Deck 10: Security Structures and Identity and Access Management

ملء الشاشة (f)
exit full mode
سؤال
Which of the following IT security frameworks analyzes business requirements and then creates a "chain of traceability" through the concept, design, implementation, and continual phases of the business life cycle?

A) ISO
B) NIST
C) ISACA
D) SABSA
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Most U.S. organizations do not use a security framework.
سؤال
Which of the following IT security frameworks is a global non-profit association that develops practices, guidance, and benchmarks, and uses a tool called Control Objectives for Information and Related Technology (COBIT)?

A) ISO
B) NIST
C) ISACA
D) SABSA
سؤال
A(n) ________________ defines the actions users may perform while accessing devices and networks that belong to the organization.
سؤال
Which of the following types of controls includes multifactor authentication, firewalls, and intrusion detection systems?

A) Administrative controls
B) Logical controls
C) Physical controls
D) Online controls
سؤال
In social engineering _______________, a threat actor masquerades as a real or fictitious character and then plays out the role on a victim.
سؤال
In which of the following does an attacker secretly relay and possibly alter communications between two parties who believe that they are directly communicating with each other?

A) Session hijacking
B) Man-in-the-middle attack
C) Cross-site scripting
D) Privilege escalation
سؤال
To address security issues with directory services, many organizations are turning to what framework of business processes, policies, and technologies that facilitates the management of digital identities?
سؤال
In which of the following does a threat actor take advantage of web applications that accept user input without validating it before presenting it back to the user?

A) Session hijacking
B) Man-in-the-middle attack
C) Cross-site scripting
D) Privilege escalation
سؤال
Which of the following does not refer to the process of using a single authentication credential to access multiple accounts, networks, or applications?

A) TACACS+
B) Identity management
C) SSO
D) Federation
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Security Structures and Identity and Access Management
1
Which of the following IT security frameworks analyzes business requirements and then creates a "chain of traceability" through the concept, design, implementation, and continual phases of the business life cycle?

A) ISO
B) NIST
C) ISACA
D) SABSA
SABSA
2
Most U.S. organizations do not use a security framework.
False
3
Which of the following IT security frameworks is a global non-profit association that develops practices, guidance, and benchmarks, and uses a tool called Control Objectives for Information and Related Technology (COBIT)?

A) ISO
B) NIST
C) ISACA
D) SABSA
ISACA
4
A(n) ________________ defines the actions users may perform while accessing devices and networks that belong to the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following types of controls includes multifactor authentication, firewalls, and intrusion detection systems?

A) Administrative controls
B) Logical controls
C) Physical controls
D) Online controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
In social engineering _______________, a threat actor masquerades as a real or fictitious character and then plays out the role on a victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
In which of the following does an attacker secretly relay and possibly alter communications between two parties who believe that they are directly communicating with each other?

A) Session hijacking
B) Man-in-the-middle attack
C) Cross-site scripting
D) Privilege escalation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
To address security issues with directory services, many organizations are turning to what framework of business processes, policies, and technologies that facilitates the management of digital identities?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
In which of the following does a threat actor take advantage of web applications that accept user input without validating it before presenting it back to the user?

A) Session hijacking
B) Man-in-the-middle attack
C) Cross-site scripting
D) Privilege escalation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following does not refer to the process of using a single authentication credential to access multiple accounts, networks, or applications?

A) TACACS+
B) Identity management
C) SSO
D) Federation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.