Information Security Controls Quiz

WarmPun avatar
WarmPun
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What are the recommended criteria for creating a secure password according to the text?

Long length, uppercase letters, lowercase letters, numbers, and special characters

Which of the following is not recommended for a secure password based on the text?

Using a family member's name

What is an example of a communication control mentioned in the text?

Whitelisting and blacklisting

Which technology is illustrated in Figure 4.3 (a)?

Firewall for home computer

What does public key encryption primarily aim to achieve?

Secure data transmission over networks

Which entity was involved in successful operations against cybercrime according to the text?

European authorities and Encrochat

What factor contributes to vulnerability in information security by mentioning the increasing interconnectedness of business environments?

Today’s interconnected, interdependent, wirelessly networked business environment

Which type of human error poses a significant threat to information systems according to the text?

Opening questionable e-mail

In the context of security threats, which human resources are highlighted as posing significant threats?

Higher level employees with greater access privileges

What type of human error involves being careless with laptops and computing devices according to the text?

Carelessness with laptops and computing devices

Which action is deemed careless and poses a threat according to the text in terms of human errors?

Careless Internet surfing

Which area is identified as posing significant threats due to human errors in information security?

Human resources and Information systems

What is the purpose of physical controls in information security?

To prevent unauthorized individuals from gaining access to a company’s facilities

Which type of site is used as a backup location for business operations during a disaster?

Hot site

What is the main focus of business continuity planning?

Ensuring business operations continue in the event of disruptions

Which of the following is NOT considered an access control mechanism?

Firewall

What does authentication in information security refer to?

Something the user knows

Which of the following is NOT a communication control in information security?

Firewall

Study Notes

Secure Password Criteria

  • A secure password should be long, complex, and unique
  • Avoid using easily guessable information, such as name, birthdate, or common words

Password Recommendations

  • Not recommended: using easily guessable information, such as name, birthdate, or common words

Communication Control

  • Example: firewalls, which control incoming and outgoing network traffic

Encryption Technology

  • Figure 4.3 (a) illustrates asymmetric encryption, also known as public key encryption

Public Key Encryption

  • Primarily aims to achieve secure data transmission over the internet

Cybercrime Operations

  • Entity involved: law enforcement agencies

Information Security Vulnerability

  • Factor contributing to vulnerability: increasing interconnectedness of business environments

Human Error Threats

  • Significant threats to information systems: social engineering attacks and careless behavior
  • Human resources posing significant threats: employees, contractors, and third-party vendors
  • Type of human error: being careless with laptops and computing devices (e.g., losing devices, sharing passwords)
  • Careless action: leaving devices unattended or using unsecured networks

Human Error Areas

  • Area posing significant threats: physical security (e.g., lost or stolen devices)

Physical Controls

  • Purpose: to prevent unauthorized access to physical assets, such as buildings, data centers, and devices

Disaster Recovery

  • Type of site used as a backup location: hot site or cold site
  • Main focus of business continuity planning: ensuring continuous business operations during a disaster or disruption

Access Control

  • Not considered an access control mechanism: encryption

Authentication

  • Refers to verifying the identity of users, devices, or systems

Test your knowledge on information security controls, including physical controls and access controls. Explore topics such as risk analysis, risk mitigation, risk acceptance, and types of auditors and audits.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser