Security 7

Security 7

University

50 Qs

quiz-placeholder

Similar activities

Information and communications technology 51-100

Information and communications technology 51-100

University

50 Qs

SA405 - IT4A PRELIM EXAM

SA405 - IT4A PRELIM EXAM

University

50 Qs

UNITED NATIONS

UNITED NATIONS

KG - University

45 Qs

Tour Guiding

Tour Guiding

University

50 Qs

MIDTERM

MIDTERM

University

55 Qs

FIN 340 Practice 6

FIN 340 Practice 6

University

45 Qs

Business law test

Business law test

University

50 Qs

Security 7

Security 7

Assessment

Quiz

Other

University

Hard

Created by

Joe Smith

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator deployed a monitoring solution that does not require installation on the endpoints that the solution is monitoring. Which of the following is described in this scenario?

Agentless solution

Client-based soon

Open port

File-based solution

Answer explanation

Agentless monitoring does not require the installation of software on the target device. It uses standard protocols to collect information, making it less intrusive and less resource intensive.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is reviewing the source code of an application in order to identify misconfigurations and vulnerabilities. Which of the following kinds of analysis best describes this review?

Dynamic

Static

Gap

Impact

Answer explanation

Static analysis refers to reviewing the source code of an application without executing it, in order to identify misconfigurations, vulnerabilities, and potential security flaws. This is the type of analysis the security analyst is performing by examining the code directly. Dynamic analysis (A) involves analyzing the application while it is running, to detect vulnerabilities that only appear during execution. Gap analysis (C) identifies discrepancies between current security measures and desired standards, but is not focused on source code review. Impact analysis (D) assesses the potential consequences of identified vulnerabilities but is not the process of reviewing source code directly.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following agreement types is used to limit external discussions?

BPA

NDA

SLA

MSA

Answer explanation

A. BPA: Business Process Automation

B. NDA: Non-Disclosure Agreement

C. SLA: Service Level Agreement

D. MSA: Master Service Agreement

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is evaluating a SaaS application that the human resources department would like to implement. The analyst requests a SOC 2 report from the SaaS vendor. Which of the following processes is the analyst most likely conducting?

Internal audit

Penetration testing

Attestation

Due diligence

Answer explanation

D. Due diligence In this context, due diligence refers to the process of evaluating the security, compliance, and risk associated with a third-party vendor or service, such as a SaaS application. Requesting a SOC 2 report is a common part of the due diligence process to assess the vendor's controls related to security, availability, processing integrity, confidentiality, and privacy. Internal audit (A) refers to an organization's internal review of its own processes, not an external vendor. Penetration testing (B) involves actively testing for vulnerabilities by simulating attacks, which is not applicable here. Attestation (C) refers to a third-party audit or certification, such as the SOC 2 report itself, but the analyst is conducting due diligence by requesting the report.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to conceal credit card information in a database log file?

Tokenization

Masking

Hashing

Obfuscation

Answer explanation

B. Masking Masking is used to conceal sensitive information, such as credit card numbers, by replacing or hiding parts of the data. In the context of database log files, masking ensures that sensitive information is not exposed while maintaining the usability of the data for other purposes. Tokenization (A) replaces sensitive data with a token that can only be mapped back to the original data using a secure system, but it is not typically used for log file entries. Hashing (C) converts data into a fixed-length hash, but it's a one-way function, making it unsuitable if the original data needs to be retrieved. Obfuscation (D) refers to making data less understandable but is less structured and secure than masking for specific data like credit card numbers.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization recently started hosting a new service that customers access through a web portal. A security engineer needs to add to the existing security devices a new solution to protect this new service. Which of the following is the engineer most likely to deploy?

Layer 4 firewall

NGFW

WAF

UTM

Answer explanation

C. WAF (Web Application Firewall) A Web Application Firewall (WAF) is specifically designed to protect web applications by filtering, monitoring, and blocking HTTP/S traffic to and from a web service. Since the organization is hosting a new service through a web portal, a WAF would be the most appropriate solution to protect against common web-based attacks like SQL injection, cross-site scripting (XSS), and other OWASP Top 10 threats. Layer 4 firewall (A) provides protection at the transport layer, which is too low-level to specifically protect web applications. NGFW (Next-Generation Firewall) (B) adds application-level filtering and protection, but is generally broader in scope, not specifically tailored to web applications. UTM (Unified Threat Management) (D) is a multi-functional security device but doesn't provide the specialized web application protection that a WAF offers. Thus, WAF is the most suitable solution for protecting a web service accessed via a portal.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following topics would most likely be included within an organization's SDLC?

Service-level agreements

Information security policy

Penetration testing methodology

Branch protection requirements

Answer explanation

D. Branch protection requirements Branch protection requirements are related to the version control and development process within the SDLC, ensuring that code changes are reviewed, tested, and approved before being merged into main branches. This helps maintain code quality and security throughout the development process. Penetration testing is usually conducted as part of the testing phase or after deployment to identify vulnerabilities and security weaknesses. It is a separate process from the core stages of the SDLC but is an important aspect of ensuring the security and robustness of the application once development is completed.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?