Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

Which aspect of security alerting and monitoring is focused on ensuring that specific software solutions, such as databases or CRM tools, are functioning securely and are not compromised by external threats?
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question

Kelly Innovations LLC has implemented a firewall to secure its mission-critical financial system. Given that any downtime would result in substantial financial losses, which failure mode should the firewall be set to if it experiences a malfunction?
Remaining cards (89)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Set1 test3

QuestionAnswer
Which aspect of security alerting and monitoring is focused on ensuring that specific software solutions, such as databases or CRM tools, are functioning securely and are not compromised by external threats? Applications Monitorin
Kelly Innovations LLC has implemented a firewall to secure its mission-critical financial system. Given that any downtime would result in substantial financial losses, which failure mode should the firewall be set to if it experiences a malfunction? Fail-open
Which of the following network technologies separates the control plane from the data plane, allowing for more flexibility and automation in network management? Software defined networking
Cheryl's job at Kelly Innovations LLC involves maintaining a record of all company-owned smartphones. Which of the following is MOST likely to be Cheryl's role at Kelly Innovations? Asset Inventory Manager
Emily, the network security administrator, noticed an unexpected surge in network traffic late at night. She suspects that this could be malicious activity. Which of the following controls should Emily rely on to detect and respond to this? IDS/IPS
Kevin found that the script had been modified to contain a dormant code segment set to activate at a specific date and time. Which type of malware has MOST likely infected Kevin's scripts? Logic Bomb
The company's new solution allows employees to log in using their face or fingerprint. What passwordless approach has LunarSoft incorporated? Biometric authentication
Troubled, he delved into his computer's activities but couldn't find any unusual software running. Which of the following types of malware is MOST likely responsible for capturing and transmitting Martin's password? KEYLOGGER
In the process of deploying a new software application within Kelly Innovations LLC, the IT team identified that a certain module wouldn't function unless another software was already installed. Which of the following BEST describes this situation? Encountering a software dependency
What part of a BPA for mission essential functions provides a detailed, step-by-step description of the procedural tasks performed? Process Flow
Nicola, an IT manager, is considering an encryption method that uses public and private keys for encryption and decryption. What type of encryption is being considered? Asymmetric encryption
Sasha, started conducting training sessions for the employees on security policies. She's also distributed awareness materials and set up monitoring tools to gauge the program's effectiveness. Which phase of security awareness practices is Sasha in? Execution
Which of the following is a form of obfuscation where data strings are replaced with a single character like an X or a * but the structure of the data string remains the same? Data masking
Which of the following BEST represents a primary goal when seeking evidence of internal audits from a third-party vendor? Verification of compliance with internal security audits
Before implementing a change in the organization's critical infrastructure, it's essential to ensure the proposed modification is assessed, reviewed, and authorized. Which process ensures that these steps are followed? Approval Process
You want to use a mitigation technique that can help you protect systems from various attacks by installing software that can provide antivirus, firewall, anti-malware.Which of the following mitigation techniques can help you achieve this goal? Installation of endpoint protection
They need a document that provides detailed instructions and requirements for the software development project that will include features the software should have, when the work must finished, and other essential details. SOW - statement of work or Work order
They wish to employ a method that ensures the data on these drives is completely unrecoverable. Sasha suggests hitting the drives with a hammer. Given that this is not the most effective solution, which of the following is the BEST method to use? pulverizing with industrial machinery
Which of the following provides short-term emergency power to a device when the input power source fails, allowing for either proper system shutdown or switching to a long-term power source? UPS
What is the name of the web-based attack that involves entering malicious code into user input fields that are executed by a database server? SQL Injection Structured query language injection
Which of the following statements is NOT true about the importance of continuous integration in relation to secure operations? Continous Integration may slow down the dev process but it provide sfar more secure systems overall
Which of the following statements BEST explains the Acquisition as part of the incident response activities? Acquistition involves obtaining a clean copy of the data from a device so it can be sed as evidence
Dion Training is concerned with protecting data in as it moves from Dion's computers to its cloud servers. Which of the following BEST describes the primary method to secure data when it is being transmitted over a network? Using transport encryption protocols like IPSEC
Which of the following tools is MOST known for agentless security monitoring/alerting? Security information and event management
Which of the following statements BEST explains the importance of the workforce multiplier? Workforce multiplier enables organizations to rapidly scale their security capabilities using a combination of human and automated resources
Which of the following backup methods involvesREAL-TIME replication of every transaction made within a system? Journaling is a form of backup that involves recording all transactions in a system which can be used to restore the system to a previous state.
Dion Training is establishing a security architecture that requires distinct levels of access, such as differentiating between employee and guest access and ensuring only authorized personnel can access sensitive data. what is this? Security Zones
Which of the following motivations refers to the act of threatening to expose someone's secrets unless they comply with certain demands? Blackmail
In the realm of systems and data management, who is primarily responsible for determining the classification of data and ensuring it aligns with organizational policies? Data Owner
Which of the following is MOST indicative of a voice call threat? A caller posing as tech support to to obtain passwords
Which of the following is MOST indicative of a voice call threat? End-of-Life
Further analysis revealed that these permissions weren't granted through the company's formal access control procedure. Enrique suspected an external intervention that could have allowed Jamario's account to bypass the standard role-based permissions. Privlidge Escalation
you have discovered that the company is currently utilizing a deprecated encryption protocol that poses a significant security threat. Which of the following is the MOST appropriate encryption protocol? AES
To prevent employees from accidentally accessing such media in the future, which of the following solutions would be MOST effective? Implementing Content Categorization
As organizations grow and expand their digital operations, how can automation and orchestration assist in maintaining security posture? Enables consistent security standards during scaling
Which of the following terms is used to describe the probability or frequency of a risk occurring in a given time frame? Likelihood
In a compliance workshop at Dion Training, a team is discussing the ramifications of not adhering to industry standards and data protection laws. Which of the following outcomes of non-adherence would result in Dion Training having to pay money? Fines
Which of the following objectives is primarily fulfilled by using questionnaires during vendor assessments? to obtain detailed insights into the vendors security posture
Which of the following types of threat actors are the least likely to have extensive knowledge of their target and hacking techniques? (Select TWO.) script kiddie, unskilled attacker
To ensure that critical encryption keys are available for recovery in case of emergencies, Kelly Innovations LLC has stored a copy of these keys with a trusted third party. Which cryptographic solution is Kelly Innovations LLC using? Key escrow
Which of the following is a type of security incident that involves unauthorized disclosure of sensitive data due to INSECURE SETTINGS IN SYSTEMS? Misconfiguration is a type of human error that involves setting up SYSTEMS or services with incorrect or INSECURE SETTINGS
His organization wants to implement an additional authentication method that considers his geographic location before granting access to sensitive systems. Which factor of multifactor authentication is the organization planning to use? Somewhere you are
She also observes that the source IP addresses for these attempts are from different countries. Which of the following indicators of malicious activity is MOST likely present in this scenario? impossible travel
. He wants to ensure that users can access unencrypted web pages on the server and transfer files to and from it. Jamario should ensure which of the following ports are open? (Select TWO.) 80,21
Which statement BEST captures the role of the Policy Administrator within the Zero Trust paradigm? Manages and updates security policies for access control
Which of the following statements BEST explains the importance of E-discovery in incident response? E-discovery requires the examining of drivers to find data that is electronically stored to use it as evidence
A new regulation requires more exacting controls over system responses to errors. Milieu Solutions has decided to implement a solution that will shut down transactions if network errors occur. fail-closed
Which of the following statements regarding data retention in the disposal process is NOT true? Data retention implies storing all data indefinitely as it might be needed at some point
Which of the following statements BEST explains the function of an Exposure Factor in the context of vulnerability management? An exposure factor measures the likelihood of a vulnerability being exploited
What type of the threat actor is motivated by beliefs about politics and often targets organizations they disagree with? Hacktivists
Which of the following terms is used to describe a situation where a security system or tool incorrectly flags an action or event as malicious or harmful, even though it's actually benign? False Positive
Which of the following terms BEST describes the measurement used to describe a 7% possibility of hardware failure in the next year based on past statistical data? Possibility
Kelly Innovations LLC is seeking a solution to encrypt a virtual disk drive that contains archived financial data without encrypting the entire physical disk. Which encryption level would be BEST for this requirement? Volume encryption
Then he directed them to look at both the likelihood that an incident will occur and the potential economic, business, and resource fallout if the incident occurs to create a numerical score for each. Which of the following risk assessment method Quantatative
Which of the following terms refers to entities that establish and enforce security standards, regulations, and guidelines across specific sectors such as finance and healthcare? Regulatory agencies
What is the primary responsibility of a data custodian in the realm of data governance? enforces security controls for the safe transport and storage of data
When implementing a virtualization solution, which of the following considerations is essential to ensure that the virtual machines have sufficient resources to perform tasks efficiently? COMPUTE
Which US act requires federal agencies to develop security policies for computer systems that process confidential information? Computer security act of 1987
Dion Training Solutions has partnered with several smaller companies. They set up a system allowing employees from any company to access resources from another partner company without requiring a separate username and password. This is an example of: Federation
State banking regulations require that all communications be secure even when traveling across unsecured networks. Which of the following will provide the Best solution to the challenge faced by Log Cabin Bank. VPN
Given that cloud architecture provides dynamic resource allocation, which of the following security considerations is MOST critical when dealing with the compute component? Ensuring isolation between the instances
They have always converted passwords to fixed length sequences, but now they will do this process more than once to increase the amount of computing power and time it will take for an attacker to decode the password. What is this method known as? Key Stretching is repeatedly hashing
His bosswants to purchase a storage device to save symmetric and asymmetric keys. Royston has explained that the Windows-based devices they use have this type of storage embedded in the motherboards. What is the name of the device TPM
Upon investigation, it is discovered that an attacker was able to exploit a vulnerability in the encryption used to protect data in transit. Which of the following is the MOST likely cause of this issue? Cryptographic vulnerability
To improve its endpoint security, the company has decided to implement (EDR) capabilities across its network. Which of the following choices BEST explains Dizzy Crows would implement Endpoint Detection and Response (EDR) in the given scenario? EDR provides behavorial analysis and threat detection to detect and respond to cyber threats
Which of the following terms refers to a list that explicitly grants access or permissions to specific entities, while all others are implicitly denied? Allow List
Kelly Innovations has observed that their network devices are receiving requests that require secure and private interactions, originating from unidentified sources. The IT department hasn’t identified similar requests on other parts of the network. TLS
Which of the following BEST describes the primary objective of an integrated penetration test? to asses physical , software, and network layers
Which of the following refers to a vulnerability in software that is unknown to the vendor and often exploited by malicious actors before a patch is released? zero day
Which system offers a consistent and standardized method for naming and referring to specific publicly known security vulnerabilities and exposures in software and systems? CVE
Which of the following cryptographic techniques uses the same key for both encryption and decryption processes, making it essential that the key remains secret and is shared securely among the involved parties? AES
Which of the following statements BEST explains the importance of considering single points of failure? Mitigating single points of failure is crucial to maintain the availability and reliability of automated security operations
When aiming to limit access between different parts of a network to reduce the potential impact of compromised systems, which activity is MOST directly applied? Network segmentation
The message accompanying the timer indicated that unless a certain amount in cryptocurrency was transferred to a specific address before the countdown ended, the decryption key would be destroyed permanently. Which form of malware is this crypto ransom malware
Dion Training is planning to expand its online services, including launching multiple subdomains for different courses. They want a single certificate that can secure all these subdomains. Which type of certificate should Dion Training consider? Wildcard
Which of the following network designs involves using air-gapping, disconnecting cables, or locking devices to prevent unauthorized access or interference? Physical Isolation
A healthcare organization wants to ensure that patient medical records are kept confidential when transmitted between facilities. Which of the following techniques would be the MOST effective in safeguarding this data during transmission? SFTP provides secure data transfer, end-to-end encryption.
An attacker uses a phone call to impersonates a bank representative in order to gather sensitive customer information. Which of the following threat vectors does this describe? Vishing
A security analyst is investigating a malware incident and finds that the malware has encrypted the data or files on the system and demands money for their decryption or restoration. Which of the following types of malware is this Ransomware
Which of the following best describes a governance model where decision-making authority is restricted to a few individuals at the top of the organizational hierarchy? Centralized Governance
Which of the following email security techniques specifically utilizes email certificates to authenticate and safeguard email content? S/MIME
A security researcher discovers a new vulnerability in an operating system . He reports the vulnerability to the vendor and the vendor releases a patch. What type of vulnerability is did the researcher find? Zero-Day
The market has a high risk, high reward profile, but it will be difficult to break into the current market. Henry suggests that they wait and see if the market changes and becomes easier to enter. Which risk strategy is Henry using? Avoid
An organization has recently decided to utilize multiple operating systems and applications on a single physical server to optimize resource usage and reduce costs. Which of the following BEST represents this approach? Virtualization
At Dion Training, promoting security awareness is paramount. To fortify organizational data protection, what should Dion Training do to uphold and enhance password management best practices? Instruct users to create strong, unique passwords fr each account
Which of the following terms specifically represents the target duration for recovering IT and business operations after a disruptive event? RTO
Which of the following statements BEST explains the importance of Root Cause Analysis in incident response? Root cause analysis helps to understand how the incident occurred and how to prevent it from occuring
Which of the following BEST describes the action taken when a file is quarantined during an alert response? Access to the original file is denied by the user q
Which of the following BEST describes a process used to identify differences between the current state of a system and its desired future state? Gap analysis
Which of the following MOST accurately describes a reason for implementing a data retention policy? The ensure compliance with legal and regulatory
Created by: Studyingsux
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards