IS 413 Exam
Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve
Access to a high level of expertise
Brian notices an attack taking place on his network. When he digs deeper, he realizes that the attacker has a physical presence on the local network and is forging Media Access Control (MAC) addresses. Which type of attack is most likely taking place?
Address Resolution protocol poisoning
What is not a good practice for developing strong professional ethics
Assume that information should be free
During which phase of the access control process does the system answer the question. "What can the requestor access?"
Authorization
In an accreditation process, who has the authority to approve a system for implementation
Authorizing official
The Children's Online Privacy Protection Act restricts the collection of the information online form children. What is the cut off age for COPPA regulation
13
The most critical aspect of WAN services contract is how the service provider supplies troubleshooting network management and security services
True
Organizations should seek a balance between the utility and cost of various risk management options
True.
Which control is NOT an example of a fault tolerance technique designed to avoid interruptions that would cause downtime
Warm site
Holly would like to run an annual major disaster recovery test that is an thorough and realistic as possible. She also wants to ensure that there is no disruption of activity at the primary site. What option is best in this scenario?
Parallel test
Tony is working with a law enforcement agency to place a wiretap pursuant to a legitimate court order. The wiretap will monitor communications without making any modifications. What type of wiretap is Tony placing?
Passive wiretap
Which one of the following is NOT an advantage of biometric systems
Physical characteristics may change
The term risk management describes the process of identifying, assessing, prioritizing, and addressing risk
Rue
Gina is preparing to monitor network activity using packet sniffing. Which technology is most likely to interfere with this effort if used on the network
Secure Sockets Lawyer
The _______ is the central part of a computing environments hardware, software, and firmware that enforces access control
Security Kernel
Biyu is making arrangements to use a third-party service provider for security services. She wants to document a requirement for timely notification of security breaches. What type of agreement is most likely to contain formal requirements of this type
Service level agreement
Gwen is investigating an attack. An intruder managed to take over the identity of a user who was legitimately logged into Gwen's company's website by manipulating Hypertext Transfer Protocol (HTTP) headers. Which type of attack likely took place?
Session hijacking
Which element of the IT security policy framework provides detailed written definitions for hardware and software and how they are to be used
Standard
Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is not normally used to make these type of classification decisions
Threat
Which term describes an action that can damage or compromise an asset
Threat
A Chinese wall security policy defines a barrier and develops a set of rules that make sure no subject gets to object on the other side '
True
A birthday attack is a type of cryptographic attack that is sued to make brute force attack of one way hashes easier
True
Forensics and incident response are examples of ______________ controls
Corrective
A successful denial of service attack may create so much network congestion that authorized users cannot access network resources
True
A trusted operating system provides features that satisfy specific government requirements for security
True
Access Control list are used to permit and deny traffic in an IP router
True
An alteration threat violates information integrity
True
An example of a threat to access control is a peer-to-peer arrangement in which users share their My documents folder with each other by accident
True
Any component that, if it fails, could interrupt business processing is called a single point of failure
True
Application service providers are software companies that build applications hosted in the cloud and on the intenret
True
Authorization is the process of granting rights to use an organizations IT asset, systems, applications, and data to a specific user
True
Backdoor programs are typically more dangerous that computer viruses
True
Because people inside an organization generally have more detailed knowledge of the IT infrastructure than outsiders do, they can place logic bombs more easily
True
Cars that wifi access and onboard computers require software patches and upgrades from the manufacturer
True
Common methods used to identify a user to a system included username, smart card, and biometrics
True
Defense in depth is the practice of layering defenses to increase overall security and provide more reaction time to respond to incidents.
True
During the planning and execution phases of an audit, an auditor will most likely review risk analysis output
True
Retro viruses counter the ability of antivirus programs to detect changes in infected files
False
Store and forward communications should be used when you need to talk to someone immediately
False
The first step in creating a comprehensive disaster recovery plan is to document likely impact scenarios
False
The term risk methodology refers to a list of identified risks that results from the risk-identification process.
False
Examples of major disruptions include extremed weather, application failure, and criminal activity
True
IOT technology has a significant impact on developing economies, given that it can transform countries into e-commerce ready nations
True
In Security testing data collection, observation is the input used to differentiate between paper procedures and the way the job is really done
True
Which of the following governs the use of the internet of things by health care providers such as physicians and hospitals
Health insurance Portability and accountability act
With the use of Mobile IP which device is responsible for keeping track of mobile nodes and forwarding packet to the MN current network
Home agent
Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she block?
ICMP
Which one of the following is not a good technique for performing authentication of an end user
Identification number
It is common for rootlets to modify parts of the operating system to conceal traces of their presence
True
Networks routers, and equipment require continuous monitoring and management to keep wide are network (WAN) service available
True
Organizations should start defining their IT Security policy framework by defining an asset classification policy
True
Performing security testing includes vulnerability testing and penetration testing
True
Which activity manages the baseline settings for a system or device
configuration control
Which password attack is typically used specifically against password files that contain cryptographic hashes?
Birthday attacks
In Mobile IP, what term describes a device that would like to communicate with a mobile node
Correspondent node
Which risk is most effectively mitigated by an upstream internet service provider
DDOS
An ______ is an event that prevents critical business function (CBF) from operation for a period great than the maximum tolerable downtime
Disaster
What is a key principle of risk management programs
Don't spend more to protect an asset than it is worth
Which one of the following is an example of a direct cost that might result from a business disruption
Facility repair
A hardware configuration chart should not include copies of software configurations
False
Certification is the formal agreement by an authorizing official to accept the risk of implementing a system
False
Continuity of critical business functions and operations is the first priority in a well-balanced business continuity plan
False
During the secure phase of security review, you review and measure all controls to capture actions and changes on the system
False
Procedures do not reduce mistakes in a crisis
False
Regarding the Internet of Things, a business involved in utilities, critical infrastructure or environmental services can benefit fro traffic monitoring applications
False
Spam is some act intended to deceive or trick the receiver normally in email messages
False
What compliance regulation applies specifically to the educational records maintained by schools about student
Family Education Rights and Privacy Act
What is not a common motivation for attackers
Fear
Which one of the following is Not a market driver for the Internet of things
Global adoption of non-IP networking
What is a single sign-on approach that relies upon the use of key distribution centers and ticket-granting servers
Kerberos
Which of the following would not be considered in the scope of organizational compliance efforts
Laws
When should an organization managers have an opportunity to respond to the findings in an audit
Managers should include their responses to the draft audit report in the final audit report
What level of technology infrastructure should you expect to find in a cold site alternative data center facility
No technology infrastructure
Maria's company recently experienced a major system outage due to the failure of a critical component. During that time period, the company did not register any sales through its online site. Which type of loss did the company experience as a result of lost sales?
Opportunity cost
Which of the following does not offer authentication, authorization, and accounting services?
Redundant Array of Independent disk
What type of malicious software allows an attacker to remotely control a compromised computer
Remote Access Tool
Which activity is an auditor least likely to conduct during the information gathering phase of an audit
Report writing
What term describes the risk that exist after an organization has performed all planned countermeasures and controls
Residual risk
Which formula is typically used to describe the components of information security risk
Risk = Threat X Vulnerability
HTTP encrypts data transfers between secure browsers and secure web pages
false
The anti-malware utility is one of the most popular backdoor tools in use today
false
Alan is evaluation different biometric systems and is concerned that users might now want to subject themselves to retinal scans to privacy concerns. Which characteristic of a biometric system is he considering
Acceptability
Users throughout Alison's organization have been receiving unwanted commercial messages over the organization's instant messaging program. What type of attack is taking place?
Spim
Which audit data collection method helps ensure that the information-gathering process covers all relevant areas?
Checklist