webqq Flashcards
Which of the following is NOT a factor related to Access Control? A. integrity B. authenticity C. confidentiality D. availability
Correct Answer: B
Authenticity is not a factor related to Access Control.
Access controls are security features that control how users and systems communicate and interact with other systems and resources.
Access controls give organization the ability to control, restrict, monitor, and protect resource availability, integrity and confidentiality.
Incorrect Answers:
A: Integrity is a factor related to Access Control.
C: Confidentiality is a factor related to Access Control.
D: Availability is a factor related to Access Control.
References:
https://en.wikibooks.org/wiki/Fundamentals_of_Information_Systems_Security/Access_Control_Systems
Regarding codes of ethics covered within the ISC
CBK, within which of them is the phrase “Discourage unsafe practice” found?
A. Computer Ethics Institute commandments
B. (ISC) Code of Ethics
C. Internet Activities Board’s Ethics and the Internet (RFC1087)
D. CIAC Guidelines
Correct Answer: 2B
The (ISC)
Code of Ethics include the phrase Discourage unsafe practices, and preserve and strengthen the integrity of public infrastructures.
Incorrect Answers:
A: The phrase “Discourage unsafe practice” is not included in the Computer Ethics Institute commandments. It is included in the (ISC)
Code of Ethics.
C: The phrase “Discourage unsafe practice” is not included in RFC1087. It is included in the (ISC)
Code of Ethics.
D: The phrase “Discourage unsafe practice” is not included in CIAC Guidelines. It is included in the (ISC)
Code of Ethics.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 1064
Which of the following statements is not listed within the 4 canons of the (ISC)
Code of Ethics?
A. All information systems security professionals who are certified by (ISC) shall observe all contracts and agreements, express or implied.
B. All information systems security professionals who are certified by (ISC) shall render only those services for which they are fully competent and qualified.
C. All information systems security professionals who are certified by (ISC) shall promote and preserve public trust and confidence in information and systems.
D. All information systems security professionals who are certified by (ISC) shall social consequences of the programs
Correct Answer: D
The social consequences of the programs that are written are not included in the ISC Code of Ethics Canon.
Note: The ISC Code of Ethics Canon includes:
✑ Protect society, the common good, necessary public trust and confidence, and the infrastructure.
✑ Act honorably, honestly, justly, responsibly, and legally.
✑ Provide diligent and competent service to principals.
✑ Advance and protect the profession.
Incorrect Answers:
A: The ISC Code of Ethics Canon states that you should provide diligent and competent service to principals. This means that you should observe all contracts and agreements.
B: The ISC Code of Ethics Canon states that you should provide diligent and competent service to principals. This means that you should render only those services for which you are fully competent and qualified.
C: The ISC Code of Ethics Canon states that you should protect the necessary public trust and the infrastructure/systems.
References:
https://www.isc2.org/ethics/default.aspx?terms=code of ethics
Which of the following is needed for System Accountability?
A. Audit mechanisms.
B. Documented design as laid out in the Common Criteria.
C. Authorization.
D. Formal verification of system design.
Correct Answer: A
Accountability is the ability to identify users and to be able to track user actions. Through the use of audit logs and other tools the user actions are recorded and can be used at a later date to verify what actions were performed.
Incorrect Answers:
B: Common Criteria is an international standard to evaluate trust and would not be a factor in System Accountability.
C: Authorization is granting access to subjects, just because you have authorization does not hold the subject accountable for their actions.
D: Formal verification involves Validating and testing highly trusted systems. It does not, however, involve System Accountability.
References:
, 6th Edition, McGraw-Hill, 2013, pp. 203, 248-250, 402.
The major objective of system configuration management is which of the following? A. System maintenance. B. System stability. C. System operations. D. System tracking.
Correct Answer: B
Configuration Management is defined as the identification, control, accounting, and documentation of all changes that take place to system hardware, software, firmware, supporting documentation, and test results throughout the lifespan of the system.
A system should have baselines set pertaining to the systems hardware, software, and firmware configuration. The configuration baseline will be tried and tested and known to be stable. Modifying the configuration settings of a system could lead to system instability.
System configuration management will help to ensure system stability by ensuring a consistent configuration across the systems.
Incorrect Answers:
A: System configuration management could aid system maintenance. However, this is not a major objective of system configuration management.
C: System configuration management will help to ensure system stability which will help in system operations. However, system operations are not a major objective of system configuration management.
D: System tracking is not an objective of system configuration management.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 4
The Internet Architecture Board (IAB) characterizes which of the following as unethical behavior for Internet users? A. Writing computer viruses. B. Monitoring data traffic. C. Wasting computer resources. D. Concealing unauthorized accesses.
Correct Answer: C
IAB considers wasting resources (people, capacity, and computers) through purposeful actions unethical.
Note: The IAB considers the following acts unethical and unacceptable behavior:
✑ Purposely seeking to gain unauthorized access to Internet resources
✑ Disrupting the intended use of the Internet
✑ Wasting resources (people, capacity, and computers) through purposeful actions
✑ Destroying the integrity of computer-based information
✑ Compromising the privacy of others
✑ Negligence in the conduct of Internet-wide experiments
Incorrect Answers:
A: The IAB list of unethical behavior for Internet users does not include writing computer viruses.
B: IAB does not consider monitoring data traffic unethical.
D: The IAB list of unethical behavior for Internet users does not include concealing unauthorized accesses.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 1076
Which of the following is the best reason for the use of an automated risk analysis tool?
A. Much of the data gathered during the review cannot be reused for subsequent analysis.
B. Automated methodologies require minimal training and knowledge of risk analysis.
C. Most software tools have user interfaces that are easy to use and do not require any training.
D. Information gathering would be minimized and expedited due to the amount of information already built into the tool.
Correct Answer: D
Collecting all the necessary data that needs to be plugged into risk analysis equations and properly interpreting the results can be overwhelming if done manually.
Several automated risk analysis tools on the market can make this task much less painful and, hopefully, more accurate. The gathered data can be reused, greatly reducing the time required to perform subsequent analyses.
The objective of these tools is to reduce the manual effort of these tasks, perform calculations quickly, estimate future expected losses, and determine the effectiveness and benefits of the security countermeasures chosen.
Incorrect Answers:
A: The gathered data can be reused, greatly reducing the time required to perform subsequent analyses.
B: Training and knowledge of risk analysis is still required when using automated risk analysis tools.
C: Training is still required when using automated risk analysis tools even if the user interface is easy to use.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 86
Which of the following is not one of the three goals of Integrity addressed by the Clark-Wilson model?
A. Prevention of the modification of information by unauthorized users.
B. Prevention of the unauthorized or unintentional modification of information by authorized users.
C. Preservation of the internal and external consistency.
D. Prevention of the modification of information by authorized users.
Correct Answer: D
Prevention of the modification of information by authorized users is not one of the three goals of integrity addressed by the Clark-Wilson model.
Clark-Wilson addresses the following three goals of integrity in its model:
✑ Prevent unauthorized users from making modifications
✑ Prevent authorized users from making improper modifications (separation of duties)
✑ Maintain internal and external consistency (well-formed transaction)
The Clark-Wilson model enforces the three goals of integrity by using access triple (subject, software [TP], object), separation of duties, and auditing. This model enforces integrity by using well-formed transactions (through access triple) and separation of duties.
Incorrect Answers:
A: Prevention of the modification of information by unauthorized users is one of the three goals of integrity addressed by the Clark-Wilson model.
B: Prevention of the unauthorized or unintentional modification of information by authorized users is one of the three goals of integrity addressed by the Clark-
Wilson model.
C: Preservation of the internal and external consistency is one of the three goals of integrity addressed by the Clark-Wilson model.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 374
What is called an event or activity that has the potential to cause harm to the information systems or networks? A. Vulnerability B. Threat agent C. Weakness D. Threat
Correct Answer: D
A threat is any potential danger that is associated with the exploitation of a vulnerability. The threat is that someone, or something, will identify a specific vulnerability and use it against the company or individual. The entity that takes advantage of a vulnerability is referred to as a threat agent. A threat agent could be an intruder accessing the network through a port on the firewall, a process accessing data in a way that violates the security policy, a tornado wiping out a facility, or an employee making an unintentional mistake that could expose confidential information.
Incorrect Answers:
A: Vulnerability is what can be exploited by a threat agent. It is not an event or activity that has the potential to cause harm to the information systems or networks.
B: Threat agent is what can exploit a vulnerability. It is not an event or activity that has the potential to cause harm to the information systems or networks.
C: A weakness is another work for vulnerability. It is not an event or activity that has the potential to cause harm to the information systems or networks.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 26
What is called the probability that a threat to an information system will materialize? A. Threat B. Risk C. Vulnerability D. Hole
Correct Answer: B
A risk is the likelihood of a threat agent exploiting a vulnerability and the corresponding business impact. If a firewall has several ports open, there is a higher likelihood that an intruder will use one to access the network in an unauthorized method. If users are not educated on processes and procedures, there is a higher likelihood that an employee will make an unintentional mistake that may destroy data. If an intrusion detection system (IDS) is not implemented on a network, there is a higher likelihood an attack will go unnoticed until it is too late. Risk ties the vulnerability, threat, and likelihood of exploitation to the resulting business impact.
Incorrect Answers:
A: A threat is any potential danger that is associated with the exploitation of a vulnerability.
C: A vulnerability is the absence or weakness of a safeguard that could be exploited.
D: A hole is not the probability that a threat to an information system will materialize.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 26
Which of the following would be best suited to oversee the development of an information security policy? A. System Administrators B. End User C. Security Officers D. Security administrators
Correct Answer: C
The chief security officer (CSO) is responsible for understanding the risks that the company faces and for mitigating these risks to an acceptable level. This role is responsible for understanding the organizations business drivers and for creating and maintaining a security program that facilitates these drivers, along with providing security, compliance with a long list of regulations and laws, and any customer expectations or contractual obligations.
Incorrect Answers:
A: System Administrators work in the IT department and manage the IT infrastructure from a technical perspective. They do not specialize in security and are therefore not best suited to oversee the development of an information security policy.
B: End users are the least qualified to oversee the development of an information security policy.
D: The security administrator is responsible for implementing and maintaining specific security network devices and software in the enterprise. Security administrators are not best suited to oversee the development of an information security policy.
References:
, 6th Edition, McGraw-Hill, New York, 2013, pp. 119-122
Which of the following is the MOST important aspect relating to employee termination?
A. The details of employee have been removed from active payroll files.
B. Company property provided to the employee has been returned.
C. User ID and passwords of the employee have been deleted.
D. The appropriate company staff is notified about the termination.
Correct Answer: D
Because terminations can happen for a variety of reasons, and terminated people have different reactions, companies should have a specific set of procedures to follow with every termination. For example:
The employee must leave the facility immediately under the supervision of a manager or security guard.
✑ The employee must surrender any identification badges or keys, complete an exit interview, and return company supplies.
✑ That users accounts and passwords should be disabled or changed immediately.
It seems harsh and cold when this actually takes place, but too many companies have been hurt by vengeful employees who have lashed out at the company when their positions were revoked for one reason or another. If an employee is disgruntled in any way, or the termination is unfriendly, that employees accounts should be disabled right away, and all passwords on all systems changed.
To ensure that the termination procedures are carried out properly, you need to ensure that the appropriate people (the people who will carry out the procedures) are notified about the termination.
Incorrect Answers:
A: Removing the details of the employee from active payroll files is not the MOST important aspect relating to employee termination.
B: Ensuring company property provided to the employee has been returned should be part of the termination procedure. However, this is not the MOST important aspect relating to employee termination; company security is more important.
C: The user ID and passwords of the employee should be disabled, not deleted. Furthermore, notifying the appropriate staff of the termination will ensure the accounts get disabled.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 129
Making sure that only those who are supposed to access the data can access is which of the following? A. confidentiality B. capability C. integrity D. availability
Correct Answer: A
Confidentiality is the assurance that information is not disclosed to unauthorized individuals, programs, or processes. Some information is more sensitive than other information and requires a higher level of confidentiality. Control mechanisms need to be in place to dictate who can access data and what the subject can do with it once they have accessed it. These activities need to be controlled, audited, and monitored. Examples of information that could be considered confidential are health records, financial account information, criminal records, source code, trade secrets, and military tactical plans. Some security mechanisms that would provide confidentiality are encryption, logical and physical access controls, transmission protocols, database views, and controlled traffic flow.
Incorrect Answers:
B: Capability is the functions that a system or user is able to perform. With reference to a user, it is defined by the access a user is granted. However, making sure that only those who are supposed to access the data can access is best defined by the term confidentiality.
C: Integrity refers to ensuring that the information and systems are the accuracy and reliable and has not been modified by unauthorized entities.
D: Availability refers to ensuring that authorized users have reliable and timeous access to data and resources.
References:
, 6th Edition, McGraw-Hill, New York, 2013, pp. 23, 160, 229-230
Related to information security, availability is the opposite of which of the following? A. delegation B. distribution C. documentation D. destruction
Correct Answer: D
Availability ensures reliability and timely access to data and resources to authorized individuals. Network devices, computers, and applications should provide adequate functionality to perform in a predictable manner with an acceptable level of performance. They should be able to recover from disruptions in a secure and quick fashion so productivity is not negatively affected. Necessary protection mechanisms must be in place to protect against inside and outside threats that could affect the availability and productivity of all business-processing components.
The opposite of availability is destruction. The destruction of data makes it unavailable.
Incorrect Answers:
A: Delegation(委托) is not the opposite of availability.
B: Distribution is not the opposite of availability.
C: Documentation is not the opposite of availability.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 23
Related to information security, the prevention of the intentional or unintentional unauthorized disclosure of contents is which of the following? A. Confidentiality B. Integrity C. Availability D. capability
Correct Answer: A
Confidentiality is the assurance that information is not disclosed to unauthorized individuals, programs, or processes. Some information is more sensitive than other information and requires a higher level of confidentiality.
Confidentiality ensures that the necessary level of secrecy is enforced at each junction of data processing and prevents unauthorized disclosure. This level of confidentiality should prevail while data resides on systems and devices within the network, as it is transmitted, and once it reaches its destination.
Incorrect Answers:
B: Integrity ensures that data is unaltered. This is not what is described in the question.
C: Availability ensures reliability and timely access to data and resources to authorized individuals. This is not what is described in the question.
D: Capability is not the prevention of the intentional or unintentional unauthorized disclosure of contents.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 23
Good security is built on which of the following concept?
A. The concept of a pass-through device that only allows certain traffic in and out.
B. The concept of defense in depth.
C. The concept of preventative controls.
D. The concept of defensive controls.
Correct Answer: B
Defense-in-depth is the coordinated use of multiple security controls in a layered approach. A multilayered defense system minimizes the probability of successful penetration and compromise because an attacker would have to get through several different types of protection mechanisms before she gained access to the critical assets.
Incorrect Answers:
A: Pass-through devices are not the central concept in building good security.
C: Preventative controls are not the central concept in building good security.
D: Defensive Controls is not the central concept in building good security.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 28
If your property Insurance has Replacement Cost Valuation (RCV) clause your damaged property will be compensated:
A. Based on the value of item on the date of loss
B. Based on new, comparable, or identical item for old regardless of condition of lost item
C. Based on value of item one month before the loss
D. Based on the value listed on the Ebay auction web site
Correct Answer: B
The term replacement value refers to the amount that an entity would have to pay to replace an asset at the present time, according to its current worth. The replacement value coverage is designed so the policyholder will not have to spend more money to get a similar new item. For example: when a television is covered by a replacement cost value policy, the cost of a similar television which can be purchased today determines the compensation amount for that item.
Incorrect Answers:
A: The Replacement Cost Value is not the value of the item on the data of loss. The value on the date of loss is called Actual Cash value.
C: The Replacement Cost Value is not the value of the item one month ago. Replacement Cost Valuation is the cost to replace the damaged item.
D: Replacement Cost Valuation has no reference to any value on Ebay. Replacement Cost Valuation is the cost to replace the damaged item.
References:
https://en.wikipedia.org/wiki/Replacement_value
Which of the following is NOT part of user provisioning?
A. Creation and deactivation of user accounts
B. Business process implementation
C. Maintenance and deactivation of user objects and attributes
D. Delegating user administration
Correct Answer: B
User provisioning involves the creation, maintenance, and deactivation of user objects and attributes as they exist in one or more systems, directories, or applications, in response to business processes. Business process implementation is not part of this.
Incorrect Answers:
A: User provisioning involves creating, maintaining, and deactivating accounts as necessary according to business requirements.
C: User provisioning involves the creation, maintenance, and deactivation of user objects and attributes as they exist in one or more systems, directories, or applications, in response to business processes.
D: Delegated user administration is a component of user provisioning software.
References:
, 6th Edition, McGraw-Hill, 2013, p. 179
Which of the following is NOT defined in the Internet Architecture Board (IAB) Ethics and the Internet (RFC 1087) as unacceptable and unethical activity?
A. uses a computer to steal
B. destroys the integrity of computer-based information
C. wastes resources such as people, capacity and computers through such actions
D. involves negligence in the conduct of Internet-wide experiments
Correct Answer: A
Stealing using a computer is not addressed in RFC 1087.
Note: The IAB, through RFC 1087, considers the following acts as unethical and unacceptable behavior:
✑ Purposely seeking to gain unauthorized access to Internet resources
✑ Disrupting the intended use of the Internet
✑ Wasting resources (people, capacity, and computers) through purposeful actions
✑ Destroying the integrity of computer-based information
✑ Compromising the privacy of others
✑ Conducting Internet-wide experiments in a negligent manner
Incorrect Answers:
B: Destroying the integrity of computer-based information is included in RFC 1087.
C: Wasting resources (people, capacity, and computers) through purposeful actions is included in RFC 1087.
D: Conducting Internet-wide experiments in a negligent manner is addressed in RFC 1087.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 1063
Keeping in mind that these are objectives that are provided for information only within the CBK as they only apply to the committee and not to the individuals.
Which of the following statements pertaining to the (ISC)
Code of Ethics is NOT true?
A. All information systems security professionals who are certified by (ISC) recognize that such a certification is a privilege that must be both earned and maintained.
B. All information systems security professionals who are certified by (ISC) shall provide diligent and competent service to principals.
C. All information systems security professionals who are certified by (ISC) shall forbid behavior such as associating or appearing to associate with criminals or criminal behavior.
D. All information systems security professionals who are certified by (ISC) shall promote the understanding and acceptance of prudent information security
Correct Answer: 2C
The ISC Code of Ethics does not explicitly state that an individual who are certified by (ISC) should not associate with criminals or with criminal behavior.
Incorrect Answers:
A: According to the (ISC)
Code Of Ethics all information security professionals who are certified by (ISC) recognize that such certification is a privilege that must be both earned and maintained.
B: The ICS code of Ethics states that you should provide competent service to your employers and clients, and should avoid any conflicts of interest.
D: The ICS code of Ethics states that you should support efforts to promote the understanding and acceptance of prudent information security measures throughout the public, private and academic sectors of our global information society.
References:
https://www.isc2.org/ethics/default.aspx?terms=code of ethics
Which one of these statements about the key elements of a good configuration process is NOT true?
A. Accommodate the reuse of proven standards and best practices
B. Ensure that all requirements remain clear, concise, and valid
C. Control modifications to system hardware in order to prevent resource changes
D. Ensure changes, standards, and requirements are communicated promptly and precisely
Correct Answer: C
Standards are developed to outline proper configuration management processes and approved baseline configuration settings. Systems can be tested against what is laid out in the standards, and systems can be monitored to detect if there are configurations that do not meet the requirements outlined in the standards.
A good configuration process will follow proven standards and best practices. Requirements must remain clear, concise, and valid. Changes, standards, and requirements must be communicated promptly and precisely.
The statement “Control modifications to system hardware in order to prevent resource changes” is not a key element of a good configuration process.
Modifications to system hardware should be controlled by a change control procedure.
Incorrect Answers:
A: Accommodating the reuse of proven standards and best practices is one of the key elements of a good configuration process.
B: Ensuring that all requirements remain clear, concise, and valid is one of the key elements of a good configuration process.
D: Ensuring changes, standards, and requirements are communicated promptly and precisely is one of the key elements of a good configuration process.
Which of the following outlined how senior management are responsible for the computer and information security decisions that they make and what actually took place within their organizations?
A. The Computer Security Act of 1987.
B. The Federal Sentencing Guidelines of 1991.
C. The Economic Espionage Act of 1996.
D. The Computer Fraud and Abuse Act of 1986.
Correct Answer: B
Senior management could be responsible for monetary damages up to $10 million or twice the gain of the offender for nonperformance of due diligence in accordance with the U.S. Federal Sentencing Guidelines of 1991.
Incorrect Answers:
A: The Computer Security Law of 1987 is not addressing senior management responsibility. The purpose is to improve the security and privacy of sensitive information in federal computer systems and to establish a minimum acceptable security practices for such systems.
C: The Economic Espionage Act of 1996 does not address senior management responsibility. Deals with a wide range of issues, including not only industrial espionage, but the insanity defense, the Boys & Girls Clubs of America, requirements for presentence investigation reports, and the United States Sentencing
Commission reports regarding encryption or scrambling technology, and other technical and minor amendments.
D: Computer Fraud and Abuse Act of 1986 concerns acts where computers of the federal government or certain financial institutions are involved. It does not address senior management responsibility.
References:
, 5th Edition, Sybex, Indianapolis, 2011,
p. 548
Related to information security, the guarantee that the message sent is the message received with the assurance that the message was not intentionally or unintentionally altered is an example of which of the following? A. Integrity B. Confidentiality C. Availability D. Identity
Correct Answer: A
Information must be accurate, complete, and protected from unauthorized modification. When a security mechanism provides integrity, it protects data, or a resource, from being altered in an unauthorized fashion. If any type of illegitimate modification does occur, the security mechanism must alert the user or administrator in some manner.
Hashing can be used in emails to guarantee that the message sent is the message received with the assurance that the message was not intentionally or unintentionally altered.
Incorrect Answers:
B: Confidentiality is the assurance that information is not disclosed to unauthorized individuals, programs, or processes. This is not what is described in the question.
C: Availability ensures reliability and timely access to data and resources to authorized individuals. This is not what is described in the question.
D: Identity would be the sender or recipient of the email message. It does not guarantee that the message sent is the message received with the assurance that the message was not intentionally or unintentionally altered.
References:
, 6th Edition, McGraw-Hill, New York, 2013, pp. 23, 159
Which of the following is NOT a technical control?
A. Password and resource management
B. Identification and authentication methods
C. Monitoring for physical intrusion
D. Intrusion Detection Systems
Correct Answer: C
Technical controls, also called logical access control mechanisms, work in software to provide confidentiality, integrity, or availability protection. Some examples are passwords, identification and authentication methods, security devices, auditing, and the configuration of the network.
Physical controls are controls that pertain to controlling individual access into the facility and different departments, locking systems and removing unnecessary floppy or CD-ROM drives, protecting the perimeter of the facility, monitoring for intrusion, and checking environmental controls.
Monitoring for physical intrusion is an example of a physical control, not a technical control.
Incorrect Answers:
A: Password and resource management is an example of a technical control.
B: Identification and authentication methods are an example of a technical control.
D: Intrusion Detection Systems are an example of a technical control.
References:
, 6th Edition, McGraw-Hill, New York, 2013, p. 28