IS 413 Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve

Access to a high level of expertise

Brian notices an attack taking place on his network. When he digs deeper, he realizes that the attacker has a physical presence on the local network and is forging Media Access Control (MAC) addresses. Which type of attack is most likely taking place?

Address Resolution protocol poisoning

What is not a good practice for developing strong professional ethics

Assume that information should be free

During which phase of the access control process does the system answer the question. "What can the requestor access?"

Authorization

In an accreditation process, who has the authority to approve a system for implementation

Authorizing official

The Children's Online Privacy Protection Act restricts the collection of the information online form children. What is the cut off age for COPPA regulation

13

The most critical aspect of WAN services contract is how the service provider supplies troubleshooting network management and security services

True

Organizations should seek a balance between the utility and cost of various risk management options

True.

Which control is NOT an example of a fault tolerance technique designed to avoid interruptions that would cause downtime

Warm site

Holly would like to run an annual major disaster recovery test that is an thorough and realistic as possible. She also wants to ensure that there is no disruption of activity at the primary site. What option is best in this scenario?

Parallel test

Tony is working with a law enforcement agency to place a wiretap pursuant to a legitimate court order. The wiretap will monitor communications without making any modifications. What type of wiretap is Tony placing?

Passive wiretap

Which one of the following is NOT an advantage of biometric systems

Physical characteristics may change

The term risk management describes the process of identifying, assessing, prioritizing, and addressing risk

Rue

Gina is preparing to monitor network activity using packet sniffing. Which technology is most likely to interfere with this effort if used on the network

Secure Sockets Lawyer

The _______ is the central part of a computing environments hardware, software, and firmware that enforces access control

Security Kernel

Biyu is making arrangements to use a third-party service provider for security services. She wants to document a requirement for timely notification of security breaches. What type of agreement is most likely to contain formal requirements of this type

Service level agreement

Gwen is investigating an attack. An intruder managed to take over the identity of a user who was legitimately logged into Gwen's company's website by manipulating Hypertext Transfer Protocol (HTTP) headers. Which type of attack likely took place?

Session hijacking

Which element of the IT security policy framework provides detailed written definitions for hardware and software and how they are to be used

Standard

Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is not normally used to make these type of classification decisions

Threat

Which term describes an action that can damage or compromise an asset

Threat

A Chinese wall security policy defines a barrier and develops a set of rules that make sure no subject gets to object on the other side '

True

A birthday attack is a type of cryptographic attack that is sued to make brute force attack of one way hashes easier

True

Forensics and incident response are examples of ______________ controls

Corrective

A successful denial of service attack may create so much network congestion that authorized users cannot access network resources

True

A trusted operating system provides features that satisfy specific government requirements for security

True

Access Control list are used to permit and deny traffic in an IP router

True

An alteration threat violates information integrity

True

An example of a threat to access control is a peer-to-peer arrangement in which users share their My documents folder with each other by accident

True

Any component that, if it fails, could interrupt business processing is called a single point of failure

True

Application service providers are software companies that build applications hosted in the cloud and on the intenret

True

Authorization is the process of granting rights to use an organizations IT asset, systems, applications, and data to a specific user

True

Backdoor programs are typically more dangerous that computer viruses

True

Because people inside an organization generally have more detailed knowledge of the IT infrastructure than outsiders do, they can place logic bombs more easily

True

Cars that wifi access and onboard computers require software patches and upgrades from the manufacturer

True

Common methods used to identify a user to a system included username, smart card, and biometrics

True

Defense in depth is the practice of layering defenses to increase overall security and provide more reaction time to respond to incidents.

True

During the planning and execution phases of an audit, an auditor will most likely review risk analysis output

True

Retro viruses counter the ability of antivirus programs to detect changes in infected files

False

Store and forward communications should be used when you need to talk to someone immediately

False

The first step in creating a comprehensive disaster recovery plan is to document likely impact scenarios

False

The term risk methodology refers to a list of identified risks that results from the risk-identification process.

False

Examples of major disruptions include extremed weather, application failure, and criminal activity

True

IOT technology has a significant impact on developing economies, given that it can transform countries into e-commerce ready nations

True

In Security testing data collection, observation is the input used to differentiate between paper procedures and the way the job is really done

True

Which of the following governs the use of the internet of things by health care providers such as physicians and hospitals

Health insurance Portability and accountability act

With the use of Mobile IP which device is responsible for keeping track of mobile nodes and forwarding packet to the MN current network

Home agent

Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she block?

ICMP

Which one of the following is not a good technique for performing authentication of an end user

Identification number

It is common for rootlets to modify parts of the operating system to conceal traces of their presence

True

Networks routers, and equipment require continuous monitoring and management to keep wide are network (WAN) service available

True

Organizations should start defining their IT Security policy framework by defining an asset classification policy

True

Performing security testing includes vulnerability testing and penetration testing

True

Which activity manages the baseline settings for a system or device

configuration control

Which password attack is typically used specifically against password files that contain cryptographic hashes?

Birthday attacks

In Mobile IP, what term describes a device that would like to communicate with a mobile node

Correspondent node

Which risk is most effectively mitigated by an upstream internet service provider

DDOS

An ______ is an event that prevents critical business function (CBF) from operation for a period great than the maximum tolerable downtime

Disaster

What is a key principle of risk management programs

Don't spend more to protect an asset than it is worth

Which one of the following is an example of a direct cost that might result from a business disruption

Facility repair

A hardware configuration chart should not include copies of software configurations

False

Certification is the formal agreement by an authorizing official to accept the risk of implementing a system

False

Continuity of critical business functions and operations is the first priority in a well-balanced business continuity plan

False

During the secure phase of security review, you review and measure all controls to capture actions and changes on the system

False

Procedures do not reduce mistakes in a crisis

False

Regarding the Internet of Things, a business involved in utilities, critical infrastructure or environmental services can benefit fro traffic monitoring applications

False

Spam is some act intended to deceive or trick the receiver normally in email messages

False

What compliance regulation applies specifically to the educational records maintained by schools about student

Family Education Rights and Privacy Act

What is not a common motivation for attackers

Fear

Which one of the following is Not a market driver for the Internet of things

Global adoption of non-IP networking

What is a single sign-on approach that relies upon the use of key distribution centers and ticket-granting servers

Kerberos

Which of the following would not be considered in the scope of organizational compliance efforts

Laws

When should an organization managers have an opportunity to respond to the findings in an audit

Managers should include their responses to the draft audit report in the final audit report

What level of technology infrastructure should you expect to find in a cold site alternative data center facility

No technology infrastructure

Maria's company recently experienced a major system outage due to the failure of a critical component. During that time period, the company did not register any sales through its online site. Which type of loss did the company experience as a result of lost sales?

Opportunity cost

Which of the following does not offer authentication, authorization, and accounting services?

Redundant Array of Independent disk

What type of malicious software allows an attacker to remotely control a compromised computer

Remote Access Tool

Which activity is an auditor least likely to conduct during the information gathering phase of an audit

Report writing

What term describes the risk that exist after an organization has performed all planned countermeasures and controls

Residual risk

Which formula is typically used to describe the components of information security risk

Risk = Threat X Vulnerability

HTTP encrypts data transfers between secure browsers and secure web pages

false

The anti-malware utility is one of the most popular backdoor tools in use today

false

Alan is evaluation different biometric systems and is concerned that users might now want to subject themselves to retinal scans to privacy concerns. Which characteristic of a biometric system is he considering

Acceptability

Users throughout Alison's organization have been receiving unwanted commercial messages over the organization's instant messaging program. What type of attack is taking place?

Spim

Which audit data collection method helps ensure that the information-gathering process covers all relevant areas?

Checklist


Conjuntos de estudio relacionados

Naturfag kapittel 6: Bølger og trådløs kommunikasjon

View Set

Chapter 54: Management of Patients With Kidney Disorders

View Set

Macro Practice Test 3 + Study Guide

View Set

Polynomial Expressions Unit Test Review

View Set

④ Part 2 テストでマッチング問題 (English Only) 10 points

View Set