CIS Midterm

Ace your homework & exams now with Quizwiz!

Which risk-analysis value represents the annual probability of a loss?

ARO

Which risk response would be most appropriate if the impact of a risk becoming a reality is negligible?

Accept

What a key principle of risk management programs?

Apply controls in ascending order of risk.

The anti-malware utility is one of the most popular backdoor tools in use today.

False

Which network device is capable of blocking network connections that are identified as potentially malicious?

Intrusion prevention system (IPS)

The System/Application Domain holds all the mission-critical systems, applications, and data.

True

Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission from the clients to perform this testing as part of a paid contract. What type of person is Yuri?

White-hat hacker

In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for attempted logon retries.

False

Risk management is responding to a negative event when it occurs.

False

Service-level agreements (SLAs) are optical backbone trunks for private optical backbone networks.

False

Wardialers are becoming more frequently used given the rise of Voice over IP (VoIP).

False

With adequate security controls and defenses, an organization can often reduce its risk to zero.

False

Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would jeopardize confidentiality?

Applying strong encryption

The most critical aspect of a WAN services contract is how the service provider supplies troubleshooting, network management, and security management services.

True

sing a secure logon and authentication process is one of the six steps used to prevent malware.

True

Which of the following statements best describes the relationship of a BCP to a DRP?

A DRP is a component of a BCP.

Simple Network Management Protocol (SNMP) is used for network device monitoring, alarm, and performance

False

Which one of the following is an example of a disclosure threat?

Espionage

A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource.

False

A phishing attack "poisons" a domain name on a domain name server.

False

Cryptography is the process of transforming data from cleartext into ciphertext.

False

Denial of service (DoS) attacks are larger in scope than distributed denial of service (DDoS) attacks.

False

Which element of the security policy framework offers suggestions rather than mandatory actions?

Guideline

Which one of the following is NOT a good technique for performing authentication of an end user?

Identification number

Which type of denial of service attack exploits the existence of software flaws to disrupt a service?

Logic attack

Which element of the security policy framework requires approval from upper management and applies to the entire organization?

Policy

Which type of risk analysis uses relative ranking?

Qualitative risk analysis

Which type of risk analysis uses formulas and numeric values to indicate risk severity?

Quantitative risk analysis

Which formula is typically used to describe the components of information security risks?

Risk = Threat X Vulnerability

According to PMI, which term describes the list of identified risks?

Risk register

What is NOT one of the three tenets of information security?

Safety

In which type of attack does the attacker attempt to take over an existing connection between two systems?

Session hijacking

Which term describes an action that can damage or compromise an asset?

Threat

Which term describes any action that could damage an asset?

Threat

Which risk-response option would best describe purchasing fire insurance?

Transfer

A DoS attack is a coordinated attempt to deny service by occupying a computer to perform large amounts of unnecessary tasks.

True

A man-in-the-middle attack takes advantage of the multihop process used by many types of networks.

True

A phishing email is a fake or bogus email intended to trick the recipient into clicking on an embedded URL link or opening an email attachment.

True

An alteration threat violates information integrity.

True

Encrypting the data within databases and storage devices gives an added layer of security.

True

Which term is used to indicate the amount of data loss that is acceptable?

RPO

Which element of the IT security policy framework provides detailed written definitions for hardware and software and how they are to be used?

Standard

It is faster to create the incremental weekday backups than the differential backups.

True

Organizations should start defining their IT security policy framework by defining an asset classification policy

True

Risk refers to the amount of harm a threat exploiting a vulnerability can cause.

True


Related study sets

AP US History Ch 9: Sectionalism

View Set

MGMT exam 1 Schwartz's Value Theory

View Set

Pulm Exam 3 PPT questions and exam master

View Set

MODULE 12: FOCUS FOUR - Electrical Safety

View Set

Regiones geográficas de Puerto Rico

View Set

ABA612 Final Exam Study Guide (1)

View Set

Chemical/Physical Changes 7th grade Salome

View Set

dermatologic disorders and wounds PREPU

View Set