1.1 Explain the importance of system and network architecture concepts in security operations Flashcards
(10 cards)
A project manager needs to verify users and authorize access to systems and applications. Which security control should the project manager implement?
A. MFA
B. Password manager
C. ACL
D. Firewall
A. MFA
Which logging concepts are crucial in security operations?
- Centralized logging
- Log rotation
- Event correlation
Syslog logging level 6 is not considered crucial to security operations. What is it also known as?
informational level
Which of the following is the most important reason to implement system hardening measures in a networked environment?
To reduce the risk of data breaches
Which of the following logging levels is the highest and most verbose level of logging in Windows Event Viewer?
A. Information
B. Debug
C. Warning
D. Error
B. Debug
What is the main benefit of using software-defined networking (SDN) in a virtualized environment?
Increased ease of management
Which of the following is a significant difference between containerization and virtualization in the context of security operations?
Virtualization enables multiple operating systems to run on a single physical machine, while containerization does not
Passwordless and SSO are two authentication technologies frequently used in incident response and management. However, it is prone to ______
Phishing attacks
What is the main benefit of using software-defined networking (SDN) in a virtualized environment?
Increased ease of management
Which of the following concepts related to security operations involves the use of digital certificates to establish trust between entities and secure communication channels?
Public Key Infrastructure (PKI)