Chapter 4 security Practice Exams – Flashcards
Unlock all answers in this set
Unlock answersquestion
            Which of the following is defined as a contract which prescribes the technical support or business parameters that a provider will bestow to its client?
answer
        Service level agreement
question
            HIPAA is a set of federal regulations that define security guidelines that enforce the protection of what?
answer
        Privacy
question
            Which of the following policies specifically protects PII?
answer
        Privacy
question
            Which of the following defines an acceptable use agreement?
answer
        An agreement which identifies the employee's right to use company property such as Internet access and computer equipment for personal use.
question
            You have recently discovered that a network attack has compromised your database server. In the process, customer credit card numbers might have been taken by an attacker. You have stopped the attack and put measures in place to prevent the same incident from occurring in the future. What else might you be legally required to do?
answer
        Contact your customers to let them know of the security breach
question
            When informing an employee that they are being terminated, what is the most important activity?
answer
        Disabling their network access
question
            What is the most effective means of improving or enforcing security in any environment?
answer
        User awareness training
question
            You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to best prevent extracting data from the discs?
answer
        Shredding
question
            Which of the following best describes the concept of due care or due diligence?
answer
        Reasonable precautions, based on industry best practices, are utilized and documented.
question
            Which of the following is a high-level, general statement about the role of security in the organization?
answer
        Policy
question
            Which of the following is a recommendation to use when a specific standard or procedure does not exist?
answer
        Guideline
question
            Who has the responsibility for the development of a security policy?
answer
        Senior Management
question
            What is the primary purpose of source code escrow?
answer
        To obtain change rights over software after the vendor goes out of business
question
            Which of the following is the best protection against security violations?
answer
        Defense in depth
question
            What is the primary purpose of change control?
answer
        Prevent unmanaged change
question
            Match each manageable network plan milestone on the left with the tasks that are associated with that milestone on the right.
answer
        Make sure that remote access connections are secure Reach your network Create a list of all protocols being used on the network Map your network Identify the choke points on the network Protect your network Use timestamps on all documents Prepare to document Create a list of all devices Map your network
question
            Mach each manageable network plan milestone on the left with the task that are associated with that milestone on the right.
answer
        Remove insecure protocols Reach your network Implement the principle of least privilege Control your network Segregate and isolate networks Protect your network Establish an update management process Manage your network Establish a baseline for all systems Manage your network
question
            You have been recently hired as the new network administrator for a startup company. The company's network was implemented prior to your arrival. One of the first tasks you need to complete in your new position is to develop a manageable network plan for the network. Which task should you complete as a pair of this milestone? select two
answer
        Identify and document each user on the network Physically secure high-value systems
question
            When recovery is being performed due to disaster, which services are to be stabilized first?
answer
        Mission critical
question
            In business continuity planning, what is the primary focus of the scope?
answer
        Business processes
question
            What is the primary goal of business continuity planning?
answer
        Maintaining business operations with reduced or restricted infrastructure capabilities or resources
question
            The company is implementing a Disaster Recovery Plan (DRP) and a Business Continuity Plan (BCP). It is time for the control tests and the company would like to perform compliance testing. Which of the following best describes compliance testing?
answer
        The testing of control procedures to see if they are working as expected and are being implemented in accordance with management policies.
question
            When is a BCP or DRP design and development actually completed?
answer
        Never
question
            As a BCP or DRP plan evolves over time, what is the most important task to perform when rolling out a new version of the plan?
answer
        Collect and destroy all old plan copies
question
            You are a database administrator and the first responder for database attacks. You have decided to test one part of your current Business Continuity Plan (BCP) with two other database professionals. Which type of BCP test is this considered?
answer
        Tabletop exercise
question
            Which of the following is "NOT" a valid response to a risk discovered during a risk analysis?
answer
        Denial
question
            Which of the following best defines Single Loss Expectancy (SLE)?
answer
        The total monetary loss associated with a single occurrence of a threat
question
            What is the average number of times that a specific risk is likely to be realized?
answer
        Annualized Rate of Occurrence
question
            When analyzing assets, which analysis method assigns financial values to assets?
answer
        Quantitative
question
            Which of the following statement is true regards to risk analysis? (Select two)
answer
        Annualized Rate of Occurrence (ARO) identifies how often in a single year the successful threat attack will occur. Don't implement a countermeasure if the cost is greater than loss
question
            When would choosing to do nothing about an identified risk be acceptable?
answer
        When the cost of protecting the asset is greater than the potential loss
question
            If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?
answer
        Negligence
question
            You have conducted a risk analysis to protect a key company asset. You identify following values:  *Asset value = 400 *Exposure factor = 75 * Annualized Rate of Occurrence =.25 What is the Annualized Loss Expectancy (ALE)?
answer
        75
question
            When conducting a risk assessment, how is the Annualized Rate of Occurrence (ARO) calculated?
answer
        Through historical data provided by insurance companies and crime statistics.
question
            Purchasing insurance is what type of response to risk?
answer
        Transference
question
            To determine the value of the company assets, an anonymous survey was used to collect the opinions of all senior and mid-level managers. Which asset valuation method was used?
answer
        Delphi method
question
            You have conducted a risk analysis to protect a key company asset. You identify following values:  *Asset value = 400 *Exposure factor = 75 * Annualized Rate of Occurrence =.25 What is the Single Loss Expectancy (SLE)?
answer
        300
question
            You have conducted a risk analysis to protect a key company asset. You identify following values:  *Asset value = 400 *Exposure factor = 75 * Annualized Rate of Occurrence (ARO) =.25 Countermeasure A has a cost of 320 and will protect the asset for four years. Countermeasure B has an annual cost of 85. An insurance policy to protect the asset has an annual premium of 90. What should you do?
answer
        Accept the risk or find another countermeasure.
question
            Which type of Data Loss Prevention system is usually installed near the network perimeter to detect sensitive data that is being transmitted in violation of organization security policies?
answer
        Network DLP
question
            You are a network administrator over two Windows-based sites. You have almost 2000 employees with workstations and 64 servers that need to be more secure. You have decided to implement a Data Loss Prevention (DLP) solution to detect and stop breaches of sensitive data. You decide to implement e-mail and instant messaging communication controls so that messages that violate your organizations security policy are blocked at the workstation before being transmitted on the network. Which DLP solution should you implement?
answer
        Endpoint DLP
question
            After an intrusion has occurred and the intruder has been removed from the system, which of the following is the best next step or action to take?
answer
        Back up all logs and audits regarding the incident
question
            Which of the following is an important aspect of evidence gathering?
answer
        Back up all log files and audit trails
question
            Which method can be used to verify that a bit-level image copy of a hard drive is an exact clone of the original hard drive collected as evidence?
answer
        Hashing
question
            The immediate preservation of evidence is paramount when conducting a forensic analysis. Which of the following actions is most likely to destroy critical evidence?
answer
        Rebooting the system
question
            How can a criminal investigator ensure the integrity of a removable media device found while collecting evidence?
answer
        Create a checksum using a hashing algorithm
question
            You manage the network for your company. You have recently discovered information on a computer hard drive that might indicate evidence of illegal activity. You want to perform forensic activities on the disk to see what kind of information it contains. What should you do first?
answer
        Make a bit-level copy of the disk
question
            During a recent site survey, you find a rogue wireless access point on your network. Which of the following actions should you take first to protect your network, while still preserving evidence?
answer
        Disconnect the access point from the network
question
            You have discovered a computer that is connected to your network that was used for an attack. You have disconnected the computer from the network to isolate it from the network and stop the attack. What should you do next?
answer
        Perform a memory dump
question
            When conducting a forensic investigation, and assuming that the attack has been stopped, which of the following actions should you perform first?
answer
        Document what's on the screen
question
            Arrange the computer components listed on the left in the order they should be addressed when conducting a forensic evaluation (decreasing data volatility) on the right.
answer
        CPU registers and caches System RAM Paging file Hard Disk File system backup on an external USB drive
question
            What is the best definition of a security incident?
answer
        Violation of security policy
question
            When conducting a forensic investigation, which of the following initial actions is appropriate for preserving evidence?
answer
        Document what's on the screen
question
            What is the most important element related to evidence in addition to the evidence itself?
answer
        chain of custody document
question
            The chain of custody is used for what purposes?
answer
        Listing people coming into contact with evidence
question
            You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this?
answer
        Chain of custody
question
            What is the primary countermeasure to social engineering?
answer
        Awareness
question
            How can an organization help prevent social engineering attacks? (Select two.)
answer
        Educate employees on the risks and countermeasures, Publish and enforce clearly-written security polices
question
            Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through e-mails or Web sites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?
answer
        Phishing
question
            Match the social engineering description on the left with the appropriate attack type on the right.
answer
        Phishing  An attacker sends an email pretending to be from a trusted organization, asking users to access a web site to verify personal information. Whaling An attacker gathers personal information about the target individual, who is a CEO. Spear phishing An attacker gathers personal information about the target individual in an organization. Dumpster diving An attacker searches through an organization's trash looking for sensitive information. Piggybacking An attacker enters a secured building by following an authorized employee through a secure door without providing identification. Vishing An attacker uses a telephone to convince target individuals to reveal their credit card information.
question
            Which of the following is a common form of social engineering attack?
answer
        Hoax virus information e-mails.
question
            You have just received a generic-looking e-mail that is addressed as coming from the administrator of your company. The e-mail says that as part of a system upgrade, you are to go to a Web site and enter your username and password at a new Web site so you can manage your e-mail and spam using the new service. What should you do?
answer
        Verify that the e-mail was sent by the administrator and that this new service is legitimate.
question
            Dumpster diving is a low-tech means of gathering information that may be useful in gaining unauthorized access, or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?
answer
        Establish and enforce a document destruction policy
question
            What is the primary difference between impersonation and masquerading?
answer
        One is more active, the other is more passive
question
            Which of the following social engineering attacks are use Voice over IP (VoIP) to gain sensitive information?
answer
        Vishing
question
            A senior executive reports that she received a suspicious email concerning a sensitive, internal project that is behind production. The email is sent from someone she doesn't know and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. What type of an attack best describes the scenario?
answer
        Whaling
question
            The receptionist received a phone call from an individual claiming to be a partner in a high-level project and requesting sensitive information. The individual is engaging in which type of social engineering attack?
answer
        Authority
question
            By definition, which type of social engineering attack uses of a fictitious scenario to persuade someone to give information for which they are not authorized?
answer
        Pretexting
question
            Which type of social engineering attack uses peer pressure to persuade someone to help an attacker?
answer
        Social validation
question
            You've got just received an e-mail messages that indicates a new serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the WindowsSystem32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. What should your first action based on the message be?
answer
        Verify the information on well-known malicious code threat management Web sites.
question
            Dictionary attacks are often more successful when performed after what reconnaissance action?
answer
        Social engineering
question
            Which of the following is a term used to describe a level of confidence that the evaluation methods were thorough and complete so that the security designation can be trusted?
answer
        Assurance
question
            Which of the following defines system high mode?
answer
        All systems and peripherals within a system are classified and then protected according to the level of classification assigned to the most highly classified object which resides on the system.
question
            Which of the following is "NOT" used by the reference monitor to determine levels of access?
answer
        Ring architecture
question
            Which of the following defines layering in regards to system access control?
answer
        Various tasks are divided into a hierarchical manner to provide security.
question
            Which of the following terms restricts the ability of a program to read and write to memory according to its permissions or access level?
answer
        Confinement
question
            Who is assigned the task of judging the security of a system or network granting it an approval to operate?
answer
        Designated Approving Authority
question
            A process performed in a controlled environment by a third-party which verifies that an IS meets a specific set of security standards before being granted the approval to operate is known as?
answer
        Accreditation
question
            Which is the operating mode of a system that is deployed in such a way so that it operates at a single level of classification and all users who can access the system all have the same specific clearance level as well as all of the need to know over all the data on the system?
answer
        Dedicated
question
            Which of the following components of the Common Criteria (CC) evaluation system is a document written by a user or community that identifies the security requirements for a specific purpose?
answer
        Protection Profile (PP)
question
            Which of the following terms describes the product that is evaluated against the security requirements in the Common Criteria (CC) evaluation system?
answer
        Target of Evaluation (TOE)
question
            Which of the following best describes the Security Target (ST) in the Common Criteria (CC) evaluation system?
answer
        The ST is a document that describes the security properties of a security product.
question
            Which of the following is a representative example of an assigned level of a system that was judged through Common Criteria?
answer
        EAL5
question
            What is another name for a backdoor that was left in a product by the manufacturer by accident?
answer
        Maintenance hook
question
            Which of the following is an action which must take place during the release stage of the SDLC?
answer
        Venders develop and release patches in response to exploited vulnerabilities that have been discovered.
question
            Which of the following development modes is a method used by programmers while writing programs that allows for optimal control over coherence, security, accuracy, and comprehensibility?
answer
        Structured programming
question
            How often should change control management be implemented?
answer
        Any time a production system is altered.
question
            In which phase of the system life cycle is security integrated into the product?
answer
        Project initiation
question
            In which phase of the system life cycle is software testing performed?
answer
        System Development
question
            What is the primary purpose of imposing software life cycle management concepts?
answer
        Increase the quality of software.
question
            What is the primary purpose of forcing employees to take mandatory one-week minimum vacations every year?
answer
        To check for evidence of fraud
question
            What is the primary means by which supervisors can determine whether or not employees are complying with the organization's security policy?
answer
        Auditing
question
            A code of ethics provides for all but which of the following.?
answer
        Clearly defines courses of action to take when complex issue is encountered
question
            Which of the following are typically associated with human resource security policies? (Select two.)
answer
        Background checks Termination
question
            Over the last month you have noticed a significant increase in the occurrence of inappropriate activities performed by employees. What is the best first response step to take in order to improve or maintain the security level of the environment?
answer
        Improve and hold new awareness sessions
question
            As you are helping a user with a computer problem you notice that she has written her password on a note stuck to her computer monitor. You check the password policy of your company and find that the following settings are currently required: Minimum password length = 10 Minimum password age = 4 Maximum password age = 30 Password history = 6 Require complex password that include numbers and symbols Account lockout clipping level = 3  Which of the following is the best action to take to make remembering passwords easier so that she no longer has to write the password down?
answer
        Implement end-user training.
question
            You have installed anti-virus software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again?
answer
        User awareness training
question
            Which of the following defines two-man control?
answer
        Certain tasks should be dual-custody in nature to prevent security breach.
question
            Which of the following is a legal contract between the organization and the employee that specifies the employee is not to disclose the organization's confidential information?
answer
        Non-disclosure agreement
question
            Your company security policy requires separation of duties for all network security matters. Which of the following scenarios best describes this concept?
answer
        The system administrator configures remote access privileges and the security officer reviews and activates each account
question
            Which of the following is "NOT" a protection against collusion?
answer
        Cross training
question
            Which of the following is "NOT" an element of the termination process?
answer
        Dissolution of the NDA
question
            When informing an employee that they are being terminated, what is the most important activity?
answer
        Disabling their network access
question
            The best way to initiate solid administrative control over an organization's employee is to have what element in place?
answer
        Distinct job descriptions
question
            Match the employment process on the left with the appropriate task that should occur during that process on the right.
answer
        Conduct role-based training Employment Verify an individuals job history Pre-employment Show individuals how to protect sensitive information Employment disable a users account Termination Remind individuals of NDA agreements Termination Obtain an individuals credit history Pre-employment
question
            Match each interoperability Agreement document on the left with the appropriate description on the right.
answer
        Specifies exactly which services will be performed by each party  SLA - Service Level Agreement Creates an agreement with a vendor to provide services on an ongoing basis BPO - Blanket Purchase Order Provides a summary of which party is responsible for performing specific tasks MOU - Memorandum of Understanding Documents how the networks will be connected ISA - Interconnection Security Agreement Defines how disputes will be managed SLA - Service Level Agreement Specifies a preset discounted pricing structure BPO - Blanket Purchase Order
question
            Your organization entered into anInteroperability Agreement (IA) with another organization a year ago. As a part of this agreement, a federated trust was established between your domain and the partner domain. The partnership has been in the ongoing operations phase for almost nine months now. As a security administrator, which tasks should you complete during this phase? (Select two.)
answer
        Conduct periodic vulnerability assessments. Verify compliance with the A documents.
question
            Your organization is in the process of negotiating an Interoperability Agreement (IA) with another organization. As a part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. This configuration will allow users in their domain to access resources in your domain and vice versa. As a security administrator, which tasks should you complete during this phase? (Select two.)
answer
        Identify how data ownership will be determined. Identify how data will be shared.
question
            Match each third-party integration phase on the left with the task that need to be completed during the phase on the right.
answer
        Communicate vulnerability assessment findings with the other party.  Ongoing Operations  Disable VPN configurations that allow partner access to your network.  Off-Boarding  Compare your organization's security policies against the partner's policies  On-Boarding  Disable the domain trust relationship between networks. Off-Boarding  Identify how privacy will be protected.  On-Boarding  Draft an ISA.  On-boarding  Conduct regular security audits.  Ongoing-operations
