Chapter 14 Flashcards

1
Q

Which of the following terms identifies the process of reviewing log files for suspicious activity and threshold compliance?

Phishing
Scanning
CompSec
Auditing

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a collection of recorded data that may include details about logons, object access, and other activities deemed important by your security policy and is often used to detect unwanted and unauthorized user activity?

Audit trail
Chain of custody
Syslog
CPS (Certificate Practice Statement)

A

Audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A recreation of historical events is made possible through which of the following?

Incident reports
Audit trails
Audits
Penetration testing

A

Audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of audit is performed by either a consultant or an auditing firm employee?

External audit
Financial audit
Usage audit
Internal audit

A

External audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is true concerning internal audits?

The process is very formal.
They are generally nonobjective.
They are always highly rigorous.
The auditor works independently.

A

They are generally nonobjective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following standards relates to the use of credit cards?

Financial audit
SOX
PCI DSS
PoLP

A

PCI DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following describes privilege auditing?

No single user is granted sufficient privileges to compromise the security of an entire environment.

Users’ and groups’ rights and privileges are checked to guard against creeping privileges.

An employee is granted the minimum privileges required to perform the duties of his or her position.

Users’ activities are logged to document incidents for security investigations and incident response.

A

Users’ and groups’ rights and privileges are checked to guard against creeping privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which component of an IT security audit evaluates defense in depth and IT-related fraud?

User access and rights review
Financial audit
External audit
Risk evaluation

A

Risk evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a government audit by the SEC that relates to internal controls and focuses on IT security, access controls, data backup, change management, and physical security?

PCI DSS
Financial audit
PoLP
SOX

A

SOX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following types of auditing verifies that systems are utilized appropriately and in accordance with written organizational policies?

Financial audit
Internal audit
PoLP
Usage audit

A

Usage audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are control categories? (Select three.)

Technical
Deterrent
Preventative
Physical
Compensating
Operational
Managerial

A

Technical
Operational
Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following BEST describes compensating controls?

Partial control solution that is implemented when a control cannot fully meet a requirement.

Attempts to fix any controls that aren’t working properly.

Discourages malicious actors from attempting to breach a network.

Monitors network activity and informs the security team of a potential security event.

A

Partial control solution that is implemented when a control cannot fully meet a requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of control is used to discourage malicious actors from attempting to breach a network?

Preventative
Physical
Deterrent
Detective

A

Deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of control makes use of policies, DPRs, and BCPs?

Preventative
Managerial
Technical
Operational

A

Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an example of a preventative control type?

An advanced network appliance
Intrusion detection systems
Network monitoring applications
Real-time monitoring alerts

A

An advanced network appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which ISO publication lays out guidelines for selecting and implementing security controls?

27001
31000
27002
27701

A

27002

17
Q

Which of the following frameworks introduced the first cloud-centric individual certification?

NIST
ISO
CCM
CSA

A

CSA

18
Q

Which type of report is used for marketing and letting future partners know that compliance has been met?

ISO 27001
SOC Type II
ISO 31000
SOC Type III

A

SOC Type III

19
Q

Which of the following security frameworks is used by the federal government and all its departments, including the Department of Defense?

CSA
ISO
SOC Type II/III
NIST

A

NIST

20
Q

Which SOC type reports focus on predetermined controls that are audited and a detailed report that attests to a company’s compliance?

II
I
III
IV

A

II

21
Q

Your organization has discovered that an overseas company has reverse-engineered and copied your main product and is now selling a counterfeit version.

Which of the following BEST describes the type of consequence your organization has suffered?

Reputation damage
IP theft
Fines
Escalation

A

IP theft

22
Q

Your organization has suffered a data breach, and it was made public. As a result, stock prices have fallen, as consumers no longer trust the organization.

Which of the following BEST describes the type of consequence your organization has suffered due to the breach?

Notifications
IP theft
Identity theft
Reputation damage

A

Reputation damage

23
Q

If you lose your wallet or purse and it ends up in the wrong hands, several pieces of information could be used to do personal harm to you. These pieces of information include the following:

Name and address

Driver license number

Credit card numbers

Date of birth

Which of the following classifications does this information fall into?

Private internal information
Private restricted information
Proprietary information
Personally identifiable information (PII)

A

Personally identifiable information (PII)

24
Q

The lowest level of classified information used by the military. Release of this information could cause damage to military efforts.

Unclassified
Sensitive But Unclassified
Confidential
Secret
Top Secret

A

Confidential

25
Q

If this information is released, it poses grave consequences to national security.

Unclassified
Sensitive But Unclassified
Confidential
Secret
Top Secret

A

Top Secret

26
Q

This information can be accessed by the public and poses no security threat.

Unclassified
Sensitive But Unclassified
Confidential
Secret
Top Secret

A

Unclassified

27
Q

If this information is disclosed, it could cause some harm, but not a national disaster.

Unclassified
Sensitive But Unclassified
Confidential
Secret
Top Secret

A

Sensitive But Unclassified

28
Q

If this information is disclosed, it could cause severe and permanent damage to military actions.

Unclassified
Sensitive But Unclassified
Confidential
Secret
Top Secret

A

Secret

29
Q

Which of the following laws was designed to protect a child’s information on the internet?

CCPA
GDPR
GLBA
COPPA

A

COPPA

30
Q

Which of the following government acts protects medical records and personal health information?

FISMA
HIPAA
FACTA
ACA

A

HIPAA

31
Q

HIPAA is a set of federal regulations that define security guidelines. What do HIPAA guidelines protect?

Non-repudiation
Availability
Privacy
Integrity

A

Privacy

32
Q

Which of the following is the LEAST reliable means of cleaning or purging media?

Degaussing
Overwriting every sector with alternating 1s and 0s
OS low-level formatting
Drive controller hardware-level formatting

A

Degaussing

33
Q

When you dispose of a computer or sell used hardware, it is crucial that none of the data on the hard disks can be recovered.

Which of the following actions can you take to ensure that no data is recoverable?

Damage the hard disks so badly that all data remanence is gone.
Delete all files from all the hard disks in the computer.
Encrypt all data on the hard disks.
Reformat all the hard disks in the computer.

A

Damage the hard disks so badly that all data remanence is gone.

34
Q

Which of the following data destruction techniques uses a punch press or hammer system to crush a hard disk?

Degaussing
Shredding
Pulverizing
Pulping
Purging

A

Pulverizing