Untitled Quiz
52 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that

  • determine the risk of a business interruption occurring
  • determine the technological dependence of the business processes
  • Identify the financial impacts of a business interruption (correct)
  • Identify the operational impacts of a business interruption
  • Which of the following actions will reduce risk to a laptop before traveling to a high-risk area?

  • Change access codes
  • Implement more stringent baseline configurations
  • Purge or re-image the hard disk drive (correct)
  • Examine the device for physical tampering
  • A company whose Information Technology (IT) services are being delivered from a Tier 4 data centre, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?

  • Storage
  • Network (correct)
  • Power
  • Application
  • Which of the following represents the GREATEST risk to data confidentiality?

    <p>Backup tapes are generated unencrypted</p> Signup and view all the answers

    What is the MOST important consideration from a data security perspective when an organization plans to relocate?

    <p>Conduct a gap analysis of a new facilities against existing security requirements</p> Signup and view all the answers

    International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

    <p>Only when assets are clearly defined</p> Signup and view all the answers

    Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?

    <p>Supply a duress alarm for personnel exposed to the public</p> Signup and view all the answers

    Which of the following is MOST important when assigning ownership of an asset to a department?

    <p>Individual accountability should be ensured</p> Signup and view all the answers

    Which one of the following affects the classification of data?

    <p>Assigned security label</p> Signup and view all the answers

    An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth. The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations and has a backlog of account management requests. Which contract is BEST in offloading the task from the IT staff?

    <p>Software as a Service (SaaS)</p> Signup and view all the answers

    In a data classification scheme, the data is owned by the

    <p>business managers</p> Signup and view all the answers

    Which of the following is an initial consideration when developing an information security management system?

    <p>Understand the value of the information assets</p> Signup and view all the answers

    Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?

    <p>Hashing the data before encryption</p> Signup and view all the answers

    Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?

    <p>Common Vulnerability Scoring System (CVSS)</p> Signup and view all the answers

    Who in the organization is accountable for classification of data information assets?

    <p>Data owner</p> Signup and view all the answers

    The use of private and public encryption keys is fundamental in the implementation of which of the following?

    <p>Secure Sockets Layer (SSL)</p> Signup and view all the answers

    At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?

    <p>Physical layer</p> Signup and view all the answers

    In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?

    <p>Transport layer</p> Signup and view all the answers

    Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?

    <p>Link Control Protocol (LCP)</p> Signup and view all the answers

    Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

    <p>Packet filtering</p> Signup and view all the answers

    An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?

    <p>Add a new rule to the application layer firewall</p> Signup and view all the answers

    Which of the following is the BEST network defence against unknown types of attacks or stealth attacks in progress?

    <p>Intrusion Prevention Systems (IPS)</p> Signup and view all the answers

    Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

    <p>WEP uses a small range Initialization Vector (IV)</p> Signup and view all the answers

    An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?

    <p>Implement logical network segmentation at the switches</p> Signup and view all the answers

    Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual employee’s salary?

    <p>Implement Role Based Access Control (RBAC)</p> Signup and view all the answers

    Which one of the following transmission media is MOST effective in preventing data interception?

    <p>Fiber optic</p> Signup and view all the answers

    Which security action should be taken FIRST when computer personnel are terminated from their jobs?

    <p>Remove their computer access</p> Signup and view all the answers

    The type of authorized interactions a subject can have with an object is

    <p>control</p> Signup and view all the answers

    Why MUST a Kerberos server be well protected from unauthorized access?

    <p>It contains the keys of all clients.</p> Signup and view all the answers

    Which one of the following effectively obscures network addresses from external exposure when implemented on a firewall or router?

    <p>Network Address Translation (NAT)</p> Signup and view all the answers

    While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?

    <p>Social engineering</p> Signup and view all the answers

    Why must all users be positively identified prior to using multi-user computers?

    <p>To ensure that unauthorized persons cannot access the computers</p> Signup and view all the answers

    An advantage of link encryption in a communications network is that it

    <p>protects data from start to finish through the entire network.</p> Signup and view all the answers

    What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?

    <p>Spoofing</p> Signup and view all the answers

    The PRIMARY purpose of a security awareness program is to

    <p>ensure that everyone understands the organization's policies and procedures.</p> Signup and view all the answers

    The process of mutual authentication involves a computer system authenticating a user and authenticating the

    <p>computer system to the user.</p> Signup and view all the answers

    The FIRST step in building a firewall is to

    <p>perform a risk analysis to identify issues to be addressed.</p> Signup and view all the answers

    A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected?

    <p>Trojan horse</p> Signup and view all the answers

    An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?

    <p>Insufficient Service Level Agreement (SLa)</p> Signup and view all the answers

    Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?

    <p>Parallel</p> Signup and view all the answers

    What is the PRIMARY reason for implementing change management?

    <p>Ensure accountability for changes to the environment</p> Signup and view all the answers

    What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?

    <p>Turn off the computer</p> Signup and view all the answers

    What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?

    <p>Ensure chain of custody</p> Signup and view all the answers

    A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?

    <p>Minimization of the need decision making during a crisis</p> Signup and view all the answers

    What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?

    <p>Warm site</p> Signup and view all the answers

    Which of the following is the PRIMARY risk with using open-source software in a commercial software construction?

    <p>License agreements requiring release of modified code</p> Signup and view all the answers

    When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?

    <p>After the system preliminary design has been developed and the data security categorization has been performed</p> Signup and view all the answers

    Which of the following is the BEST method to prevent malware from being introduced into a production environment?

    <p>Test all new software in a segregated environment</p> Signup and view all the answers

    Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?

    <p>Data tokenization</p> Signup and view all the answers

    What is the MOST effective countermeasure to a malicious code attack against a mobile system?

    <p>Sandbox</p> Signup and view all the answers

    Which of the following is ensured when hashing files during chain of custody handling?

    <p>Integrity</p> Signup and view all the answers

    Which of the following statements is TRUE of black box testing?

    <p>Only the functional specifications are known to the test planner.</p> Signup and view all the answers

    Study Notes

    No Topic Provided

    • Insufficient information to generate study notes. Please provide the text or questions.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    More Like This

    Untitled Quiz
    37 questions

    Untitled Quiz

    WellReceivedSquirrel7948 avatar
    WellReceivedSquirrel7948
    Untitled Quiz
    18 questions

    Untitled Quiz

    RighteousIguana avatar
    RighteousIguana
    Untitled Quiz
    50 questions

    Untitled Quiz

    JoyousSulfur avatar
    JoyousSulfur
    Untitled Quiz
    48 questions

    Untitled Quiz

    StraightforwardStatueOfLiberty avatar
    StraightforwardStatueOfLiberty
    Use Quizgecko on...
    Browser
    Browser