Chapter 1: Security Controls and Concepts Flashcards

(34 cards)

1
Q

Question: Which type of security control is implemented through technology, often hardware or software-based?
A) Managerial Security Control
B) Operational Security Control
C) Technical Security Control
D) Physical Security Control

A

Answer: C) Technical Security Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question: Security policies and procedures, risk assessments, and security training programs are examples of which type of security control?
A) Technical Security Control
B) Managerial Security Control
C) Operational Security Control
D) Physical Security Control

A

Answer: B) Managerial Security Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question: True or False: Operational security controls directly address user behavior and day-to-day operations.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question: Which type of security control is designed to protect the physical environment of information assets?
A) Technical Security Control
B) Managerial Security Control
C) Operational Security Control
D) Physical Security Control

A

Answer: D) Physical Security Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question: Which of the following security controls aims to prevent an incident or breach from occurring in the first place?
A) Deterrent Security Control
B) Detective Security Control
C) Preventive Security Control
D) Corrective Security Control

A

Answer: C) Preventive Security Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question: Warning banners and visible surveillance cameras are examples of which type of security control?
A) Preventive Security Control
B) Deterrent Security Control
C) Detective Security Control
D) Corrective Security Control

A

Answer: B) Deterrent Security Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question: What is the primary function of detective security controls?

A

Answer: To identify and alert on anomalies or security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question: Which type of security control aims to limit the extent of damage and correct the situation once a security incident has been detected?
A) Preventive Security Control
B) Deterrent Security Control
C) Detective Security Control
D) Corrective Security Control

A

Answer: D) Corrective Security Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question: When primary security controls are ineffective or unfeasible, which type of control provides alternative measures to achieve similar security objectives?
A) Directive Security Control
B) Compensating Security Control
C) Corrective Security Control
D) Preventive Security Control

A

Answer: B) Compensating Security Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question: What is the primary function of directive security controls?

A

Answer: To provide a roadmap or guidance for security best practices within an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question: What are the three core principles of the CIA triad in information security?
A) Control, Identification, Assurance
B) Confidentiality, Integrity, Availability
C) Compliance, Implementation, Audit
D) Centralisation, Isolation, Access

A

Answer: B) Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question: True or False: Non-repudiation guarantees that a sender of information can later deny having sent it.

A

Answer: False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question: What does “Authentication” refer to in the AAA framework?

A

Answer: Verifying the identity of users, systems, or entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question: In the AAA framework, what defines permissions and determines what authenticated users or systems are allowed to do?
A) Authentication
B) Authorisation
C) Accounting
D) Auditing

A

Answer: B) Authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question: Which component of the AAA framework tracks user activities to ensure they are operating within their designated permissions?
A) Authentication
B) Authorisation
C) Accounting
D) Access Control

A

Answer: C) Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question: What is the purpose of a Gap Analysis in security?

A

Answer: To identify differences between current security practices and desired outcomes or standards.

17
Q

Question: Which Zero Trust concept dynamically adjusts user/system identity verification based on context?
A) Threat Scope Reduction
B) Policy-driven Access Control
C) Adaptive Identity
D) Implicit Trust Zones

A

Answer: C) Adaptive Identity

18
Q

Question: What is a “Honeypot” in deception and disruption technology?

A

Answer: A decoy system or data set up to lure attackers.

19
Q

Question: True or False: A Honeynet is a single decoy system designed to attract attackers.

A

Answer: False (A Honeynet is a network of honeypots.)

20
Q

Question: What is a “Honeytoken”?

A

Answer: A piece of data used to alert when accessed, which has no real-world use other than being a trap.

21
Q

Question: Which aspect of business processes in change management ensures that only vetted and necessary changes get implemented, reducing the risk of introducing vulnerabilities?
A) Ownership
B) Stakeholders
C) Approval Process
D) Backout Plan

A

Answer: C) Approval Process

22
Q

Question: True or False: In change management, a backout plan is important only for major system overhauls and not for minor updates.

A

Answer: False (A backout plan is essential to revert changes if unforeseen vulnerabilities are introduced, regardless of change size.)

23
Q

Question: Which technical implication of change management might require updating lists that determine which activities or entities are permitted or prohibited, directly affecting security postures?
A) Downtime
B) Legacy Applications
C) Allow lists/Deny lists
D) Service Restart

A

Answer: C) Allow lists/Deny lists

24
Q

Question: What is the security concern related to “Legacy Applications” during change management?

A

Answer: Older software might not be compatible with new changes and can have unresolved vulnerabilities.

25
Question: Why is "Version Control" important in change management from a security perspective?
Answer: It allows teams to track which modifications were made and when, which is critical for security forensics and understanding potential vulnerabilities.
26
Question: In Public Key Infrastructure (PKI), what ensures secure communication where only the private key holder can decrypt what the public key encrypts? A) Key Escrow B) Public/Private Key C) Key Exchange D) Certificate Authority
Answer: B) Public/Private Key
27
Question: What is the purpose of "Key Escrow" in cryptography?
Answer: It allows a trusted third party to hold cryptographic keys, ensuring they're available if the original holders lose access or in legal scenarios.
28
Question: Which encryption level protects data as it's transmitted across networks, such as with HTTPS? A) Full-disk encryption B) Partition encryption C) File encryption D) Transport/Communication encryption
Answer: D) Transport/Communication encryption
29
Question: True or False: Asymmetric encryption uses the same key for both encryption and decryption.
Answer: False (Symmetric encryption uses the same key; asymmetric uses public/private key pairs.)
30
Question: Which cryptographic tool is a dedicated microcontroller that stores keys, passwords, and digital certificates securely? A) HSM B) Key Management System C) Secure Enclave D) TPM
Answer: D) TPM
31
Question: What is "Steganography"?
Answer: Hiding data within other data (e.g., embedding a secret message in an image).
32
Question: What is the purpose of "Salting" in hashing?
Answer: Random data added before hashing to ensure the same input produces different outputs, making it harder to crack.
33
Question: What do "Digital Signatures" confirm?
Answer: The authenticity of a digital document or message.
34
Question: Which certificate type is used for securing a domain and its subdomains? A) Self-signed certificate B) Third-party certificate C) Wildcard certificate D) Root of Trust certificate
Answer: C) Wildcard certificate