Standard element or aspect of asset management

1.Which of the following is a standard element or aspect of asset management?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Software licensing

B

Equipment life cycle

C

Media life cycle

D

Inventory tracking

2.Question 3 :

When using penetration testing to verify the strength of your security policy, which of the following is not recommended?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Performing attacks without management knowledge

B

Mimicking attacks previously perpetrated against your system

C

Reconfiguring the system to resolve any discovered vulnerabilities

D

Using manual and automated attack tools

3.Question 4 :

Of the following choices, which is the most common method of distributing malware?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Ransomware

B

USB flash drives

C

Drive-by downloads

D

Unapproved software

4.Which of the following is the part of a model that assumes the failed system is immediately repaired, as a part of a renewal process?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Mean Time To Repair

B

Mean Time To Recovery

C

Mean Down Time

D

Mean Time Between Failures

5.Question 6 :

To gain more insights into the processes of a company, the company changes the positions of employees. Which of the following is an example of this practice?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Separation of duties

B

Auditing

C

Job rotation

D

Eavesdropping

6.Which of the following processes is often intertwined with the configuration documentation to ensure that changes are documented?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Change management

B

Capacity management

C

Configuration management

D

Incident management

7.Question 8 :

Which of the following cloud deployment models provides cloud-based assets to two or more organizations?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Private

B

Community

C

Public

D

Hybrid

8.Which of the following ensures that one person cannot perform a high-risk task alone?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Auditing

B

Eavesdropping

C

Separation of duties

D

Job rotation

9.

Question 10 :

What type of a security control is an audit trail?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Administrative

B

Physical

C

Corrective

D

Detective

10.Which of the following statements are true of SYN flood attack?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

The attacker sends thousands and thousands of ACK packets to the victim.

B

SYN cookies provide protection against the SYN flood by eliminating the resources allocated on the target host.

C

SYN flood is a form of denial of service (DoS) attack.

D

The attacker sends a succession of SYN requests to a target system.

11.Of the following choices, what is not a valid security practice related to special privileges?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Monitor special privilege assignments.

B

Grant access equally to administrators and operators.

C

Monitor special privilege usage.

D

Grant access to only trusted employees.

12.What should be done with equipment that is at the end of its lifecycle and is being donated to a charity?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Remove all software licenses.

B

Remove all CDs and DVDs.

C

Install the original software.

D

Sanitize it.

13.Which of the following helps monitor the outgoing traffic of the enterprise network?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Continuous monitoring

B

Egress monitoring

C

Trend analysis

D

Traffic analysis

E

Keystroke monitoring

14.Which of the following is true for a host-based intrusion detection system (HIDS)?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

It monitors a single system.

B

It’s invisible to attackers and authorized users.

C

It cannot detect malicious code.

D

It monitors an entire network

15.An organization is planning the layout of a new building that will house a datacenter. Where is the most appropriate place to locate the datacenter?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

At the back of the building

B

Closest to the outside wall where heating, ventilation, and air conditioning systems are located

C

Closest to the outside wall where power enters the building

D

In the center of the building

16.John used to work as network administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses the image hide tool and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he’s using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Email spoofing

B

Social engineering

C

Web ripping

D

Steganography

17.Which of the following statements are true of public cloud?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

It can be free or delivered on a pay-per-usage model.

B

It is operated exclusively for an organization and administered by the organization or a third party.

C

It is administered by an organization that sells cloud services.

D

It provides immediate cost savings to an organization.

18.

Question 21 :

Which of the following is a true statement regarding virtual machines (VMs) running as guest operating systems on physical servers?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Updating the physical server automatically updates the VMs.

B

Updating any VM automatically updates all the VMs.

C

VMs do not need to be updated if the physical server is updated.

D

VMs must be updated individually.

19.Which of the following is the method of hiding data within another media type such as graphic or document?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Packet sniffing

B

Spoofing

C

Steganography

D

Cryptanalysis

20.Which of the following is a series of steps involved in managing incident response?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Detection, Mining, Reporting, Recovery, and Remediation and review

B

Detection, Deletion, Reporting, Recovery, and Remediation and review

C

Detection, Response, Reporting, Recovery, and Remediation and review

D

Detection, Response, Reporting, Deletion, and Remediation and review

21.Which of the following is known as management of changes made to the system’s hardware, software, or firmware throughout its operational life cycle?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Capacity management

B

Configuration management

C

Incident management

D

Problem management

22.

Question 25 :

What would detect when a user has more privileges than necessary?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Account management

B

User entitlement audit

C

Logging

D

Reporting

23.Of the following choices, what indicates the primary purpose of an intrusion detection system (IDS)?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Rate system performance.

B

Test a system for vulnerabilities.

C

Detect abnormal activity.

D

Diagnose system failures.

24.Question 27 :

Which of the following statements describes a zero-day exploit?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

An attack still in development

B

An attack that breaches security instantly

C

An unknown attack to the target

D

An attack just released today

25.Which of the following are DoS attacks? (Choose three.)

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Smurf

B

Teardrop

C

Spoofing

D

Ping of death

26.Which of the following focuses more on the patterns and trends of data than on the actual content?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Security auditing

B

Event logging

C

Traffic analysis

D

Keystroke monitoring

27.

Question 31 :

You have been recently hired as a manager at a large financial organization. You have found that four employees are suspected of transferring sensitive customer data from their computer systems through email messages. Your security officer suggests that keystroke monitoring should be deployed to the systems of these users. Which of the following issues are involved with this type of monitoring?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Encryption

B

Privacy

C

Communication

D

Information flow

28.Backup tapes have reached the end of their lifecycle and need to be disposed of. Which of the following is the most appropriate disposal method?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Erase data off the tapes before disposing of them.

B

Purge the tapes of all data before disposing of them.

C

Throw them away. Because they are at the end of their lifecycle, it is not possible to read data from them.

D

Store the tapes in a storage facility.

29.Question 33 :

In the company, an individual should have just enough permissions and rights to fulfill his/her role. Which of the following does this mean?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Principle of least privilege

B

Data remanence

C

Job rotation

D

Separation of duties

30.Some cloud-based service models require an organization to perform some maintenance and take responsibility for some security. Which of the following is a service model that places most of these responsibilities on the organization leasing the cloud-based resources?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

SaaS

B

PaaS

C

IaaS

D

Hybrid

31.What are the benefits of a patch management system?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Eliminates vulnerability

B

Keeps systems up-to-date with current patch

C

Prevents outages from known attack

D

Provides updates to operating system and application

32.

Question 36 :

An organization wants to reduce vulnerabilities against fraud from malicious employees. Of the following choices, what would help with this goal? (Choose all that apply.)

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Baselining

B

Mandatory vacations

C

Separation of duties

D

Job rotation

33.

Question 37 :

A financial organization commonly has employees switch duty responsibilities every six months. What security principle are they employing?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Separation of duties

B

Job rotation

C

Least privilege

D

Mandatory vacations

34.

Question 38 :

Of the following choices, what is not a valid security practice related to special privileges?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Monitor special privilege usage.

B

Grant access equally to administrators and operators.

C

Monitor special privilege assignments.

D

Grant access to only trusted employees.

35.Question 39 :

An organization has strictly implemented the principle of least privilege. Which of the following is not a likely outcome?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Users do not have access to backup tapes.

B

Users can log onto any computer in the network.

C

Users can log onto only a single system.

D

Users have restricted access to files based on their jobs.

36.What is a primary benefit of job rotation and separation of duties policies?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Encouraging collusion

B

Correcting incidents

C

Preventing collusion

D

Preventing fraud

37.In which of the following attacks does an attacker spoof the source IP address in an ICMP ECHO broadcast packet so that it appears to be originated at the victim’s system to flood it with REPLY packets?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Smurf

B

Dictionary

C

Brute force

D

Teardrop

38.An administrator is granting permissions to a database. What is the default level of access the administrator should grant to new users in the organization?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Full access

B

Modify

C

Read

D

No access

39.What is used to keep subjects accountable for their actions while they are authenticated to a system?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Account lockout

B

User entitlement reviews

C

Authentication

D

Monitoring

40.How does a SYN flood attack work?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Exploits a packet processing glitch in Windows systems

B

Sends oversized ping packets to a victim

C

Disrupts the three-way handshake used by TCP

D

Uses an amplification network to flood a victim with packe

41.Question 45 :

Which of the following identifies vendor responsibilities and can include monetary penalties if the vendor doesn’t meet the stated responsibilities?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Service-level agreement (SLA)

B

Memorandum of understanding (MOU)

C

Interconnection security agreement (ISA)

D

Software as a service (SaaS)

42

Question 46 :

Which of the following is not considered a privileged operation?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Sending an encrypted e-mail

B

Controlling system reboot

C

Managing user account

D

Accessing audit log

43.Which of the following intrusion detection systems monitors network traffic and compares it against an established baseline?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Host-based

B

Anomaly-based

C

Signature-based

D

Network-based

44.Management has established a policy. The policy has the following requirements:

All information technology professionals must have a college degree with a core emphasis on information technology.
All system administrators must have a security certification from an accredited program.
What has management established by giving such requirements in the policy?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Standard

B

Guideline

C

Procedure

D

Baseline

45.While troubleshooting a network problem, a technician realized the problem could be resolved by opening a port on a firewall. The technician opened the port and verified the system was now working. However, an attacker accessed this port and launched a successful attack. What could have prevented this problem?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Vulnerability management processes

B

Configuration management processes

C

Change management processes

D

Patch management processes

46.By examining the source and destination addresses, the application usage, the source of origin, and the relationship between current packets with the previous packets of the same session. Which firewall is able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Next-gen

B

Circuit-level gateway

C

Stateful inspection

D

Application-level gateway

47.As a network administrator of a corporate network, you want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. What will you do?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Install a host-based IDS.

B

Enable verbose logging on the firewall.

C

Install a network-based IDS.

D

Install a DMZ firewall.

48.Which of the following are differences between a public cloud and a private cloud?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

In a public cloud, the sharing of sensitive data takes place beyond the corporate firewall, whereas in a private cloud, all data and secure information remains behind the corporate firewall.

B

In a public cloud, the infrastructure has to be provisioned and paid for up-front, whereas in a private cloud, up-front capital is not investment in infrastructure.

C

A public cloud is a shared cloud computing infrastructure that can be accessed by anyone, whereas a private cloud is a cloud computing infrastructure that is owned and held by a single party.

D

A public cloud is connected to the public Internet, whereas a private cloud may choose to be connected to the public Internet.

49.Which of the following is an attack that changes the source IP address of an ICMP ECHO request packet, so it appears as though it came from the victim and is broadcasted to an amplifying network?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Smurf

B

Tunneling

C

Buffer overflow

D

Man-in-the-middle

50.

Question 56 :

An organization has an incident response plan that requires reporting incidents after verifying them. For security purposes, the organization has not published the plan. Only members of the incident response team know about the plan and its contents. Recently, a server administrator noticed that a web server he manages was running slower than normal. After a quick investigation, he realized an attack was coming from a specific IP address. He immediately rebooted the web server to reset the connection and stop the attack. He then used a utility he found on the internet to launch a protracted attack against this IP address for several hours. Because attacks from this IP address stopped, he didn’t report the incident. Which of the following indicates the most serious mistake the server administrator made in this incident?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Resetting the connection

B

Rebooting the server

C

Not reporting the incident

D

Attacking the IP address

51.Which of the following would be completed during the remediation and review stage of an incident response?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Rebuild system

B

Collect evidence

C

Contain the incident

D

Root cause analysis

52.Denish is the administrator for a cloud computing vendor. He’s evaluating the security benefits and threats of a cloud computing that has a number of challenges. Which of the following benefits is provided by a cloud over a traditionally hosted server?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Less hard drive failure

B

Less susceptible to DDoS attacks

C

More privilege escalation

D

More internal data theft

53.Which of the following is used to ensure that systems are configured properly throughout their lifetime?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Capacity management

B

Configuration management

C

Incident management

D

Problem management

54.Which of the following is a procedure designed to test and perhaps bypass a system’s security controls?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Penetration testing

B

Deploying secured desktop workstations

C

Logging usage data

D

War dialing

55.Question 61 :

An organization ensures that users are granted access to only the data they need to perform specific work tasks. What principle are they following?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Principle of least permission

B

Role Based Access Control

C

Need-to-know

D

Separation of duties

57.Which of the following is a reason to implement separation of duties?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

So that one individual cannot perform any critical security task

B

To ensure that least privileges are maintained

C

To ensure that job rotation is enforced

D

So that availability is maintained

58.Which of the following can uncover fraud and ensure that more than one person knows the tasks of a position?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Auditing

B

Separation of duties

C

Job rotation

D

Eavesdropping

59.Which of the following is the best response after detecting and verifying an incident?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Gather evidence.

B

Contain it.

C

Report it.

D

Remediate it.

59.Question 65 :

Which of the following statements best describes why separation of duties is important for security purposes?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

It helps employees concentrate their talents where they will be most useful.

B

It prevents any single IT security person from making major security changes without involving other individuals.

C

It prevents an organization from losing important information when they lose important people.

D

It ensures that multiple people can do the same job.

 

 

 

 

 

 

 

Sample Solution

incentive to work and save will be sustained”.

Issues with UK Tax System

The UK needs to change the separate systems of income tax and National Insurance, with different sets of rules and exemptions, pointlessly increasing administration and compliance costs and making the system less transparent. NI is not a true social insurance scheme anymore; it is just another tax on earnings, which is added to the total revenue. The current tax and benefit system is unnecessarily complicated and convinces many people not to work or to work too little.

Coherence requires first that the income tax system itself be sensibly structured. We need to move away from pointless complexities such as that which any amount between £100,000 and £123,700 means the personal allowance reduces and can actually mean that some people would get more net income if they earned less.

Conclusion

A good tax system is one which has primarily good taxes and fulfils most of the canons of taxation. It should be a balanced system where there are all types of taxes in the right proportion. The tax and benefit system should therefore be progressive, coherent, and designed to reflect income distribution and how different groups respond to work incentives. In the current system, there are a disarray of tax rates, a lack of a coherent vision of the tax base, and arbitrary discrimination across different types of economic activities. However, income tax does fundamentally treat the individual proportionately equal and helps provide items all benefit from. Ultimately, a good tax system is definitely better than none.

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.