156 Chapter 7 ■ Security Operations (Domain 7)
- Match each of the numbered terms with its correct lettered definition:
Terms
- Honeypot
- Honeynet
- Pseudoflaw
- Darknet
Definitions
A. An intentionally designed vulnerability used to lure in an attacker
B. A network set up with intentional vulnerabilities
C. A system set up with intentional vulnerabilities
D. A monitored network without any hosts
- Which one of the following mechanisms is not commonly seen as a deterrent to fraud?
A. Job rotation
B. Mandatory vacations
C. Incident response
D. Two-person control - Brian recently joined an organization that runs the majority of its services on a virtualiza-
tion platform located in its own data center but also leverages an IaaS provider for hosting
its web services and a SaaS email system. What term best describes the type of cloud
environment this organization uses?
A. Public cloud
B. Dedicated cloud
C. Private cloud
D. Hybrid cloud - Tom is responding to a recent security incident and is seeking information on the approval
process for a recent modification to a system’s security settings. Where would he most
likely find this information?
A. Change log
B. System log
C. Security log
D. Application log - Mark is considering replacing his organization’s customer relationship management
(CRM) solution with a new product that is available in the cloud. This new solution is
completely managed by the vendor, and Mark’s company will not have to write any code
or manage any physical resources. What type of cloud solution is Mark considering?
A. IaaS
B. CaaS