chapter 11 (2) Flashcards
(207 cards)
What is the primary motivation for casual intruders?
a) Espionage
b) Financial gain
c) The thrill of the hunt; to show off
d) Professional advancement
c
Who are script kiddies?
a) Novice attackers using hacking tools
b) Experts in security
c) Organization employees
d) Professional hackers
a
What distinguishes crackers from other types of intruders?
a) They have limited knowledge
b) They use hacking tools for fun
c) They cause damage
d) They are motivated by financial gain
c
What is a common characteristic of insider threats?
a) They have limited knowledge about hacking
b) They are motivated by the thrill of the hunt
c) They have legitimate access to the network
d) They primarily engage in espionage activities
c
Crackers are casual hackers with a limited knowledge of computer security
f. Experts in security (hackers)
Which of the following is not a type of intruder who attempts to gain intrusion to
computer networks?
a. Delphi team member
b. script kiddies
c. crackers
d. professional hackers
e. organization employees
a
What is the best rule for maintaining high security with sensitive data?
a) Keeping sensitive data online but encrypted
b) Storing sensitive data in computers isolated from the network
c) Sharing sensitive data with trusted third parties
d) Deleting sensitive data permanently
b
hich of the following is NOT considered an important control for detecting, preventing, or recovering from intrusion?
a) Security policy
b) Server and client protection
c) Encryption
d) Employee breakroom access control
d
Which of the following is NOT listed as an important control for detecting, preventing, or recovering from intrusion?
a) Security policy
b) Intrusion Detection Systems (IDSs)
c) Encryption
d) Intrusion recovery
b. Intrusion Protection System (IPSs)
What is the primary purpose of a security policy?
a) To increase company profits
b) To control risk due to intrusion
c) To reduce employee productivity
d) To promote employee creativity
b
According to the security policy, what should be clearly defined?
a) Employee vacation days
b) Company lunch hours
c) Important assets to be safeguarded and necessary controls
d) Preferred office attire
c
Which of the following is NOT a component that a security policy should clearly define?
a) Important assets to be safeguarded
b) Procedures for filing expense reports
c) Controls needed to protect assets
d) What employees should and should not do
b
How often should employees receive security training according to the security policy?
a) Once a year
b) Every five years
c) Whenever they feel like it
d) Routinely
d
Who is typically responsible for decision-making regarding security, according to the security policy?
a) The CEO
b) The IT department
c) The decision-making manager designated in the policy
d) External security consultants
c
What is an essential component of the security policy for responding to security breaches?
a) Sending a company-wide email
b) Contacting law enforcement immediately
c) Having an incident reporting system and a rapid-response team
d) Ignoring the breach and hoping it resolves itself
c
What does the security policy prioritize in its risk assessment?
a) Least important assets
b) Most convenient access points
c) Important assets
d) Non-critical user activities
c
What is the purpose of having effective controls at major access points into the network?
a) To welcome external agents
b) To deter access by internal users
c) To prevent access by external agents
d) To provide entertainment for users
c
The most common access point used by attackers to gain access to an organization’s
network is the Internet connection.
t
Why are effective controls within the network necessary?
a) To ensure users exceed their authorized access
b) To enhance management time
c) To minimize inconvenience to users
d) To prevent internal users from exceeding their authorized access
d
According to the security policy, what is the recommended approach regarding the number of controls?
a) Maximize controls for better security
b) Use as few controls as possible
c) Use a moderate number of controls for balance
d) Allow users to set their own controls
b. using just enough security measures to keep things safe without making them too complicated or annoying for users
What does the acceptable use policy outline?
a) Guidelines for users to do whatever they want
b) Guidelines for accessing others’ accounts
c) Guidelines for avoiding password security
d) Guidelines for ignoring email rules
b. An acceptable use policy that explains to users what they can and cannot do, including guidelines for accessing others’ accounts, password security, email rules, and so on
What procedure does the security policy recommend for monitoring changes to important network components?
a) Routine coffee breaks
b) Annual team-building retreats
c) Regular monitoring of network components
d) Ignoring changes altogether
c
What is the purpose of routinely training users regarding security policies?
a) To decrease security awareness
b) To increase the likelihood of security breaches
c) To build awareness of security risks
d) To waste company resources
c
How often should the security practices be audited and reviewed according to the policy?
a) Weekly
b) Quarterly
c) Annually
d) Never, as audits are unnecessary
c