1. A bank requires tellers to get manager approval when a customer wants to open a new account. A recent audit shows that there have been four cases in the previous year where tellers opened accounts without management approval. The bank president thought separation of duties would prevent this from happening. In order to implement a true separation of duties approach the bank could:
A) Administer account creation on a rule based access control approach B) Administer account creation on a role based access control approach C) Require the use of two different passwords held by two different individuals to open an account D) Require all new accounts to be handled by someone else other than a teller since they have different duties
2. A global gaming console manufacturer is launching a new gaming platform to its customers. Which of the following controls reduces the risk created by malicious gaming customers attempting to circumvent control by way of modifying consoles?(Select 2answers)
A) Firmware version control B) Vulnerability scanning C) Automatic updates D) Network segmentation E) Application firewalls F) Manual software upgrades
3. A company recently replaced its unsecure email server with a cloud-based email and collaboration solution that is managed and insured by a third party. Which of the following actions did the company take regarding risks related to its email and collaboration services?
A) Mitigation B) Transference C) Acceptance D) Deterrence
4. A company recently experienced data exfiltration via the corporate network. In response to the breach,a security analyst recommends deploying an out-of-band IDS solution. The analyst says the solution can be implemented without purchasing any additional network hardware. Which of the following solutions will be used to deploy the IDS?
A) Network proxy B) Port mirroring C) Honeypot D) Network tap
5. An administrator has concerns regarding the traveling sales team who works primarily from smart phones. Given the sensitive nature of their work,which of the following would BEST prevent access to the data in case of loss or theft?
A) Enable screensaver locks when the phones are not in use to prevent unauthorized access B) Enable GPS tracking on all smart phones so that they can be quickly located and recovered C) Configure the smart phones so that the stored data can be destroyed from a centralized location D) Configure the smart phones so that all data is saved to removable media and kept separate from the device
Leave a comment