mis320-final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following best describes a host-based firewall?

A host-based firewall is a software firewall that protects a single endpoint device.

Which of the following best describes a network address translation?

A network address translation (NAT) enables a private IP network to connect to the internet.

WHICH ONE OF THE FOLLOWING STATEMENTS ABOUT CLOUD COMPUTING IS INCORRECT?

CLOUD COMPUTING CUSTOMERS PROVISION RESOURCES THROUGH THE SERVICE PROVIDER'S SALES TEAM.

GREG WOULD LIKE TO FIND A REFERENCE DOCUMENT THAT DESCRIBES HOW TO MAP CLOUD SECURITY CONTROLS TO DIFFERENT REGULATORY STANDARDS. WHAT DOCUMENT WOULD BEST ASSIST WITH THIS TASK?

Cloud Security Alliance Cloud Control Matrix

Windows picture password belongs to which of the following?

Cognitive biometrics

in a multifactor authentication-enabled facility, you are asked the following question: "What type of food was served on your child's first birthday?" Which of the following is the authentication method used here?

Cognitive biometrics

In an interview, you are asked to differentiate between data protection and data privacy. How should you differentiate between data protection and data privacy?

Data protection involves securing data against unauthorized access, while data privacy is concerned with authorized data access.

Which of the following types of risk control occurs during an attack?

Detective control

Which control discourages security violations before their occurrence?

Deterrent control

WANDA IS RESPONSIBLE FOR A SERIES OF SEISMIC SENSORS PLACED AT REMOTE LOCATIONS. THESE SENSORS HAVE LOW-BANDWIDTH CONNECTIONS AND SHE WOULD LIKE TO PLACE COMPUTING POWER ON THE SENSORS TO ALLOW THEM TO PREPROCESS DATA BEFORE IT IS SENT BACK TO THE CLOUD. WHAT TERM BEST DESCRIBES THIS APPROACH?

EDGE COMPUTING

The following statements regarding centralized administration concepts are presented to you in an interview in which only one of them is correct. Which of these is correct?

Extensible authentication protocol is a framework to transport authentication protocols

WHICH CLOUD COMPUTING DEPLOYMENT MODEL REQUIRES THE USE OF A UNIFYING TECHNOLOGY PLATFORM TO TIE TOGETHER COMPONENTS FROM DIFFERENT PROVIDERS?

HYBRID CLOUD

How does the single sign-on enhance secure authentication?

Implementing a single sign-on will reduce the number of passwords needing to be remembered.

you were hired by a social media platform to analyze different user concerns regarding data privacy. After conducting a survey, you found that the concern of a majority of users is personalized ads. Which of the following should you mention in your report as a major concern?

Individual inconveniences

Which of the following is an authentication system that issues a ticket after verifying the credentials by which you can authenticate other services?

Kerberos

in an interview, you are asked to analyze the following statements regarding secure network designs and choose the correct one. Which of the following should you choose?

Load balancers can detect and stop protocol attacks directed at a server or application

Which of the following types of risk would organizations being impacted by an upstream organization's vulnerabilities be classified as?

Multiparty risk

An attacker collected many usernames from a website and tried to login into the accounts using the password "passw0rd". What type of attack was this

Password spraying

How do phishing simulations contribute to enterprise security?

Phishing simulations train employees on how to recognize phishing attacks.

HELEN DESIGNED A NEW PAYROLL SYSTEM THAT SHE OFFERS TO HER CUSTOMERS. SHE HOSTS THE PAYROLL SYSTEM IN AWS AND HER CUSTOMERS ACCESS IT THROUGH THE WEB. WHAT TIER OF CLOUD COMPUTING BEST DESCRIBES HELEN'S SERVICE?

SAAS

IN WHAT CLOUD SECURITY MODEL DOES THE CLOUD SERVICE PROVIDER BEAR THE MOST RESPONSIBILITY FOR IMPLEMENTING SECURITY CONTROLS?

SAAS

Which of the following authentication methods belongs in the "something you have" category?

Security key

Which of the following is a deception instrument?

Sinkhole

in an interview, Max was asked to tell one difference between a software firewall and a virtual firewall. How should Max answer?

Software firewalls are locally installed on a device, whereas virtual firewalls run in the cloud

FRAN'S ORGANIZATION USES A TYPE I HYPERVISOR TO IMPLEMENT AN IAAS OFFERING THAT IT SELLS TO CUSTOMERS. WHICH ONE OF THE FOLLOWING SECURITY CONTROLS IS LEAST APPLICABLE TO THIS ENVIRONMENT?

THE PROVIDER MUST MAINTAIN SECURITY PATCHES ON THE HOST OPERATING SYSTEM.

The risk of DDoS attacks, SQL injection attacks, phishing, etc., is classified under which threat category?

Technical

You are working as a security expert in an e-commerce enterprise. Your company recently decided on a short-term collaboration with a small business named BuyMe, and the following issue arose. Whenever your customers purchase any product from BuyMe, the e-commerce website redirects them to the BuyMe website, asking for additional authentication. This results in customers abandoning their purchases. To solve this issue, both enterprises agree to use a single authentication process wherein the users, once logged in to your website, can purchase from BuyMe without additional steps. How should you implement this without storing the customers' credentials on the BuyMe server?

Use SAML

Which of the following outlines the process of a proxy server?

User - forward proxy - Internet - reverse proxy - user

Which technology allows scattered users to be logically grouped even when they are connected to different physical switches?

VLAN

You are working as a security admin in an enterprise. While you were analyzing different password attacks, you found that whenever an individual user's password gets cracked, another user with the same password residing in the same password digest file also has their account compromised. How should you prevent this from happening in the future?

You should add salt to the passwords before hashing.

An employee at your enterprise is caught violating company policies by transferring confidential data to his private email. As a security admin, you are asked to prevent this from happening in the future. Which of the following actions should you perform?

You should set up a DLP.

in a security review meeting, you are asked to take appropriate security measures to mitigate IP spoofing attacks against the enterprise network. Which of the following methods should you apply?

You should set up an ACL.

After encountering a network attack in your enterprise network, the chief network security engineer assigned you a project. The project was to create a vulnerable network that is similar to your enterprise network and entices the threat actor to repeat the attack. This is to analyze the behavior and techniques the attacker is using to ensure better defenses to your enterprise network in the future. Which of the following appliances should you use?

You should use a honeypot

You are assigned to destroy the data stored in electrical storage by degaussing. You need to ensure that the drive is destroyed. What should you do before degaussing so that the destruction can be verified?

You should wipe the data before degaussing.

in an interview, you were asked to choose the least vulnerable password from the following list. Which of the following should you choose?

earthwaterforesttreemanworldkid

which of the following can be done to obfuscate sensitive data?

masking

What does the end-of-service notice indicate?

the enterprise will no longer offer support services for a product.


संबंधित स्टडी सेट्स

Chapter 3 Lesson 1: Indo-European

View Set

Chapter 3: "Customer Relationship Management Strategies"

View Set

Intro to Communications Final exam

View Set