Agile Quiz: USB Removable Media Restriction Policy

LivelyOrchid avatar
LivelyOrchid
·
·
Download

Start Quiz

Study Flashcards

28 Questions

Which of the following will increase cryptographic security?

High data entropy

What BEST describes zero-day exploits?

A zero-day exploit is initially undetectable, and no patch for it exists.

In order to restrict PHI documents, what should be performed FIRST?

Classification

Which attack has taken place based on the provided server output?

DNS poisoning

What type of attack is described when a user inside a company network receives a certificate mismatch warning when trying to access a website?

On-path

Which tool is effective in preventing a user from accessing unauthorized removable media?

USB data blocker

What solution would BEST meet the requirements of increased scalability and flexibility for back-end infrastructure mentioned by the Chief Security Officer?

Reverse proxy

Which social engineering technique seeks to exploit a person's sense of urgency?

A phishing email stating a cash settlement has been awarded but will expire soon

In the scenario described, which attack involves redirecting network traffic to an attacker-controlled system?

On-path

What is a cost-effective physical control to enforce a USB removable media restriction policy?

Implementing a GPO to restrict access to authorized USB removable media

What security measure can be used to physically block data exchange via USB ports?

USB data blocker

What security control can be implemented when a company suspects compromised accounts due to suspicious logins from unknown locations?

Enforce MFA when an account request reaches a risk threshold

Which action is NOT a suitable method for protecting accounts of traveling employees while avoiding blocking legitimate login requests?

Enforce VPN usage for all remote login attempts

Which method is most effective for an organization looking to share threat intelligence with peer groups?

Subscribing to threat intelligence feeds

What is the BEST way to enforce a restriction policy on USB removable media?

Employing physical locks on USB ports and restricting access

What is a common security measure taken to prevent unauthorized access through compromised accounts?

Employing anomaly detection to flag suspicious login attempts

What provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?

CVSS

In a collaborative research project where universities need to share compute and storage resources, which cloud deployment strategy would BEST meet this need?

Community

To prove that data has not been tampered with since it was collected, a forensic analyst will MOST likely use which method?

Calculate the checksum using a hashing algorithm

After a public website's credentials database was leaked, leading to compromised business accounts, what would BEST mitigate the issue?

Password history

To fingerprint a web server, what tool would a security analyst MOST likely use?

dig 192.168.0.10

What could be used to prioritize mitigation steps for known vulnerabilities in an organization?

SOAR

What type of account is MOST appropriate for a security analyst to share a file for further incident analysis?

Service

When a security analyst shares a file named host1.pcap for further incident analysis, what tool is the team member MOST likely to use to open this file?

Wireshark

If an application developer accidentally uploads a company's code-signing certificate private key to a public web server, what should the company do FIRST?

Revoke the code-signing certificate

An organization compares system settings against secure configuration guidelines. What type of control has the organization implemented?

Detective

To reduce the risk of unsanctioned high-risk SaaS applications, what is the BEST security solution recommended by the Chief Information Security Officer?

CASB

If an organization wants to block unsanctioned high-risk SaaS applications from user access, what could be an effective security measure?

VPN concentrator

Test your knowledge on cost-effective physical controls for enforcing a USB removable media restriction policy. Choose the best example among the given options.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser