Chapter 11 Flashcards
Security on a network not only means being able to prevent a hacker from breaking
into your computer but also includes being able to recover from temporary service
problems or from natural disasters.
T
The rise of the Internet has increased significantly the potential vulnerability of an
organization’s assets
T
The CERT ( Computer Emergency Response Team) was established at MIT
F. Carnegie Mellon University
Confidentiality refers to the protection of the organizational data from unauthorized
disclosure of customer and proprietary data.
T
Maintaining data integrity is not a primary goal of security.
F
According to Symantec, more than 50% of all targeted companies had fewer than
2,500 employees because they
a. often have weaker security.
b. have more assets.
c. are more likely to have credit card numbers available.
d. are likely off-shore.
e. have lower bandwidth
A
Why are smaller organizations often targeted by cyberattacks?
a) Due to their larger financial reserves
b) Because they have weaker security measures
c) They are less likely to hold valuable data
d) Their employees are more knowledgeable about cybersecurity
B
In the context of transnational cybercrime, what does the text suggest about the effectiveness of enforcement measures?
a) Enforcement efforts have significantly reduced cybercrime rates.
b) Laws are well-established, but enforcement is slow.
c) International collaboration has streamlined enforcement processes.
d) Cybercriminals often face severe penalties, deterring further criminal activity.
B
According to the text, what is the legal status of unauthorized computer access in the United States?
a) It is not considered a crime.
b) It is only a crime if done for malicious purposes.
c) It is a federal crime.
d) It is regulated at the state level.
B
Which of the following entities is mentioned as focusing on combating cybercriminal activities?
a) CERT
b) IETF
c) IEEE
d) ISO
A
What is one of the primary objectives of CERT, APWG, Kaspersky Lab, McAfee, and Symantec?
a) Promoting cybercriminal activities
b) Assisting individuals, organizations, and governments in combating cybercrime
c) Developing new cyber weapons
d) Hacking into government database
B
How has the perception of hacking evolved over time, according to the text?
a) Hacking is no longer practiced.
b) Hacking is now considered a hobby.
c) Hacking has transitioned into a profession.
d) Hacking is exclusively conducted by amateurs.
C
What can professional organizations be hired to do, according to the text?
a) Develop cybersecurity software
b) Break into specific networks to steal valuable information
c) Provide cybersecurity training to individuals
d) Assist law enforcement in apprehending cybercriminals
B
What type of information do cybercriminals often target when breaking into networks?
a) Weather forecasts
b) Celebrity gossip
c) Credit card details, personal data, intellectual property, or computer code
d) Historical events
C
How do cybercriminals often attempt to deceive individuals into revealing sensitive information?
a) By sending physical letters
b) Through social engineering, such as phishing emails
c) By making phone calls
d) By posting on social media
B
The use of hacking techniques to bring attention to a larger political or social goal is
referred to as _____.
a. cracking
b. ethical politics
c. hacktivism
d. social engineering
e. brute force attacks
C
Why has network security gained emphasis, according to the text?
a) Decreased reliance on digital technology
b) High-profile security breaches and government regulatory pronouncements
c) Rise of amateur hacking communities
d) Decreased interest in cyber activities
b
In addition to financial losses, what else can result from security breaches?
a) Increased consumer confidence
b) Expansion of business operations
c) Reduced consumer confidence
d) Decreased reliance on computer networks
C
What factor contributes to the loss of income for organizations during security breaches?
a) Increased consumer spending
b) Systems being offline, especially if they are “mission-critical”
c) Enhanced cybersecurity measures
d) Improved employee productivity
B
According to the text, what are some potential consequences of the disruption of application systems that rely on computer networks?
a) Increased consumer confidence
b) Expansion of business operations
c) Financial losses
d) Reduced operational efficiency
C
What does the term “mission-critical” refer to in the context of computer networks?
a) Systems that are not important for organizational survival
b) Systems that are critical to the survival of an organization
c) Systems that are rarely used by organizations
d) Systems that are easily replaceable
B
what exceeds the cost of networks themselves?
a) The value of data stored on organizations’ networks
b) The cost of cybersecurity measures
c) The maintenance expenses of networks
d) The cost of network hardware
A
What is highlighted as the primary objective of network security?
a) Protecting the physical infrastructure of networks
b) Safeguarding organizations’ data and application software
c) Securing the connections between different networks
d) Ensuring uninterrupted network access
B
what are the three primary goals of security?
a) Confirmation, Indemnification, Authentication
b) Confidentiality, Intimacy, Authentication
c) Confidentiality, Integrity, Availability
d) Confidentiality, Intrusion, Authentication
C
What does confidentiality refer to in the context of security?
a) Ensuring the security of physical assets
b) Protecting organizational data from unauthorized disclosure
c) Preventing interruptions in service
d) Ensuring the accuracy of data
B
What is the goal of integrity in security?
a) Ensuring continuous operation of hardware and software
b) Protecting data from unauthorized disclosure
c) Ensuring that data remain unaltered and intact
d) Preventing unauthorized access to data
C
What does availability focus on in terms of security?
a) Protecting data from unauthorized disclosure
b) Ensuring continuous operation of hardware and software
c) Ensuring the accuracy of data
d) Preventing unauthorized access to data
C
According to the text, what are the two main types of threats to confidentiality, integrity, and availability?
a) Cyber threats and physical threats
b) Insider threats and outsider threats
c) Ensuring business continuity and preventing unauthorized access
d) Software threats and hardware threats
c
Business continuity planning refers primarily to ensuring availability, with some
aspects of data integrity
T
A network switch failure is an example of a(n) ________ threat.
a. internal
b. disruptive
c. causal
d. intrusion
e. disaster
B
What is one example of a disruption-related threat mentioned in the text?
a) Unauthorized access to network resources
b) Loss or reduction in network service
c) Data breaches resulting in confidential information leaks
d) Hardware failures causing data corruption
B
An example of _____ data would be if a computer virus eliminated files on that
computer.
a. disruption
b. controlled chaos
c. intrusion
d. destruction
e. disaster
D
A tornado that eliminates a network control center would be an example of a natural
__________.
a. disaster
b. disruption
c. controlled chaos
d. destruction
e. intrusion
A
Intrusion primarily refers to the loss of confidentiality of organizational data.
T
What can disasters potentially destroy, according to the text?
a) Network hardware
b) Buildings housing network infrastructure
c) Data integrity
d) Software applications
B
Often, incidents of unauthorized access known as___________, involve employees of
the organization, surprisingly enough.
a. intrusion
b. disruption
c. controlled chaos
d. destruction
e. disaster
A
A hacker gaining access to organizational data files and resources is an example of
a(n) ____________ threat.
a. disruptive
b. controlled chaos
c. disruptive
d. intrusion
e. disaster
D
What is a common factor in almost half of intrusion incidents?
A) External hacking attempts
B) Inadequate cybersecurity measures
C) Involvement of competitors
D) Employee involvement
D
What range of effects can intrusions have on organizations?
A) Limited to minor inconveniences
B) Primarily curiosity-driven exploration
C) Varying from curiosity-driven exploration to serious threats
D) Predominantly industrial espionage by competitors
C
Which of the following is NOT listed as a serious threat posed by intrusions?
A) Industrial espionage by competitors
B) Theft of customer credit card numbers for identity theft
C) Unauthorized disclosure of internal memos
D) Fraudulent alteration or destruction of files to harm the organization
C
What is the primary purpose of implementing network controls in a secure network?
A) Enhancing network speed
B) Reducing or eliminating threats to network security
C) Increasing network bandwidth
D) Improving network aesthetics
B
Controls are mechanisms that reduce or eliminate threats to network security
T
What forms can network controls take?
A) Software, hardware, and human resources
B) Hardware and software only
C) Rules and procedures only
D) Software and procedures only
A
What is the role of controls in relation to threats facing computer-based systems within an organization?
A) Enhancing the functionality of computer systems
B) Isolating computer systems from external networks
C) Preventing, detecting, and/or correcting potential issues
D) Creating new vulnerabilities within computer systems
c
Corrective controls reveal or discover unwanted events
F. Detect
Preventive controls mitigate or stop a person from acting or an event from occurring.
T
Which of the following is not one of the major categories (or sub-categories) into
which network security threats can be placed?
a. disruption
b. destruction
c. controlled chaos
d. intrusion
e. disaster
C
_________ controls stop a person from acting.
a. Detective
b. Corrective
c. Mitigating
d. Preventive
e. Backup
D
________ controls discover unwanted events.
a. Preventive
b. Corrective
c. Detective
d. Mitigating
e. Backup
C
________ controls fix a trespass into the network.
a. Corrective
b. Detective
c. Preventive
d. Mitigating
A
What does network security encompass besides preventing hackers from accessing computers?
A) Ensuring network speed optimization
B) Recovering from temporary service problems and natural disasters
C) Implementing new network features
D) Increasing network bandwidth
B
What is a crucial aspect of securing a network according to the provided text?
A) Implementing advanced encryption techniques
B) Assigning blame in case of security breaches
C) Having designated personnel accountable for controls
D) Ignoring temporary service problems
C
What responsibilities do personnel designated for network security have?
A) Developing controls, monitoring their effectiveness, and updating them as needed
B) Managing network aesthetics, updating software, and ensuring network stability
C) Enforcing strict user policies, optimizing network speed, and managing hardware procurement
D) Conducting routine network maintenance, designing network layouts, and troubleshooting user issues
A
Why is periodic review of controls necessary for network security?
A) To increase network complexity
B) To enhance network aesthetics
C) To ensure controls are still effective and operational
D) To decrease network functionality
C
What should be done if there are procedures for temporary overrides on controls?
A) They should be loosely controlled to allow for flexibility
B) They should be tightly controlled and monitored
C) They should be ignored as they compromise network security
D) They should be disabled to prevent misuse
B
What is the initial step in developing a secure network?
A) Implementing advanced encryption techniques
B) Conducting a risk assessment
C) Assigning blame in case of security breaches
D) Ignoring potential security risksAnswer
B
What does a risk assessment involve?
A) Implementing controls to mitigate all risks
B) Prioritizing security risks to information systems and networks
C) Assigning blame for security breaches
D) Increasing network bandwidth
B
How are levels of risk assigned in a risk assessment?
A) By randomly assigning values to threats
B) By comparing the nature of threats to the controls designed to reduce them
C) By ignoring the nature of threats and focusing only on controls
D) By implementing all available controls
B
What is the aim of commonly used risk assessment frameworks?
A) To increase complexity and confuse readers
B) To provide strategies that are difficult to understand
C) To ensure understanding by both technical and non-technical readers
D) To focus solely on technical readers
C
What should a risk assessment clearly indicate?
A) The exact methods hackers use to attack networks
B) High-risk systems and network components, and implemented and required controls
C) The number of security breaches in the past year
D) The names of all employees responsible for network security
B
Which organization developed the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) framework?
A) Computer Emergency Readiness Team
B) Information Systems Audit and Control Association
C) National Institute of Standards and Technology
D) Computer Emergency Response Team
A
Which organization is responsible for the development of the Risk Management Guide for Information Technology Systems (NIST guide)?
A) Computer Emergency Readiness Team
B) Information Systems Audit and Control Association
C) National Institute of Standards and Technology
D) Computer Emergency Response Team
C
Which organization is responsible for COBIT?
A) National Institute of Standards and Technology
B) Information Systems Audit and Control Association
C) Computer Emergency Readiness Team
D) Computer Emergency Response Team
B
What does COBIT stand for?
A) Computer Operations and Business Information Technology
B) Control Objectives for Information and Related Technology
C) Centralized Objectives for Business and Information Technology
D) Comprehensive Operations and Business Information Toolkit
b
What is the first common step shared by all three risk assessment frameworks?
A) Inventory IT assets
B) Develop risk measurement criteria
C) Identify improvements
D) Document existing controls
B
Which step involves compiling a list of all IT assets within an organization?
A) Identify threats
B) Develop risk measurement criteria
C) Inventory IT assets
D) Document existing controls
C. Step 2
What is the purpose of identifying threats in the risk assessment process?
A) To develop risk measurement criteria
B) To inventory IT assets
C) To document existing controls
D) To understand potential risks to the organization’s IT environment
D. Step 3: Identify threat
Which step involves recording the current measures in place to mitigate risks?
A) Identify improvements
B) Develop risk measurement criteria
C) Inventory IT assets
D) Document existing controls
D
What is the final step common to all three frameworks?
A) Identify improvements
B) Develop risk measurement criteria
C) Inventory IT assets
D) Identify threats
A
A threat to the data communications network is any potential adverse occurrence that
can do harm, interrupt the systems using the network, or cause a monetary loss to the
organization
T
Companies have learned that threats from hacking from its own employees occur
about as often as by outsiders.
t
A ___________ assigns levels of risk to various threats to network security by
comparing the nature of the threats to the controls designed to reduce them.
a. risk assessment
b. backplane
c. mitigating control factor analysis
d. control verification worksheet
e. control test plan
A
What is the purpose of developing risk measurement criteria?
A) To identify potential threats to the organization
B) To assess the effectiveness of existing controls
C) To evaluate the impact of security threats on the organization
D) To inventory IT assets
C
A(n) __________ is any potential adverse occurrence that can do harm, interrupt the
system using the network to cause monetary loss to the organization.
a. asset
b. service level agreement
c. threat
d. security plan
e. network design
C