All 8 Domains Flashcards
- Within the realm of IT security , which of the following combinations best defines risk?
A. Threat coupled with a breach
B. Threat coupled with a vulnerability
C. Vulnerability coupled with an attack
D. Threat coupled with a breach of security
B
- When determining the value of an intangible asset which is the BEST approach?
A. Determine the physical storage costs and multiply by the expected life of the company
B. With the assistance of a finance accounting professional determine how much profit the asset has returned
C. Review the depreciation of the intangible asset over the past three years
D. Use the historical acquisition or development cost of the intangible asset
B
- Qualitative risk assessment is earmarked by which of the following?
A. Ease of implementation and it can be completed by personnel with a limited understanding of the risk assessment process
B. Can be completed by personnel with a limited understanding of the risk assessment process and uses detailed metrics used for calculation of risk
C. Detailed metrics used for calculation of risk and ease of implementation
D. Can be completed by personnel with a limited understanding of the risk assessment process and detailed metrics used for the calculation of risk.
A
- Single loss expectancy (SLE) is calculated by using:
A. Asset value and annualized rate of occurrence (ARO)B. Asset value, local annual frequency estimate (LAFE), and standard annual frequency estimate (SAFE)
C. Asset value and exposure factor
D. Local annual frequency estimate and annualized rate of occurrence
C*The formula for calculating SLE is SLE = asset value (in $) X exposure factor (loss in successful threat exploit, as %).
- Consideration for which type of risk assessment to perform includes all of the following:
A. Culture of the organization, likelihood of exposure and budget
B. Budget, capabilities of resources and likelihood of exposure
C. Capabilities of resources, likelihood of exposure and budget
D. Culture of the organization, budget, capabilities and resources
D
- Security awareness training includes:
A. Legislated security compliance objectives
B. Security roles and responsibilities for staff
C. The high-level outcome of vulnerability assessments
D. Specialized curriculum assignments, coursework and an accredited institution
B
- What is the minimum and customary practice of responsible protection of assets that affects a community or societal norm?
A. Due diligence
B. Risk mitigation
C. Asset protection
D. Due care
D
- Effective security management:
A. Achieves security at the lowest cost
B. Reduces risk to an acceptable level
C. Prioritizes security for new products
D. Installs patches in a timely manner
B
- Availability makes information accessible by protecting from:
A. Denial of services, fires, floods, hurricanes, and unauthorized transactions
B. Fires, floods, hurricanes, unauthorized transactions and unreadable backup tapes
C. Unauthorized transactions, fires, floods, hurricanes and unreadable backup tapes
D. Denial of services, fires floods, and hurricanes and unreadable backup tapes.
D
- Which phrase best defines a business continuity/disaster recover plan?
A. A set of plans for preventing a disaster.
B. An approved set of preparations and sufficient procedures for responding to a disaster.
C. A set of preparations and procedures for responding to a disaster without management approval.
D. The adequate preparations and procedures for the continuation of all organization functions.
D
- Which of the following steps should be performed first in a business impact analysis (BIA)?
A. Identify all business units within an organization
B. Evaluate the impact of disruptive events
C. Estimate the Recovery Time Objectives (RTO)
D. Evaluate the criticality of business functions
A
- Tactical security plans are BEST used to:
A. Establish high-level security policies
B. Enable enterprise/entity-wide security management
C. Reduce downtime
D. Deploy new security technology
D
- Who is accountable for implementing information security?
A. Everyone
B. Senior management
C. Security officer
D. Data owners
C
- Security is likely to be most expensive when addressed in which phase?
A. Design
B. Rapid prototyping
C. Testing
D. Implementation
D
- Information systems auditors help the organization:
A. Mitigate compliance issues
B. Establish an effective control environment
C. Identify control gaps
D. Address information technology for financial statements
C
- The Facilitated Risk Analysis Process (FRAP)
A. makes a base assumption that a broad risk assessment is the most efficient way to determine risk in a system, business segment, application or process.
B. makes a base assumption that a narrow risk assessment is the most efficient way to determine risk in a system, business segment, application or process.
C. makes a base assumption that a narrow risk assessment is the least efficient way to determine risk in a system, business segment, application or process.
D. makes a base assumption that a broad risk assessment is the least efficient way to determine risk in a system, business segment, application or process.
B
- Setting clear security roles has the following benefits:
A. Establishes personal accountability, reduces cross-training requirements and reduces departmental turf battles
B. Enables continuous improvement, reduces cross-training requirements and reduces departmental turf battles
C. Establishes personal accountability, establishes continuous improvement and reduces turf battles
D. Reduces departmental turf battles, Reduces cross-training requirements and establishes personal accountability
C
- Well-written security program policies are BEST reviewed:
A. At least annually or at pre-determined organization changes
B. After major project implementations
C. When applications or operating systems are updated
D. When procedures need to be modified
A
- An organization will conduct a risk assessment to evaluate
A. Threats to its assets, vulnerabilities not present in the environment, the likelihood that a threat will be realized by taking advantage of an exposure, the impact that the exposure being realized will have on the organization, the residual risk
B. Threats to its assets, vulnerabilities present in the environment, the likelihood that a threat will be realized by taking advantage of an exposure, the impact that the exposure being realized will have on another organization, the residual risk
C. Threats to its assets, vulnerabilities present in the environment, the likelihood that a threat will be realized by taking advantage of an exposure, the impact that the exposure being realized will have on the organization, the residual risk
D. threats to its assets, vulnerabilities present in the environment, the likelihood that a threat will be realized by taking advantage of an exposure, the impact that the exposure being realized will have on the organization, the total risk
C
- A security policy which will remain relevant and meaningful over time includes the following:
A. Directive words such as shall, must, or will, technical specifications and is short in length
B. Defined policy development process, short in length and contains directive words such as shall, must or will
C. Short in length, technical specifications and contains directive words such as shall, must or will
D. Directive words such as shall, must, or will, defined policy development process and is short in length
D
- The ability of one person in the finance department to add vendors to the vendor database and subsequently pay the vendor violates which concept?
A. A well-formed transaction
B. Separation of duties
C. Least privilege
D. Data sensitivity level
B
- Collusion is best mitigated by:
A. Job rotation
B. Data classification
C. Defining job sensitivity level
D. Least privilege
A
- Data access decisions are best made by:
A. User managers
B. Data owners
C. Senior management
D. Application developer
B
- Which of the following statements BEST describes the extent to which an organization should address business continuity or disaster recovery planning?
A. Continuity planning is a significant organizational issue and should include all parts or functions of the company.
B. Continuity planning is a significant technology issue and the recovery of technology should be its primary focus.
C. Continuity planning is required only where there is complexity in voice and data communications.
D. Continuity planning is a significant management issue and should include the primary functions specified by management.
A
- Business impact analysis is performed to BEST identify:
A. The impacts of a threat to the organization operations.
B. The exposures to loss to the organization.
C. The impacts of a risk on the organization.
D. The cost efficient way to eliminate threats.
B
- During the risk analysis phase of the planning, which of the following actions could BEST manage threats or mitigate the effects of an event?
A. Modifying the exercise scenario.
B. Developing recovery procedures.
C. Increasing reliance on key individuals
D. Implementing procedural controls
D
- The BEST reason to implement additional controls or safeguards is to:
A. deter or remove the risk.
B. identify and eliminate the threat.
C. reduce the impact of the threat
D. identify the risk and the threat.
C
- Which of the following statements BEST describes organization impact analysis?
A. Risk analysis and organization impact analysis are two different terms describing the same project effort.
B. A organization impact analysis calculates the probability of disruptions to the organization.
C. A organization impact analysis is critical to development of a business continuity plan.
D. A organization impact analysis establishes the effect of disruptions on the organization.
D
- The term “disaster recovery” refers to the recovery of:
A. organization operations.
B. technology environment.
C. manufacturing environment.
D. personnel environments.
B
- Which of the following terms BEST describes the effort to determine the consequences of disruptions that could result from a disaster?
A. Business impact analysis.
B. Risk analysis.
C. Risk assessment.
D. Project problem definition
A
- The elements of risk are as follows:
A. Natural disasters and manmade disasters
B. Threats, assets and mitigating controls
C. Risk and business impact analysis
D. business impact analysis and mitigating controls
B
- Which of the following methods is not acceptable for exercising the business continuity plan?
A. Table-top exercise.
B. Call exercise.
C. Simulated exercise.
D. Halting a production application or function.
D
- Which of the following is the primary desired result of any well-planned business continuity exercise?
A. Identifies plan strengths and weaknesses.
B. Satisfies management requirements.
C. Complies with auditor’s requirements.
D. Maintains shareholder confidence
A
- A business continuity plan is best updated and maintained:
A. Annually or when requested by auditors.
B. Only when new versions of software are deployed.
C. Only when new hardware is deployed.
D. During the configuration and change management process.
D
- Which of the following is MOST important for successful business continuity?
A. Senior leadership support.
B. Strong technical support staff.
C. Extensive wide are network infrastructure.
D. An integrated incident response team.
A
- A service’s recovery point objective is zero. Which approach BEST ensures the requirement is met?
A. RAID 6 with a hot site alternative.
B. RAID 0 with a warm site alternative
C. RAID 0 with a cold site alternative
D. RAID 6 with a reciprocal agreement.
A
- The (ISC)2 code of ethics resolves conflicts between canons by:
A. there can never be conflicts between canons.
B. working through adjudication.
C. the order of the canons.
D. vetting all canon conflicts through the board of directors.
C
- In the event of a security incident, one of the primary objectives of the operations staff is to ensure that:
A. the attackers are detected and stopped.
B. there is minimal disruption to the organization’s mission.
C. appropriate documentation about the event is maintained as chain of evidence.
D. the affected systems are immediately shut off to limit the impact.
B
- Good data management practices include:
A. Data quality procedures at all stages of the data management process, verification and validation of accuracy of the data, adherence to agreed upon data management practices, ongoing data audit to monitor the use and assess effectiveness of management practices and the integrity of existing data.
B. Data quality procedures at some stages of the data management process, verification and validation of accuracy of the data, adherence to agreed upon data management practices, ongoing data audit to monitor the use and asses effectiveness of management practices and the integrity of existing data.
C. Data quality procedures at all stages of the data management process, verification and validation of accuracy of the data, adherence to discussed data management practices, ongoing data audit to monitor the use and assess effectiveness of management practices and the integrity of existing data.
D. Data quality procedures at all stages of the data management process, verification and validation of accuracy of the data, adherence to agreed upon data management practices, intermittent data audit to monitor the use and assess effectiveness of management practices and the integrity of existing data.
A
- Issues to be considered by the security practitioner when establishing a data policy include:
A. Cost, Due Care and Due Diligence, Privacy, Liability, Sensitivity, Existing Law & Policy Requirements, Policy and Process.
B. Cost, Ownership and Custodianship, Privacy, Liability, Sensitivity, Future Law & Policy Requirements, Policy and Process.
C. Cost, Ownership and Custodianship, Privacy, Liability, Sensitivity, Existing Law & Policy Requirements, Policy and Procedure.
D. Cost, Ownership and Custodianship, Privacy, Liability, Sensitivity, Existing Law & Policy Requirements, Policy and Process.
D
- The information owner typically has the following responsibilities:
A. Determine the impact the information has on the mission of the organization, understand the replacement cost of the information, determine who in the organization or outside of it has a need for the information and under what circumstances the information should be released, know when the information is inaccurate or no longer needed and should be archived.
B. Determine the impact the information has on the mission of the organization, understand the replacement cost of the information, determine who in the organization or outside of it has a need for the information and under what circumstances the information should be released, know when the information is inaccurate or no longer needed and should be destroyed.
C. Determine the impact the information has on the policies of the organization, understand the replacement cost of the information, determine who in the organization or outside of it has a need for the information and under what circumstances the information should not be released, know when the information is inaccurate or no longer needed and should be destroyed.
D. Determine the impact the information has on the mission of the organization, understand the creation cost of the information, determine who in the organization or outside of it has a need for the information and under what circumstances the information should be released, know when the information is inaccurate or no longer needed and should be destroyed.
B
- QA/QC mechanisms are designed to prevent data contamination, which occurs when a process or event introduces either of which two fundamental types of errors into a dataset: (choose TWO)
A. Errors of commission
B. Errors of insertion
C. Errors of omission
D. Errors of creation
A, C
- Some typical responsibilities of a data custodian may include: (Choose ALL that apply)
A. Adherence to appropriate and relevant data policy and data ownership guidelines.
B. Ensuring accessibility to appropriate users, maintaining appropriate levels of dataset security.
C. Fundamental dataset maintenance, including but not limited to data storage and archiving.
D. Assurance of quality and validation of any additions to a dataset, including periodic audits to assure ongoing data integrity.
A, B, C, and D
- The objectives of data documentation are to : (Choose ALL that apply)
A. Ensure the longevity of data and their re-use for multiple purposes
B. Ensure that data users understand the content context and limitations of datasets
C. Facilitate the confidentiality of datasets
D. Facilitate the interoperability of datasets and data exchange
A, B, and D
- Benefits of data standards include:
A. more efficient data management, decreased data sharing, higher quality data, improved data consistency, increased data integration, better understanding of data, improved documentation of information resources.
B. more efficient data management, increased data sharing, higher quality data, improved data consistency, increased data integration, better understanding of data, improved documentation of information resources.
C. more efficient data management, increased data sharing, medium quality data, improved data consistency, decreased data integration, better understanding of data, improved documentation of information resources.
D. more efficient data management, increased data sharing, highest quality data, improved data consistency, increased data integration, better understanding of data, improved documentation of information metadata.
B
- When classifying data, the security practitioner needs to determine the following aspects of the policy: (Choose ALL that apply)
A. who has access to the data
B. What methods should be used to dispose of the data
C. how the data is secured
D. whether the data needs to be encrypted
A, B, C, and D
- The major benefit of information classification is to:
A. map out the computing ecosystem
B. identify the threats and vulnerabilities
C. determine the software baseline
D. identify the appropriate level of protection needs
D
- When sensitive information is no longer critical but still within the scope of a record retention policy , that information is BEST:
A. Destroyed
B. Re-categorized
C. Degaussed
D. Released
B
- What are the FOUR phases of the equipment lifecycle?
A. Defining requirements, acquiring and implementing, operations and maintenance, disposal and decommission.
B. Acquiring requirements, defining and implementing, operations and maintenance, disposal and decommission.
C. Defining requirements, acquiring and maintaining, implementing and operating, disposal and decommission.
D. Defining requirements, acquiring and implementing, operations and decommission, maintenance and disposal.
A
- Which of the following BEST determines the employment suitability of an individual?
A. Job rank or title
B. Partnership with the security team
C. Role
D. Background investigation
D
- The best way to ensure that there is no data remnants of sensitive information that was once stored on a DVD-R media is by
A. Deletion
B. Degaussing
C. Destruction
D. overwriting
C
- Which of the following processes is concerned with not only identifying the root cause but also addressing the underlying issue?
A. Incident management
B. Problem management
C. Change management
D. Configuration management
B
- Before applying a software update to production systems, it is MOST important that:
A. Full disclosure information about the threat that the patch addresses is available
B. The patching process is documented
C. The production systems are backed up
D. An independent third party attests the validity of the patch
C
- A holistic lifecycle for developing security architecture that begins with assessing business requirements and subsequently creating a ‘chain of traceability’ through phases of strategy, concept, design, implementation and metrics is characteristic of which of the following frameworks?
A. Zachman
B. SABSA
C. ISO 27000
D. TOGAF
B
- While an Enterprise Security Architecture (ESA) can be applied in many different ways, it is focused on a few key goals. Identify the proper listing of the goals for the ESA:
A. It represents a simple, long term view of control, it provides a unified vision for common security controls, it leverages existing technology investments, it provides a fixed approach to current and future threats and also the needs of peripheral functions
B. It represents a simple, long term view of control, it provides a unified vision for common security controls, it leverages new technology investments, it provides a flexible approach to current and future threats and also the needs of core functions
C. It represents a complex, short term view of control, it provides a unified vision for common security controls, it leverages existing technology investments, it provides a flexible approach to current and future threats and also the needs of core functions.
D. It represents a simple, long term view of control, it provides a unified vision for common security controls, it leverages existing technology investments, it provides a flexible approach to current and future threats and also the needs of core functions
D
- Which of the following can BEST be used to capture detailed security requirements?
A. Threat modeling, covert channels, and data classification
B. Data classification, risk assessments, and covert channels
C. Risk assessments, covert channels, and threat modeling
D. Threat modeling, data classification, and risk assessments
D
- Which of the following security standards is internationally recognized as the standards for sound security practices and is focused on the standardization and certification of an organization’s Information Security Management System (ISMS)?
A. ISO 15408
B. ISO 27001
C. ISO 9001
D. ISO 9146
B
- Which of the following describes the rules that need to be implemented to ensure that the security requirements are met?
A. Security kernel
B. Security policy
C. Security model
D. Security reference monitor
B
- A two-dimensional grouping of individual subjects into groups or roles and granting access to groups to objects is an example of which of the following types of models?
A. Multilevel lattice
B. State machine
C. Non-interference
D. Matrix-based
D
- Which of the following models ensures that a subject with clearance level of ‘Secret’ has the ability to write only to objects classified as ‘Secret’ or ‘Top Secret’ but is prevented from writing information classified as ‘Public’?
A. Biba-Integrity
B. Clark-Wilson
C. Brewer-Nash
D. Bell-LaPadula
D
- Which of the following is unique to the Biba Integrity Model?
A. Simple property
B. * (star) property
C. Invocation property
D. Strong * property
C
- Which of the following models is BEST considered in a shared data-hosting environment so that the data of one customer is not disclosed to a competitor or other customers sharing that hosted environment?
A. Brewer-Nash
B. Clark-Wilson
C. Bell-LaPadula
D. Lipner
A
- Which of the following security models is primarily concerned with how the subjects and objects are created and how subjects are assigned rights or privileges?
A. Bell-LaPadula
B. Biba-Integrity
C. Chinese Wall
D. Graham-Denning
D
- Which of the following ISO standards provides the evaluation criteria that can be used to evaluate security requirements of different products with different functions?
A. 15408
B. 27000
C. 9100
D. 27002
A
- In the Common Criteria, the common set of functional and assurance requirements for a category of vendor products deployed in a particular type of environment are known as:
A. Protection Profiles
B. Security Target
C. Trusted Computing Base
D. Ring Protection
A
- Which of the following evaluation assurance level that is formally verified, designed and tested is expected for high risk situation?
A. EAL 1
B. EAL 3
C. EAL 5
D. EAL 7
D
- Formal acceptance of an evaluated system by management is known as:
A. Certification
B. Accreditation
C. Validation
D. Verification
B
- Which stage of the Capability Maturity Model (CMM) is characterized by having organizational processes that are proactive?
A. Initial
B. Managed
C. Defined
D. Optimizing
C
- Which of the following BEST provides a method of quantifying risks associated with information technology when validating the abilities of new security controls and countermeasures to address the identified risks?
A. Threat/risk assessment
B. Penetration testing
C. Vulnerability assessment
D. Data classification
A
- The TCSEC identifies two types of covert channels, what are they? (Choose TWO)
A. Storage
B. Boundary
C. Timing
D. Monitoring
A|C
- Which of the following is the main reason for security concerns in mobile computing devices?
A. The 3G/4G protocols are inherently insecure
B. Lower processing power
C. Hackers are targeting mobile devices
D. The lack of anti-virus software.
B
- In decentralized environments device drivers that enable the OS to control and communicate with hardware need to be securely designed, developed and deployed because they are:
A. Typically installed by end-users and granted access to the supervisor state
B. Typically installed by administrators and granted access to user mode state
C. Typically installed by software without human interaction.
D. Integrated as part of the operating system.
A
- A system administrator grants rights to a group of individuals called “Accounting” instead of granting rights to each individual. This is an example of which of the following security mechanisms?
A. Layering
B. Data hiding
C. Cryptographic protections
D. Abstraction
D
- Asymmetric key cryptography is used for the following:
A. Encryption of data, Access Control, Steganography
B. Steganography, Access control, Nonrepudiation
C. Nonrepudiation, Steganography, Encryption of Data
D. Encryption of Data, Nonrepudiation, Access Control
D
- Which of the following supports asymmetric key cryptography?
A. Diffie-Hellman
B. Rijndael
C. Blowfish
D. SHA-256
A
- What is an important disadvantage of using a public key algorithm compared to a symmetric algorithm?
A. A symmetric algorithm provides better access control.
B. A symmetric algorithm is a faster process.
C. A symmetric algorithm provides nonrepudiation of delivery.
D. A symmetric algorithm is more difficult to implement.
B
- When a user needs to provide message integrity, what option is BEST?
A. Send a digital signature of the message to the recipient
B. Encrypt the message with a symmetric algorithm and send it
C. Encrypt the message with a private key so the recipient can decrypt it with the corresponding public key
D. Create a checksum, append it to the message, encrypt the message, and then send to recipient
D
- A Certificate Authority (CA) provides which benefits to a user?
A. Protection of public keys of all users
B. History of symmetric keys
C. Proof of nonrepudiation of origin
D. Validation that a public key is associated with a particular user
D
- What is the output length of a RIPEMD-160 hash?
A. 160 bits
B. 150 bits
C. 128 bits
D. 104 bits
A
- ANSI X9.17 is concerned primarily with:
A. Protection and secrecy of keys
B. Financial records and retention of encrypted data
C. Formalizing a key hierarchy
D. The lifespan of key-encrypting keys (KKMs)
A