Deck 8: Operations Security

Full screen (f)
exit full mode
Question
Users should be given access only to resources required to do their job.
Use Space or
up arrow
down arrow
to flip the card.
Question
Separation of Duties is considered a detective administrative control.
Question
All default administrator passwords on the devices should be left in place.
Question
RAID 1 is also called disk striping.
Question
HSM is a type of backup management system that provides a continuous online backup.
Question
Data purging uses a method such as degaussing to make the old data unavailable even with forensics.
Question
MTBF describes the average amount of time it takes to get a device fixed and back online.
Question
The first step in the incident response process is respond.
Question
All changes should be formally requested.
Question
Trusted Recoveries set a baseline for normal user errors, and violations exceeding that threshold will be recorded for analysis of why the violations occurred.
Question
Which principle is valuable in deterring fraud?

A) Need to Know
B) Least Privilege
C) Separation of Duties
D) DAC
Question
Which form of RAID requires at least three hard drives?

A) RAID 0
B) RAID 1
C) RAID 3
D) RAID 5
Question
Which of the following is composed of high-capacity storage devices connected by a high-speed private network?

A) NAS
B) SAN
C) HSM
D) RPM
Question
Which of the following describes how often a component fails on average?

A) MTBF
B) HSM
C) MTTR
D) NAS
Question
What is the final step in the incident response process?

A) Report
B) Detect
C) Respond
D) Recover
Question
Which of the following is NOT a part of system hardening?

A) Unnecessary applications should be removed.
B) All services should be enabled.
C) Unrequired ports should be blocked.
D) External storage devices and media should be tightly controlled.
Question
Which of the following protocols is recommended for remote management?

A) Telnet
B) SSH
C) FTP
D) ICMP
Question
At what temperature does damage start occurring to magnetic media?

A) 80 degrees
B) 85 degrees
C) 90 degrees
D) 100 degrees
Question
Which of the following is an agreement about the capability of the support system to respond to problems within a certain time frame?

A) SLA
B) MTBF
C) RAID
D) PCP
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Operations Security
1
Users should be given access only to resources required to do their job.
True
2
Separation of Duties is considered a detective administrative control.
False
3
All default administrator passwords on the devices should be left in place.
False
4
RAID 1 is also called disk striping.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
5
HSM is a type of backup management system that provides a continuous online backup.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
6
Data purging uses a method such as degaussing to make the old data unavailable even with forensics.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
7
MTBF describes the average amount of time it takes to get a device fixed and back online.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
8
The first step in the incident response process is respond.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
9
All changes should be formally requested.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
10
Trusted Recoveries set a baseline for normal user errors, and violations exceeding that threshold will be recorded for analysis of why the violations occurred.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
11
Which principle is valuable in deterring fraud?

A) Need to Know
B) Least Privilege
C) Separation of Duties
D) DAC
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
12
Which form of RAID requires at least three hard drives?

A) RAID 0
B) RAID 1
C) RAID 3
D) RAID 5
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is composed of high-capacity storage devices connected by a high-speed private network?

A) NAS
B) SAN
C) HSM
D) RPM
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following describes how often a component fails on average?

A) MTBF
B) HSM
C) MTTR
D) NAS
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
15
What is the final step in the incident response process?

A) Report
B) Detect
C) Respond
D) Recover
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is NOT a part of system hardening?

A) Unnecessary applications should be removed.
B) All services should be enabled.
C) Unrequired ports should be blocked.
D) External storage devices and media should be tightly controlled.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following protocols is recommended for remote management?

A) Telnet
B) SSH
C) FTP
D) ICMP
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
18
At what temperature does damage start occurring to magnetic media?

A) 80 degrees
B) 85 degrees
C) 90 degrees
D) 100 degrees
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is an agreement about the capability of the support system to respond to problems within a certain time frame?

A) SLA
B) MTBF
C) RAID
D) PCP
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 19 flashcards in this deck.