Chapter 14 Flashcards
Which of the following terms identifies the process of reviewing log files for suspicious activity and threshold compliance?
Phishing
Scanning
CompSec
Auditing
Auditing
Which of the following is a collection of recorded data that may include details about logons, object access, and other activities deemed important by your security policy and is often used to detect unwanted and unauthorized user activity?
Audit trail
Chain of custody
Syslog
CPS (Certificate Practice Statement)
Audit trail
A recreation of historical events is made possible through which of the following?
Incident reports
Audit trails
Audits
Penetration testing
Audit trails
Which type of audit is performed by either a consultant or an auditing firm employee?
External audit
Financial audit
Usage audit
Internal audit
External audit
Which of the following is true concerning internal audits?
The process is very formal.
They are generally nonobjective.
They are always highly rigorous.
The auditor works independently.
They are generally nonobjective.
Which of the following standards relates to the use of credit cards?
Financial audit
SOX
PCI DSS
PoLP
PCI DSS
Which of the following describes privilege auditing?
No single user is granted sufficient privileges to compromise the security of an entire environment.
Users’ and groups’ rights and privileges are checked to guard against creeping privileges.
An employee is granted the minimum privileges required to perform the duties of his or her position.
Users’ activities are logged to document incidents for security investigations and incident response.
Users’ and groups’ rights and privileges are checked to guard against creeping privileges.
Which component of an IT security audit evaluates defense in depth and IT-related fraud?
User access and rights review
Financial audit
External audit
Risk evaluation
Risk evaluation
Which of the following is a government audit by the SEC that relates to internal controls and focuses on IT security, access controls, data backup, change management, and physical security?
PCI DSS
Financial audit
PoLP
SOX
SOX
Which of the following types of auditing verifies that systems are utilized appropriately and in accordance with written organizational policies?
Financial audit
Internal audit
PoLP
Usage audit
Usage audit
Which of the following are control categories? (Select three.)
Technical
Deterrent
Preventative
Physical
Compensating
Operational
Managerial
Technical
Operational
Managerial
Which of the following BEST describes compensating controls?
Partial control solution that is implemented when a control cannot fully meet a requirement.
Attempts to fix any controls that aren’t working properly.
Discourages malicious actors from attempting to breach a network.
Monitors network activity and informs the security team of a potential security event.
Partial control solution that is implemented when a control cannot fully meet a requirement.
Which type of control is used to discourage malicious actors from attempting to breach a network?
Preventative
Physical
Deterrent
Detective
Deterrent
Which type of control makes use of policies, DPRs, and BCPs?
Preventative
Managerial
Technical
Operational
Managerial
Which of the following is an example of a preventative control type?
An advanced network appliance
Intrusion detection systems
Network monitoring applications
Real-time monitoring alerts
An advanced network appliance
Which ISO publication lays out guidelines for selecting and implementing security controls?
27001
31000
27002
27701
27002
Which of the following frameworks introduced the first cloud-centric individual certification?
NIST
ISO
CCM
CSA
CSA
Which type of report is used for marketing and letting future partners know that compliance has been met?
ISO 27001
SOC Type II
ISO 31000
SOC Type III
SOC Type III
Which of the following security frameworks is used by the federal government and all its departments, including the Department of Defense?
CSA
ISO
SOC Type II/III
NIST
NIST
Which SOC type reports focus on predetermined controls that are audited and a detailed report that attests to a company’s compliance?
II
I
III
IV
II
Your organization has discovered that an overseas company has reverse-engineered and copied your main product and is now selling a counterfeit version.
Which of the following BEST describes the type of consequence your organization has suffered?
Reputation damage
IP theft
Fines
Escalation
IP theft
Your organization has suffered a data breach, and it was made public. As a result, stock prices have fallen, as consumers no longer trust the organization.
Which of the following BEST describes the type of consequence your organization has suffered due to the breach?
Notifications
IP theft
Identity theft
Reputation damage
Reputation damage
If you lose your wallet or purse and it ends up in the wrong hands, several pieces of information could be used to do personal harm to you. These pieces of information include the following:
Name and address
Driver license number
Credit card numbers
Date of birth
Which of the following classifications does this information fall into?
Private internal information
Private restricted information
Proprietary information
Personally identifiable information (PII)
Personally identifiable information (PII)
The lowest level of classified information used by the military. Release of this information could cause damage to military efforts.
Unclassified
Sensitive But Unclassified
Confidential
Secret
Top Secret
Confidential
If this information is released, it poses grave consequences to national security.
Unclassified
Sensitive But Unclassified
Confidential
Secret
Top Secret
Top Secret
This information can be accessed by the public and poses no security threat.
Unclassified
Sensitive But Unclassified
Confidential
Secret
Top Secret
Unclassified
If this information is disclosed, it could cause some harm, but not a national disaster.
Unclassified
Sensitive But Unclassified
Confidential
Secret
Top Secret
Sensitive But Unclassified
If this information is disclosed, it could cause severe and permanent damage to military actions.
Unclassified
Sensitive But Unclassified
Confidential
Secret
Top Secret
Secret
Which of the following laws was designed to protect a child’s information on the internet?
CCPA
GDPR
GLBA
COPPA
COPPA
Which of the following government acts protects medical records and personal health information?
FISMA
HIPAA
FACTA
ACA
HIPAA
HIPAA is a set of federal regulations that define security guidelines. What do HIPAA guidelines protect?
Non-repudiation
Availability
Privacy
Integrity
Privacy
Which of the following is the LEAST reliable means of cleaning or purging media?
Degaussing
Overwriting every sector with alternating 1s and 0s
OS low-level formatting
Drive controller hardware-level formatting
Degaussing
When you dispose of a computer or sell used hardware, it is crucial that none of the data on the hard disks can be recovered.
Which of the following actions can you take to ensure that no data is recoverable?
Damage the hard disks so badly that all data remanence is gone.
Delete all files from all the hard disks in the computer.
Encrypt all data on the hard disks.
Reformat all the hard disks in the computer.
Damage the hard disks so badly that all data remanence is gone.
Which of the following data destruction techniques uses a punch press or hammer system to crush a hard disk?
Degaussing
Shredding
Pulverizing
Pulping
Purging
Pulverizing