Questions and Answers Flashcards
(110 cards)
Aaron is a security manager who needs to develop a solution to allow
his company’s mobile devices to be authenticated in a standardized and
centralized manner using digital certificates. The applications these mobile
clients use require a TCP connection. Which of the following is the best
solution for Aaron to implement?
A. SESAME using PKI
B. RADIUS using EAP
C. Diameter using EAP
D. RADIUS using TTLS
C.
Diameter is a protocol that has been developed to build upon the
functionality of RADIUS and to overcome many of its limitations. Diameter
is an AAA protocol that provides the same type of functionality as RADIUS
and TACACS+ but also provides more flexibility and capabilities, including
working with EAP. RADIUS uses UDP, and cannot effectively deal well with
remote access, IP mobility, and policy control
Terry is a security manager for a credit card processing organization. His
company uses internal DNS servers, which are placed within the LAN, and
external DNS servers, which are placed in the DMZ. The company also relies
upon DNS servers provided by their service provider. Terry has found out that
attackers have been able to manipulate several DNS server caches, which point
employee traffic to malicious websites. Which of the following best describes
the solution this company should implement?
A. IPSec
B. PKI
C. DNSSEC
D. MAC-based security
C.DNSSEC (DNS security, which is part of the many current implementations
of DNS server software) works within a PKI and uses digital signatures, which
allows DNS servers to validate the origin of a message to ensure that it is not
spoofed and potentially malicious. If DNSSEC were enabled on server A, then
server A would, upon receiving a response, validate the digital signature on
the message before accepting the information to make sure that the response
is from an authorized DNS server. So even if an attacker sent a message to a
DNS server, the DNS server would discard it because the message would not
contain a valid digital signature. DNSSEC allows DNS servers to send and
receive only authenticated and authorized messages between themselves,
and thwarts the attacker’s goal of poisoning a DNS cache table
It is important to deal with the issue of “reasonable expectation of privacy”
(REP) when it comes to employee monitoring. In the U.S. legal system
the expectation of privacy is used when defining the scope of the privacy
protections provided by .
A. Federal Privacy Act
B. PATRIOT Act
C. The Fourth Amendment of the Constitution
D. The Bill of Rights
C.It is important to deal with the issue of “reasonable expectation of privacy”
(REP) when it comes to employee monitoring. In the U.S. legal system
the expectation of privacy is used when defining the scope of the privacy
protections provided by the Fourth Amendment of the Constitution. If it is not specifically explained to an employee that monitoring is possible and/
or probable, when the monitoring takes place he could claim that his privacy
rights have been violated and launch a civil suit against a company.
Jane is suspicious that an employee is sending sensitive data to one of the
company’s competitors. The employee has to use these data for daily activities,
thus it is difficult to properly restrict the employee’s access rights. In this
scenario, which best describes the company’s vulnerability, threat, risk, and
necessary control?
A. Vulnerability is employee access rights, threat is internal entities misusing
privileged access, risk is the business impact of data loss, and the necessary
control is detailed network traffic monitoring.B. Vulnerability is lenient access rights, threat is internal entities misusing
privileged access, risk is the business impact of data loss, and the necessary
control is detailed user monitoring.
C. Vulnerability is employee access rights, threat is internal employees
misusing privileged access, risk is the business impact of confidentiality,
and the necessary control is multifactor authentication.
D. Vulnerability is employee access rights, threat is internal users misusing
privileged access, risk is the business impact of confidentiality, and the
necessary control is CCTV.
B.A vulnerability is a lack or weakness of a control. In this situation the access
control may be weak in nature, thus exploitable. The vulnerability is that the
user, who must be given access to the sensitive data, is not properly monitored
to deter and detect a willful breach of security. The threat is that any internal
entity might misuse given access. The risk is the business impact of losing
sensitive data. One control that could be put into place is monitoring so that
access activities can be closely watched.
Which of the following best describes what role-based access control offers
companies in reducing administrative burdens?A. It allows entities closer to the resources to make decisions about who can
and cannot access resources.
B. It provides a centralized approach for access control, which frees up
department managers.
C. User membership in roles can be easily revoked and new ones established
as job assignments dictate.
D. It enforces an enterprise-wide security policy, standards, and guidelines.
C.An administrator does not need to revoke and reassign permissions to
individual users as they change jobs. Instead, the administrator assigns
permissions and rights to a role, and users are plugged into those roles.
Mark needs to ensure that the physical security program he develops for his
company increases performance, decreases risk in a cost-effective manner, and
allows management to make informed decisions. Which of the following best
describes what he needs to put into place?
A. Performance-based program
B. Defense-in-depth program
C. Layered program
D. Security through obscurity
A.It is possible to determine how beneficial and effective your physical
security program is only if it is monitored through a performance-based
approach. This means you should devise measurements and metrics to
gauge the effectiveness of your countermeasures. This enables management
to make informed business decisions when investing in the protection of
the organization’s physical security. The goal is to increase the performance
of the physical security program and decrease the risk to the company in a
cost-effective manner. You should establish a baseline of performance and
thereafter continually evaluate performance to make sure that the company’s
protection objectives are being met.
A software development company released a product that committed several
errors that were not expected once deployed in their customers’ environments.
All of the software code went through a long list of tests before being released.
The team manager found out that after a small change was made to the code,
the program was not tested before it was released. Which of the following
tests was most likely not conducted?
A. Unit
B. Compiled
C. Integration
D. Regression
D.Regression testing should take place after a change to a system takes place,
retesting to ensure functionality, performance, and protection.
It is important to choose the right risk analysis methodology to meet the goals
of the organization’s needs. Which of the following best describes when the
risk management standard AS/NZS 4360 should be used?
A. When there is a need to assess items of an organization that are directly
related to information security.
B. When there is a need to assess items of an organization that are not just
restricted to information security.
C. When a qualitative method is needed to prove the compliance levels as
they pertain to regulations.
D. When a qualitative method is needed to prove the compliance levels as
they pertain to laws
B.AS/NZS 4360 takes a much broader approach to risk management than just
information security. This Australian and New Zealand methodology can be
used to understand a company’s financial, capital, human safety, and business
decisions risks. Although it can be used to analyze security risks, it was not
created specifically for this purpose. This risk management standard is more
focused on the health of a company from a business point of view, not security
Companies should follow certain steps in selecting and implementing a new
computer product. Which of the following sequences is ordered correctly?
A. Evaluation, accreditation, certification
B. Evaluation, certification, accreditation
C. Certification, evaluation, accreditation
D. Certification, accreditation, evaluation
B.The first step is evaluation. Evaluation involves reviewing the product’s
protection functionality and assurance ratings. The next phase is certification.
Certification involves testing the newly purchased product within the company’s
environment. The final stage is accreditation, which is management’s formal
approval
An operating system maintains several processes in memory at the same time.
The processes can only interact with the CPU during its assigned time slice since
there is only one CPU and many processes. Each process is assigned an interrupt
value to allow for this type of time slicing to take place. Which of the following
best describes the difference between maskable and nonmaskable interrupts?
A. A maskable interrupt is assigned to a critical process, and a nonmaskable
interrupt is assigned to a noncritical process.
B. A maskable interrupt is assigned to a process in ring 0, and a nonmaskable
interrupt is assigned to a process in ring 3.
C. A maskable interrupt is assigned to a process in ring 3, and a nonmaskable
interrupt is assigned to a process in ring 4.
D. A maskable interrupt is assigned to a noncritical process, and a
nonmaskable interrupt is assigned to a critical process.
D.A maskable interrupt is assigned to an event that may not be overly
important, and the programmer can indicate that if that interrupt calls, the
program does not stop what it is doing. This means the interrupt is ignored.
Nonmaskable interrupts can never be overridden by an application because
the event that has this type of interrupt assigned to it is critical.
Cable telecommunication networks used to provide a security risk in that
neighbors could commonly access each other’s Internet-based traffic because
the traffic was not encrypted and protected. Which of the following is an
international telecommunications standard that addresses these issues?
A. Safe Harbor Encryption Requirements
B. Data-Over-Cable Service Interface Specifications
C. Privacy Service Requirements
D. Telecommunication Privacy Protection Standard
B.Most cable providers comply with Data-Over-Cable Service Interface
Specifications (DOCSIS), which is an international telecommunications
standard that allows for the addition of high-speed data transfer to an existing
cable TV (CATV) system. DOCSIS includes MAC-layer security services in its
Baseline Privacy Interface/Security (BPI/SEC) specifications. This protects
individual user traffic by encrypting the data as they travel over the provider’s
infrastructure. Sharing the same medium brings up a slew of security
concerns, because users with network sniffers can easily view their neighbors’
traffic and data as both travel to and from the Internet. Many cable companies
are now encrypting the data that go back and forth over shared lines through
a type of data link encryption.
There are different categories for evidence depending upon what form it is
in and possibly how it was collected. Which of the following is considered
supporting evidence?
A. Best evidence
B. Corroborative evidence
C. Conclusive evidence
D. Direct evidence
B.Corroborative evidence cannot stand alone, but instead is used as supporting
information in a trial. It is often testimony indirectly related to the case but
offers enough correlation to supplement the lawyer’s argument. The other
choices are all types of evidence that can stand alone.
_____________ is the graphical representation of data commonly used on
websites. It is a skewed representation of characteristics a person must enter to
prove that the subject is a human and not an automated tool, as in a software
robot.
A. Anti-spoofing
B. CAPTCHA
C. Spam anti-spoofing
D. CAPCHAT
B.A CAPTCHA is a skewed representation of characteristics a person must
enter to prove that the subject is a human and not an automated tool, as in
a software robot. It is the graphical representation of data.
Mark has been asked to interview individuals to fulfill a new position in his
company. The position is a chief privacy officer (CPO). What is the function
of this type of position?
A. Ensuring that company financial information is correct and secure
B. Ensuring that customer, company, and employee data are protected
C. Ensuring that security policies are defined and enforced
D. Ensuring that partner information is kept safe
B.The CPO is a newer position, created mainly because of the increasing
demands on organizations to protect a long laundry list of different types
of data. This role is responsible for ensuring that customer, company, and
employee data are secure and kept secret, which keeps the company out of
criminal and civil courts and hopefully out of the headlines.
A risk management program must be developed properly and in the right
sequence. Which of the following provides the correct sequence for the steps
listed?
i. Developed a risk management team
ii. Calculated the value of each asset
iii. Identified the vulnerabilities and threats that can affect the identified assets
iv. Identified company assets to be assessed
A. i, iii, ii, iv
B. ii, i, iv, iii
C. iii, i, iv, ii
D. i, iv, ii, iii
D.The correct steps for setting up a risk management program are as follows:
- Develop a risk management team
- Identify company assets to be assessed
- Calculate the value of each asset
- Identify the vulnerabilities and threats that can affect the identified assets
Jack needs to develop a security program for a medical organization. He has
been instructed by the security steering committee to follow the ISO/IEC
international standards when constructing and implementing this program so
that certification can be accomplished. Which of the following best describes
the phases Jack should follow?
A. “Plan” by defining scope and policy. “Do” by managing identified risks.
“Check” by carrying out monitoring procedures and audits. “Act” by
implementing corrective actions.
B. “Plan” by defining scope and policy. “Do” by creating an implementation
risk mitigation plan and implementing controls. “Check” by carrying
out monitoring procedures and audits. “Act” by implementing corrective
actions.
C. “Plan” by identifying controls. “Do” by creating an implementation risk
mitigation plan. “Check” by carrying out monitoring procedures and
audits. “Act” by implementing corrective actions.
D. “Plan” by defining scope and policy. “Do” by creating an implementation
risk mitigation plan and implementing controls. “Check” by carrying
out monitoring procedures and audits. “Act” by implementing risk
management.
B.When building an information security management system (ISMS)
based upon the ISO/IEC standard, it is best to follow the Plan-Do-Check-Act
approach. ISO/IEC 27001 defines the components of this approach as the
following:
1. Plan: Establish ISMS policy, objectives, processes, and procedures relevant
to managing risk and improving information security to deliver results in
accordance with an organization’s overall policies and objectives.
2. Do: Implement and operate the ISMS policy, controls, processes, and
procedures.
3. Check: Assess and, where applicable, measure process performance against
ISMS policy, objectives, and practical experience and report the results to
management for review.
4. Act: Take corrective and preventive actions, based on the results of
the internal ISMS audit and management review or other relevant
information, to achieve continual improvement of the ISMS.
All of the following are basic components of a security policy EXCEPT the:
A. definition of the issue and statement of relevant terms.
B. statement of roles and responsibilities
C. statement of applicability and compliance requirements.
D. statement of performance of characteristics and requirements
D.
Policies are considered the first and highest level of documentation, from which the lower level elements of standards, procedures, and guidelines flow. This order, however, does not mean that policies are more important than lower elements. These higher-level policies, which are the more general policies and statements, should be created first in the process for strategic reasons, and then the more tactical elements can follow
A security policy would include all of the following EXCEPT: A. Background B. Scope statement C. Audit requirements D. Enforcement
B. Scope statement
Which one of the following is an important characteristic of an information security policy?
A. Identifies major functional areas of information
B. Quantifies the effect of the loss of the information
C. Requires the identification of information of owners.
D. Lists applications that support the business function.
A.
Information security policies are high-level plans that describe the goals of the procedures. Policies are not guidelines or standards, nor are they procedures or controls. Policies describe security in general terms, not specifics. They provide the blueprints for an overall security program just as a specification defines your next procuct.
Ensuring the integrity of business information is the PRIMARY concern of: A. Encryption security B. Procedural security. C. Logical security D. On-line security
B.
Procedures are looked at as the lowest level in the policy chain because they are closest to the computers and provide detailed steps for configuration and installation issues. They provide the steps to actually implement the statements in the policies, standards, and guidelines. Security procedures, standards, measures, practices and policies cover a number of different subject areas.
Which of the following would be the first step in establishing an information security program?
A. Adoption of a corporate information security policy statement.
B. Development and implementation of an information security standards manual.
C. Development of a security awareness-training program
D. Purchase of security access control software
A.
Setting policy will preclude all other activities as this is the foundation for the security program.
Which of the following department managers would be best suited to oversee the development of an information security policy? A. Information Systems B. Human Resources C. Business Operations D. Security Administration
C.
What is the function of a corporate information security policy?
A. Issue corporate standard to be used when addressing specific security problems.
B. Issue guidelines in selecting equipment, configuration, design, and secure problems
C. Define the specific assets to be protected and identify the specific tasks which must be completed to secure them
D. Define the main security objectives which must be achieved and the security framework to meet business objectives.
D.
Information security policies are high-level plans that describe the goals of the procedures or controls. Policies describe security in general, not specifics. They provide the blueprint for an overall security program just as a specification defines your next product.
Why must senior management endorse a security policy?
A So they will accept ownership for security within the organization.
B. So that employees will follow the policy directives
C. So that external bodies will recognize the organizations commitment to security
D. So that they can be held legally accountable
A.