CISM Practice C Topic 3 Flashcards
(114 cards)
Who can BEST advocate the development of and ensure the success of an information security program?
Steering committee
Which of the following BEST ensures that information transmitted over the Internet will remain confidential?
Virtual private network (VPN)
The effectiveness of virus detection software is MOST dependent on which of the following?
Definition tables
Which of the following is the MOST effective type of access control?
Role-based
Which of the following devices should be placed within a DMZ?
Mail relay
An intrusion detection system should be placed:
on a screened subnet.
The BEST reason for an organization to have two discrete firewalls connected directly to the Internet and to the same DMZ would be to:
permit traffic load balancing.
An extranet server should be placed:
on a screened subnet.
Which of the following is the BEST metric for evaluating the effectiveness of security awareness twining?
reported incidents.
Security monitoring mechanisms should PRIMARILY:
focus on business-critical information.
Which of the following is the BEST method for ensuring that security procedures and guidelines are known and understood?
Computer-based certification training (CBT)
When contracting with an outsourcer to provide security administration, the MOST important contractual element is the:
service level agreement (SLA).
Which of the following is the BEST metric for evaluating the effectiveness of an intrusion detection mechanism?
Ratio of false positives to false negatives
Which of the following is MOST effective in preventing weaknesses from being introduced into existing production systems?
Change management
Which of the following tools is MOST appropriate for determining how long a security project will take to implement?
Critical path
Which of the following is MOST effective in preventing security weaknesses in operating systems?
Patch management
When a proposed system change violates an existing security standard, the conflict would be BEST resolved by:
calculating the residual risk.
Who can BEST approve plans to implement an information security governance framework?
Steering committee
Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information?
Role-based access controls
Which of the following is generally used to ensure that information transmitted over the Internet is authentic and actually transmitted by the named sender?
Embedded digital signature
Which of the following is the MOST appropriate frequency for updating antivirus signature files for antivirus software on production servers?
Daily
Which of the following devices should be placed within a demilitarized zone (DMZ)?
Web server
On which of the following should a firewall be placed?
Domain boundary
An intranet server should generally be placed on the:
internal network.