Pre-Course Assessment - CC

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

An organization must always be prepared to ______ when applying a patch. (D5.2, L5.2.1)

D) Rollback

All of the following are important ways to practice an organization disaster recovery (DR) effort; which one is the most important? (D2, L2.3.1)

B) Facility evacuation drills

A device that filters network traffic in order to enhance overall security/performance. (D4.1 L4.1.1)

D) Firewall

Visitors to a secure facility need to be controlled. Controls useful for managing visitors include all of the following except: (D3, L3.2.1)

B) Fence

Tekila works for a government agency. All data in the agency is assigned a particular sensitivity level, called a "classification." Every person in the agency is assigned a "clearance" level, which determines the classification of data each person can access.

A) MAC (mandatory access control)

A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing ________. (D1, L1.1.1)

A) Non-repudiation

A bollard is a post set securely in the ground in order to prevent a vehicle from entering an area or driving past a certain point. Bollards are an example of ______ controls. (D1, L1.3.1)

A) Physical

Gelbi is a Technical Support analyst for Triffid, Inc. Gelbi sometimes is required to install or remove software. Which of the following could be used to describe Gelbi's account? (D3, L3.1.1)

A) Privileged

Which of the following probably poses the most risk? (D1, L1.2.1)

A) A high-likelihood, high-impact event

Dieter wants to send a message to Lupa and wants to be sure that Lupa knows the message has not been modified in transit. What technique/tool could Dieter use to assist in this effort? (D5.1, L5.1.3)

A) Hashing

An attacker outside the organization attempts to gain access to the organization's internal files. This is an example of a(n) ______. (D2, L2.1.1)

A) Intrusion

All of the following are typically perceived as drawbacks to biometric systems, except: (D3, L3.2.1)

A) Lack of accuracy

Grampon municipal code requires that all companies that operate within city limits will have a set of processes to ensure employees are safe while working with hazardous materials. Triffid Corporation creates a checklist of activities employees must follow while working with hazardous materials inside Grampon city limits. The municipal code is a ______, and the Triffid checklist is a ________. (D1, L1.4.2)

A) Law, procedure

Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that employees transferring from one department to another, getting promoted, or cross-training to new positions can get access to the different assets they'll need for their new positions, in the most efficient manner. Which method should Handel select? (D3, L3.3.1)

A) Role-based access controls (RBAC)

Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that employees who are assigned to new positions in the company do not retain whatever access they had in their old positions. Which method should Handel select? (D3, L3.3.1)

A) Role-based access controls (RBAC)

Olaf is a member of ISC2 and a security analyst for Triffid Corporation. During an audit, Olaf is asked whether Triffid is currently following a particular security practice. Olaf knows that Triffid is not adhering to that standard in that particular situation, but that saying this to the auditors will reflect poorly on Triffid. What should Olaf do? (D1, L1.5.1)

A) Tell the auditors the truth

The organization should keep a copy of every signed Acceptable Use Policy (AUP) on file, and issue a copy to _______. (D5.3, L5.3.1)

A) The user who signed it

Which type of fire-suppression system is typically the safest for humans? (D4.3 L4.3.1)

A) Water

If two people want to use asymmetric communication to conduct a confidential conversation, how many keys do they need? (D5.1, L5.1.2)

B) 4

Carol is browsing the Web. Which of the following ports is she probably using? (D4, L4.1.2)

B) 80

Which of the following is probably most useful at the perimeter of a property? (D3, L3.2.1)

B) A fence

Which of these is an example of a physical access control mechanism? (D3, L3.2.1)

B) A lock on a door

Preenka works at an airport. There are red lines painted on the ground next to the runway; Preenka has been instructed that nobody can step or drive across a red line unless they request, and get specific permission from, the control tower. This is an example of a(n)______ control. (D1, L1.3.1)

B) Administrative

Which of the following will have the most impact on determining the duration of log retention? (D3, L3.2.1)

B) Applicable laws

Bluga works for Triffid, Inc. as a security analyst. Bluga wants to send a message to several people and wants the recipients to know that the message definitely came from Bluga. What type of encryption should Bluga use? (D5.1, L5.1.3)

B) Asymmetric encryption

"Wiring _____" is a common term meaning "a place where wires/conduits are often run, and equipment can be placed, in order to facilitate the use of local networks." (D4.3 L4.3.1)

B) Closet

Which of the following roles does not typically require privileged account access? (D3, L3.1.1)

B) Data entry professional

You are reviewing log data from a router; there is an entry that shows a user sent traffic through the router at 11:45 am, local time, yesterday. This is an example of a(n) _______. (D2, L2.1.1) incide

B) Event

Zarma is an ISC2 member and a security analyst for Triffid Corporation. One of Zarma's colleagues is interested in getting an ISC2 certification and asks Zarma what the test questions are like. What should Zarma do? (D1, L1.5.1)

B) Explain the style and format of the questions, but no detail

Which common cloud service model offers the customer the most control of the cloud environment? (D4.3 L4.3.2)

B) Infrastructure as a service (IaaS)

The logical address of a device connected to the network or Internet. (D4.1 L4.1.1)

B) Internet Protocol (IP) address

Which of the following would be best placed in the DMZ of an IT environment? (D4.3 L4.3.3)

B) Mail server

The senior leadership of Triffid Corporation decides that the best way to minimize liability for the company is to demonstrate the company's commitment to adopting best practices recognized throughout the industry. Triffid management issues a document that explains that Triffid will follow the best practices published by SANS, an industry body that addresses computer and information security. The Triffid document is a ______, and the SANS documents are ________. (D1, L1.4.2)

B) Policy, standard

A vendor sells a particular operating system (OS). In order to deploy the OS securely on different platforms, the vendor publishes several sets of instructions on how to install it, depending on which platform the customer is using. This is an example of a ________. (D1, L1.4.2)

B) Procedure

Proper alignment of security policy and business goals within the organization is important because: (D5.3, L5.3.1)

B) Security policy that conflicts with business goals can inhibit productivity

Trina is a security practitioner at Triffid, Inc. Trina has been tasked with selecting a new product to serve as a security control in the environment. After doing some research, Trina selects a particular product. Before that product can be purchased, a manager must review Trina's selection and determine whether to approve the purchase. This is a description of: (D3, L3.1.1)

B) Segregation of duties

Who approves the incident response policy? (D2, L2.1.1)

B) Senior management

Kerpak works in the security office of a medium-sized entertainment company. Kerpak is asked to assess a particular threat, and he suggests that the best way to counter this threat would be to purchase and implement a particular security solution. This is an example of _______. (D1, L1.2.2)

C) Mitigation

Suvid works at Triffid, Inc. When Suvid attempts to log in to the production environment, a message appears stating that Suvid has to reset the password. What may have occurred to cause this? (D3, L3.3.1)

B) Suvid's password has expired

When Pritha started working for Triffid, Inc., Pritha had to sign a policy that described how Pritha would be allowed to use Triffid's IT equipment. What policy was this? (D5.3, L5.3.1)

B) The acceptable use policy (AUP)

For which of the following assets is integrity probably the most important security aspect? (D1, L1.1.1)

B) The file that contains passwords used to authenticate users

What is the risk associated with delaying resumption of full normal operations after a disaster? (D2, L2.3.1)

B) The impact of running alternate operations for extended periods

In risk management concepts, a(n) _________ is something a security practitioner might need to protect. (D1, L1.2.1)

B) Asset

At Parvi's place of work, the perimeter of the property is surrounded by a fence; there is a gate with a guard at the entrance. All inner doors only admit personnel with badges, and cameras monitor the hallways. Sensitive data and media are kept in safes when not in use. (D3, L3.1.1)

C) Defense in depth

Aphrodite is a member of ISC2 and a data analyst for Triffid Corporation. While Aphrodite is reviewing user log data, Aphrodite discovers that another Triffid employee is violating the acceptable use policy and watching streaming videos during work hours. What should Aphrodite do? (D1, L1.5.1)

C) Inform Triffid management

A _____ is a record of something that has occurred. (D3, L3.2.1)

C) Log

Druna is a security practitioner tasked with ensuring that laptops are not stolen from the organization's offices. Which sort of security control would probably be best for this purpose? (D1, L1.3.1)

C) Physical

Steve is a security practitioner assigned to come up with a protective measure for ensuring cars don't collide with pedestrians. What is probably the most effective type of control for this task? (D1, L1.3.1)

C) Physical

To adequately ensure availability for a data center, it is best to plan for both resilience and _______ of the elements in the facility. (D4.3 L4.3.1)

C) Redundancy

Data _____ is data left behind on systems/media after normal deletion procedures have been attempted. (D5.1, L5.1.1)

C) Remanence

Barry wants to upload a series of files to a web-based storage service, so that people Barry has granted authorization can retrieve these files. Which of the following would be Barry's preferred communication protocol if he wanted this activity to be efficient and secure? (D4, L4.1.2)

C) SFTP (Secure File Transfer Protocol)

Who dictates policy? (D5.3, L5.3.1) A) The security manager B) The Human Resources office C) Senior management D) Auditors

C) Senior management

A device typically accessed by multiple users, often intended for a single purpose, such as managing email or web pages. (D4.1 L4.1.1)

C) Server

ISC2 publishes a Common Body of Knowledge (CBK) that IT security practitioners should be familiar with; this is recognized throughout the industry as a set of material that is useful for practitioners to refer to. Certifications can be issued for demonstrating expertise in this Common Body of Knowledge. What kind of document is the Common Body of Knowledge? (D1, L1.4.1)

C) Standard

Prachi works as a database administrator for Triffid, Inc. Prachi is allowed to add or delete users, but is not allowed to read or modify the data in the database itself. When Prachi logs onto the system, an access control list (ACL) checks to determine which permissions Prachi has.

C) The rule

Which of the following activities is usually part of the configuration management process, but is also extremely helpful in countering potential attacks? (D4.2 L4.2.3)

C) Updating and patching systems

When should a business continuity plan (BCP) be activated? (D2, L2.2.1)

C) When senior management decides

The concept that the deployment of multiple types of controls provides better security than using a single type of control. (D4.3 L4.3.3)

D) Defense in depth

Which of the following is probably the main purpose of configuration management? (D5.2, L5.2.1)

D) Ensuring only authorized modifications are made to the IT environment

Which of the following is not a typical benefit of cloud computing services? (D4.3 L4.3.2)

D) Freedom from legal constraints

Cheryl is browsing the Web. Which of the following protocols is she probably using? (D4, L4.1.2)

D) HTTP (Hypertext Transfer Protocol)

Which of the following statements is true? (D3, L3.3.1)

D) It is best to use a blend of controls in order to provide optimum security

What is the goal of Business Continuity efforts? (D2, L2.2.1)

D) Keep critical business functions operational

Every document owned by Triffid, Inc., whether hardcopy or electronic, has a clear, 24-point word at the top and bottom. Only three words can be used: "Sensitive," "Proprietary" and "Public." This is an example of _____. (D5.1, L5.1.1)

D) Labeling

The city of Grampon wants to ensure that all of its citizens are protected from malware, so the city council creates a rule that anyone caught creating and launching malware within the city limits will receive a fine and go to jail. What kind of rule is this? (D1, L1.4.1)

D) Law

Prachi works as a database administrator for Triffid, Inc. Prachi is allowed to add or delete users, but is not allowed to read or modify the data in the database itself. When Prachis logs onto the system, an access control list (ACL) checks to determine which permissions Prachi has.

D) Least privilege

A VLAN is a _____ method of segmenting networks. (D4.3 L4.3.3)

D) Logical

Log data should be kept ______. (D5.1, L5.1.2) A) On the device that the log data was captured from B) In an underground bunker C) In airtight containers D) On a device other than where it was captured

D) On a device other than where it was captured

Which common cloud service model only offers the customer access to a given application? (D4.3 L4.3.2)

D) Software as a service (SaaS)

A software firewall is an application that runs on a device and prevents specific types of traffic from entering that device. This is a type of ________ control. (D1, L1.3.1)

D) Technical

Jengi is setting up security for a home network. Jengi decides to configure MAC address filtering on the router, so that only specific devices will be allowed to join the network. This is an example of a(n)_______ control. (D1, L1.3.1)

D) Technical

The city of Grampon wants to know where all its public vehicles (garbage trucks, police cars, etc.) are at all times, so the city has GPS transmitters installed in all the vehicles. What kind of control is this? (D1, L1.3.1)

D) Technical

Security controls on log data should reflect ________. (D5.1, L5.1.2)

D) The sensitivity of the source device

Which of the following is one of the common ways potential attacks are often identified? (D4.2 L4.2.2)

D) Users report unusual systems activity/response to Help Desk or the security office

A means to allow remote users to have secure access to the internal IT environment. (D4.3 L4.3.3)

D) VPN


संबंधित स्टडी सेट्स

Civil Liberties and Civil Rights

View Set

Environmental Biology Chapter 14

View Set

Theory of planned behaviour [Albarracin et al]

View Set

Chapter 8: Planning Work Activities Review

View Set

Chapter 13: Life Insurance Policy Provisions Options and Riders

View Set

Blood Vessels & Lymphatic System

View Set

UT Austin Texas Government Credit Exam

View Set

Chapter 8 Photosynthesis Study Guide

View Set