Information Security Program Development and Management Flashcards
(429 cards)
An additional security control request was submitted by a business after the user requirements phase had just been closed. Which of the following would the information security manager MOST likely recommend to avoid this type of inefficiency?
A.Relevant stakeholders are invited to requirements analysis.
B.An adequate system development method is applied to the project.
C.Deliverables are aligned with business objectives.
D.Escalation procedures are supported by project staff.
A is the correct answer.
Justification
If key stakeholders are not invited to the requirements analysis, it may not be possible to identify key security control features. In such cases, the lack of security controls may surface in a later stage of project. To prevent this type of problem, it is best to ensure that key stakeholders are all invited at the start of the project.
Assuring the presence and the participation of the stockholders is a necessity regardless of which development method will be used.
Although deliverables are aligned with business objectives, late requirements will continue to arise unless key stakeholders are invited to the project from the start. This could result in focusing on functionality aspects while disregarding security aspects.
Escalation steps are required when any suspicious activities are observed among project staff. Additional requirements are more likely an indication of missing involvement than suspicious activity.
What is the initial step that an information security manager would take during the requirements gathering phase of an IT project to avoid project failure?
A.Develop a comprehensive methodology that defines and documents project needs.
B.Build security requirements into the design of the system with consideration of enterprise security needs.
C.Ensure that the business problem is clearly understood before working on the solution.
D.Create a project plan based on the principles of agile development methodology.
C is the correct answer.
Justification
Developing a methodology is a step separate from defining requirements.
The question relates to requirements-gathering phase of the project, not the design phase. Therefore, it would be too early to start building the requirement into the design.
The key to successful requirements gathering is to focus initially on the business problem before trying to develop a solution. Otherwise, the solution may address the wrong problem.
An agile development methodology first requires the determination of business requirements.
Which of the following choices is the MOST significant single point of failure in a public key infrastructure?
A.A certificate authority’s (CA) public key
B.A relying party’s private key
C.A CA’s private key
D.A relying party’s public key
C is the correct answer.
Justification
The certificate authority’s (CA) public key is published and poses no risk.
If destroyed, lost or compromised, the private key of any relying party affects only that party.
The CA’s private key is the single point of failure for the entire public key infrastructure (PKI) because it is unpublished and the system cannot function if the key is destroyed, lost or compromised.
The public key is published and poses no risk.
Which of the following practices completely prevents a man-in-the-middle attack between two hosts?
A.Use security tokens for authentication.
B.Connect through an IP Security v6 virtual private network.
C.Use Hypertext Transfer Protocol Secure with a server-side certificate.
D.Enforce static media access control addresses.
B is the correct answer.
Justification
Using token-based authentication does not prevent a man-in-the-middle attack; however, it may help eliminate reusability of stolen cleartext credentials.
IP Security v6 effectively prevents man-in-the-middle attacks by including source and destination Internet Protocols within the encrypted portion of the packet. The protocol is resilient to man-in-the-middle attacks.
A Hypertext Transfer Protocol Secure session can be intercepted through Domain Name System (DNS) or Address Resolution Protocol (ARP) poisoning.
ARP poisoning—a specific kind of man-in-the-middle attack—may be prevented by setting static media access control addresses. Nevertheless, DNS and NetBIOS resolution can still be attacked to deviate traffic.
Which of the following should the information security manager implement to protect a network against unauthorized external connections to corporate systems?
A.Strong authentication
B.Internet Protocol anti-spoofing filtering
C.Network encryption protocol
D.Access lists of trusted devices
A is the correct answer.
Justification
Strong authentication will provide adequate assurance of user identities.
Internet Protocol anti-spoofing is aimed at the device rather than the user.
Encryption protocol ensures data confidentiality and authenticity.
Access lists of trusted devices are easily exploited by spoofed client identities.
Which of the following devices could potentially stop a structured query language injection attack?
A.An intrusion prevention system
B.An intrusion detection system
C.A host-based intrusion detection system
D.A host-based firewall
A is the correct answer.
Justification
Structured query language (SQL) injection attacks occur at the application layer. Most intrusion prevention systems will detect at least basic sets of SQL injection and will be able to stop them.
Intrusion detection systems will detect but not prevent.
Host-based intrusion detection systems will be unaware of SQL injection problems.
A host-based firewall, whether on the web server or the database server, will allow the connection because firewalls do not check packets at an application layer.
What is the BEST policy for securing data on mobile universal serial bus (USB) drives?
A.Authentication
B.Encryption
C.Prohibit employees from copying data to USB devices
D.Limit the use of USB devices
B is the correct answer.
Justification
Authentication protects access to the data but does not protect the data once the authentication is compromised.
Encryption provides the most effective protection of data on mobile devices.
Prohibiting employees from copying data to universal serial bus (USB) devices does not prevent copying data and offers minimal protection.
Limiting the use of USB devices does not secure the data on them.
Which one of the following combinations offers the STRONGEST encryption and authentication method for 802.11 wireless networks?
A.Wired equivalent privacy with 128-bit pre-shared key authentication
B.Temporal Key Integrity Protocol-Message Integrity Check with the RC4 cipher
C.Wi-Fi Protected Access 2 (WPA2) and pre-shared key authentication
D.WPA2 and 802.1x authentication
D is the correct answer.
Justification
Wired Equivalent Privacy (WEP) with 128-bit pre-shared key authentication can be easily cracked with open source tools. WEP is easily compromised and is no longer recommended for secure wireless networks.
Temporal Key Integrity Protocol-Message Integrity Check (TKIP-MIC) with the RC4 cipher is not as strong as WPA2 with 802.1x authentication.
Wi-Fi Protected Access 2 (WPA2) with pre-shared keys uses the strongest level of encryption, but the authentication is more easily compromised.
WPA2 and 802.1x authentication is the strongest form of wireless authentication currently available. WPA2 combined with 802.1x forces the user to authenticate using strong Advanced Encryption Standard encryption.
Which one of the following types of detection is NECESSARY to mitigate a denial or distributed denial-of-service attack?
A.Signature-based detection
B.Deep packet inspection
C.Virus detection
D.Anomaly-based detection
D is the correct answer.
Justification
Signature-based detection cannot react to a distributed denial-of-service (DDoS) attack because it does not have any insight into increases in traffic levels.
Deep packet inspection allows a protocol to be inspected and is not related to denial-of-service (DoS) attacks.
Virus detection would have no effect on DDoS detection or mitigation.
Anomaly-based detection establishes normal traffic patterns and then detects any deviation from that baseline. Traffic baselines are greatly exceeded when under a DDoS attack and are quickly identified by anomaly-based detection.
A certificate authority is required for a public key infrastructure:
A.in cases where confidentiality is an issue.
B.when challenge/response authentication is used.
C.except where users attest to each other’s identity.
D.in role-based access control deployments.
C is the correct answer.
Justification
The requirement of confidentiality is not relevant to the certificate authority (CA) other than to provide an authenticated user’s public key.
Challenge/response authentication is not a process used in a public key infrastructure (PKI).
The role of the CA is not needed in implementations such as Pretty Good Privacy, where the authenticity of the users’ public keys are attested to by others in a circle of trust.
If the role-based access control is PKI-based, either a CA is required or other trusted parties will have to attest to the validity of users.
The MOST effective technical approach to mitigate the risk of confidential information being disclosed in outgoing email attachments is to implement:
A.content filtering.
B.data classification.
C.information security awareness.
D.encryption for all attachments.
A is the correct answer.
Justification
Content filtering provides the ability to examine the content of attachments and prevent information containing certain words or phrases, or of certain identifiable classifications, from being sent out of the enterprise.
Data classification helps identify the material that should not be transmitted via email attachments but by itself will not prevent it.
Information security awareness training also helps limit confidential material from being disclosed via email as long as personnel are aware of what information should not be exposed and willingly comply with the requirements, but it is not as effective as outgoing content filtering.
Encrypting all attachments is not effective because it does not limit the content and may actually obscure confidential information contained in the email.
Which of the following BEST ensures nonrepudiation?
A.Strong passwords
B.A digital hash
C.Symmetric encryption
D.Digital signatures
D is the correct answer.
Justification
Strong passwords only ensure authentication to the system and cannot be used for nonrepudiation involving two or more parties.
A digital hash in itself helps in ensuring integrity of the contents but not nonrepudiation.
Symmetric encryption would not help in nonrepudiation because the keys are always shared between parties.
Digital signatures use a private and public key pair, authenticating both parties. The integrity of the contents exchanged is controlled through the hashing mechanism that is signed by the private key of the exchanging party.
Which of the following is the FIRST phase in which security should be addressed in the development cycle of a project?
A.Design
B.Implementation
C.Application security testing
D.Feasibility
D is the correct answer.
Justification
Security requirements must be defined before doing design specification, although changes in design may alter these requirements later on.
Security requirements defined during system implementation are typically costly add-ons that are frequently ineffective.
Application security testing occurs after security has been implemented.
Information security should be considered at the earliest possible stage because it may affect feasibility of the project.
What would be the MOST significant security risk when using wireless local area network technology?
A.Man-in-the-middle attack
B.Spoofing of data packets
C.Rogue access point
D.Session hijacking
C is the correct answer.
Justification
Man-in-the-middle attacks can occur in any media and are not dependent on the use of a wireless local area network (WLAN) technology.
Spoofing of data packets is not dependent on the use of a WLAN technology.
A rogue access point masquerades as a legitimate access point. The risk is that legitimate users may connect through this access point and have their traffic monitored.
Session hijacking is not dependent on the use of a WLAN technology.
For virtual private network access to the corporate network, the information security manager is requiring strong authentication. Which of the following is the strongest method to ensure that logging onto the network is secure?
A.Biometrics
B.Symmetric encryption keys
C.Secure Sockets Layer-based authentication
D.Two-factor authentication
D is the correct answer.
Justification
While biometrics provides unique authentication, it is not strong by itself, unless a personal identification number (PIN) or some other authentication factor is used with it. Biometric authentication by itself is also subject to replay attacks.
A symmetric encryption method that uses the same secret key to encrypt and decrypt data is not a typical authentication mechanism for end users. The private key could still be compromised.
Secure Sockets Layer (SSL) is the standard security technology for establishing an encrypted link between a web server and a browser. If SSL is used with a client certificate and a password, it is two-factor authentication.
Two-factor authentication requires more than one type of user authentication, typically something you know and something you have, such as a PIN and smart card.
How does the development of an information security program begin?
A.Risk is assessed and analyzed.
B.The security architecture is developed.
C.The controls statement of applicability is completed.
D.Required outcomes are defined.
D is the correct answer.
Justification
Assessing and analyzing risk is required to develop a strategy and will provide some of the information needed to develop the strategy that will achieve the desired outcomes, but it will not define the scope and charter of the security program.
A security architecture is a part of implementation after developing the strategy.
The applicability statement is a part of strategy implementation using International Organization for Standardization (ISO) 27001 or 27002 after determining the scope and responsibilities of the program.
After management has determined the desired outcomes of the information security program, development of a strategy can begin, together with initiating the process of developing information security governance structures, achieving organizational adoption and developing an implementation strategy that will define the scope and responsibilities of the security program.
Which of the following BEST protects confidentiality of information?
A.Information classification
B.Segregation of duties
C.Least privilege
D.Systems monitoring
C is the correct answer.
Justification
While classifying information can help focus the assignment of privileges, classification itself does not provide enforcement.
Only in very specific situations does segregation of duties safeguard confidentiality of information.
Restricting access to information to those who need to have access is the most effective means of protecting confidentiality.
Systems monitoring is a detective control rather than a preventive control.
Requirements for an information security program should be based PRIMARILY on which of the following choices?
A.Governance policies
B.Desired outcomes
C.Specific objectives
D.The security strategy
B is the correct answer.
Justification
Policies are one of the resources used to develop the strategy, which is based on specific objectives that meet the requirements.
The desired outcomes for the security program will be high-level achievements related to acceptable risk across the enterprise and will determine the requirements that must be met to achieve those outcomes.
Objectives are the steps required to achieve the desired outcomes.
The security strategy is the road map to achieve the objectives that result in the desired outcomes.
Which of the following is the BEST approach for an enterprise desiring to protect its intellectual property?
A.Conduct awareness sessions on intellectual property policy.
B.Require all employees to sign a nondisclosure agreement.
C.Promptly remove all access when an employee leaves the enterprise.
D.Restrict access to a need-to-know basis.
D is the correct answer.
Justification
Security awareness regarding intellectual property policy will not prevent violations of this policy.
Requiring all employees to sign a nondisclosure agreement is a good control but not as effective as restricting access to a need-to-know basis.
Removing all access on termination does not protect intellectual property prior to an employee leaving.
Restricting access to a need-to-know basis is the most effective approach to protecting intellectual property.
What is the MOST common protocol to ensure confidentiality of transmissions in a business-to-customer financial web application?
A.Secure Sockets Layer
B.Secure Shell
C.IP Security
D.Secure/Multipurpose Internet Mail Extensions
A is the correct answer.
Justification
Secure Sockets Layer is a cryptographic protocol that provides secure communications, providing end point authentication and communications privacy over the Internet. In typical use, all data transmitted between the customer and the business are, therefore, encrypted by the business’s web server and remain confidential.
Secure Shell (SSH) File Transfer Protocol is a network protocol that provides file transfer and manipulation functionality over any reliable data stream. It is typically used with the SSH-2 protocol to provide secure file transfer.
IP Security (IPSec) is a standardized framework for securing Internet Protocol (IP) communications by encrypting and/or authenticating each IP packet in a data stream. There are two modes of IPSec operation: transport mode and tunnel mode.
Secure/Multipurpose Internet Mail Extensions (S/MIME) is a standard for public key encryption and signing of email encapsulated in MIME; it is not a web transaction protocol.
What human resources (HR) activity is MOST crucial in managing mobile devices supplied by the enterprise? HR provides:
A.termination notices.
B.background checks.
C.reporting structures.
D.awareness support.
A is the correct answer.
Justification
When the human resources (HR) department provides staff termination notices, security management can perform deprovisioning of mobile devices.
Background checks generally do not help the management of mobile devices.
Reporting structures generally do not affect the management of mobile devices.
HR could support information security awareness programs. However, from the management perspective, device deprovisioning upon staff termination will be more important.
A web-based business application is being migrated from test to production. Which of the following is the MOST important management sign-off for this migration?
A.User
B.Network
C.Operations
D.Database
A is the correct answer.
Justification
As owners of the system, user management sign-off is the most important. If a system does not meet the needs of the business, then it has not met its primary objective.
The needs of the network are secondary to the needs of the business.
The needs of operations are secondary to the needs of the business.
The needs of database management are secondary to the needs of the business.
Which of the following is the BEST justification to convince management to invest in an information security program?
A.Cost reduction
B.Compliance with company policies
C.Protection of business assets
D.Increased business value
D is the correct answer.
Justification
Cost reduction by itself is rarely the motivator for implementing an information security program.
Compliance is secondary to business value and cannot be the best justification, as the company may already be in compliance as managed by the legal team.
Protection of business assets is not the best justification, as management can counter it by stating that it can ensure protection of assets.
Investing in an information security program would increase business value as a result of fewer business disruptions, fewer losses, increased productivity and stronger brand reputation.
An enterprise is implementing intrusion protection in its demilitarized zone (DMZ). Which of the following steps is necessary to make sure that the intrusion prevention system (IPS) can view all traffic in the DMZ?
A.Ensure that intrusion prevention is placed in front of the firewall.
B.Ensure that all devices that are connected can easily see the IPS in the network.
C.Ensure that all encrypted traffic is decrypted prior to being processed by the IPS.
D.Ensure that traffic to all devices is mirrored to the IPS.
C is the correct answer.
Justification
An intrusion prevention system (IPS) placed in front of the firewall will almost certainly continuously detect potential attacks, creating endless false-positives and directing the firewall to block many sites needlessly. Most of actual attacks would be intercepted by the firewall in any case.
All connected devices do not need to see the IPS.
For the IPS to detect attacks, the data cannot be encrypted; therefore, all encryption should be terminated to allow all traffic to be viewed by the IPS. The encryption should be terminated at a hardware Secure Sockets Layer accelerator or virtual private network server to allow all traffic to be monitored.
Traffic to all devices is not mirrored to the IPS.