1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Which type of attack has the PRIMARY objective controlling the system from outside?
Backdoor
Which of the following is not a protocol of the OSI Level 3?
SNMP
When a company hires an insurance company to mitigate risk, which risk management technique is being applied?
Risk transfer
The SMTP protocol operates at OSI Level:
7
The process of verifying or proving the user's identification is known as:
Authentication
If an organization wants to protect itself against tailgating, which of the following types of access control would be most effective?
Turnstiles
Logging and monitoring systems are essential to:
Identifying inefficient performing systems, detecting compromises, and providing a record of how systems are used
In the event of a disaster, which of these should be the PRIMARY objective?
Guarantee the safety of people
The process that ensures that system changes do not adversely impact business operations is known as:
Change Management
The last phase in the data security cycle is:
Destruction
Which access control model specifies access to an object based on the subject's role in the organization?
RBAC
Which of the following is NOT an example of a physical security control?
Firewalls
Which type of attack will most effectively maintain remote access and control over the victim's computer?
Rootkits
In incident terminology, the meaning of Zero Day is:
A previously unknown system vulnerability
Which of the following is NOT a possible model for an Incident Response Team (IRT)?
Pre-existing
A device found not to comply with the security baseline should be:
Disabled or isolated into a quarantine area until it can be checked and updated.
A biometric reader that grants access to a computer system in a data center is a:
Technical Control
Which type of attack PRIMARILY aims to make a resource inaccessible to its intended users?
Denials of Service
Which type of attack embeds malicious payload inside a reputable or trusted software?
Trojans
Which tool is commonly used to sniff network traffic?
Wireshark
Which of these is not an attack against an IP network?
Side-channel Attack
The detailed steps to complete tasks supporting departmental or organizational policies are typically documented in:
Procedures
Which device is used to connect a LAN to the Internet?
Router
What does SIEM mean?
Security Information and Event Manager
A Security safeguard is the same as a:
Security control
Which access control model can grant access to a given object based on complex rules?
ABAC
Which port is used to secure communication over the web (HTTPS)?
443
Which of these has the PRIMARY objective of identifying and prioritizing critical business processes?
Business Impact Analysis
Which of the following are NOT types of security controls?
Storage controls
Which of the following is NOT a type of learning activity used in Security Awareness?
Tutorial
The magnitude of the harm expected as a result of the consequences of an unauthorized disclosure, modification,
destruction, or loss of information, is known as the:
Impact
The implementation of Security Controls is a form of:
Risk reduction
Which of the following attacks take advantage of poor input validation in websites?
Cross-Site Scripting
Which of the following is an example of an administrative security control?
Acceptable Use Policies
In Change Management, which component addresses the procedures needed to undo changes?
Rollback
Which of the following properties is NOT guaranteed by Digital Signatures?
Confidentiality
Which devices have the PRIMARY objective of collecting and analyzing security events?
SIEM
What is an effective way of hardening a system?
Patch the system
Which type of key can be used to both encrypt and decrypt the same message?
A symmetric key
Which regulations address data protection and privacy in Europe?
GDPR (The General Data Protection Regulation)
Which of the following types of devices inspect packet header information to either allow or deny network traffic?
Firewalls
A web server that accepts requests from external clients should be placed in which network?
DMZ
Sensitivity is a measure of the …:
importance assigned to information by its owner, or the purpose of representing its need for protection
How many data labels are considered good practice?
2 - 3
Security posters are an element PRIMARILY employed in:
Security Awareness
Which of these types of user is LESS likely to have a privileged account?
External Worker
Which of the following is NOT an element of System Security Configuration Management?
Audit logs
Which are the components of an incident response plan?
Preparation -> Detection and Analysis -> Containment, Eradication and Recovery -> Post-Incident Activity
Which of the following is an example of 2FA?
One-Time passwords (OTA)
The predetermined set of instructions or procedures to sustain business operations after a disaster is commonly known as:
Business Continuity Plan
Which of the following is NOT a feature of a cryptographic hash function?
Reversible
Which are the three packets used on the TCP connection handshake?
SYN → SYN/ACK → ACK
After an earthquake disrupting business operations, which document contains the procedures required to return business to normal operation?
The Disaster Recovery Plan
Which of these tools is commonly used to crack passwords?
John the Ripper
What is the consequence of a Denial Of Service attack?
Exhaustion of device resources
According to ISC2, which are the six phases of data handling?
Create -> Store -> Use -> Share -> Archive -> Destroy
Which of the following is less likely to be part of an incident response team?
Human Resources
In order to find out whether personal tablet devices are allowed in the office, which of the following policies would be
helpful to read?
BYOD
In which cloud deployment model do companies share resources and infrastructure on the cloud?
Community cloud
Which of these is the PRIMARY objective of a Disaster Recovery Plan?
Restore company operation to the last-known reliable operation state