1 - Information Security Governance and Risk Management Flashcards
- Which of the following is not an example of security control that ensures confidentiality?a. Data classificationb. Encryptionc. Restricting changes d. Network traffic padding
C: Restricting changes is an integrity protecting security mechanism.
- Who is ultimately responsible and liable if the security perimeter of an organization is violated by an intruder and asset losses occur?a. Senior managementb. Network or system administratorsc. Security guardsd. End users
A: Senior management is ultimately responsible and liable if the security perimeter of an organization is violated by an intruder and asset losses occur. Senior management is responsible for all aspects of security and is the primary decision maker. However, in most cases the implementation of security is delegated to lower levels of the authority hierarchy, such as the network or system administrators.
- Which of the following is not an example of a technical or logical security control?a. Encryptionb. Personnel screeningc. Identificationd. Access Control Lists
B: Personnel screening is an administrative security control. There are three types of security controls: administrative, physical, and logical or technical.
- Which of the following is an administrative security control?a. Personnel screeningb. Encryptionc. Authorizationd. Security guards
A: Personnel screening is an administrative security control
- Which of the following is a technical security control?a. Standardsb. Security devices c. Door locksd. Personnel screening
B: Security devices are technical security controls.
- Which of the following is a physical security control?a. Logical access controlsb. Security awareness trainingc. Identificationd. Environmental controls
D: Environmental controls are physical security controls.
- Which of the following is the best personnel arrangement for the design and management of security for an organization?a. A single security professional from within the organizationb. A team of security professionals from the organizationc. A team of employees representing every department within the organization d. An outside consultant
B: The best personnel arrangement for the design and management of security for an organization is a team of internal security professionals.
- Which of the following is not a role or responsibility of the Security Administration team or group within an organization?a. Monitoring the security of the entire organizationb. Integrating security into the business environmentc. Identifying, valuating, and classifying assetsd. Approving the security policy.
D: Approving the security policy is the responsibility of senior management, not that of the Security Administration team or group within an organization.
- Who is ultimately responsible for negligence in protecting the assets of an organization?a. Senior managementb. Security teamc. IT departmentd. Data custodian
A: Senior management is ultimately responsible for implementing prudent due care and is liable for negligence in protecting the assets of an organization.
- Which of the following is not one of the three security control types that a security administrator can employ to manage and impose security?a. Administrativeb. Technicalc. Strategicd. Physical
C: Administrative, technical, and physical are the three security control types that a security administrator can employ to manage and impose security.
- Which of the following is not an element in the CIA triad?a. Availabilityb. Integrityc. Privacyd. Confidentiality
C: Confidentiality, integrity, and availability are the elements of the CIA triad.
- Which of the following is a valid definition for confidentiality?a. Unauthorized disclosure is prevented.b. Unauthorized modification is preventedc. Resources are accessible at all times by authorized users.d. Disasters can be recovered from quickly.
A: Confidentiality can be defined by “Unauthorized disclosure is prevented.”
- Which of the following is not a task assigned to a data owner?a. Assign classifications to datab. Dictate how information is to be protectedc. Delegate security responsibilities to data custodiansd. Implement security controls
D: Implementing security controls is the responsibility of the security administration team or data custodians, not senior management.
- A security administrator may employ all but which of the following types of controls to implement a security solution?a. executiveb. administrativec. technicald. physical
A: Executive is not a valid type of security control. The three valid types of security control are administrative, technical (or logical), and physical.
- Which of the following is an example of an administrative security control?a. security guardsb. policiesc. locksd. intrusion detection systems
B: Policies are an example of an administrative security control.
- Which of the following is not an example of an administrative security control?a. Standardsb. Guidelinesc. Identificationd. Personnel screening
C: Identification is an example of a logical/technical security control.
- Which of the following is not one of the fundamental principles of security included in the CIA triad?a. Confidentialityb. Integrityc. Accountabilityd. Availability
C: While accountability is an important part of IT security, it is not one of the three fundamental principles of security included in the CIA triad, which includes Confidentiality, Integrity and Availability.
- The ability of a computer system to provide adequate capacity for predictable performance represents which of the fundamental security principles of the CIA triad?a. Confidentialityb. Integrityc. Accountabilityd. Availability
D: The ability of a computer system to provide adequate capacity for predictable performance is an example of Availability.
- Which of the following is not an example of a physical security control?a. Dogsb. Fencingc. Biometric authenticationd. Badge IDs
C: Biometric authentication is an example of a technical/logical security control.
- Which of the following is not an example of a valid activity of security management?a. Evaluating the loss of productivity due to restrictions imposed by the security solutionb. Manage user complaints of access restrictions or resource unavailability, by fine tuning least privilege accessc. Proposing to senior management the alteration or rescinding of a security policyd. Deploy a new security control in a mission critical environment
D: It is not a good security management practice to implement new security controls, especially in mission critical environments, before that control has been thoroughly tested.
- Which of the following is an example of a technical security control?a. proceduresb. awareness trainingc. perimeter lightingd. encryption
D: Encryption is an example of a technical/logical security control.
- Which of the following is not an example of a technical security control?a. Fire detection and suppressionb. Access control matrixc. Authorizationd. Traffic filtering
A: Fire detection and suppression is an example of a physical security control.
- Which of the following is an example of a physical security control?a. Rules based access controlsb. CCTVc. Exit interviewsd. Traffic tunneling
B: CCTV is an example of a physical security control.
- Which of the following is an example of a security control that focuses on maintaining availability?a. Encrypted transport of datab. Quick recovery from faultsc. Fixed packet length transmissionsd. User awareness training
B: Quick recovery from faults is an example of a security control that focuses on maintaining availability.
- Which of the following is not an example of a security control that focuses on maintaining availability?a. clustered machinesb. avoiding single points of failurec. implementing need to know access controlsd. controlling the environmental characteristics
C: Implementing need to know access controls is an example of a security control that focuses on maintaining confidentiality.
- What is a vulnerability?a. The likelihood that a system will experience a security breachb. instance of being exposed to losses from a threat agentc. A potential danger to information or systemsd. The absence or weakness of a safeguard that could be exploited
D: A vulnerability is the absence or weakness of a safeguard that could be exploited.
- Which of the following is not an example of a security control that focuses on maintaining confidentialitya. Data encryptionb. access controlc. change restrictionsd. personnel training
C: Change restrictions is an example of a security control that focuses on maintaining integrity.
- Which of the following is an example of a security control that focuses on maintaining integrity?a. Network monitoringb. Denial of service attack protectionc. data classificationd. Encryption of data in transit
D: Encryption of data in transit is an example of a security control that focuses on maintaining integrity.
- Which of the following is not an example of a security control that focuses on maintaining integrity?a. Network monitoringb. Managing alterations to data in a databasec. Validating input datad. Message Digest
A: Network monitoring is an example of a security control that focuses on maintaining availability.
- For a security policy to be effective and comprehensive, it must thoroughly address the three fundamental principles of security, which are?a. Confidentiality, Integrity, Availabilityb. Confinement, Integrity, Accessibilityc. Corroboration, Interrogation, Authorizationd. Continuity, Intelligence, Authentication
A: The three fundamental principles of security are Confidentiality, Integrity, and Availability.
- Which of the following is an example of a security control that focuses on maintaining confidentiality?a. controlled interface to access datab. network traffic paddingc. input validity verificationd. backups
B: Network traffic padding is an example of a security control that focuses on maintaining confidentiality.
- Which of the following is not an example of a risk?a. Failing to review audit logsb. Failing to enforce password policyc. Not updating anti-virus softwared. Not filtering traffic on border communication links
A: Failing to review audit logs is not a risk, but it does show a lack of compliance with a realistic security policy. Audit logs will often reveal when a risk has become an actual intrusion or attack.
- Which of the following is not a method by which risk is reduced or eliminated?a. Applying a safeguardb. Waitingc. Removing the vulnerabilityd. Blocking the threat agent
B: Waiting is not a valid response to risk and waiting will not reduce risk.
- An instance of being exposed to losses from a threat is known as?a. Vulnerabilityb. Single loss expectancyc. Exposured. Breach
C: Exposure is an instance of being exposed to losses from a threat.
- Which of the following is not an example of a vulnerability?a. Assigning all users access based on job descriptionsb. Modems on clientsc. Open portsd. Access to the server room
A: Assigning all users access based on job descriptions is a valid form of security control, however it is not an example of a vulnerability.
- Which of the following is an example of a vulnerability?a. Restricting access to authorized usersb. Failing to enforce the password policyc. Filtering traffic at all communication bordersd. Implementing physical access restrictions
B: Failing to enforce the password policy is an example of a vulnerability.
- Which of the following is not an example of a threat?a. Intruder access through a firewallb. Activities that violate the security policyc. A biometric device failing to authenticate a valid userd. A natural disaster that destroys the IT infrastructure
C: A biometric device failing to authenticate a valid user is a False Rejection (Type I) error, but it is not a threat.
- Which of the following is an example of a threat?a. Blocking all attachments at the e-mail gatewayb. Scanning for malicious codec. Performing vulnerability assessment without senior management approvald. A user destroying confidential data
D: A user destroying confidential data is an example of a threat.
- Which of the following is not true regarding an operational security plan?a. includes an approved software listb. integrates the elements of other plansc. defines short term tasks necessary to the accomplishing of objectivesd. prescribes a logical sequence of initiatives
A: A system specific plan includes an approved software list.
- The purpose of a safeguard is to?a. Remove a threat agentb. Enhance an exposurec. Update a security policyd. Reduce or remove a vulnerability
D: A safeguard’s purpose is to reduce or remove a vulnerability.
- Which of the following is not an example of a safeguard?a. Relaxing the filters on a firewallb. Imposing strong password managementc. Deploying security guardsd. Enable BIOS passwords
A: Relaxing the filters on a firewall is the removal of a safeguard.
- The top down approach to security management provides for all but which of the following?a. provides for policy initiation, support, and directionb. provides for assignment of responsibility to down-level administratorsc. provides for development and implementation of standards, guidelines, and proceduresd. provides for development of security control configurations
B: The top down approach to security management does not provide for the assignment of responsibility to down-level administrators. Senior management is always ultimately responsible for the success or failure of the security policy and resulting security solution.
- Which of the following is not an example of a risk?a. Human errorb. Equipment malfunctionc. Replacing human security guards with dogsd. Disgruntled insider
C: Replacing human security guards with dogs is a change in a security access control, it is not an example of a risk.
- Risk is the ______________ of something happening that will damage assetsa. certaintyb. evaluationc. preventiond. possibility
D: Risk is the possibility of something happening that will damage assets.
- When will risk be totally eliminated?a. When the organization ceases to existb. When the security policy is properly implementedc. When all systems are powered downd. When all users have completed security awareness training
A: Risk will be totally eliminated only when the organization ceases to exist.
- Which of the following represent the primary security factors that a private sector organization is concerned about?a. data confidentiality and integrityb. data availability and integrityc. data non-repudiation and encryptiond. data availability and confidentiality
B: Private sector organizations are primarily concerned about data availability and integrity.
- The most important aspect of security to military organizations is?a. integrityb. non-repudiationc. confidentialityd. availability
C: Confidentiality is the most important aspect of security to military organizations.
- What is the primary goal of risk management?a. Remove all riskb. Perform a qualitative analysis of riskc. Remove liability from senior managementd. Reduce risk to an acceptable level
D: The primary goal of risk management is to reduce risk to an acceptable level.
- An effective safeguard, when evaluated via risk analysis, should?a. cost less than the loss possible via the riskb. offer a complete solution for an individual specified riskc. be invisible to the userd. allow itself to be removed easily
A: An effective safeguard from a risk analysis perspective is that the safeguard should cost less than the cost of the loss due to the risk.
- All but which of the following apply to senior management in relation to risk analysis?a. Directs and supports risk analysisb. Is a member of the Risk Assessment teamc. Acts appropriately upon the resultsd. Reviews the outcome of the analysis
B: The Risk Assessment Team should be comprised of a representative from most or all departments, not necessarily senior management.
- The first step in risk analysis is?a. countermeasure Selectionb. cost/benefit analysisc. asset valuationd. qualitative analysis of risk
C: Asset valuation is the first step in risk analysis. If assets have no value, there is no need to protect them.
- Risk management attempts to reduce risk to an acceptable level by performing all but which of the following activities?a. Track down intruders for prosecutionb. Analyze the probability of attack occurrencec. Predict the impact of a breachd. Evaluate safeguards
A: Tracking down intruders for prosecution is not function or element of risk management, it is possibly a factor in intrusion detection.
- Which of the following is not an example of a risk?a. physical damageb. blocking portsc. misuse of data d. buffer overflow
B: Blocking ports is a safeguard, not a risk.
- The value of an asset helps to determine?a. length of time committed to performing qualitative analysisb. whether or not to perform a quantitative analysisc. whether a logical or a technical control is evaluatedd. the relative strength and cost of the safeguard
D: The value of an asset helps to determine the relative strength and cost of the safeguard selected to protect it.