Lesson 7 Review Questions Flashcards
(21 cards)
In a recent company meeting, the network administrator discussed the upcoming growth projections for the next year. The IT team ensures that the organization’s infrastructure can sustain the anticipated growth in user demand and traffic volume. Which risk poses the MOST significant threat if the IT team fails to address the infrastructure needs for the forecasted growth adequately?
A. An increase in phishing attack susceptibility
B. Reduced efficiency of network address translation (NAT)
C. Lesser demand for cloud storage services
D. Potential for service degradation or unavailability
D. Potential for service degradation or unavailability
Without properly addressed capacity planning, the primary risk involves not being able to handle the increased demand, leading to service degradation or even complete unavailability.
In the context of enhancing resilience and recovery in security architecture following a cybersecurity incident, which of the following strategies would be the MOST effective for the chief information security officer (CISO) to implement to ensure rapid restoration of systems and minimal downtime during future incidents?
A. Establishing a well-documented and regularly tested incident response plan (IRP)
B. Increasing the frequency of software updates
C. Conducting more frequent employee awareness seminars
D. Deploying additional firewalls throughout the network
A. Establishing a well-documented and regularly tested incident response plan (IRP)
An incident response plan (IRP) details an organization’s steps during a cybersecurity incident. With a well-documented and tested plan, the organization responds quickly, which minimizes downtime and guarantees prompt recovery.
A security consultant is evaluating the resilience of a company’s server room during power interruptions, focusing on the integration of Power Distribution Units (PDUs) and backup power solutions. Given the critical need for continuous operation, how do backup power generators complement the use of PDUs and UPS systems to ensure server room operations are maintained without interruption?
A. It ensures power load balancing occurs across multiple servers.
B. It supplies power to PDUs, preventing lapses during an outage.
C. It provides prolonged power to PDUs to prevent exhausting the UPS power.
D. It filters and stabilizes power before the PDU distributes it.
C. It provides prolonged power to PDUs to prevent exhausting the UPS power.
A backup power generator supplies prolonged power to PDUs to prevent a UPS systems from depleting their immediate resources, ensuring continuous operation of servers and essential devices during extended power outages.
A multinational corporation wants to ensure the security of its digital assets. The IT department focuses on refining its hardware and software asset management practices as part of its initiative. They analyze the potential security implications associated with properly managing these assets to guide their actions. Which actions contribute directly to improved security through effective hardware and software asset management in securing digital assets? (Select the two best options.)
A. Regularly updating software to the latest versions
B. Ensuring every workstation has a dual-monitor setup
C. Tracking and documenting all hardware assets in a centralized inventory system
D. Installing multiple antivirus tools on each system
A. Regularly updating software to the latest versions
C. Tracking and documenting all hardware assets in a centralized inventory system
By patching known vulnerabilities, the IT department directly minimizes the attack surface and deters attackers from exploiting weak points in the system. This proactive measure acts as a first line of defense against potential threats.
A data center manager is evaluating the resilience and recovery capabilities of the company’s server room. The manager wants to ensure that in the event of power fluctuations or outages, the company’s servers remain operational and maintain data integrity. The manager focuses on the role of power distribution units (PDUs) and Uninterruptible Power Supplies (UPSs) in this context. In enhancing the resilience and recovery capabilities of the server room concerning power interruptions, which primary function does the UPS provide to the servers that directly support this goal?
A. It distributes the power to multiple servers simultaneously.
B. It filters the power, removing noise and surges.
C. It provides temporary power to prevent data loss.
D. It monitors the power usage, alerting for overconsumption.
C. It provides temporary power to prevent data loss.
A UPS provides temporary power during an outage, ensuring that servers can undergo a graceful shutdown without data loss or continue running until backup generators take over. This function is critical for resilience and recovery as it prevents sudden power loss, leading to data corruption.
A healthcare organization stores sensitive patient information. The data protection officer (DPO) wants to implement strategies to manage these data assets effectively, ensuring they remain secure from unauthorized access. Which strategies should the DPO employ to understand and enhance the security posture of the data assets and ensure the organization adheres to best practices in data asset management? (Select the two best options.)
A. Conduct regular data audits
B. Implement data classification based on sensitivity
C. Increase the volume of data storage
D. Purchase new servers for faster data retrieval
A. Conduct regular data audits
B. Implement data classification based on sensitivity
Organizations use regular audits to identify the location of their data storage, determine who has access, and assess if they adequately protect it. This proactive approach allows for early detection of vulnerabilities.
A renowned bank in the city center is reassessing its physical security controls after a recent break-in attempt. The bank’s security manager advocates overhauling the current alarm systems and introducing advanced sensors. The board members, unfamiliar with these concepts, request insights on effectively combining the two for heightened security. Considering the need to upgrade the bank’s physical security, which strategies will MOST effectively enhance the synergy between alarm systems and sensors? (Select the two best options.)
A. Integrate motion sensors with the alarm system to trigger alerts for unauthorized movements
B. Set up alarms to sound only during official bank hours
C. Use glass break sensors connected to the alarm for instant alerts on forced entry
D. Install temperature sensors and link them to the main alarm to detect computer system overheating
A. Integrate motion sensors with the alarm system to trigger alerts for unauthorized movements
C. Use glass break sensors connected to the alarm for instant alerts on forced entry
A leading financial institution is enhancing its security infrastructure by revising user access controls. The IT department, in collaboration with the security team, deliberates on the essential principles to guide their implementation efforts. A primary focus is on ensuring proper authentication and authorization mechanisms are in place. Which of the following measures should the IT department integrate to ensure users are both authenticated and authorized before gaining access to sensitive resources? (Select the two best options.)
A. Implementing multifactor authentication (MFA)
B. Assigning role-based access controls (RBAC)
C. Using a single shared password for all users
D. Relying on facial recognition for guest users
A. Implementing multifactor authentication (MFA)
B. Assigning role-based access controls (RBAC)
A tech company recently moved to a new facility and seeks to bolster its physical security posture. The security team proposes integrating security guards and surveillance cameras as part of the security measures. The chief security officer (CSO) wants to ensure these implementations effectively deter, detect, and report potential security incidents. Given the scenario, which actions will maximize the effectiveness of security guards and cameras in enhancing the organization’s physical security? (Select the two best options.)
A. Position cameras to monitor critical access points and sensitive areas
B. Allow security guards to monitor camera feeds only during break times
C. Implement security guard rotations and unannounced spot checks
D. Place cameras in highly visible areas, but do not connect them to any recording device
A. Position cameras to monitor critical access points and sensitive areas
C. Implement security guard rotations and unannounced spot checks
In the event of a significant disruption, such as a natural disaster or a major cyberattack, the IT director has highlighted the need for a robust Business Continuity Planning (BCP). The director stresses that the key priority is to guarantee that essential operations can continue with minimal downtime. What is the primary goal of BCP in safeguarding the organization’s vital functions in accordance with the IT director’s emphasis?
A. Critical business processes remain operational during and after disruptions
B. Establish secure connections between all of the office locations
C. Must include detecting and responding to any unauthorized system access
D. For business continuity, encrypt sensitive company data stored in databases
A. Critical business processes remain operational during and after disruptions
An organization operates a large data center that supports critical business operations. Recently, the organization has struggled with frequent power interruptions leading to downtime and loss of data. To address this issue, the chief information security officer (CISO) decides to review the data center’s resilience and recovery strategies, particularly emphasizing backup power. To increase the resilience and recovery capabilities of the data center and ensure operations continue even during a power failure, which of the following options should the CISO consider? (Select the two best options.)
A. Implement a UPS
B. Deploy a redundant power supply unit in each server
C. Purchase additional servers
D. Enhance the firewall system
A. Implement a UPS
B. Deploy a redundant power
A major technology company plans to renovate its headquarters, emphasizing both physical and digital security. The head of the security department is looking to harden both the building’s, and the networks’, main entry points. In relation to securing a major technology company’s main entry points, which approaches will BEST harness the potential of gateways and locks to ensure optimal security? (Select the two best options.)
A. Employ network gateways that scrutinize incoming traffic for malicious activity
B. Implement biometric locks that grant access based on unique physiological characteristics
C. Use gateways to redirect all visitors to the company’s promotional website
D. Install traditional padlocks that require a standard key
A. Employ network gateways that scrutinize incoming traffic for malicious activity
B. Implement biometric locks that grant access based on unique physiological characteristics
An organization’s security team is in the process of implementing new security measures for managing its hardware, software, and data assets, increasing its overall protection. The team plans to implement network segmentation, store passwords in plaintext in a secure server, establish a policy for outdated software disposal, and perform regular asset inventory audits. Considering the initiatives the security team proposes, what relevant and secure practices directly relate to managing hardware, software, and data assets effectively and efficiently while ensuring data protection? (Select the two best options.)
A. Network segmentation
B. Storing passwords in plaintext on a secure server
C. Establishing a policy disposing of outdated software
D. Performing regular audits of asset inventory
C. Establishing a policy disposing of outdated software
D. Performing regular audits of asset inventory
A global finance company faced a massive cyberattack. The attacker successfully bypassed perimeter defenses and encrypted a significant portion of the company’s stored financial records. The company’s incident response team quickly intervened, neutralizing the threat. Now, the chief information security officer (CISO) focuses on implementing strategies to enhance resilience and ensure a rapid recovery should a similar event occur. Considering the company’s recent incident and its determination to bolster resilience and advanced data protection, which of the following actions should the CISO prioritize to MOST directly ensure the organization can efficiently recover from similar cybersecurity events in the future?
A. Implementing an advanced intrusion detection system (IDS)
B. Regularly testing and updating data backup and recovery solutions
C. Introducing more comprehensive employee cybersecurity training programs
D. Increasing the frequency of penetration testing exercises
B. Regularly testing and updating data backup and recovery solutions
The cybersecurity team at a multinational corporation is collaborating with the facilities department to design a new data center. The team seeks to integrate top-tier physical security controls into the site layout to maximize protection against potential threats. The discussions revolve around the best strategies to ensure the safety of the data center. When designing the physical security controls for the site layout of the new data center, which strategy would be MOST effective in deterring unauthorized access and providing a comprehensive security layer?
A. Establishing a security perimeter with layered access controls
B. Implementing a single, fortified main entrance
C. Placing all servers near windows for easy maintenance
D. Distributing security personnel evenly throughout the premises
A. Establishing a security perimeter with layered access controls
An IT security consultant is reviewing the advanced data protection strategies of a multinational corporation. The corporation recently experienced a significant data breach that affected one of its primary databases, leading to significant downtime and a loss of trust among its stakeholders. The consultant notes that while the company has robust preventive measures, its resilience and recovery procedures need enhancement. Based on the importance of resilience and recovery in security architecture, which of the following strategies would the consultant MOST likely recommend to prevent excessive downtime and loss of stakeholder trust?
A.Implement a redundant data storage solution with automated failover capabilities
B.Increase the frequency of employee cybersecurity training sessions
C.Deploy additional intrusion prevention systems at all network entry points
D.Purchase and install the latest antivirus software for all end-user devices
A.Implement a redundant data storage solution with automated failover capabilities
A security administrator regularly audits the organization’s asset inventory to maintain compliance and identify potential vulnerabilities. However, the administrator detected several outdated software applications during the most recent audit. The organization currently lacks a policy to dispose of outdated software, and they store passwords in plaintext on a supposedly secure server. Given the scenario, what actions should the security administrator take to improve the organization’s security posture? (Select the two best options.)
A. Implement network segmentation
B. Encrypt the stored passwords
C. Introduce a policy disposing of outdated software
D. Ignore outdated software if it is not directly connected to the network
B. Encrypt the stored passwords
C. Introduce a policy disposing of outdated software
During a cybersecurity seminar, the IT manager presented two significant components of their organization’s continuity strategy: Business continuity planning (BCP) and continuity of operations planning (COOP). The team needed clarification about the distinctive attributes of each component. Which statement BEST distinguishes business continuity planning from continuity of operations planning in the context of an organization’s overall continuity approach?
A. BCP focuses on recovery and business continuity functions; COOP maintains essential operations during disruptions.
B. BCP deals exclusively with data backups; COOP handles the physical infrastructure of the system.
C. COOP is solely concerned with natural disasters; BCP addresses both natural disasters and cyberattacks.
D. BCP ensures the company’s long-term profitability; COOP only addresses the company’s short-term operational goals.
A. BCP focuses on recovery and business continuity functions; COOP maintains essential operations during disruptions.
A cybersecurity team plans to improve the resilience of their organization’s IT infrastructure. The lead architect suggests implementing continuity of operations planning (COOP) to address potential disruptions and keep critical operations running during unexpected events. What primary objective BEST describes the purpose of implementing COOP within an organization’s security architecture?
A. It ensures continuous critical operations during disruptions.
B. It prevents unauthorized access to any sensitive data.
C. It monitors the network traffic for malicious activities.
D. It provides immediate power backups during any outages.
A. It ensures continuous critical operations during disruptions.
A large technology company has recently experienced a significant system failure due to a cyberattack. The chief information security officer (CISO) is conducting a post-incident review to identify ways to improve the organization’s resilience and recovery capabilities. The CISO wants to focus on strategies that could have prevented the system downtime or minimized its duration and impact. From a resilience and recovery standpoint in security architecture and continuity of operations planning (COOP), which of the following strategies would the CISO MOST likely recommend implementing to enhance the organization’s ability to prevent or quickly recover from similar incidents in the future? (Select the two best options.)
A. Expanding the IT team with more developers
B. Investing in a stronger firewall system
C. Establishing a redundant data center
D. Implementing a detailed incident response plan
C. Establishing a redundant data center
D. Implementing a detailed incident response plan
The IT team in a large company has recently completed a comprehensive inventory of all hardware, software, and data assets. The team is also in charge of asset tracking for the company. The team leader, concerned about maintaining effective security, is trying to understand how proper asset management relates to security. Which practices would directly contribute to enhancing the company’s security posture through effective asset management and tracking? (Select the two best options.)
A. Perform regular audits of asset inventory
B. Store passwords in plain text in a secure server
C. Implement network segmentation
D. Establish a policy for the disposal of outdated software
A. Perform regular audits of asset inventory
D. Establish a policy for the disposal of outdated software