ISC2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

Which type of attack has the PRIMARY objective controlling the system from outside?

Backdoor

2
New cards

Which of the following is not a protocol of the OSI Level 3?

SNMP

3
New cards

When a company hires an insurance company to mitigate risk, which risk management technique is being applied?

Risk transfer

4
New cards

The SMTP protocol operates at OSI Level:

7

5
New cards

The process of verifying or proving the user's identification is known as:

Authentication

6
New cards

If an organization wants to protect itself against tailgating, which of the following types of access control would be most effective?

Turnstiles

7
New cards

Logging and monitoring systems are essential to:

Identifying inefficient performing systems, detecting compromises, and providing a record of how systems are used

8
New cards

In the event of a disaster, which of these should be the PRIMARY objective?

Guarantee the safety of people

9
New cards

The process that ensures that system changes do not adversely impact business operations is known as:

Change Management

10
New cards

The last phase in the data security cycle is:

Destruction

11
New cards

Which access control model specifies access to an object based on the subject's role in the organization?

RBAC

12
New cards

Which of the following is NOT an example of a physical security control?

Firewalls

13
New cards

Which type of attack will most effectively maintain remote access and control over the victim's computer?

Rootkits

14
New cards

In incident terminology, the meaning of Zero Day is:

A previously unknown system vulnerability

15
New cards

Which of the following is NOT a possible model for an Incident Response Team (IRT)?

Pre-existing

16
New cards

A device found not to comply with the security baseline should be:

Disabled or isolated into a quarantine area until it can be checked and updated.

17
New cards

A biometric reader that grants access to a computer system in a data center is a:

Technical Control

18
New cards

Which type of attack PRIMARILY aims to make a resource inaccessible to its intended users?

Denials of Service

19
New cards

Which type of attack embeds malicious payload inside a reputable or trusted software?

Trojans

20
New cards

Which tool is commonly used to sniff network traffic?

Wireshark

21
New cards

Which of these is not an attack against an IP network?

Side-channel Attack

22
New cards

The detailed steps to complete tasks supporting departmental or organizational policies are typically documented in:

Procedures

23
New cards

Which device is used to connect a LAN to the Internet?

Router

24
New cards

What does SIEM mean?

Security Information and Event Manager

25
New cards

A Security safeguard is the same as a:

Security control

26
New cards

Which access control model can grant access to a given object based on complex rules?

ABAC

27
New cards

Which port is used to secure communication over the web (HTTPS)?

443

28
New cards

Which of these has the PRIMARY objective of identifying and prioritizing critical business processes?

Business Impact Analysis

29
New cards

Which of the following are NOT types of security controls?

Storage controls

30
New cards

Which of the following is NOT a type of learning activity used in Security Awareness?

Tutorial

31
New cards

The magnitude of the harm expected as a result of the consequences of an unauthorized disclosure, modification,

destruction, or loss of information, is known as the:

Impact

32
New cards

The implementation of Security Controls is a form of:

Risk reduction

33
New cards

Which of the following attacks take advantage of poor input validation in websites?

Cross-Site Scripting

34
New cards

Which of the following is an example of an administrative security control?

Acceptable Use Policies

35
New cards

In Change Management, which component addresses the procedures needed to undo changes?

Rollback

36
New cards

Which of the following properties is NOT guaranteed by Digital Signatures?

Confidentiality

37
New cards

Which devices have the PRIMARY objective of collecting and analyzing security events?

SIEM

38
New cards

What is an effective way of hardening a system?

Patch the system

39
New cards

Which type of key can be used to both encrypt and decrypt the same message?

A symmetric key

40
New cards

Which regulations address data protection and privacy in Europe?

GDPR (The General Data Protection Regulation)

41
New cards

Which of the following types of devices inspect packet header information to either allow or deny network traffic?

Firewalls

42
New cards

A web server that accepts requests from external clients should be placed in which network?

DMZ

43
New cards

Sensitivity is a measure of the …:

importance assigned to information by its owner, or the purpose of representing its need for protection

44
New cards

How many data labels are considered good practice?

2 - 3

45
New cards

Security posters are an element PRIMARILY employed in:

Security Awareness

46
New cards

Which of these types of user is LESS likely to have a privileged account?

External Worker

47
New cards

Which of the following is NOT an element of System Security Configuration Management?

Audit logs

48
New cards

Which are the components of an incident response plan?

Preparation -> Detection and Analysis -> Containment, Eradication and Recovery -> Post-Incident Activity

49
New cards

Which of the following is an example of 2FA?

One-Time passwords (OTA)

50
New cards

The predetermined set of instructions or procedures to sustain business operations after a disaster is commonly known as:

Business Continuity Plan

51
New cards

Which of the following is NOT a feature of a cryptographic hash function?

Reversible

52
New cards

Which are the three packets used on the TCP connection handshake?

SYN → SYN/ACK → ACK

53
New cards

After an earthquake disrupting business operations, which document contains the procedures required to return business to normal operation?

The Disaster Recovery Plan

54
New cards

Which of these tools is commonly used to crack passwords?

John the Ripper

55
New cards

What is the consequence of a Denial Of Service attack?

Exhaustion of device resources

56
New cards

According to ISC2, which are the six phases of data handling?

Create -> Store -> Use -> Share -> Archive -> Destroy

57
New cards

Which of the following is less likely to be part of an incident response team?

Human Resources

58
New cards

In order to find out whether personal tablet devices are allowed in the office, which of the following policies would be

helpful to read?

BYOD

59
New cards

In which cloud deployment model do companies share resources and infrastructure on the cloud?

Community cloud

60
New cards

Which of these is the PRIMARY objective of a Disaster Recovery Plan?

Restore company operation to the last-known reliable operation state