Security Operations Flashcards
This domain represents 13 percent of the exam and covers many essential security concepts and routine operations, building on many of the other security domains, including security and risk management, assets, engineering, communication, and network security. (41 cards)
Q. 1 Which of the following is NOT a precaution that needs to be taken before monitoring email?
Coming up with strict procedures that define under what circumstances email may be searched Posting a notice visible to all stating that email is company information subject to search Issuing monitoring tools to all email administrators Making sure that all employees know that email is being monitored
Issuing monitoring tools to all email administrators
Note
Issuing monitoring tools to email administrators is not a precaution. The other answers are all prudent steps that need to be taken before any monitoring is performed.
Q. 2 Entrapment is defined as
Leading someone to commit a crime that he or she wouldn’t otherwise have committed Monitoring with the intent of recording a crime Paying someone to commit a crime Being caught with criminal evidence in one’s possession
Leading someone to commit a crime that he or she wouldn’t otherwise have committed
Note
Entrapment refers to the activities that lure an individual into committing a crime that he or she wouldn’t have otherwise committed.
Q. 3 A DRP checklist test
Is a basic review of disaster recovery procedures Is a test of backup system business resumption procedures Is a test of production system recovery procedures Is a test of business process failover procedures
Is a basic review of disaster recovery procedures
Note
A checklist test is the simplest form of DR test in which procedures are reviewed.
Q. 4 The primary difference between a hot site and a warm site is
A hot site is physically closer to the organization’s data centers than a warm site The warm site’s systems don’t have the organization’s data installed The warm site doesn’t have computer systems in it The warm site is powered down, but the hot site is powered up and ready to go
The warm site’s systems don’t have the organization’s data installed
Note
A warm site is the same as a hot site, except that applications and data aren’t installed on the warm site’s systems.
Q. 5 Which of the following are examples of a natural disaster? Drag and drop the correct answer(s) from top to bottom.
Flood
Terrorism
Pandemic
Tsunami
Flood
Pandemic
Tsunami
Note
Terrorism is a manmade disaster.
Q. 6 Forensics is the term that describes
Due process Tracking hackers from other countries Taking steps to preserve and record evidence Scrubbing a system in order to return it to service
Taking steps to preserve and record evidence
Note
Forensics is the study and activity of discovering, preserving, and recording evidence.
Q. 7 The Disaster Recovery Plan needs to be continuously maintained because
The organization’s software versions are constantly changing The organization’s business processes are constantly changing The available software patches are constantly changing The organization’s data is constantly changing
The organization’s business processes are constantly changing
Note
To be effective, a DRP must include all current critical business processes.
Q. 8 What’s considered the most effective form of magnetic media erasure?
Physical destruction Degaussing Overwriting Relabeling
Physical destruction
Note
Only complete physical destruction will positively guarantee that data cannot be recovered from magnetic storage media.
Q. 9 Least privilege means
An analysis determines which privileges are required to complete a task People who have high privileges delegate some of those privileges to others The people who have the fewest access rights do all the work Users should have the minimum privileges required to perform required tasks
Users should have the minimum privileges required to perform required tasks
Note
Least privilege means that users have access to only the data and functions required to perform their duties.
Q. 10 A data processing facility on truck trailers or in portable buildings is known as
A tornado magnet A migratory backup site A rolling backup site An semi-permanent backup site
A rolling backup site
**Note** A rolling (or mobile) backup site is a portable site located on a truck trailer or other portable facility.
Q. 11 What are the types of DRP tests? Drag and drop the correct answer(s) from top to bottom.
Checklist Full interruption Parallel Simulation Walkthrough
Checklist Full interruption Parallel Simulation Walkthrough
Note
The five types of DRP tests are checklist, walkthrough, simulation, parallel, and full interruption.
Q. 12 How is the organization’s DRP best kept up-to-date?
With random audits to identify changes in business processes By maintaining lists of current software versions, patches, and configurations By maintaining personnel contact lists By regularly testing the DRP
By regularly testing the DRP
Note
Audits are useful for revealing changes that may be needed in the DRP.
Q. 13 The practice of separation of duties
Provides variety by rotating personnel among various tasks Helps to prevent any single individual from compromising an information system Ensures that the most experienced persons get the best tasks Is used in large 24x7 operations
Helps to prevent any single individual from compromising an information system
Note
Separation of duties ensures that no single individual has too many privileges, which can lead to a security incident or fraud.
Q. 14 The process of identifying the reason for an incident is known as
Predictive analytics Quality control Finger pointing Root cause analysis
Root cause analysis
Note
Root cause analysis is used to find the reason that a problem or incident occurred.
Q. 15 A parallel DRP test
Is resource intensive and rarely used Tests the full responsiveness by shutting down production systems Runs in parallel with production processing Is a paper exercise to test theoretical response to a disaster
Runs in parallel with production processing
Note
A parallel test is a full test that DOES NOT shut down production systems.
Q. 16 Enticement is defined as
Being caught with criminal evidence in one’s possession Leading someone to commit a crime that they wouldn’t otherwise have committed Monitoring with the intent of recording a crime Leading someone toward evidence after a crime has already been committed
Leading someone toward evidence after a crime has already been committed
Note
Enticement is used to keep a criminal at the scene of a crime. In the context of computer crime, a honeypot is a great way to keep an intruder around while his or her origin is traced.
Both entrapment and enticement involve persuading or leading someone to commit an unlawful act. Entrapment involves causing someone to commit an unlawful act that that person would not otherwise have committed. Enticement involves causing someone to commit an unlawful act (such as attacking a honeypot that records further evidence of a crime) after that person has already committed a crime (such as hacking into the network where the honeypot is located). Entrapment is illegal; enticement is not illegal. However, evidence collected through enticement may or may not be admissible in court proceedings.
Q. 17 Multiple versions of a DRP in the organization will
Ensure all essential personnel have a copy of the DRP Provide a record of changes to the DRP for auditing purposes Cause confusion during a disaster Demonstrate due diligence in the event of civil litigation
Cause confusion during a disaster
Note
Only one version of the DRP should be available, in order to avoid confusion about the most current business processes, roles, and responsibilities.
Q. 18 Which of the following is NOT a security issue regarding single-user mode?
Authentication is disabled on all network services, such as Telnet and FTP The administrator has full root privileges and can make system changes Security features are disabled in single-user mode The administrator can transmit information off the system without a trace
Authentication is disabled on all network services, such as Telnet and FTP
Note
Authentication being disabled on network services, such as Telnet and FTP, are security concerns on any system, not just only a system operating in single-user mode. Root privileges, disabled security features, and the ability to transmit information without detection are all important security concerns inherent to a system operating in single-user mode.
Q. 19 Why are communications with the media important during a disaster?
Emergency communications with personnel occur through the media The media can report official status instead of relying on rumors It’s required by the Securities and Exchange Commission It’s recommended by the Business Contingency Planning Association
The media can report official status instead of relying on rumors
Note
In the absence of official communication with the media, inaccurate information about the disaster and its impact is likely to be spread.
Q. 20 A witness
Offers an opinion based on the facts of a case and on personal expertise Is someone who was present at the scene of the crime Has direct personal knowledge about the event in question Can testify in criminal proceedings only
Has direct personal knowledge about the event in question
Note
A witness testifies to the facts of a case as he or she understands them.
Q. 21 What’s the purpose of off-site media storage?
An alternate backup media set in the event of a program bug An alternate backup media set in the event of an operator error An alternate backup media set in the event of a catastrophic hardware failure An alternate backup media set in the event that the data center is destroyed
An alternate backup media set in the event that the data center is destroyed
Note
The primary intent for off-site media storage is to have a set of backup media available in case the primary data center is damaged or destroyed in the event of a disaster.
Q. 22 The number one priority during any disaster should always be
Communications Personnel safety Resumption of core business functions Security of physical facilities
Personnel safety
Note
The lives and safety of people always come first.
Q. 23 The purpose of a honeypot is to
Log an intruder’s actions Act as a decoy to lure attackers away from the real target, study attack methods, and collect evidence Deflect Denial of Service attacks away from production servers Provide direct evidence of a break-in
Act as a decoy to lure attackers away from the real target, study attack methods, and collect evidence
Note
A honeypot is designed to keep an intruder sniffing around long enough for investigators to determine his or her origin and/or identity.
Q. 24 What’s the potential security benefit of rotation of duties?
It reduces the risk that personnel will perform unauthorized activities It ensures that all personnel are familiar with all security tasks It’s used to detect covert activities It ensures security because personnel aren’t too familiar with their duties
It reduces the risk that personnel will perform unauthorized activities
Notes
Rotation of duties helps to prevent situations in which individuals are potentially tempted to perform unauthorized activities by limiting familiarity and increasing the risk of discovery by another individual subsequently performing the same duties.