CISM Practice B Topic 3 Flashcards
(115 cards)
Who can BEST advocate the development of and ensure the success of an information security program?
Internal auditor
Chief operating officer (COO)
Steering committee
IT management
Steering committee
Which of the following BEST ensures that information transmitted over the Internet will remain confidential?
Virtual private network (VPN)
Firewalls and routers
Biometric authentication
Two-factor authentication
Virtual private network (VPN)
The effectiveness of virus detection software is MOST dependent on which of the following?
Packet filtering
Intrusion detection
Software upgrades
Definition tables
Definition tables
Which of the following is the MOST effective type of access control?
Centralized
Role-based
Decentralized
Discretionary
Role-based
Which of the following devices should be placed within a DMZ?
Router
Firewall
Mail relay
Authentication server
Mail relay
An intrusion detection system should be placed:
outside the firewall.
on the firewall server.
on a screened subnet.
on the external router.
on a screened subnet.
The BEST reason for an organization to have two discrete firewalls connected directly to the Internet and to the same DMZ would be to:
provide in-depth defense.
separate test and production.
permit traffic load balancing.
prevent a denial-of-service attack.
permit traffic load balancing.
An extranet server should be placed:
outside the firewall.
on the firewall server.
on a screened subnet.
on the external router.
on a screened subnet.
Which of the following is the BEST metric for evaluating the effectiveness of security awareness twining? The number of:
password resets.
reported incidents.
incidents resolved.
access rule violations.
reported incidents.
Security monitoring mechanisms should PRIMARILY:
focus on business-critical information.
assist owners to manage control risks.
focus on detecting network intrusions.
record all security violations.
focus on business-critical information.
Which of the following is the BEST method for ensuring that security procedures and guidelines are known and understood?
Periodic focus group meetings
Periodic compliance reviews
Computer-based certification training (CBT)
Employee’s signed acknowledgement
Computer-based certification training (CBT)
When contracting with an outsourcer to provide security administration, the MOST important contractual element is the:
right-to-terminate clause.
limitations of liability.
service level agreement (SLA).
financial penalties clause.
service level agreement (SLA).
Which of the following is the BEST metric for evaluating the effectiveness of an intrusion detection mechanism?
Number of attacks detected
Number of successful attacks
Ratio of false positives to false negatives
Ratio of successful to unsuccessful attacks
Ratio of false positives to false negatives
Which of the following is MOST effective in preventing weaknesses from being introduced into existing production systems?
Patch management
Change management
Security baselines
Virus detection
Change management
Which of the following tools is MOST appropriate for determining how long a security project will take to implement?
Gantt chart
Waterfall chart
Critical path
Rapid Application Development (RAD)
Critical path
Which of the following is MOST effective in preventing security weaknesses in operating systems?
Patch management
Change management
Security baselines
Configuration management
Patch management
When a proposed system change violates an existing security standard, the conflict would be BEST resolved by:
calculating the residual risk.
enforcing the security standard.
redesigning the system change.
implementing mitigating controls.
calculating the residual risk.
Who can BEST approve plans to implement an information security governance framework?
Internal auditor
Information security management
Steering committee
Infrastructure management
Steering committee
Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information?
Baseline security standards
System access violation logs
Role-based access controls
Exit routines
Role-based access controls
Which of the following is generally used to ensure that information transmitted over the Internet is authentic and actually transmitted by the named sender?
Biometric authentication
Embedded steganographic
Two-factor authentication
Embedded digital signature
Embedded digital signature
Which of the following is the MOST appropriate frequency for updating antivirus signature files for antivirus software on production servers?
Daily
Weekly
Concurrently with O/S patch updates
During scheduled change control updates
Daily
Which of the following devices should be placed within a demilitarized zone (DMZ)?
Network switch
Web server
Database server
File/print server
Web server
On which of the following should a firewall be placed?
Web server
Intrusion detection system (IDS) server
Screened subnet
Domain boundary
Domain boundary
An intranet server should generally be placed on the:
internal network.
firewall server.
external router.
primary domain controller.
internal network.