BSI_question_answer_only.csv - BSI_question_answer_only.csv Flashcards
A risk is the likelihood of a threat source taking advantage of a vulnerability to an information system. Risks left over after implementing safeguards is known as:
Residual risks.
Copyright provides what form of protection:
Protects the right of an author to prevent unauthorized use of his/her works.
As an information systems security professional, what is the highest amount would you recommend to a corporation to invest annually on a countermeasure for protecting their assets valued at $1 million from a potential threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 10% :
$20,000.00
Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key?
Key exchange
In a typical information security program, what is the primary responsibility of information (data) owner?
Determine the information sensitivity or classification level.
Which of the following is not a component of “chain of evidenceâ€:
Identification of person who left the evidence.
When an employee transfers within an organization …
All access permission should be reviewed.
A system security engineer is evaluation methods to store user passwords in an information system, so what may be the best method to store user passwords and meeting the confidentiality security objective?
One-way encrypted file
What is the inverse of confidentiality, integrity, and availability (C.I.A.) triad in risk management?
disclosure, alteration, destruction
A CISSP may face with an ethical conflict between their company’s policies and the (ISC)2 Code of Ethics. According to the (ISC)2 Code of Ethics, in which order of priority should ethical conflicts be resolved?
Duty to public safety, principals, individuals, and profession.
Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to?
Discretionary Access Control
In the Common Criteria Evaluation and Validation Scheme (CCEVS), requirements for future products are defined by:
Protection Profile.
As an information systems security manager (ISSM), how would you explain the purpose for a system security policy?
A brief, high-level statement defining what is and is not permitted during the operation of the system
Configuration management provides assurance that changes…?
do not adversely affect implementation of the security policy.
Under what circumstance might a certification authority (CA) revoke a certificate?
The certificate owner’ private key has been compromised.
Which of the following entity is ultimately responsible for information security within an organization?
Senior Management
What type of cryptanalytic attack where an adversary has the least amount of information to work with?
Ciphertext-only
In business continuity planning, which of the following is an advantage of a “hot site†over a “cold siteâ€
A&C
Which of the following is the most effective method for reducing security risks associated with building entrances?
Minimize the number of entrances
All of the following methods ensure the stored data are unreadable except…?
removing the volume header information.
Prior to installation of an intrusion prevention system (IPS), a network engineer would place a packet sniffer on the network, what is the purpose for using a packet sniffer?
It monitors network traffic.
What determines the assignment of data classifications in a mandatory access control(MAC) philosophy?
The organization’s published security policy for data classification
A type cryptographic attack where it is based on the probability of two different messages using the same hash function to produce the same message digest is?
Birthday attack
An access control system that grants users only those rights necessary for them to perform their work is operating on which security principle?
Least Privilege
Which of the following is the primary goal of a security awareness program?
It provides a clear understanding of potential risk and exposure.
Which of the following evidence collection method is most likely accepted in a court case?
Provide a mirror image of the hard drive.
Which of the following characteristics is not of a good stream cipher?
Statistically predictable.
When a security administrator wants to conduct regular test on the strength of user passwords, what may be the best setup for this test?
A standalone workstation with Rainbow table and a copied password database.
When engaging an external contractor for a software development project, source code escrow can be used to protect against…?
vendor bankruptcy.
Which answer lists the proper steps required to develop a disaster recovery andbusiness continuity plan (DRP/BCP)?
Project initiation, business impact analysis, strategy development, plan development, testing, maintenance.
Which of the followings is an example of simple substitution algorithm?
Caesar cipher
An information security program should include the following elements:
Security policy implementation, assignment of roles and responsibilities, and
Which of the following refers to a series of characters used to verify a user’s identity?
Password
Which e-mail standard relies on “Web of Trust”?
Pretty Good Privacy (PGP)
Security of an automated information system is most effective and economical if the system is…?
designed originally to meet the information protection needs.
Act of obtaining information of a higher level of sensitivity by combining information from lower level of sensitivity is called?
Aggregation
Which of the following virus types changes its characteristics as it spreads?
Polymorphic
It is important that information about an ongoing computer crime investigation be…?
limited to as few people as possible.
Which answer is not true for Diffie-Hellman algorithm?
Security stems from the difficulty of calculating the product of two large prime numbers.
After signing out a laptop computer from the company loaner pool, you discovered there is a memorandum stored in the loaner laptop written to a competitor containing sensitive information about a new product your company is about to release. Based on the (ISC)² Code of Ethics, what is the first action you should take?
Immediately inform your company’s management of your findings and its potential ramifications.
Job rotation…?
requires that more than one person fulfill the tasks of one position within the company, thereby providing both backup and redundancy.
Which of the following is the least important information to record when logging a security violation?
User’s name
Which of the following mechanism is used to achieve non-repudiation of a message delivery?
Sender gets a digitally signed acknowledgment from the recipient containing a copy or digest of the message.
What is the trusted registry that guarantees the authenticity of client and server public keys?
Certification authority.
The concept that all accesses must be mediated, protected from unauthorized modification, and verifiable as correct is implemented through what?
A security kernel.
For what reason would a network administrator leverages promiscuous mode on a network interface?
To monitor the network to gain a complete statistical picture of activity.
Which has the flag used for a TCP 3-way handshake?
Syn ->: Syn-Ack
During a disaster or emergency, how does a closed-circuit television (CCTV) help management and security to minimize loss?
It helps the management to direct resources to the hardest hit area.
The goal of cryptanalysis is to…?
forge coded signals that will be accepted as authentic.
Which one of the followings cannot be identified by a business impact analysis(BIA)?
Determining team members associated with disaster planning.
The three primary methods for authenticating users to a system or network are…?
passwords, tokens, and biometrics.
Pretty Good Privacy (PGP) provides…?
confidentiality, integrity, and authenticity.
Which of the following can be identified when exceptions occur using operations security detective controls?
Authorized operations people performing unauthorized functions.
When downloading software from Internet, why do vendors publish MD5 hash values when they provide software to customers?
Recipients can verify the software’s integrity after downloading.
From a legal perspective, which rule must be addressed when investigating a computer crime?
Evidence
Before powering off a computer system, a computer crime investigator should record contents of the monitor and…?
dump the memory contents to a disk.
Which of the following transaction processing properties ensures once a transaction completes successfully (commits), the updates survive even if there is a system failure?
Durability.
Which of the following is not a symmetric key algorithm?
RSA.
A security planning process must defines: how security will be managed, who will be responsible, and…?
what practices are reasonable and prudent for the enterprise.
A security policy provides a way to…?
identify and clarify security goals and objectives.
Which of the following feature does a digital signature provide?
It identifies the source and verifies the integrity of data.
Computer security is generally considered to be the responsibility of…?
everyone in the organization.
The practice of embedding a message in a document, image, video or sound recording so that its very existence is hidden is called?
Steganography.
What characteristic of Digital Encryption Standard (DES) used in Electronic Code Book (ECB) mode makes it unsuitable for long messages?
Repeated message blocks produce repeated cipher text blocks.
Separation of duties should be…?
cost justified for the potential for loss.
What is the advantage of Rivest, Shamir, Adelman (RSA) public key system over the Digital Signature Algorithm (DSA)?
It can be used for encryption.
In IPsec, what is the standard format that helps to establish and manage the security association (SA) between two internetworking entities?
Internet Key Exchange (IKE)
When securing Internet connections which of the following should be used to protect internal routing and labeling schemes?
Network Address Translation (NAT)
Which of the following describes the step prior to an encrypted session using Data Encryption Standard (DES)?
Key exchange
What is a set of step-by-step instructions used to satisfy control requirements called?
Procedure
The accounting branch of a large organization requires an application to process expense vouchers. Each voucher must be input by one of many accounting clerks, verified by the clerk’s applicable supervisor, then reconciled by an auditor before the reimbursement check is produced. Which access control technique should be built into the application to best serve these requirements?
Role-based Access Control (RBAC)
What principle recommends division of responsibilities so that one person cannot commit an undetected fraud?
Separation of duties
In what situation would TEMPEST risks and technologies be of most interest?
Where the consequences of disclosure are very high
Which of the following is true about information that is designated with the highest level of confidentiality in a private sector organization?
It is limited to named individuals and creates an audit trail.
When verifying key control objectives of a system design, the security specialist should ensure that the…?
vulnerability assessment has been completed.
What type of controls is not utilized to achieve management directives to protect company assets?
Financial controls
All of the followings are hashing algorithms except…?
IDEA
Security management practice focuses on the continual protection of:
Company assets
The likelihood of a threat source taking advantage of a vulnerability is called?
Risk
An instance of being exposed to losses is called?
Exposure
Reference monitor requires which of the following conditions?
Isolation, completeness and verifiability
A person in possession of a sample of ciphertext and corresponding plaintext is capable of what type of attack?
Known-plaintext
Methods of handling risk include all of the followings except:
Selling risk
Which of the following is not true regarding security policy?
It is promulgated by senior IT security staff
Which of the following describes the activities that assure protection mechanisms are maintained and operational?
Due diligence
When there is a “separation of dutiesâ€, parts of tasks are assigned to different people so that:
Collusion is required to perform an unauthorized act.
Which of the following is not a generally accepted benefit of security awareness, training and education?
A security awareness and training program will help prevent natural disasters from occurring.
Which statement below is an incorrect description of a security control?
Corrective controls reduce the likelihood of a deliberate attack
Physical security is accomplished through proper facility construction, fire and water protection, anti-theft mechanisms, intrusion detection systems, and security procedures that are adhered to and enforced. Which of the following is not a component that achieves this type of security?
Integrity control mechanisms
In a typical information security program, who would be responsible for providing reports to the corporate executives and senior management on the effectiveness of the instituted program controls?
Auditors
What is the difference between quantitative and qualitative risk analysis?
Quantitative analysis provides formal cost/benefit information while qualitative analysis does not.
If risk is defined as “the potential that a given threat will exploit vulnerabilities of an asset or group of assets to cause loss or damage to the assets†the risk has all of the following elements except?
Controls addressing the threats.
Which statement below most accurately reflects the goal of risk mitigation?
Defining the acceptable level of risk the organization can tolerate, then reduce risk to that level.
Risk analysis allows you to do all of the following except:
Prevent risk
Which of the following is not true with respect to qualitative risk analysis?
Results in concrete probability percentages.
Which choice below is an accurate statement about standards?
Standards are the first element created in an effective security policy program.
A memory address location specified in a program instruction that contains the address of final memory location is known as:
Indexed addressing.
Which one of the following hardware devices can be re-programmed? 1 Read Only Memory (ROM). 2 Programmable Read Only Memory (PROM). 3 Erasable Programmable Read Only Memory (EPROM). 4 Electrically Erasable Programmable Read Only Memory (EEPROM).
3 and 4
A processing methodology that executes two or more tasks on a single processor is known as:
Multitasking.
Which of the following is a high-level language?
BASIC