General Security Concepts Assessment
A security analyst wishes to implement a system that enforces access decisions to
ensure that the privileges granted to an individual are appropriate for their role within the
organization. Which component is critical for enforcing these access control decisions? -
✔✔ - B. Policy enforcement point
After encountering a cyber attack, an organization uses a monitoring solution that
automatically restarts services after it has detected the system has crashed. What type
of functional security control is the company implementing? - ✔✔ - A. Corrective
A company installed a new locking cabinet in the computer room to hold extra flash
drives and other supplies. Which type of security control did the company configure? -
✔✔ - A: Preventive
The organization's engineering team observes a system failure during the
implementation of new software patching. From a conceptual standpoint, what can the
team use to restore the system to its original state? - ✔✔ - D. Backout plan
A cyber security analyst wants to reduce the attack surface for a computer that contains
top secret data. The analyst installs a central processing unit (CPU) that contains a
cryptoprocessor on the designated computer to accomplish this. What type of
cryptoprocessor is the analyst installing? - ✔✔ - C. Trusted Platform Module (TPM)