Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?
Answer : C
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It establishes a barrier between a secure internal network and an untrusted external network, such as the internet. This system is designed to prevent unauthorized access to or from private networks and is a fundamental piece of a comprehensive security framework for any organization.
The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?
Answer : D
The best practice to prevent misuse of administrative privileges is to have administrators use a separate non-privileged account for routine tasks that do not require administrative rights. This reduces the risk of accidental changes or security breaches that could occur if the administrator's highly privileged account were compromised or misused during daily operations.
Which of the following is MOST effective in detecting unknown malware?
Answer : D
Heuristic-based anti-malware is designed to detect new, previously unknown viruses and exploits by looking for known suspicious behavior patterns or anomalies. Unlike signature-based anti-malware, which relies on a database of known malware signatures, heuristic analysis can identify new threats without prior knowledge of the specific malware, making it more effective against unknown malware.
Which of the following BEST helps IT administrators to ensure servers have no unnecessary features installed?
Answer : A
Which of the following types of backups requires the MOST time?
Answer : C
A full backup involves copying all data to the backup storage location. It is the most comprehensive type of backup, which makes it the most time-consuming. This is because every file and folder is included in the backup, regardless of when it was last modified.
Incremental and differential backups are faster because they only copy data that has changed since the last backup. Incremental backups include data that has changed since the last incremental backup, while differential backups include data that has changed since the last full backup.
Offsite backups refer to the location where the backup is stored rather than the method of backup, so the time required can vary widely depending on the specific circumstances.
Which of the following controls BEST prevents users from intentionally or unintentionally accessing data they are not authorized to view?
Answer : A
The principle of least privilege is a security concept that restricts users' access rights to only what is strictly necessary for their job functions. This control is the most effective in preventing unauthorized data access because it minimizes the chances of users, either intentionally or unintentionally, accessing data they are not authorized to view. It ensures that users are granted the minimum levels of access -- or permissions -- needed to perform their work. This reduces the risk of accidental or deliberate access to sensitive information.
The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?
Answer : D
The presence of known dangerous artifacts like malicious IP addresses or domain names on a network typically indicates that a security breach has occurred or is in progress. These artifacts are often recognized as indicators of compromise (IoCs), which are pieces of forensic data, such as system log entries or files, that identify potentially malicious activity on a system or network. Identifying IoCs is crucial for cybersecurity as it allows organizations to detect breaches quickly and respond to them promptly.