Quiz Flashcards
A company has guards at the gate, guards at the entrance to its main building, and an access control vestibule inside the building. Access to the office where the company’s data resides is controlled through two additional doors that use RFID (radio frequency identification) locks.
Which controls are being adopted by the company? (Select TWO.)
A. Preventive
B. Deterrent
C. Corrective
D. Physical
Chapter 1
The correct answers are option B and option D. All the controls described in the scenario are physical controls. They are set up as deterrent controls to prevent access of unauthorized personnel to the office.
One of the file servers of an organization has suffered an attack. The organization’s IT administrator is searching the log files to understand what happened. What type of control are they implementing when carrying out the investigation?
1. Operational
2. Technical
3. Detective
4. Operational
Chapter 1
The correct option is option C. Detective controls help in uncovering issues and anomalies that have already occurred. Therefore, log files being searched is a detective control
During a monthly team meeting, an IT manager tasks both the mail administrator and the network administrator with creating a standard operating procedure. What type of control describes the mail administrator and network administrator’s task?
A. Directive
B. Managerial
C. Operational
D. Technical
Chapter 1
The correct answer is option A. Directive controls provides specific instructions or guidelines.
Which control type focuses on eliminating or minimizing potential threats before they can cause harm?
1. Preventive
2. Compensating
3. Deterrent
4. Corrective
Chapter 1
The correct answer is option A. Preventive controls are designed to prevent problems or risks from occurring by eliminating or minimizing potential threats.
An organization has been sent information by Microsoft that a critical update for Windows 11 has just been released. The organization’s cybersecurity team immediately applies this latest update to all of its Windows 11 computers. What type of control have they carried out?
1. Preventive
2. Compensating
3. Deterrent
4. Corrective
Chapter 1
The correct answer is option D. Because the Windows 11 computers were vulnerable, the cybersecurity team needed to take corrective action by patching each computer to harden it and prevent attacks.
An organization suffered a ransomware attack, where one of the technical controls was compromised. What type of control should a company implement to prevent a reoccurrence?
1. Preventive
2. Compensating
3. Detective
4. Corrective
Chapter 1
The correct answer is option B. Compensating controls are alternative measures implemented when primary controls are not feasible or sufficient. In this case, the primary control needs to be replaced by a secondary control.
Which of the following physical controls would deter someone from entering a quarry? (Select TWO.)
A. Bollards
B. Guards
C. Barrier
D. Signs
E. Lights
Chapter 1
The correct answers are option B and option C. Using a barrier and guards at the entrance to the quarry could prevent unauthorized personnel from entering the quarry. Once the guard has checked the identification of the personnel, they can raise the barrier to allow entry. The bollards are not useful, as they would prevent everyone from entering the quarry, including people who worked there.
Following a third-party compliance audit, a company has been recommended that additional instructions need to be included in the current compliance policies. What type of control BEST describes the recommended action?
1. Operational
2. Directive
3. Deterrent
4. Corrective
Chapter 1
The correct answer is option B as directive controls provide specific instructions or guidelines for compliance with policies and procedures.
A cybersecurity administrator has decided to use homomorphic encryption to protect data so that they can read the data without needing to decrypt it. What type of control BEST describes the action carried out by the cybersecurity administrator?
1. Managerial
2. Technical
3. Operational
4. Physical
Chapter 1
The correct answer is option B. The cybersecurity administrator uses a technical control, which is a control that relies on technology to protect and secure data.
Within the spectrum of control categories, which one is tasked with establishing protocols and guidelines to enhance the effectiveness of organizational oversight?
1. Technical
2. Managerial
3. Operational
4. Physical
Chapter 1
The correct answer is option B. Top-level executives, including the CEO or president, may set the overall policy direction for the organization. They might also be involved in creating high-level policies that align with the company’s mission, vision, and strategic goals. These are known as managerial controls.
An IT administrator has been tasked by the CEO to investigate the latest attack methods being used by a bad actor. Which of the following would be the BEST resource to use?
1. MITRE ATT&CK
2. A honeyfile
3. A honeypot
4. A CVE list
Chapter 2
The correct answer is option C. A honeypot is a decoy system or network with lower security to entice an attacker so that the attack methods can be monitored and then mitigated.
Option A is incorrect because, while the MITRE ATT&CK framework has a database of adversaries, tactics, and techniques, it might not have the most recent attack information.
Option B is incorrect as a honeyfile is set up as bait so that the SOC team is alerted as soon as the attacker opens the file.
Option D is incorrect as a CVE list is a list of common vulnerabilities.
What type of system is able to track users’ access if the authentication method uses 802.1x?
1. Federation Services
2. Kerberos
3. OAuth
4. RADIUS
Chapter 2
The correct answer is option D. RADIUS is a centralized authentication, authorization, and accounting server, providing a way to track and control access to a network. RADIUS clients could be VPN-, WAP-, or 802.1X-managed switches. When users have been authenticated, they are added to a SQL database that logs when they enter and exit a network. This allows users to be tracked.
Option A is incorrect because Federation Services is used for third-party authentication.
Option B is incorrect because Kerberos is used for authentication in a Microsoft environment.
Option C is incorrect because OAuth is used for internetbased authentications.
Which of the following can be used to provide non-repudiation?
A. Asymmetric encryption
B. Symmetric encryption
C. A public key
D. A SAML token
Chapter 2
The correct answer is option A. Asymmetric encryption generates both private and public keys. The private key can be used to generate a digital signature that can provide non-repudiation. Non-repudiation is a term used in information security and cryptography to describe the concept of ensuring that an entity cannot deny the authenticity or origin of a message or transaction.
Option B is incorrect; in symmetric encryption, everyone shares the same key, so it cannot provide nonrepudiation.
Option C is incorrect as a public key is not kept secret and can be shared with multiple users so it cannot provide non-repudiation.
Option D is incorrect because security Assertion Markup Language (SAML) is an XML-based standard for exchanging authentication and authorization data between parties, typically between an identity provider (IdP) and a service provider (SP). It is not designed to provide non-repudiation.
An international bank encountered an insider attack where they suffered the theft of $100,000. The security team has been tasked to find the culprit. Which of the following is the BEST source of information for the security team to use?
1. The system log
2. The application log
3. An audit trail
4. The DNS log
Chapter 2
The correct answer is option C. An audit trail provides a comprehensive record of user activities and system actions, which is essential for tracing insider attacks.
Option A is incorrect, as the system log may contain system-related events but lacks the detailed user-specific information found in an audit trail.
Option B is incorrect; the application log focuses on application-specific events and is not as comprehensive as an audit trail. Option D is incorrect, as the DNS log relates to domain name system activities, not to tracing insider attacks.
Which of the given security tools fulfills the following?
* Presents itself as a prized target
* Uses dummy data
* Helps track attackers
A. Honeypot
B. A honeyfile
C. A honeytoken
D. PAM
Chapter 2
The correct answer is option C. A honeytoken mimics valuable data to lure attackers, serving as a decoy to detect and track unauthorized access.
Option A is incorrect because a honeypot attracts attackers and analyzes their attack methods but isn’t specifically focused on tracking with dummy data.
Option B is incorrect because a honeyfile is the bait used to identify when an attacker opens a file. It does not fulfill the characteristics.
Option D is incorrect because privileged access management is used to control administrative accounts and is not designed as a deceptive tracking tool.
In organizational jargon, what process describes scrutinizing the delta between existing resources and future aspirations, aiming to fortify strategic decision-making?
A. A SWOT analysis
B. The capability maturity model
C. Business process reengineering
D. Gap analysis
Chapter 2
The correct answer is option D. A gap analysis outlines the difference between current resources and potential future goals.
Option A is incorrect, as a SWOT analysis is a different strategic planning tool that assesses strengths, weaknesses, opportunities, and threats, and it does not specifically focus on resource gaps.
Option B is incorrect because the capability maturity model is a framework for process improvement and is not specifically designed to analyze resource gaps.
Option C is incorrect because business process reengineering is a method for redesigning business processes and is not specifically tailored for analyzing resource disparities.
Which of the following uses a private key to provide proof that an email has not been altered in transit and has come from the person who originally sent it?
A. A digital signature
B. Encryption
C. Hashing
D. Domain-based message authentication, reporting, and
conformance
Chapter 2
The correct answer is option A.
A digital signature uses a private key to sign the mail, ensuring its integrity and origin. This cryptographic technique provides authentication and non-repudiation.
Option B is incorrect because encryption secures the content but doesn’t provide proof of the sender’s identity or the integrity of the message.
Option C is incorrect because hashing verifies data integrity but doesn’t involve private keys and cannot verify the identity of the sender.
Option D is incorrect because domain-based message authentication, reporting, and conformance (DMARC) verifies which domain sent the email message but not the originator of the email.
Which intricate concept involves a dynamic orchestration of access controls, continuously tailoring user permissions based on evolving risk profiles and behavioral analytics?
A. A behavioral authentication framework
B. Dynamic credential ciphering
C. Adaptive identity management
D. A cyber resilience protocol
Chapter 2
The correct answer is option C. Adaptive identity management dynamically adjusts user permissions using risk profiles and behavioral analytics, enhancing cybersecurity. Option A is incorrect because a behavioral authentication framework may involve behavior analysis but lacks the broader scope of continuously adapting access controls. Option B is incorrect because dynamic credential ciphering relates to encryption, not the management of evolving access permissions. Option D is incorrect because a cyber resilience protocol deals with overall
system resilience, rather than the specific dynamic adaptation of identity and access controls.
Which type of sensors can detect changes in frequency?
A. Microwave sensors
B. Pressure sensors
C. Infrared sensors
D. Ultrasonic sensors
Chapter 2
The correct answer is option A. Microwave sensors can detect changes in frequency because they use microwave radiation to detect motion, making them suitable for motion detection applications.
Option B is incorrect because pressure sensors measure pressure changes, which is a reliable indicator of movement, not changes in frequency.
Option C is incorrect because infrared sensors detect infrared radiation, not changes in frequency.
Option D is incorrect because ultrasonic sensors use sound waves, not changes in frequency, for distance measurement and object detection.
Which of the following log files ensures that someone is responsible for another person?
A. An IDS log
B. A security log
C. An event log
D. A visitors log
Chapter 2
The correct answer is option D. When entering a company or a military base, the person who signs a visitor in at reception is responsible for that person during their stay.
Option A is incorrect because an Intrusion Detection System (IDS) log is designed specifically to detect and log unauthorized or suspicious activities on a network or system.
Option B is incorrect because a security log can record various security-related events but it might not necessarily attribute responsibility for one person’s actions to another.
Option C is incorrect because event logs capture a wide range of system events and activities, but they do not inherently ensure someone is responsible for another person.
What component of change management is essential for ensuring that security operations are not adversely affected by new implementations?
Select the BEST option.
A. Ownership
B. Test results
C. An approval process
D. A backout plan
Chapter 3
The correct answer is option C. The approval process is a critical aspect of change management that ensures proposed changes are scrutinized before implementation. This step involves assessing the impact of changes on security operations, resource allocation, and potential risks.
Option A is incorrect because ownership is important for accountability, as it designates an individual responsible for overseeing and executing changes. It doesn’t evaluate the potential impact on security operations.
Option B is incorrect as test results ensure that security changes work as intended and will not introduce new problems, however, they do not measure how they affect new implementations.
Option D is incorrect because a backout plan is a rollback option if the changes go wrong.
Which of the following is the BEST solution for a cybersecurity team to implement to prevent employees from installing video games on a company’s systems?
A. Sandbox
B. An allow list
C. A block list
D. Least privilege
Chapter 3
The correct answer is option B. An application allow list, formerly known as a whitelist, is a list of only those applications that are permitted to be installed. Personal software and malware would never be on the allow list; therefore, they would not be able to be installed or run.
Option A is incorrect, as a sandbox is an isolated virtual machine or application used to test an application for the patching, testing, or investigation of potential malware.
Option C is incorrect, as a block list needs each application to be named; this would prove too difficult to implement. It is easier to create an allow list, and if the application is not on the allow list, t then it cannot be installed.
Option D is incorrect, as least privilege is an access control where a user only gets the minimum permissions to perform their job, and it is not to prevent application installation.
When ensuring the accuracy of system representations, what practice is reflective of the actual network infrastructure?
A. Regression testing
B. Updating diagrams
C. Data masking
D. Version control
Chapter 3
The correct answer is option B, updating diagrams. This means keeping visual representations such as network diagrams accurate to help network professionals understand and manage security effectively.
Option A is incorrect because regression testing involves testing toensure that code changes haven’t negatively impacted existing functionality, but it does not relate to network infrastructure. Option C is incorrect because data masking involves disguising sensitive information, which is not directly related to network infrastructure.
Option D is incorrect because version control tracks changes to documents and papers. It is not suitable for this task.
What component of change management outlines the specific steps to be taken if a change implementation encounters unexpected issues or failures?
A. A snapshot
B. A backout plan
C. A maintenance window
D. Test results
Chapter 3
The correct answer is option B. A backout plan is a critical aspect of change management that defines the rollback options if an implementation does not go as planned. It reverts the system to its previous state to minimize disruption and potential security risks if there are failures.
Option A is incorrect because a snapshot is a backup of a virtual machine, and most change management is not done in a virtual environment.
Option C is incorrect because a maintenance window is where a planned change to a system is done to ensure minimal disruption.
Option D is incorrect because test results assess the functionality and suitability of changes before implementation. They do not address the process of reverting changes if there are failures.