Topic 13: New Questions B
Match the name of access control model with its associated restriction.
Drag each access control model to its appropriate restriction access on the right.
In Disaster Recovery (DR) and Business Continuity (DC) training, which BEST describes a
functional drill?
A.
a functional evacuation of personnel
B.
a specific test by response teams of individual emergency response functions
C.
an activation of the backup site
D.
a full-scale simulation of an emergency and the subsequent response functions.
a full-scale simulation of an emergency and the subsequent response functions.
When conducting a security assessment of access controls, which activity is part of the data analysis phase?
A.
Present solutions to address audit exceptions.
B.
Conduct statistical sampling of data transactions.
C.
Categorize and identify evidence gathered during the audit.
D.
Collect logs and reports
Categorize and identify evidence gathered during the audit.
A Security Operations Center (SOC) receives an incident response notification on a server
with an active
intruder who has planted a backdoor. Initial notifications are sent and communications are
established.
What MUST be considered or evaluated before performing the next step?
A.
Notifying law enforcement is crucial before hashing the contents of the server hard drive
B.
Identifying who executed the incident is more important than how the incident happened
C.
Removing the server from the network may prevent catching the intruder
D.
Copying the contents of the hard drive to another storage device may damage the evidence
Copying the contents of the hard drive to another storage device may damage the evidence
Explanation: Section: Security Operations
An organization’s security policy delegates to the data owner the ability to assign which user roles have access
to a particular resource. What type of authorization mechanism is being used?
A.
Discretionary Access Control (DAC)
B.
Role Based Access Control (RBAC)
C.
Media Access Control (MAC)
D.
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
What is the second step in the identity and access provisioning lifecycle?
A.
Provisioning
B.
Review
C.
Approval
D.
Revocation
Review
Which of the following methods of suppressing a fire is environmentally friendly and the
MOST appropriate for a data center?
A.
Inert gas fire suppression system
B.
Halon gas fire suppression system
C.
Dry-pipe sprinklers
D.
Wet-pipe sprinklers
Inert gas fire suppression system
Which of the following access management procedures would minimize the possibility of an
organization's employees retaining access to secure werk areas after they change roles?
A.
User access modification
B.
user access recertification
C.
User access termination
D.
User access provisioning
user access recertification
The core component of Role Based Access Control (RBAC) must be constructed of defined data elements.
Which elements are required?
A.
Users, permissions, operations, and protected objects
B.
Roles, accounts, permissions, and protected objects
C.
Users, roles, operations, and protected objects
D.
Roles, operations, accounts, and protected objects
Users, roles, operations, and protected objects
Which one of the following data integrity models assumes a lattice of integrity levels?
A.
Take-Grant
B.
Biba
C.
Harrison-Ruzzo
D.
Bell-LaPadula
Biba
At a MINIMUM, audits of permissions to individual or group accounts should be scheduled
A.
annually
B.
to correspond with staff promotions
C.
to correspond with terminations
D.
continually
annually
Which of the following is the MOST effective method to mitigate Cross-Site Scripting (XSS)
attacks?
A.
Use Software as a Service (SaaS)
B.
Whitelist input validation
C.
Require client certificates
D.
Validate data output
Whitelist input validation
Page 44 out of 124 Pages |
Previous |