All in one study guide (Gibson) Flashcards
How many years of experience are required to earn the Associate of (ISC)2 designation?
Zero
One
Two
Five
A. You don’t need to meet the experience requirement to earn the Associate of (ISC)2 designation, so zero years of experience are acceptable. The SSCP certification requires one year of direct full-time security work experience. If you earn the Associate of (ISC)2 designation, you have two years from the date (ISC)2 notifies you that you have passed the SSCP exam to obtain the required experience and apply to become a fully certified SSCP (which includes submitting the required endorsement form). The CISSP certification requires five years of experience
What are the three elements of the security triad?
Authentication, authorization, and accounting
Confidentiality, integrity, and availability
Identification, authentication, and authorization
Confidentiality, integrity, and authorization
B. The CIA security triad includes three fundamental principles of security designed to prevent losses in confidentiality, integrity, and availability. Authentication, authorization, and accounting are the AAAs of security, and identification, authentication, and authorization are required for accountability, but these are not part of the CIA security triad.
Who is responsible for ensuring that security controls are in place to protect against the loss of confidentiality, integrity, or availability of their systems and data?
IT administrators
System and information owners
CFO
Everyone
B. System and information owners are responsible for ensuring that these security controls are in place. IT administrators or other IT security personnel might implement and maintain them. While it can be argued that the Chief Executive Officer (CEO) is ultimately responsible for all security, the Chief Financial Officer is responsible for finances, not IT security. Assigning responsibility to everyone results in no one taking responsibility.
You are sending an e-mail to a business partner that includes proprietary data. You want to ensure that the partner can access the data but that no one else can. What security principle should you apply?
Authentication
Availability
Confidentiality
Integrity
C. Confidentiality helps prevent the unauthorized disclosure of data to unauthorized personnel, and you can enforce it with encryption in this scenario. Authentication allows a user to claim an identity (such as with a username) and prove the identity (such as with a password). Availability ensures that data is available when needed. Integrity ensures that the data hasn’t been modified.
Your organization wants to ensure that attackers are unable to modify data within a database. What security principle is the organization trying to enforce?
Accountability
Availability
Confidentiality
Integrity
D. Integrity ensures that data is not modified, and this includes data within a database. Accountability ensures that systems identify users, track their actions, and monitor their behavior. Availability ensures that IT systems and data are available when needed. Confidentiality protects against the unauthorized disclosure of data.
An organization wants to ensure that authorized employees are able to access resources during normal business hours. What security principle is the organization trying to enforce?
Accountability
Availability
Integrity
Confidentiality
B. Availability ensures that IT systems and data are available when needed, such as during normal business hours. Accountability ensures that users are accurately identified and authenticated, and their actions are tracked with logs. Integrity ensures that data is not modified. Confidentiality protects the unauthorized disclosure of data to unauthorized users.
An organization has created a disaster recovery plan. What security principle is the organization trying to enforce?
Authentication
Availability
Integrity
Confidentiality
B. Availability ensures that IT systems and data are available when needed. Disaster recovery plans help an organization ensure availability of critical systems after a disaster. Users prove their identity with authentication. Integrity provides assurances that data and systems have not been modified. Confidentiality protects against the unauthorized disclosure of data.
Your organization has implemented a least privilege policy. Which of the following choices describes the most likely result of this policy?
It adds multiple layers of security.
No single user has full control over any process.
Users can only access data they need to perform their jobs.
It prevents users from denying they took an action.
C. The principle of least privilege ensures that users have access to the data they need to perform their jobs, but no more. Defense in depth ensures an organization has multiple layers of security. Separation of duties ensures that no single user has full control over any process. Nonrepudiation prevents users from denying they took an action.
Your organization wants to implement policies that will deter fraud by dividing job responsibilities. Which of the following policies should they implement?
Nonrepudiation
Least privilege
Defense in depth
Separation of duties
D. Separation of duties helps prevent fraud by dividing job responsibilities and ensuring that no single person has complete control over an entire process. Nonrepudiation ensures that parties are not able to deny taking an action. The principle of least privilege ensures that users have only the rights and permissions they need to perform their jobs, but no more. Defense in depth provides a layered approach to security.
Which one of the following concepts provides the strongest security?
Defense in depth
Nonrepudiation
Security triad
AAAs of security
A. Defense in depth provides a layered approach to security by implementing several different security practices simultaneously and is the best choice of the available answers to provide the strongest security. The security triad (confidentiality, integrity, and availability) identifies the main goals of security. Nonrepudiation prevents an individual from denying that he or she took an action. The AAAs of security are authentication, authorization, and accounting
Which of the following would a financial institution use to validate an e-commerce transaction?
Nonrepudiation
Least privilege
Authentication
Signature
A. Digital signatures used by some online institutions to validate transactions and provide nonrepudiation. Least privilege ensures that users have only the rights and permissions they need to perform their jobs, and no more. Authentication verifies a user’s identity. A written signature is not used in e-commerce.
What are the AAAs of information security?
Authentication, availability, and authorization
Accounting, authentication, and availability
Authentication, authorization, and accounting
Availability, accountability, and authorization
C. The AAAs of information security are authentication, authorization, and accounting. Availability is part of the CIA security triad (confidentiality, integrity, and availability), but it is not part of the AAAs of information security.
You want to ensure that a system can identify individual users, track their activity, and log their actions. What does this provide?
Accountability
Availability
Authentication
Authorization
A. If a system can identify individual users, track their activity, and log their actions, it provides accountability. Availability ensures the system is operational when needed. Authentication identifies the individual using credentials. Authorization identifies resources that a user can access.
Which of the following is required to support accountability?
Encryption
Authentication
Hashing
Redundant systems
B. Users prove their identity with authentication, and strong authentication mechanisms are required to support accountability. Encryption helps provide confidentiality. Hashing helps provide integrity. Redundant systems help provide availability.
Which of the following statements accurately describes due care?
It is the practice of implementing security policies and procedures to protect resources.
Due care eliminates risk.
A company is not responsible for exercising due care over PII.
Organizations cannot be sued if they fail to exercise due care over resources such as customer data.
A. Due care is the practice of implementing security policies and procedures to protect resources. You cannot eliminate risk. A company is responsible for exercising due care over PII and can be sued if it fails to exercise due care.