Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following would be considered an attack and penetration tester?

An information security professional with authorization to compromise a system seeking vulnerabilities

For information security purposes, which of the following terms is used to describe the systems that use, store, and transmit information?

Assets

The __________ has primary responsibility for the assessment, management and implementation of information security in the organization? (

CISO

Payment Card Industry ______ Standards are designed to enhance the security of customers' payment card account data?

Data Security

Which of the following is an American contribution to an effort to improve copyright protection internationally?

Digital Millennium Copyright Act (DMCA)

Which type of firewall filtering allows the firewall to react to an emergent event and update or create rules to deal with the event?

Dynamic

The ______ attempts to prevent trade secrets from being illegally shared?

Economic Espionage Act

All traffic exiting from the trusted network should be filtered?

False

Email is the most private form of communication and it is safe to use with personal information?

False

Notification from an IDPS (Intrusion Detection and Prevention System) always indicates a definite incident is in progress since these tools are easy to configure and operate?

False

Passwords should only be shared with trusted people and the IT Security Department?

False

Pretexting to gain confidential information is no longer considered a viable threat as the human element is considered the strongest link in the security chain?

False

Regardless of what information a company manages, it is shielded from local and state laws and regulations because the federal laws supersede them?

False

Service level agreements (SLA) are considered optional in most cases when an organization engages a third party for cloud computing services or other outsourced services?

False

The authentication factor "something a supplicant has" relies upon individual characteristics, such as fingerprints, palm prints, hand topography, hand geometry, or retina and iris scans?

False

The process an organization uses to assign a risk rating or score to each information asset is a risk evaluation?

False

When changing a security blueprint, training employees is not included as part of the process.

False

Which of the following terms are used to describe organized research of the internet addresses owned or controlled by the target organization?

Footprinting

Which law regulates the role of the healthcare industry in protecting the privacy of individuals?

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

The probability that a specific vulnerability within an organization will be the target of an attack is known as which of the following?

Likelihood

The ________ process entails the review and assessment of organizational information security performance toward goals and objectives by the governing body

Monitor

Which layer of the bulls-eye model should information security projects focus the most on?

Networks

What type of firewall examines every incoming packet header and can selectively filter packets based on header information, such as destination address, source address, packet type, and other key information?

Packet filtering

Information about a person's history, background, and attributes that can be used to commit identify theft is called?

Personal Identifiable Information

Which changeover strategy should be used when transitioning from an old system to a new system gradually?

Phased

Information security performs all of the following functions for an organization except?

Provides for the broad and easy access of an organization's intellectual property among companies in the same industry

Incidence response (IR) actions can be organized into three phases. Which of the following is not an IR phase?

Simulation

When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow which approach?

Top Down

A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network?

True

A zero-day attack makes use of malware that is not yet known by the anti-virus software companies?

True

Cloud-based provisioning can be both a potential continuity option for production systems and a mechanism to manage recovery from disrupted operations?

True

Everyone has responsibility to protect company confidential and sensitive information?

True

Major tasks that are part of a work breakdown structure (WBS) are known as subtasks.

True

SP 800-18, "Guide for Developing Security Plans for Federal Information Systems," is considered the foundation for a comprehensive security blueprint and framework?

True

Strategic planning sets the long-term direction to be taken by the organization and each of its component parts. It should also guide organizational efforts and focus resources toward specific, clearly defined goals?

True

The Center for Internet Security (CIS) outlines three categories of control to detect, prevent, respond to, and mitigate damage from attacks: Basic, Foundational, and Organizational.

True

The cornerstone of many current federal computer-related criminal laws is the Computer Fraud and Abuse Act of 1986?

True

The information technology community of interest must assist in risk management by configuring and operating information systems in a secure fashion?

True

The parallel operations conversion strategy often involves running two systems concurrently.

True

The person responsible for the storage, maintenance, and protection of information is the data custodian?

True

A potential weakness in an asset or its defensive control systems is a _______?

Vulnerability

The method by which systems determine whether and how to admit users into a trusted area of the organization is known as which of the following?

access control

Which step of the systems development life cycle (SDLC) reviews issues with a current system and establishes the requirements of the new system being created?

analysis

Which term is used to describe the process of validating a supplicant's purported identity?

authentication

In which IDPS control strategy are all IDPSs control functions implemented and managed in a central location?

centralized control strategy

What is a type of law that represents all that apply to a citizen (or subject) of a jurisdiction?

civil law

A network filter that allows administrators to restrict access to external content from within a network is known as which of the following?

content filter

The generally recognized term for the government protection afforded to intellectual property (written and electronic) is called which of the following?

copyright law

What is the type of law that addresses violations harmful to society and that is enforced by prosecution by the state?

criminal law

As the text describes, the purpose of digital forensics is to preserve?

evidentiary material (EM)

Which of the following is an event that triggers alarms when no actual attacks are in progress?

false attack stimulus

The biometric technology criteria that describes the number of legitimate users who are denied access because of a failure in the biometric device is known as which of the following?

false reject rate

What term is used to describe decoy systems designed to lure potential attackers away from critical systems?

honeypot

What detection method examines the system or network data for patterns that match known attack signatures?

knowledge-based detection

Which type of IDPS resides on a computer or appliance connected to a segment of an organization's network and monitors traffic on that segment looking for indications of on-going or successful attacks?

network-based IDPS

What is a network tool that collects copies of packets from the network and analyzes them?

packet sniffer

A scanner that listens in on a network and identifies vulnerable versions of both server and client software is known as which of the following?

passive vulnerability scanner

In developing information security guidance, which is the hierarchy of development?

policy, standards, guidelines, procedures

Which of the following is not a definite indicator of an incident?

presence of unfamiliar files

Which consideration is focused on the selection of equipment and services for a project?

procurement

What is the situation called when a project manager spends more time adjusting a project management software file than focusing on the project itself?

projectitis

When reviewing the Microsoft SDL (System Development Lifecycle), what is the final phase of their plan where an incident response plan is executed?

response

The application of controls that reduce the risks to an organization's information assets to an acceptable level is known as which of the following?

risk control

In a ___________, the organization creates a role-playing exercise in which the CP (Contingency Planning) Team is presented with a scenario of an actual incident or disaster and is expected to react as if it had occurred?

simulation

According to the National Information Infrastructure Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except?

to harass

Which VPN technology uses circuits from a service provider and conducts packet switching over these leased circuits?

trusted VPN

The process of adjusting an IDPS to maximize its efficiency in detecting true positives while minimizing false positives and false negatives is known as which of the following?

tuning

What is used to dial every number in a configured range and checks to see if a person, answering machine, or modem picks up?

war dialer

In determining recovery criticality, which of the following is true?

· As disruption time increases, cost to recover goes down and cost of disruption goes up

Using a known or previously installed access mechanism is known as which of the following?

· Back Door

Which of the following could be considered highly desirable trophies for corporate espionage?

· Customer information · Intellectual property (IP) · Financial results · Elon Musk flight details

According to the text and the information security governance roles and responsibilities graphic, who is responsible for policy implementation, reporting security vulnerabilities, and breaches?

· Enterprise staff/employees

Which of the following terms best describes a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls?

· Information security framework

The following is often a main trophy for corporate espionage?

· Intellectual property (IP)

A hacker will typically utilize IP spoofing to install a _________to monitor data traveling over a network?

· Packet sniffer

The following form of social engineering attempts to direct a target to provide personal or confidential information?

· Phishing

A hacker would typically attempt to attain the following in order to gain advanced access and control over the compromised system?

· Privilege escalation

The C.I.A Triad industry standard for computer security has all of the following characteristics except?

· Shareability

Access control lists (ACL) are a unique form of what kind of policy?

· SysSP

A _______ is an investigation and assessment of adverse events that can affect the organization; it includes a determination of how critical a system or data are to the organization's core processes and its recovery priorities?

· business impact analysis

What is the term called which represents the actions taken by management, specifically the organization's efforts and actions if an adverse event becomes an incident or disaster?

· contingency planning

As indicated earlier, one of the foundations of security architectures is the requirement to implement security in layers. This layered approach is referred to as which of the following?

· defense in depth

Before deciding on a treatment strategy for a specific TVA triple, the organization should perform which of the following to determine the merits of the treatment?

· economic feasibility study

Providing customer billing as mentioned in the text is an example of what?

· mission/business process

Which risk control strategy attempts to reduce the impact of a successful attack through planning and preparation?

· mitigation

Which type of asset might a company take a zero-tolerance risk exposure posture?

· research and development

Risk identification is performed within a larger process of identifying and justifying risk controls that is called which of the following?

· risk management

Which of the following defines the edge between the outer limit of an organization's security and the beginning of the outside world?

· security perimeter

What type of planning occurs where the actions taken by management to specify the intermediate goals and objectives of the organization in order to obtain specified strategic goals are followed by estimates and schedules for the allocation of resources necessary to achieve those goals and objectives?

· tactical

Which risk control strategy attempts to shift residual risk to other assets, other processes, or other organizations?

· transference


Ensembles d'études connexes

Chapter 7 (Cancer)- Study Guide Questions

View Set

Chapter 2: Intro to Optimization and Linear Programming

View Set

The Characteristics of Nonverbal Communication (Patrice)

View Set

Chapter 1 (There will be only 1-2 questions on the exam)

View Set

BUS 210 -Chapter 2 and 3 Study Guide for Exam 1

View Set

PNU 133 Honan PrepU Professional Behaviors / Professionalism

View Set