Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security+ Simulations

Similar presentations


Presentation on theme: "Security+ Simulations"— Presentation transcript:

1 Security+ Simulations
Test Review

2  Organize the following list in the correct order based on each item’s volatility. List the items from most volatile to least volatile.

3  Organize the following list in the correct order based on each item’s volatility. List the items from most volatile to least volatile. ANSWER

4 The following table includes three columns: attack methods, attack targets, and attack types. However, they are jumbled and not in the correct order. Would you be able to rearrange the items in the table so that each attack method is matched to the appropriate attack target and attack type? Each attack method, attack target, and attack type is used only once so your solution needs to ensure that all choices are used.

5 The following table includes three columns: attack methods, attack targets, and attack types. However, they are jumbled and not in the correct order. Would you be able to rearrange the items in the table so that each attack method is matched to the appropriate attack target and attack type? Each attack method, attack target, and attack type is used only once so your solution needs to ensure that all choices are used. Answer

6  Some of these are used only on mobile devices, some are only used on servers, and some can be used on both. Which security controls are for mobile devices? Which security controls are for servers?

7  Some of these are used only on mobile devices, some are only used on servers, and some can be used on both. Which security controls are for mobile devices? Answer

8  Some of these are used only on mobile devices, some are only used on servers, and some can be used on both. Which security controls are for servers? Answer

9

10 Quantitative Risk Assessment
SLE – Single Loss Expectancy ARO – Annualized Rate of Occurrence ALE – Annualized Loss Expectance SLE X ARO

11 Quantitative Risk Assessment
Calculate ALE. For example, if a fire at the same organization's Web farm results in $37,500 in damages, and the probability, or ARO, of a fire taking place has an ARO value of 0.1 (indicating once in ten years), then the ALE value in this case would be $3,750 ($37,500 x 0.1 = $3,750).

12 Quantitative Risk Assessment
Calculate ALE. A server containing critical data will cost the company $200/hour if it were to be unavailable due to DoS attacks. The security administrator expects the server to become unavailable for a total of two days next year. Which of the following is true about the ALE? ALE value in this case would be $9,600 ($200 x 48 hours = $9,600).

13 Quantitative Risk Assessment
Calculate ALE. Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years. Which of the following should Sara do to address the risk? Transfer the risk saving $5,000. (Difference between $30,000 [(2/yr X 3,000 = 6,000/yr X 5 years) & $25,000 third party/5 yrs.)

14 Quantitative Risk Assessment
Calculate ALE. Sara from IT Governance wants to provide a mathematical probability of an earthquake using facts and figures. Which of the following concepts would achieve this? SLE divided by the ARO

15 Ports & Protocols

16 Ports & Protocols

17 Ports & Protocols Q. What port do you need to close to block outgoing ? A. Port 22 B. Port 25 C. Port 110 D. Port 443

18 Ports & Protocols Answer: B
TCP port 25 is used for SMTP and SMTP is used for outgoing . TCP port 22 is used for SSH, SFTP, and SCP but not for . TCP port 110 is used for POP3 but POP3 is only used for incoming , not outgoing . TCP port 443 is used for HTTPS, not .

19 Subnet Mask A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks. Which of the following is MOST likely the reason for the sub-interfaces? A. The network uses the subnet of B. The switch has several VLANs configured on it. C. The sub-interfaces are configured for VoIP traffic. D. The sub-interfaces each implement quality of service. Answer: B

20 Subnet Mask Which of the following IP addresses would be hosts on the same subnet given the subnet mask ? (Select TWO). A B C D E Answer: C,D


Download ppt "Security+ Simulations"

Similar presentations


Ads by Google