CISSP Exam Test 1 Flashcards
- Which of the following forms the foundation for information systems security?
a. Procedure
b. Policy
c. Software
d. Hardware
b. Policy
- A security policy document usually does not contain which of the following?
a. Rights
b. Responsibilities
c. Authority
d. Requirements
d. Requirements
- A security policy can be violated in all of the following ways except:
a. Knowingly
b. By collusion
c. Unknowingly
d. By committee input
d. By committee input
- An example of a security policy than can be legally monitored is:
a. Keystroke monitoring
b. E-mail monitoring
c. Web browser monitoring
d. Password monitoring
d. Password monitoring
- All of the following are important elements of a good security policy except:
a. Communication
b. Implementation
c. Perception
d. Retraction
c. Perception
- Which of the following is the largest security threat?
a. Internet
b. Users
c. Intranet
d. Extranet
b. Users
- All of the following provide a false sense of security except?
a. Security policy document
b. Password management
c. Policy enforcement
d. Access security rules
c. Policy enforcement
- Which of the following has both advantages and disadvantages?
a. Connecting to the Internet
b. Planting viruses
c. Stealing corporate data
d. Tinkering with configuration settings
a. Connecting to the Internet
- Which of the following is not a common method of attacking a computer system?
a. Password cracking
b. Packet sniffing
c. Encryption key breaking
d. Sendmail
c. Encryption key breaking
- An uncommon information systems security threat is directed at which of the following?
a. Hardware
b. Individuals
c. Software
d. Data
b. Individuals
- A major international threat to networks is:
a. Electrical interference
b. Employees
c. Hackers
d. Telephone line failures
b. Employees
- A common security problem is:
a. Discarded storage media
b. Telephone wiretapping
c. Intelligence consultants
d. Electronic bugs
a. Discarded storage media
- Which of the following is a legal activity?
a. Competitive intelligence
b. Industrial espionage
c. Economic espionage
d. Corporate espionage
a. Competitive intelligence
- Which of the following would not protect an organization from exposure to the Internet?
a. Firewall technology
b. Public networks
c. Passwords
d. Virtual private networks
b. Public networks
- A macro virus is most difficult to:
a. Prevent
b. Detect
c. Correct
d. Attach
b. Detect
- Which of the following is not an example of a first line of defense?
a. Physical security
b. Network monitors
c. Software testing
d. Quality assurance
c. Software testing
- Which of the following is seldom considered by system users?
a. Internet security
b. Residual data security
c. Network security
d. Application system security
b. Residual data security
- Which of the following U.S. legislation addresses privacy and security on the Internet?
a. The Encryption Communication Privacy Act
b. The Computer Security Act of 1987
c. The Privacy Act of 1974
d. The Economic Espionage and Protection of Proprietary Economic Information Act of 1996
a. The Encryption Communication Privacy Act
- Limiting access to information systems should be based on which of the following?
a. Trustworthiness of employees
b. Access time frames
c. Level hierarchy
d. As requested
c. Level hierarchy
- Which of the following is more risky?
a. Permanent access
b. Guest access
c. Temporary access
d. Contractor access
c. Temporary access
- Which of the following provides the most valuable information about a network’s vulnerabilities?
a. Periodic drills
b. Periodic staged intrusions
c. Periodic policy updates
d. Periodic procedure updates
b. Periodic staged intrusions
- The System Administrator’s Tool for Analyzing Networks (SATAN) is an example of:
a. A staged intrusion test
b. A computer virus test
c. A host firewall test
d. A Trojan horse test
a. A staged intrusion test
- Which of the following is not a problem associated with bootleg (pirated) software?
a. It allows users to obtain software from unauthorized sources
b. It introduces viruses that may exist within the software
c. It can be downloaded from the Internet
d. It can be freeware but the owner retains the copyright
d. It can be freeware but the owner retains the copyright
- Which of the following is not usually notified at all or notified last when a computer security incident has occurred?
a. System administrator
b. Legal counsel
c. Disaster recovery coordinator
d. Hardware and software vendors
b. Legal counsel