Deck 14: On-Going Security Management

ملء الشاشة (f)
exit full mode
سؤال
An operational audit looks for accounts that have weak or blank passwords.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is a security-related reason for monitoring and evaluating network traffic?

A) to determine if your IDPS signatures are working well
B) to create substantial data to analyze
C) to optimize your router and switch protocols
D) to see how many files employees download form the Internet
سؤال
Which aspect of strengthening the performance of IDPS may involve degaussing?

A) managing memory
B) managing bandwidth
C) managing storage
D) managing processors
سؤال
Change management should be used before making changes to firewall or IDPS rules that affect users.
سؤال
One of the events you should continually monitor is logins.
سؤال
The process of testing a network defense system is referred to as which of the following?

A) security auditing
B) change management
C) IDPS evaluation
D) distributed data collection
سؤال
How much space is typically needed to store IDPS data?

A) a few hundred Kilobytes
B) a gigabyte or more
C) a megabyte or two
D) at least a terabyte
سؤال
Which of the following is NOT a type of event that you would normally monitor?

A) user account creation
B) e-mail attachment handling
C) antivirus scanning
D) access to shared folders
سؤال
Since system intrusions take place over a very short period of time,there is no need to maintain IDPS log data for more than a few hours.
سؤال
An IDPS must have enough memory to maintain connection state information.
سؤال
What should an outside auditing firm be asked to sign before conducting a security audit?

A) subpoena
B) nondisclosure agreement
C) search and seizure contract
D) social engineering covenant
سؤال
Security auditing is the process of documenting countermeasures put in place due to attacks on the network.
سؤال
In centralized data collection,data from sensors go to security managers at each corporate office.
سؤال
Which of the following is a benefit of using centralized data collection to manage sensor data?

A) less network traffic
B) less administrative time
C) data stays on the local network
D) must use a VPN to transport data
سؤال
Most IDPSs use random ports to transfer security data,thereby making it difficult for attackers to exploit.
سؤال
Nonrepudiation is the use of encryption methods to ensure the confidentiality of data.
سؤال
Which of the following is NOT typically an aspect of a security event management program?

A) monitoring events
B) managing IDPS firmware
C) managing data from sensors
D) managing change
سؤال
Which type of change does NOT typically require the use of change management procedures?

A) new VPN gateways
B) changes to ACLs
C) changing a manager's permissions to a file
D) new password systems or procedures
سؤال
Network protection is something you should implement initially and then only make changes if there is a serious security breach.
سؤال
What approach to security calls for security through a variety of defensive techniques that work together?

A) DOA
B) WoL
C) DiD
D) PoE
سؤال
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a system in which data from security devices goes to a management console on its own local network
سؤال
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
an audit in which an outside firm inspects audit logs to ensure that an organization is collecting the information it needs
سؤال
With ___________________ data collection,data from security devices goes to a management console on its own local network.
سؤال
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a technique of tricking employees into divulging passwords or other information
سؤال
A(n)____________________ audit should look for accounts assigned to employees who have left the company or user group.
سؤال
The ________________ command reviews the current connections and reports which ports a server is listening to.
سؤال
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
an audit by an organization's own staff that examines system and security logs
سؤال
You should review the logs and alerts created by your security devices,a process called _________ monitoring.
سؤال
Each IDPS has _____________ that gather data passing through the gateway.
سؤال
To manage the security information from the devices in a large network,you should establish a security incident _________________ team.
سؤال
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a program that gathers and consolidates events from multiple sources so that the information can be analyzed to improve network security
سؤال
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a system in which an organization's event and security data is funneled to a management console in the main office
سؤال
You monitor and evaluate network traffic to gather evidence that indicates whether your IDPS _________________ are working well or need to be updated.
سؤال
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a program in which network connections are scanned and alerts are generated when logons are attempted from a suspicious IDPS
سؤال
Groups known as ______________ teams are assembled to actively test a network.
سؤال
_______________ management involves modifying equipment,systems,software,or procedures in a sequential,planned way.
سؤال
One way to consolidate the data from several network and security devices is to transfer the information to a central _______________.
سؤال
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
the process of magnetically erasing an electronic device,such as a monitor or a disk
سؤال
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a strong implementation of the DiD concept in which security personnel expect that attacks will occur and try to anticipate them
سؤال
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
the number of target computers on a network managed by a single command console
سؤال
How does distributed data collection work when collecting data from multiple sensors?
سؤال
Discuss the process of IDPS signature evaluation.
سؤال
How can change adversely affect your network?
سؤال
List three types of changes for which you should use change management.
سؤال
Discuss operational auditing.Include in your discussion what should be looked for in an operational audit and what methods might be used in the audit.
سؤال
If you determine that a Trojan program has been installed and is initiating a connection to a remote host and you suspect passwords have been compromised,what steps should you take? List three of them.
سؤال
What is security auditing and what type of information should be analyzed?
سؤال
List and define the areas for which DiD calls for maintenance.
سؤال
List the advantages of centralized data collection.
سؤال
List four type of events you should monitor as part of a security event management program.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: On-Going Security Management
1
An operational audit looks for accounts that have weak or blank passwords.
True
2
Which of the following is a security-related reason for monitoring and evaluating network traffic?

A) to determine if your IDPS signatures are working well
B) to create substantial data to analyze
C) to optimize your router and switch protocols
D) to see how many files employees download form the Internet
A
3
Which aspect of strengthening the performance of IDPS may involve degaussing?

A) managing memory
B) managing bandwidth
C) managing storage
D) managing processors
C
4
Change management should be used before making changes to firewall or IDPS rules that affect users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
One of the events you should continually monitor is logins.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
The process of testing a network defense system is referred to as which of the following?

A) security auditing
B) change management
C) IDPS evaluation
D) distributed data collection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
How much space is typically needed to store IDPS data?

A) a few hundred Kilobytes
B) a gigabyte or more
C) a megabyte or two
D) at least a terabyte
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is NOT a type of event that you would normally monitor?

A) user account creation
B) e-mail attachment handling
C) antivirus scanning
D) access to shared folders
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Since system intrusions take place over a very short period of time,there is no need to maintain IDPS log data for more than a few hours.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
An IDPS must have enough memory to maintain connection state information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
What should an outside auditing firm be asked to sign before conducting a security audit?

A) subpoena
B) nondisclosure agreement
C) search and seizure contract
D) social engineering covenant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Security auditing is the process of documenting countermeasures put in place due to attacks on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
In centralized data collection,data from sensors go to security managers at each corporate office.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is a benefit of using centralized data collection to manage sensor data?

A) less network traffic
B) less administrative time
C) data stays on the local network
D) must use a VPN to transport data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Most IDPSs use random ports to transfer security data,thereby making it difficult for attackers to exploit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Nonrepudiation is the use of encryption methods to ensure the confidentiality of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT typically an aspect of a security event management program?

A) monitoring events
B) managing IDPS firmware
C) managing data from sensors
D) managing change
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which type of change does NOT typically require the use of change management procedures?

A) new VPN gateways
B) changes to ACLs
C) changing a manager's permissions to a file
D) new password systems or procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Network protection is something you should implement initially and then only make changes if there is a serious security breach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
What approach to security calls for security through a variety of defensive techniques that work together?

A) DOA
B) WoL
C) DiD
D) PoE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a system in which data from security devices goes to a management console on its own local network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
an audit in which an outside firm inspects audit logs to ensure that an organization is collecting the information it needs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
With ___________________ data collection,data from security devices goes to a management console on its own local network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a technique of tricking employees into divulging passwords or other information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n)____________________ audit should look for accounts assigned to employees who have left the company or user group.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
The ________________ command reviews the current connections and reports which ports a server is listening to.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
an audit by an organization's own staff that examines system and security logs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
You should review the logs and alerts created by your security devices,a process called _________ monitoring.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Each IDPS has _____________ that gather data passing through the gateway.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
To manage the security information from the devices in a large network,you should establish a security incident _________________ team.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a program that gathers and consolidates events from multiple sources so that the information can be analyzed to improve network security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a system in which an organization's event and security data is funneled to a management console in the main office
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
You monitor and evaluate network traffic to gather evidence that indicates whether your IDPS _________________ are working well or need to be updated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a program in which network connections are scanned and alerts are generated when logons are attempted from a suspicious IDPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Groups known as ______________ teams are assembled to actively test a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
_______________ management involves modifying equipment,systems,software,or procedures in a sequential,planned way.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
One way to consolidate the data from several network and security devices is to transfer the information to a central _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
the process of magnetically erasing an electronic device,such as a monitor or a disk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
a strong implementation of the DiD concept in which security personnel expect that attacks will occur and try to anticipate them
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
MATCHING
a.active defense in depth
b.centralized data collection
c.degaussing
d.distributed data collection
e.independent audit
f.operational audit
g.security event management program
h.social engineering
i.target-to-console ratio
j.Tinkerbell program
the number of target computers on a network managed by a single command console
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
How does distributed data collection work when collecting data from multiple sensors?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Discuss the process of IDPS signature evaluation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
How can change adversely affect your network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
List three types of changes for which you should use change management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Discuss operational auditing.Include in your discussion what should be looked for in an operational audit and what methods might be used in the audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
If you determine that a Trojan program has been installed and is initiating a connection to a remote host and you suspect passwords have been compromised,what steps should you take? List three of them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What is security auditing and what type of information should be analyzed?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
List and define the areas for which DiD calls for maintenance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
List the advantages of centralized data collection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
List four type of events you should monitor as part of a security event management program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.