1.1 Explain the importance of system and network architecture concepts in security operations Flashcards

(10 cards)

1
Q

A project manager needs to verify users and authorize access to systems and applications. Which security control should the project manager implement?

A. MFA
B. Password manager
C. ACL
D. Firewall

A

A. MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which logging concepts are crucial in security operations?

A
  • Centralized logging
  • Log rotation
  • Event correlation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Syslog logging level 6 is not considered crucial to security operations. What is it also known as?

A

informational level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is the most important reason to implement system hardening measures in a networked environment?

A

To reduce the risk of data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following logging levels is the highest and most verbose level of logging in Windows Event Viewer?
A. Information
B. Debug
C. Warning
D. Error

A

B. Debug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main benefit of using software-defined networking (SDN) in a virtualized environment?

A

Increased ease of management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a significant difference between containerization and virtualization in the context of security operations?

A

Virtualization enables multiple operating systems to run on a single physical machine, while containerization does not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Passwordless and SSO are two authentication technologies frequently used in incident response and management. However, it is prone to ______

A

Phishing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main benefit of using software-defined networking (SDN) in a virtualized environment?

A

Increased ease of management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following concepts related to security operations involves the use of digital certificates to establish trust between entities and secure communication channels?

A

Public Key Infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly