CH18 - Course Quiz Flashcards

1
Q

The ___________ defines who may access the Network, how they may access the Network, and what they can access?

Network Access Policy
Service-Level Agreement (SLA)
Multi-Source Agreement (MSA)
Statement of Work (SoW)

A

Network Access Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The main method by which a first responder secures an area is by having their presence at the scene?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which secondary location is a complete duplicate of the Primary Site?

local
physical
hot
cold

A

hot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

International export controls restrict the export of some kinds of hardware and software along with more obvious things like weapons to specific countries?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

With ____________ deployment, employees are presented with a Whitelist of preapproved applications that they may install on a corporate device?

Corporate-Owned, Personally Enabled (COPE)
Corporate-Owned, Business Only (COBO)
Personally-Owned, Personally Enabled (POPE)
Chose Your Own Device (CYOD)

A

Corporate-Owned, Personally Enabled (COPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which tool is an Open-Source tool for Penetration Testing pretty much every aspect of Wireless Networks?

Kali Linux
Aircrack-ng
Armitage
OpenVAS

A

Aircrack-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The __________________ factor indicates the length of time a device is expected to last in operation?

mean time between failures (MTBF)
mean time to repair (MTTR)
mean time to vulnerability (MTTV)
mean time to failure (MTTF)

A

mean time to failure (MTTF)

Explanation:
Mean Time to Failure (MTTF) - Length of time a device is expected to last in operation.

Mean Time between Failures (MTBF) - Applies to hardware components, manufacturer’s best guess regarding how much time will past between major failures of the component.

Mean Time to Repair (MTTR) - The amount of time it takes to fix a system after it fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network access policies may be embedded into policies such as VPN Policy, Password Policy, Encryption Policy, and many others?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two tools dominate the Vulnerability Testing arena?

Aircrack-ng and Metasploit
Nessus and OpenVAS
Kali Linux and Microsoft Baseline Security Analyzer (MBSA)
Nmap and Microsoft Baseline Security Analyzer (MBSA)

A

Nessus and OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of ________________?

business continuity
disaster recovery
change management
incident response

A

business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business continuity handles everything related to recovery infrastructure from a disaster except incidents that require moving part of the organization’s business offsite?

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If an incident can no longer be contained, causing significant damage or danger to the immediate infrastructure, it is covered under __________?

change management
disaster recovery
business continuity
incident response

A

disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anything that negatively affects an organization, that hurts or comprimises its people, systems, or ability to function as an entity, is a ___________________?

vulnerability
asset
incident
contingency

A

incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It doesn’t always happen this way, but its best for everyone involved if there’s a smooth ______________ procedure to ensure new members of an organization get everything they need to settle in efficently and a careful ___________________ procedure to reverse these when they leave the organization?

offboarding, onboarding
continuity, contingency
risk, recovery
onboarding, offboarding

A

onboarding, offboarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which term is used for all the customized settings for a Router, Switch, Load Balancer, Intrusion Detection/Prevent System (IDS/IPS), Firewall, or other Network Device?

computer forensics
configuration data
contingency plans
sucession plans

A

configuration data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Every asset has some weakness that makes it potentially susceptible to a threat?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which is a legal document that prohibits the signer from disclosing any company secrets learned as part of his or her job?

Multi-Source Agreement (MSA)
Nondisclosure Agreement (NDA)
Service-Level Agreement (SLA)
Statement of Work (SOW)

A

Nondisclosure Agreement (NDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A proper assessment of a backup plan records how much data might be lost and how long it would take to restore?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which document defines the duties parties commit to perform for each other and a time frame for the commitment?

Memorandum of Understanding (MOU)
Service-Level Agreement (SLA)
Multi-Source Agreement (MSA)
Statement of Commitment (SOC)

A

Memorandum of Understanding (MOU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

With a _________________ site, everything of note is stored in the cloud, including servers, client machine images, applications, and data?

physical
cloud
hot
cold

A

cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Most restored systems have the same amount of lost data based on when the last backup took place?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

By following good patch management procedures, you can roll back or downgrade by removing a patch?

True
False

A

True

23
Q

Disaster recovery starts with a plan and includes ____________?

change management
real-time patch management
data backups
full replication of all data

A

data backups

24
Q

Firmware updates enable programming updates that make network devices more efficient, more secure, and more robust?

True
False

A

True

25
Q

Which tool is a Port Scanner?

OpenVAS
Nmap
Nessus
Aircrack-ng

A

Nmap

26
Q

End users are probably the primary source of security problems for any organization?

True
False

A

True

27
Q

An organization offering ___________________ options provides employees Free chocie within a catalog of Mobile Devices?

Choose Your Own Device (CYOD)
Personally-Owned, Personally Enabled (POPE)
Corporate-Owned, Business Only (COBO)
Corporate-Owned, Personally Enabled (COPE)

A

Choose Your Own Device (CYOD)

28
Q

Business continuity planning deals with the concept of backing up sites?

True
False

A

True

29
Q

Which document is arguable the most famous of all security policies as this is the one document that pretty much everyone who works anywhere is required to read, and in many cases sign, before they can start work?

forensics report
acceptable use policy
exit plan
material safeties data sheet (MSDS)

A

Acceptable Use Policy (AUP)

30
Q

Which secondary location will generally take more than a few days to bring online?

local
warm
cold
hot

A

cold

31
Q

____________________, from Tenable Network Security, is arguably the First truly comprehensive Vulnerability Testing tool that has been around for almost two decades?

A

Nessus

32
Q

A _________________________ is a document between a customer and a service provider that defines the scope, quality, and terms of the service to be provided?

A

Service-Level Agreement (SLA)

33
Q

The _________________ policy defines what is and what is not acceptable to do on an organization’s computers?

A

Acceptable Use

34
Q

Instead of adding access to the customer database for every sales representative’s account, a ________________ approach would establish a sales-representative role, associate each representative’s account with the role, and assign all of the necessary privileges to the role?

A

role based access

35
Q

A _________________ is in essence a legal contract between a vendor and a customer?

A

Statement of Work (SoW)

36
Q

The _______________ factor indicates the length of time a device is expected to last in operation?

A

Mean Time to Failure (MTTF)

Explanation:
Mean Time to Failure (MTTF) - Length of time a device is expected to last in operation.

Mean Time between Failures (MTBF) - Applies to hardware components, manufacturer’s best guess regarding how much time will past between major failures of the component.

Mean Time to Repair (MTTR) - The amount of time it takes to fix a system after it fails.

37
Q

__________________ simply means identifying people who can take over certain positions (usually on a temporary basis) in case the people holding those critical positions are incapacitated or lost in an incident?

A

Succession Planning

38
Q

A ______________ sets an upper limit to how much lost data the organization can tolerate if it must restore from a backup, effectively dictating how frequently backups must be taken?

A

Recovery Point Objective (RPO)

39
Q

Incidents that take place within the organization that can be stopped, contained, and remediated without outside resources are handled by ______________ planning?

A

incident response

40
Q

The process of creating change in your infrastructure in an organized, controlled, safe way is called _______________?

A

Change Management

41
Q

A ________________________ is an event that disables or destroyes substantial amounts of infrastructure?

A

disaster

42
Q

Briefly describe the purpose of a Memorandum of Understanding (MOU)?

A

A document agreement that defines the duties between 2 parties conducting occasional business where a legal contract wouldn’t be appropriate.

43
Q

Describe the two aggressive and powerful comprehensive Vulnerability testers that dominate the field, Nessus and OpenVAS?

A

Nessus - the first truly comprehensive Vulnerability testing tool from Tenable Network Security and is Free to Home Users and requries a Subscription for commercial use.
OpenVAS is an Open Source fork of Nessus and is considered to be superior by many in the security field.

44
Q

Briefly identify three items that should be included when documenting change?

A

Network (Configurations) - Such as Server, Router configurations and so on.
(Additions) to the Network - Such as additional Servers, Switches, and so on.
Physical (Locations) Changes - Such as moved workstations, relocated Switches, and so on.

45
Q

How do organizations use Business Continuity Planning (BCP)?

A

To detail risks to critical systems, cost to replace or repair such systems, and how to make those replacements or repairs happen in a timely fashion.

46
Q

Describe Aircrack-ng?

A

An Open Source tool for Pentesting pretty much every aspect of Wireless Networks.

47
Q

Distinguish between a Warm Site and a Hot Site included in a Business Continuity Plan?

A

Warm Site starts with the same components as a Cold Site, but adds Computers loaded with software and functioning servers, a complete hardware infrastructure. Warm Site lacks current data and may not have functioning Internet/Network Links. Bringing this site up to speed may start with activating your Network Links and loading recent backups, may take a day or two to bring online.

Hot Site has everything a Warm Site does, but also includes very recent backups. It might need just a little data restored but in many cases a Hot Site is a complete duplicate of the primary site. A Proper Hot Site should only take a few hours to bring online.

48
Q

What is Kali Linux?

A

Specialized Linux Distro with the best, most recent and powerful Tools for Security Professionals, Pentesters and Ethical Hackers.

49
Q

Identify and elaborate on the important steps that take place in almost every scenario of a Network Patch environment?

A

Research - It’s important to research the Patch to verify that it is going to do what you need it to do and that people who have already installed the patch aren’t having problems.

Test - Always a good idea to test patches on a test system when possible.

Configuration Backups - Backing up configurations is critical, especially when backing up firmware in the event something bad happens, this will allow you to recover quicker.

50
Q

Briefly describe the premise on which IT Security is based?

A

That somewhere, at some time, something will attack some part of your Network. The attack may take as many forms as your paranoia allows.

51
Q

Briefly list the five items that should be included in a good change request?

A
Type of Change
Configuration Procedures
Rollback Process
Potential Impact
Notification
52
Q

Describe Metasploit?

A

Unique, open source tool that enables the Pentester to use a massive library of attacks as well as tweak those attacks for unique pentetrations. It’s the goto tool for Pentesting.

53
Q

Briefly identify the two levels at which changes tend to originate?

A

Strategic-Level Changes - Initiated by management and major in scope.

Infrastructure-Level Changes - Typically initiated by a department by making a request to the change management team.