MIDTERM

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A fundamental difference between a BIA and risk management is that risk management focuses on identifying threats, vulnerabilities, and attacks to determine which controls can protect information, while the BIA assumes __________.

All of the above

Management of classified data includes its storage and _________.

All of the above

Which of the following acts defines and formalizes laws to counter threats from computer-related acts and offenses?

All of the above

The CPMT conducts the BIA in three stages. Which of the following is NOT one of those stages?

All of these are BIA stages

__________ law comprises a wide variety of laws that govern a nation or state.

Civil

The National Information Infrastructure Protection Act of 1996 modified which act?

Computer Fraud and Abuse Act

A policy should state that if employees violate a company policy or any law using company technologies, the company will protect them, and the company is liable for the employee's actions.

FALSE

A(n) disaster is any adverse event that could result in loss of an information asset or assets, but does not currently threaten the viability of the entire organization. _________________________

FALSE

A(n) hardware system is the entire set of people, procedures, and technology that enable business to use information. _________________________

FALSE

According to Sun Tzu, if you know yourself and know your enemy, you have an average chance to be successful in an engagement.

FALSE

Authentication is a mechanism whereby unverified entities who seek access to a resource provide a label by which they are known to the system. _________________________

FALSE

Cost-benefit analyses (CBAs) cannot be calculated after controls have been functioning for a time, as observation over time prevents precision in evaluating the benefits of the safeguard and determining whether it is functioning as intended.

FALSE

Discretionary access control is an approach whereby the organization specifies use of resources based on the assignment of data classification schemes to resources and clearance levels to users.

FALSE

E-mail spoofing involves sending an e-mail message with a harmful attachment.

FALSE

Employees are not deterred by the potential loss of certification or professional accreditation resulting from a breach of a code of conduct, because this loss has no effect on employees' marketability and earning power.

FALSE

Internet connections via dial-up lines are regaining popularity due to recent technological developments.

FALSE

Kerberos uses asymmetric key encryption to validate an individual user to various network resources. _________________________

FALSE

One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. _________________________

FALSE

One of the biggest challenges in the use of the trusted computer base (TCB) is the existence of explicit channels. _________________________

FALSE

Operational feasibility is an assessment of whether the organization can acquire the technology necessary to implement and support the proposed control.

FALSE

Pervasive risk is the amount of risk that remains to an information asset even after the organization has applied its desired level of controls. _________________________

FALSE

Port Address Translation assigns non-routing local addresses to computer systems in the local area network and uses ISP-assigned addresses to communicate with the Internet on a one-to-one basis. _________________________

FALSE

Process-based measures are comparisons based on observed numerical data, such as numbers of successful attacks. _________________________

FALSE

Risk acceptance defines the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility. _________________________

FALSE

Risk control is the enumeration and documentation of risks to an organization's information assets. _________________________

FALSE

SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functionality and the need for the operations team to improve security and minimize the disruption from software release cycles. ________________________

FALSE

The Department of Homeland Security is the only U.S. federal agency charged with the protection of American information resources and the investigation of threats to, or attacks on, those resources.

FALSE

The ISSP is a plan which sets out the requirements that must be met by the information security blueprint or framework.

FALSE

The screened subnet protects the DMZ systems and information from outside threats by providing a network with intermediate security, which means the network is less secure than the general-public networks but more secure than the internal network.

FALSE

The security framework is a more detailed version of the security blueprint.

FALSE

The water-ski model is a type of SDLC in which each phase of the process flows from the information gained in the previous phase, with multiple opportunities to return to previous phases and make adjustments.

FALSE

Unethical and illegal behavior is generally caused by ignorance (of policy and/or the law), by accident, and by inadequate protection mechanisms.

FALSE

Within a data classification scheme, "comprehensive" means that an information asset should fit in only one category.

FALSE

You cannot use qualitative measures to rank information asset values.

FALSE

direction, scope, and tone for all security efforts. _________________________

FALSE

A(n) disaster recovery plan includes the steps necessary to ensure the continuation of the organization when a disaster's scope or scale exceeds the ability of the organization to restore operations, usually through relocation of critical business functions to an alternate location

False

The Council of Europe adopted the Convention of Cybercrime in 2001 to oversee a range of security functions associated with __________ activities.

Internet

The service within Kerberos that generates and issues session keys is known as __________.

KDC

________ controls cover security processes that are designed by strategic planners and implemented by the security administration of the organization.

Managerial

__________ has become a widely accepted evaluation standard for training and education related to the security of information systems.

NSTISSI No. 4011

_________ controls address personnel security, physical security, and the protection of production inputs and outputs.

Operational

In SESAME, the user is first authenticated to an authentication server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a(n) __________.

PAC

__________ and TACACS are systems that authenticate the credentials of users who are trying to access an organization's network via a dial-up connection.

RADIUS

The ____________________ data file contains the hashed representation of the user's password.

SAM

________often function as standards or procedures to be used when configuring or maintaining systems.

SysSPs

A common DMZ arrangement is a subnet firewall that consists of two or more internal bastion hosts behind a packet-filtering router, with each host protecting the trusted network. _________________________

TRUE

A content filter, also known as a reverse firewall, is a network device that allows administrators to restrict access to external content from within a network.

TRUE

A disaster recovery plan shows the organization's intended efforts to restore operations at the original site in the aftermath of a disaster.

TRUE

A mail bomb is a form of DoS attack.

TRUE

A security policy should begin with a clear statement of purpose. _________________________

TRUE

A sniffer program can reveal data transmitted on a network segment, including passwords, the embedded and attached files-such as word-processing documents-and sensitive data transmitted to or from applications.

TRUE

Disaster recovery personnel must know their roles without supporting documentation, which is a function of preparation, training, and rehearsal.

TRUE

Evidence is the physical object or documented information that proves an action occurred or identifies the intent of a perpetrator. _________________________

TRUE

Good security programs begin and end with policy.

TRUE

Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. _________________________

TRUE

Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident.

TRUE

Laws, policies, and their associated penalties only provide deterrence if offenders fear the penalty, expect to be caught, and expect the penalty to be applied if they are caught.

TRUE

Laws, policies, and their associated penalties only provide deterrence if, among other things, potential offenders fear the probability of a penalty being applied. _________________________

TRUE

NIST responded to a mandate and created a voluntary Risk Management Framework that provides an effective approach to manage cybersecurity risks. _________________________

TRUE

Of the two approaches to information security implementation, the top-down approach has a higher probability of success. _________________________

TRUE

One way to determine which information assets are valuable is by evaluating which information asset(s) would expose the company to liability or embarrassment if revealed. _________________________

TRUE

Organizations can use dictionaries to regulate password selection during the reset process and thus guard against easy-to-guess passwords.

TRUE

Packet-filtering firewalls scan network data packets looking for compliance with the rules of the firewall's database or violations of those rules.

TRUE

Secure VPNs use security protocols and encrypt traffic transmitted across unsecured public networks like the Internet.

TRUE

Some firewalls can filter packets by protocol name.

TRUE

The Department of Homeland Security works with academic campuses nationally, focusing on resilience, recruitment, internationalization, growing academic maturity, and academic research.

TRUE

The Federal Bureau of Investigation's National InfraGard Program serves its members in four basic ways: Maintains an intrusion alert network using encrypted e-mail; maintains a secure Web site for communication about suspicious activity or intrusions; sponsors local chapter activities; and operates a help desk for questions. _________________________

TRUE

The NSA is responsible for signal intelligence, information assurance products and services, and enabling computer network operations to gain a decision advantage for the United States and its allies under all circumstances.

TRUE

The communications networks of the United States carry(ies) more funds than all of the armored cars in the world combined. _________________________

TRUE

The investigation phase of the SDLC involves specification of the objectives, constraints, and

TRUE

The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________

TRUE

The policy administrator is responsible for the creation, revision, distribution, and storage of the policy.

TRUE

The stated purpose of ISO/IEC 27002 is to offer guidelines and voluntary directions for information security management. _________________________

TRUE

The threats-vulnerabilities-assets (TVA) worksheet is a document that shows a comparative ranking of prioritized assets against prioritized threats, with an indication of any vulnerabilities in the asset/threat pairings.

TRUE

The value of information comes from the characteristics it possesses.

TRUE

To remain viable, security policies must have a responsible individual, a schedule of reviews, a method for making recommendations for reviews, and policy issuance and planned revision dates.

TRUE

When determining the relative importance of each asset, refer to the organization's mission statement or statement of objectives to determine which elements are essential, which are supportive, and which are merely adjuncts.

TRUE

When BS 7799 first came out, several countries, including the United States, Germany, and Japan, refused to adopt it, claiming that it had fundamental problems. Which of the following is NOT one of those problems?

The global information security community had already defined a justification for a code of practice, such as the one identified in ISO/IEC 17799.

____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.

Trojan horses

A(n) __________ is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures.

VPN

A(n) _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it.

data classification scheme

Standards may be published, scrutinized, and ratified by a group, as in formal or ________ standards.

de juro

The proxy server is often placed in an unsecured area of the network or is placed in the __________ zone.

demilitarized

A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

distributed denial-of-service

Security __________ are the areas of trust within which users can freely communicate.

domains

Some people search trash and recycling bins-a practice known as _________-to retrieve information that could embarrass a company or compromise information security.

dumpster diving

A __________ filtering firewall can react to an emergent event and update or create rules to deal with the event.

dynamic

A short-term interruption in electrical power availability is known as a ____.

fault

As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________.

hoaxes

In early 2014, in response to Executive Order 13636, NIST published the Cybersecurity Framework, which intends to allow organizations to __________.

identify and prioritize opportunities for improvement within the context of a continuous and repeatable process

The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures, is known as __________.

mean time between failure (MTBF)

Hackers can be generalized into two skill groups: expert and ____________________.

novice

The __________ is the difference between an organization's observed and desired performance.

performance gap

A _________ assigns a status level to employees to designate the maximum level of classified data they may access.

security clearance scheme

The __________ control strategy attempts to shift risk to other assets, other processes, or other organizations.

transference

Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.

trespass

The famous study entitled "Protection Analysis: Final Report" focused on a project undertaken by ARPA to understand and detect __________ in operating systems security.

vulnerabilities

A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.

waterfall

In a(n) __________, assets or threats can be prioritized by identifying criteria with differing levels of importance, assigning a score for each of the criteria, and then summing and ranking those scores.

weighted factor analysis


Set pelajaran terkait

Chapter 04: Ethics in Community Health Nursing Practice Test Bank

View Set

Chapter 62 Musculoskeletal System

View Set

PN comprehensive predictor practice B [2020]

View Set

Review questions for: compare and contrast Mitosis and Meiosis

View Set

Alg Des Ch08: Dynamic Programming

View Set

New York State Auto Damage and Theft quiz 17-71

View Set

Errors and Statistical Significance

View Set