Various Flashcards

1
Q

A hidden software-access mechanism that will bypass normal security controls to grant access into the program

A

Trapdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Work tasks and data processing that were lost by a disaster, disruption, or failure

A

Lost work in process (LWIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A shared connection used in common by other devices

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Level of permission granted to individual user for reading data, writing data, or executing specific programs

A

Access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Samples collected by the auditor to prove or disprove the audit findings

A

Audit evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Older term for the building that houses the data center

A

Information processing facility (IPF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The initial loading of software to start a computer

A

Boot strapping, also known as initial program load (IPL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Matching the combined security of subject (user or program), object (data), and context of usage (need or purpose) to determine whether the request should be approved or denied

A

Attribute-based access control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A unique serial number burned into the network interface card by the manufacturer. The address operates in the Data-Link layer (layer 2) of the OSI model.

A

Media Access Control (MAC) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Test run by software quality assurance to check the system security mechanisms by exploiting known vulnerabilities

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is it called when the auditor places restrictions on the nature, use, or content of their findings? The audit may have encountered problems in scope, time, thoroughness of tests, or content of available evidence.

A

Qualified opinion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the list of objectives, tasks in sequence, skills matrix, written procedures, written test procedures, and forecast illustrating scope, time, and cost estimates?

A

Audit plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is the most restrictive level of access that grants users the minimum amount of access to perform their jobs.

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Technique used by programmers in computer software to disable the functionality of the program based on a specific date

A

Time bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the term used to describe the development of well-defined specifications while ensuring adherence to those specifications?

A

Quality. Quality starts during initial design with the gathering of specifications. Quality originates in the beginning, not by postinspection after the product (or service) is created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of audit to determine whether internal controls are present and functioning effectively

A

Compliance audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an attack that has not been seen before called?

A

Zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which access control model allows the system owner to establish access privileges to the system?

A

Discretionary access control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the term for a continuous threat of breach through electronic attacks?

A

Persistent electronic threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of the chain of custody, and why is it so important when you are collecting evidence?

A

The chain of custody ensures control in the preservation of evidence. It ensures that extra care is taken not to alter or taint the sample.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The protection of information held in secret for the benefit of authorized users

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An attempt to overpower the system or attempt every possible combination until access is granted

A

Brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Information synonymous with public records or unprotected data that is accessible by anyone

A

Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is it called when you manage a series of individual projects to create an ongoing operation, also known as a functional support program?

A

Program management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is another name for a proxy server?
A circuit-level firewall
26
What do you call a set of commands and macros developed into a custom template inside an integrated development environment (IDE) programming tool?
Pseudocode
27
The process of determining risks affecting the actual steps necessary to produce the desired product or service, as in use by the organization
Business impact analysis (BIA)
28
What is two-factor authentication?
Using two methods for authentication. One method is something you know; the other method is something you have, such as an ATM card, electronic token, or physical characteristics (fingerprint, iris scan).
29
Name for specific mid-level controls over any technology shared across multiple departments. IT systems exist in almost all departments, and therefore IT-type controls must also exist in each department regardless of who is in charge.
Pervasive controls
30
What type of plan addresses the continued operation of an organization after a disaster occurs?
Business continuity plan (BCP)
31
Special command used on the network to request a response from a specific machine on the same subnet
Ping
32
What is the name of the administrative process for subdividing services to allocate for a user?
Provisioning
33
This refers to the cost savings for doing it right the first time. Proper training and planning are examples of how this conserves money and time by avoiding the additional costs of failure.
Price of conformance (POC)
34
Where in the network should public web servers be located?
The screened subnet (DMZ)
35
When a computer program sends data as input to another database program operated by someone else, with or without their permission
SQL injection
36
The process of driving through a neighborhood with technical tools to detect insecure wireless access points
War driving
37
A type of audit used to evaluate the process method by measuring the inputs, sequence of activities, and output to determine whether the process method meets the published requirements (specifications)
Process audit
38
The boundaries and limitations of the individual audit. Normally, this indicates particular systems or functions that will be reviewed during the audit.
Audit scope
39
This attack targets an individual server, user, database, or network device.
Spear-phishing
40
Software that is readily available via nonproprietary programming methods in its design. The recipient will receive the human-readable source code with the ability to make any internal changes they desire.
Open system
41
What does the acronym IDS stand for?
Intrusion detection system (IDS)
42
Eavesdropping and other covert techniques used to collect information
Passive attack
43
What is cryptography?
The process of either hiding information from other people or authenticating valid users. It's an area of high interest to governments, businesses, and individuals.
44
What it's called when an online vendor provides the use of commercial software through subscription
Software as a Service (SaaS)
45
A planned method of testing and tracking minor software updates prior to implementing them into production. The cost of separate testing can be justified by using the price of failure (price of nonconformance).
Patch management
46
Kerberos is an example of what?
Single sign-on (SSO)
47
A public record of a unique design or function to which the author or inventor is granted exclusive rights for a limited period of time. The entire design and complete method of building a working copy must be fully disclosed to the public.
Patent
48
What is the difference between a virus and a worm?
Typically, worms are malicious programs that operate independently exploiting authentication holes between systems. Viruses attach to programs or files and travel when the host file is transferred.
49
What is the most important first step in understanding the auditee's IT infrastructure?
A network diagram with complete documentation of the existing systems
50
The first person to arrive on the scene during an emergency, regardless of training or experience. Even a four-year-old child calling 911 for help will direct the emergency response activities until relieved by a more qualified person.
Incident commander (IC)
51
A process of ranking information based on its value or requirements for secrecy
Data classification
52
The selection of projects based on the principles of "highest and best use" of available resources for generating the best return on investment (ROI). This is similar to trading stock investments or baseball cards to improve the overall value of the collection.
Portfolio management
53
What type of control specifies policies and guidelines for hiring, promotion, termination, data backup, and audits?
Administrative control
54
The process of manually verifying that records match
Manual reconciliation
55
An individual with a significant amount of direct experience, or special training with direct experience, and the ability to deduce a correct conclusion when everyone else would form an incorrect conclusion
Expert
56
A hardware or software device that is watching the communications traffic flowing across the network to other systems
Network-based device
57
A newer security protocol used in wireless networks with automatic encryption-key generation and authentication
Extensible Authentication Protocol (EAP) in IEEE 802.11i Robust Security Networks
58
The likelihood that an unfortunate event will occur and cause a loss to assets
Risk
59
Information in the computer's working memory (RAM) that will be lost when the power is shut off
Volatile data
60
A message that is completely readable to a human
Clear text
61
Discipline of following forthright and honest conduct without impropriety, deceit, or conflicting agenda
Ethics
62
The timely disclosure of information relevant to the situation. In computer systems, this also refers to the time window in which data is available before being lost or overwritten during normal processing.
Evidence timing
63
An old diagnostic protocol that allows the sender to specify the communications path to be used in spite of the network router settings configured by the network administrator. Can circumvent firewalls and should be disabled on network devices.
Source routing
64
This term describes the application of a procedure or method, hopefully in support of an organizational objective.
Tactical
65
The process of physically marking insecure wireless access points to the Internet
War chalking
66
Anything of value. May be tangible or intangible in the form of money, physical goods, products, resources, recipes, or procedures.
Asset
67
Duplicate or redundant components operating in parallel
Mirrored
68
A test to evaluate performance against a known workload or industry-accepted standard
Benchmarking
69
These are software programs, interfaces, and utilities that operate invisibly between users to form a workflow connecting their data.
Middleware
70
How can you justify the costs involved for quality?
By comparing cost savings to the added costs of failure (price of nonconformance)
71
What is the certificate revocation list (CRL)?
A list of revoked and expired certificates issued by the certificate authority (CA)
72
This occurs in biometrics when the system is calibrated to favor either speed or increased accuracy.
Crossover error rate (CER)
73
System or resource being available for users whenever they care to use it
Uptime
74
The individual charged with protecting data from a loss of availability, loss of integrity, or loss of confidentiality
Data custodian
75
A special template of biometric data converted into a count of specific characteristics that are unique to each user
Minutiae
76
This is designed using application of encryption and/or digital certificates to enforce licensing of electronic files (music, movies, e-books, and so forth).
Digital rights management (DRM)
77
A database designed so that knowledge of the format and structure of data is not required. Very flexible and may be quite complex.
Object-oriented database (OODB)
78
Scanning of hand geometry and fingerprint readers are examples of what type of authentication?
Biometric authentication
79
This principle ensures that the user will not make a false denial of participating in a transaction.
Nonrepudiation
80
An audit conducted by a person who is not related to the auditee. This audit represents a high value of assurance that can be used for external purposes, including regulatory licensing.
Independent audit
81
Adjusting the sensitivity of a biometric system to use a 50/50 compromise of false acceptance and false rejection
Equal error rate (EER)
82
A unique entry into a database record that is required for the record to be valid
Primary key
83
Name of the entire process for ensuring proper safeguards and control with the goal of providing complete integrity
Records management
84
A formal specification of rules for interfaces and procedures used in communication
Protocol
85
A technique used by antivirus software to replace the original end-of-file (EOF) marker with a new EOF marker generated by the antivirus program. Anything attempting to attach itself to the new EOF marker indicates a virus attack.
Inoculation, or immunization
86
This programming technique allows one program, such as a shopping cart, to drive another website. It's used by 98 percent of e-commerce on the Internet.
Cross-site scripting (XSS)
87
Unique data used as a randomizer in encryption algorithms. This cryptovariable must be kept secret from all other users in order to protect the confidentiality of encrypted files.
Private key
88
An internal processing environment for running a program inside another program session. It partitions resources to create a secure environment to protect the rest of the computer system from harm.
Virtual machine
89
A malicious file that usually attaches itself to other programs with the purpose of spreading infection through program execution or through transportation by using email
Virus
90
New employees are being hired into positions that require a high degree of trust. What administrative control should be performed as part of a security policy?
Background checks and possibly fidelity bonding
91
Used in business continuity and disaster recovery planning to identify potential violations that must be avoided or that require special handling to minimize penalties
Legal deadline (LD)
92
Low voltage for an extended period of time
Brownout
93
A new generation of software or a design change resulting in a new version. Releases tend to occur in 12- to 24-month intervals.
Major software release
94
The culmination of software, hardware, procedures, and data files that will permit timely recovery from a failure or disaster
Backup and restore capability
95
Term for application software hosted by remote vendors across the Internet to subscribers, where details of security are not actually known to be verifiable fact
Cloud computing
96
An advanced software development tool used for writing programs. It provides built-in functions for capturing the software design, commands, and macros for creating program code and debug testing.
Integrated development environment (IDE)
97
Evidence that can be reassembled in chronological order to retrace a transaction or series of transactions
Audit trail
98
A physical distance between two doorways that is designed to trap an unauthorized individual between the closed doors. Fully caged turnstiles can provide a similar means to capture potential intruders.
Mantrap
99
When data is properly ranked somewhere within a protection scheme
Classified
100
A review of the system after it is placed in operation to determine whether it fulfilled its original objectives. New objectives may be identified that require the system to be modified to attain compliance with the new requirements.
Postimplementation review
101
The longest period of downtime that an organization can survive from a specific outage involving a system, process, or resource
Maximum acceptable outage (MAO)
102
List four items that are vital to recovering from a disaster.
Offsite data backup, copy of vital records, an alternative work location (hot site, warm site, or cold site), and the disaster recovery plan
103
When a hacker is running a remote-controlled network composed of computers owned by unsuspecting users
Bot-net (aka roBOT-NETwork)
104
A small corrective update issued by the software developer to fix problems found in a major version previously released
Patch, also known as a minor software update
105
A family classification of computer software designed to intentionally cause malicious damage
Malicious software, also known as malware
106
An overlay setting used to parse the IP address into two distinct portions that represent the unique network address and the unique host address. Without this setting, the computer will be confused and unable to communicate on the network.
Netmask
107
What is the special acquisition device used to create unique minutia data representing an individual user?
Biometric template sensor
108
A mandatory set of steps used as a cookbook recipe for a desired result. Provides the day-to-day low-level execution necessary to support a standard.
Procedure
109
What is the name for programmed rules inside the database used to evaluate data by sorting for possible correlations?
Heuristics
110
Used to designate a prorated dollar amount or weight of effectiveness to an entire subject population
Variable sampling
111
This compares the user's minutia data against their reference sample stored in the encrypted database.
Biometric template matcher
112
Automated software discovery of all the active hosts on a network
Host enumeration
113
A project management technique used to determine the critical path and to forecast the time and resources necessary to complete a project
Program Evaluation Review Technique (PERT)
114
Lack of awareness or absence of knowledge. The fastest way to be convicted for violating a law or other obligation.
Ignorance
115
What is the difference between IPsec transport mode and tunnel mode?
Tunnel mode hides the internal network's IP address information and payload by using encryption. Transport hides only the data portion of the IP packet by using the encapsulated security payload (ESP) with encryption.
116
A combination of using in-house work and of outsourcing selected processes
Hybrid sourcing
117
Unbiased honesty by a person dealing with other people or in the records of transactions
Integrity
118
An individual pretends to be a person of authority and pulls rank to intimidate a user into giving up their username and password for network access. What type of attack is this representative of?
Social engineering
119
Eliminating the opportunity for a person to reject or renounce their participation
Nonrepudiation
120
A high-level statement by management specifying an objective with mandatory compliance for all persons of lower authority
Policy
121
Persistent data retained on the hard disk and other storage media after system shutdown
Nonvolatile data
122
A database of information derived from the knowledge of individuals who perform the related tasks. Used in decision support systems.
Knowledge base
123
An administrative grouping of program objects with similar attributes or related behavior. Similar to the classification of insects by their shared attributes.
Object class
124
A method of access control based on job role and required tasks
Nondiscretionary access control
125
A small downloaded program using ActiveX, Java, XML, or a similar programming language
Applet
126
A committee that consists of business executives for the purpose of conveying current business priorities and objectives to IT management. The committee provides governance for major projects and the IT budget.
IT steering committee
127
A decision based on current conditions, which, when met, dictate starting the disaster recovery or business continuity plans. Any delay or failure to do so would indicate negligence.
Activation
128
The inherent potential for harm in the business or industry itself, as the organization attempts to fulfill its objectives
Business risk
129
A large-scale, traditional, multiuser, multiprocessor system designed with excellent internal controls
Mainframe computer
130
A specification of physical characteristics, electrical signals, formats, and procedures used to communicate between systems
Interface
131
Refers to the auditor not being related to the audit subject. The desire is for the auditor to be objective and free of conflict because they are not related to the audit subject.
Auditor independence
132
A symmetric-key (preshared key) encryption protocol originally designed to promote wireless security. Because of poor design, the radio beacon advertises the entire encryption key to any listening device.
Wired Equivalent Privacy (WEP)
133
Public-key cryptography is also known as what?
Asymmetric cryptography
134
An overt attack against the system or system data files
Active attack
135
A declaration or activity designed to instill confidence. Also known as a promise with evidence.
Assurance
136
Which type of network firewall is usually the simplest to configure but has the worst logging capabilities?
A packet-filtering network firewall (generation 1)
137
A device used in forensic investigations to prevent any changes to the original data on the hard disk or media during bitstream imaging
Write blocker
138
Is it possible to implement nonrepudiation with symmetric/secret keys?
No. The same key is used at both ends without a way to tell who executed the transaction.
139
A temporary and uniquely generated encryption key used for a short period of time
Temporal key
140
Which access control model grants a user a predetermined level of access based on the role the user holds in the organization?
Role-based access control (RBAC) model
141
An effective speed metric for processing a complete set of specific transactions
Throughput
142
What is another term for a screened subnet?
Demilitarized zone (DMZ)
143
Firewalls should always be configured to prevent the downloading of this type of program
ActiveX
144
A malicious, self-replicating computer program that spreads itself through the system as infected computer programs are executed
Virus
145
Special handling for information crossing a political border. Risks include legality of the information, differences in legal requirements, and extra protection necessary to prevent unauthorized disclosure.
Transborder data communication
146
Any disruptive event, especially those that may cause harm
Incident
147
A system development technique used to create initial versions of software functionality. Focused on proving a method or gaining early user acceptance, usually without any internal controls.
Prototype
148
The person(s) performing the audit by gathering evidence, testing, and reporting the findings. This person should not be related to the subject of the audit, to prevent bias.
Auditor
149
What is it called when information contained in two or more data tables is valid across the links inside the database?
Referential integrity