1 - Information Security Governance and Risk Management Flashcards
(135 cards)
- Which of the following is not an example of security control that ensures confidentiality?a. Data classificationb. Encryptionc. Restricting changes d. Network traffic padding
C: Restricting changes is an integrity protecting security mechanism.
- Who is ultimately responsible and liable if the security perimeter of an organization is violated by an intruder and asset losses occur?a. Senior managementb. Network or system administratorsc. Security guardsd. End users
A: Senior management is ultimately responsible and liable if the security perimeter of an organization is violated by an intruder and asset losses occur. Senior management is responsible for all aspects of security and is the primary decision maker. However, in most cases the implementation of security is delegated to lower levels of the authority hierarchy, such as the network or system administrators.
- Which of the following is not an example of a technical or logical security control?a. Encryptionb. Personnel screeningc. Identificationd. Access Control Lists
B: Personnel screening is an administrative security control. There are three types of security controls: administrative, physical, and logical or technical.
- Which of the following is an administrative security control?a. Personnel screeningb. Encryptionc. Authorizationd. Security guards
A: Personnel screening is an administrative security control
- Which of the following is a technical security control?a. Standardsb. Security devices c. Door locksd. Personnel screening
B: Security devices are technical security controls.
- Which of the following is a physical security control?a. Logical access controlsb. Security awareness trainingc. Identificationd. Environmental controls
D: Environmental controls are physical security controls.
- Which of the following is the best personnel arrangement for the design and management of security for an organization?a. A single security professional from within the organizationb. A team of security professionals from the organizationc. A team of employees representing every department within the organization d. An outside consultant
B: The best personnel arrangement for the design and management of security for an organization is a team of internal security professionals.
- Which of the following is not a role or responsibility of the Security Administration team or group within an organization?a. Monitoring the security of the entire organizationb. Integrating security into the business environmentc. Identifying, valuating, and classifying assetsd. Approving the security policy.
D: Approving the security policy is the responsibility of senior management, not that of the Security Administration team or group within an organization.
- Who is ultimately responsible for negligence in protecting the assets of an organization?a. Senior managementb. Security teamc. IT departmentd. Data custodian
A: Senior management is ultimately responsible for implementing prudent due care and is liable for negligence in protecting the assets of an organization.
- Which of the following is not one of the three security control types that a security administrator can employ to manage and impose security?a. Administrativeb. Technicalc. Strategicd. Physical
C: Administrative, technical, and physical are the three security control types that a security administrator can employ to manage and impose security.
- Which of the following is not an element in the CIA triad?a. Availabilityb. Integrityc. Privacyd. Confidentiality
C: Confidentiality, integrity, and availability are the elements of the CIA triad.
- Which of the following is a valid definition for confidentiality?a. Unauthorized disclosure is prevented.b. Unauthorized modification is preventedc. Resources are accessible at all times by authorized users.d. Disasters can be recovered from quickly.
A: Confidentiality can be defined by “Unauthorized disclosure is prevented.”
- Which of the following is not a task assigned to a data owner?a. Assign classifications to datab. Dictate how information is to be protectedc. Delegate security responsibilities to data custodiansd. Implement security controls
D: Implementing security controls is the responsibility of the security administration team or data custodians, not senior management.
- A security administrator may employ all but which of the following types of controls to implement a security solution?a. executiveb. administrativec. technicald. physical
A: Executive is not a valid type of security control. The three valid types of security control are administrative, technical (or logical), and physical.
- Which of the following is an example of an administrative security control?a. security guardsb. policiesc. locksd. intrusion detection systems
B: Policies are an example of an administrative security control.
- Which of the following is not an example of an administrative security control?a. Standardsb. Guidelinesc. Identificationd. Personnel screening
C: Identification is an example of a logical/technical security control.
- Which of the following is not one of the fundamental principles of security included in the CIA triad?a. Confidentialityb. Integrityc. Accountabilityd. Availability
C: While accountability is an important part of IT security, it is not one of the three fundamental principles of security included in the CIA triad, which includes Confidentiality, Integrity and Availability.
- The ability of a computer system to provide adequate capacity for predictable performance represents which of the fundamental security principles of the CIA triad?a. Confidentialityb. Integrityc. Accountabilityd. Availability
D: The ability of a computer system to provide adequate capacity for predictable performance is an example of Availability.
- Which of the following is not an example of a physical security control?a. Dogsb. Fencingc. Biometric authenticationd. Badge IDs
C: Biometric authentication is an example of a technical/logical security control.
- Which of the following is not an example of a valid activity of security management?a. Evaluating the loss of productivity due to restrictions imposed by the security solutionb. Manage user complaints of access restrictions or resource unavailability, by fine tuning least privilege accessc. Proposing to senior management the alteration or rescinding of a security policyd. Deploy a new security control in a mission critical environment
D: It is not a good security management practice to implement new security controls, especially in mission critical environments, before that control has been thoroughly tested.
- Which of the following is an example of a technical security control?a. proceduresb. awareness trainingc. perimeter lightingd. encryption
D: Encryption is an example of a technical/logical security control.
- Which of the following is not an example of a technical security control?a. Fire detection and suppressionb. Access control matrixc. Authorizationd. Traffic filtering
A: Fire detection and suppression is an example of a physical security control.
- Which of the following is an example of a physical security control?a. Rules based access controlsb. CCTVc. Exit interviewsd. Traffic tunneling
B: CCTV is an example of a physical security control.
- Which of the following is an example of a security control that focuses on maintaining availability?a. Encrypted transport of datab. Quick recovery from faultsc. Fixed packet length transmissionsd. User awareness training
B: Quick recovery from faults is an example of a security control that focuses on maintaining availability.