Domain 1, Quiz 1 Flashcards

1
Q

Which type of security control aims to limit the damage of an attack after it has occurred?

a. Detective
b. Preventive
c. Deterrent
d. Corrective

A

Corrective

Corrective controls aim to limit the damage after an attack has occurred and restore system functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the “A” stand for in the CIA triad?

a. Availability
b. Authentication
c. Accounting
d. Authorization

A

Availability

Availability is the correct component of the CIA triad, focusing on ensuring that data is accessible when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is considered a managerial control?

a. Video Surveillance
b. Firewall
c. Security Policy
d. Encryption

A

Security Policy

A security policy is a managerial control as it focuses on governance and policy settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is non-repudiation primarily concerned with?

a. Ensuring data is not tampered with
b. Ensuring system uptime
c. Proving the origin of a message
d. Ensuring only authorized personnel access data

A

Proving the origin of a message

Non-repudiation ensures that a message sender cannot deny the authenticity of the message sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of security control is a bio-metric scanner?

a. Managerial
b. Technical
c. Operational
d. Physical

A

Technical

A bio-metric scanner is a technical control involving technology to authenticate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the context of physical security, what is the primary purpose of bollards?

a. To detect unauthorized access
b. To prevent vehicle intrusion
c. To surveil areas
d. To encrypt data

A

To prevent vehicle intrusion

Bollards act as physical barriers to prevent vehicles from entering restricted areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main function of a compensating control?

a. To enforce mandatory security protocols
b. To actively deter potential attackers
c. To detect and log security incidents
d. To provide alternative protection when primary controls fail

A

To provide alternative protection when primary controls fail

Compensating controls offer alternative protection mechanisms when primary controls are ineffective, not feasible, or unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does “AAA” stand for in the context of security?

a. Adaptive, Authorization, Authentication
b. Availability, Authorization, Accounting
c. Authentication, Authorization, Accounting
d. Accounting, Authorization, Adaptive

A

Authentication, Authorization, Accounting

AAA stands for Authentication, Authorization, and Accounting in the context of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary purpose of a honeypot?

a. To encrypt data
b. To deceive attackers
c. To authorize users
d. To prevent attacks

A

To deceive attackers

Honeypots are decoy systems designed to deceive attackers and gather information about their tactics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary purpose of physical controls?

a. To create barriers and surveillance
b. To correct the actions of people and systems
c. To detect anomalies or intrusions
d. To mandate specific actions or processes

A

To create barriers and surveillance

Physical controls create barriers and surveillance to protect assets and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of control is a security awareness training program?

a. Physical
b. Corrective
c. Technical
d. Managerial

A

Managerial

Managerial controls involve governance and policy settings; a security awareness training program is an example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is primarily concerned with preventing unauthorized disclosure of information?

a. Confidentiality
b. Availability
c. Integrity
d. Authorization

A

Confidentiality

Confidentiality is concerned with preventing unauthorized disclosure of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an example of a preventive control?

a. Security Policy
b. Firewall
c. Incident Response Plan
d. Access Control Procedures

A

Firewall

A firewall is a preventive control that prevents unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of control is a Data Loss Prevention (DLP) system?

a. Directive
b. Compensating
c. Operational
d. Technical

A

Technical

DLP systems are hardware or software-based controls designed to enforce security measures, making them technical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary objective of the Zero Trust model?

a. To trust all devices outside the network perimeter
b. To always trust, never verify
c. To never trust, always verify
d. To trust all devices inside the network perimeter

A

To never trust, always verify

The primary objective of the Zero Trust model is to “never trust, always verify” regardless of whether the traffic originates from inside or outside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly