1.0 General Security Concepts Flashcards

(100 cards)

1
Q

Which type of control would a firewall be classified as?

A

a) Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security awareness training for employees is an example of which control type?

A

b) Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which control type is most likely to be automated?

A

a) Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which control type is most focused on day-to-day security activities?

A

c) Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company’s disaster recovery plan would be considered what type of control?

A

b) Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biometric access systems are an example of which control type?

A

d) Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which control type is most likely to be implemented through written policies and procedures?

A

b) Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Log review and monitoring would typically be classified as what type of control?

A

c) Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which control type is most focused on overall security strategy and governance?

A

b) Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security guard conducting patrols is an example of which control type?

A

c) Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which control type is most likely to require regular software updates or patches?

A

a) Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk assessments are typically considered what type of control?

A

b) Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which control type is most prone to human error or inconsistency?

A

c) Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption of data at rest is an example of which control type?

A

a) Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which control type is most likely to be visible to employees and visitors?

A

d) Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of control is designed to discourage potential attackers from attempting a security breach?

A

b) Deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An intrusion detection system (IDS) is an example of which type of control?

A

c) Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When a primary control cannot be implemented due to technical limitations, what type of control would be most appropriate?

A

a) Compensating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which control type is most closely associated with security policies and procedures?

A

c) Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A firewall is primarily an example of which type of control?

A

c) Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Incident response plans are best categorized as which type of control?

A

c) Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which control type aims to limit damage and restore systems to normal after a security incident?

A

c) Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Security awareness training programs are primarily examples of which two types of controls?

A

a) Preventive and Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which control type is most likely to involve psychological elements to influence potential attackers?

A

b) Deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A SIEM system that alerts security personnel to potential threats is an example of which control type?
c) Detective
26
Which control type is most closely associated with providing alternative security measures?
b) Compensating
27
Encryption is primarily an example of which type of control?
a) Preventive
28
Which control type is most likely to be implemented after a security incident has occurred?
d) Corrective
29
Access control systems are primarily examples of which type of control?
a) Preventive
30
Which control type is most closely associated with ensuring compliance with security policies?
c) Directive
31
What are the three components of the CIA triad?
Confidentiality, Integrity, Availability
32
Which principle ensures that data remains unaltered and trustworthy throughout its lifecycle?
Integrity
33
What is the primary purpose of non-repudiation in information security?
To ensure that a user cannot deny performing a specific action
34
In the AAA framework, what does the first "A" stand for?
Authentication
35
Which authentication method might use fingerprints or retinal scans?
Biometrics
36
What is the main difference between authentication and authorization?
Authentication verifies identity, while authorization determines access rights
37
Which authorization model assigns permissions based on a user's job function or title?
Role-Based Access Control (RBAC)
38
In ABAC, what are four types of attributes that might be considered for access decisions?
User Resource Action Environmental Attributes
39
Who typically controls access rights in a Discretionary Access Control (DAC) model?
The resource owner
40
Which access control model is most commonly used in high-security government environments?
Mandatory Access Control (MAC)
41
What is the primary goal of a gap analysis in security?
To identify differences between current and desired security states
42
In the Zero Trust model, what does "adaptive identity" refer to?
Continuous evaluation and adaptation to user behavior and context
43
What is the role of the Policy Engine in the Zero Trust Control Plane?
To evaluate access requests against policies and make decisions
44
What is an "implicit trust zone" in the context of Zero Trust architecture?
An area within the network where some level of trust is assumed
45
Which physical security measure is designed to control vehicle access?
Bollards
46
What type of sensor detects heat signatures?
Infrared sensors
47
What is the primary purpose of a honeypot?
To attract and detect attacks
48
How does a honeytoken differ from a honeyfile?
A honeytoken is false data A honey file is a fake file
49
In the Zero Trust model, what is the function of the Policy Enforcement Point?
To enforce access decisions made by the Policy Engine
50
What is the main difference between the Control Plane and Data Plane in Zero Trust architecture?
The Control Plane makes decisions The Data Plane enforces them and handles data flow
51
What is the primary purpose of a backout plan in change management?
b) To revert changes if problems occur
52
Which of the following is NOT typically included in an impact analysis?
c) Marketing strategy
53
What does SOP stand for in the context of change management?
b) Standard Operating Procedure
54
Which of the following is a key benefit of version control in change management?
c) Maintains a history of modifications
55
In change management, what does the term "stakeholder" refer to?
c) Individuals or groups affected by the change
56
What is the primary purpose of a maintenance window?
b) To schedule changes during off-peak hours
57
Which of the following is NOT typically part of the change approval process?
c) Marketing campaign planning
58
What is the main goal of impact analysis in change management?
b) To assess potential consequences of a change
59
Which of the following is a key consideration when dealing with legacy applications in change management?
c) Balancing security needs with system limitations
60
What is the purpose of allow lists and deny lists in the context of change management?
b) To control access to systems or resources
61
Which of the following is NOT a typical step in the change approval process?
c) Implementation of the change
62
What is the primary purpose of assigning ownership in change management?
b) To ensure accountability throughout the change process
63
Which of the following best describes the relationship between change management and risk management?
c) Change management helps identify and mitigate risks associated with changes
64
What is the main purpose of updating diagrams as part of change management documentation?
b) To maintain accurate visual representations of the IT environment
65
Which of the following is NOT a typical technical implication of change management?
c) Increased system performance
66
What is the primary purpose of a backout plan in change management?
To revert changes and restore systems to their previous state if unexpected issues occur
67
Which of the following is NOT typically a stakeholder in the change management process? a) IT staff b) End-users c) Competitors d) Compliance officers
c) Competitors
68
How does version control contribute to effective change management?
Answer: Tracks changes over time, enables rollbacks, and facilitates auditing
69
What is the main benefit of conducting an impact analysis before implementing a change?
Answer: Identifies potential effects on various aspects of the organization before implementation
70
In the context of change management, what does "ownership" refer to?
Answer: Assigning responsibility for the change to a specific individual or team
71
Why is it important to update documentation after implementing changes?
Answer: Ensures accuracy, maintains compliance, and provides up-to-date guidance
72
What role does a maintenance window play in the change management process?
Answer: Scheduled period for implementing changes with minimal business disruption
73
How can allow lists and deny lists be affected by system changes?
Answer: May require updates to accommodate new systems or block potential threats
74
What is the purpose of a Standard Operating Procedure (SOP) in change management?
Answer: Provides consistent, documented processes for routine operations and changes
75
Why might legacy applications pose a challenge during the change management process?
Answer: Limited support, potential conflicts with new security measures, special accommodations needed
76
What is the primary goal of the approval process in change management?
Answer: To review and authorize proposed changes, ensuring they align with organizational needs and policies
77
How can proper change management help with compliance and auditing efforts?
Answer: Provides documented processes, change history, and accountability
78
What potential issues can arise from neglecting to consider dependencies when implementing changes?
Answer: Unintended consequences, system failures, or security vulnerabilities
79
Why is it important to involve the security team in the change management process?
Answer: Ensures changes align with security policies and don't introduce vulnerabilities
80
What role do test results play in the change management process?
Answer: Validate effectiveness, identify potential issues, and inform decision-making
81
What is the significance of documenting changes in network diagrams?
Answer: Maintains accurate visual representations of systems and their relationships
82
How can change management processes help mitigate risks associated with technical changes?
Answer: Provides structured approach to assess, implement, and monitor changes
83
How does change management relate to incident response procedures?
Answer: Helps identify recent changes that may have contributed to an incident
84
What factors should be considered when scheduling a maintenance window?
Answer: Business impact, stakeholder availability, adequate time for implementation and testing
85
How can effective change management contribute to an organization's overall security posture?
Answer: Ensures controlled implementation of changes, risk assessment, and maintenance of security controls
86
What is the primary difference between symmetric and asymmetric encryption?
c) Number of keys used
87
Which encryption level protects all data on a storage device?
b) Full-disk encryption
88
What is the purpose of a Hardware Security Module (HSM)?
b) To manage and safeguard cryptographic keys
89
Which of the following is NOT a function of a Certificate Authority (CA)?
c) Encrypting network traffic
90
What is the main purpose of key stretching?
b) To make weak passwords more resistant to brute-force attacks
91
Which cryptographic concept ensures the integrity and authenticity of a message?
c) Digital signature
92
What is steganography used for in the context of cryptography?
b) Hiding the existence of information
93
Which protocol is used to check the revocation status of digital certificates in real-time?
b) OCSP
94
Which type of certificate can secure multiple subdomains of a single domain?
c) Wildcard certificate
95
What is the primary purpose of a Trusted Platform Module (TPM)?
b) To store and protect cryptographic keys
96
What is the main advantage of asymmetric encryption over symmetric encryption?
d) Ability to securely exchange keys over an insecure channel
97
Which of the following is NOT a common use of blockchain technology?
c) Full-disk encryption
98
What is the purpose of salting in the context of password hashing?
b) To make rainbow table attacks more difficult
99
Which encryption level is most appropriate for protecting specific records within a database?
c) Record encryption
100
What is the primary purpose of a Certificate Signing Request (CSR)?
c) To initiate the process of obtaining a digital certificate