Quiz Pool Chapters 7-12 Flashcards

(206 cards)

1
Q

Because even the implementation of new technologies does not necessarily guarantee an organization can gain or maintain a competitive lead, the concept of __________ has emerged as organizations strive not to fall behind technologically.

A

competitive disadvantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Treating risk begins with what?

A

an understanding of risk treatment strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application of training and education among other approach elements is a common method of which risk treatment strategy?

A

defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Each of the following is a recommendation from the FDIC when creating a successful SLA EXCEPT:

-determining objectives
-forecasting costs
-defining requirements
-setting measurements

A

forecasting costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What risk treatment strategies describes an organization’s attempt to shift risk to other assets, other processes, or other organizations?

A

transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What risk treatment strategies describes an organization’s efforts to reduce damage caused by a realized incident or disaster?

A

mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Strategies to reestablish operations at the primary site after an adverse event threatens continuity of business operations are covered by which of the following plans in the mitigation control approach?

A

disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The only use of the acceptance strategy that is recognized as valid by industry practices occurs when the organization has done all but which of the following?

-determined the level of risk posed to the information asset

-performed a thorough cost-benefit analysis

-determined that the costs to control the risk to an information asset are much lower than the benefit gained from the information asset

-assessed the probability of attack and the likelihood of a successful exploitation of a vulnerability

A

determined that the costs to control the risk to an information asset are much lower than the benefit gained from the information asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can be described as the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility?

A

risk appetite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The goal of InfoSec is not to bring residual risk to __________; rather, it is to bring residual risk in line with an organization’s risk appetite.

A

zero

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All of the following are rules of thumb for selecting a risk treatment strategy EXCEPT:

-When a vulnerability exists in an important asset, implement security controls to reduce the likelihood of a vulnerability being exploited.

-When the likelihood of an attack is high and the impact is great, outsource security efforts so that any resulting loss is fiscally someone else’s responsibility.

-When a vulnerability can be exploited, apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack.

-When the potential loss is substantial, apply design principles, architectural designs, and technical and nontechnical protections to limit the extent of the attack, thereby reducing the potential for loss.

A

When the likelihood of an attack is high and the impact is great, outsource security efforts so that any resulting loss is fiscally someone else’s responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is NOT a valid rule of thumb on risk treatment strategy selection?

-When a vulnerability exists: Implement security controls to reduce the likelihood of a vulnerability being exploited.

-When a vulnerability can be exploited: Apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack.

-When the attacker’s potential gain is less than the costs of attack: Apply protections to decrease the attacker’s cost or reduce the attacker’s gain by using technical or operational controls.

-When the potential loss is substantial: Apply design principles, architectural designs, and technical and non-technical protections to limit the extent of the attack, thereby reducing the potential for loss.

A

When the attacker’s potential gain is less than the costs of attack: Apply protections to decrease the attacker’s cost or reduce the attacker’s gain by using technical or operational controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Once a control strategy has been selected and implemented, what should be done on an ongoing basis to determine its effectiveness and to estimate the remaining risk?

A

monitoring and measurement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When vulnerabilities have been controlled to the degree possible, what is the remaining risk that has not been completely removed, shifted, or planned for?

A

residual risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The financial savings from using the defense risk treatment strategy to implement a control and eliminate the financial ramifications of an incident is known as __________.

A

cost avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Also known as an economic feasibility study, the formal assessment and presentation of the economic expenditures needed for a particular security control, contrasted with its projected value to the organization, is known as __________.

A

cost-benefit analysis (CBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The process of assigning financial value or worth to each information asset is known as __________.

A

asset valuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following affects the cost of a control?

-liability insurance

-CBA report

-asset resale

-maintenance

A

maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Each of the following is an item that affects the cost of a particular risk treatment strategy EXCEPT:

-cost of maintenance (labor expense to verify and continually test, maintain, train, and update)

-cost of development or acquisition (hardware, software, and services)

-cost of implementation (installing, configuring, and testing hardware, software, and services)

-cost of IT operations (keeping systems operational during the period of treatment strategy development)

A

cost of IT operations (keeping systems operational during the period of treatment strategy development)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

By multiplying the asset value by the exposure factor, you can calculate what?

A

single loss expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Each of the following is a commonly used quantitative approach for asset valuation EXCEPT:

-value to owners

-value to competitors

-value retained from past maintenance

-value to adversaries

A

value to competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the result of subtracting the postcontrol annualized loss expectancy and the annualized cost of the safeguard from the precontrol annualized loss expectancy?

A

cost-benefit analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What determines how well a proposed treatment will address user acceptance and support, management acceptance and support, and the system’s compatibility with the requirements of the organization’s stakeholders?

A

operational feasibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What determines acceptable practices based on consensus and relationships among the communities of interest?

A

political feasibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What determines whether the organization already has or can acquire the technology necessary to implement and support the proposed treatment?
technical feasibility
26
What determines how well the proposed InfoSec treatment alternatives will contribute to the efficiency, effectiveness, and overall operation of an organization?
organizational feasibility
27
Which of the following is NOT an alternative to using CBA to justify risk controls? -benchmarking -due care and due diligence -selective risk avoidance -the gold standard
selective risk avoidance
28
In which technique does a group rate or rank a set of information, compile the results, and repeat until everyone is satisfied with the result?
Delphi
29
Which alternative risk management methodology is a process promoted by the Computer Emergency Response Team (CERT) Coordination Center (www.cert.org) that has three variations for different organizational needs, including one known as ALLEGRO?
OCTAVE
30
The Microsoft Risk Management Approach includes four phases; which of the following is NOT one of them? -conducting decision support -implementing controls -evaluating alternative strategies -measuring program effectiveness
evaluating alternative strategies
31
Which of the following is not a step in the FAIR risk management framework? -identify scenario components -evaluate loss event frequency -assess control impact -derive and articulate risk
assess control impact
32
What does FAIR rely on to build the risk management framework that is unlike many other risk management frameworks?
qualitative assessment of many risk components
33
The ISO 27005 Standard for Information Security Risk Management includes all but which of the following stages?
risk determination
34
Which international standard provides a structured methodology for evaluating threats to economic performance in an organization and was developed using the Australian/New Zealand standard AS/NZS 4360:2004 as a foundation?
ISO 31000
35
The NIST risk management approach includes all but which of the following elements? -inform -assess -frame -respond
inform
36
NIST’s Risk Management Framework follows a three-tiered approach, with most organizations working from the top down, focusing first on aspects that affect the entire organization, such as __________.
governance
37
Which of the following is NOT one of the methods noted for selecting the best risk management model? -Use the methodology most similar to what is currently in use. -Study known approaches and adapt one to the specifics of the organization. -Hire a consulting firm to provide a proprietary model. -Hire a consulting firm to develop a proprietary model.
Use the methodology most similar to what is currently in use.
38
In information security, a framework or security model customized to an organization, including implementation details, is a _________.
blueprint
39
Which of the following is a generic model for a security program?
framework
40
In information security, a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls is known as a __________.
framework
41
Which of the following is the original purpose of ISO/IEC 17799?
To offer guidance for the management of InfoSec to individuals responsible for their organization’s security programs
42
When the ISO 27002 standard was first proposed, several countries, including the United States, Germany, and Japan, refused to adopt it, claiming that it had fundamental problems; which of the following is NOT one of them? -It was not as complete as other frameworks. -The standard lacked the measurement precision associated with a technical standard. -The standard was hurriedly prepared. -It was feared it would lead to government intrusion into business matters.
It was feared it would lead to government intrusion into business matters.
43
One of the most widely referenced InfoSec management models, known as Information Technology—Code of Practice for Information Security Management, is also known as __________.
ISO 27002
44
The managerial tutorial equivalent of NIST SP 800-12, providing overviews of the roles and responsibilities of a security manager in the development, administration, and improvement of a security program, is NIST __________.
SP 800-100: Information Security Handbook: A Guide for Managers (2007)
45
Which NIST publication describes the philosophical guidelines that the security team should integrate into the entire InfoSec process, beginning with “Security supports the mission of the organization”?
SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems (1996)
46
This NIST publication provides information on the elements of InfoSec, key roles and responsibilities, an overview of threats and vulnerabilities, a description of the three NIST security policy categories, and an overview of the NIST RM Framework and its use, among other topics needed for a foundation in InfoSec.
SP 800-12, Rev. 1: An Introduction to Information Security (2017)
47
Which of the following provides advice about the implementation of sound controls and control objectives for InfoSec, and was created by ISACA and the IT Governance Institute?
COBIT
48
Although COBIT was designed to be an IT __________ and management structure, it includes a framework to support InfoSec requirements and assessment needs.
49
The COSO framework is built on five interrelated components. Which of the following is NOT one of them? -control environment -risk assessment -control activities -InfoSec governance
InfoSec governance
50
The Information Technology Infrastructure Library (ITIL) is a collection of methods and practices primarily for __________.
managing the development and operation of IT infrastructures
51
The Information Security __________ is a managerial model provided by an industry working group, National Cyber Security Partnership, which provides guidance in the development and implementation of organizational InfoSec structures and recommends the responsibilities that various members should have in an organization.
Governance Framework
52
Which piece of the Trusted Computing Base's security system manages access controls?
reference monitor
53
Which security architecture model is part of a larger series of standards collectively referred to as the “Rainbow Series”?
TCSEC
54
Under the Common Criteria, which term describes the user-generated specifications for security requirements?
Protection Profile (PP)
55
Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary?
least privilege
56
What is the information security principle that requires significant tasks to be split up so that more than one individual is required to complete them?
separation of duties
57
Which access control principle limits a user’s access to the specific information required to perform the currently assigned task?
need-to-know
58
Controls that remedy a circumstance or mitigate damage done during an incident are categorized as which of the following?
corrective
59
Which of the following is NOT a category of access control? preventative mitigating deterrent compensating
mitigating
60
Which control category discourages an incipient incident—e.g., video monitoring?
deterrent
61
An information attack that involves searching through a target organization’s trash and recycling bins for sensitive information is known as __________.
dumpster diving
62
Which of the following is NOT one of the three levels in the U.S. military data classification scheme for National Security Information? confidential secret top secret for official use only
for official use only
63
Which of the following specifies the authorization level that each user of an information asset is permitted to access, subject to the need-to-know principle?
security clearances
64
Under lattice-based access controls, the column of attributes associated with a particular object (such as a printer) is referred to as which of the following?
access control list
65
Which type of access controls can be role-based or task-based?
nondiscretionary
66
In which form of access control is access to a specific set of information contingent on its subject matter?
content-dependent access controls
67
An ATM that limits what kinds of transactions a user can perform is an example of which type of access control?
constrained user interface
68
A time-release safe is an example of which type of access control?
temporal isolation
69
Which security architecture model is based on the premise that higher levels of integrity are more worthy of trust than lower ones?
Biba
70
Which of the following is NOT a change control principle of the Clark-Wilson model? -no changes by unauthorized subjects -no unauthorized changes by authorized subjects -no changes by authorized subjects without external validation -the maintenance of internal and external consistency
no changes by authorized subjects without external validation
71
Which of the following is NOT a common type of background check that may be performed on a potential employee? -identity -political activism -motor vehicle records -drug history
political activism
72
Employees pay close attention to job __________, and including InfoSec tasks in them will motivate employees to take more care when performing these tasks.
performance evaluations
73
Employees new to an organization should receive an extensive InfoSec briefing that includes all of the following EXCEPT: -signing the employment contract -security policies -security procedures -access levels
signing the employment contract
74
Incorporating InfoSec components into periodic employee performance evaluations can __________.
heighten InfoSec awareness
75
Which of the following is NOT a task that must be performed if an employee is terminated? -former employee must return all media -former employee’s home computer must be audited -former employee’s office computer must be secured -former employee should be escorted from the premises
former employee’s home computer must be audited
76
What policy requires that every employee be able to perform the work of at least one other staff member?
job rotation
77
What policy requires that two individuals review and approve each other’s work before the task is considered complete?
two-person control
78
What policy makes it difficult for an individual to violate InfoSec and is quite useful in monitoring financial affairs?
separation of duties
79
Organizations are required by privacy laws to protect sensitive or personal employee information, including __________.
personally identifiable information (PII)
80
Contract employees—or simply contractors—should not be allowed to do what?
Wander freely in and out of facilities.
81
Workers typically hired to perform specific services for the organization and hired via a third-party organization are known as __________.
contract employees
82
If a temporary worker (temp) violates a policy or causes a problem, what is the strongest action that the host organization can usually take, depending on the SLA?
Terminate the relationship with the individual and request that he or she be censured.
83
What is described as the process of designing, implementing, and managing the use of the collected data elements to determine the effectiveness of the overall security program?
performance management
84
Organizations must consider all but which of the following during development and implementation of an InfoSec measurement program? -Measurements must yield quantifiable information. -Data that supports the measures needs to be readily obtainable. -Only repeatable InfoSec processes should be considered for measurement. -Measurements must be useful for tracking non-compliance by internal personnel.
Measurements must be useful for tracking non-compliance by internal personnel.
85
Which of the following is NOT a factor critical to the success of an information security performance program? -strong upper-level management support -high level of employee buy-in -quantifiable performance measurements -results-oriented measurement analysis
high level of employee buy-in
86
Which of the following is NOT one of the types of InfoSec performance measures used by organizations? -those that determine the effectiveness of the execution of InfoSec policy -those that determine the effectiveness and/or efficiency of the delivery of InfoSec services -those that evaluate the frequency with which employees access internal security documents -those that assess the impact of an incident or other security event on the organization or its mission
those that evaluate the frequency with which employees access internal security documents
87
Which of the following is NOT a question a CISO should be prepared to answer before beginning the process of designing, collecting, and using performance measurements, according to Kovacich? -Why should these measurements be collected? -Where will these measurements be collected? -What affect will measurement collection have on efficiency? -Who will collect these measurements?
What affect will measurement collection have on efficiency?
88
The InfoSec measurement development process recommended by NIST is divided into two major activities. Which of the following is one of them? -development and selection of qualified personnel to gauge the implementation, effectiveness, efficiency, and impact of the security controls -identification and definition of the current InfoSec program -maintenance of the vulnerability management program -comparison of organizational practices against similar organizations
identification and definition of the current InfoSec program
89
InfoSec measurements collected from production statistics depend greatly on which of the following factors?
number of systems and users of those systems
90
Which of the following is NOT a phase in the NIST InfoSec performance measures development process? -Identify relevant stakeholders and their interests in InfoSec measurement. -Integrate the organization’s process improvement activities across all business areas. -Identify and document the InfoSec performance goals and objectives that would guide security control implementation for the InfoSec program. -Review any existing measurements and data repositories that can be used to derive measurement data.
Identify relevant stakeholders and their interests in InfoSec measurement.
91
One of the fundamental challenges in InfoSec performance measurement is defining what?
effective security
92
NIST recommends the documentation of performance measurements in a standardized format to ensure ____________.
the repeatability of measurement development, customization, collection, and reporting activities
93
What is a possible result of failure to establish and maintain standards of due care and due diligence?
legal liability
94
Which of the following is NOT a consideration when selecting recommended best practices? -threat environment is similar -resource expenditures are practical -organization structure is similar -same certification and accreditation agency or standard
same certification and accreditation agency or standard
95
Creating a blueprint by looking at the paths taken by organizations similar to the one whose plan you are developing is known as which of the following?
benchmarking
96
What do you call the legal requirements that an organization must adopt a standard based on what a prudent organization should do, and then maintain that standard?
due care and due diligence
97
Problems with benchmarking include all but which of the following? -Organizations don’t often share information on successful attacks. -Organizations being benchmarked are seldom identical. -Recommended practices change and evolve, so past performance is no indicator of future success. -Benchmarking doesn’t help in determining the desired outcome of the security process.
Benchmarking doesn’t help in determining the desired outcome of the security process
98
Which of the following is NOT a question to be used as a self-assessment for recommended security practices in the category of people? -Do you perform background checks on all employees with access to sensitive data, areas, or access points? -Are the user accounts of former employees immediately removed on termination? -Would the typical employee recognize a security issue? -Would the typical employee know how to report a security issue to the right people?
Are the user accounts of former employees immediately removed on termination?
99
The ISO certification process takes approximately six to eight weeks and involves all of the following steps EXCEPT: -rejection of the certification application based on lack of compliance or failure to remediate shortfalls -initial assessment of the candidate organization’s InfoSec management systems, procedures, policies, and plans -writing of a manual documenting all procedural compliance presentation of certification by the certification organization
rejection of the certification application based on lack of compliance or failure to remediate shortfalls
100
The benefits of ISO certification to organizations include all of the following EXCEPT: -increased opportunities for government contracts -reduced costs associated with incidents -smoother operations resulting from more clearly defined processes and responsibilities -improved public image of the organization, as certification implies increased trustworthiness
increased opportunities for government contracts
101
The benefits of ISO certification to an organization's employees include all of the following EXCEPT: -reduced employee turnover due to misinterpreted security policies and practices -lower risk of accidents and incidents associated with critical or sensitive information -employee confidence in organizational security practices -improved productivity and job satisfaction from more clearly defined InfoSec roles and responsibilities
reduced employee turnover due to misinterpreted security policies and practices
102
The organization of a task or process so it requires at least two individuals to work together to complete is known as __________ control.
two-person
103
A conspiracy or cooperation between two or more individuals or groups to commit illegal or unethical actions is known as __________.
collusion
104
The requirement that all critical tasks can be performed by multiple individuals is known as __________.
task rotation
105
The requirement that every employee be able to perform the work of at least one other employee is known as __________.
job rotation
106
A requirement that all employees take time off from work, which allows the organization to audit the individual’s areas of responsibility, is known as __________ vacation policy.
mandatory
107
Best security practices balance the need for user __________ to information with the need for adequate protection while simultaneously demonstrating fiscal responsibility.
access
108
A practice related to benchmarking is __________, which is a measurement against a prior assessment or an internal goal.
baselining
109
__________ encompasses a requirement that the implemented standards continue to provide the required level of protection.
Due diligence
110
A goal of 100 percent employee InfoSec training as an objective for the training program is an example of a performance __________.
target
111
The Hartford insurance company estimates that, on average, __________ businesses that don’t have a disaster plan go out of business after a major loss like a fire, a break-in, or a storm.
over 40 percent of
112
Contingency planning is primarily focused on developing __________.
plans for unexpected adverse events
113
The actions taken by senior management to specify the organization’s efforts and actions if an adverse event becomes an incident or disaster are known as __________.
contingency planning
114
Which of the following is the first component in the contingency planning process?
business impact analysis
115
The team responsible for designing and managing the IR plan by specifying the organization’s preparation, reaction, and recovery from incidents is known as the __________.
computer security incident response team (CSIRT)
116
The group of senior managers and project members organized to conduct and lead all CP efforts is known as the __________.
crisis management planning team (CMPT)
117
What is the final stage of the business impact analysis when using the NIST SP 800-34 approach?
Identify recovery priorities for system resources.
118
What is a mathematical tool that is useful in assessing the relative importance of business functions based on criteria selected by the organization?
weighted table analysis
119
At what point in the incident life cycle is the IR plan initiated?
when an incident is detected that affects the organization
120
Which of the following is NOT a major component of contingency planning?
threat assessment
121
According to NIST’s SP 800-34, Rev. 1, which of the following is NOT one of the stages of the business impact assessment? -Calculate asset valuation and combine with the likelihood and impact of potential attacks in a TVA worksheet. -Determine mission/business processes and recovery criticality. -Identify resource requirements. -Identify recovery priorities for system resources.
Calculate asset valuation and combine with the likelihood and impact of potential attacks in a TVA worksheet.
122
The total amount of time the system owner or authorizing official is willing to accept for a business process outage or disruption, including all impact considerations, is known as __________.
maximum tolerable downtime (MTD)
123
The maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources and supported business processes is known as __________.
recovery time objective (RTO)
124
A useful tool for resolving the issue of what business function is the most critical, based on criteria selected by the organization, is the __________.
weighted table analysis or weighted factor analysis
125
Which of the following is the first major task in the BIA, according to NIST SP 800-34, Rev. 1? -Calculate asset valuation and combine with the likelihood and impact of potential attacks in a TVA worksheet. -Determine mission/business processes and recovery criticality. -Identify resource requirements. -Identify recovery priorities for system resources.
Determine mission/business processes and recovery criticality.
126
The amount of effort (expressed as elapsed time) needed to make business functions work again after the technology element is recovered is known as __________.
work recovery time (WRT)
127
Which of the following NIST Cybersecurity Framework (CSF) stages relates to reacting to an incident?
Respond
128
Which of the following NIST Cybersecurity Framework (CSF) stages relates to implementation of effective security controls (policy, education, training and awareness, and technology)?
Protect
129
Which of the following is NOT a stage in the NIST Cybersecurity Framework (CSF)? -Identify -Detect -Recover -React
React
130
What is a backup method that uses bulk batch transfer of data to an off-site facility and is usually conducted via leased lines or secure Internet connections?
electronic vaulting
131
What refers to the backup of data to an off-site facility in close to real time based on transactions as they occur?
remote journaling
132
What is the process of examining a possible incident and determining whether it constitutes an actual incident?
incident classification
133
Which of the following is a "possible" indicator of an actual incident, according to Donald Pipkin? -unusual consumption of computing resources -activities at unexpected times -presence of hacker tools -reported attacks
unusual consumption of computing resources
134
Which of the following is a definite indicator of an actual incident, according to Donald Pipkin? -unusual system crashes -reported attack -presence of new accounts -use of dormant accounts
use of dormant accounts
135
The steps in IR are designed to:
stop the incident, mitigate incident effects, provide information for recovery from the incident
136
What determines the scope of the breach of confidentiality, integrity, and availability of information and information assets?
incident damage assessment
137
What is an organizational CP philosophy for overall approach to contingency planning reactions?
protect and forget
138
Which of the following is a part of the incident recovery process? -identifying the vulnerabilities that allowed the incident to occur and spread -determining the event’s impact on normal business operations and, if necessary, making a disaster declaration -supporting personnel and their loved ones during the crisis -keeping the public informed about the event and the actions being taken to ensure the recovery of personnel and the enterprise
identifying the vulnerabilities that allowed the incident to occur and spread
139
After an incident, but before returning to its normal duties, the CSIRT must do which of the following?
Conduct an after-action review.
140
Which of the following is the best example of a rapid-onset disaster? -flood -hurricane -famine -environmental degradation
flood
141
When a disaster renders the current business location unusable, which plan is put into action?
business continuity
142
In the event of an incident or disaster, which planning element is used to guide off-site operations?
business continuity
143
Which of the following is true about a hot site? -It is an empty room with standard heating, air conditioning, and electrical service. -It includes computing equipment and peripherals with servers but not client workstations. -It duplicates computing resources, peripherals, phone systems, applications, and workstations. -All communications services must be installed after the site is occupied.
It duplicates computing resources, peripherals, phone systems, applications, and workstations.
144
In which type of site are no computer hardware or peripherals provided?
cold site
145
Which of the following is a responsibility of the crisis management team? -restoring the data from backups -evaluating monitoring capabilities -keeping the public informed about the event and the actions being taken -restoring the services and processes in use
keeping the public informed about the event and the actions being taken
146
In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the disruption of service, restoration of data from backups, and notification of appropriate individuals?
full-interruption
147
In which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is presented with a scenario of an actual incident or disaster and expected to react as if it had occurred?
simulation
148
__________ are a component of the "security triple."
Threats, Assets, Vulnerabilities
149
A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle.
configuration
150
A __________ is the recorded condition of a particular revision of a software or hardware configuration item.
version
151
To maintain optimal performance, one typical recommendation suggests that when the memory usage associated with a particular CPU-based system averages __________% or more over prolonged periods, you should consider adding more memory.
60
152
To evaluate the performance of a security system, administrators must establish system performance __________.
baselines
153
Control __________ baselines are established for network traffic and for firewall performance and IDPS performance.
performance
154
A primary mailing list for new vulnerabilities, called simply __________, provides time-sensitive coverage of emerging vulnerabilities, documenting how they are exploited and reporting on how to remediate them. Individuals can register for the flagship mailing list or any one of the entire family of its mailing lists.
Bugtraq
155
The __________ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.
CERT/CC
156
The __________ Web site is home to the leading free network exploration tool, Nmap.
insecure.org
157
The __________ commercial site focuses on current security tool resources.
Packet Storm
158
The __________ mailing list includes announcements and discussion of a leading open-source IDPS.
Snort
159
The optimum approach for escalation is based on a thorough integration of the monitoring process into the __________.
IRP
160
Detailed __________ on the highest risk warnings can include identifying which vendor updates apply to which vulnerabilities as well as which types of defenses have been found to work against the specific vulnerabilities reported.
intelligence
161
A process called __________ examines the traffic that flows through a system and its associated devices to identify the most frequently used devices.
traffic analysis
162
One approach that can improve the situational awareness of the information security function is to use a process known as __________ to quickly identify changes to the internal environment.
difference analysis
163
__________ is used to respond to network change requests and network architectural design proposals.
Network connectivity RA
164
The __________ is a statement of the boundaries of the RA.
scope
165
The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.
PSV
166
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).
Penetration testing
167
Common vulnerability assessment processes include:
Internet VA, wireless VA, intranet VA
168
__________ penetration testing is usually used when a specific system or network segment is suspect and the organization wants the pen tester to focus on a particular aspect of the target.
White box
169
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.
scanning
170
The __________ vulnerability assessment is a process designed to find and document selected vulnerabilities that are likely to be present on the organization's internal network.
intranet
171
The __________ vulnerability assessment is designed to find and document vulnerabilities that may be present in the organization’s wireless local area networks.
wireless
172
What access control processes confirms the identity of the entity seeking access to a logical or physical area?
authentication
173
Which of the following is NOT among the three types of authentication mechanisms? -something a person knows -something a person has -something a person says -something a person can produce
something a person says
174
Which of the following characteristics currently used for authentication purposes is the LEAST unique? -fingerprints -iris -retina -face geometry
face geometry
175
The rate at which authentic users are denied or prevented access to authorized areas as a result of a failure in the biometric device is known as the __________.
false reject rate
176
What is a commonly used criterion for comparing and evaluating biometric technologies?
crossover error rate
177
What biometric authentication systems is considered to be truly unique, suitable for use, and currently cost-effective?
fingerprint recognition
178
What biometric authentication systems is the most accepted by users?
signature recognition
179
Which type of firewall keeps track of each network connection established between internal and external systems?
stateful packet inspection
180
The combination of a system's TCP/IP address and a service port is known as a __________.
socket
181
Which type of device exists to intercept requests for information from external users and provide the requested information by retrieving it from an internal server?
proxy server
182
The intermediate area between trusted and untrusted networks is referred to as which of the following?
demilitarized zone
183
Which type of device can react to network traffic and create or modify configuration rules to adapt?
dynamic packet filtering firewall
184
Which technology employs sockets to map internal private network addresses to a public address using one-to-many mapping?
port-address translation
185
The bastion host is usually implemented as a __________, as it contains two network interfaces: one that is connected to the external network and one that is connected to the internal network, such that all traffic must go through the device to move between the internal and external networks.
dual-homed host
186
In the _________ firewall architecture, a single device configured to filter packets serves as the sole security point between the two networks.
single bastion host
187
Which of the following is true about firewalls and their ability to adapt in a network? -Firewalls can interpret human actions and make decisions outside their programming. -Because firewalls are not programmed like a computer, they are less error prone. -Firewalls are flexible and can adapt to new threats. -Firewalls deal strictly with defined patterns of measured observation.
Firewalls deal strictly with defined patterns of measured observation.
188
Which of the following is NOT one of the administrative challenges to the operation of firewalls? -training -uniqueness -replacement -responsibility
replacement
189
Which of the following is NOT a method employed by IDPSs to prevent an attack from succeeding? -sending DoS packets to the source -terminating the network connection -reconfiguring network devices -changing the attack’s content
sending DoS packets to the source
190
Which type of IDPS is also known as a behavior-based intrusion detection system?
anomaly-based
191
In an IDPS, a piece of software that resides on a system and reports back to a management server is known as a(n) __________.
Both of these are correct.
192
Which type of IDPS works like antivirus software?
signature-based
193
Which tool can best identify active computers on a network?
port scanner
194
What is the next phase of the pre-attack data gathering process after an attacker has collected all of an organization’s Internet addresses?
fingerprinting
195
What tool would you use if you want to collect information as it is being transmitted on the network and analyze the contents for the purpose of solving network problems?
packet sniffer
196
What is an application that entices individuals who are illegally perusing the internal areas of a network by providing simulated rich content areas while the software notifies the administrator of the intrusion?
honey pot
197
What is the organized research and investigation of Internet addresses owned or controlled by a target organization?
footprinting
198
When an information security team is faced with a new technology, which of the following is NOT a recommended approach? -Determine if the benefits of the proposed technology justify the expected costs. -Include costs for any additional risk control requirements that are mandated by the new technology. -Consider how the proposed solution will affect the organization’s risk exposure. -Evaluate how the new technology will enhance employee skills.
Evaluate how the new technology will enhance employee skills.
199
What is used in conjunction with an algorithm to make computer data secure from anybody except the intended recipient of the data?
key
200
In which cipher method are values rearranged within a block to create the ciphertext?
permutation
201
Which of the following is true about symmetric encryption? -It uses a secret key to encrypt and decrypt. -It uses a private and public key. -It is also known as public key encryption. -It requires four keys to hold a conversation.
It uses a secret key to encrypt and decrypt.
202
Which technology has two modes of operation: transport and tunnel?
IP Security Protocol
203
What provides an identification card of sorts to clients who request services in a Kerberos system?
ticket granting service
204
What is a Kerberos service that initially exchanges information with the client and server by using secret keys?
key distribution center
205
What is most commonly used for the goal of nonrepudiation in cryptography?
digital signature
206
The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption is known as __________.
cryptanalysis