Domain 5: Protection of Information Assets (Part 5A) Flashcards
(209 cards)
An accuracy measure for a biometric system is:
False acceptance rate
After reviewing its business processes, a large organization is deploying a new web application based on a Voice-over Internet control Protocol technology. Which of the following is the MOST appropriate approach for implementing access control that will facilitate security management of the VoIP web application?
Role-Based Access Control
The BEST filter rule for protecting a network from being used as an amplifier in a denial-of-service attack is to deny all:
outgoing traffic with source addresses external to the network.
The BEST overall quantitative measure of the performance of biometric control devices is
equal-error rate.
A business application system accesses a corporate database using a single ID and password embedded in a program. Which of the following would provide efficient access control over the organization’s data?
Apply role- based permissions within the application system.
A certificate authority (CA) can delegate the processes of:
establishing a link between the requesting entity and its public key.
A characteristic of User Datagram Protocol in network communications is
packets may arrive out of order.
A company has decided to implement an electronic signature scheme based on a public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a password. The MOST significant risk of this approach is::
use of the user’s electronic signature by another person if the password is compromised.
A company is implementing a Dynamic Host Configuration Protocol. Given that the following conditions exist, which represents the GREATEST concern?
Access to a network port is not restricted.
A company is planning to install a network-based intrusion detection system to protect the web site that it hosts. Where should the device be installed?
In the demilitarized zone
Company XYZ has outsourced production support to service provider ABC located in another country. The ABC service provider personnel remotely connect to the corporate network of the XYZ outsourcing entity over the Internet. Which of the following would BEST provide assurance that transmission of information is secure while the production support team at ABC is providing support to XYZ?
Virtual private network tunnel
Company XYZ has outsourced production support to service provider ABC located in another country. The ABC service provider personnel remotely connect to the corporate network of the XYZ outsourcing entity over the Internet. Which of the following would provide the BEST assurance that only authorized users of ABC connect over the Internet for production support to XYZ?
Two-factor authentication
Confidentiality of the data transmitted in a wireless local area network is BEST protected if the session is
encrypted using dynamic keys.
Confidentiality of transmitted data can best be delivered by encrypting the
session key with the receiver’s public key.
A consulting firm has created a File Transfer Protocol (FTP) site for the purpose of receiving financial data and has communicated the site’s address, user ID and password to the financial services company in separate email messages. The company is to transmit its data to the FTP site after manually encrypting the data. The IS auditor’s GREATEST concern with this process is that
the users may not remember to manually encrypt the data before transmission.
The cryptographic hash sum of a message is recalculated by the receiver. This is to ensure:
the integrity of data transmitted by the sender.
A digital signature contains a message digest to
show if the message has been altered after transmission.
Digital signatures require the
signer to have a private key and the receiver to have a public key
Distributed denial-of-service attacks on Internet sites are typically evoked by hackers using which of the following?
Botnets
During a logical access controls review, an IS auditor observes that user accounts are shared. The GREATEST risk resulting from this situation is that
user accountability may not be established.
During a logical access controls review, an IS auditor observes that user accounts are shared. The GREATEST risk resulting from this situation is that
user accountability is not established.
During an access control review for a mainframe application, an IS auditor discovers user security groups without designated owners. The PRIMARY reason that this is a concern to the IS auditor is that without ownership, there is no one with clear responsibility for
approval of user access.
During an audit of an enterprise that is dedicated to e- commerce, the IS manager states that digital signatures are used when receiving communications from customers. To substantiate this, an IS auditor must prove that which of the following is used?:
A hash of the data that is transmitted and encrypted with the customer’s private key
During an audit of a telecommunications system, an IS auditor finds that the risk of intercepting data transmitted to and from remote sites is very high. The MOST effective control for reducing this exposure is
encryption.