Security+ 501 Test 2 Flashcards
(133 cards)
Which of the following can be established in a cloud environment through effective security controls and well-written service-level agreements?
Responsibility and Accountability
Accountability and responsibility can be established through effective security controls and well-written service-level agreements.
Which regulation would guide a healthcare organization to protect the confidentiality of stored patient data adequately?
HIPAA
Which regulation covers the risk management of U.S. Department of Defense systems
RMF (Risk Management Framework)
Which regulations are involved with financial data?
Sarbanes-Oxley and PCI (Payment Card Industry)
What type of system involves the use of a common authentication system and credentials database that multiple entities use and share.
A Federated System
What type of system shows one party trusts another but not the reverse?
One way trust
What type of system shows if entity B trusts entity A and entity C trusts entity B then entity C trusts entity A?
.A transitive Trust
Which of the following are usually annoying advertisements that come in the form of pop-up messages in a user’s browser?
Adware
A (Blank) is a piece of malicious software that must be propagated through a definite user action.
Virus
A (Blank) is a piece of software that seems to be of value to the user, but in reality, is malware.
Trojan
A (Blank) is a script set to execute at a certain time, which is usually created by rogue administrators or disgruntled employees.
Logic Bomb
Which of the following requires team members to go through the motions of fulfilling the responsibilities and conducting the activities required during an actual incident or disaster?
Walkthrough test
A (blank) is the simplest form of test, in which the business continuity plan, disaster recovery plan, and associated documents are reviewed by relevant personnel including managers, recovery team members, and anyone else who may have responsibilities directly affecting plans.
Documentation Review
In a (Blank), all personnel are usually involved and may actually conduct activities as they would during a real incident. This type of test is more complex and normally requires extensive resources, such as people and equipment, so it is typically conducted infrequently.
Full-Scale Test
Which is the most common public-private key generation algorithm used in public-key cryptography?
RSA (Rivest-Shamir-Adleman)
(Blank) is a key exchange protocol used in public-key cryptography. It is used to negotiate, agree upon, and establish a secure session between two parties.
(ECDH) Elliptic Curve Diffie-Hellman
(blank) is used to generate message digests for plaintext. It is not used in public-key cryptography to exchange keys or establish secure sessions.
SHA-2 (Secure Hashing Algorithm - 2)
What is a logging facility found in UNIX and Linux systems?
Syslog
What type of log management involves collecting logs from across the network into one system and being able to review them as a group.
Centralized
(blank) is a centralized method of obtaining logs and other data from disparate devices across the network.
SIEM (Security Information Event Management)
What type of log management means that logs are managed and reviewed on a host-by-host basis, rather than as a centralized, consolidated group.
Decentralized
What is it called when someone keeps getting new privileges but nothing ever gets turned off?
Privilege Creep
(Blank) means that administrators never give a user account more rights and permissions than is needed for the user to do his or her job.
least privilege
(Blank) indicates the level of errors that the system may generate indicating that unauthorized users are identified and authenticated as valid users in a biometric system.
False acceptance rate