spoofing. A pharming attack doesn't use messages to trick victims into visiting spoofed websites that appear legitimate, however. Instead, pharming "poisons" a domain name on the domain name server (DNS), a process known as DNS poisoning.

True or False? A smishing attack is a type of phishing attack involving voice communication.

false a vishing attack is a type of phishing attack involving voice communication

Dawn is selecting an alternative processing facility for her organization's primary data center. She needs a facility with the least switchover time, even if it's the most expensive option. What is the most appropriate option in this situation? A. Hot site B. Cold site C. Mobile site D. Warm site

hot site

Remote access security controls help to ensure that the user connecting to an organization's network is whom the user claims to be. A username is commonly used for _______, whereas a biometric scan could be used for _______. A.authentication, authorization B.authorization, accountability C.identification, authorization D.identification, authentication

identification, authentication

Maria is a freelance network consultant. She is setting up security for a small business client's wireless network. She is configuring a feature in the wireless access point (WAP) that will allow only computers with certain wireless network cards to connect to the network. This feature filters out the network cards of any wireless computer not on the list. What is this called? A. Service set identifier (SSID) broadcasting B. Uniform Resource Locator (URL) filtering C. Media Access Control (MAC) address filtering D. Subnetting

media access control (MAC) address filtering

Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use? A. Virtual private network (VPN) B. Virtual LAN (VLAN) C. A demilitarized zone (DMZ) D. Network access control (NAC)

network access control (NAC)

Because network computers or devices may host several services, programs need a way to tell one service from another. To differentiate services running on a device, networking protocols use a(n) ________, which is a short number that tells a receiving device where to send messages it receives. A. ping B. Internet Protocol (IP) address C. Media Access Control (MAC) address D. network port

network port

which type of authentication includes smart cards?

ownership

What is an example of a logical access control?

password

Which one of the following is an example of logical access control? Password Fence Key for a lock Access card

password

Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) Reference Model is she working? A. Physical B. Application C. Session D. Presentation

physical

Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is mandatory. Which type of document is Chris writing? A.Policy B.Guideline C.Procedure D.Standard

procedure

Aditya is the security manager for a mid-sized business. The company has suffered several serious data losses when laptops were stolen. Aditya decides to implement full disk encryption on all laptops. What risk response did Aditya take? A. Avoid B. Accept C. Transfer D. Reduce

reduce

Hakim is a network engineer. He is configuring a virtual private network (VPN) technology that is available only for computers running the Windows operating system. Which technology is it? A. Secure Socket Tunneling Protocol (SSTP) B. OpenVPN C. Internet Protocol Security (IPSec) D. Point-to-Point Tunneling Protocol (PPTP)

secure socket tunneling protocol (SSTP)

There are a large number of protocols and programs that use port numbers to make computer connections. Of the following, which ones do not use port numbers? A. Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS) B. Simple Mail Transfer Protocol (SMTP) or Post Office Protocol v3 (POP3) C. Secure Sockets Layer (SSL) or Transport Layer Security (TLS) D. File Transfer Protocol (FTP) data transfer or FTP control

secure sockets layer (SSL) or transport layer security (TLS)

In which type of attack does the attacker attempt to take over an existing connection between two systems? Answers: A.Session hijacking B.Uniform resource locator (URL) hijacking C.Man-in-the-middle attack D.Typosquatting

session hijacking

A ________ is used to identify the part of an Ethernet network where all hosts share the same host address. A. switch B. access point C. router D. subnet mask

subnet mask

On early Ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (LAN). Today, this situation is alleviated on larger networks because each computer has a dedicated wire connected to a ___________ that controls a portion of the LAN. A. server B. firewall C. router D. switch

switch

The availability of commands in the Cisco IOS (Internetwork Operating System) is based on:

the privilege level of the user

Purchasing an insurance policy is an example of the ____________ risk management strategy. Answers: A.accept B.transfer C.reduce D.avoid

transfer

True or False? A Chinese wall security policy defines a barrier and develops a set of rules to ensure that no subject gets to objects on the other side.

true

True or False? A business continuity plan (BCP) directs all activities required to ensure that an organization's critical business functions continue when an interruption occurs that affects the organization's viability.

true

True or False? A degausser creates a magnetic field that erases data from magnetic storage media.

true

True or False? A disaster recovery plan (DRP) is part of a business continuity plan (BCP) and is necessary to ensure the restoration of resources required by the BCP to an available state.

true

True or False? A firewall can be used to segment a network.

true

True or False? A home user connecting to a website over the Internet is an example of a wide area network (WAN) connection.

true

True or False? A man-in-the-middle attack takes advantage of the multihop process used by many types of networks.

true

True or False? A network protocol governs how networking equipment interacts to deliver data across the network.

true

True or False? A phishing email is a fake or bogus email intended to trick the recipient into clicking on an embedded link or opening an email attachment.

true

True or False? A protocol is a set of rules that govern the format of messages that computers exchange.

true

True or False? A threat analysis identifies and documents threats to critical resources, which means considering the types of disasters that are possible and what kind of damage they can cause.

true

True or False? A unified threat management (UTM) device can provide content inspection, where some or all network packet content is inspected to determine whether the packet should be allowed to pass.

true

True or False? A wireless access point (WAP) is the connection between a wired network and wireless devices.

true

True or False? Access control lists (ACLs) are used to permit and deny traffic in an Internet Protocol (IP) router.

true

True or False? Anti-malware programs and firewalls cannot detect most phishing scams because the scams do not contain suspect code.

true

True or False? Authentication by action is based on something you do, such as typing.

true

True or False? Authentication by knowledge is based on something the user knows, such as a password, passphrase, or personal identification number (PIN).

true

True or False? Authentication controls include passwords and personal identification numbers (PINs).

true

True or False? Changes to external requirements, such as legislation, regulation, or industry standards, that require control changes can result in a security gap for an organization.

true

True or False? Content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.

true

True or False? Cryptography is the practice of making data unreadable.

true

True or False? Each layer of the Open Systems Interconnection (OSI) Reference Model needs to be able to talk to the layers above and below it.

true

True or False? Encrypting data within databases and storage devices gives an added layer of security.

true

True or False? For businesses and organizations under recent compliance laws, data classification standards typically include private, confidential, internal use only, and public-domain categories.

true

True or False? If a company informs employees that email sent over the company's network is monitored, the employees can no longer claim to have an expectation of privacy.

true

True or False? Log files are one way to prove accountability on a system or network.

true

True or False? Mobile device management (MDM) includes a software application that allows organizations to monitor, control, data wipe, or data delete business data from a personally owned device.

true

True or False? OCTAVE is an approach to risk-based strategic assessment and planning.

true

True or False? Physically disabled users might have difficulty with biometric system accessibility, specifically with performance-based biometrics.

true

True or False? Remote wiping is a device security control that allows an organization to remotely erase data or email in the event of loss or theft of the device.

true

True or False? Screen locks are a form of endpoint device security control.

true

True or False? Single sign-on (SSO) can provide for greater security because with only one password to remember, users are generally willing to use stronger passwords.

true

True or False? Storage segmentation is a mobile device control that physically separates personal data from business data.

true

True or False? The Gramm-Leach-Bliley Act (GLBA) addresses information security concerns in the financial industry.

true

True or False? The Local Area Network (LAN) Domain of a typical IT infrastructure includes both physical network components and logical configuration of services for users.

true

True or False? The Local Area Network (LAN)-to-Wide Area Network (WAN) Domain is where the IT infrastructure links to a WAN and the Internet.

true

True or False? The recovery time objective (RTO) expresses the maximum allowable time in which to recover the function after a major interruption.

true

true or false: A phishing email is a fake or bogus email intended to trick the recipient into clicking on an embedded URL link or opening an email attachment.

true

true or false: Failing to prevent an attack all but invites an attack.

true

An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Which type of social engineering attack is the attacker using? A.Vishing B.Urgency C.Authority D.Whaling

urgency

In which domain of a typical IT infrastructure is the first layer of defense for a layered security strategy? A.Local Area Network (LAN) Domain B.System/Application Domain C.Workstation Domain D.User Domain

user domain

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows a cross-site scripting attack against the server. What term describes the issue that Adam discovered? A. Vulnerability B. Impact C. Threat D. Risk

vulnerability


Ensembles d'études connexes

History of Sport and Philosophy Test 2

View Set

MGT 370: Chapter 1 Assignment: The World of Innovative Management

View Set