A5-1 -285 Flashcards
Web application developers sometimes use hidden fields on web pages to save information about a client session. This technique is used, in some cases, to store session variables that enable persistence across web pages, such as maintaining the contents of a shopping cart on a retail web site application. The MOST likely web-based attack due to this practice is:
A. parameter tampering
B. cross-site scripting
C. cookie poisoning
D. stealth commanding
A. parameter tampering
Which control is the BEST way to ensure that the data in a file have not been changed during transmission?
A. Reasonableness check
B. Parity bits
C. Hash values
D. Check digits
C. Hash values
The PRIMARY purpose of audit trails is to:
A. improve response time for users.
B. establish accountability for processes transactions.
C. improve operational efficiency of the system.
D. provide information to auditors who which to track transactions.
B. establish accountability for processes transactions.
Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?
A. Intrusion detection systems
B. Data mining techniques
C. Stateful inspection firewalls
D. Packet filtering routers
B. Data mining techniques
Which of the following BEST ensures the integrity of a server’s operating system?
A. Protecting the server in a secure location
B. Setting a boot password
C. Hardening the server configuration
D. Implementing activity logging
C. Hardening the server configuration
Which of the following network components is PRIMARILY set up to serve as a security measure by preventing unauthorized traffic between different segments of the networks?
A. Firewalls
B. Routers
C. Layer 2 switches
D. Virtual local area networks
A. Firewalls
An IS auditor discovers that the chief information officer (CIO) of an organization is using a wireless broadband modem using global system for mobile communications (GSM) technology. This modem is being used to connect the CIO’s laptop to the corporate virtual private network (VPN) when the CIO travels outside the office. The IS auditor should:
A. do nothing because the inherent security features of GSM technology are appropriate
B. recommend that the CIO stop using the laptop computer until encryption is enabled.
C. ensure that the medical access control address filtering is enables on the network so unauthorized wireless users cannot connect.
D. suggest that two-factor authentication be used over the wireless link to prevent unauthorized communications.
A. do nothing because the inherent security features of GSM technology are appropriate
Which of the following is the BEST way to minimize unauthorized access to unattended end-user PC systems?
A. Enforce use of a password-protected screen saver
B. Implement proximity-based authentication system
C. Terminate user session at predefined intervals
D. Adjust power management settings so the monitor screen is black.
A. Enforce use of a password-protected screen saver
The implementation of which of the following would MOST effectively prevent unauthorized access to a system administration account on a web server?
A. Host intrusion detection software installed on the server
B. Password expiration and lockout policy
C. Password complexity rules
D. Two-factor authentication
D. Two-factor authentication
An organization’s IT director has approved the installation of a wireless local area network access point in a conference room for a team of consultants to access the Internet with their laptop computers. The BEST control to protect the corporate servers from unauthorized access is to ensure that:
A. encryption is enables on the access point
B. the conference room network is on a separate virtual local area network (VLAN).
C. antivirus signatures and patch levels are current on the consultants’ laptops.
D. default user IDs are disabled and strong passwords are set on the corporate servers.
B. the conference room network is on a separate virtual local area network (VLAN).
The IS auditor is reviewing an organization’s Human Resources (HR) database implementation. The IS auditor discovers that the database servers are clustered for high availability, all default database accounts have been removed and database audit logs are kept and reviewed on a weekly basis. What other area should the IS auditor check to ensure that the databases are appropriately secured?
A. Database administrators are restricted from access to HR data.
B. Database logs are encrypted.
C. Database store procedures are encrypted.
D. Database initialization parameters are appropriate.
D. Database initialization parameters are appropriate.
An IS auditor has been asked by management to review a potentially fraudulent transaction. The PRIMARY focus of an IS auditor while evaluating the transaction should be to:
A. maintain impartiality while evaluating the transaction.
B. ensure that the independence of an IS auditor is maintained.
C. assure that the integrity of the evidence is maintained
D. assess all relevant evidence for the transaction.
C. assure that the integrity of the evidence is maintained.
A new business application has been designed in a large, complex organization and the business owner has requested that the various reports be viewed on a “need to know” basis. Which of the following access control methods would be the BEST method to achieve this requirement?
A. Mandatory
B. Role-based
C. Discretionary
D. Single sign-on
B. Role-based
Which of the following is the BEST control to prevent the deletion of audit logs by unauthorized individuals in an organization?
A. Actions performed on log files should be tracked in a separate log.
B. Write access to audit logs should be disabled.
C. Only select personnel should have rights to view or delete audit logs.
D. Backups of audit logs should be performed periodically.
C. Only select personnel should have rights to view or delete audit logs.
A company is implementing a Dynamic Host Configuration Protocol (DHCP). Given that the following conditions exists, which represents the GREATEST concern?
A. Most employees use laptop
B. A packet filtering firewall is used.
C. The IP address space is smaller than the number of PCs.
D. Access to a network port is not restricted.
D. Access to a network port is not restricted.