Business Continuity & Security Flashcards

1
Q

You need to ensure that sensitive data on stolen disks from a data centre cannot be accessed by unauthorized parties. What should you do?

  • Enable disk wiping
  • Enable disk integrity
  • Enable disk encryption
  • Enable disk backups
A

Enable disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IT security role is roughly equivalent to the data owner role?

  • CISO
  • Privacy officer
  • Security engineer
  • CEO
A

Privacy officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Company A is acquiring Company B. What is the most important task that must be undertaken by Company A’s IT department?

  • Determine existing Company B contractual obligations
  • Receive clear communication of Company B’s security policies
  • Determine the version of firewall firmware used in Company B
  • Receive the most recent quarterly earnings report
A

Receive clear communication of Company B’s security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Microsoft Azure configuration determines how admins receive alert notifications?

  • Alert configuration
  • Action group
  • Monitor configuration
  • Virtual machine
A

Action group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do IT security baselines facilitate?

  • The merger of two companies
  • Detection of security anomalies
  • The reduction of security-related costs
  • The performance improvement of slow applications
A

Detection of security anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are deploying a new antimalware program to user smartphones. Which type of security control is this?

  • Detective
  • Preventative
  • Administrative
  • Compensating
A

Preventative
Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a common primary use of a Windows Data Collector Set (DCS)?

  • Apply patches
  • Quarantine malware infections
  • Detect security anomalies
  • Establish a host performance baseline
A

Establish a host performance baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A business manager determines that smart card authentication is required before allowing VPN access to a sensitive network where patient data is retained. The occupant of which role makes this decision?

  • Cloud technician
  • Security engineer
  • Data custodian
  • Data owner
A

Data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to ensure that backups of mission-critical data are taken every hour to ensure no more than 1 hours’ worth of potential data loss. To which disaster recovery item does this apply?

  • RPO
  • BIA
  • MTTR
  • RTO
A

RPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do IT security baselines facilitate?

  • The merger of two companies
  • Detection of security anomalies
  • The reduction of security-related costs
  • The performance improvement of slow applications
A

Detection of security anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You need to ensure that a mission-critical server supporting customer orders is down for no longer than 20 minutes. To which disaster recovery item does this apply?

  • MTTR
  • BIA
  • RTO
  • RPO
A

RTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Company A is acquiring Company B. What is the most important task that must be undertaken by Company A’s IT department?

  • Determine existing Company B contractual obligations
  • Receive clear communication of Company B’s security policies
  • Determine the version of firewall firmware used in Company B
  • Receive the most recent quarterly earnings report
A

Receive clear communication of Company B’s securit policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly