GBA 6780 - Chapter 7 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Curtis is conducting an audit of an identity management system. Which question is NOT likely to be in the scope of his audit? -Does the organization have an effective password policy? -Does the firewall properly block unsolicited network connection attempts? -Who grants approval for access requests? -Is the password policy uniformly enforced?

Does the firewall properly block unsolicited network connection attempts?

T/F: A report indicating that a system's disk is 80 percent full is a good indication that something is wrong with that system.

False

T/F: Committee of Sponsoring Organizations (COSO) is a set of best practices for IT management.

False

T/F: Regarding log monitoring, false negatives are alerts that seem malicious but are not real security events.

False

Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion alert each time that an administrator connects to a server using Secure Shell (SSH). What type of error is occurring? -Remote administration error -False positive error -Clipping error -False negative error

False positive error

When should an organization's managers have an opportunity to respond to the findings in an audit? -Managers should write a report after receiving the final audit report. -Managers should include their responses to the draft audit report in the final audit report. -Managers should not have an opportunity to respond to audit findings. -Managers should write a letter to the Board following receipt of the audit report.

Managers should include their responses to the draft audit report in the final audit report.

Which security testing activity uses tools that scan for services running on systems? -Reconnaissance -Penetration testing -Network mapping -Vulnerability testing

Network mapping

Which regulatory standard would NOT require audits of companies in the United States? -Sarbanes-Oxley Act (SOX) -Personal Information Protection and Electronic Documents Act (PIPEDA) -Health Insurance Portability and Accountability Act (HIPAA) -Payment Card Industry Data Security Standard (PCI DSS)

Personal Information Protection and Electronic Documents Act (PIPEDA)

Christopher is designing a security policy for his organization. He would like to use an approach that allows a reasonable list of activities but does not allow other activities. Which permission level is he planning to use? -Promiscuous -Permissive -Prudent -Paranoid

Prudent

Which activity is an auditor least likely to conduct during the information-gathering phase of an audit? -Vulnerability testing -Report writing -Penetration testing -Configuration review

Report writing

Which item is an auditor least likely to review during a system controls audit? -Resumes of system administrators -Incident records -Application logs -Penetration test results

Resumes of system administrators

Emily is the information security director for a large company that handles sensitive personal information. She is hiring an auditor to conduct an assessment demonstrating that her firm is satisfying requirements regarding customer private data. What type of assessment should she request? -SOC 1 -SOC 2 -SOC 3 -SOC 4

SOC 3

Gina is preparing to monitor network activity using packet sniffing. Which technology is most likely to interfere with this effort if used on the network? -Transmission Control Protocol/Internet Protocol (TCP/IP) -Secure Sockets Layer (SSL) -Domain Name System (DNS) -Dynamic Host Configuration Protocol (DHCP)

Secure Sockets Layer (SSL)

Isaac is responsible for performing log reviews for his organization in an attempt to identify security issues. He has a massive amount of data to review. What type of tool would best assist him with this work? -Security information and event management (SIEM) -Intrusion prevention system (IPS) -Data loss prevention (DLP) -Virtual private network (VPN)

Security information and event management system (SIEM)

Which intrusion detection system strategy relies upon pattern matching? -Behavior detection -Traffic-based detection -Statistical detection -Signature detection

Signature detection

What type of security monitoring tool would be most likely to identify an unauthorized change to a computer system? -Network IDS -System integrity monitoring -CCTV -Data loss prevention

System integrity monitoring

T/F: After audit activities are completed, auditors perform data analysis.

True

Fran is conducting a security test of a new application. She does not have any access to the source code or other details of the application she is testing. What type of test is Fran conducting? -Black-box test -White-box test -Grey-box test -Blue-box test

Black-box test

Which audit data collection method helps ensure that the information-gathering process covers all relevant areas? -Checklist -Interviews -Questionnaires -Observation

Checklist

T/F: An auditing benchmark is the standard by which a system is compared to determine whether it is securely configured

True


Set pelajaran terkait

142 Final - Part 4 - PRACTICE QUESTIONS

View Set

Sleeping needs of the infant, toddler, and young child

View Set

OB Lippincott Postpartal Care - The Postpartal Client Who Breast-Feeds

View Set

AP human geography chapter 13 review

View Set

Chapter 7 - Strategy & Strategic Management

View Set

Discovery Education-Kinetic and Potential Energy

View Set

CoursePoint Chapter 16: Outcome Identification and Planning - ML3

View Set