Module III Quiz

Ace your homework & exams now with Quizwiz!

Your manager is concerned that if the company e-mail server fails, then the company will no longer have access to e-mail services. What solution would you recommend? A. Clustering B. Load balancing C. RAID 5 D. Full backup

A. Clustering

Sue comes to you asking if it is okay if she downloads movies to her company laptop with a P2P program so that she can watch the movies while she is away on business. Which of the following is the best response? A. Educate Sue on the fact that P2P programs are popular ways to spread viruses, so no, the company does not allow P2P software on its systems. B. Tell her no. C. Tell her yes, as long as she does not watch the movies during work hours. D. Tell her yes, as long as she places the downloaded movies on the server so that you can scan them for viruses.

A. Educate Sue on the fact that P2P programs are popular ways to spread viruses, so no, the company does not allow P2P software on its systems.

Bob requires the capabilities to change the system time on the computers, but instead of adding Bob to the Administrators group (who can change the time on the computer), you grant Bob the Change System Time right. This is an example of following which security principle? A. Least privilege B. Job rotation C. Separation of duties D. AUP

A. Least privilege

What is the first step in creating a security policy? A. Obtain management approval and support. B. Create the AUP. C. Download sample templates. D. Review job roles.

A. Obtain management approval and support.

Which type of risk analysis involves calculating the actual dollars lost due to a threat occurring? A. Quantitative B. Qualitative C. Risk assessment D. Mitigation

A. Quantitative

You are the security administrator for a company and wish to implement a solution that will reduce data loss in the case of a drive failure. Which of the following would you use? A. RAID B. Server clustering C. Load balancing D. Virtualization

A. RAID

Your manager is concerned that the drive that holds the company data will fail, rendering the data unavailable. What protection method can you put on the drives to help in drive disasters? A. RAID B. Backups C. Load balancing D. Clustering

A. RAID

What RAID level mirrors the data from one drive to another? A. RAID 1 B. RAID 5 C. RAID 3 D. RAID 0

A. RAID 1

Before reusing target drives to acquire bit-level copies of a suspect's drive for a new case, what should be done? A. Securely wipe the target drive. B. Image the target drive. C. Delete all the files off the target drive. D. Format the target drive

A. Securely wipe the target drive.

The lead investigator in your office is looking for help with an investigation. You both have identified the evidence that needs to be obtained and planned how to obtain it, including evidence from a computer and cell phone. What is your next step? A. Seize the evidence. B. Acquire the evidence. C. Create a CIRT. D. Power off the switch

A. Seize the evidence.

Looking at a threat against one of your assets, you have decided to get an insurance policy that covers the risk. How have you handled the risk? A. Transfer B. Accept C. Mitigate D. Deny

A. Transfer

You have been tasked to design a disaster recovery alternative site solution to ensure that all the equipment and services are in place with minimal restoration time. What type of alternative site are you looking to use? A. Warm site B. Hot site C. Cold site D. Spare site

A. Warm site

Informs employees of rules for Internet and e-mail usage

AUP

RTO

Amount of time allowable for the restoration of a business function

MTTF

Amount of time before a device fails

MTTR

Amount of time to recover a system

A small company has identified that having the company server in the closet of a facility and not having it in a locked room presents a risk. They decide to do nothing to correct the threat. How have they handled the risk? A. Transfer B. Accept C. Mitigate D. Deny

B. Accept

You are talking with management about ways to limit security threats such as tailgating within the company. Management has said there is no money to spend on controls such as mantraps. What can you do to reduce the risk of tailgating? A. Purchase an additional lock. B. Conduct training and awareness. C. Purchase a revolving door. D. Purchase a mantrap.

B. Conduct training and awareness.

John is a member of an incident response team and is the first responder. John responds to a security incident that involves a virus infection on a system. Which of the following actions should John do first? A. Document the state of the system. B. Disconnect the system from the network. C. Inventory the software on the system. D. Do a live acquisition of memory

B. Disconnect the system from the network.

Which of the following is required throughout the entire process of the investigation? A. Consult a CIRT B. Document each step C. Security policy D. Legal advisor

B. Document each step

Which of the following are considered PII that must be secured at all times? (Choose two.) A. Postal code B. Driver's license number C. City name D. Social Security number E. Street name

B. Driver's license number and D. Social Security number

Which of the following are common steps to performing the BIA? (Choose three.) A. Choose an alternative site location. B. Identify business functions. C. Create a backup plan. D. Identify threats against business functions. E. Identify maximum tolerable downtime of business functions.

B. Identify business functions. D. Identify threats against business functions. E. Identify maximum tolerable downtime of business functions.

You have been asked by the manager to help with some risk analysis within the company. What is the first step to performing a risk assessment? A. Identify the threats. B. Identify the assets. C. Identify the impact. D. Evaluate residual risks.

B. Identify the assets.

What feature of forensics analysis tools will filter out files that are known operating system files that have not been tampered with? A. KFC B. KFF C. Report D. D dd

B. KFF

Customers visiting the company web site are complaining that the web site is responding slowly. Your manager is wondering if there is a way to speed up the customers' experience with the web site. What would you recommend? A. Clustering B. Load balancing C. RAID 5 D. Full backup

B. Load balancing

Your manager has come to you with inappropriate graphic image files that have been taken in the office. Your manager knows of five employees who have had cameras purchased for them over the last six years. What can you do to help narrow down which employee may have taken the picture? A. Look at the filename. B. Look at the Exif metadata. C. Look at the file extension. D. Look at the picture.

B. Look at the Exif metadata.

You are looking to create the business continuity plan for your organization. What is your first step to creating the BCP? A. Perform the business impact assessment. B. Obtain management support. C. Determine allowable downtime of business functions. D. Identify threats against resources.

B. Obtain management support.

The network administrator is configuring the network and wants to put restrictions on user passwords such as the length of the password, password complexity, and password history. Where can the administrator find out what the values of those settings should be set to? A. VPN policy B. Password policy C. AUP D. Secure disposal of equipment policy

B. Password policy

You are responsible for ensuring that backups are stored at an alternative location. Which of the following should you consider with the tapes that are stored at the alternative location? A. RAID B. Password protect or encrypt C. Store close to magnets D. Store tapes in a hidden location in a closet

B. Password protect or encrypt

Which of the following represents how you can calculate the ALE? A. SLE × EF B. SLE × ARO C. Asset value × EF D. EF × ARO

B. SLE × ARO

Which type of policy is not optional and must be adhered to? A. Procedure B. Standard C. Guideline D. Least privilege

B. Standard

Your team has devised a plan to determine how new company leaders are chosen as part of your contingency plan. Which part of the plan have you just developed? A. Business impact analysis B. Succession planning C. Continuity of operations D. Disaster recovery

B. Succession planning

Which of the following is a good reason to ensure all employees take vacation time each year? A. To keep the employee refreshed and energized B. To hold employees accountable for any suspicious activity C. To keep the employee happy D. To raise company morale

B. To hold employees accountable for any suspicious activity

One of the network administrators in the office has been monitoring the proxy server logs and notices that Bob has visited some inappropriate web sites. What policy is this in violation of? A. Firewall policy B. Proxy server policy C. AUP D. Hiring policy

C. AUP

Which of the following is the goal of the first responder? A. Acquisition B. Seizing C. Containment D. Reporting

C. Containment

Which of the following is an example of an intangible impact of a threat? A. Revenue loss B. Loss of production C. Damage to company reputation D. Loss of facility

C. Damage to company reputation

A manager has just notified you that John, a longtime employee of the company, has been stealing money from the company and that representatives of management and HR are headed into a meeting with John to let him know he is being terminated. What should you do while they are in the meeting? A. Review logs. B. See if anyone wants his office space. C. Disable the employee's user accounts and access cards. D. Format the drive on his workstation.

C. Disable the employee's user accounts and access cards

What type of backup backs up the data that has changed and then clears the archive bit? A. Full B. Differential C. Incremental D. Offsite

C. Incremental

The lead investigator for a case has indicated that she believes that the suspect is encrypting data on the drives of the computer that needs to be seized. What type of acquisition will you look to perform? A. RAW acquisition B. Static acquisition C. Live acquisition D. Dynamic acquisition

C. Live acquisition

Tom is the security officer for a large organization and wishes to split the requests to his web site across multiple devices. Which of the following should be used? A. RAID B. Proxy server C. Load balancing D. Virtualization

C. Load balancing

After identifying that a buffer overflow threat against your web server exists, you implement a firewall to control communication to the web server. How have you handled the risk? A. Transfer B. Accept C. Mitigate D. Deny

C. Mitigate

A corporate investigation is typically the result of which of the following? A. A crime B. A CIRT C. Policy violation D. Direct evidence

C. Policy violation

What is the term used for when someone slips through an open door behind you after you have unlocked the door? A. Horseback riding B. Worming C. Tailgating D. Gliding

C. Tailgating

The lead investigator for a case has indicated that it is critical that you do not modify the suspect's system, so you are going to perform a static acquisition of the drive in the suspect's system. Which of the following should be used in the process of acquiring the image? A. Helix B. KFF C. Write blocker D. Hash

C. Write blocker

Data classification labels are applied to _______________, while clearance levels are applied to _______________. A. employees, information B. management, employees C. information, employees D. employees, management

C. information, employees

Your company has a piece of machinery that is used to produce the main product your company sells. It has been decided that the machinery has a value of $320,000. If a part fails, it will have an impact of your company losing 18 percent of the asset value with each failure. You expect the failure to occur once every four years. What is the annual loss expectancy of the threat? A. $57,000 B. $29,000 C. $57,600 D. $14,400

D. $14,400

Which of the following could be considered a reason why evidence may be thrown out of court if it is not maintained? A. Security policy B. CIRT C. Certifications D. Chain of custody

D. Chain of custody

Sean is the CIRT team leader for his company. Which of the following represents Sean's responsibility when dealing with security incidents? A. Create an image of the suspect's drive. B. Document all events during the response. C. Give legal advice to the rest of the team. D. Ensure all team members know their role with incident response.

D. Ensure all team members know their role with incident response.

The technical team is putting together the firewall solution and needs to know what type of traffic is permitted to pass through the firewall. What policy can the technical team use to find out what traffic is permitted to pass through the firewall? A. AUP B. Hiring policy C. VPN policy D. Firewall policy

D. Firewall policy

Your manager has been reading about risk analysis and asks you what the benefit of qualitative analysis is. How would you respond? A. You are able to justify the cost because you know how much money each threat will cost you. B. You are able to calculate the ALE. C. You are able to calculate the SLE. D. It is quicker than a quantitative analysis.

D. It is quicker than a quantitative analysis.

Management is concerned that an employee may be able to hide fraudulent activity for long durations while working for the company. What would you recommend to help detect an improper activity performed by employees? A. Least privilege B. AUP C. Disabling the employee's user accounts and access cards D. Job rotation

D. Job rotation

You are the data owner of a set of data that is considered sensitive to the organization. If this information is leaked to the public, it could cause damage to the organization. Which of the following classification labels would you assign to the data? A. Unclassified B. Public C. Low D. Private

D. Private

You are performing an internal corporate investigation and want to ensure that you capture the evidence using the order of volatility. Which of the following represents the proper order of volatility? A. DVD, RAM, swap file, hard disk B. Hard disk, DVD, RAM, swap file C. RAM, hard disk, swap file, DVD D. RAM, swap file, hard disk, DVD

D. RAM, swap file, hard disk, DVD

You have met with your manager over lunch to discuss the company's goal for system restores, and your manager has specified the degree of acceptable data loss during restoration. Which of the following has been defined? A. MTTR B. MTTF C. MTBF D. RPO

D. RPO

Jeff is the network administrator for a law firm and has just purchased 20 new systems for the employees. Jeff has collected all of the old computers from the employees and has searched through the hard drives and deleted any DOC and XLS files before handing the computers over to the local school. What policy may Jeff be in violation of? A. AUP B. Password policy C. Virus protection policy D. Secure disposal of equipment policy

D. Secure disposal of equipment policy

What type of BCP testing involves the BCP committee getting together to review the BCP? A. Checklist review B. Simulation test C. Parallel test D. Structured walkthrough

D. Structured walkthrough

Which of the following best describes risk analysis? A. An event that can cause harm to the asset B. A weakness in the configuration of hardware or software C. When the threat to an asset can cause harm to the organization—typically resulting in a financial loss D. The identification and planning of mitigation techniques to reduce the risks to your organization

D. The identification and planning of mitigation techniques to reduce the risks to your organization

One of the file servers on your network containing commonly accessed data has been compromised. Upon investigation, you find that the hacker planted a Trojan virus on the system to gain access at a later time. Which of the following incident response procedures should be used to recover the system? A. Retain the existing OS partition, wipe the data partition, and restore the data from the last good backup. B. Wipe the OS partition, keep the data partition, and restore the data from the last good backup. C. Wipe the OS partition, keep the data partition, and only restore the data you suspect was compromised. D. Wipe the drives on the system, reinstall the operating system, and restore the data from the last good backup.

D. Wipe the drives on the system, reinstall the operating system, and restore the data from the last good backup.

RPO

Determines how much data loss is acceptable

Risk transfer

Get insurance policy

Mitigate the risk

Implement secuirty control to protect the asset

Helps detect fraudulent activities performed by an employee

Mandatory vacation

You are the security officer for Company XYZ and are creating an incident response plan. You are working on creating the steps for other security officers to capture evidence of a user's system if an incident occurs. Place the following types of evidence in the order in which they should be captured: A. ____ Swap file B. ____ DVD-ROM C. ____ Hard disk D. ____ Memory

Memory, Swap File, Hard Disk, DVD ROM

Information that can uniquely identify a person

PII

Risk with cloud computing

Privacy concerns

Specifies maximum allowed downtime

SLA

ALE

SLE x ARO

Informs employees on how to decommission systems and devices

Secure disposal

Mechanism used to protect an asset

Security control

MTBF

Time between failures

SLE

Value ($) x EF(%)


Related study sets

PEDs Chapt 19 Nursing Care of the Child with a Cardiovascular Disorder

View Set

Legal Environment - Employment/Labor Law

View Set

APUSH Chapter 2- w/extra questions

View Set

CCNA 1 chapter 10 Application Layer

View Set

Abeka (11th grade Bible)Jesus and his followers verses for verse exam 1

View Set

Chapter 11, Quiz 11.2: Membrane Proteins chap 4

View Set