Cyberops Chapters 18-20

Ace your homework & exams now with Quizwiz!

Uses a created set of attributes that describes the user's access to the network

Authorization

What a user can and cannot do on the network

Authorization

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

Authorization

Which resources the user can access and which operations the user is allowed to perform

Authorization

What are three access control security services? (Choose three.)

Authorization Accounting Authentication

A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

Availability

Who protects the rights of workers and the company interests

Company

Which access control model allows users to control access to data as an owner of that data?

Discretionary access control

Which statement describes Trusted Automated Exchange of Indicator Information (TAXII)?

It is the specification for an application layer protocol that allows the communication of CTI over HTTPS.

What is the purpose of Mobile Device Management MDM software

It is used to implement security policies, setting, and software configurations on mobile devices.

What is the biggest issue with local implementation of AAA?

Local implementation does not scale well

Which organization defines unique CVE Identifiers for publicly known information-security vulnerabilities that make it easier to share data?

MITRE

Which type of access control applies the strictest access control and is commonly used in military or mission critical applications?

Mandatory access control (MAC)

Which two options are security practices that help mitigate byod risks (Two options)

Only turn on WIFI when using the wireless network, Keep the device OS and software update

Which is a BYOD security best practice?

Subscribe to a device locator service with remote wipe feature

What is STIX?

This is a set of specifications for exchanging cyberthreat information between organizations.

Which component of the zero trust security model focuses on secure access when an API, a microservice, or a container is accessing a database within an application?

Workload

With the evolution of borderless networks, which vegetable is now used to describe a defense-in-depth approach?

artichoke

Which access control model is based on attributes of the object (resource) to be accessed, the subject (user) accessing the resource, and environmental factors regarding how the object is to be accessed, such as time of day?

attribute-discretionary access control

Passwords, passphrases, and PINs are examples of which security term?

authentication

what is authorized users must have uninterrupted access to important resources and data

availbility

How does FireEye detect and prevent zero-day attacks?

by addressing all stages of an attack lifecycle with a signature-less engine utilizing stateful attack analysis

How does AIS address a newly discovered threat?

by enabling real-time exchange of cyberthreat indicators with U.S. Federal Government and the private sector

What allows only authorized individuals, entites, or processes can access senitive information

confentiality

Which access control model is based on an individual's roles and responsibilities within the organization?

non-discretionary access control

What are threats

potential dangers to a protected asset

What defines system requirements and objectives, rules, and requirements for users when they attach to or on the network

security

What is the primary purpose of the Malware Information Sharing Platform (MISP) ?

to enable automated sharing of IOCs between people and machines using the STIX and other exports formats

What is the purpose of the network security accounting function?

to keep track of the actions of a user

What is an example of privilege escalation attack?

A threat actor performs an access attack and gains the administrator password

What is the free service that is offered by the U.S. Department of Homeland Security?

AIS

Which service is offered by the U.S. Department of Homeland Security (DHS) that enables real-time exchange of cyberthreat indicators between the U.S. Federal Government and the private sector?

AIS

An administrator is concerned with restricting which network applications and uses are acceptable to the organization. What security policy component does the administrator use to address these concerns?

Accept Use Policy

What component of a security policy explicitly defines the type of traffic allowed on a network and what users are allowed and not allowed to do?

Acceptable Use Policies

A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?

Accounting

Collects and reports usage data so that it can be employed for purposes such as auditing or billing

Accounting

Provides leverage against individuals who perform malicious actions

Accounting

Records what the user does, including what is accessed, the amount of time the resource is accessed, and any changes that were made

Accounting

A way to control who is permitted to access a network

Authentication

Established using username and password combinations, challenge and response questions, token cards, and other methods

Authentication

Users and administrators must prove that they are who they say they are

Authentication

When designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the network. Which business goal will be addressed by this choice?

Availability

What three items are components of the CIA triad? (Choose three.)

Availability, Integrity, Confidentiality

How does BYOD change the way in which businesses implement networks?

BYOD provides flexibility in where and how users can access network resources

What does the MITRE Corporation create and maintain?

CVE

Which service is provided by the Cisco Talos Group?

Collecting information about active, existing, and emerging threats

Which type of business policy establishes the rules of conduct and the responsibilities of employees and employers?

Company

Which objective of secure communications is achieved by encrypting data?

Confidentiality

Which threat intelligence sharing open standard specifies, captures, characterizes, and communicates events and properties of network operations?

CybOX

Which device is usually the first line of defense in a layered defense-in-depth approach?

Edge router

Which security operations platform integrates and enhances a range of security tools and threat intelligence??

Fireeye Helix

What device would be used as a second line of defense in a defense-in-depth approach?

Firewall

Which two areas must an IT security person understand in order to identify vulnerabilities on a network? (Choose two.)

Important applications used, hardware used by applications

What device would be used as the third line of defense in a defense-in-depth approach?

Internal Router

What is the principle behind the nondiscretionary access control model?

It allows access decisions to be based on roles and responsibilities of a user within the organization.

What does the incident handling procedures security policy describe

It describes how security incidents are handled

Why is asset management a critical function of a growing organization against security threats?

It identifies the ever increasing attack surface to threats

What is the Common Vulnerabilities and Exposures (CVE) used by the MITRE Corporation?

It is a dictionary of CVE Identifiers for publicly known cybersecurity vulnerabilities

What is cybox

It is a set of standardized schemata for specifying, capturing, characterizing, and communicating events and properties of network operations.

Which two protocols are used to provide server-based AAA authentication? (Choose two.)

RADIUS, TACACS+

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this? Photo of home connecting to Organization

Remote Access

What are three threat intelligence information sharing specifications?

STIX,TAXII,CyberOX

What is a world leading threat intelligence team with a goal to help protect enterprise users, data, and infrastructure from active adversaries?

Talos

What threat intelligence group provides blogs and podcasts to help network security professionals remain effective and up-to-date?

Talos

What is the benefit of a defense-in-depth approach

The effectiveness of other security measures is not impacted when a security mechanism fails

What is a characteristic of a layered defense-in-depth security approach?

The failure of one safeguard does not affect the effectiveness of other safeguards

What is a characteristic of the security artichoke, defense-in-depth approach

Threat actors no longer have to peel each layer before reaching the target data or system

What is the primary purpose of the Forum of Incident Response and Security Teams (FIRST)?

To enable a variety of computer security incident response teams to collaborate, cooperate, and coordinate information sharing, incident prevention, and rapid reactions strategies

Why do several network organizations, professionals, and intelligence agencies use shared open standards for threat intelligence?

To enable the exchange of CTI in an automated, consistent, and machine readable format

What is the primary function of SANS?

To maintain the Internet Storm Center

What is the primary function of (ISC2)?

To provide vendor neurtal education prodcuts and career services

What is the principle of least privilege access control model?

Users are granted rights on an as-needed approach

What are vulnerabilities?

Weaknesses in a system or design

What do security compliance regulations define?

What organizations are responsible for providing and the liability for failure to comply

A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?

confidentiality

Who identiffies salary, pay schedule, benefits, work schedule, vactions, etc

employee

What are two characteristics of the RADIUS protocol? (Choose two.)

encryption of the password only the use of UDP ports for authentication and accounting

what are assets

information or equipment valuable enough to an organization to warrant protection

What data is protected from unauthorized alteration

integrity

Which access control model applies the strictest access control and is typically used in military or mission critical applications?

mandatory access control


Related study sets

PCAP: Programming Essentials in Python

View Set

Chapter 14: Assessing Skin, Hair, and Nails

View Set

End-of Module Multiple Choice 31-33

View Set

Exam 8 Adult Health Chapter 49, 50, 51

View Set

CH#4: Life Insurance Policy Provisions, Options and Riders Q&A

View Set

5th grade SS - Industrial Revolution Leads to Massive Immigration

View Set