For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated regularly during each work session?
Answer : D
Regular rotation of staff monitoring critical CCTV systems is recommended primarily to address the limitations of the human attention span. Research suggests that the average human attention span during intense monitoring tasks is approximately 20 minutes. After this period, vigilance and alertness can significantly decrease, leading to a potential lapse in monitoring effectiveness. Rotating staff helps to ensure that individuals are always at their most attentive when observing the CCTV feeds, which is crucial for maintaining security and safety standards. This practice also helps to mitigate risks associated with fatigue and the potential for missing critical events or details.
One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.
What system from the following does NOT natively support syslog events?
Answer : B
Syslog is a standard for message logging and allows devices to send event notification messages across IP networks to event message collectors - also known as Syslog servers or SIEM (Security Information and Event Management) systems. Native support for syslog is commonly found in various network devices and Unix/Linux-based systems.
Enterprise Wireless Access Points,Linux Web Server Appliances, andEnterprise Stateful Firewallstypically have built-in capabilities to generate and send syslog messages to a SIEM system for monitoring and analysis.
When an organisation decides to operate on the public cloud, what does it lose?
Which of the following subjects is UNLIKELY to form part of a cloud service provision laaS contract?
Answer : A
In the context of a cloud service provision, particularly Infrastructure as a Service (IaaS), the focus is typically on providing the physical or virtual infrastructure to the customer. The responsibility for user security education generally falls within the domain of the customer, as it pertains to their internal operations and how their employees or users interact with the IaaS. The IaaS provider's responsibilities are more aligned with ensuring the security of the infrastructure itself, rather than the education of users on security practices.
Intellectual Property Rights (B), End-of-service , and Liability (D) are all common considerations in cloud service contracts. Intellectual Property Rights would cover the ownership of data and software used within the service. End-of-service terms would outline the process and responsibilities when the service term ends, including data retrieval or transfer. Liability clauses would define the extent to which the provider is responsible for damages or losses incurred due to service issues.
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
What advantage does the delivery of online security training material have over the distribution of printed media?
Answer : A
While option C mentions a 'discoverable record,' this refers to the legal concept that materials may be used as evidence in litigation. However, this is not an advantage of online over printed media, as both can be discoverable. Option B's claim that online materials are intrinsically more accurate is not necessarily true, as accuracy depends on the content's quality, not the delivery method. Option D is incorrect because while online materials are protected by copyright laws, this is not an exclusive benefit over printed materials, which are also protected.