Untitled Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that

  • determine the risk of a business interruption occurring
  • determine the technological dependence of the business processes
  • Identify the financial impacts of a business interruption (correct)
  • Identify the operational impacts of a business interruption

Which of the following actions will reduce risk to a laptop before traveling to a high-risk area?

  • Change access codes
  • Implement more stringent baseline configurations
  • Purge or re-image the hard disk drive (correct)
  • Examine the device for physical tampering

A company whose Information Technology (IT) services are being delivered from a Tier 4 data centre, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?

  • Storage
  • Network (correct)
  • Power
  • Application

Which of the following represents the GREATEST risk to data confidentiality?

<p>Backup tapes are generated unencrypted (C)</p> Signup and view all the answers

What is the MOST important consideration from a data security perspective when an organization plans to relocate?

<p>Conduct a gap analysis of a new facilities against existing security requirements (A)</p> Signup and view all the answers

International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

<p>Only when assets are clearly defined (A)</p> Signup and view all the answers

Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?

<p>Supply a duress alarm for personnel exposed to the public (D)</p> Signup and view all the answers

Which of the following is MOST important when assigning ownership of an asset to a department?

<p>Individual accountability should be ensured (B)</p> Signup and view all the answers

Which one of the following affects the classification of data?

<p>Assigned security label (A)</p> Signup and view all the answers

An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth. The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations and has a backlog of account management requests. Which contract is BEST in offloading the task from the IT staff?

<p>Software as a Service (SaaS) (D)</p> Signup and view all the answers

In a data classification scheme, the data is owned by the

<p>business managers (A)</p> Signup and view all the answers

Which of the following is an initial consideration when developing an information security management system?

<p>Understand the value of the information assets (A)</p> Signup and view all the answers

Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?

<p>Hashing the data before encryption (A)</p> Signup and view all the answers

Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?

<p>Common Vulnerability Scoring System (CVSS) (D)</p> Signup and view all the answers

Who in the organization is accountable for classification of data information assets?

<p>Data owner (D)</p> Signup and view all the answers

The use of private and public encryption keys is fundamental in the implementation of which of the following?

<p>Secure Sockets Layer (SSL) (A)</p> Signup and view all the answers

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?

<p>Physical layer (C)</p> Signup and view all the answers

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?

<p>Transport layer (B)</p> Signup and view all the answers

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?

<p>Link Control Protocol (LCP) (B)</p> Signup and view all the answers

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

<p>Packet filtering (D)</p> Signup and view all the answers

An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?

<p>Add a new rule to the application layer firewall (D)</p> Signup and view all the answers

Which of the following is the BEST network defence against unknown types of attacks or stealth attacks in progress?

<p>Intrusion Prevention Systems (IPS) (B)</p> Signup and view all the answers

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

<p>WEP uses a small range Initialization Vector (IV) (B)</p> Signup and view all the answers

An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?

<p>Implement logical network segmentation at the switches (A)</p> Signup and view all the answers

Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual employee’s salary?

<p>Implement Role Based Access Control (RBAC) (D)</p> Signup and view all the answers

Which one of the following transmission media is MOST effective in preventing data interception?

<p>Fiber optic (D)</p> Signup and view all the answers

Which security action should be taken FIRST when computer personnel are terminated from their jobs?

<p>Remove their computer access (B)</p> Signup and view all the answers

The type of authorized interactions a subject can have with an object is

<p>control (B)</p> Signup and view all the answers

Why MUST a Kerberos server be well protected from unauthorized access?

<p>It contains the keys of all clients. (A)</p> Signup and view all the answers

Which one of the following effectively obscures network addresses from external exposure when implemented on a firewall or router?

<p>Network Address Translation (NAT) (B)</p> Signup and view all the answers

While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?

<p>Social engineering (D)</p> Signup and view all the answers

Why must all users be positively identified prior to using multi-user computers?

<p>To ensure that unauthorized persons cannot access the computers (A)</p> Signup and view all the answers

An advantage of link encryption in a communications network is that it

<p>protects data from start to finish through the entire network. (D)</p> Signup and view all the answers

What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?

<p>Spoofing (B)</p> Signup and view all the answers

The PRIMARY purpose of a security awareness program is to

<p>ensure that everyone understands the organization's policies and procedures. (D)</p> Signup and view all the answers

The process of mutual authentication involves a computer system authenticating a user and authenticating the

<p>computer system to the user. (D)</p> Signup and view all the answers

The FIRST step in building a firewall is to

<p>perform a risk analysis to identify issues to be addressed. (C)</p> Signup and view all the answers

A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?

<p>Trojan horse (B)</p> Signup and view all the answers

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?

<p>Insufficient Service Level Agreement (SLa) (B)</p> Signup and view all the answers

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?

<p>Parallel (A)</p> Signup and view all the answers

What is the PRIMARY reason for implementing change management?

<p>Ensure accountability for changes to the environment (A)</p> Signup and view all the answers

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?

<p>Turn off the computer (C)</p> Signup and view all the answers

What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?

<p>Ensure chain of custody (D)</p> Signup and view all the answers

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?

<p>Minimization of the need decision making during a crisis (C)</p> Signup and view all the answers

What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?

<p>Warm site (C)</p> Signup and view all the answers

Which of the following is the PRIMARY risk with using open-source software in a commercial software construction?

<p>License agreements requiring release of modified code (A)</p> Signup and view all the answers

When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?

<p>After the system preliminary design has been developed and the data security categorization has been performed (D)</p> Signup and view all the answers

Which of the following is the BEST method to prevent malware from being introduced into a production environment?

<p>Test all new software in a segregated environment (C)</p> Signup and view all the answers

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?

<p>Data tokenization (A)</p> Signup and view all the answers

What is the MOST effective countermeasure to a malicious code attack against a mobile system?

<p>Sandbox (B)</p> Signup and view all the answers

Which of the following is ensured when hashing files during chain of custody handling?

<p>Integrity (A)</p> Signup and view all the answers

Which of the following statements is TRUE of black box testing?

<p>Only the functional specifications are known to the test planner. (A)</p> Signup and view all the answers

Flashcards

Business Impact Analysis (BIA) questionnaire

A questionnaire used to asses the potential impact of business interruption.

Laptop security before travel

Measures to reduce risk to a laptop when traveling to a high-risk area.

Tier 4 data center failure

A major concern in business continuity planning when IT services depend on a high-availability data center.

Data Confidentiality Risk

A major risk to data protection especially when backup tapes are not encrypted.

Signup and view all the flashcards

Relocation Security

Important consideration for data security when relocating facilities.

Signup and view all the flashcards

ISO 27001/27002 Management Responsibilities

Management responsibilities are defined after assets are defined for information protection.

Signup and view all the flashcards

Reactive Control for Personnel

The most cost-effective technology for protecting personnel in public areas.

Signup and view all the flashcards

Asset Ownership Assignment

Ensuring individual accountability of assets to a department.

Signup and view all the flashcards

Data Classification

Data classification is affected by assigned security labels.

Signup and view all the flashcards

Offloading IT Tasks

Choosing the best contract to offload tasks from the IT staff, given a rapidly growing company.

Signup and view all the flashcards

Data Ownership

Data ownership resides with business managers.

Signup and view all the flashcards

Information Security Management System

Initial consideration is understanding the value of information assets.

Signup and view all the flashcards

Encryption Scheme Enhancement

Compressing data before encryption makes it more resistant to known plaintext attacks.

Signup and view all the flashcards

SCAP Vulnerability Severity

The Common Vulnerability Scoring System (CVSS) provides data for estimating vulnerability severity.

Signup and view all the flashcards

Data Classification Accountability

Data owners are accountable for classifying data information assets.

Signup and view all the flashcards

SSL Encryption

SSL uses private and public encryption keys for secure communication.

Signup and view all the flashcards

Data at Rest Layer

Data at rest on a SAN resides at the physical layer of the OSI model.

Signup and view all the flashcards

TCP Connection Negotiation

The Transport Layer in the TCP/IP stack handles connection negotiation.

Signup and view all the flashcards

PPP Packet Formats

Link Control Protocol (LCP) in PPP determines packet formats.

Signup and view all the flashcards

Network Layer Protocol

Packet filtering operates at the network layer of the OSI model.

Signup and view all the flashcards

Application Firewall Rule

Implementing a new rule in the application layer firewall is the optimal solution for handling an input validation vulnerability.

Signup and view all the flashcards

Study Notes

No Topic Provided

  • Insufficient information to generate study notes. Please provide the text or questions.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Untitled Quiz
6 questions

Untitled Quiz

AdoredHealing avatar
AdoredHealing
Untitled Quiz
18 questions

Untitled Quiz

RighteousIguana avatar
RighteousIguana
Untitled Quiz
50 questions

Untitled Quiz

JoyousSulfur avatar
JoyousSulfur
Untitled Quiz
48 questions

Untitled Quiz

StraightforwardStatueOfLiberty avatar
StraightforwardStatueOfLiberty
Use Quizgecko on...
Browser
Browser