17 Questions
What type of control is a file integrity monitoring tool?
Detective
If Theresa is worried about her maintenance window exceeding allocated time, which element of the CIA triad is she concerned about?
Availability
To prevent vehicle impacts on her organization's backup generator near a parking lot, what should Alaina install?
Bollards
What best describes a policy or procedure in terms of security controls?
Directive
Which security control type is most effective for reducing the threat scope of compromised credentials?
Multifactor authentication (MFA)
What control type best describes a data loss prevention (DLP) tool that inspects and flags specific data types before emails are sent outside the organization?
Preventive
What type of vulnerability allows software running on a virtual machine to execute code on the system running the VM hypervisor?
A VM escape issue
Which hardening option is best suited to protect an organization from ransomware attacks targeting workstations?
Installing endpoint protection software
In the context of wireless networks, which option is considered the most secure?
WPA-2 Enterprise
Which type of attack relies on the attacker entering JavaScript into a text area meant for user input, leading to code execution when viewed by other users?
Cross-site scripting
What element of threat intelligence is associated with unusual outbound network traffic, geographical irregularities, and database read volume increases?
Indicators of compromise
What technique is used to make a password harder to crack by making it harder to test possible keys during a brute-force attack?
Key stretching
Which control category does log monitoring fall under?
Technical
Which of the following is NOT a common technique to make passwords harder to crack?
Encrypting password plain text using symmetric encryption
What do Diffie-Hellman and RSA represent in the field of encryption?
Key exchange algorithms
Which process should Sally create to handle the possibility of a failed change in her change management process?
A backout plan
In the context of password security, what is the term for making a password more complex by increasing the time and resources required to crack it?
Stretching the key
Test your knowledge on information security concerns related to the CIA triad and physical security measures. Questions involve scenarios where individuals are worried about aspects like availability and preventing physical damage to equipment.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free