What should be done when sensitive data has to be shared over a network or in reports with another department in the organization that is not authorized to see certain data elements?
Anonymize the data
What is a risk associated with relying on wireless network access in a congested area?
Jamming of the signal
How can symmetric encryption keys be sent between business partners if the network is subject to monitoring?
Out of band
What is the condition an entity is in at a point in time?
State
Which of the following is a good justification for allocating secuurity requirements to existing systems?
Avoid introducing new vulnerabilities
Which of the following is an example of a role that is responsible for ‘owning’ an external system such as power or physical access?
A facility owner
What is a primary goal of control selection?
Provide adequate security
Which type of malware is often described as parasitical?
Virus
In addition to motivation and skill, which other characteristic of a threat adversary is most important?
Persistence
The network may be a victim of an attack or?
The channel of an attack
A member of the sales team is going to make a presentation at a secure facility and has the presentation stored on the cloud. What risk may be associated with this?
No network connectivity in the restricted location
What plans should be made when setting up a new network connection between business partners?
Establish the process to disconnect the system
What is a good place to record all security features that should be designed into the software?
Requirements Traceability Matrix (RTM)
Which of the following is a weak encryption protocol?
SSL
Which access control limits a user’s access permissions to a certain time of day?
Least privilege
Which access control security model is focused on preserving confidentiality?
Bell LaPadula
In addition to layers of control, what else is defense in depth concerned with?
Single points of failure
What is a database view an example of?
A constrained user interface
What is an operator console or management interface on a device known as?
Trusted path
Why would a log be written to a WORM system?
To prevent alteration of the log data
Which access control model enforced a well-formed transaction?
Clark Wilson
Threat modeling may be software-centric, secruity-centric and:
asset-centric
Which of the following statements about the authentication concept of information security management is true?
It establishes the users’ identity and ensures that the users are who they say they are
Which of the following provides an easy way to programmers for writing lower-risk applications and retrofitting security into an existing application?
Watermarking