sec160 ch 8 ALL

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which device is usually the first line of defense in a layered defense-in-depth approach? internal router access layer switch edge router firewall

edge router

identifies salary, pay schedule, benefits, work schedule, vacations,

employee

edge router

the first line of defense that passes all inbound connections to the firewall.

Identify the characteristics of AAA

-Authentication -Authorization -Accounting

protects the rights of workers and the company interests

Company

accounting

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

Which three services are provided by the AAA framework? (Choose three.) autoconfiguration accounting authorization authentication automation autobalancing

accounting authorization authentication

thread

any potential danger to an asset.

What three items are components of the CIA triad? (Choose three.) intervention availability scalability confidentiality access integrity

availability, confidentiality, integrity

authentication

Passwords, passphrases, and PINs are examples of which security term?

confidentiality

info is only accessible to authorized individuals

discretionary access control

it allows users to control access to their data as owners of that data. It may use ACLs or other methods to specify which users or groups of users have access to the info.

Identify the Threat Intelligence Info Source

-FireEye -CVE -Talos -AIS

In threat intelligence communications, what set of specifications is for exchanging cyberthreat information between organizations? Automated indicator sharing (AIS) Structured threat information expression (STIX) Trusted automated exchange of indicator information (TAXII) Common vulnerabilities and exposures (CVE)

Structured threat information expression (STIX)

T/F. The mandatory access control (MAC) model limits access based on the security level clearance of an individual.

True

What is the principle of least privilege access control model? Users control access to data they own. Users are granted the strictest access control possible to data. Users are granted rights on an as-needed approach. User access to data is based on object attributes.

Users are granted rights on an as-needed approach.

-the use of UDP ports for authentication and accounting -encryption of the authentication and authorization processes

What are two characteristics of the RADIUS protocol? (Choose two)

One safeguard failure does not affect the effectiveness of other safeguards.

What is a characteristic of a layered defense-in-depth security approach?

company policy

Which type of business policy establishes the rules of conduct and the responsibilities of employees and employers?

defense-in-depth

a security approach that uses multiple layers of security.

security policies

a set of security objectives for an org.

BYOD

enables employees to use their own mobile devices to access company systems.

principle of least privilege

specifies an as-needed approach to user access rights.

In a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.) assets that need protection location of attacker or attackers threats to assets total number of devices that attach to the wired and wireless network past security breaches vulnerabilities in the system

vulnerabilities in the system, threats to assets, assets that need protection

artichoke

with the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?

accounting and auditing

AAA component that records and logs user activity.

T/F. Local AAA authentication requires a central AAA server

False

T/F. RADIUS encrypts both passwords and the contents of packets.

False

Which statement describes a difference between RADIUS and TACACS+? RADIUS is supported by the Cisco Secure ACS software whereas TACACS+ is not. RADIUS separates authentication and authorization whereas TACACS+ combines them as one process. RADIUS uses TCP whereas TACACS+ uses UDP. RADIUS encrypts only the password whereas TACACS+ encrypts all communication.

RADIUS encrypts only the password whereas TACACS+ encrypts all communication

remote access

Refer to the exhibit. The security policy of an org allows employees to connect to the office intranet from their homes. Which type of security policy is this?

Vulnerabilities in systems are exploited to grant higher levels of privilege than someone or some process should have.

What is privilege escalation?

authorization

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

Department of Homeland Security

Which of the following offers a free service called Automated Indicator that enables the real-time exchange of cyberthreat indicators?

vulnerability

a weakness in a system that can be exploited

What component of a security policy explicitly defines the type of traffic allowed on a network and what users are allowed and not allowed to do? identification and authentication policies acceptable use policies remote access policies password policies

acceptable use policies

non-discretionary access control

access decisions are based on the roles and responsibilities of the individual within the org.

attribute-based access control

allows access based on attributes of the object (resource) to be accessed, the subject (user) accessing the resource, and the environment factors regarding how the object is to be accessed, such as time of day.

Mandatory Access Control (MAC)

apply the strictest access control and is typically used in military or mission-critical applications. It assigns security level labels to info and enables users with access based on their security level clearance.

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework? authorization automation accounting authentication

authentication

Which AAA component can be established using token cards? authentication accounting auditing authorization

authentication

Which technology provides the framework to enable scalable access security? role-based CLI access authentication, authorization, and accounting AutoSecure Simple Network Management Protocol Cisco Configuration Professional communities

authentication, authorization, and accounting

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is assigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework?

authorization

What service determines which resources a user can access along with the operations that a user can perform? token authentication accounting biometric authorization

authorization

A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan? confidentiality availability scalability integrity

availability

A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration? scalability integrity availability confidentiality

confidentiality

business policies

guidelines that govern the actions of an org.

Which two areas must an IT security person understand in order to identify vulnerabilities on a network? (Choose two.) hardware used by applications number of systems on each network network baseline data data analysis trends important applications used

hardware used by applications important applications used

Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data? identification and authentication policy campus access policy Internet access policy acceptable use policy statement of scope statement of authority

identification and authentication policy

Acceptable Use Policy (AUP)

identifies network applications and uses that are acceptable to the org.

availability

info is always available to those who are authorized to access it.

integrity

info is protected from unauthorized alternation.

Which type of access control applies the strictest access control and is commonly used in military or mission critical applications? attribute-based access control (ABAC) mandatory access control (MAC) discretionary access control (DAC) Non-discretionary access control

mandatory access control (MAC)

company policies

rules of conduct and responsibilities for employers and employees

defines system requirements and objectives, rules, and requirements for users when they attach to or on the network

security

How does BYOD change the way in which businesses implement networks?​ BYOD requires organizations to purchase laptops rather than desktops. BYOD devices are more expensive than devices that are purchased by an organization. BYOD users are responsible for their own network security, thus reducing the need for organizational security policies. BYOD provides flexibility in where and how users can access network resources.

BYOD provides flexibility in where and how users can access network resources.

immediately after successful authentication against an AAA data source.

During the AAA process, when will authorization be implemented?

Which method is used to make data unreadable to unauthorized users? Fragment the data. Encrypt the data. Assign it a username and password. Add a checksum to the end of the data.

Encrypt the data.

What is the purpose of mobile device management (MDM) software? It is used to create a security policy. It is used to implement security policies, setting, and software configurations on mobile devices. It is used by threat actors to penetrate the system. It is used to identify potential mobile device vulnerabilities.

It is used to implement security policies, setting, and software configurations on mobile devices.


संबंधित स्टडी सेट्स

Rosetta Stone French Unit 19 (all lessons)

View Set

ARM 400 - Segment B - Chapters 4, 5, & 6

View Set

Ch12 Quiz questions - Urinary System

View Set

US History Unit 1 Midterm Review

View Set

Hazard communication Standard: Safety Data Sheets

View Set