Cyber Midterm
A short-term interruption in electrical power availability is known as a _____. a. fault b. lag c. brownout d. blackout
a. fault
The probability that a specific vulnerability within an organization will be attacked by a threat is known as _____. a. likelihood b. determinism c. externality d. potential
a. likelihood
The EISP component of _____ provides information on the importance of information security in the organization and the legal and ethical obligation to protect critical information about customers, employees, and markets. a. Need for Information Security b. Statement of Purpose c. Information Security Elements d. Information Security Responsibilities and Roles
a. need for information security
Which of these is NOT a unique function of information security management? a. policy b. hardware c. planning d. programs
hardware
Some policies may also need a sunset clause indicating their expiration date. a. True b. False
true
The organization should adopt naming standards that do not convey information to potential system attackers. a. True b. False
true
Check My Work _____ signifies how often you expect a specific type of attack to occur. a. ARO b. ALE c. CBA d. SLE
a. ARO
A(n) _____ is a document containing contact information for the people to be notified in the event of an incident. a. alert roster b. call registry c. phone list d. emergency notification system
a. alert roster
Risk _____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility. a. appetite b. acceptance c. residual d. benefit
a. appetite
SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security _____. a. blueprint b. policy c. plan d. standard
a. blueprint
The community of interest made up of IT managers and skilled professionals in systems design, programming, networks, and other related disciplines is called _____. a. Information Technology Management and Professionals b. Information Security Management and Professionals c. Executive Management d. Organizational Management and Professional
a. information Technology Management and Professionals
The spheres of security are the foundation of the security framework and illustrate how information is under attack from a variety of sources, with far fewer protection layers between the information and potential attackers on the _____ side of the organization. a. people b. technology c. operational d. Internet
a. people
A table of hash values and their corresponding plaintext values used to look up password values if an attacker is able to steal a system's encrypted password file is known as a(n) _____. a. rainbow table b. dictionary c. crib d. crack file
a. rainbow table
_____ is any technology that aids in gathering information about a person or organization without their knowledge. a. Spyware b. A bot c. A worm d. A Trojan
a. spyware
_____ often function as standards or procedures to be used when configuring or maintaining systems. a. EISPs b. SysSPs c. ESSPs d. ISSPs
b. SysSPs
Human error or failure often can be prevented with training, ongoing awareness activities, and _____. a. paperwork b. controls c. threats d. hugs
b. controls
The protection of tangible items, objects, or areas from unauthorized access and misuse is known as _____. a. network security b. physical security c. information security d. communications security
b. physical security
The average amount of time until the next hardware failure is known as _____. a. mean time to diagnose (MTTD) b. mean time to repair (MTTR) c. mean time to failure (MTTF) d. mean time between failure (MTBF)
c. MTTF
A threat _____ is an evaluation of the threats to information assets, including a determination of their likelihood of occurrence and potential impact of an attack. a. review b. investigation c. assessment d. search
c. assessment
A crime involving digital media, computer technology, or related components is best called an act of _____. a. computer trespass b. digital abuse c. digital malfeasance d. computer theft
c. digital malfeasance
A server would experience a(n) _____ attack when a hacker compromises it to acquire information via a remote location using a network connection. a. indirect b. software c. direct d. hardware
c. direct
Understanding the _____ context means understanding the impact of elements such as the business environment, the legal/regulatory/compliance environment, as well as the threat environment. a. design b. internal c. external d. risk evaluation
c. external
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as _____. a. physical security b. communications security c. information security d. network security
c. information security
Check My Work A computer is the _____ of an attack when it is used to conduct an attack against another computer. a. target b. facilitator c. subject d. object
c. subject
The _____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. a. FTP b. HTTP c. WWW d. TCP
d. TCP
_____ risk treatment is a strategy to do nothing to protect a vulnerability and to accept the outcome of its exploitation. a. Defense b. Transference c. Mitigation d. Acceptance
d. acceptance
A fundamental difference between a BIA and risk management is that risk management focuses on identifying threats, vulnerabilities, and attacks to determine which controls can protect information, while the BIA assumes that _____. a. controls have been bypassed b. controls have proven ineffective c. controls have failed d. All of the above
d. all of the above
Redundancy can be implemented at a number of points throughout the security architecture, such as in _____. a. firewalls b. proxy servers c. access controls d. All of the above
d. all of the above
Most common data backup schemes involve _____. a. RAID b. disk-to-disk-to-cloud c. neither a nor b d. both a and b
d. both a and b
Which type of organizations should prepare for the unexpected? a. large organizations which have many assets at risk b. small organizations that can easily recover c. only those without good insurance d. organizations of every size and purpose
d. orgs of every size and purpose
Individuals who control and are responsible for the security and use of a particular set of information are known as data _____. a. trustees b. users c. custodians d. owners
d. owners
_____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor. a. Memorandum of understanding b. Time-share agreement c. Mutual agreement d. Service agreement
d. service agreement
"Knowing yourself" means identifying, examining, and understanding the threats facing the organization's information assets. a. True b. False
false
A disaster is any adverse event that could result in loss of an information asset or assets but does not currently threaten the viability of the entire organization. a. True b. False
false
An advance-fee fraud attack involves the interception of cryptographic elements to determine keys and encryption algorithms. a. True b. False
false
Incident detail assessment determines the impact from a breach of confidentiality, integrity, and availability on information and information assets. a. True b. False
false
Network security focuses on the protection of physical items, objects, or areas from unauthorized access and misuse. T/F
false
Risk mitigation is the process of assigning a risk rating or score to each information asset. a. True b. False
false
The bottom-up approach to information security has a higher probability of success than the top-down approach. T/F
false
The operational plan documents the organization's intended long-term direction and efforts for the next several years. a. True b. False
false
The primary mission of information security is to ensure that systems and their content retain their confidentiality. a. True b. False
false
The security framework is a more detailed version of the security blueprint. a. True b. False
false
With the removal of copyright protection mechanisms, software can be easily and legally distributed and installed. a. True b. False
false
A breach of possession may not always result in a breach of confidentiality. T/F
true
A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information. T/F
true
Business impact analysis is a preparatory activity common to both CP and risk management. a. True b. False
true
Exposure factor is the expected percentage of loss that would occur from a particular attack. a. True b. False
true
Good security programs begin and end with policy. a. True b. False
true
Technical mechanisms like digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media have been used to deter or prevent the theft of software intellectual property. a. True b. False
true
Using a service bureau is a BC strategy in which an organization contracts with a service agency to provide a facility for a fee. a. True b. False
true