Information Security Concerns Quiz
17 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of control is a file integrity monitoring tool?

  • Deterrent
  • Preventive
  • Directive
  • Detective (correct)

If Theresa is worried about her maintenance window exceeding allocated time, which element of the CIA triad is she concerned about?

  • Availability (correct)
  • Accessibility
  • Criticality
  • Integrity

To prevent vehicle impacts on her organization's backup generator near a parking lot, what should Alaina install?

  • Bollards (correct)
  • A chain-link fence
  • A speed bump
  • An access control vestibule

What best describes a policy or procedure in terms of security controls?

<p>Directive (D)</p> Signup and view all the answers

Which security control type is most effective for reducing the threat scope of compromised credentials?

<p>Multifactor authentication (MFA) (C)</p> Signup and view all the answers

What control type best describes a data loss prevention (DLP) tool that inspects and flags specific data types before emails are sent outside the organization?

<p>Preventive (B)</p> Signup and view all the answers

What type of vulnerability allows software running on a virtual machine to execute code on the system running the VM hypervisor?

<p>A VM escape issue (C)</p> Signup and view all the answers

Which hardening option is best suited to protect an organization from ransomware attacks targeting workstations?

<p>Installing endpoint protection software (D)</p> Signup and view all the answers

In the context of wireless networks, which option is considered the most secure?

<p>WPA-2 Enterprise (A)</p> Signup and view all the answers

Which type of attack relies on the attacker entering JavaScript into a text area meant for user input, leading to code execution when viewed by other users?

<p>Cross-site scripting (B)</p> Signup and view all the answers

What element of threat intelligence is associated with unusual outbound network traffic, geographical irregularities, and database read volume increases?

<p>Indicators of compromise (B)</p> Signup and view all the answers

What technique is used to make a password harder to crack by making it harder to test possible keys during a brute-force attack?

<p>Key stretching (C)</p> Signup and view all the answers

Which control category does log monitoring fall under?

<p>Technical (D)</p> Signup and view all the answers

Which of the following is NOT a common technique to make passwords harder to crack?

<p>Encrypting password plain text using symmetric encryption (A)</p> Signup and view all the answers

What do Diffie-Hellman and RSA represent in the field of encryption?

<p>Key exchange algorithms (B)</p> Signup and view all the answers

Which process should Sally create to handle the possibility of a failed change in her change management process?

<p>A backout plan (B)</p> Signup and view all the answers

In the context of password security, what is the term for making a password more complex by increasing the time and resources required to crack it?

<p>Stretching the key (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser