5.3.1 : Quiz Logical Access (Doshi) Flashcards
The IS auditor reviews logical access control with primary objective to:
A. Access control software is working properly.
B. ensures access is granted as per the approved structure.
C. to protect computer software.
D. to protect computer hardware.
B. ensures access is granted as per the approved structure.
The scope of a logical access control review is primarily to determine whether or not access is granted per the organization’s authorizations. Choices A and C relate to procedures of a logical access control review, rather than objectives. Choice D is relevant to a physical access control review.
During review of critical application system, the IS auditor observes that user accounts are shared. The MAJOR risk resulting from this situation is that:
A. passwords are changed frequently.
B. Outsider can gain access to the system.
C. passwords are easily guessed.
D. user accountability may not be established
D. user accountability may not be established
If same user accounts are shared with multiple employees, it will be difficult to trace the particular employee during audit trail. User accountability may not be established is such scenario.
Which of the following is the best technique for protecting critical data inside the server?
A. Security awareness
B. Reading the security policy
C. Security committee
D. Logical access controls
D. Logical access controls
(1) In any given scenario, preference to be given to preventive controls as compared to detective or deterrent controls. Logical access controls are best preventive controls to ensure data integrity and
confidentiality.
(2) Awareness itself does not protect against unauthorized access or disclosure of information.
(3 )Knowledge of an information systems security policy which should be known by the organizations employees, would help to protect information, but would not prevent the unauthorized access of information.
(4) A security committee is key to the protection of information assets, but would address security issues within a broader perspective.
Which of the following BEST logical control mechanism to ensure that access allowed to users to only those functions needed to perform their duties?
A. Application level access control
B. Data encryption
C. HTTPs protocol
D. Network monitoring device
A. Application level access control
The use of application-level access control programs is a management control that restricts access by limiting users to only those functions needed to perform their duties.
Which of the following is the MOST important objective of data protection?
A. current technology trend
B. Ensuring the confidentiality & integrity of information
C. Denying or authorizing access to the IS system
D. internal processing efficiency
Ensuring the confidentiality and integrity of information
Maintaining data confidentiality and integrity is the most important objective of data security. This is a basic requirement if an organization is to continue as a viable and successful enterprise
The FIRST step in data classification is to:
A. identify data owners.
B. perform a criticality analysis.
C. define access rules.
D. define firewall rules
A. identify data owners.
Data classification is necessary to define access rules based on a need-to-do and need-to know basis. The data owner is responsible for defining the access rules; hence, establishing ownership is the first step in data classification.
IS auditor is reviewing an organization’s logical access security. He should be most concerned if:
A. Passwords are shared.
B. Password files are not protected.
C. Resigned employees’ logon IDs are not deleted immediately.
D. Logon IDs are issued centrally.
B. Password files are not protected.
Unprotected passwords files represent the greatest risk. Such files should be stored in an encrypted manner. Other options are also essential but they are less important than ensuring that the password files are encrypted.
IS auditor is evaluating database-level access control functions. Which of the following access control function will not be in his scope?
A. Creating database profiles for monitoring
B. authorization user at field level.
C. establishing individual accountability
D. Logging database access activities for monitoring access violation
C. establishing individual accountability
Establishing individual accountability is the function of the general operating system. Creating database profiles, verifying user authorization at a field level and logging database access activities for monitoring access violations are all database-level access control functions
IS auditor observed that even though password policy requires passwords to be a combination of letters, numbers and special characters, users are not following the same rigorously. To ensure compliance within security policy, the IS auditor should recommend that:
A. password policy to be simplified.
B. password policy to be sent to all users every month.
C. usage of automated password management tool
D. monthly security awareness training to be delivered.
C. usage of automated password management tool
Among the choices given, use of an automated password management tool is a best preventive control measure. The software would prevent usage of passwords which are not allowed as per policy. It would also provide a method for ensuring frequent changes and would prevent the same user from reusing his/her old password for a designated period of time. Choices A, B and D do not enforce compliance.
An IS auditor observes that default printing options are enabled for all users. In this situation, the IS auditor is MOST likely to conclude that:
A. risk of data confidentially increases.
B. risk if data integrity increases.
C. it improvises the productivity of employees.
D. it ensures smooth flow of information among users
A. risk of data confidentially increases.
Risk of data confidentiality increases as any user can print documents. Print option will not impact data integrity as data integrity can be impacted by write/delete access for user.
IS Auditor is reviewing wireless network security policy of the organization. Which of the following action would make the wireless network more secure?
A. Disabling MAC (Media Access Control) address filtering
B. Disabling WPA (Wi-Fi Protected Access Protocol)
C. Enabling SSID (service set identifier) broadcasting
D. Disabling SSID (service set identifier) broadcasting
D. Disabling SSID (service set identifier) broadcasting
Disabling SSID broadcasting adds security by making it more difficult for unauthorized users to find the name of the access point. Opting other options will in fact reduces the security of network.
Auditor is reviewing wireless network security of the organization. Which of the following should be a concern to an IS auditor?
A. 128-bit-static-key WEP (Wired Equivalent Privacy) encryption is enabled.
B. SSID (Service Set IDentifier) broadcasting has been enabled.
C. Antivirus software has been installed in all wireless clients.
D. MAC (Media Access Control) access control filtering has been deployed.
B. SSID (Service Set IDentifier) broadcasting has been enabled.
Enabling SSID broadcasting reduces the security by making it easier for unauthorized users to find the name of the access point. Opting other options will strengthen the security of network.
IS auditor is evaluating general operating system access control functions. Which of the following access control function will be in his scope?
A. Logging user activities
B. Logging data communication access activities
C. Verifying user authorization at the field level
D. Changing data files
A. Logging user activities
General operating system access control functions include log user activities, log events, etc. Choice B is a network control feature. Choices C and D are database- and/or application level access control functions
An IS auditor reviewing system controls should be most concerned that:
A. security and performance requirements are considered.
B. changes are recorded in log.
C. process for change authorization is in place.
D. restricted access for system parameters is in place
A. security and performance requirements are considered.
The primary concern is to ensure that security as well as performance aspects have been considered. This helps to ensure that control objectives are aligned with business objectives. Log maintenance and change authorization are also important but in absence of proper security and performance requirements same may not be effective.
Most effective transmission media in terms of security against unauthorized access is:
A. Copper wire
B. Twisted pair
C. Fiber-optic cables
D. Coaxial cables
C. Fiber-optic cables
Fiber-optic cables are more secure than the other media. Other media can be compromised easily as compared to fiber-optic.