chap 67

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is meant by standard? A. A mandated requirement for a hardware or software solution that is used to deal with a security risk throughout the organization. B. A benchmark used to make sure that a system provides a minimum level of security across multiple applications and across different products. C. The formal acceptance by the authorizing official of the risk of implementing the system. D. Recorded information from system events that describes security-related activity.

A mandated requirement for a hardware or software solution that is used to deal with a security risk throughout the organization.

________ gives you the opportunity to review your risk-management program and to confirm that the program has correctly identified and reduced (or otherwise addressed) the risks to your organization. A. Penetration testing B. Real-time monitoring C. An audit D. Vulnerability testing

An audit

Which of the following is the definition of anomaly-based IDS? A. An intrusion detection system that compares current activity with stored profiles of normal (expected) activity. B. The state of a computer or device in which you have turned off or disabled unnecessary services and protected the ones that are still running. C. An intrusion detection system that uses pattern matching and stateful matching to compare current traffic with activity patterns (signatures) of known network intruders. D. Using tools to determine the layout and services running on an organization's systems and networks.

An intrusion detection system that uses pattern matching and stateful matching to compare current traffic with activity patterns (signatures) of known network intruders.

___________ are the benchmarks that help make sure a minimum level of security exists across multiple applications of systems and across different products. A. Assets B. Functional policies C. Policies D. Baselines

Baselines

_________ ensures that any changes to a production system are tested, documented, and approved. A. Change control B. Configuration control C. Classification D. Compliance

Change control

What is meant by gray-box testing? A. Any activities designed to reduce the severity of a vulnerability or remove it altogether. B. Security testing that is based on limited knowledge of an application's design. C. A technique of matching network traffic with rules or signatures based on the appearance of the traffic and its relationship to other packets. D. Analysis of activity as it is happening.

Security testing that is based on limited knowledge of an application's design.

The ___________ framework defines the scope and contents of three levels of audit reports. A. Service Organization Control (SOC) B. permission-level C. real-time monitoring D. zone transfer

Service Organization Control (SOC)

Which of the following is the definition of system owner? A. A benchmark used to make sure that a system provides a minimum level of security across multiple applications and across different products. B. The individual or team responsible for performing the security test and evaluation for the system, and for preparing the report for the AO on the risk of operating the system. C. The person responsible for the daily operation of a system and for ensuring that the system continues to operate in compliance with the conditions set out by the AO. D. Fixing something that is broken or defective, such as by addressing or removing vulnerabilities.

The person responsible for the daily operation of a system and for ensuring that the system continues to operate in compliance with the conditions set out by the AO.

Which of the following defines network mapping? A. The standard by which your computer or device is compared to determine if it's securely configured. B. A method of security testing that isn't based directly on knowledge of a program's architecture. C. Using tools to determine the layout and services running on an organization's systems and networks. D. A process of finding the weaknesses in a system and determining which places may be attack points.

Using tools to determine the layout and services running on an organization's systems and networks.

A security awareness program includes ________. A. teaching employees about security objectives B. motivating users to comply with security policies C. informing users about trends and threats in society D. all of the above

all of the above

Security audits help ensure that your rules and __________ are up to date, documented, and subject to change control procedures. A. applications B. mitigation activities C. configurations D. recommendations

configurations

As your organization evolves and as threats mature, it is important to make sure your __________ still meet(s) the risks you face today. A. configuration B. controls C. monitoring D. settings

controls

For all the technical solutions you can devise to secure your systems, the __________remains your greatest challenge. A. administration B. human element C. certifier D. regulations

human element

If knowing about an audit changes user behavior, an audit will ____________. A. not be accurate B. be more accurate C. skew results D. not be required

not be accurate

It's essential to match your organization's required __________ with its security structure. A. monitoring B. permission level C. operating system D. recommendations

permission level

Enacting changes in response to reported problems is called ________. A. reactive change management B. job rotation C. change control D. compliance liaison

reactive change management

From the perspective of a _________ professional, configuration management evaluates the impact a modification might have on security. A. administration B. security C. management D. IT

security

SOC 2 and SOC 3 reports both address primarily ________-related controls. A. security B. financial reporting C. management D. communication

security

When an information security breach occurs in your organization, a __________ helps determine what happened to the system and when. A. baseline B. security event log C. functional policy D. security policy

security event log

Audits also often look at the current configuration of a system as a snapshot in time to verify that it complies with ________. A. controls B. management C. standards D. plan

standards

The primary difference between SOC 2 and SOC 3 reports is ________. A. their length B. the number of auditors involved C. their focus D. their audience

their audience

Because personnel are so important to solid security, one of the best security controls you can develop is a strong security ___________ and awareness program. A. documentation B. environment C. guidelines D. training

training


Set pelajaran terkait

Top 26+ React Interview Questions (2018 Edition)

View Set

Ancient Art 22,000 B.C - 400 A.C

View Set

Introduction to entrepreneurship-led economic development

View Set

Unit 3: Process Costing Module 5: Process Costing - Equivalent Units

View Set