IST 456 Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Under lattice-based access controls, the column of attributes associated with a particular object (such as a printer) is referred to as which of the following? Sensitivity level Access matrix Access control list Capabilities table

Access control list

__________ are a component of the "security triple." Vulnerabilities Threats Assets All of the above

All of the above

Which of the following access control processes confirms the identity of the entity seeking access to a logical or physical area? Authorization Accountability Authentication Identification

Authentication

Creating a blueprint by looking at the paths taken by organizations similar to the one whose plan you are developing is known as which of the following? Benchmarking Best practices Baselining Due diligence

Benchmarking

Problems with benchmarking include all but which of the following? Recommended practices change and evolve, thus past performance is no indicator of future success. Organizations being benchmarked are seldom identical. Organizations don't often share information on successful attacks. Benchmarking doesn't help in determining the desired outcome of the security process.

Benchmarking doesn't help in determining the desired outcome of the security process.

Which security architecture model is based on the premise that higher levels of integrity are more worthy of trust than lower ones? Clark-Wilson Common Criteria Bell-LaPadula Biba

Biba

A primary mailing list for new vulnerabilities, called simply __________, provides time-sensitive coverage of emerging vulnerabilities, documenting how they are exploited, and reporting on how to remediate them. Individuals can register for the flagship mailing list or any one of the entire family of its mailing lists. Bugs Bugtraq Bugfix Buglist

Bugtraq

In the event of an incident or disaster, which planning element is used to guide off-site operations? Incident response Project management Disaster recovery Business continuity

Business continuity

When a disaster renders the current business location unusable, which plan is put into action? Incident response Business impact analysis Business continuity Crisis management

Business continuity

Which of the following is the first component in the contingency planning process? Business continuity training Disaster recovery planning Business impact analysis Incident response planning

Business impact analysis

The __________ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University. US-CERT CM-CERT CERT/CC Bugtraq

CERT/CC

After an incident, but before returning to its normal duties, the CSIRT must do which of the following? Create the incident damage assessment. Conduct an after-action review. Restore data from backups. Restore services and processes in use.

Conduct an after-action review.

In which form of access control is access to a specific set of information contingent on its subject matter? Content-dependent access controls Temporal isolation None of these Constrained user interfaces

Content-dependent access controls

Controls that remedy a circumstance or mitigate damage done during an incident are categorized as which of the following? Preventative Compensating Deterrent Corrective

Corrective

What is the result of subtracting the postcontrol annualized loss expectancy and the ACS from the precontrol annualized loss expectancy? Cost-benefit analysis Exposure factor Annualized rate of occurrence Single loss expectancy

Cost-benefit analysis

Which of the following is a commonly used criteria used to compare and evaluate biometric technologies? Crossover error rate Valid accept rate False reject rate False accept rate

Crossover error rate

Which control category discourages an incipient incident? Compensating Remitting Preventative Deterrent

Deterrent

Strategies to reestablish operations at the primary site after an adverse event threatens continuity of business operations are covered by which of the following plans in the mitigation control approach? Business continuity plan Damage control plan Disaster recovery plan Incident response plan

Disaster recovery plan

What are the legal requirements that an organization adopts a standard based on what a prudent organization should do, and then maintain that standard? Baselining and benchmarking Best practices Due care and due diligence Certification and accreditation

Due care and due diligence

Which of the following InfoSec measurement specifications makes it possible to define success in the security program? Prioritization and selection Development approach Establishing targets Measurements templates

Establishing targets

Which of the following biometric authentication systems is considered to be truly unique, suitable for use, and currently cost-effective? Voice pattern recognition Fingerprint recognition Signature recognition Gait recognition

Fingerprint recognition

Which of the following is the best example of a rapid-onset disaster? Famine Hurricane Environmental degradation Flood

Flood

Which of the following is not a factor critical to the success of an information security performance measurement program? Quantifiable performance measurements Strong upper level management support High level of employee buy-in Results oriented measurement analysis

High level of employee buy-in

The optimum approach for escalation is based on a thorough integration of the monitoring process into the __________. ERP CERT IDE IRP

IRP

Which of the following is the process of examining a possible incident and determining whether it constitutes an actual incident? Incident registration Incident verification Incident identification Incident classification

Incident classification

Which of the following is true about a hot site? It is an empty room with standard heating, air conditioning, and electrical service. It duplicates computing resources, peripherals, phone systems, applications, and workstations. All communications services must be installed after the site is occupied. It includes computing equipment and peripherals with servers but not client workstations.

It duplicates computing resources, peripherals, phone systems, applications, and workstations.

Which of the following is true about symmetric encryption? It requires four keys to hold a conversation. It uses a secret key to encrypt and decrypt. It uses a private and public key. It is also known as public key encryption.

It uses a secret key to encrypt and decrypt.

Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform only the minimum data manipulation necessary? Need-to-know Separation of duties Least privilege Eyes only

Least privilege

Which of the following is a possible result of failure to establish and maintain standards of due care and due diligence? Information system faults Baselining Benchmarking Legal liability

Legal liability

The benefits of ISO certification to organizations achieving it include all of the following EXCEPT: Improved public image Lower taxes from governments Smoother operations Reduced costs

Lower taxes from governments

Which of the following describes an organization's efforts to reduce damage caused by a realized incident or disaster? Transference Avoidance Mitigation Acceptance

Mitigation

Once a control strategy has been selected and implemented, what should be done on an ongoing basis to determine their effectiveness and to estimate the remaining risk? Analysis and adjustment Evaluation and funding Review and reapplication Monitoring and measurement

Monitoring and measurement

Which access control principle limits a user's access to the specific information required to perform the currently assigned task? Eyes only Separation of duties Least privilege Need-to-know

Need-to-know

Which type of access controls can be role-based or task-based? Content-dependent Discretionary Constrained Nondiscretionary

Nondiscretionary

The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization. ISP ASP PSV SVP

PSV

What tool would you use if you want to collect information as it is being transmitted on the network and analyze the contents for the purpose of solving network problems? Content filter Vulnerability scanner Packet sniffer Port scanner

Packet sniffer

__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker). Attack testing Penetration simulation Penetration testing Attack simulation

Penetration testing

Which of the following terms is described as the process of designing, implementing, and managing the use of the collected data elements to determine the effectiveness of the overall security program? Standards of due care/diligence Performance management Best practices Baselining

Performance management

In which cipher method are values rearranged within a block to create the ciphertext? Monoalphabetic Substitution Vernam Permutation

Permutation

Which of the following determines acceptable practices based on consensus and relationships among the communities of interest? Political feasibility Operational feasibility Organizational feasibility Technical feasibility

Political feasibility

Which tool can best identify active computers on a network? Packet sniffer Honey pot Port scanner Trap and trace

Port scanner

Which technology employs sockets to map internal private network addresses to a public address using a one-to-many mapping? Private address mapping Screened-subnet firewall Port-address translation Network-address translation

Port-address translation

__________ allows for major security control components to be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate. Program review System review Project review Application review

Program review

Which of the following is an organizational CP philosophy for overall approach to contingency planning reactions? After-action review Transfer to local/state/federal law enforcement Track, hack, and prosecute Protect and forget

Protect and forget

What does FAIR rely on to build the risk management framework that is unlike many other risk management frameworks? Subjective prioritization of controls Risk analysis estimates Qualitative assessment of many risk components Quantitative valuation of safeguards

Qualitative assessment of many risk components

Which of the following can be described as the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility? Risk assurance Risk termination Residual risk Risk appetite

Risk appetite

Which of the following is not a consideration when selecting recommended best practices? Threat environment is similar Resource expenditures are practical Organization structure is similar Same networking architecture

Same networking architecture

Which of the following specifies the authorization classification of information asset an individual user is permitted to access, subject to the need-to-know principle? Task-based access controls Discretionary access controls Sensitivity levels Security clearances

Security clearances

By multiplying the asset value by the exposure factor, you can calculate which of the following? Single loss expectancy Annualized cost of the safeguard Annualized loss expectancy Value to adversaries

Single loss expectancy

Which of the following is not among the three types of authentication mechanisms? Something a person sees Something a person has Something a person can produce Something a person knows

Something a person sees

Which type of firewall keeps track of each network connection established between internal and external systems? Cache server Stateful packet inspection Application layer Packet filtering

Stateful packet inspection

A time-release safe is an example of which type of access control? Temporal isolation Nondiscretionary Content-dependent Constrained user interface

Temporal isolation

Which of the following is a mathematical tool that is useful in assessing the relative importance of business functions based on criteria selected by the organization? Weighted table analysis Recovery time organizer BIA questionnaire MTD comparison

Weighted table analysis

Which of the following is not a question a CISO should be prepared to answer, about a performance measures program, according to Kovacich? What affect will measurement collection have on efficiency? Who will collect these measurements? Why should these measurements be collected? Where will these measurements be collected?

What affect will measurement collection have on efficiency?

At what point in the incident life cycle is the IR plan initiated? Before an incident takes place. Once the DRP is activated. Once the BCP is activate When an incident is detected that affects the organization.

When an incident is detected that affects the organization.

__________ penetration testing is usually used when a specific system or network segment is suspect and the organization wants the pen tester to focus on a particular aspect of the target. White box Black box Gray box Green box

White box

To evaluate the performance of a security system, administrators must establish system performance __________. profiles maxima baselines means

baselines

The financial savings from using the defense risk treatment strategy to implement a control and eliminate the financial ramifications of an incident is known as __________. asset valuation cost avoidance risk acceptance premium probability estimate

cost avoidance

One approach that can improve the situational awareness of the information security function is to use a process known as __________ to quickly identify changes to the internal environment. revision baselining differentials difference analysis

difference analysis

When vulnerabilities have been controlled to the degree possible, there is often remaining risk that has not been completely removed, shifted, or planned for and is called __________. residual risk risk assurance risk tolerance risk appetite

residual risk


Kaugnay na mga set ng pag-aaral

Operating, financing and Investing activities

View Set

ES 350 Research Methods in HESRM

View Set

PrepU - Chapter 19: Assessing Thorax and Lungs

View Set

criminal investigation midterm study cards

View Set

Computers & Computer Software- Quiz 1

View Set

Giddens Ch 38 - Interpersonal Violence

View Set