Chapter 2 - Design Requirements Flashcards

1
Q

Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:

A. Full Inventory
B. Usefulness
C. Value
D. Criticality

A

B. When we gather information about business requirements, we need to do a complete inventory, receive accurate valuation of assets (usually from owners of those assets), and assess criticality; this collection of information does not tell us, objectively, how useful an asset is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The BIA can be used to provide information about all of the following except:

A. Risk Analysis
B. Secure Acquisition
C. BC/DR planning
D. Selection of Security Controls

A

B. The business impact analysis gathers asset valuation information that is beneficial for risk analysis and selection of security controls (it helps avoid putting the ten-dollar lock on the five-dollar bicycle), and criticality information that helps in BC/DR planning by letting the organization understand which systems, data, and personnel are necessary to continuously maintain. However, it does not aid secure acquisition efforts, since the assets examined by the BIA have already been acquired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In which cloud service model is the customer required to maintain the OS?

A. CaaS
B. SaaS
C. PaaS
D. IaaS

A

D. In IaaS, the service is bare metal, and the customer has to install the OS and the software; the customer is responsible for maintaining that OS. In other models, the provider installs and maintains the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In which cloud service model is the customer required to maintain and update only the applications?

A. CaaS
B. SaaS
C. PaaS
D. IaaS

A

C. In PaaS, the provider supplies the hardware, connectivity, and OS; the customer installs and maintains applications. In IaaS, the customer must also install the OS, and in SaaS, the provider supplies and maintains the applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In which cloud service model is the customer only responsible for the data?

A. CaaS
B. SaaS
C. PaaS
D. IaaS

A

B. SaaS is the model in which the customer supplies only the data; in the other models, the customer also supplies the OS, the application, or both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The cloud customer and provider negotiate their respective responsibilities and rights regarding the capabilities and data of the cloud service. Where is the eventual agreement codified?

A. RMF
B. Contract
C. MOU
D. BIA

A

B. The contract codifies the rights and responsibilities of the parties involved upon completion of negotiation. The RMF aids in risk analysis and design of the environment. An MOU is shared between parties for a number of possible reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In attempting to provide a layered defense, the security practitioner should convince senior management to include security controls of which type?

A. Technological
B. Physical
C. Administrative
D. All of the above

A

D. Layered defense calls for a diverse approach to security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is considered administrative control?

A. Access control process
B. Keystroke logging
C. Door locks
D. Biometric Authentication

A

A. A process is an administrative control; sometimes, the process includes elements of other types of controls (n this case, the access control mechanism might be a technical control, or it might be a physical control), but the process itself is administrative. Keystroke logging is a technical control (or a attack, if done for malicious purposes, and not for auditing); door locks are a physical control; and biometric authentication is a technological control. This is a tricky question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is considered a technological control?

A. Firewall software
B. Fireproof safe
C. Fire extinguisher
D. Firing personnel

A

A. A firewall is a technological control. The safe and extinguisher are physical controls, nd firing someone is an administrative control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is considered a physical control?

A. Carpets
B. Ceilings
C. Doors
D. Fences

A

D. Fences are physical controls; care and ceiling are architectural features, and a door is not necessarily a control; the lock o the door would be a physical security control. Although you might think of a door as potential answer, the best answer is the fence; the exam will have questions with more than one correct answer and that answer that will score you points is the one that is most correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In a cloud environment, encryption should be used for all of the following, except:

A. Long-term storage of data
B. Near-term storage of virtualized images
C. Secure sessions/VPN
D. Profile formatting

A

D. All of these activities should incorporate encryption, except for profile formatting, which a made-up term.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of hardening a device should include all of the following, except:

A. Improve default accounts
B. Close unused ports
C. Delete unnecessary services
D. Strictly control administrative access

A

A. We don’t want to improve default accounts-we want to remove them. All of the other options are steps we take to harden devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of hardening a device should include which of the following?

A. Encrypting the OS
B. Updating and patching the system
C. Using video cameras
D. Performing thorough personnel background checks

A

B. Updating and patching the system helps harden the system. Encrypting the OS is a distractor. That would make the OS/machine impossible to use. Video cameras are a security control, but not one used to harden a device. Background checks are good for vetting personnel, but not for hardening devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an experimental technology that is intended to create the possibility of processing encrypted data without having to decrypt it first?

A

A. Homomorphic encryption hopes to achieve that goal; the other options are terms that have almost nothing to do with encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk appetite for an organization is determined by which of the following?

A. Appetite evaluation
B. Senior management
C. Legislative mandates
D. Contractual agreement

A

B. Senior management decides the risk appetite of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the risk left over after the controls are and countermeasures are put in place?

A. Null
B. High
C. Residual
D. Contractual agreement

A

C. This is the definition of the term.

17
Q

All of the following are ways of addressing risk, except:

A. Acceptance
B. Reversal
C. Mitigation
D. Transfer

A

B. Reversal is not a method for handling risk.

18
Q

To protect data on user devices in BYOD environment, the organization should consider requiring all of the following except:

A. DLP agents
B. Local encryption
C. Multifactor authentication
D. Two-person integrity

A

D. Although all the other options are ways to harden a mobile device, two-person integrity is concept that has nothing to do with the topic, and, if implemented, would require everyone in the organization to walk around in pairs while using their mobile devices.

19
Q

Devices in the cloud datacenter should be secure against attack. All of the following are means of hardening devices, except:

A. Using a strong password policy
B. Removing default passwords
C. Strictly limiting physical access
D. Removing all admin accounts

A

D. Although the rest of the options are good tactics for securing devices, we can’t remove all admin accounts; the device will need to be administered at some point, and that account needs to be there.

20
Q

Which of the following best describes risk?

A. Preventable
B. Everlasting
C. The likelihood that a threat will exploit a vulnerability
D. Transient

A

C. Option C is the definition or risk-and risk is never preventable; it can be obviated, attenuated, reduced, and minimized, but never completely prevented. A risk may be everlasting or transient, indicating that the risk itself is not limited to being either.

21
Q

Which is one of the main ways organizations address risks?

A. Compromise
B. Transference
C. Rejection
D. Repudiation

A

B. Transference is one of the main ways organizations address risks.