Security Class Midterm Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Ricky is reviewing security logs to independently assess security controls. Which security review process is Ricky engaging in?

Audit

Which activity manages the baseline settings for a system or device?

Configuration Control

Which characteristic of a biometric system measures the system's accuracy using a balance of different error types?

Crossover error rate (CER)

A hardware configuration chart should NOT include copies of software configurations.

False

An attacker uses exploit software when wardialing.

False

Committee of Sponsoring Organizations (COSO) is a set of best practices for IT management.

False

Deterrent controls identify that a threat has landed in your system.

False

Regarding security controls, the four most common permission levels are poor, permissive, prudent, and paranoid.

False

Terminal Access Controller Access Control System Plus (TACACS+) is an authentication server that uses client and user configuration files.

False

The anti-malware utility is one of the most popular backdoor tools in use today.

False

Vishing is a type of wireless network attack.

False

Bob is preparing to dispose of magnetic media and wishes to destroy the data stored on it. Which method is NOT a good approach for destroying data?

Formatting

When should an organization's managers have an opportunity to respond to the findings in an audit?

Managers should include their responses to the draft audit report in the final audit report.

Which group is the most likely target of a social engineering attack?

Receptionists and administrative assistants

Which activity is an auditor least likely to conduct during the information-gathering phase of an audit?

Report writing

The ___________ is the central part of a computing environment's hardware, software, and firmware that enforces access control.

Security Kernel

Isaac is responsible for performing log reviews for his organization in an attempt to identify security issues. He has a massive amount of data to review. What type of tool would best assist him with this work?

Security information and event management (SIEM)

Which one of the following is NOT an example of store-and-forward messaging?

Telephone call

A functional policy declares an organization's management direction for security in such specific functional areas as email, remote access, and Internet surfing.

True

A personnel safety plan should include an escape plan.

True

Fencing and mantraps are examples of physical controls.

True

Fingerprints, palm prints, and retina scans are types of biometrics.

True

In remote journaling, a system writes a log of online transactions to an offsite location.

True

Screen locks are a form of endpoint device security control.

True

The Government Information Security Reform Act (Security Reform Act) of 2000 focuses on management and evaluation of the security of unclassified and national security systems.

True

The Gramm-Leach-Bliley Act (GLBA) addresses information security concerns in the financial industry.

True

The recovery point objective (RPO) can come from the business impact analysis or sometimes from a government mandate, such as banking laws.

True

Florian recently purchased a set of domain names that are similar to those of legitimate websites and used the newly purchased sites to host malware. Which type of attack is Florian using?

Typosquatting

An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Which type of social engineering attack is the attacker using?

Urgency

Which one of the following is the best example of an authorization control?

Access control lists

Brian notices an attack taking place on his network. When he digs deeper, he realizes that the attacker has a physical presence on the local network and is forging Media Access Control (MAC) addresses. Which type of attack is most likely taking place?

Address Resolution Protocol (ARP) poisoning

Ron is the IT director at a medium-sized company and is constantly bombarded by requests from users who want to select customized mobile devices. He decides to allow users to purchase their own devices. Which type of policy should Ron implement to include the requirements and security controls for this arrangement?

BYOD

What information should an auditor share with the client during an exit interview?

Details on major issues

Curtis is conducting an audit of an identity management system. Which question is NOT likely to be in the scope of his audit?

Does the firewall properly block unsolicited network connection attempts?

Configuration changes can be made at any time during a system life cycle and no process is required.

False

During the secure phase of a security review, you review and measure all controls to capture actions and changes on the system.

False

IoT devices cannot share and communicate your IoT device data to other systems and applications without your authorization or knowledge.

False

Jake has been asked to help test the business continuity plan at an offsite location while the system at the main location is shut down. He is participating in a parallel test.

False

Mandatory vacations minimize risk by rotating employees among various systems or duties.

False

Most enterprises are well prepared for a disaster should one occur.

False

The auto industry has not yet implemented the Internet of Things (IoT).

False

The four central components of access control are users, resources, actions, and features.

False

Which organization pursues standards for Internet of Things (IoT) devices and is widely recognized as the authority for creating standards on the Internet?

Internet Engineering Task Force

Which agreement type is typically less formal than other agreements and expresses areas of common interest?

Memorandum of understanding (MOU)

Which one of the following is an example of a reactive disaster recovery control?

Moving to a warm site

Which type of authentication includes smart cards?

Ownership

Which one of the following is an example of a logical access control?

Password

Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?

Payment Card Industry Data Security Standard (PCI DSS)

Which tool can capture the packets transmitted between systems over a network?

Protocol analyzer

Gina is preparing to monitor network activity using packet sniffing. Which technology is most likely to interfere with this effort if used on the network?

Secure Sockets Layer (SSL)

A phishing email is a fake or bogus email intended to trick the recipient into clicking on an embedded URL link or opening an email attachment.

True

Any component that, if it fails, could interrupt business processing is called a single point of failure (SPoF).

True

Application service providers (ASPs) are software companies that build applications hosted in the cloud and on the Internet.

True

Authentication controls include passwords and personal identification numbers (PINs).

True

Social engineering is deceiving or using people to get around security controls.

True

Unified messaging allows you to download both voice and email messages to a smartphone or tablet.

True

In what software development model does activity progress in a lock-step sequential process where no phase begins until the previous phase is complete?

Waterfall

Kim is the risk manager for a large organization. She is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a 1 percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $2 million in damage to the facility, which has a $10 million value. Given this scenario, what is the annualized loss expectancy (ALE)?

20, 000

With the use of Mobile IP, which device is responsible for keeping track of mobile nodes (MNs) and forwarding packets to the MN's current network?

Home agent (HA)

Tom is the IT manager for an organization that experienced a server failure that affected a single business function. What type of plan should guide the organization's recovery effort?

Business continuity plan (BCP)

Which one of the following is an example of a business-to-consumer (B2C) application of the Internet of Things (IoT)?

Health Monitoring

Wardialers are becoming more frequently used given the rise of Voice over IP (VoIP).

False

Betsy recently assumed an information security role for a hospital located in the United States. What compliance regulation applies specifically to health care providers?

HIPAA

What is a single sign-on (SSO) approach that relies upon the use of key distribution centers (KDCs) and ticket-granting servers (TGSs)?

Kerberos

Which of the following does NOT offer authentication, authorization, and accounting (AAA) services?

Redundant Array of Independent Disks (RAID)

What term describes the risk that exists after an organization has performed all planned countermeasures and controls?

Residual Risk

George is the risk manager for a U.S. federal government agency. He is conducting a risk assessment for that agency's IT risk. What methodology is best suited for George's use?

Risk Management Guide for Information Technology Systems (NIST SP800-30)

Purchasing an insurance policy is an example of the ____________ risk management strategy.

Transfer

A dictionary attack works by hashing all the words in a dictionary and then comparing the hashed value with the system password file to discover a match.

True

Standards are used when an organization has selected a solution to fulfill a policy goal.

True


Conjuntos de estudio relacionados

Control of Gene Expression in Prokaryotes

View Set

History of the Church Chapter 13

View Set

Ethos, Logos and Pathos Assessment

View Set

SEAS 8414 LECTURE 1: What is Data Analysis? Why is it Important?

View Set

Legal Aspects of Real Estate Final Exam

View Set

Mejo 341 copyright and trademark

View Set