ANSWERS GRADED A+
✔✔Mitigating risks from third-party vendors - ✔✔Vendor assessments, security clauses,
and continuous monitoring.
✔✔Role of continuous monitoring in governance - ✔✔Detects changes, anomalies, or
compliance deviations in real time to maintain security posture.
✔✔Key principle of risk management - ✔✔Identifying, assessing, and prioritizing risks.
✔✔Advantage of ACLs over traditional UNIX permissions - ✔✔ACL's offer fine-grained
permissions beyond standard UNIX permissions.
✔✔SIEM - ✔✔Security Information and Event Management.
✔✔Forensics in incident response - ✔✔Collecting and analyzing digital evidence.
✔✔Command for setting ACLs on Rocky Linux 9 - ✔✔setfacl.
✔✔Purpose of a chaos model in incident response - ✔✔Tests incident response
readiness by simulating unpredictable failures or attacks.
✔✔Tool for monitoring file access and changes in Linux - ✔✔auditd.
✔✔NFSv4 - ✔✔Network File System version 4
✔✔Benefit of NFSv4 - ✔✔Improves security and performance by integrating strong
authentication.
✔✔Command to view current ACLs - ✔✔getfacl
✔✔Fine-grained access control feature - ✔✔SELinux
✔✔Purpose of automated incident response systems - ✔✔Detect, contain, and mitigate
threats.
✔✔Importance of automation in incident response - ✔✔Improves speed, consistency,
and scalability in responding to security incidents.
✔✔Role of identity management systems - ✔✔Control user access, authentication, and
permissions across the organization.
, ✔✔Least privilege in identity management - ✔✔Granting users only the access required
to perform their job duties.
✔✔Single sign-on (SSO) - ✔✔Allows users to authenticate once to access multiple
systems securely.
✔✔Shadow IT - ✔✔Unsanctioned applications or systems used without IT approval.
✔✔First step in implementing security controls - ✔✔Identifying and classifying assets
and risks.
✔✔Network security policy - ✔✔Defines how to protect network resources, traffic, and
access.
✔✔Effectiveness of a network security policy - ✔✔Enforcement, employee awareness,
and regular review.
✔✔Preventive control in network security - ✔✔Stops incidents before they occur.
✔✔Key component of a security strategy - ✔✔Aligning controls with business objectives
and risk tolerance.
✔✔Goal of information assurance management - ✔✔Maintain confidentiality, integrity,
and availability (CIA).
✔✔Security incident response plan components - ✔✔Detection, reporting, containment,
eradication, recovery, and review.
✔✔Fundamental to enterprise security and identity management - ✔✔Access Control.
✔✔Framework guiding enterprise security operations - ✔✔NIST Cybersecurity
Framework
✔✔Process of continual monitoring of security measures - ✔✔Continuous Monitoring
✔✔Importance of regular review of security policies - ✔✔Ensure policies stay current
with threats and regulations.
✔✔Asset valuation - ✔✔Determining an asset's financial or operational importance.
✔✔Importance of asset valuation in security planning - ✔✔It helps prioritize protection
based on asset criticality and potential loss.