Polling Questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A potential weakness in an asset or its defensive control system is a __________? a. Vulnerability b. Threat Agent c. Exploit d. Countermeasure

A. Vulnerability

The C.I.A. Triad industry standard for computer security has all of the following characteristics except? a. Confidentiality b. Integrity c. Shareability d. Availability

C. Shareability

When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow which approach? a. Executive-led b. Trickle-down c. Top-down d. Bottom-up

C. top-down

Email is the most private form of communication and it is safe to use with personal information. True/False

False

Notification from an IDPS (Intrusion Detection and Prevention System) always indicates a definite incident is in progress since these tools are easy to configure and operate? True/False

False

Service level agreements (SLA) are considered optional in most cases when an organizations engages a third party for cloud computing services or other outsourced services? True/False

False

The process an organization uses to assign a risk rating or score to each information asset is a risk evaluation? True/False

False

Pretexting to gain confidential information is no longer considered a viable threat as the human element is considered the strongest link in the security chain? True/False

False - Human error is the weakest link

Passwords should only be shared with trusted people and the IT Security Department. True/False

False - never share with anyone

A zero-day attack makes use of the malware that is not yet known the the anti-virus software companies? True/False

True

Cloud-based provisioning can be both a potential continuity option for production systems and a mechanism to manage recovery from disrupted operations? True/False

True

Everyone has responsibility to protect company confidential and sensitive information? True/False

True

SP 800-18, "Guide for Developing Security Plans for Federal Information Systems," is considered the foundation for a comprehensive security blueprint and framework? True/False

True

Strategic planning sets the long-term direction to be taken by the organization and each of its component parts. It should also guide organizational efforts and focus resources toward specific, clearly defined goals? True/False

True

The information technology community of interest must assist in risk management by configuring and operating information systems in a secure fashion? True/False

True

The person responsible for the storage, maintenance, and protection of information is the data custodian? True/False

True

A hacker will typically utilize IP spoofing to install a _________ to monitor data traveling over a network? a. Packet Sniffer b. Mail bomb c. Integer bug d. Denial of service attack

a. Packet Sniffer

A hacker would typically attempt to attain the following in order to gain advanced access and control over the compromised system? a. Privilege Escalation b. Zombie Control c. A Man in the Middle Attack d. Identify of the CEO Through Social Media

a. Privilege Escalation

Before deciding on a treatment strategy for a specific TVA triple, the organization should perform which of the following to determine the merits of the treatment? a. economic feasibility study b. threat assessment only c. risk appetite calculation d. asset valuation only

a. economic feasibility study

As the text describes, the purpose of digital forensics is to preserve? a. evidentiary material (EM) b. database shadowing c. warm sites d. recovery criticality

a. evidentiary material (EM)

In developing information security guidance, which is the hierarchy of development? a. policy, standards, guidelines, procedures b. policy, procedures, standards, guidelines c. standards, procedures, guidelines, policy d. practices, policy, standards, guidelines

a. policy, standards, guidelines, procedures

Which risk control strategy attempts to shift residual risk to other assets, other processes, or other organizations? a. transference b. defense c. acceptance d. mitigation

a. transference

The _______has primary responsibility for the assessment, management, and implementation of information security in the organization? a. Board Chairperson b. CISO c. CIO d. CFO

b. CISO

the following form of social engineering attempts to direct a target to provide personal or confidential information? a. Ransomware b. Phishing c. Adware d. Worm

b. Phishing

Incident Response (IR) actions can be organized into three phases. Which of the following is not an IR phase? a. Detection b. Simulation c. Reaction/Response d. Recovery

b. Simulation

What is the term called which represents actions taken by management specifically the organization's efforts and actions if an adverse event becomes an incident or disaster? a. CSIRT plan (Computer Security Incident Response Team) b. contingency planning c. business continuity planning d. business process

b. contingency planning

Which type of asset might a company take a zero-tolerance risk exposure posture? a. product lists b. research and development c. location addresses d. public analyst call recordings

b. research and development

Risk identification is performed within a larger process of identifying and justifying risk controls that is called which of the following? a. risk assessment b. risk management c. risk control d. risk tolerance

b. risk management

Which of the following defines the edge between the outer limit of an organization's security and the beginning of the outside world? a. framework b. security perimeter c. security domain d. defense in depth

b. security perimeter

In a _____________, the organization creates a role-playing exercise in which the CP (contingency planning) team is present with a scenario of an actual incident or disaster and is expected to react as if it had occured? a. desk check b. simulation c. full-interruption test d. structured walk-through

b. simulation

What type of planning occurs where the actions taken by management to specify the intermediate goals and objectives of the organization in order to obtain specified strategic goals are followed by estimates and schedules for the allocation of resources necessary to achieve those goals and objectives? a. strategic b. tactical c. operational d. financial

b. tactical

Using a known or previously installed access mechanism is known as which of the following? a. Hidden Bomb b. Vector c. Back Door d. Spoof

c. Back Door

Which of the following terms best describes a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls? a. blueprint b. the NIST handbook c. Information security framework d. security plan

c. Information security framework

Which of the following would be considered an attack and penetration tester? a. an expert hacker with bad intentions b. a packet monkey focused on denial of service mischief c. an information security professional with authorization to compromise a system seeking vulnerabilities d. a foreign national focused on industrial espionage

c. an information security professional with authorization to compromise a system seeking vulnerabilities

A ________ is an investigation and assessment of adverse events that can affect the organization; it includes a determination of how critical a system or data are to the organization's core processes and it recovery priorities? a. recovery time objective b. 3-2-1 back-up c. business impact analysis d. alert roster

c. business impact analysis

The probability that a specific vulnerability within an organization will be the target of an attack is known as which of the following? a. probability b. manageability c. likelihood d. practicality

c. likelihood

Providing customer billing as he mentioned in the text is an example of what? a. potential incident that can occur in an organization b. additional resource detail c. mission/business process d. description and estimated cost

c. mission/business process

The ________ process entails the review and assessment of organizational information security performance toward goals and objectives by the governing body? a. evaluate b. direct c. monitor d. assure

c. monitor

The application of controls that reduce the risks to an organization's information assets to an acceptable level is known as which of the following?? a. risk assessment b. risk management c. risk control d. risk identification

c. risk control

According to the text and the information security governance roles and responsibilities graphic, who is responsible for policy implementation, reporting security vulnerabilities, and breaches? a. Chief Executive Officer b. Mid-level managers c. Janitorial staff d. Enterprise staff/employees

d. Enterprise staff/employees

The following is often a main trophy for corporate espionage? a. Key Products b. Names of Board Members c. SEC Reports d. Intellectual Property (IP)

d. Intellectual Property (IP)

Information about a persons history, background, and attributes that can be used to commit identify theft is called? a. Enhanced credentials b. Passwords c. Authenticity d. Personal Identifiable Information (PII)

d. Personal Identifiable Information (PII)

Access control lists (ACL) are a unique form of what kind of policy? a. EISP b. ISSP c. GRC d. SysSP

d. SysSP

In determining recovery critically, which of the following is true? a. as disruption time increases, both cost to recover and cost of disruption go up b. as disruption time increases, both cost to recover and cost disruption go down c. as disruption time increases, cost to recover goes up and cost of disruption goes down d. as disruption time increases, cost to recover goes down and cost of disruption goes up

d. as disruption time increases, cost to recover goes down and cost of disruption goes up

For information security purposes, which of the following terms is used to describe the systems that use, store, and transmit information? a. inventory b. threats c. controls d. assets

d. assets

As indicated earlier, one of the foundations of security architectures is the requirement to implement security in layers. This layered approach is referred to as which of the following? a. framework b. security perimeter c. security domain d. defense in depth

d. defense in depth

Which risk control strategy attempts to reduce the impact of a successful attack through planning and preparation? a. transference b. defense c. acceptance d. mitigation

d. mitigation

which of the following is not a definite indicator of an incident? a. change to logs b. presence of hacker tools c. use of dormant accounts d. presence of unfamiliar files

d. presence of unfamiliar files

Information security performs all of the following functions for an organization except? a. safeguards the organizations technology assets b. protects the organizations' ability to function c. protects the data and information the organization collects and uses the whether physical or electronic d. provides for the broad and easy access of an organization's intellectual property among companies in the same industry

d. provides for the broad and easy access of an organization's intellectual property among companies in the same industry

Which of the following could be considered highly desirable trophies for corporate espionage? a. Customer Information b. Intellectual Property (IP) c. Financial Assets d. Elon Musk Flight Details e. All of the Above

e. All of the Above


Kaugnay na mga set ng pag-aaral

Chapter 11 - Investment Planning

View Set

𝙀𝙑𝙀𝙍𝙔𝙈𝘼𝙉: PROLOGUE (1-203)

View Set

Health and Illness-Cardiac questions

View Set

EMT Chapter 27: Soft-Tissue Injuries

View Set

CA Real Estate Principles: Chapter 3

View Set

Lippencott Nursing Skills and Concepts Chapter 8 Client Teaching

View Set