What important function do senior managers normally fill on a business
continuity planning team? Correct Ans - arbitrating disputes about
criticality
Which one of the following administrative processes assists organizations in
assignment appropriate levels of security control to sensitive information?
Correct Ans - transmitting data
Susan needs to predict high-risk areas for her organizatiion and wants to use
metrics to asses risk trends as they occur. what should she do to handle this?
Correct Ans - identify and track key risk indicators.
Which one of the following is not normally included in business continuity
plan documentation? Correct Ans - statement of accounts
Chris is configuring and IDS to monitor for unencrypted FTP traffic. what
ports should chris use in his configuration? Correct Ans - TCP 20 and
21
Under what virtualization model does the virtualization platform separate the
network control plane from the data plane and replace complex network
devices with simpler devices that simply receive instructions from the
controller? Correct Ans - SDN
What access control scheme labels subjects and objects and allows subjects to
access objects when the labels match? Correct Ans - MAC
Ben has been tasked with identifying security controls for systems covered by
his organization's information classification system. Why might Ben choose to
use a security baseline? Correct Ans - they provide a good starting
point that can be tailored to organizational needs.
Which of the following strategies is not a reasonable approach for remediating
a vulnerability identified by a vulnerability scanner? Correct Ans -
update the banner or version number.
,Which one of the following terms is often used to describe a collection of
unrelated patches released in a large collection? Correct Ans - service
pack
Ricky would like to access a remote file server through a VPN connection. He
begins this process by connecting to the VPN and attempting to log in.
Applying the subject/object model to this request, what is the subject of
Ricky's login attempt? Correct Ans - ricky
Ralph is designing a physical security infrastructure for a new computing
facility that will remain largely unstaffed. He plans to implement motion
detectors in the facility but would also like to include a secondary verification
control for physical presence. Which one of the following would best meet his
needs? Correct Ans - CCTV
How many bits of keying material does the Data Encryption Standard use for
encrypting information? Correct Ans - 56 bits
Why should passive scanning be conducted in addition to implementing
wireless security technologies like wireless intrusion detection systems?
Correct Ans - it can help identify rogue devices.
Which one of the following statements best describes a zero-day
vulnerability? Correct Ans - an attack prviously unkown to the
security community
Gabe is concerned about the security of passwords used as a cornerstone of
his organization's information security program. Which one of the following
controls would provide the greatest improvement in Gabe's ability to
authenticate users? Correct Ans - multifactor authentication
Juan is retrofitting an existing door to his facility to include a lock with
automation capabilities. Which one of the following types of lock is easiest to
install as a retrofit to the existing door? Correct Ans - magnetic lock
Allie is responsible for reviewing authentication logs on her organization's
network. She does not have the time to review all logs, so she decides to
choose only records where there have been four or more invalid
,authentication attempts. What technique is Allie using to reduce the size of the
pool? Correct Ans - clipping
Veronica is considering the implementation of a database recovery
mechanism recommended by a consultant. In the recommended approach, an
automated process will move database backups from the primary facility to an
off-site location each night. What type of database recovery technique is the
consultant describing? Correct Ans - electronic vaulting
Which one of the following is not one of the basic requirements for a
cryptographic hash function? Correct Ans - the function must work on
fixed-length input
Brandon observes that an authorized user of a system on his network recently
misused his account to exploit a system vulnerability against a shared server
that allowed him to gain root access to that server. What type of attack took
place? Correct Ans - privilege escalation
Jim wants to allow cloud-based applications to act on his behalf to access
information from other sites. Which of the following tools can allow that?
Correct Ans - OAuth
What type of access control is composed of policies and procedures that
support regulations, requirements, and the organization's own policies?
Correct Ans - administrative
Greg is redesigning his organization's incident response process, seeking to
improve its efficiency and effectiveness. Which one of the following actions is
not likely to improve his incident response plan? Correct Ans - keep all
members of the team on permanent assignment to the team
Alice sent a message to Bob. Bob would like to demonstrate to Charlie that the
message he received definitely came from Alice. What goal of cryptography is
Bob attempting to achieve? Correct Ans - nonrepudiation
Staff from Susan's company often travel internationally. Susan believes that
they may be targeted for corporate espionage activities because of the
technologies that her company is developing. What practice should Susan
, recommend that they adopt for connecting to networks while they travel?
Correct Ans - use a VPN for all connections
The company that Dan works for has recently migrated to a Service as a
Service provider for its enterprise resource planning (ERP) software. In its
traditional on-site ERP environment, Dan conducted regular port scans to help
with security validation for the systems. What will Dan most likely have to do
in this new environment? Correct Ans - rely on vendor testing and
audiits
Which one of the following does not describe a standard physical security
requirement for wiring closets? Correct Ans - place only in areas
monitored by security guards
While investigating a malware infection, Lauren discovers that the hosts file
for the system she is reviewing contains multiple entries as shown here:
0.0.0.0 symantec.com
0.0.0.0 mcafee.com
0.0.0.0 microsoft.com
0.0.0.0 kapersky.com
Why would the malware make this change? Correct Ans - to prevent
antivirus updates
Susan is working with the management team in her company to classify data
in an attempt to apply extra security controls that will limit the likelihood of a
data breach. What principle of information security is Susan trying to enforce?
Correct Ans - confidentiality
NIST defines five major types of threat information types in NIST SP 800-150
the "Guide to Cyber Threat Information Sharing." They are:
1. Indicators, which are technical artifacts or observables that suggest an
attack is imminent, currently underway, or compromise may have already
occurred
2. Tactics, techniques, and procedures that describe the behavior of an actor
3. Security alerts like advisories and bulletins
4. Threat intelligence reports that describe actors, systems, and information
being targeted and the methods being used
5. Tool configurations that support collection, exchange, analysis, and use of
threat information Which one of the following groups would be least likely to
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Studycafe. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $24.99. You're not tied to anything after your purchase.