Chapter 10 Flashcards

(15 cards)

1
Q
  1. Which of the following does not demonstrate the need for policies?
    A. Antivirus software cannot prevent a user from downloading infected files.
    B. The most secure password is not at all secure if it’s posted on a sticky note by the computer.
    C. End users are generally not particularly bright and must be told everything.
    D. Technological security measures are dependent upon the employees’ implementation.
A

C. End users are generally not particularly bright and must be told everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q
  1. Grace is a network administrator who is trying to implement a Zero Trust architecture. Which of the following standards would be most helpful for Grace?
    A. NIST 800-171
    B. NIST 800-61
    C. NIST 800-207
    D. NIST 800-53
A

C. NIST 800-207

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What standard is the most appropriate when considering security controls?
    A. ISO 27002
    B. NIST 800-61
    C. NIST 800-205
    D. NIST 800-207
A

A. ISO 27002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following is not an example of a user password policy?
    A. Users may not keep copies of passwords in their office.
    B. Passwords must be eight characters long.
    C. A user may only share passwords with his or her assistant.
    D. Passwords may not be shared with any employee.
A

C. A user may only share passwords with his or her assistant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What should an employee do if she believes her password has been revealed to another party?
    A. If it is a trusted employee or friend, just ignore it.
    B. Change the password immediately.
    C. Notify the IT department.
    D. Ignore it.
A

B. Change the password immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following is the best reason users should be prohibited from installing software?
    A. They may not install it correctly, which could cause security problems for the workstation.
    B. They may install software that circumvents security.
    C. Software installation is often complex and should be done by professionals.
    D. If a user’s account does not have installation privileges, then it is likely that a Trojan horse will not be inadvertently installed under their account.
A

B. They may install software that circumvents security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following is not a significant security risk posed by instant messaging?
    A. Employees may send harassing messages.
    B. Employees might send out confidential information.
    C. A virus or worm might infect the workstation via instant messaging.
    D. An instant messaging program could actually be a Trojan horse.
A

A. Employees may send harassing messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following is the appropriate sequence for a change request?
    A. Business unit manager requests change > IT unit verifies request > request is implemented.
    B. Business unit manager requests change > IT unit verifies request > security unit verifies request > request is scheduled with rollback plan > request is implemented.
    C. Business unit manager requests change > IT unit verifies request > request is scheduled with rollback plan > request is implemented.
    D. Business unit manager requests change > IT unit verifies request > security unit verifies request > request is implemented.
A

B. Business unit manager requests change > IT unit verifies request > security unit verifies request > request is scheduled with rollback plan > request is implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following is a list of items that should be implemented in all secure code?

A. All code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication activity thoroughly documented
B. All code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication adheres to organizational guidelines, all communication activity thoroughly documented
C. All code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication adheres to organizational guidelines
D. All code checked for backdoors or Trojans, all communication adheres to organizational guidelines, all communication activity thoroughly documented

A

B. All code checked for backdoors or Trojans, all buffers have error handling to prevent buffer overruns, all communication adheres to organizational guidelines, all communication activity thoroughly documented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What must all user policies have in order to be effective?
    A. They must be reviewed by an attorney.
    B. They must state consequences.
    C. They must be notarized.
    D. They must be properly filed and maintained.
A

B. They must state consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following is the appropriate sequence of events for a new employee?
    A. IT is notified of the new employee and the requested resources > employee is granted access to those resources > employee is briefed on security/acceptable use > employee signs acknowledging receipt of a copy of security rules.
    B. IT is notified of the new employee and the requested rights > employee is given access to those resources > employee signs acknowledging a receipt of a copy of security rules.
    C. IT is notified of the new employee and assigns default rights > employee is briefed on security/acceptable use > employee signs acknowledging receipt of a copy of security rules.
    D. IT is notified of the new employee and assigns default rights > employee signs acknowledging receipt of company security rules.
A

A. IT is notified of the new employee and the requested resources > employee is granted access to those resources > employee is briefed on security/acceptable use > employee signs acknowledging receipt of a copy of security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. After dealing, on a technical level, with any security breach, what is the last thing to be done for a security breach?
    A. Quarantine infected machines.
    B. Study the breach to learn how to prevent recurrence.
    C. Notify management.
    D. Log the incident.
A

C. Notify management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is the rule in access control?
    A. Grant the most access you can securely give.
    B. Grant the least access job requirements allow.
    C. Grant standard access for all users.
    D. Strictly limited access for most users.
A

B. Grant the least access job requirements allow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following is the appropriate sequence of events for a departing employee?
    A. IT is notified of the departure > all logon accounts are shut down > all access (physical and electronic) is disabled.
    B. IT is notified of the departure > all logon accounts are shut down > all access (physical and electronic) is disabled > the employee’s workstation is searched/scanned.
    C. IT is notified of the departure > all physical access is shut down > all electronic access is shut down.
    D. IT is notified of the departure > all electronic access is shut down > all physical access is shut down.
A

B. IT is notified of the departure > all logon accounts are shut down > all access (physical and electronic) is disabled > the employee’s workstation is searched/scanned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is the first step when discovering a machine(s) has been infected with a virus?
    A. Log the incident.
    B. Scan and clean the infected machine(s).
    C. Notify appropriate management.
    D. Quarantine the infected machine(s).
A

D. Quarantine the infected machine(s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly