Skip to main content

IS5403-1W4 podcast Quiz Solutions





Drag the words into the correct boxes

1. According to Prof Nop the 
Security
 Footprint of Databases is 
large


2. This is because of 
misconfiguration
 like installing a bunch of things that you don’t need. 

3. That increases your security footprint becuase it is more 
maintenance
 and you can forget to 
update
 everything because you are focused mostly on what you use often.

4. Prof Nop says that people create databases with 
excess
 administrative privileges.

5. According to Prof Nop, Just like any code, when you don’t have something to 
sanitize
 the data coming in, the result is having 
code
 that is susceptible to 
injects
 that can damage your application.

6. According to Dr. McIver, “Just win baby" works in 
football
 but doesn’t work in 
cybersecurity
.

7. When you ignore the 
confidentiality
 and 
integrity
 portions of the CIA triad it ultimately impacts 
availability
.

8. Prof Nop says that a threat actor may not want to take down your system but 
manipulate
 the data in your system leading to bad decision making.

9. We (cybersecurity professionals) always want all 3 parts of the CIA triad but the 
business
 side needs to pick 1 to prioritize.

10. It is Prof Nop's advice that when you think about availability, think about that 
critical
 system that can’t go down.

11. 
Banking
 is the industry that Dr. McIver hesitant to do cybersecurity for

12. Prof Nop treats a 
Database
 is like a production system, you don’t want to mess with it while its being worked in.

13. Prof Nop says running the database in 
development/test
 or 
test/development
 version is a way to ensure that security won’t break a database.

14. Prof Nop says the DevSecOps is possible because you can run code through a 
pipeline
 and run security checks to ensure that the syntax is correct, check for 
vulnerabilities
, and check for unsecure configurations.

15. Cybersecurity pros need to be honest about “can’t” vs “won't’” when it comes to updating 
older/sensitive
 or 
sensitive/older
 systems.

16. Prof Nop says that you can build 
security
 around a sensitive database that can’t be 
modified
 for security purposes.

17. Prof Nop says that there is no such thing as a 
free
 lunch. In order to get something, you have to 
give
 something.

18. Dr. McIver says that the 
CISO
 is responsible for protecting the database, but business makes the 
decision
 to protect it.

19. Prof Nop uses 
segregation
 to protect the database from other parts of a network and says that if you have sensitive information don’t put it in the 
DMZ
.

20. Prof Nop says that you can also create separation by having different 
instances
, data in different 
tables
, or implementing different 
permissions
.

21. Dr. McIver didn’t understand how important 
databases
 were because he was focused on operations and hardware. Prof Nop says that working on databases are hard because the code is so 
sensitive
.

22. Prof Nop’s final bit of advice is, utilize 
Operating
 System security actions on the 
Database
 Management System. In the IT world, they segregate the 
network
, that can also be adopted in the management of databases. 
Encrypt
 your sensitive data. Database Management Systems now have features that allow for 
Role
 Based Access 
Controls
, creation of 
policies
 in the database environment, 
auditing
, or logging.  Logging allows you to determine what happened to your database.

Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh