6 - Operations Security Flashcards
(122 cards)
- Which of the following is not an important aspect of the new employee hiring process?a. Background screeningb. Drug testingc. Non-disclosure agreementsd. Exit interview
D: The exit interview is part of the termination process.
- Which of the following is considered the lowest level of privilege?a. Read onlyb. Read-Write c. Change accessd. Need to know
A: Read only is the lowest privilege level.
- The first step in hiring a new employee is what?a. Screening candidatesb. Creating the job descriptionc. Signing non-disclosure agreementsd. Background verification
B: The first step in hiring a new employee is the creation of a job description. Without a job description there is no clear understanding of who is needed and the work tasks they will be required to perform.
- What type of security controls are used to encourage compliance with other security controls?a. directiveb. recoveryc. applicationd. transaction
A: Directive or deterrent controls are used to encourage compliance with other security controls.
- The Orange Book defines two types of assurance. Which of the following are they?a. Life cycle and Developmentb. Operational and Life cyclec. Development and Improvementd. Functional and Efficiency
B: The Orange book defines Operational and Life Cycle assurance.
- Operations security is primarily concerned with?a. Protecting assets from threatsb. Establishing audit trailsc. Classifying subjectsd. Managing personnel security awareness
A: Operations security is primarily concerned with protecting assets from threats.
- The security practice of ensuring that no one individual has complete control or access over a system’s security mechanism is known as?a. Principle of least privilegeb. Separation of dutiesc. Job rotationd. Role based access control
B: The security practice of ensuring that no one individual as complete control or access over a system’s security mechanism is known as separation of duties.
- What is trusted recovery?a. A storage system that ensures the security of backup setsb. An element in disaster recovery planning where the restoration of backups is assigned to a trusted team of security professionalsc. A process that ensures a system’s security is not violated when it encounters a failure requiring a restorationd. An automatic process that restores the most recent backup to a system when a security fault is encountered.
C: Trusted recovery is a process that ensures a system’s security is not violated when it encounters a failure requiring a restoration.
- Which of the following is not a safeguard against collusion?a. Rotation of dutiesb. Trusted recoveryc. Separation of dutiesd. Auditing
B: Trusted recovery is not a safeguard against collusion. It is a safeguard against failure states encountered by the OS or software which prevents the system from restarting into an insecure state.
- What is the primary goal of configuration or change management?a. enable rollback to a previous system stateb. duplicate changes on multiple systemsc. prevent changes from diminishing securityd. informing users of changes
C: The primary goal of configuration or change management is to ensure that security is not diminished.
- What is the primary purpose of mandatory vacations?a. Job rotationb. Background checkingc. Testing recovery plansd. Auditing
D: Mandatory vacations are used to perform auditing.
- When an automated trusted recovery is performed, what must happen?a. All corrupted system files must be restoredb. All suspect data is flagged for inspectionc. A system administrator is required to regain a secured stated. The system must restore itself to a secure state
D: When an automated trusted recovery is performed, the system must restore itself to a secure state.
- What is the goal of configuration change management?a. To ensure that all changes to the system do not diminish securityb. To control who performs changes to the security systemc. To track all changes to the security systemd. To automate the distribution of widespread security changes throughout a network
A: The primary goal of configuration change management is to ensure that all changes to the system do not diminish security.
- Which of the following is not true about configuration change management?a. Ensures that rolling back to a previous state by removing changes is possibleb. Simplifies the process of rolling out security changes throughout an organizationc. Is required by TCSEC certified B2, B3, and A1 systemsd. All changes must be documented
B: Configuration change management is not a distribution mechanism.
- The ability to easily audit and inspect the work tasks of an employee is made possible by?a. Separation of dutiesb. Exit interviewsc. Mandatory vacationsd. Background checks
C: Mandatory vacations allow for job auditing to ensure compliance with security policy and laws.
- Which of the following is not a form of monitoring?a. Biometric enrollmentb. port scanningc. Intrusion detectiond. penetration testing
A: Biometric enrollment is not a form of monitoring. Biometric enrollment is often a determining factor in whether or not a biometric identification or authenticating device will be accepted by the user community. If enrollment takes longer than minutes, most users will be unwilling to use it.
- The act of examining traffic patterns rather than the contents of packets is known as?a. Transaction processingb. Trend analysisc. Sniffingd. Port scanning
B: Trend or traffic analysis is the examination of traffic patterns rather than packet contents.
- Security controls should be _________ to the authorized user.a. obstructiveb. accessiblec. transparentd. inhibiting
C: Security controls should be transparent to the authorized user.
- When no single person has total control over a system’s security mechanisms, this is called?a. split knowledgeb. rotation of dutiesc. mandatory vacationsd. strong access controls
A: Split knowledge is when no single person has total control over a system’s security mechanisms.
- Another term for a security control that employees split knowledge is?a. mandatory vacationsb. separation of dutiesc. rotation of dutiesd. background checks
B: Separation of duties is a split-knowledge security control.
- The security mechanism that requires that users have the minimum amount of access that is absolutely required by their job tasks and that they have that access for the shortest amount of time is known as?a. due diligenceb. two-man controlsc. least privileged. rotation of duties
C: Least privilege is a security mechanism that requires that users have the minimum amount of access that is absolutely required by their job tasks and that they have that access for the shortest amount of time.
- The top priority of configuration or change control management is?a. prevent changes from diminishing securityb. analyze the effects of changes on a systemc. provide a means to track and audit changes to a systemd. ensure formalized testing of all system changes
A: The top priority of configuration or change control management is to prevent changes from diminishing security.
- Which of the following is not one of the five generally recognized procedural steps to implement configuration or change control management?a. Implementing the changeb. Applying to introduce a changec. Updating the security policyd. Cataloging the intended change
C: Since changes are not supposed to alter the security environment, there should be no need to change or alter the security policy. Therefore Updating the security policy is not one of the five generally recognized procedural steps to implement configuration or change control management.
- Which of the following is not an element of operational assurance as defined by the Orange Book?a. system architectureb. covert channel analysisc. security testingd. trusted recovery
C: Security testing, design specification and testing, configuration management, and trusted distribution are all elements of Life cycle assurance as defined by the Orange book.