CS205 MCQS
CS205 MCQS
CS205 MCQS
Senior management
5. If account lockout feature value is set to “0” on a ms 2012 member server than?
The account will never be locked despite of several failed login attempts
The account will be locked and system will have to be rebooting
Will require administrator to unlock the account
Will have to disconnect from network
6. _________________ is the part of Information Security Awareness.
Procedure
Standard
Policy
Training
CS205 MIDTERM MCQ | OBJECTIVE PREPARATION
7. What does check content explain about rule in DISA STIG?
Describes the control
escribes the benefit of implementing control
Tells how to check whether control is implemented or not
Tells how to apply control
9. For effective information security implementation, the security journey should start
with___________.
Developing comprehensive policies and procedures
Management commitment
Security hardening and vulnerability management of IT assets
A penetration test
10. A policy is ___________________.
Mandatory and limited in scope to a department
Mandatory and applies to entire organization; signed off by senior management
Not mandatory but a guideline only
Signed off by information security department
11. What are the three types of redundant site models in an enterprise network?
Hot site, cold site and warm site
Primary site, secondary site and DR site
Highly available site, fault tolerant site and DR site
Both a & b
13. The 4 layer security transformation model and isms requirements and controls
__________________.
Are both separate security programs
Are both separate security projects
CS205 MIDTERM MCQ | OBJECTIVE PREPARATION
May form essential elements of the security program
None of the given
Systems security
Governance
Mobile security
None of these
None of these
Integrity
Availability
18. In Bangladesh Bank SWIFT Hack – Feb 2016 Hackers used SWIFT credentials of
Bangladesh Central Bank employees to send more than -------- fraudulent money transfer
requests
Two dozen
three dozen
four dozen
twelve dozen
19. In Bangladesh Bank SWIFT Hack – Feb 2016, what amount was stolen?
CS205 MIDTERM MCQ | OBJECTIVE PREPARATION
USD 18 MILLION
USD 81 million
USD 28 MILLION
20. As per PWC Global Economic Crime Report 2016, ______ was amongst the top 3 most
commonly reported types of economic crime
Information hack
Cyber Crime
Data breach
23. Pakistan ranked almost at the _____ of the table in International ranking by ITU
Top
Bottom
Middle
Professional associations
All of these
CS205 MIDTERM MCQ | OBJECTIVE PREPARATION
25. CIRT stands for
APCERT
OWASP
Security Governance
Security Engineering
Security Hardening
Security Fastening
Security Hardening
Security Implementation
Vulnerability Management
CS205 MIDTERM MCQ | OBJECTIVE PREPARATION
30. Core governance activities do not include:
Change management
incident management
internal audit
Performance reviews
Security in AN enterprise
Executive Management
33. The world’s leading and most widely adopted security governance standard
ISO27000:2013
ISO27001:2013
ISO2701:2012
ISO27001:2016
34. ISO27001:2013 Contains Ten short clauses and a long Annex with
Policy
Guideline
Standard
Policy
SOP
Guidelines
Policy
Guideline
SOP
Standard
38. Sum-total of all activities planned and executed by the organization to meet its security
objectives is called
Security Program
Security Project
Security Cycle
39. In CIS benchmark categories, which category contains the maximum number of bench
marks?
Multifunction print devices
Operating systems(36)
Mobile devices
Desktop software
CS205 MIDTERM MCQ | OBJECTIVE PREPARATION
40. In CIS benchmark categories, which category contains the minimum number of bench
marks?
Multifunction print devices(1)
Operating systems
Mobile devices
Desktop software
107
117
108
Profile applicability (ASA 8.X, ASA 9.X), Description, Rationale, Audit, Remediation, Default Value,
References
Profile applicability (ASA 8.X, ASA 9.X), Remediation, Default Value, References
43. In CIS benchmark of session timeout, if The default timeout is 0, this means
The console session will be handled by administrator
44. According to CIS, _____ intended for environments or use cases where security is
paramount
Level 1
Level 2
CCI
45. In CIS benchmark for ensuring maximum password age Values for this policy setting range
from
0 to 990 days
1 to 999 days
0 to 999 days.
CS205 MIDTERM MCQ | OBJECTIVE PREPARATION
46. In CIS benchmark for ensuring maximum password age, If you set the value to 0,
the password will never expire.
47. In unclassified version of DISA STIGs, how many STIGs are available?
420
409
427
425
48. Any vulnerability, the exploitation of which has a potential to result in loss of
Confidentiality, Availability, or Integrity is a:
CAT 1
CAT 2
CAT 3
Open
Not recommended
Not a finding
Not applicable
50. The account lockout feature, when enabled, prevents ______ attacks on the system.
Security breach
Virus
brute-force password
malicious intruder
51. The network devices must time out access to the console port at 10 minutes or less of
inactivity. This benchmark has severity of:
CAT 3
CAT2
CS205 MIDTERM MCQ | OBJECTIVE PREPARATION
CAT 1
SCAP
NESSUS
None of these
53. For small and medium sized organizations, what is well suited?
DISA
CIS
Both
54. Autoplay must be disabled for all drives. This CIS benchmark has the severity of:
CAT 1
CAT 2
CAT3
55. Shells with ______ permissions give the ability to maliciously modify the shell to obtain
unauthorized access.
world/group-read
world/group-write
world/group-update
56. By default, Oracle Net Listener permits only ______ for security reasons
local administration
remote administration
senior administration
57. the syntax needed to execute rename the system administrator(sa) login:
58. REMOTE_OS_ROLES to _____ allows operating system groups to control Oracle roles
TRUE
False
59. McAfee is
Enterprise VirusScan
Web Defender
PC Optimizer
60. The default value for the benchmark Configure 'Do not allow users to enable or disable
add-ons' is:
ENABLED
DISABLED
62. _________ is a basic network scanning technique used to determine which of a range of
IP addresses map to live hosts
Port Sniffing
DNS Enumeration
Ping sweep
Root account
Master account
Admin account
CS205 MIDTERM MCQ | OBJECTIVE PREPARATION
64. SAMM Stands for:
Security Assessment and Monitoring Method
65. Which of the following does not come under GOVERNANCE business principle?
Strategy & Metrics
Threat Assessment
Updates
Amendments
68. The capability of the org to continue delivery of products or services at acceptable
predefined levels following a disruptive incident is called
Business continuity
Disaster Recovery
Management Commitment
RPO
VM