Information Security Concerns Quiz
17 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of control is a file integrity monitoring tool?

  • Deterrent
  • Preventive
  • Directive
  • Detective (correct)
  • If Theresa is worried about her maintenance window exceeding allocated time, which element of the CIA triad is she concerned about?

  • Availability (correct)
  • Accessibility
  • Criticality
  • Integrity
  • To prevent vehicle impacts on her organization's backup generator near a parking lot, what should Alaina install?

  • Bollards (correct)
  • A chain-link fence
  • A speed bump
  • An access control vestibule
  • What best describes a policy or procedure in terms of security controls?

    <p>Directive</p> Signup and view all the answers

    Which security control type is most effective for reducing the threat scope of compromised credentials?

    <p>Multifactor authentication (MFA)</p> Signup and view all the answers

    What control type best describes a data loss prevention (DLP) tool that inspects and flags specific data types before emails are sent outside the organization?

    <p>Preventive</p> Signup and view all the answers

    What type of vulnerability allows software running on a virtual machine to execute code on the system running the VM hypervisor?

    <p>A VM escape issue</p> Signup and view all the answers

    Which hardening option is best suited to protect an organization from ransomware attacks targeting workstations?

    <p>Installing endpoint protection software</p> Signup and view all the answers

    In the context of wireless networks, which option is considered the most secure?

    <p>WPA-2 Enterprise</p> Signup and view all the answers

    Which type of attack relies on the attacker entering JavaScript into a text area meant for user input, leading to code execution when viewed by other users?

    <p>Cross-site scripting</p> Signup and view all the answers

    What element of threat intelligence is associated with unusual outbound network traffic, geographical irregularities, and database read volume increases?

    <p>Indicators of compromise</p> Signup and view all the answers

    What technique is used to make a password harder to crack by making it harder to test possible keys during a brute-force attack?

    <p>Key stretching</p> Signup and view all the answers

    Which control category does log monitoring fall under?

    <p>Technical</p> Signup and view all the answers

    Which of the following is NOT a common technique to make passwords harder to crack?

    <p>Encrypting password plain text using symmetric encryption</p> Signup and view all the answers

    What do Diffie-Hellman and RSA represent in the field of encryption?

    <p>Key exchange algorithms</p> Signup and view all the answers

    Which process should Sally create to handle the possibility of a failed change in her change management process?

    <p>A backout plan</p> Signup and view all the answers

    In the context of password security, what is the term for making a password more complex by increasing the time and resources required to crack it?

    <p>Stretching the key</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser