Information Security Concerns Quiz

WarmCornflower avatar
WarmCornflower
·
·
Download

Start Quiz

Study Flashcards

17 Questions

What type of control is a file integrity monitoring tool?

Detective

If Theresa is worried about her maintenance window exceeding allocated time, which element of the CIA triad is she concerned about?

Availability

To prevent vehicle impacts on her organization's backup generator near a parking lot, what should Alaina install?

Bollards

What best describes a policy or procedure in terms of security controls?

Directive

Which security control type is most effective for reducing the threat scope of compromised credentials?

Multifactor authentication (MFA)

What control type best describes a data loss prevention (DLP) tool that inspects and flags specific data types before emails are sent outside the organization?

Preventive

What type of vulnerability allows software running on a virtual machine to execute code on the system running the VM hypervisor?

A VM escape issue

Which hardening option is best suited to protect an organization from ransomware attacks targeting workstations?

Installing endpoint protection software

In the context of wireless networks, which option is considered the most secure?

WPA-2 Enterprise

Which type of attack relies on the attacker entering JavaScript into a text area meant for user input, leading to code execution when viewed by other users?

Cross-site scripting

What element of threat intelligence is associated with unusual outbound network traffic, geographical irregularities, and database read volume increases?

Indicators of compromise

What technique is used to make a password harder to crack by making it harder to test possible keys during a brute-force attack?

Key stretching

Which control category does log monitoring fall under?

Technical

Which of the following is NOT a common technique to make passwords harder to crack?

Encrypting password plain text using symmetric encryption

What do Diffie-Hellman and RSA represent in the field of encryption?

Key exchange algorithms

Which process should Sally create to handle the possibility of a failed change in her change management process?

A backout plan

In the context of password security, what is the term for making a password more complex by increasing the time and resources required to crack it?

Stretching the key

Test your knowledge on information security concerns related to the CIA triad and physical security measures. Questions involve scenarios where individuals are worried about aspects like availability and preventing physical damage to equipment.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser