WITH SOLUTIONS.
Which term describes any action that could damage an asset?
Threat
Bob recently accepted a position as the information security and compliance manager for
a medical practice. Which regulation is likely to most directly apply to Bob's
employer?
HIPPA
Rachel is investigating an information security incident that took place at the high school
where she works. She suspects that students may have broken into the student records
system and altered their grades. If correct, which one of the tenets of information security
did this attack violate?
Integrity
Which one of the following measures the average amount of time that it takes to repair a
system, application, or component?
MTTR
Juan's web server was down for an entire day last September. It experienced no other
downtime during that month. Which one of the following represents the web server
1
,uptime for that month?
96.67%
Which mitigation plan is most appropriate to limit the risk of unauthorized access to
workstations?
Password Protection
Which security control is most helpful in protecting against eavesdropping on wireless LAN
(WLAN) data transmissions that would jeopardize confidentiality?
applying strong encryption
Matthew captures traffic on his network and notices connections using ports 20, 22, 23,
and 80. Which port normally hosts a protocol that uses secure, encrypted
connections?
22
Which network device is capable of blocking network connections that are identified as
potentially malicious?
IPS
Which risk is most effectively mitigated by an upstream Internet service provider
2
,(ISP)?
DDoS
Beth must purchase firewalls for several network circuits used by her organization. Which
one circuit will have the highest possible network throughput?
OC-12
What is NOT a common endpoint for a virtual private network (VPN) connection used for
remote network access?
Content Filter
Which one of the following is typically used during the identification phase of a remote
access connection?
Username
During what phase of a remote access connection does the end user prove his or her claim
of identity?
Authentication
Which one of the following is NOT a good technique for performing authentication of an end
user?
3
, Identification Number
Which element of the security policy framework requires approval from upper
management and applies to the entire organization?
Policy
Which element of the security policy framework offers suggestions rather than mandatory
actions?
Guideline
Chris is writing a document that provides step-by-step instructions for end users seeking
to update the security software on their computers. Performing these updates is
mandatory. Which type of document is Chris writing?
Procedure
Which element of the IT security policy framework provides detailed written definitions
for hardware and software and how they are to be used?
Standard
Which classification level is the highest level used by the U.S. federal
government?
4