Chapter 5 Self Assessment 2019 Flashcards

1
Q

An IS auditor reviewing the configuration of a signature-based intrusion detection system would be MOST concerned if which of the following is discovered?

A. Auto-update is turned off.
B. Scanning for application vulnerabilities is disabled.
C. Analysis of encrypted data packets is disabled.
D. The IDS is placed between the demilitarized zone and the firewall.

A

A. Auto-update is turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following BEST provides access control to payroll data being processed on a local server?

A. Logging access to personal information
B. Using separate passwords for sensitive transactions
C. Using software that restricts access rules to authorized staff
D. Restricting system access to business hours

A

C. Using software that restricts access rules to authorized staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An IS auditor has just completed a review of an organization that has a mainframe computer and two database servers where all production data reside. Which of the following weaknesses would be considered the MOST serious?

A. The security officer also serves as the database administrator.
B. Password controls are not administered over the two database servers.
C. There is no business continuity plan for the mainframe system’s noncritical applications.
D. Most local area networks do not back up file-server-fixed disks regularly.

A

B. Password controls are not administered over the two database servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization is proposing to install a single sign-on facility giving access to all systems. The organization should be aware that:

A. maximum unauthorized access would be possible if a password is disclosed.
B. user access rights would be restricted by the additional security parameters.
C. the security administrator’s workload would increase.
D. user access rights would be increased.

A

A. maximum unauthorized access would be possible if a password is disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When reviewing an implementation of a Voice-over Internet Protocol system over a corporate wide area network, an IS auditor should expect to find:

A. an integrated services digital network data link.
B. traffic engineering.
C. wired equivalent privacy encryption of data.
D. analog phone terminals.

A

B. traffic engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An insurance company is using public cloud computing for one of its critical applications to reduce costs. Which of the following would be of MOST concern to the IS auditor?

A. The inability to recover the service in a major technical failure scenario
B. The data in the shared environment being accessed by other companies
C. The service provider not including investigative support for incidents
D. The long-term viability of the service if the provider goes out of business

A

B. The data in the shared environment being accessed by other companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following BEST determines whether complete encryption and authentication protocols for protecting information while being transmitted exist?

A. A digital signature with RSA has been implemented.
B. Work is being done in tunnel mode with the nested services of authentication header (AH) and encapsulating security payload (ESP).
C. Digital certificates with RSA are being used.
D. Work is being done in transport mode with the nested services of AH and ESP.

A

B. Work is being done in tunnel mode with the nested services of authentication header (AH) and encapsulating security payload (ESP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following concerns about the security of an electronic message would be addressed by digital signatures?

A. Unauthorized reading
B. Theft
C. Unauthorized copying
D. Alteration

A

D. Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following characterizes a distributed denial-of-service (DDoS) attack?

A. Central initiation of intermediary computers to direct simultaneous spurious message traffic at a specified target site
B. Local initiation of intermediary computers to direct simultaneous spurious message traffic at a specified target site
C. Central initiation of a primary computer to direct simultaneous spurious message traffic at multiple target sites
D. Local initiation of intermediary computers to direct staggered spurious message traffic at a specified target site

A

A. Central initiation of intermediary computers to direct simultaneous spurious message traffic at a specified target site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the MOST effective preventive antivirus control?

A. Scanning email attachments on the mail server
B. Restoring systems from clean copies
C. Disabling universal serial bus ports
D. An online antivirus scan with up-to-date virus definitions

A

D. An online antivirus scan with up-to-date virus definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An IS auditor reviewing the log of failed logon attempts would be MOST concerned if which of the following accounts was targeted?

A. Network administrator
B. System administrator
C. Data administrator
D. Database administrator

A

B. System administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A B-C e-commerce web site as part of its information security program wants to monitor, detect and prevent hacking activities and alert the system administrator when suspected activities occur. Which of the following infrastructure components could be used for this purpose?

A. Intrusion detection system
B. Firewalls
C. Routers
D. Asymmetric encryption

A

A. Intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tape backup should be used as a recovery strategy when:

A. The RPO is high.
B. The RPO is low.
C. The RTO is low.
D. Fault tolerance is low.

A

B. The RPO is low.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the best reason to use a hot site?

A. It can be used for long-term processing.
B. It is not a subscription service.
C. There is no additional cost for usage or periodic testing.
D. It is ready for service.

A

D. It is ready for service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following describes the greatest advantage of JBOD?

A. In case of drive failure, only the data on the affected drive is lost.
B. It is superior to disk mirroring.
C. It offers greater performance gains than RAID.
D. Compared to RAID, it offers greater fault tolerance.

A

A. In case of drive failure, only the data on the affected drive is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following processes is most critical in terms of revenue generation?

A. Discretionary
B. Supporting
C. Core
D. Critical

A

C. Core

17
Q

How often should BCP plans be updated?

A. Every 5 years
B. Every year or as required
C. Every 6 months
D. Upon any change or modification

A

D. Upon any change or modification

18
Q

When maintaining data backups at off-site locations, which of the following is the most important control concern?

A. That the storage site is as secure as the primary site
B. That a suitable tape-rotation plan is in use
C. That backup media is tested regularly
D. That copies of current critical information are kept off-site

A

D. That copies of current critical information are kept off-site

19
Q

The most important purpose of the BIA is which of the following?

A. Identify countermeasures
B. Prioritize critical systems
C. Develop recovery strategies
D. Determine potential test strategies

A

B. Prioritize critical systems

20
Q

Which of the following is not a valid BCP test type?

A. Paper test
B. Structured walk-through
C. Full operation
D. Preparedness test

A

B. Structured walk-through

21
Q

Which of the following is the practice of routing traffic through different cable facilities?

A. Alternate routing
B. Long-haul diversity
C. Diverse routing
D. Last-mile protection

A

C. Diverse routing

22
Q

When classifying critical systems, which category describes the following description: “These functions are important and can be performed by a backup manual process, but not for a long period of time.”

A. Vital
B. Sensitive
C. Critical
D. Demand driven

A

A. Vital