CIS Midterm
Which risk-analysis value represents the annual probability of a loss?
ARO
Which risk response would be most appropriate if the impact of a risk becoming a reality is negligible?
Accept
What a key principle of risk management programs?
Apply controls in ascending order of risk.
The anti-malware utility is one of the most popular backdoor tools in use today.
False
Which network device is capable of blocking network connections that are identified as potentially malicious?
Intrusion prevention system (IPS)
The System/Application Domain holds all the mission-critical systems, applications, and data.
True
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission from the clients to perform this testing as part of a paid contract. What type of person is Yuri?
White-hat hacker
In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for attempted logon retries.
False
Risk management is responding to a negative event when it occurs.
False
Service-level agreements (SLAs) are optical backbone trunks for private optical backbone networks.
False
Wardialers are becoming more frequently used given the rise of Voice over IP (VoIP).
False
With adequate security controls and defenses, an organization can often reduce its risk to zero.
False
Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would jeopardize confidentiality?
Applying strong encryption
The most critical aspect of a WAN services contract is how the service provider supplies troubleshooting, network management, and security management services.
True
sing a secure logon and authentication process is one of the six steps used to prevent malware.
True
Which of the following statements best describes the relationship of a BCP to a DRP?
A DRP is a component of a BCP.
Simple Network Management Protocol (SNMP) is used for network device monitoring, alarm, and performance
False
Which one of the following is an example of a disclosure threat?
Espionage
A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource.
False
A phishing attack "poisons" a domain name on a domain name server.
False
Cryptography is the process of transforming data from cleartext into ciphertext.
False
Denial of service (DoS) attacks are larger in scope than distributed denial of service (DDoS) attacks.
False
Which element of the security policy framework offers suggestions rather than mandatory actions?
Guideline
Which one of the following is NOT a good technique for performing authentication of an end user?
Identification number
Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
Logic attack
Which element of the security policy framework requires approval from upper management and applies to the entire organization?
Policy
Which type of risk analysis uses relative ranking?
Qualitative risk analysis
Which type of risk analysis uses formulas and numeric values to indicate risk severity?
Quantitative risk analysis
Which formula is typically used to describe the components of information security risks?
Risk = Threat X Vulnerability
According to PMI, which term describes the list of identified risks?
Risk register
What is NOT one of the three tenets of information security?
Safety
In which type of attack does the attacker attempt to take over an existing connection between two systems?
Session hijacking
Which term describes an action that can damage or compromise an asset?
Threat
Which term describes any action that could damage an asset?
Threat
Which risk-response option would best describe purchasing fire insurance?
Transfer
A DoS attack is a coordinated attempt to deny service by occupying a computer to perform large amounts of unnecessary tasks.
True
A man-in-the-middle attack takes advantage of the multihop process used by many types of networks.
True
A phishing email is a fake or bogus email intended to trick the recipient into clicking on an embedded URL link or opening an email attachment.
True
An alteration threat violates information integrity.
True
Encrypting the data within databases and storage devices gives an added layer of security.
True
Which term is used to indicate the amount of data loss that is acceptable?
RPO
Which element of the IT security policy framework provides detailed written definitions for hardware and software and how they are to be used?
Standard
It is faster to create the incremental weekday backups than the differential backups.
True
Organizations should start defining their IT security policy framework by defining an asset classification policy
True
Risk refers to the amount of harm a threat exploiting a vulnerability can cause.
True