Security Operations & Administration

Which of the following is a recommendation to use when a specific standard or procedure does not exist?

Guideline

A code of ethics provides for all but which of the following

Clearly defines course action to take when a complex issue is encountered

Computer policies include a special category called user rights. Which actions do they allow an administrator to perform?

Identify users who can perform maintenance tasks on computers in the OU

Which of the following development modes is a method used by programmers while writing programs that allow for optimal control over coherence, security, accuracy, and comprehensibility?

Structured programming

A process performed in a controlled environment by a third party which verifies that an IS meets a specific set of security standards before being granted the approval to operate is known as?

Accreditation

All of the files on a companies protected network are backed up every 24 hours. The backup solution imposed on the network is designed to provide protection for what security service?

Availability

You want to ensure that all users in the Development OU use specific network communication security settings when transmitting files. Which method should you use?

Create a GPO computer policy for the computers in the Development OU

Which of the following is an action which must take place during the release stage of the SDLC

Vendors develop and release patches in response to exploited vulnerabilities that have been discovered

By definition, which security concept ensures that only authorized parties can access data?

Confidentiality

Who is assigned the task of judging the security system or network and granting it an approval to operate?

Designated Approval Authority

When developing the totality of security policy documentation, what type of policy document will contain instructions or information on remaining in compliance with regulations and industry standards?

Standards

In which phase of the system life cycle is software testing performed?

Software Development

A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security goals is most at risk?

Confidentiality

Which phase or step of a security assessment is a passive activity?

Reconnaissance

Which of the following best describes the concept of due care or due diligence?

Reasonable precautions, based on industry best practices, are utilized and documented

Which of the following is a representative example of an assigned level of a system that was judged through Common Criteria?

EAL5

Which is the operation mode of the system that is deployed in such a way so that it operates at a single level of classification and all users who can access the system all have that same specific clearance level as well as all of the need to know over all the data on the system?

Dedicated

Which of the following is the best protection against security violations?

Defense in depth

Who has the responsibility for the development of a security policy?

Senior Management

Which of the following is not a protection against collusion?

Cross training

Which of the following best describes the Security Target (ST) in the Common Criteria (CC) evaluation system?

The ST is a document that describes the security properties of a security product

Which of the following is not an element of the termination process?

Dissolution of the NDA (non-disclosure agreement)

What is the primary purpose of imposing software life cycle management concepts?

Increase the quality of software

If your organization relies on high-end customized software developed by an external company, what security protection should be implemented to protect yourself against the software developer going out of business?

Code escrow

Your company security policy requires separation of duties for all network security matters. Which of the following scenarios best describes this concept?

System administrator configures remote access privileges and the security officer reviews and activates each account

Which of the following defines layering in regards to system access control?

Various tasks are divided into a hierarchical manner to provide security

What are the goals and mission of an organization defined?

Strategic security policy

Which statement is true regarding application of GPO settings?

If a setting is defined in the Local Group Policy and is not defined in the GPO linked to the OU, the setting will be applied

You've crafted a message to be sent to another user. Before transmission, you hash the message, then encrypt the hash using your private key. You then attach this encrypted hash to you message as a digital signature before sending it to the other user? What protection does the private key signing activity of this process provide?

Non-repudiation

Which of the following is the least reliable means to clean or purge media?

Degaussing

In which phase of the system life cycle is security integrated into the product?

Project initiation

Which of the following defines system high mode?

All systems and peripherals within a system are classified and then protected according to the level of classification assigned to the most highly classified object which resides on the system

What is the primary purpose of forcing employees to take mandatory one-week minimum vacations every year?

To check for evidence of fraud

You've crafted a message to be sent to another user. Before, transmission, you hash the message, then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, what protection does the hashing activity provide?

Integrity

What of the following is not used bu the reference monitor to determine levels of access?

Ring architecture

Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?

Disable Bluetooth on the phone

When a sender encrypts a message using their own private key, what security service is being provided to the recipient?

Non-repudiation

What is the primary purpose of source code power?

To obtain change rights over software after the vendor goes out of business

Which of the following terms restricts the ability of a program to read and write to memory according to its permissions or access level?

Confinement

Which of the following is a high-level, general statement about the role of security in the organization?

Policy

Which of the following is a policy that defines appropriate and inappropriate activities and usage for company resources, assets, and communications?

Acceptable use policy

Which of the following is a term used to describe a level of confidence that the evaluation methods were thorough and complete so that the security designation can be trusted?

Assuarance

What is the principal purpose of change control?

Prevent un-managed change

You have a set of CD-Rs that you have used to store confidential product development data. Now that the project is over, you need to dispose of the discs. Which method should you use to dispose of the media?

Shredding

The best ways to initiate solid administrative control over an organizations employees is to have what element in place?

Distinct job descriptions

Cell phones with cameras and data transfer capabilities pose a risk to which security goal?

Confidentiality

Which of the following terms describes the product that is evaluated against the security requirements in the Common Criteria (CC) evaluation system?

Target of Evaluation (TOE)

Which of the following components of Common Criteria (CC) evaluation system is a document written by a user or community that identifies the security requirements for a specific purpose?

Protection Profile (PP)

Security Operations & Administration - Subjecto.com

Security Operations & Administration

Your page rank:

Total word count: 1238
Pages: 5

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which of the following is a recommendation to use when a specific standard or procedure does not exist?

Guideline

A code of ethics provides for all but which of the following

Clearly defines course action to take when a complex issue is encountered

Computer policies include a special category called user rights. Which actions do they allow an administrator to perform?

Identify users who can perform maintenance tasks on computers in the OU

Which of the following development modes is a method used by programmers while writing programs that allow for optimal control over coherence, security, accuracy, and comprehensibility?

Structured programming

A process performed in a controlled environment by a third party which verifies that an IS meets a specific set of security standards before being granted the approval to operate is known as?

Accreditation

All of the files on a companies protected network are backed up every 24 hours. The backup solution imposed on the network is designed to provide protection for what security service?

Availability

You want to ensure that all users in the Development OU use specific network communication security settings when transmitting files. Which method should you use?

Create a GPO computer policy for the computers in the Development OU

Which of the following is an action which must take place during the release stage of the SDLC

Vendors develop and release patches in response to exploited vulnerabilities that have been discovered

By definition, which security concept ensures that only authorized parties can access data?

Confidentiality

Who is assigned the task of judging the security system or network and granting it an approval to operate?

Designated Approval Authority

When developing the totality of security policy documentation, what type of policy document will contain instructions or information on remaining in compliance with regulations and industry standards?

Standards

In which phase of the system life cycle is software testing performed?

Software Development

A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security goals is most at risk?

Confidentiality

Which phase or step of a security assessment is a passive activity?

Reconnaissance

Which of the following best describes the concept of due care or due diligence?

Reasonable precautions, based on industry best practices, are utilized and documented

Which of the following is a representative example of an assigned level of a system that was judged through Common Criteria?

EAL5

Which is the operation mode of the system that is deployed in such a way so that it operates at a single level of classification and all users who can access the system all have that same specific clearance level as well as all of the need to know over all the data on the system?

Dedicated

Which of the following is the best protection against security violations?

Defense in depth

Who has the responsibility for the development of a security policy?

Senior Management

Which of the following is not a protection against collusion?

Cross training

Which of the following best describes the Security Target (ST) in the Common Criteria (CC) evaluation system?

The ST is a document that describes the security properties of a security product

Which of the following is not an element of the termination process?

Dissolution of the NDA (non-disclosure agreement)

What is the primary purpose of imposing software life cycle management concepts?

Increase the quality of software

If your organization relies on high-end customized software developed by an external company, what security protection should be implemented to protect yourself against the software developer going out of business?

Code escrow

Your company security policy requires separation of duties for all network security matters. Which of the following scenarios best describes this concept?

System administrator configures remote access privileges and the security officer reviews and activates each account

Which of the following defines layering in regards to system access control?

Various tasks are divided into a hierarchical manner to provide security

What are the goals and mission of an organization defined?

Strategic security policy

Which statement is true regarding application of GPO settings?

If a setting is defined in the Local Group Policy and is not defined in the GPO linked to the OU, the setting will be applied

You’ve crafted a message to be sent to another user. Before transmission, you hash the message, then encrypt the hash using your private key. You then attach this encrypted hash to you message as a digital signature before sending it to the other user? What protection does the private key signing activity of this process provide?

Non-repudiation

Which of the following is the least reliable means to clean or purge media?

Degaussing

In which phase of the system life cycle is security integrated into the product?

Project initiation

Which of the following defines system high mode?

All systems and peripherals within a system are classified and then protected according to the level of classification assigned to the most highly classified object which resides on the system

What is the primary purpose of forcing employees to take mandatory one-week minimum vacations every year?

To check for evidence of fraud

You’ve crafted a message to be sent to another user. Before, transmission, you hash the message, then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, what protection does the hashing activity provide?

Integrity

What of the following is not used bu the reference monitor to determine levels of access?

Ring architecture

Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?

Disable Bluetooth on the phone

When a sender encrypts a message using their own private key, what security service is being provided to the recipient?

Non-repudiation

What is the primary purpose of source code power?

To obtain change rights over software after the vendor goes out of business

Which of the following terms restricts the ability of a program to read and write to memory according to its permissions or access level?

Confinement

Which of the following is a high-level, general statement about the role of security in the organization?

Policy

Which of the following is a policy that defines appropriate and inappropriate activities and usage for company resources, assets, and communications?

Acceptable use policy

Which of the following is a term used to describe a level of confidence that the evaluation methods were thorough and complete so that the security designation can be trusted?

Assuarance

What is the principal purpose of change control?

Prevent un-managed change

You have a set of CD-Rs that you have used to store confidential product development data. Now that the project is over, you need to dispose of the discs. Which method should you use to dispose of the media?

Shredding

The best ways to initiate solid administrative control over an organizations employees is to have what element in place?

Distinct job descriptions

Cell phones with cameras and data transfer capabilities pose a risk to which security goal?

Confidentiality

Which of the following terms describes the product that is evaluated against the security requirements in the Common Criteria (CC) evaluation system?

Target of Evaluation (TOE)

Which of the following components of Common Criteria (CC) evaluation system is a document written by a user or community that identifies the security requirements for a specific purpose?

Protection Profile (PP)

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending