6 - Operations Security Flashcards
- Which of the following is not an important aspect of the new employee hiring process?a. Background screeningb. Drug testingc. Non-disclosure agreementsd. Exit interview
D: The exit interview is part of the termination process.
- Which of the following is considered the lowest level of privilege?a. Read onlyb. Read-Write c. Change accessd. Need to know
A: Read only is the lowest privilege level.
- The first step in hiring a new employee is what?a. Screening candidatesb. Creating the job descriptionc. Signing non-disclosure agreementsd. Background verification
B: The first step in hiring a new employee is the creation of a job description. Without a job description there is no clear understanding of who is needed and the work tasks they will be required to perform.
- What type of security controls are used to encourage compliance with other security controls?a. directiveb. recoveryc. applicationd. transaction
A: Directive or deterrent controls are used to encourage compliance with other security controls.
- The Orange Book defines two types of assurance. Which of the following are they?a. Life cycle and Developmentb. Operational and Life cyclec. Development and Improvementd. Functional and Efficiency
B: The Orange book defines Operational and Life Cycle assurance.
- Operations security is primarily concerned with?a. Protecting assets from threatsb. Establishing audit trailsc. Classifying subjectsd. Managing personnel security awareness
A: Operations security is primarily concerned with protecting assets from threats.
- The security practice of ensuring that no one individual has complete control or access over a system’s security mechanism is known as?a. Principle of least privilegeb. Separation of dutiesc. Job rotationd. Role based access control
B: The security practice of ensuring that no one individual as complete control or access over a system’s security mechanism is known as separation of duties.
- What is trusted recovery?a. A storage system that ensures the security of backup setsb. An element in disaster recovery planning where the restoration of backups is assigned to a trusted team of security professionalsc. A process that ensures a system’s security is not violated when it encounters a failure requiring a restorationd. An automatic process that restores the most recent backup to a system when a security fault is encountered.
C: Trusted recovery is a process that ensures a system’s security is not violated when it encounters a failure requiring a restoration.
- Which of the following is not a safeguard against collusion?a. Rotation of dutiesb. Trusted recoveryc. Separation of dutiesd. Auditing
B: Trusted recovery is not a safeguard against collusion. It is a safeguard against failure states encountered by the OS or software which prevents the system from restarting into an insecure state.
- What is the primary goal of configuration or change management?a. enable rollback to a previous system stateb. duplicate changes on multiple systemsc. prevent changes from diminishing securityd. informing users of changes
C: The primary goal of configuration or change management is to ensure that security is not diminished.
- What is the primary purpose of mandatory vacations?a. Job rotationb. Background checkingc. Testing recovery plansd. Auditing
D: Mandatory vacations are used to perform auditing.
- When an automated trusted recovery is performed, what must happen?a. All corrupted system files must be restoredb. All suspect data is flagged for inspectionc. A system administrator is required to regain a secured stated. The system must restore itself to a secure state
D: When an automated trusted recovery is performed, the system must restore itself to a secure state.
- What is the goal of configuration change management?a. To ensure that all changes to the system do not diminish securityb. To control who performs changes to the security systemc. To track all changes to the security systemd. To automate the distribution of widespread security changes throughout a network
A: The primary goal of configuration change management is to ensure that all changes to the system do not diminish security.
- Which of the following is not true about configuration change management?a. Ensures that rolling back to a previous state by removing changes is possibleb. Simplifies the process of rolling out security changes throughout an organizationc. Is required by TCSEC certified B2, B3, and A1 systemsd. All changes must be documented
B: Configuration change management is not a distribution mechanism.
- The ability to easily audit and inspect the work tasks of an employee is made possible by?a. Separation of dutiesb. Exit interviewsc. Mandatory vacationsd. Background checks
C: Mandatory vacations allow for job auditing to ensure compliance with security policy and laws.
- Which of the following is not a form of monitoring?a. Biometric enrollmentb. port scanningc. Intrusion detectiond. penetration testing
A: Biometric enrollment is not a form of monitoring. Biometric enrollment is often a determining factor in whether or not a biometric identification or authenticating device will be accepted by the user community. If enrollment takes longer than minutes, most users will be unwilling to use it.
- The act of examining traffic patterns rather than the contents of packets is known as?a. Transaction processingb. Trend analysisc. Sniffingd. Port scanning
B: Trend or traffic analysis is the examination of traffic patterns rather than packet contents.
- Security controls should be _________ to the authorized user.a. obstructiveb. accessiblec. transparentd. inhibiting
C: Security controls should be transparent to the authorized user.
- When no single person has total control over a system’s security mechanisms, this is called?a. split knowledgeb. rotation of dutiesc. mandatory vacationsd. strong access controls
A: Split knowledge is when no single person has total control over a system’s security mechanisms.
- Another term for a security control that employees split knowledge is?a. mandatory vacationsb. separation of dutiesc. rotation of dutiesd. background checks
B: Separation of duties is a split-knowledge security control.
- The security mechanism that requires that users have the minimum amount of access that is absolutely required by their job tasks and that they have that access for the shortest amount of time is known as?a. due diligenceb. two-man controlsc. least privileged. rotation of duties
C: Least privilege is a security mechanism that requires that users have the minimum amount of access that is absolutely required by their job tasks and that they have that access for the shortest amount of time.
- The top priority of configuration or change control management is?a. prevent changes from diminishing securityb. analyze the effects of changes on a systemc. provide a means to track and audit changes to a systemd. ensure formalized testing of all system changes
A: The top priority of configuration or change control management is to prevent changes from diminishing security.
- Which of the following is not one of the five generally recognized procedural steps to implement configuration or change control management?a. Implementing the changeb. Applying to introduce a changec. Updating the security policyd. Cataloging the intended change
C: Since changes are not supposed to alter the security environment, there should be no need to change or alter the security policy. Therefore Updating the security policy is not one of the five generally recognized procedural steps to implement configuration or change control management.
- Which of the following is not an element of operational assurance as defined by the Orange Book?a. system architectureb. covert channel analysisc. security testingd. trusted recovery
C: Security testing, design specification and testing, configuration management, and trusted distribution are all elements of Life cycle assurance as defined by the Orange book.
- Which of the following is not an element of life cycle assurance as defined by the Orange Book?a. design specification and testingb. configuration managementc. trusted distribution d. system architecture
D: System architecture, system integrity, covert channel analysis, trusted facility management, and trusted recovery are all elements of operational assurance as defined by the Orange book.
- _________________ controls focus on day to day activities for the protection of IT and the support of the security policy.a. Procedural securityb. Oversight securityc. Operations securityd. Physical security
C: Operations security controls focus on day to day activities for the protection of IT and the support of the security policy.
- What type of resources need not be included in the resource protection scheme for the organization?a. hardware resourcesb. software resourcesc. data resourcesd. transitive resources
D: Transitive resources, those provided by other organizations, need not be included in the resource protection scheme for an organization.
- Which of the following is not a common requirement for maintaining security while hardware undergoes maintenance or repair?a. recertification of security labelb. trusted offsite techniciansc. bonded escortsd. accredited supervision
A: Recertification may be necessary after a repair, but it is not an element of the actual maintenance and repair process.
- Which of the following is an example of a split knowledge security control?a. mandatory vacationsb. auditingc. rotation of dutiesd. two-man control
D: Two-man controls are a form of split-knowledge control that requires two users to work in unison to complete some privileged action.
- What is the purpose of trusted recovery?a. to ensure that security is not breached during a system failureb. to maintain the accreditation of a systemc. to guarantee that files can be restored from backup mediad. to provide a means to return to the primary site after a disaster occurs
A: The purpose of trusted recovery is to ensure that security is not breached during a system failure.
- Which of the following is not an element of trusted recovery?a. rebooting into a single user modeb. revalidating the trusted computer basec. recovering all file systems that were active at the time of failured. verifying the integrity of system level security critical files
B: The TCB is not re-validated by the trusted recovery process. Instead, the trusted recovery process relied upon the TCB to provide its capability of returning the system to a secure state after a failure.
- One of the most important aspects of configuration or change control management is?a. updated new employee training materialsb. revising the organization’s security policyc. compliance with due care requirementsd. the ability to rollback changes to a previous state
D: One of the most important aspects of configuration or change control management is the ability to rollback changes to a previous state.
- Which of the following TCSEC rating levels does not require configuration and change control management?a. C2b. A1c. B2d. B3
A: C does not require configuration and change control management.
- Administrative controls for personnel security should include all but which of the following?a. background checksb. enrollment in biometric authentication systemsc. mandatory vacationsd. job action warnings
B: Enrollment in biometric authentication systems is a logical or technical control for personnel security.
- Which of the following is not one of the three hierarchical types of trusted recovery as defined by the Common Criteria?a. automated recovery without undo lossb. manual recoveryc. asynchronous assisted recoveryd. automated recovery
C: The Common Criteria does not define a type of trusted recovery named asynchronous assisted recovery.
- Which of the following is not a primary function of configuration or change control management?a. provide a means to track and audit changes to a systemb. ensure formalized testing of all system changesc. analyze the effects of changes on a systemd. keep users from learning about changes to a system
D: A primary function of configuration or change control management is to keep users informed of system changes.
- _____________ operations should be restricted to authorized individuals who’s work tasks specifically require greater than normal capabilities.a. privilegedb. backupc. Internet clientd. productivity software
A: Privileged operations should be restricted to authorized individuals whose work tasks specifically require greater than normal capabilities.
- What is the primary goal of media security controls?a. control inventory of backup mediab. prevent loss or disclosure of sensitive data while it is stored on removable mediac. maintain chain of custody information just in case media must be used in a legal actiond. prevent users from accessing removable media
B: The primary goal of media security controls is to prevent loss or disclosure of sensitive data while it is stored on removable media.
- Which of the following is not considered an element of maintaining media security controls?a. loggingb. chain of custodyc. deploying security guardsd. inventory management
C: Deploying security guard is not an element of maintaining media security controls. Security guards are used to provide physical access control to facilities.
- Maintenance accounts are considered a threat to security since they may be used as an access means for unauthorized individuals. What are maintenance accounts?a. any account that has administrative level privilegesb. supervisory level factory installed accountsc. accounts used by hardware repair technicians that are created and maintained by your IT staffd. those administrators involved in the daily support of user accounts and access
B: Maintenance accounts are supervisory level factory installed accounts. These accounts should be disabled or be assigned strong passwords.
- Which of the following is not a valid countermeasure against the unauthorized use of maintenance accounts?a. change passwordb. disable accountsc. network traffic loggingd. maintain physical access control over devices
C: Network traffic logging is not an effective or valid countermeasure against the unauthorized use of maintenance accounts.
- Which of the following is not considered an operational security software control?a. software testingb. safe software media storagec. backup controlsd. diagnostic port controls
D: Diagnostic port controls are physical security controls for hardware, not software.
- Which of the following is not considered a monitoring technique?a. Intrusion Detectionb. Probingc. Passwordsd. Dumpster Diving
C: Passwords are access controls, not monitoring techniques.
- Which of the following is not considered a monitoring technique?a. Penetration Testingb. Demon (war) Dialingc. Sniffingd. Use of packet filters.
D: Packet filters are an access control mechanism, not a monitoring technique.
- Which of the following is not considered a monitoring technique?a. Biometricsb. Scanningc. Violation Analysisd. Social Engineering
A: Biometrics are an identification or authentication technique, not a monitoring technique.
- Monitoring should begin after all but which of the following is completed?a. user logonb. application installationc. system configurationd. operating system patching
A: Monitoring should already be enabled before users begin logging on to the system.
- Monitoring should focus on all but which of the following?a. violation trackingb. violation resolutionc. violation processingd. violation analysis
B: Monitoring is not directly concerned with the resolution of violations. That is a secondary result of the monitoring process.
- Which of the following is most concerned with personnel security? a. Management controlsb. Operational controlsc. Technical controlsd. Human resources controls
B: Personnel security always have to deal more with Operational controls, they provide the guidelines and the correct procedures to implement the different operations, which maintains security. Management controls are used mainly by management. Technical controls deal with system security. Human resources control deal with organizational controls, not always related to security.