Quix3 - 50Q

Beschreibung

Good Luck!
Requiemdust Sheena
Quiz von Requiemdust Sheena, aktualisiert more than 1 year ago
Requiemdust Sheena
Erstellt von Requiemdust Sheena vor mehr als 4 Jahre
34
0

Zusammenfassung der Ressource

Frage 1

Frage
Which one of the following actions is not normally part of the project scope and planning phase of business continuity planning?
Antworten
  • A. Structured analysis of the organization
  • B. Review of the legal and regulatory landscape
  • C. Creation of a BCP team
  • D. Documentation of the plan

Frage 2

Frage
Gary is implementing a new website architecture that uses multiple small web servers behind a load balancer. What principle of information security is Gary seeking to enforce?
Antworten
  • A. Denial
  • B. Confidentiality
  • C. Integrity
  • D. Availability

Frage 3

Frage
Becka recently signed a contract with an alternate data processing facility that will provide her company with space in the event of a disaster. The facility includes HVAC, power, and communications circuits but no hardware. What type of facility is Becka using?
Antworten
  • A. Cold site
  • B. Warm site
  • C. Hot site
  • D. Mobile site

Frage 4

Frage
Ben is seeking a control objective framework that is widely accepted around the world and focuses specifically on information security controls. Which one of the following frameworks would best meet his needs?
Antworten
  • A. ITIL
  • B. ISO 27002
  • C. CMM
  • D. PMBOK Guide

Frage 5

Frage
Which one of the following agreements typically requires that a vendor not disclose confidential information learned during the scope of an engagement?
Antworten
  • A. NCA
  • B. SLA
  • C. NDA
  • D. RTO

Frage 6

Frage
What issue is the validation portion of the NIST SP 800-88 sample certificate of sanitization (shown here) intended to help prevent?
Antworten
  • A. Destruction
  • B. Reuse
  • C. Data remanence
  • D. Attribution

Frage 7

Frage
Why is declassification rarely chosen as an option for media reuse?
Antworten
  • A. Purging is sufficient for sensitive data.
  • B. Sanitization is the preferred method of data removal.
  • C. It is more expensive than new media and may still fail.
  • D. Clearing is required first.

Frage 8

Frage
Incineration, crushing, shredding, and disintegration all describe what stage in the lifecycle of media?
Antworten
  • A. Sanitization
  • B. Degaussing
  • C. Purging
  • D. Destruction

Frage 9

Frage
The European Union (EU) General Data Protection Regulation (GDPR) does not include which of the following key elements?
Antworten
  • A. The need to collect information for specified, explicit, and legitimate purposes
  • B. The need to ensure that collection is limited to the information necessary to achieve the stated purpose
  • C. The need to protect data against accidental destruction
  • D. The need to encrypt information at rest

Frage 10

Frage
Why might an organization use unique screen backgrounds or designs on workstations that deal with data of different classification levels?
Antworten
  • A. To indicate the software version in use
  • B. To promote a corporate message
  • C. To promote availability
  • D. To indicate the classification level of the data or system

Frage 11

Frage
Alice has read permissions on an object, and she would like Bob to have those same rights. Which one of the rules in the Take-Grant protection model would allow her to complete this operation?
Antworten
  • A. Create rule
  • B. Remove rule
  • C. Grant rule
  • D. Take rule

Frage 12

Frage
As part of his incident response process, Charles securely wipes the drive of a compromised machine and reinstalls the operating system (OS) from original media. Once he is done, he patches the machine fully and applies his organization’s security templates before reconnecting the system to the network. Almost immediately after the system is returned to service, he discovers that it has reconnected to the same botnet it was part of before. Where should Charles look for the malware that is causing this behavior?
Antworten
  • A. The operating system partition
  • B. The system BIOS or firmware
  • C. The system memory
  • D. The installation media

Frage 13

Frage
Which one of the following computing models allows the execution of multiple concurrent tasks within a single process?
Antworten
  • A. Multitasking
  • B. Multiprocessing
  • C. Multiprogramming
  • D. Multithreading

Frage 14

Frage
Alan intercepts an encrypted message and wants to determine what type of algorithm was used to create the message. He first performs a frequency analysis and notes that the frequency of letters in the message closely matches the distribution of letters in the English language. What type of cipher was most likely used to create this message?
Antworten
  • A. Substitution cipher
  • B. AES
  • C. Transposition cipher
  • D. 3DES

Frage 15

Frage
Lauren’s networking team has been asked to identify a technology that will allow them to dynamically change the organization’s network by treating the network like code. What type of architecture should she recommend?
Antworten
  • A. A network that follows the 5-4-3 rule
  • B. A converged network
  • C. A software-defined network
  • D. A hypervisor-based network

Frage 16

Frage
Cable modems, ISDN, and DSL are all examples of what type of technology?
Antworten
  • A. Baseband
  • B. Broadband
  • C. Digital
  • D. Broadcast

Frage 17

Frage
What type of firewall design is shown in the following image?
Antworten
  • A. Single tier
  • B. Two tier
  • C. Three tier
  • D. Next generation

Frage 18

Frage
During a review of her organization’s network, Angela discovered that it was suffering from broadcast storms and that contractors, guests, and organizational administrative staff were on the same network segment. What design change should Angela recommend?
Antworten
  • A. Require encryption for all users.
  • B. Install a firewall at the network border.
  • C. Enable spanning tree loop detection.
  • D. Segment the network based on functional requirements.

Frage 19

Frage
ICMP, RIP, and network address translation all occur at what layer of the OSI model?
Antworten
  • A. Layer 1
  • B. Layer 2
  • C. Layer 3
  • D. Layer 4

Frage 20

Frage
Kathleen works for a data center hosting facility that provides physical data center space for individuals and organizations. Until recently, each client was given a magnetic-strip-based keycard to access the section of the facility where their servers are located, and they were also given a key to access the cage or rack where their servers reside. In the past month, a number of servers have been stolen, but the logs for the passcards show only valid IDs. What is Kathleen’s best option to make sure that the users of the passcards are who they are supposed to be?
Antworten
  • A. Add a reader that requires a PIN for passcard users.
  • B. Add a camera system to the facility to observe who is accessing servers.
  • C. Add a biometric factor.
  • D. Replace the magnetic stripe keycards with smartcards.

Frage 21

Frage
Which of the following is a ticket-based authentication protocol designed to provide secure communication?
Antworten
  • A. RADIUS
  • B. OAuth
  • C. SAML
  • D. Kerberos

Frage 22

Frage
What type of access control is composed of policies and procedures that support regulations, requirements, and the organization’s own policies?
Antworten
  • A. Corrective
  • B. Logical
  • C. Compensating
  • D. Administrative

Frage 23

Frage
In a Kerberos environment, when a user needs to access a network resource, what is sent to the TGS?
Antworten
  • A. A TGT
  • B. An AS
  • C. The SS
  • D. A session key

Frage 24

Frage
Which objects and subjects have a label in a MAC model?
Antworten
  • A. Objects and subjects that are classified as Confidential, Secret, or Top Secret have a label.
  • B. All objects have a label, and all subjects have a compartment.
  • C. All objects and subjects have a label.
  • D. All subjects have a label and all objects have a compartment.

Frage 25

Frage
Emily builds a script that sends data to a web application that she is testing. Each time the script runs, it sends a series of transactions with data that fits the expected requirements of the web application to verify that it responds to typical customer behavior. What type of transactions is she using, and what type of test is this?
Antworten
  • A. Synthetic, passive monitoring
  • B. Synthetic, use case testing
  • C. Actual, dynamic monitoring
  • D. Actual, fuzzing

Frage 26

Frage
What passive monitoring technique records all user interaction with an application or website to ensure quality and performance?
Antworten
  • A. Client/server testing
  • B. Real user monitoring
  • C. Synthetic user monitoring
  • D. Passive user recording

Frage 27

Frage
Earlier this year, the information security team at Jim’s employer identified a vulnerability in the web server that Jim is responsible for maintaining. He immediately applied the patch and is sure that it installed properly, but the vulnerability scanner has continued to incorrectly flag the system as vulnerable due to the version number it is finding even though Jim is sure the patch is installed. Which of the following options is Jim’s best choice to deal with the issue?
Antworten
  • A. Uninstall and reinstall the patch.
  • B. Ask the information security team to flag the system as patched and not vulnerable.
  • C. Update the version information in the web server’s configuration.
  • D. Review the vulnerability report and use alternate remediation options.

Frage 28

Frage
Angela wants to test a web browser’s handling of unexpected data using an automated tool. What tool should she choose?
Antworten
  • A. Nmap
  • B. zzuf
  • C. Nessus
  • D. Nikto

Frage 29

Frage
STRIDE, which stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege, is useful in what part of application threat modeling?
Antworten
  • A. Vulnerability assessment
  • B. Misuse case testing
  • C. Threat categorization
  • D. Penetration test planning

Frage 30

Frage
Helen is implementing a new security mechanism for granting employees administrative privileges in the accounting system. She designs the process so that both the employee’s manager and the accounting manager must approve the request before the access is granted. What information security principle is Helen enforcing?
Antworten
  • A. Least privilege
  • B. Two-person control
  • C. Job rotation
  • D. Separation of duties

Frage 31

Frage
Which one of the following is not a requirement for evidence to be admissible in court?
Antworten
  • A. The evidence must be relevant.
  • B. The evidence must be material.
  • C. The evidence must be tangible.
  • D. The evidence must be competent.

Frage 32

Frage
In which cloud computing model does a customer share computing infrastructure with other customers of the cloud vendor where one customer may not know the other’s identity?
Antworten
  • A. Public cloud
  • B. Private cloud
  • C. Community cloud
  • D. Shared cloud

Frage 33

Frage
Which of the following organizations would be likely to have a representative on a CSIRT? I. Information security II. Legal counsel III. Senior management IV. Engineering
Antworten
  • A. I, III, and IV
  • B. I, II, and III
  • C. I, II, and IV
  • D. All of the above

Frage 34

Frage
Sam is responsible for backing up his company’s primary file server. He configured a backup schedule that performs full backups every Monday evening at 9 p.m. and differential backups on other days of the week at that same time. Files change according to the information shown in the following figure. How many files will be copied in Wednesday’s backup?
Antworten
  • A. 2
  • B. 3
  • C. 5
  • D. 6

Frage 35

Frage
Victor recently took a new position at an online dating website and is responsible for leading a team of developers. He realized quickly that the developers are having issues with production code because they are working on different projects that result in conflicting modifications to the production code. What process should Victor invest in improving?
Antworten
  • A. Request control
  • B. Release control
  • C. Change control
  • D. Configuration control

Frage 36

Frage
What type of database security issue exists when a collection of facts has a higher classification than the classification of any of those facts standing alone?
Antworten
  • A. Inference
  • B. SQL injection
  • C. Multilevel security
  • D. Aggregation

Frage 37

Frage
What are the two types of covert channels that are commonly exploited by attackers seeking to surreptitiously exfiltrate information?
Antworten
  • A. Timing and storage
  • B. Timing and firewall
  • C. Storage and memory
  • D. Firewall and storage

Frage 38

Frage
Vivian would like to hire a software tester to come in and evaluate a new web application from a user’s perspective. Which of the following tests best simulates that perspective?
Antworten
  • A. Black box
  • B. Gray box
  • C. Blue box
  • D. White box

Frage 39

Frage
Referring to the database transaction shown here, what would happen if no account exists in the Accounts table with account number 1001?
Antworten
  • A. The database would create a new account with this account number and give it a $250 balance.
  • B. The database would ignore that command and still reduce the balance of the second account by $250.
  • C. The database would roll back the transaction, ignoring the results of both commands.
  • D. The database would generate an error message.

Frage 40

Frage
Which one of the following security tools is not capable of generating an active response to a security event?
Antworten
  • A. IPS
  • B. Firewall
  • C. IDS
  • D. Antivirus software

Frage 41

Frage
In virtualization platforms, what name is given to the module that is responsible for controlling access to physical resources by virtual resources?
Antworten
  • A. Guest machine
  • B. SDN
  • C. Kernel
  • D. Hypervisor

Frage 42

Frage
What term is used to describe the default set of privileges assigned to a user when a new account is created?
Antworten
  • A. Aggregation
  • B. Transitivity
  • C. Baseline
  • D. Entitlement

Frage 43

Frage
Which one of the following types of agreements is the most formal document that contains expectations about availability and other performance parameters between a service provider and a customer?
Antworten
  • A. Service-level agreement (SLA)
  • B. Operational-level agreement (OLA)
  • C. Memorandum of understanding (MOU)
  • D. Statement of work (SOW)

Frage 44

Frage
Which one of the following frameworks focuses on IT service management and includes topics such as change management, configuration management, and service level agreements?
Antworten
  • A. ITIL
  • B. PMBOK
  • C. PCI DSS
  • D. TOGAF

Frage 45

Frage
What type of malware is characterized by spreading from system to system under its own power by exploiting vulnerabilities that do not require user intervention?
Antworten
  • A. Trojan horse
  • B. Virus
  • C. Logic bomb
  • D. Worm

Frage 46

Frage
Kim is troubleshooting an application firewall that serves as a supplement to the organization’s network and host firewalls and intrusion prevention system, providing added protection against webbased attacks. The issue the organization is experiencing is that the firewall technology suffers somewhat frequent restarts that render it unavailable for 10 minutes at a time. What configuration might Kim consider to maintain availability during that period at the lowest cost to the company?
Antworten
  • A. High availability cluster
  • B. Failover device
  • C. Fail open
  • D. Redundant disks

Frage 47

Frage
What type of security issue arises when an attacker can deduce a more sensitive piece of information by analyzing several pieces of information classified at a lower level?
Antworten
  • A. SQL injection
  • B. Multilevel security
  • C. Aggregation
  • D. Inference

Frage 48

Frage
Greg is battling a malware outbreak in his organization. He used specialized malware analysis tools to capture samples of the malware from three different systems and noticed that the code is changing slightly from infection to infection. Greg believes that this is the reason that antivirus software is having a tough time defeating the outbreak. What type of malware should Greg suspect is responsible for this security incident?
Antworten
  • A. Stealth virus
  • B. Polymorphic virus
  • C. Multipartite virus
  • D. Encrypted virus

Frage 49

Frage
Richard is experiencing issues with the quality of network service on his organization’s network. The primary symptom is that packets are consistently taking too long to travel from their source to their destination. What term describes the issue Richard is facing?
Antworten
  • A. Jitter
  • B. Packet loss
  • C. Interference
  • D. Latency

Frage 50

Frage
Why should passive scanning be conducted in addition to implementing wireless security technologies like wireless intrusion detection systems?
Antworten
  • A. It can help identify rogue devices.
  • B. It can test the security of the wireless network via scripted attacks.
  • C. Their short dwell time on each wireless channel can allow them to capture more packets.
  • D. They can help test wireless IDS or IPS systems.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Unregelmäßige Verben Englisch
Janine Egli
Klausurfragen aktuell
Anne Malten
Genetik Quiz
Laura Overhoff
Thermodynamik I/II
K G
Flipped Classroom Modell
Laura Overhoff
Euro-FH // Zusammenfassung SOPS3
Robert Paul
STEP 2 VO 1. Teil
Leo Minor
Vetie - Allgemeine Pathologie
Fioras Hu
Forschungs- und Anwendungsfelder der Soziologie Teil 1
stelly Welly
Vetie Viro 2018
Anna Nie
Chirurgie 2014 Vetie
Kim Langner