Deck 11: Defense in Depth, Software Development, and Data Analysis

Full screen (f)
exit full mode
Question
Marcus, a cybersecurity manager, wants to perform random audits on user systems. He knows that a complete audit of one system could take an entire day or more. Which of the following might he implement to allow him to accomplish these random audits?

A) Mandatory vacation
B) Succession planning
C) Separation of duties
D) SIEM
Use Space or
up arrow
down arrow
to flip the card.
Question
Tonia has just completed an audit of the accounts payable system and discovered what appears to be the embezzlement of funds by a clerk.The clerk was able to create entries of payments to be made and was also allowed to approve the payments. Which of the following might have prevented this situation from occurring and should be implemented immediately?

A) Dual control
B) Cross-training
C) Succession planning
D) Separation of duties
Question
Muhammed is a cybersecurity engineer for a quickly growing organization. He is concerned that his team may not be able to keep up with the growth, and that a system might remain vulnerable to certain exploits. He is considering taking advantage of the cloud to help accommodate the growth. Which of the following might he choose to use?

A) SaaS
B) SECaaS
C) SIEM
D) IaaS
Question
A growing organization has recently created a policy that everyone in upper management must train each other in various aspects of their jobs.They must also train one of their direct reports to perform key parts of their jobs. The object is to establish continuity of the organization's operations if something catastrophic happens to a manager. Which of the following terms best describes the type of policy that has been implemented?

A) Succession planning
B) Job rotation
C) Dual control
D) Separation of duties
Question
Samara needs to retrieve the private key from the key escrow service her company uses.Upon trying to retrieve the key, she is advised that at least two authorized personnel must request the key before it can be released. Which of the following has been implemented by the key escrow service?

A) Job rotation
B) Separation of duties
C) Dual control
D) Succession planning
Question
Falik has just returned from a cybersecurity conference where he learned about a UTM that provides some new features he would like to implement within his network. Which of the following best describes what he would like to implement?

A) SIEM
B) Next-generation firewall
C) Security appliance
D) Event logger
Question
Paris is designing the logical configuration for the company's new headquarters building. He knows that several departments, including Human Resources and the research and development group, should not be able to communicate with each other. Which of the following should he include as part of the network design requirements?

A) ICS
B) Obfuscation
C) Automated reporting systems
D) Subnetting
Question
Hannah has just been hired to review a large organization's formal IT processes and procedures. She finds that the company's backup methods create unacceptable risks because of potential data loss in a disaster, such as a fire. She recommends backing up the company's data to the cloud instead of storing magnetic tapes onsite. Which of the following best describes Hannah's recommendations?

A) Non-repudiation
B) Succession planning
C) Request for change
D) Process retirement
Question
Amadeus is composing a new web application that his organization will make available to the general public. The site will offer users the ability to sign up for accounts and interact with certain functions of the application. Which of the following should he ensure is done as part of the sign-up process?

A) Input validation
B) Fuzzing
C) Static code analysis
D) Automated reporting
Question
Octavius has developed a new application and wants to ensure that there are no issues with memory corruption or program crashes as a result of certain types of input being sent to the application. Which of the following might he use to meet this goal?

A) Application stress testing
B) Fuzzing
C) Input validation
D) Regression testing
Question
Aurelia has just modified a module in one of her company's software applications to add a new feature. Which of the following should be done to ensure that the changes did not adversely affect any other areas of the application?

A) Static code analysis
B) Regression testing
C) Application stress testing
D) User acceptance testing
Question
Marilla is creating an application that will be installed on all client computers in her organization. Which of the following should be performed before the application is compiled and distributed?

A) Regression testing
B) Static code analysis
C) Web application vulnerability scanner
D) Historical analysis
Question
Phil wants to determine whether the new email filter on the company's mail server has been effective in reducing the number of malware instances detected on user computers. Which of the following is the best answer to describe what he should use for his analysis?

A) Data aggregation
B) Trend analysis
C) Data correlation
D) Intrusion detection system
Question
Brianne wants to find some best practices to share with the development team in her organization. Which of the following is not a good source for this type of information?

A) OWASP
B) SANS
C) CIS
D) ARIN
Question
Chase has found a virtual machine on one of the hosts in the data center that has been capturing packets, logging all of the GET and POST requests and parameters, and forwarding that information outside of the network. Which of the following best describes what he might have discovered?

A) Interception proxy
B) Fuzzer
C) Ransomware
D) Port scanner
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/15
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Defense in Depth, Software Development, and Data Analysis
1
Marcus, a cybersecurity manager, wants to perform random audits on user systems. He knows that a complete audit of one system could take an entire day or more. Which of the following might he implement to allow him to accomplish these random audits?

A) Mandatory vacation
B) Succession planning
C) Separation of duties
D) SIEM
Mandatory vacation
2
Tonia has just completed an audit of the accounts payable system and discovered what appears to be the embezzlement of funds by a clerk.The clerk was able to create entries of payments to be made and was also allowed to approve the payments. Which of the following might have prevented this situation from occurring and should be implemented immediately?

A) Dual control
B) Cross-training
C) Succession planning
D) Separation of duties
Separation of duties
3
Muhammed is a cybersecurity engineer for a quickly growing organization. He is concerned that his team may not be able to keep up with the growth, and that a system might remain vulnerable to certain exploits. He is considering taking advantage of the cloud to help accommodate the growth. Which of the following might he choose to use?

A) SaaS
B) SECaaS
C) SIEM
D) IaaS
SECaaS
4
A growing organization has recently created a policy that everyone in upper management must train each other in various aspects of their jobs.They must also train one of their direct reports to perform key parts of their jobs. The object is to establish continuity of the organization's operations if something catastrophic happens to a manager. Which of the following terms best describes the type of policy that has been implemented?

A) Succession planning
B) Job rotation
C) Dual control
D) Separation of duties
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
5
Samara needs to retrieve the private key from the key escrow service her company uses.Upon trying to retrieve the key, she is advised that at least two authorized personnel must request the key before it can be released. Which of the following has been implemented by the key escrow service?

A) Job rotation
B) Separation of duties
C) Dual control
D) Succession planning
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
6
Falik has just returned from a cybersecurity conference where he learned about a UTM that provides some new features he would like to implement within his network. Which of the following best describes what he would like to implement?

A) SIEM
B) Next-generation firewall
C) Security appliance
D) Event logger
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
7
Paris is designing the logical configuration for the company's new headquarters building. He knows that several departments, including Human Resources and the research and development group, should not be able to communicate with each other. Which of the following should he include as part of the network design requirements?

A) ICS
B) Obfuscation
C) Automated reporting systems
D) Subnetting
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
8
Hannah has just been hired to review a large organization's formal IT processes and procedures. She finds that the company's backup methods create unacceptable risks because of potential data loss in a disaster, such as a fire. She recommends backing up the company's data to the cloud instead of storing magnetic tapes onsite. Which of the following best describes Hannah's recommendations?

A) Non-repudiation
B) Succession planning
C) Request for change
D) Process retirement
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
9
Amadeus is composing a new web application that his organization will make available to the general public. The site will offer users the ability to sign up for accounts and interact with certain functions of the application. Which of the following should he ensure is done as part of the sign-up process?

A) Input validation
B) Fuzzing
C) Static code analysis
D) Automated reporting
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
10
Octavius has developed a new application and wants to ensure that there are no issues with memory corruption or program crashes as a result of certain types of input being sent to the application. Which of the following might he use to meet this goal?

A) Application stress testing
B) Fuzzing
C) Input validation
D) Regression testing
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
11
Aurelia has just modified a module in one of her company's software applications to add a new feature. Which of the following should be done to ensure that the changes did not adversely affect any other areas of the application?

A) Static code analysis
B) Regression testing
C) Application stress testing
D) User acceptance testing
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
12
Marilla is creating an application that will be installed on all client computers in her organization. Which of the following should be performed before the application is compiled and distributed?

A) Regression testing
B) Static code analysis
C) Web application vulnerability scanner
D) Historical analysis
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
13
Phil wants to determine whether the new email filter on the company's mail server has been effective in reducing the number of malware instances detected on user computers. Which of the following is the best answer to describe what he should use for his analysis?

A) Data aggregation
B) Trend analysis
C) Data correlation
D) Intrusion detection system
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
14
Brianne wants to find some best practices to share with the development team in her organization. Which of the following is not a good source for this type of information?

A) OWASP
B) SANS
C) CIS
D) ARIN
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
15
Chase has found a virtual machine on one of the hosts in the data center that has been capturing packets, logging all of the GET and POST requests and parameters, and forwarding that information outside of the network. Which of the following best describes what he might have discovered?

A) Interception proxy
B) Fuzzer
C) Ransomware
D) Port scanner
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 15 flashcards in this deck.