Chapter 14 Flashcards
Which of the following terms identifies the process of reviewing log files for suspicious activity and threshold compliance?
Phishing
Scanning
CompSec
Auditing
Auditing
Which of the following is a collection of recorded data that may include details about logons, object access, and other activities deemed important by your security policy and is often used to detect unwanted and unauthorized user activity?
Audit trail
Chain of custody
Syslog
CPS (Certificate Practice Statement)
Audit trail
A recreation of historical events is made possible through which of the following?
Incident reports
Audit trails
Audits
Penetration testing
Audit trails
Which type of audit is performed by either a consultant or an auditing firm employee?
External audit
Financial audit
Usage audit
Internal audit
External audit
Which of the following is true concerning internal audits?
The process is very formal.
They are generally nonobjective.
They are always highly rigorous.
The auditor works independently.
They are generally nonobjective.
Which of the following standards relates to the use of credit cards?
Financial audit
SOX
PCI DSS
PoLP
PCI DSS
Which of the following describes privilege auditing?
No single user is granted sufficient privileges to compromise the security of an entire environment.
Users’ and groups’ rights and privileges are checked to guard against creeping privileges.
An employee is granted the minimum privileges required to perform the duties of his or her position.
Users’ activities are logged to document incidents for security investigations and incident response.
Users’ and groups’ rights and privileges are checked to guard against creeping privileges.
Which component of an IT security audit evaluates defense in depth and IT-related fraud?
User access and rights review
Financial audit
External audit
Risk evaluation
Risk evaluation
Which of the following is a government audit by the SEC that relates to internal controls and focuses on IT security, access controls, data backup, change management, and physical security?
PCI DSS
Financial audit
PoLP
SOX
SOX
Which of the following types of auditing verifies that systems are utilized appropriately and in accordance with written organizational policies?
Financial audit
Internal audit
PoLP
Usage audit
Usage audit
Which of the following are control categories? (Select three.)
Technical
Deterrent
Preventative
Physical
Compensating
Operational
Managerial
Technical
Operational
Managerial
Which of the following BEST describes compensating controls?
Partial control solution that is implemented when a control cannot fully meet a requirement.
Attempts to fix any controls that aren’t working properly.
Discourages malicious actors from attempting to breach a network.
Monitors network activity and informs the security team of a potential security event.
Partial control solution that is implemented when a control cannot fully meet a requirement.
Which type of control is used to discourage malicious actors from attempting to breach a network?
Preventative
Physical
Deterrent
Detective
Deterrent
Which type of control makes use of policies, DPRs, and BCPs?
Preventative
Managerial
Technical
Operational
Managerial
Which of the following is an example of a preventative control type?
An advanced network appliance
Intrusion detection systems
Network monitoring applications
Real-time monitoring alerts
An advanced network appliance