IS 413 FINAL UAB 2020

Ace your homework & exams now with Quizwiz!

What program, released in 2013, is an example of ransomware?

Crypt0L0cker

Betty visits a local library with her young children. She notices that someone using a computer terminal in the library is visiting pornographic websites. What law requires that the library filter offensive web content for minors?

Children's Internet Protection Act (CIPA)

Which type of attack involves the creation of some deception in order to trick unsuspecting users?

Fabrication

A digitized signature is a combination of a strong hash of a message and a secret key.

False

Privacy is the process used to keep data private.

False

What entity is responsible for overseeing compliance with Family Educational Rights and Privacy Act (FERPA)?

Family Policy Compliance Office (FPCO)

Adam's company recently suffered an attack where hackers exploited an SQL injection issue on their web server and stole sensitive information from a database. What term describes this activity?

Incident

Rachel is investigating an information security incident that took place at the high school where she works. She suspects that students may have broken into the student records system and altered their grades. If correct, which one of the tenets of information security did this attack violate?

Integrity

Maria's company recently experienced a major system outage due to the failure of a critical component. During that time period, the company did not register any sales through its online site. Which type of loss did the company experience as a result of lost sales?

Opportunity cost

Christopher is designing a security policy for his organization. He would like to use an approach that allows a reasonable list of activities but does not allow other activities. Which permission level is he planning to use?

Prudent

Earl is preparing a risk register for his organization's risk management program. Which data element is LEAST likely to be included in a risk register?

Risk survey results

Which scenario presents a unique challenge for developers of mobile applications?

Selecting multiple items from a list

Because people inside an organization generally have more detailed knowledge of the IT infrastructure than outsiders do, they can place logic bombs more easily.

True

Classification scope determines what data you should classify; classification process determines how you handle classified data.

True

In an incremental backup, you start with a full backup when network traffic is light. Then, each night, you back up only that day's changes.

True

Information systems security is about ensuring the confidentiality, integrity, and availability of IT infrastructures and the systems they comprise.

True

Message authentication confirms the identity of the person who started a correspondence.

True

Organizations should start defining their IT security policy framework by defining an asset classification policy.

True

The idea that users should be granted only the levels of permissions they need in order to perform their duties is called the principle of least privilege.

True

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. What term describes the issue that Adam discovered?

Vulnerability

What is the maximum value for any octet in an IPv4 IP address?

255

What is NOT a principle for privacy created by the Organization for Economic Cooperation and Development (OECD)?

An organization should share its information.

Federal agencies are required to name a senior official in charge of information security. What title is normally given to these individuals?

Chief information security officer (CISO)

Which one of the following is an example of a direct cost that might result from a business disruption?

Facility repair

A bricks-and-mortar strategy includes marketing and selling goods and services on the Internet.

False

Another name for a border firewall is a DMZ firewall.

False

Continuity of critical business functions and operations is the first priority in a well-balanced business continuity plan (BCP).

False

During the secure phase of a security review, you review and measure all controls to capture actions and changes on the system.

False

Service-level agreements (SLAs) are optical backbone trunks for private optical backbone networks.

False

Terminal Access Controller Access Control System Plus (TACACS+) is an authentication server that uses client and user configuration files.

False

Wardialers are becoming more frequently used given the rise of Voice over IP (VoIP).

False

Betsy recently assumed an information security role for a hospital located in the United States. What compliance regulation applies specifically to healthcare providers?

HIPAA

What is a set of concepts and policies for managing IT infrastructure, development, and operations?

IT Infrastructure Library (ITIL)

Brian needs to design a control that prevents piggybacking, only allowing one person to enter a facility at a time. What type of control would best meet this need?

Mantraps

Which one of the following measures the average amount of time that it takes to repair a system, application, or component?

Mean time to repair (MTTR)

Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?

Payment Card Industry Data Security Standard (PCI DSS)

Which data source comes first in the order of volatility when conducting a forensic investigation?

RAM

A personnel safety plan should include an escape plan.

True

An electronic mail bomb is a form of malicious macro attack that typically involves an email attachment that contains macros designed to inflict maximum damage.

True

In remote journaling, a system writes a log of online transactions to an offsite location.

True

The International Electrotechnical Commission (IEC) was instrumental in the development of standards for electrical measurements, including gauss, hertz, and weber.

True

The recovery point objective (RPO) can come from the business impact analysis or sometimes from a government mandate, such as banking laws.

True

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?

VPN concentrator

Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission from the clients to perform this testing as part of a paid contract. What type of person is Yuri?

White-hat hacker

Which type of attack against a web application uses a newly discovered vulnerability that is not patchable?

Zero-day attack

The auto industry has not yet implemented the Internet of Things (IoT).

False

Which one of the following is the best example of an authorization control?

Access control lists

Which type of password attack attempts all possible combinations of a password in an attempt to guess the correct value?

Brute-force attack

Which element is NOT a core component of the ISO 27002 standard?

Cryptography

A hardware configuration chart should NOT include copies of software configurations.

False

A phishing attack "poisons" a domain name on a domain name server.

False

Certification is the formal agreement by an authorizing official to accept the risk of implementing a system.

False

Which type of authentication includes smart cards?

Ownership

From a security perspective, what should organizations expect will occur as they become more dependent upon the Internet of Things (IoT)?

Security risks will increase.

Backdoor programs are typically more dangerous than computer viruses.

True

The Government Information Security Reform Act (Security Reform Act) of 2000 focuses on management and evaluation of the security of unclassified and national security systems.

True

Allie is working on the development of a web browser and wants to make sure that the browser correctly implements the Hypertext Markup Language (HTML) standard. What organization's documentation should she turn to for the authoritative source of information?

World Wide Web Consortium (W3C)

You should use easy-to-remember personal information to create secure passwords.

False

A keyword mixed alphabet cipher uses a cipher alphabet that consists of a keyword, minus duplicates, followed by the remaining letters of the alphabet.

True

Jacob is conducting an audit of the security controls at an organization as an independent reviewer. Which question would NOT be part of his audit?

Is the security control likely to become obsolete in the near future?

In which type of attack does the attacker attempt to take over an existing connection between two systems?

Session hijacking

Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a web browser. Which service delivery model is Kaira's company using?

Software as a Service (SaaS)

A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks.

True

A trusted operating system (TOS) provides features that satisfy specific government requirements for security.

True

After audit activities are completed, auditors perform data analysis.

True

American National Standards Institute (ANSI) was formed in 1918 through the merger of five engineering societies and three government agencies.

True

Henry is creating a firewall rule that will allow inbound mail to the organization. What TCP port must he allow through the firewall?

25

Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication?

443

The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

True

When servers need operating system upgrades or patches, administrators take them offline intentionally so they can perform the necessary work without risking malicious attacks.

True

What is NOT a commonly used endpoint security technique?

Network firewall

Which security testing activity uses tools that scan for services running on systems?

Network mapping

What term describes the risk that exists after an organization has performed all planned countermeasures and controls?

Residual risk

Which one of the following principles is NOT a component of the Biba integrity model?

Subjects cannot change objects that have a lower integrity level.

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows?

Switch

Aditya is attempting to classify information regarding a new project that his organization will undertake in secret. Which characteristic is NOT normally used to make these type of classification decisions?

Threat

A IT security policy framework is like an outline that identifies where security controls should be used.

True

Digital signatures require asymmetric key cryptography.

True

Bricks-and-mortar stores are completely obsolete now.

False

Change doesn't create risk for a business.

False

Committee of Sponsoring Organizations (COSO) is a set of best practices for IT management.

False

Cryptographic key distribution is typically done by phone.

False

Hypertext Transfer Protocol (HTTP) encrypts data transfers between secure browsers and secure web pages.

False

In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be.

False

Often an extension of a memorandum of understanding (MOU), the blanket purchase agreement (BPA) serves as an agreement that documents the technical requirements of interconnected assets.

False

The first step in creating a comprehensive disaster recovery plan (DRP) is to document likely impact scenarios.

False

The main difference between a virus and a worm is that a virus does not need a host program to infect.

False

The term "data owner" refers to the person or group that manages an IT infrastructure.

False

The term certificate authority (CA) refers to a trusted repository of all public keys.

False

Trojans are self-contained programs designed to propagate from one host machine to another using the host's own network communications protocols.

False

Hypertext Transfer Protocol (HTTP) is the communications protocol between web browsers and websites with data in cleartext.

True

What compliance regulation applies specifically to the educational records maintained by schools about students?

Family Education Rights and Privacy Act (FERPA)

Screen locks are a form of endpoint device security control.

True

During an audit, an auditor compares the current setting of a computer or device with a benchmark to help identify differences.

True

For businesses and organizations under recent compliance laws, data classification standards typically include private, confidential, internal use only, and public domain categories.

True

What type of system is intentionally exposed to attackers in an attempt to lure them out?

Honeypot

Single sign-on (SSO) can provide for stronger passwords because with only one password to remember, users are generally willing to use stronger passwords.

True

What is NOT a typical sign of virus activity on a system?

Unexpected power failures

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?

Hub

A smurf attack tricks users into providing logon information on what appears to be a legitimate website but is in fact a website set up by an attacker to obtain this information.

False

Deterrent controls identify that a threat has landed in your system.

False

IoT devices cannot share and communicate your IoT device data to other systems and applications without your authorization or knowledge.

False

The International Standard Book Number (ISBN) is an IEEE standard.

False

The anti-malware utility is one of the most popular backdoor tools in use today.

False

Which one of the following is an example of a logical access control?

Password

Gina is preparing to monitor network activity using packet sniffing. Which technology is most likely to interfere with this effort if used on the network?

Secure Sockets Layer (SSL)

Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different officers to enter their access codes before allowing the system to engage. Which principle of security is this following?

Separation of duties

Social engineering is deceiving or using people to get around security controls.

True

Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?

Applying security updates promptly

Betty receives a cipher text message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?

Decryption

Beth must purchase firewalls for several network circuits used by her organization. Which one circuit will have the highest possible network throughput?

OC-12

Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time?

Online Certificate Status Protocol (OCSP)

Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working?

Presentation

Which of the following does NOT offer authentication, authorization, and accounting (AAA) services?

Redundant Array of Independent Disks (RAID)

What type of malicious software allows an attacker to remotely control a compromised computer?

Remote Access Tool (RAT)

Which activity is an auditor least likely to conduct during the information-gathering phase of an audit?

Report writing

A computer virus is an executable program that attaches to, or infects, other executable programs.

True

Simple Network Management Protocol (SNMP) is used for network device monitoring, alarm, and performance.

True

Some vending machines are equipped with a cellular phone network antenna for secure credit card transaction processing.

True

The three main categories of network security risk are reconnaissance, eavesdropping, and denial of service.

True


Related study sets

IPS 2.3 Peristiwa penting dalam keluarga

View Set

Behavioral PrepU Chapter 24: Personality & Impulse-Control Disorders

View Set

Biology 111- Chapter 9 Test Bank

View Set

Fundamental 1101 PrepU Review Module 1

View Set

Word 1: Copy,Cut, and Paste tools

View Set

Week 6: Chapter 9,10 & 12 Fostering Corporate Entrepreneurship

View Set

Chapter 24: Health Promotion of the School-Age Child and Family

View Set

Section 1.4: Delay, loss, and throughput in packet switched networks

View Set