Thor's 100 Questions Set 1 Flashcards
(100 cards)
In our best practice password policy, which of these would be allowed?
Using a password that includes your personal information, such as your name or birthdate
Using a password that is at least 6 characters long
Using the same password for multiple accounts
Using a password that contains a combination of letters, numbers, and special characters
Using a password that contains a combination of letters, numbers, and special characters
Why: This is an ideal practice for creating a strong password. Using a combination of uppercase and lowercase letters, numbers, and special characters makes the password more difficult to guess and harder to crack through brute-force attacks. The complexity of the password increases with the variety of characters used. This strategy is often part of a robust password policy aimed at enhancing security.
Which of the following is the MOST effective physical perimeter security control?
Fencing
Security guards
Access control systems
Security cameras
Security guards
Why: The effectiveness of a physical perimeter security control largely depends on the context, but among the choices provided, security guards are generally considered to be the most effective. The reason is that they offer a dynamic, flexible, and adaptive solution to physical security. Security guards can respond in real-time to changing situations, identify suspicious behavior, and provide immediate human intervention, often acting as a deterrent to potential intruders. They can use judgment and discretion in a way that other listed systems cannot.
We are blocking unused ports on our servers as part of our server hardening. We have chosen to block UDP (User Datagram Protocol) port 137. What are we blocking?
SMTP
NetBIOS name resolution
HTTPS
DNS
NetBIOS name resolution
Why: NetBIOS (Network Basic Input/Output System) is a networking protocol used primarily on networks using Microsoft Windows, for various purposes such as file sharing, printer sharing, and other network services. Port 137 over UDP (User Datagram Protocol) is specifically used for NetBIOS name resolution, which is essentially the method by which NetBIOS names are resolved to IP addresses. So, by blocking UDP port 137, you are blocking NetBIOS name resolution
DNS - port 53
SMTP - port 25
HTTPS - port 443
Which of the following is a type of security testing that involves deliberately trying to breach the security of a system to identify vulnerabilities?
Security auditing
Break attack simulations (BAS)
Penetration testing
Vulnerability scanning
Penetration testing
Why: Penetration testing involves simulating an attack on a system to identify vulnerabilities that could be exploited by a real attacker. Penetration testers, or “ethical hackers,” use the same techniques as malicious hackers, but they do it legally and ethically, to identify and document vulnerabilities that could be exploited. The goal of penetration testing is to identify weak points in an organization’s security posture before they can be exploited by a real attacker.
What is the MOST secure type of software to use in a critical infrastructure system?
Commercial off-the-shelf (COTS) software
Proprietary software
Open-source software
Custom-developed software
Custom-developed software
Why: When it comes to critical infrastructure systems, the most secure option is often custom-developed software. This is because the software can be designed specifically with the unique needs and vulnerabilities of the infrastructure system in mind. Unlike commercial off-the-shelf (COTS), open-source, and proprietary software, custom-developed software is not widely distributed, so its vulnerabilities are not as well known or exploitable. The source code of custom-developed software is typically not shared with the public, which means it’s harder for potential attackers to analyze the software for vulnerabilities.
Which of the following is NOT a principle of Privacy by Design (PbD)?
Highest Priority
End-to-end security
User-centric
Proactive rather than reactive
Forced consent
Highest Priority
Why: Privacy by Design (PbD) is a framework that promotes privacy and data protection compliance from the start, emphasizing proactive measures to ensure privacy. The principles of PbD encourage proactive rather than reactive measures, privacy as the default setting, privacy embedded into the design, full functionality – positive-sum, not zero-sum, end-to-end security, visibility and transparency, and respect for user privacy (user-centric). None of the official principles of PbD specifically mentions “highest priority” as a standalone concept. While prioritizing privacy is implicit in the ethos of PbD, it’s not listed as a discrete principle in this framework.
Which type of control would best describe a security guard?
Physical control
Environmental control
Operational control
Technical control
Physical control
Why: Physical controls are security measures that are designed to deny unauthorized access to physical resources and protect against physical threats. They involve tangible, visible means of protection. A security guard falls under this category as their job is to physically prevent unauthorized individuals from accessing certain areas, to deter and detect potential security breaches, and respond to various security incidents. They physically patrol a facility and use their presence as a deterrent to crime. In some cases, they may also interact with access control systems, another form of physical control. The role of a security guard, therefore, fits most appropriately within the context of physical control. They can also be used as a compensating control.
ThorTeaches.com has implemented a new access control system for its employees. The system requires all employees to use a unique username and password to log in to the company’s network. However, you have received reports from some employees that they are able to log in using someone else’s username and password. What is the most likely cause of this issue?
Employees are sharing their login information
The employees’ passwords are too easy to guess
The access control system has been hacked
The access control system is not configured correctly
Employees are sharing their login information
Why: Employees are sharing their login information: This is the most likely cause. If employees can log in using someone else’s credentials, it’s often because they have been shared, intentionally or unintentionally. While it’s possible that other factors, such as a misconfigured system, weak passwords, or even a breach, could be contributing factors, the ability for one employee to use another’s credentials typically points to credential sharing directly. It’s essential to ensure employees know the risks of sharing their login information and are educated about keeping their credentials confidential.
What is the main security control of a secure password?
Password length
Password encryption
Password complexity
Password expiration
Password complexity
Why: A password with a high level of complexity, including a combination of uppercase and lowercase letters, numbers, and special characters, is more difficult for attackers to guess or crack through brute force methods.
Which type of malware is embedded in another normal program?
Worm
Trojan Horse
Virus
Ransomware
Trojan Horse
Why: A Trojan Horse is a type of malware that is often disguised as legitimate software or is embedded within legitimate software. The term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth. Similarly, in the computing context, a Trojan Horse tricks users into loading and executing malicious code on their systems. These threats are usually spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to appear not suspicious, or by drive-by download.
Which of the following security control strategies is the MOST effective in preventing unauthorized access to sensitive information?
Training employees on security best practices
Installing antivirus software
Conducting regular security audits
Implementing two-factor authentication
Implementing two-factor authentication
Why: Two-factor authentication is the most effective option for preventing unauthorized access to sensitive information. It provides an additional layer of security beyond just a username and password. With two-factor authentication, even if an attacker is able to steal a user’s password, they would still need the second factor (which could be a code sent to the user’s phone, a fingerprint scan, etc.) to gain access. This makes it much more difficult for unauthorized individuals to access sensitive information.
Acting ethically is very important, especially for IT security professionals. If we look at the IAB’s “Ethics and the Internet,” which of these behaviors does it NOT consider unethical?
Hacking into a website without permission
Using an anonymous proxy to browse the internet
Sharing personal information without consent
Using a company’s network for personal gain
Using an anonymous proxy to browse the internet
Why: Using an anonymous proxy to browse the Internet: The IAB’s “Ethics and the Internet” does not consider using an anonymous proxy to browse the Internet as unethical. This practice is generally acceptable as long as it is used responsibly and legally. Anonymous proxies are tools that provide privacy to internet users, hiding their IP addresses and encrypting data. They can be used to maintain anonymity, bypass geographical restrictions, or protect sensitive information. However, it is crucial that such tools are used ethically and not for purposes that breach the law or infringe on others’ rights, such as hacking, cyberstalking, or accessing prohibited content. While some may argue that they can be used for nefarious purposes, the tools themselves aren’t inherently unethical: it’s how they’re used that can be. The act of simply using an anonymous proxy to browse the internet is not considered unethical according to the IAB’s guidelines.
ThorTeaches.com has recently experienced some issues with software updates, and it has become apparent that the changes were not properly documented or reviewed before they were implemented. How can we ensure that changes made to software are properly documented and reviewed?
By having a dedicated team of security analysts review the changes made to the software
By implementing a system that automatically logs all changes made to the software
By requiring all software developers to sign a document indicating that they have reviewed the changes made to the software
By implementing a robust password policy for all software developers
By implementing a system that automatically logs all changes made to the software
Why: Implementing a system that automatically logs all changes made to the software ensures that changes are properly documented and consistently reviewed, providing a foundation for accountability and traceability in the software development process. Such a system can provide a complete history of what changes were made, when, and by whom, which is essential for effective review and auditing.
What is the MOST effective way to secure company information when employees use their own devices for work?
Installing antivirus software on all devices
Providing employees with company-owned devices
Implementing a bring your own device (BYOD) policy
Implementing strict password policies
Implementing a bring your own device (BYOD) policy
Why: A bring your own device (BYOD) policy allows employees to use their own devices for work while also establishing security measures, such as setting up virtual private networks (VPNs) and requiring multi-factor authentication, to protect company information. Such a policy should include rules for what types of devices are allowed, what data can be accessed, what security measures must be in place on the device, and what happens if the device is lost or stolen. This provides a structured framework for employees to use their personal devices in a secure and controlled manner.
Which of the following is the PRIMARY indicator of good governance in an organization?
Least amount of risk to the organization
Best alignment of resources with business objectives
Most effective decision-making processes
Highest level of compliance with regulations
Best alignment of resources with business objectives
Why: Best alignment of resources with business objectives: Good governance in an organization is primarily indicated by how well the resources (human, financial, physical, technological, etc.) are aligned with the organization’s business objectives. This is because effective governance ensures that an organization’s resources are used in a way that best supports achieving its strategic goals and objectives. When resources are aligned with business objectives, the organization has a clear strategy and direction, and all its actions are designed to support this strategy. It also suggests a strong coordination between different units of the organization, with everyone working towards the same goals.
Which of the following is the HIGHEST priority in QoS (Quality of Service)?
Minimum latency
Maximum availability
Maximum bandwidth
Minimum delay
Minimum delay
Why: In Quality of Service (QoS), especially for low latency applications like VoIP, online gaming, or live video streaming, the highest priority is usually given to minimum delay. Delay refers to the time taken for a packet of data to get from one designated point to another in the network. It encompasses all possible sources of delay including propagation, transmission, and processing delays. By minimizing delay, networks ensure that data packets move swiftly through the network, thereby enhancing the user experience especially in real-time communications where a fraction of a second can make a significant difference.
Which of the following is NOT a requirement of the Information Security Governance standard?
Regular review and monitoring of security controls
Development of policies and procedures
Implementation of a user training program
Use of encryption for all data transmissions
Use of encryption for all data transmissions
Why: While encryption is a critical component of information security, it is not specifically required by the Information Security Governance standard. This standard focuses on the development and implementation of policies and procedures, regular review and monitoring of security controls, and user training.
Which of the following is the MOST effective way to handle a regulatory investigation?
Ignoring the investigation and hoping it will go away.
Hiring a lawyer to handle all communication with the investigating agency.
Providing false or incomplete information to the investigating agency.
Cooperating fully with the investigating agency and providing all relevant information.
Cooperating fully with the investigating agency and providing all relevant information.
Why: Cooperating fully with the investigating agency and providing all relevant information is the most effective way to handle a regulatory investigation because it shows that the organization is transparent and willing to work with the investigating agency to resolve any issues.
Which of the following is the FIRST step in a public key cryptography system?
Exchange of public keys
Encrypting the message with the public key
Generating the private key
Decrypting the message with the private key
Generating the private key
Why: In public key cryptography, also known as asymmetric cryptography, the very first step is to generate a private key. The private key is kept secret by the user and is not shared with others. This private key is used to decrypt data that has been encrypted with the corresponding public key.
Which of the following is NOT a typical role of an auditor?
Providing recommendations for improvement
Making decisions on behalf of the organization
Evaluating the effectiveness of internal controls
Verifying compliance with laws and regulations
Making decisions on behalf of the organization
Why: Making decisions on behalf of the organization) is NOT the role of an auditor, as their role is to provide independent and objective assessments and recommendations rather than making decisions for the organization.
What is a commonly used method for assessing the potential consequences of a disruption to an organization’s operations and resources?
Business impact analysis
Threat analysis
Risk assessment
Risk management
Business impact analysis
Why: Business impact analysis (BIA) is a systematic process that assesses the potential consequences of a disruption to an organization’s operations and resources. It helps an organization understand the potential impact of such disruptions, and therefore, can plan better for various contingencies to minimize their effects. The purpose of BIA is to identify the critical functions, services, and resources that need to be protected and to prioritize the recovery of those operations and resources in the event of a disruption.
Which of the following is the FIRST step in implementing a positive-listing strategy?
Configure user access controls
Develop a list of approved applications and block all others
Implement firewall and intrusion detection systems
Identify and categorize all authorized applications
Identify and categorize all authorized applications
Why: In implementing a positive-listing strategy, the first step involves identifying and classifying all qualified applications. Positive-listing or allowlisting is essentially about having a list of applications approved for use within a particular environment, whether a network, an operating system, a device, etc. For this, the administrators must first know what applications are authorized. This involves gathering all applications currently in use and potentially necessary, examining their security profiles, understanding their roles within the operational infrastructure, and making decisions about their continued authorization.
What is the definition of access control?
The ability to access and manipulate data within a system
The provision of resources to users based on their roles and responsibilities
The management and distribution of keys for physical security
The prevention of unauthorized access to assets
The prevention of unauthorized access to assets
Why: Access control is a security measure that is implemented to prevent unauthorized access to assets within a system. It’s a process that allows, denies, or restricts access to a resource. It ensures that only authenticated and authorized users can access specific resources, thus preventing unauthorized access. It does this through a variety of methods, such as implementing passwords, biometrics, two-factor authentication, and more.
In our disaster planning, we are looking at another site for a data center. We would want it to take us less than an hour to be back to operation on our critical applications. Which type of disaster recovery site are we considering?
Cold site
Mobile site
Warm site
Hot site
Hot site
Why: A hot site is a type of disaster recovery site that is fully equipped to take over all IT operations within a very short time period. A hot site has all the necessary hardware, software, network connectivity, and data replication facilities to ensure business continuity even in the event of a disaster. It would provide the capability for the company to be operational within an hour for critical applications, aligning with the scenario described in the question.