Practice Exam 2 Flashcards
(90 cards)
Which of the following statements about highly structured threats is not true?
-they are sometimes supported by nation states and target other countries
-they usually have significant financial backing
-they only target intelligence information and military data
-some countries have regulations to prevent government workers from attacking companies for reasons of economic warfare
They only target intelligence information and military data
Highly structured threats may target companies, conduct corporate espionage, and steal intellectual property. They are not solely focused on government and military targets.
Which of the following statements is false regarding BYOD?
-employees are willing to limit the use of their personal devices as determined by corporate policies
-users prefer a single device over multiple devices
-the learning curve is shorter on devices they own or prefer
-it works well for temporary workers
Employees are willing to limit the use of their personal devices as determined by corporate policies
Employees might not be eager to limit the use of their personal devices based on corporate policy
Your organization utilizes two different people to perform tasks that are both necessary for the entry into your building. Person 1 checks IDs, enters data in a log, and can issue a visitor badge. Visitor 2 controls the door access, so a failure by either person does not expose your organization. Which of the following is this an example of?
Two-person integrity/control
Having two people required to perform a task provides a means of checks and balances
Which of the following mitigation techniques are the most effective in preventing and minimizing the impact of ransomware data encryption incidents?
Select two.
-Do periodic updates of user training and awareness materials
-Identify network hosts that are not compliant with security baselines
-Do a periodic review of layer 4 network perimeter firewall rules
-Store frequent backups offline
-Do periodic updates of user training and awareness materials
-Store frequent backups offline
Storing backups offline prevents ransomware from encrypting backed-up data. User awareness of scams and how malware works can prevent ransomware attacks from occurring.
What is the term used to describe the characteristic of a software system to process higher workloads on its current resources or on additional resources without interruption?
Scalability
Continuous monitoring is the term used to describe which of the following?
-the practice where every change passing all stages of the production pipeline is released to production
-the extension of testing to support the continuous process of software development in DevOps
-the DevOps manner of continually updating and improving the production code base
-technologies/processes used to enable rapid detection of compliance issues and security risks
Technologies/processes used to enable rapid detection of compliance issues and security risks
Continuous monitoring is one of the most important tools available for risk management
A recent security audit had a finding of your VPN allowing split tunneling. The auditors preferred to require full tunneling on the VPN. What security risk are the auditors attempting to mitigate?
Attacks that come from the public network could be routed through the endpoint and potentially bypass network perimeter controls of the organization.
A split-tunnel VPN can potentially allow an attack to come from the untrusted Internet to attack the endpoint and then potentially allow that compromise into the organization from an unexpected network location.
All of the following are supporting elements of authorization except:
-rights, permissions, and privileges
-principle of least privilege
-separation of duties
-credential validation
Which of the following is guidance for configuring and operating computer systems at a secure level that is documented and understood?
All of the following are characteristics of the RADIUS authentication protocol except:
-RADIUS uses TCP port 1812
-RADIUS uses UDP port 1812
-RADIUS accepts earlier forms of authentication protocols, such as PAP
-RADIUS encrypts user passwords during the authentication process
Data that if disclosed to an unauthorized party would potentially cause harm or disruption to the organization should be labeled as which of the following?
Which of the following terms indicates the amount of time it takes for a hardware component to recover from failure?
What is a script kiddie?
Your office does not deal in classified or even sensitive data. You are concerned, however, with the loss of equipment, as you have had a few external drive and tablets stolen in the last 12 months. Which of the following would be most appropriate for your environment, keeping in mind that you want a low-cost solution?
What network attack method involves the attacker sending messages to corrupt the ARP table and cause packets to be misrouted?
Which tool would you use to discover hosts and services on a network?
You are browsing a social media platform and notice question-game posts asking which car you drove to pass a driver’s test. Which term best describes these types of posts?
Which tool would you use to manipulate network interfaces on a workstation?
After recent phishing attacks through email, you decide to implement a solution internally where employees can be assured of the authenticity of messages from other employees. Which email feature should you implement?
Which of the following is the best description of impact?
In discussions of threat hunting, what does the acronym IOA mean?
Which of the following protocols would you use to encrypt VPN traffic?
Which of the following is not an element of mobile device management?
What is the primary difference between authorized and semi-authorized hackers?