BSI_question_answer_only.csv - BSI_question_answer_only.csv Flashcards
(250 cards)
A risk is the likelihood of a threat source taking advantage of a vulnerability to an information system. Risks left over after implementing safeguards is known as:
Residual risks.
Copyright provides what form of protection:
Protects the right of an author to prevent unauthorized use of his/her works.
As an information systems security professional, what is the highest amount would you recommend to a corporation to invest annually on a countermeasure for protecting their assets valued at $1 million from a potential threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 10% :
$20,000.00
Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key?
Key exchange
In a typical information security program, what is the primary responsibility of information (data) owner?
Determine the information sensitivity or classification level.
Which of the following is not a component of “chain of evidenceâ€:
Identification of person who left the evidence.
When an employee transfers within an organization …
All access permission should be reviewed.
A system security engineer is evaluation methods to store user passwords in an information system, so what may be the best method to store user passwords and meeting the confidentiality security objective?
One-way encrypted file
What is the inverse of confidentiality, integrity, and availability (C.I.A.) triad in risk management?
disclosure, alteration, destruction
A CISSP may face with an ethical conflict between their company’s policies and the (ISC)2 Code of Ethics. According to the (ISC)2 Code of Ethics, in which order of priority should ethical conflicts be resolved?
Duty to public safety, principals, individuals, and profession.
Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to?
Discretionary Access Control
In the Common Criteria Evaluation and Validation Scheme (CCEVS), requirements for future products are defined by:
Protection Profile.
As an information systems security manager (ISSM), how would you explain the purpose for a system security policy?
A brief, high-level statement defining what is and is not permitted during the operation of the system
Configuration management provides assurance that changes…?
do not adversely affect implementation of the security policy.
Under what circumstance might a certification authority (CA) revoke a certificate?
The certificate owner’ private key has been compromised.
Which of the following entity is ultimately responsible for information security within an organization?
Senior Management
What type of cryptanalytic attack where an adversary has the least amount of information to work with?
Ciphertext-only
In business continuity planning, which of the following is an advantage of a “hot site†over a “cold siteâ€
A&C
Which of the following is the most effective method for reducing security risks associated with building entrances?
Minimize the number of entrances
All of the following methods ensure the stored data are unreadable except…?
removing the volume header information.
Prior to installation of an intrusion prevention system (IPS), a network engineer would place a packet sniffer on the network, what is the purpose for using a packet sniffer?
It monitors network traffic.
What determines the assignment of data classifications in a mandatory access control(MAC) philosophy?
The organization’s published security policy for data classification
A type cryptographic attack where it is based on the probability of two different messages using the same hash function to produce the same message digest is?
Birthday attack
An access control system that grants users only those rights necessary for them to perform their work is operating on which security principle?
Least Privilege