Information Security Controls Quiz
30 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of control is a Computer Incident Response Team (CIRT)?

  • Detection
  • Response (correct)
  • Prevention
  • Protection

What is the primary function of authorization?

  • Verifying user identities
  • Scanning for malware
  • Restricting access to system resources (correct)
  • Monitoring network traffic

What is the goal of containment in an incident response process?

  • To recover from the incident
  • To eradicate the incident
  • To identify the cause of the incident
  • To prevent further damage from the incident (correct)

What is the first step in the attack process used by criminals?

<p>Learn as much as possible about the target and its vulnerabilities (D)</p> Signup and view all the answers

What is the primary function of a demilitarized zone (DMZ)?

<p>To provide a separate network for controlled access to internal systems (A)</p> Signup and view all the answers

What is not a basic step in an incident response process?

<p>Patch management (D)</p> Signup and view all the answers

What is the primary purpose of identifying controls in a risk assessment?

<p>To mitigate or reduce risk (B)</p> Signup and view all the answers

A company is considering implementing two control procedures to deal with a identified threat. What should be the primary consideration in deciding which control to implement?

<p>The cost of implementing the control (B)</p> Signup and view all the answers

What is the type of computer attack that encrypts data and demands payment in exchange for the decryption key?

<p>ransomware (A)</p> Signup and view all the answers

What is the concept of defense-in-depth?

<p>Implementing multiple layers of security controls (B)</p> Signup and view all the answers

What is the term for a computer attack that captures data from information items as it travels over networks?

<p>packet sniffers (A)</p> Signup and view all the answers

What is the primary purpose of continuous monitoring?

<p>To detect security incidents (A)</p> Signup and view all the answers

Which type of computer attack steals contact lists, images, and other data using Bluetooth?

<p>bluesnarfing (C)</p> Signup and view all the answers

What is the purpose of verifying the validity of credit or debit card numbers during an online transaction?

<p>preventive controls (C)</p> Signup and view all the answers

What should be the primary concern of information security?

<p>Protecting confidentiality, integrity, and availability of information resources (C)</p> Signup and view all the answers

What is the primary consideration for a managerial concern in information security?

<p>Security policies and procedures (B)</p> Signup and view all the answers

What is the key principle of the COBIT 5 framework?

<p>ensuring an approach where governance is effectively managed (C)</p> Signup and view all the answers

What is the term for a type of attack that takes place when you leave your phone's Bluetooth setting as discoverable and someone takes control of your phone and connects it to the Internet?

<p>bluebugging (D)</p> Signup and view all the answers

What is the purpose of aligning with other standards at a low level?

<p>To create a comprehensive framework for IT governance and management (C)</p> Signup and view all the answers

What is the primary focus of control activities in COSO's internal control model?

<p>Control activities performed at the management level (C)</p> Signup and view all the answers

What is the structure of the ERM model developed by COSO?

<p>A rigid three-dimensional structure with four fixed management objectives (C)</p> Signup and view all the answers

How does the ERM framework compare to the IC framework?

<p>The ERM framework is more comprehensive than the IC framework (D)</p> Signup and view all the answers

Which type of control is superior to others?

<p>There is no superior type of control (D)</p> Signup and view all the answers

What can assist management in reconciling the conflict between creativity and control?

<p>Implementing a belief system that describes how a company creates value (B)</p> Signup and view all the answers

According to best practices, why should emergency changes be documented?

<p>To maintain a record of changes made (C)</p> Signup and view all the answers

What is the purpose of change controls?

<p>To segregate duties and maintain adequate controls (C)</p> Signup and view all the answers

What is the most effective way for a firewall to protect the perimeter?

<p>All of the above are equally effective (D)</p> Signup and view all the answers

What is the primary risk associated with allowing employees to use personal portable devices to access corporate networks?

<p>Employees may not consider security when using their devices (D)</p> Signup and view all the answers

What is the term for modifying default configurations to turn off unnecessary programs and features to improve security?

<p>Hardening (B)</p> Signup and view all the answers

What is the term for a decoy system used to provide early warning that an insider or outsider is attempting to search for confidential information?

<p>Honeypot (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser