Security Policy Chapter 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

Ricky is reviewing security logs to independently assess security controls. Which security review process is Ricky engaging in?

Audit

Which audit data collection method helps ensure that the information-gathering process covers all relevant areas?

Checklist

Which regulatory standard would NOT require audits of companies in the United States?

Correct Personal Information Protection and Electronic Documents Act (PIPEDA) (Sarbanes-Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS))

What information should an auditor share with the client during an exit interview?

Details on major issues

Curtis is conducting an audit of an identity management system. Which question is NOT likely to be in the scope of his audit?

Does the firewall properly block unsolicited network connection attempts? (Does the organization have an effective password policy?, Who grants approval for access requests?, Is the password policy uniformly enforced?)

A report indicating that a system's disk is 80 percent full is a good indication that something is wrong with that system.

False

Committee of Sponsoring Organizations (COSO) is a set of best practices for IT management.

False

Regarding log monitoring, false negatives are alerts that seem malicious but are not real security events.

False

The four main types of logs that you need to keep to support security auditing include event, access, user, and security.

False

What is a set of concepts and policies for managing IT infrastructure, development, and operations?

IT Infrastructure Library (ITIL)

Jacob is conducting an audit of the security controls at an organization as an independent reviewer. Which question would NOT be part of his audit?

Is the security control likely to become obsolete in the near future? (Is the level of security control suitable for the risk it addresses?, Is the security control in the right place and working well?, Is the security control effective in addressing the risk it was designed to address?)

Christopher is designing a security policy for his organization. He would like to use an approach that allows a reasonable list of activities but does not allow other activities. Which permission level is he planning to use?

Prudent

Which item is an auditor least likely to review during a system controls audit?

Resumes of system administrators

Emily is the information security director for a large company that handles sensitive personal information. She is hiring an auditor to conduct an assessment demonstrating that her firm is satisfying requirements regarding customer private data. What type of assessment should she request?

SOC 3

Anomaly-based intrusion detection systems compare current activity with stored profiles of normal (expected) activity.

True

Data loss prevention (DLP) uses business rules to classify sensitive information to prevent unauthorized end users from sharing it.

True

In security testing data collection, observation is the input used to differentiate between paper procedures and the way the job is really done.

True

In security testing, reconnaissance involves reviewing a system to learn as much as possible about the organization, its systems, and its networks.

True

Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets in a traffic stream rather than just individual packets.

True

SOC 2 reports are created for internal and other authorized stakeholders and are commonly implemented for service providers, hosted data centers, and managed cloud computing providers.

True


Conjuntos de estudio relacionados

Chapter 9: Ego Strength, Ego Depletion, and anxiety

View Set

vocabulary workshop level h unit 8 choosing the right word

View Set

Chapter 7: Radio, Recording, and Popular Music

View Set

Astronomy Ch. 12 Saturn: Spectacular Rings and Mysterious Moons

View Set

Bio 350: Molecular Genetics - Exam 3

View Set

Chapter 33 Nursing Care of Patients with Upper Gastrointestinal Disorders, Chapter 34. Nursing Care of Patients With Lower Gastrointestinal Disorders

View Set

Lección 8 Contextos: ¿Qué es?

View Set