|
Which of the following describes a security risk analysis?
Using the maximum amount of security possible on each asset in your organization
Reviewing the assets that need to be protected versus the cost of protecting the asset and the likelihood of the asset being attacked
Waiting for an attack to occur and then figuring out what you must do to repair the damage.
Determining what assets are at risk and providing the maximum amount of security to these assets
| ||
|
When analyzing the security risks of a network, which of the following categories of assets should you be looking at? (Choose all that apply.)
Data
Hardware
Disks
Software
Backup plans
Documentation
| ||
|
Jennifer’s company is worried about sensitive company data being used on laptops that are stolen from time to time from the company’s sales staff. The company sales force uses the data to sell products, issue quotes, and address customer concerns. There is not always a network connection and it is important that the sales force have the data. Jennifer wants to update the company’s security policy to reflect this concern. Which of the following should she include in the security policy?
Laptop users need strong passwords.
Data should not be saved to laptop computers.
Laptop users must use smart cards for authentication.
A suitable form of encryption must be used on sensitive files located on laptop computers.
| ||
|
Elliott is concerned about the servers in his company. Many are stored in spare offices or closets and a few have been stolen lately. What type of security should Elliott address in his company’s security policy?
Logical
Physical
Data encryption
Password policy
| ||
|
Helena needs to connect a Unix server that does not support Active Directory to the network. Which of the following would be a technical constraint of enforcing security on the network by this addition?
Users on the Unix OS will not be able to use resources on the rest of the network.
Users on the Unix OS will not have secure access to files because Unix does not support access control lists (ACLs).
Administrators will be unable to enforce password policies through Group Policy for users on the Unix server.
Users on the Windows Server 2003 network will not be able to connect to the Unix server.
| ||
|
Faith works for a small firm that rents medical monitoring instruments to patients. Which of the following would need to be considered the most important part of its security policy?
Backup plan
Lockout period in the user password policy
Protection of data on laptop computers
Government industry regulations
| ||
|
Ann is the CTO of a large bank. The bank wants to provide a Web presence where its customers can view their financial records. What is the biggest risk to the customer that Ann should consider?
Controlling access to the internal file servers
Maintaining the privacy of financial records over the Internet
Making sure the users cannot manipulate cookies on their own computers
Avoiding ActiveX controls like Macromedia Flash in the building of its website
| ||
|
Dave manages a web application that his company’s sales force uses to check on product information, place orders, and manage their customers’ information. He only has a web server and FTP server installed. It is vital that this application is up for 24 hours, 7 days a week because it will translate into lost sales and potentially lost customers if it is down. Which of the following attacks should Dave be most concerned about?
Man in the middle
Spoofing
Spamming
Denial of service
| ||
|
Lenin wants to automate the enforcement of many aspects of his company’s security policy. What tools in Windows Server 2003 could he use to accomplish this purpose? (Choose all that apply.)
Active Directory Users And Computers
Security Configuration And Analysis
Security Settings
Security Templates
| ||
|
Which of the following should be considered when analyzing the requirements for securing data? (Choose the best answer.)
The type of data
Data synchronization with mobile users
Backup plan for the data
Data access patterns
|
Answers