quiz image

IT Security: Asset Inventory and Employee ID

SensibleCyclops avatar
SensibleCyclops
·
·
Download

Start Quiz

Study Flashcards

45 Questions

What is the main purpose of labeling laptops with asset inventory stickers?

To associate laptops with employee IDs for security purposes

What is a benefit of associating laptops with employee IDs?

To notify the correct employee in case of a security incident

What type of identifier is typically found on an asset inventory sticker?

Serial number or barcode

What is a security benefit of associating laptops with employee IDs?

To account for company data when an employee leaves

What can be done with an asset inventory sticker?

Associate it with an employee ID

Why is it important to associate laptops with employee IDs?

To notify the correct employee in case of a security incident

What is NOT a benefit of associating laptops with employee IDs?

Monitoring employee productivity

What happens when a security incident occurs on a device?

The correct employee is notified and provided with necessary instructions

What technique do attackers use to steal sensitive data from a target system or network?

Data exfiltration

What can be done with a device that has an asset inventory sticker?

It can be associated with an employee ID

Which security concept is the best reason for permissions on a human resources fileshare to follow the principle of least privilege?

Confidentiality

What type of vulnerability has likely been exploited in the software if a security analyst discovers abnormal outbound traffic over random high ports?

Memory injection

What is the primary purpose of data exfiltration?

To steal sensitive data from a target system or network

What is the principle of least privilege related to?

Access control

What type of attack is data exfiltration often used in?

Advanced persistent threat (APT) attack

What is the primary goal of a security awareness program?

To educate employees on security best practices

What type of vulnerability can be exploited by attackers to inject malicious code?

Memory injection

What is an important factor to consider when formulating a training curriculum plan for a security awareness program?

Channels by which the organization communicates with customers

What is the main advantage of using a serverless framework?

Reduced operational costs

What type of attack is being used by the attacker in the scenario?

Impersonating

What is the primary purpose of File Integrity Monitoring (FIM)?

To track changes to files and directories

What is Whaling?

A type of phishing attack targeting high-profile individuals

What benefit does a serverless framework provide to developers?

Ability to focus on application logic

What is the primary goal of FIM?

To track changes to files and directories

What is the advantage of using a cloud provider in a serverless framework?

The cloud provider handles server-side infrastructure

What is a characteristic of a serverless framework?

The cloud provider handles server-side infrastructure

What is a benefit of using File Integrity Monitoring (FIM)?

Ability to track changes to files and directories

What is a false positive in vulnerability scanning?

A result that indicates a vulnerability or a problem when there is none

What is the primary goal of a business email compromise (BEC) attack?

To request a fraudulent payment or wire transfer

What is a characteristic of a business email compromise (BEC) attack?

It targets employees with access to company funds or sensitive information

What is the scenario described in option A?

A business email compromise (BEC) attack

What is the purpose of the security analyst's test using nmap and a script?

To check for telnet encryption support

What is the outcome of the security analyst's test?

The telnet server supports encryption

What is the implication of the reported vulnerability?

The reported vulnerability is a false positive

What technique do attackers use in business email compromise (BEC) attacks?

Social engineering

What is the goal of a business email compromise (BEC) attacker?

To request a fraudulent payment or wire transfer

What is a key benefit of using containers in a constantly changing environment?

They are lightweight and portable

Which of the following is a benefit of microservices architectures?

Faster and more frequent delivery of software features

What is essential for a security analyst to accurately measure the overall risk to an organization when a new vulnerability is disclosed?

A full inventory of all hardware and software

What is the primary purpose of a full inventory of all hardware and software?

To prioritize remediation efforts

What technique is used to verify the authenticity and integrity of code created by a company?

Code signing

What is the purpose of code signing?

To verify the authenticity and integrity of the code

What is required to verify the digital signature used in code signing?

A public key

Why is code signing important for a company?

To ensure the authenticity and integrity of the code

What is a benefit of using code signing?

It verifies the authenticity and integrity of the code

Study Notes

Security Benefits of Asset Inventory Stickers

  • Labeling laptops with asset inventory stickers and associating them with employee IDs provides security benefits, including:
    • Notifying the correct employee in case of a security incident, enabling quick containment and minimization of damage
    • Accounting for company data when an employee leaves the organization

Data Exfiltration

  • Data exfiltration is a technique used in advanced persistent threat (APT) attacks to steal sensitive data by transmitting it through DNS queries and responses
  • A large number of unusual DNS queries to systems on the internet over short periods of time during non-business hours is a strong indicator of data exfiltration

Principle of Least Privilege

  • The principle of least privilege ensures data is protected from unauthorized access or disclosure, which is a key concept in confidentiality
  • Permissions on a human resources file share should follow the principle of least privilege to ensure confidentiality

Memory Injection Vulnerabilities

  • Memory injection vulnerabilities allow unauthorized code or commands to be executed within a software program, leading to abnormal behavior
  • This can be exploited by attackers to inject malicious code, and can be detected by unusual behavior such as generating outbound traffic over random high ports

Security Awareness Program

  • Factors to address when formulating a training curriculum plan for a security awareness program include:
    • User-based training and awareness
    • Prioritizing training based on job functions and roles

Risk Measurement

  • A full inventory of all hardware and software is essential for measuring the overall risk to an organization when a new vulnerability is disclosed
  • This allows the security analyst to identify which systems are affected by the vulnerability and prioritize remediation efforts

Code Signing

  • Code signing is a technique that uses cryptography to verify the authenticity and integrity of code created by a company
  • This ensures the authenticity of the code and can be used to verify the code's origin and integrity

Impersonation Attacks

  • Whaling is a type of phishing attack that targets high-profile individuals, such as executives, celebrities, or politicians
  • An attacker impersonating someone with authority or influence can trick the victim into performing an action, such as transferring money, revealing sensitive information, or clicking on a malicious link

File Integrity Monitoring

  • File Integrity Monitoring (FIM) is a method to secure data by detecting any changes or modifications to files, directories, or registry keys
  • FIM can help track any unauthorized or malicious changes to the data and verify the integrity and compliance of the data

Business Email Compromise Attack

  • A business email compromise (BEC) attack is a type of phishing attack that targets employees who have access to company funds or sensitive information
  • The attacker impersonates a trusted person, such as an executive, a vendor, or a client, and requests a fraudulent payment, a wire transfer, or confidential data

This quiz assesses your understanding of IT security best practices, specifically asset inventory and employee ID association. Identify the security benefits of labeling laptops with asset inventory stickers and linking them to employee IDs.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser