1. What are some examples of security goals that you may have for an organization? Check all that apply.
Answers
· To protect customer data from unauthorized access
· To prevent unauthorized access to customer credentials
· To implement a strong password policy
· To deploy an Intrusion Prevention System
2. Which of these would you consider high-value targets for a potential attacker? Check all that apply.
Answers
· Authentication databases
· Customer credit card information
· Logging server
· Networked printers
Explanation: Targets with high potential value for prospective attackers include confidentiality (given that they could desire access to sensitive information), data integrity (to corrupt or disrupt data), and service availability (to disrupt services). These three factors constitute what may be called a triple danger to our safety.
3. What's the purpose of a vulnerability scanner?
Answers
· It protects your network from malware.
· It blocks malicious traffic from entering your network.
· It detects vulnerabilities on your network and systems.
· It fixes vulnerabilities on systems.
Explanation: A vulnerability scanner functions very similarly to a security investigator for your computer system. It is designed to investigate whether or not any of your computer systems, networks, or apps has any loopholes or security flaws. It helps enterprises patch up possible entry points for cyber attackers by discovering these vulnerabilities and allowing them to do so before the cyber attackers can take use of them. Think of it as a proactive tactic to keep one step ahead in the continuous game of digital hide-and-seek.
4. What are some restrictions that should apply to sensitive and confidential data? Check all that apply.
Answers
· It can be transferred via email.
· It can be accessed and stored on personal devices.
· It can be accessed and stored on personal devices.
· It can be stored on encrypted media only.
5. What's a privacy policy designed to guard against?
Answers
· Eavesdropping on communications
· Misuse or abuse of sensitive data
· Attackers stealing customer data
· Denial-of-service attacks
Explanation: A privacy policy acts in a similar capacity to a watchdog for individual data. Its purpose is to prevent unauthorized access, misuse, disclosure, and any other kind of dishonesty that might include the personal information of other individuals. To put it in more layman's terms, it's a sign that says "keep out" to anybody who would attempt to take liberties with your sensitive information.
6. Which of the following are actions and/or steps that can be taken to avoid leaks and disclosures when handling sensitive data?
Answers
· Giving the employees the right tools to get their work done without compromising security.
· Understanding what employees need to do to accomplish their jobs.
· Giving unrestricted access to the employees handling sensitive data
· Allowing employees to write their passwords on a post-it note
7. When evaluating the services of a vendor company, which of the following can be used to assess their security capabilities? Check all that apply.
Answers
· Ask the vendor to complete a questionnaire
· Assume that they’re using industry-standard solutions
· Request full access to the vendor systems to perform an assessment
· Ask them to provide any penetration testing or security assessment reports
8. What is the goal of mandatory IT security training for an organization? Check all that apply.
Answers
· To punish employees with poor security practices
· To educate employees on how to stay secure
· To build a culture that prioritizes security
· To avoid the need for a security team
Explanation: Training that is required for information technology security seeks to provide personnel with the knowledge and skills necessary to detect and react appropriately to security risks. It also helps in developing a culture that is conscious of security, which lowers the chance of errors caused by humans, ensures compliance with security regulations, and ultimately strengthens the organization's defenses against cyberattacks.
9. Which of the following are necessary in the organization to create a culture that makes security a priority? Select all that apply.
Answers
· Reinforce and reward behaviors that boost the security of the organization
· A working environment that encourages people to speak up.
· Punish employees every time they make poor security practices
· Designated communication channels
Explanation: Let's go with leadership support to establish the tone, frequent security training to keep everyone in the know, clear security rules so there's no misunderstanding, a dash of positive reinforcement to promote good behaviors, and a touch of accountability to keep everyone on their toes. This should do the trick.
10. A long and complex password requirement is designed to protect against _________.
Answers
· lazy users
· employees memory lost
· brute force attacks
· password reuse
Explanation: The need of a lengthy and difficult password is intended to guard against unwanted access, and more specifically against brute force assaults, which occur when an attacker methodically tries every conceivable combination of passwords until the right one is discovered. Attackers will have a far more difficult time guessing or cracking passwords since this provides an additional layer of security.
11. In order to properly handle a security incident, what is the first thing that needs to happen?
Answers
· Recover from the incident
· Remove or eradicate the incident
· Contain the incident
· Detect the incident
Explanation: When a security breach happens, the first thing that has to take place is the detection and identification of the breach. To effectively respond to a situation, it is essential to have a solid understanding of what's going on. It's similar to putting together a puzzle, only first you have to figure out what the individual parts are.
12. After a security incident, how can an organization be protected against a similar incident occurring again in the future?
Answers
· Update antivirus definitions.
· Cross your fingers and hope for the best!
· Change all account passwords.
· Conduct a post-incident analysis.
Explanation: The most important things to do after a breach of security are to learn and adjust. Carry out an exhaustive post-incident study in order to get an understanding of how the data breach occurred and what vulnerabilities were taken advantage of. Based on these results, implement changes to security, which may include upgrading security protocols, patching vulnerabilities, improving monitoring systems, and perhaps even giving the whole security infrastructure a bit of a tune-up. It is the same as transforming a setback into the foundation for a more robust defense.
13. In order to preserve the integrity of any forensic evidence, what should be done before analyzing a hard drive that has been compromised by a security attack?
Answers
· Install an antivirus software
· Format the hard drive
· Make a virtual copy or an image of the hard drive
· Connect the hard drive to a computer
Explanation: It is essential to generate a forensic picture of the hard disk in question before proceeding with the investigation of a compromised storage device. To do this, a replica of the whole drive must be created that is accurate down to every single bit. Why? Because you want to save the original evidence in its unaltered form for as long as possible. After then, this forensic picture will be the focus of the inquiry, which will ensure that the real evidence will not be accidentally tampered with or harmed in any way over the course of the investigation. It is analogous to creating a backup before trying to repair anything; this is generally considered to be a good practice.
14. Which of the following are protection that can be used on mobile devices?
Answers
· Screen lock
· Use the device settings to allow or deny apps access to the devices features
· Always have bluetooth on
· Storage encryption
15. In order to prevent further damage, the breach should be ________.
Answers
· contained
· recovered
· audited
· ignored
Explanation: The breach has to be controlled immediately in order to stop any more harm. It's similar to building firebreaks to prevent a wildfire from spreading over the internet. After the issue has been brought under control, you will be able to examine it, deal with any weaknesses, and begin the recovery process.
16. In the Payment Card Industry Data Security Standard (PCI DSS), which of these goals would benefit from encrypted data transmission?
Answers
· Implementing strong access control measures
· Maintaining a vulnerability management program
· Monitoring and testing networks regularly
· Protecting cardholder data
Answers
· Vulnerability scanners
· Bastion hosts
· Firewalls
· Antimalware software
Answers
· Network probing
· Penetration testing
· Security assessment
· Vulnerability scanning
Answers
· Specify exact data needed
· Provide justification
· Time limit
· A second signature
Answers
· Password rotation
· Strong encryption
· 2-factor authentication
· Vulnerability scanning
Answers
· Keylogging
· Credential stealing text messages
· Phishing emails
· Blackmail
Answers
· Ask the vendor for a cost comparison
· Talk to the vendor’s employees
· Ask the vendor to fill out a security questionnaire
· Test the vendor’s hardware or software
Answers
· User reviews
· Third party security audit results
· Penetration testing results
· Customer feedback scores
Answers
· Designated mailing list
· Posters promoting good security behavior
· Desktop monitoring software
· Bring your own device
Answers
· escalation
· containment
· documentation
· remediation
Answers
· Develop and maintain secure systems and applications
· Regularly test security systems and processes
· Track and monitor all access to network resources and cardholder data
· Encrypt the transmission of cardholder data across open public networks
Answers
· Remotely exploitable or not
· Use of encryption or not
· Type of access gained
· Chance of exploitation
28. Which of the following devices are considered a risk when storing confidential information?
Select all that apply.
Answers
· Encrypted portable hard drives
· Limited access file shares
· CD drives
· USB sticks
Answers
· User education
· Virtual private network
· Cloud email
· Spam filters
Answers
· Zero-day vulnerabilities
· Trusting the third party’s security
· Malware attacks
· DDoS attacks
Answers
· Brief quiz
· One-on-one interviews
· Interoffice memos
· Short video
Answers
· By reviewing and analyzing logs
· By interviewing the people involved
· By doing analysis of forensic malware
· By replaying security video footage
Answers
· Logs analysis
· Threat modeling
· Vulnerability scanning
· Penetration testing
Answers
· Giving network access to a bad actor for the purposes of testing.
· Assessing computers, computer systems, networks, or applications for weaknesses.
· Attempting to break into a system or network for the purpose of verifying the systems in place.
· Attempting to gather credentials with phishing emails.
35. Consider the following scenario:
A co-worker needs to share a sensitive file with you, but it is too large to send via an encrypted email. The co-worker works out of a remote office. You work at headquarters. Which of these options would most likely be approved by the company’s security policies? Select all that apply.
Answers
· Upload to company secure cloud storage
· Upload to a personal OneDrive
· Put on a company file server that you both have access to
· Upload to a personal Google drive
Answers
· cloud storage
· vendor security assessment questionnaires
· mobile phone services
· business apps
Answers
· Incident eradication or removal
· Incident recovery
· Incident detection
· Incident containment
Answers
· Ask a coworker to watch the laptop
· Set up a VPN
· Lock the screen
· Ask permission to leave
39. What is a quick way of evaluating a third party's security?
Answers
· A comprehensive penetration testing review
· A security assessment questionnaire
· A signed contract
· A manual evaluation of all security systems
Explanation: Checking a third party's security certifications or compliance is a simple approach to evaluate the third party's level of security. As a way to demonstrate their dedication to maintaining a secure environment, a lot of companies follow the standards set by the industry and get certifications. The ISO 27001 information security management standard and the SOC 2 data protection and privacy standard are both examples of common certifications. You can easily determine how committed the third party is to preserving the integrity of the secure environment if you check these certificates. It is the same as seeking for a stamp of approval that states, "We take the issue of security very seriously."
40. When handling credit card payments, the organization needs to adhere to the _____.
Answers
· ISO
· HIPAA
· PCI DSS
· IEEE
Explanation: The firm is required to comply with the Payment Card Industry Data Security Standard (PCI DSS) whenever it processes payments made using credit cards. The Payment Card Industry Data Security Standard (PCI DSS) is a collection of security guidelines meant to guarantee that all businesses that receive, handle, store, or transmit credit card information do so in a safe setting. A business that complies with the PCI Data Security Standard helps prevent data breaches and guarantees that transactions are safe. It's almost like a security system that's been designed from the ground up for the realm of credit card transactions.
41. What characteristics are used to assess the severity of found vulnerabilities? Select all that apply.
Answers
· Remotely exploitable or not
· Type of access gained
· Chance of exploitation
· Use of encryption or not
42. Which of the following are bad security habits commonly seen amongst employees in the workplace? Select all that apply.
Answers
· Password on a post-it note
· Log out of website session
· Leave laptop logged in and unattended
· Lock desktop screen
43. Which of the following are examples of security tools that can scan computer systems and networks for vulnerabilities? Select all that apply.
Answers
· Wireshark
· Nessus
· OpenVAS
· Qualys
44. Consider the following scenario:
Your company wants to establish good privacy practices in the workplace so that employee and customer data is properly protected. Well-established and defined privacy policies are in place, but they also need to be enforced. What are some ways to enforce these privacy policies? Select all that apply.
Answers
· Print customer information
· Audit access logs
· Apply the principle of least privilege
· VPN connection
45. Third-party services that require equipment on-site may require a company to do which of the following? Select all that apply.
Answers
· Unrestricted access to the network
· Provide additional monitoring via a firewall or agentless solution
· Provide remote access to third-party service provider
· Evaluate hardware in the lab first
46. What are some behaviors to be encouraged in order to build a security-conscious culture? Select all that apply.
Answers
· Locking your screen
· Shaming people who haven’t done a good job of ensuring their company’s security
· Checking website URLs when authenticating
· Asking security-related questions