Quiz questions
NIST defines a Threat as a
"violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices."
Select all that apply. Which of the following statements about advanced persistent threats (APTs) are true?
APTs typically originate from sources such as organized crime groups, activists or governments, APTs use obfuscation techniques that help them remain undiscovered for months or even years, APTs are often long-term, multi-phase projects with a focus on reconnaissance
What control mechanism defines authentication and authorization protocols for users?
Access controls
Which of the following are considered functional areas of network management as defined by ISO?
Accounting management, Fault management, Performance management, Security management
Responsibilities and/or duties of Governance, Risk Management and Compliance (GRC)
Adherence to required laws and regulations, Implementation of required procedures, Development of internal controls to mitigate risk, Adherence to voluntary contractual requirements.
There key benefits of the DMZ system are
An intruder must penetrate three separate devices, Private network addresses are not disclosed to the Internet, Internal systems do not have direct access to the Internet
Which is associated with identifying digital assets
Asset management
The number and types of layers needed for defense in depth are a function of
Asset value, criticality, reliability of each control and degree of exposure.
In practical applications:
Asymmetric key encryption is used to securely obtain symmetric keys
Where should an organization's network terminate virtual private network (VPN) tunnels?
At the perimeter, to allow for effective internal monitoring
In most information security organizations, which role sets the overall strategic direction
Board of Directors
Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:
Business needs
Maintaining a high degree of confidence regarding the integrity of evidence requires a(n):
Chain of custody
Which three elements of the current threat landscape have provided increased levels of access and connectivity, and therefore increased opportunities for cybercrime
Cloud computing, social media and mobile computing
Which information security component considers the level of sensitivity and legal requirements and is subject to change over time
Confidentiality
A segmented network
Consists of two or more security zones
Which element of an incident response plan involves obtaining and preserving evidence
Containment
Outsourcing poses the greatest risk to an organization when it involves:
Core business functions
Which of the following falls within the scope of risk management
Cyber risk, investment risk and financial risk
The following statement is false:
Cybersecurity includes protection of paper documents
All of the following statements are true:
Cybersecurity is a component of information security, Cybersecurity deals with the protection of digital assets, Cybersecurity should align with enterprise information security objectives
Cybersecurity role that is charged with the duty of managing incidents and remediation?
Cybersecurity management
Which role is generally responsible for the design, implementation, management processes and technical controls within a security organization
Cybersecurity practitioners
To which of the following layers of the Open Systems Interconnect (OSI) model would one map Ethernet?
Data Link
A business continuity plan (BCP) is not complete unless it includes:
Detailed procedures
The Internet perimeter should
Detect and block traffic from infected internal end points, Eliminate threats such as email spam, viruses and worms, Control user traffic bound toward the Internet, Monitor and detect network ports for rogue activity.
Potential consequences of lack of confidentiality
Disclosure of information protected by privacy laws, Legal action against the enterprise, Interference with national security
An interoperability error is what type of vulnerability?
Emergent
The process of converting plaintext messages, applying a mathematical function to them and producing ciphertext messages is called:
Encryption
best states the role of encryption within an overall cybersecurity program
Encryption is an essential but incomplete form of access control
Risk management does not involve
Ensuring information security objectives are achieved
During which phase of the six-phase incident response model is the root cause determined?
Eradication
The degree to which a user or program can create, modify, read, or write to a file is called
File permission
What is one advantage of a firewall implemented in software over a firewall appliance?
Flexibility
Potential consequences of lack of confidentiality except
Fraud
Types of backups
Full, incremental and differential
This key function ensures that organizational objectives and stakeholder needs are aligned with desired outcomes through effective decision making and prioritization.
Governance
A cryptology tool used to prove message integrity using algorithms to create unique numeric values
Hashes
Updates in cloud-computing environments can be rolled out quickly because the environment is:
Homogeneous
Establishment and maintenance of user profiles that define the authentication, authorization and access controls for each user is called
Identity management
Governance involves all of the following except
Implement contractual obligations
Potential consequences of lack of integrity
Inaccuracy, Erroneous decisions, Fraud
Which term describes the overall structure designed to protect an organization from disclosure of information to unauthorized users, improper modification of data, and non-access to systems
Information security
Cybersecurity involves the protection of the following digital assets
Information that is processed, stored or transported within internetworked information systems
Virtual systems should be managed using a dedicated virtual local area network (VLAN) because
Insecure protocols could result in a compromise of privileged user credentials
A week of severe rainstorms has flooded your company's building. All servers have been ruined. It is estimated that business will be down for 3 weeks. This is an example of
Lack of availability
System hardening should implement the principle of
Least privilege or access control
Which type of documentation records details of information or events in an organized record-keeping system, usually sequenced in the order in which they occurred
Log
Methods of control can help protect integrity
Logging, Digital Signatures, Hashes, Encryption
Potential consequences resulting from lack of availability include
Loss of functionality and operational effectiveness, Loss of productive time, Interference with enterprise's objectives
Vulnerability management begins with an understanding of cybersecurity assets and their locations, which can be accomplished by
Maintaining an asset inventory.
Under the US-CERT model for incident categorization, a CAT-3 incident refers to which of the following?
Malicious code
Virtualization involves
Multiple guests coexisting on the same server in isolation of one another
The concept that a message or other piece of information is genuine is called
Nonrepudiation
Which cybersecurity principle is most important when attempting to trace the source of malicious activity?
Nonrepudiation
Risk assessments should be performed
On a regular basis
Which terms describe the overall concept of information security?
Ongoing, Evolving, Systemic
A differential backup
Only copies files that have changed since last full backup
Securing Supervisory Control and Data Acquisition (SCADA) systems can be challenging because they
Operate in specialized environments and often have non-standard design elements
Choose three. Which types of risk are typically associated with mobile devices?
Organizational risk, Technical risk, Physical risk
The attack mechanism directed against a system is commonly called a(n):
Payload
A passive network hub operates at which layer of the OSI model?
Physical
During which phase of the system development lifecycle (SDLC) should security first be considered?
Planning
Put the steps of the penetration testing phase into the correct order
Planning, Discovery, Attack, Reporting
Arrange the steps of the incident response process into the correct order
Preparation, Detection and analysis, Investigation, Mitigation and recovery, Postincident analysis
According to the NIST framework, which of the following are considered key functions necessary for the protection of digital assets?
Protect, Recover, Identify
The primary objective of cybersecurity is
Protecting a company's digital assets
The best definition for cybersecurity?
Protecting information assets by addressing threats to information that is processed, stored or transported by interworked information systems
Integrity is described as
Protection of information from unauthorized modification
Governance involves all of the following
Provide strategic direction, Ensure responsible use of company resources, Evaluate whether risk is managed appropriately
Governance has several goals, including
Providing strategic direction, Ensuring that objectives are achieved, Verifying that organizational resources are being used appropriately, Ascertaining whether risk is being managed properly.
Risk management involves which of the following activities
Recognizing risk, Assessing impact and likelihood of risk, Developing strategies to mitigate risk
The activity that ensures business processes continue after a security incident
Recovery
When two or more controls work in parallel to protect an asset, it is called
Redundancy
Three common controls used to protect the availability of information are
Redundancy, backups and access controls
Describes the activities required to identify the occurrence of a cybersecurity incident
Security continuous monitoring, detection and evaluating anomalies/incidents
Which of the following interpret requirements and apply them to specific situations?
Standards
A firewall that tracks open connection-oriented protocol sessions is said to be:
Stateful
A cybersecurity architecture designed around the concept of a perimeter is said to be:
System-centric
Authentication is defined as
The act of verifying identity, The act of verifying a user's eligibility to access computerized information
Describe authentication
The act of verifying identity, Verification of the correctness of a piece of data, Designed to protect against fraudulent logon activity, Verifying a user's eligibility to access computerized information
Select all that apply. A business impact analysis (BIA) should identify
The estimated probability of the identified threats actually occurring, The efficiency and effectiveness of existing risk mitigation controls, A list of potential vulnerabilities, dangers and/or threats.
Smart devices, BYOD strategies and freely available applications and services are all examples of:
The reorientation of technologies and services designed around the individual end user.
Which two factors are used to calculate the likelihood of an event?
Threat and vulnerability
Nonrepudiation is implemented through which methods
Transactional logs, Digital signatures
Select three. The chain of custody contains information regarding
Who had access to the evidence, in chronological order, Proof that the analysis is based on copies identical to the original evidence, The procedures followed in working with the evidence
Which of the following offers the strongest protection for wireless network traffic?
Wireless Protected Access 2 (WPA2)
Malware
also called malicious code, is software designed to gain access to targeted computer systems, steal information or disrupt computer operations.
Patches
are solutions to software programming and coding errors.
Standards
are used to interpret policies in specific situations.
The path or route used to gain access to the target asset is known as a
attack vector
Policies
communicate required and prohibited activities and behaviors.
Guidelines
contain step-by-step instructions to carry out procedures.
Session layer of the OSI
coordinates and manages user connections
Transport layer of the OSI
ensures that data are transferred reliably in the correct sequence
Identity Management
includes many components such as directory services, authentication and authorization services, and user management capabilities such as provisioning and deprovisioning.
Rootkit
is a class of malware that hides the existence of other malware by modifying the underlying operating system.
A vulnerability
is a weakness in the design, implementation, operation or internal controls in a process that could be exploited to violate the system security
A threat
is anything capable of acting against an asset in a manner that can cause harm.
Cloud computing
is defined as "a model for enabling convenient, on-demand network access to a shared pool of configurable resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management or service provider interaction
A asset
is something of value worth protecting.
In an attack, the container that delivers the exploit to the target is called
payload
Procedures
provide details on how to comply with policies and standards.
The core duty of cybersecurity is to identify, respond and manage
risk to an organization's digital assets.