Chapter 8 Flashcards

1
Q

the Trust Services Framework reliability principle that states that users must be able to enter, update and retrieve data during agreed upon times is known as

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that

A

is complete, accurate, and valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The three fundamental information security concepts

A
  1. security is a technology issue based on prevention
  2. the idea of defense in depth employs multiple layers of controls
  3. the time based model of security focuses on the relationship between preventive, detective and corrective controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

some of the essential criteria for successfully implementing each of the principle that contribute to systems reliability, as discussed in the Trust Services Framework

A
  1. developing and documenting policies
  2. designing and employing appropriate control procedures to implement policies
  3. monitoring the system and taking corrective action to maintain compliance with policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who was a part below who was involved with developing the Trust Services Framework

A

AICPA (American Institute of CPAs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

information security procedures protect information integrity by

A

preventing fictitious transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

identify one aspect of systems reliability that is not a source of concern with regards to a public cloud

A

efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

identify the primary means of protecting data stored in a cloud from unauthorized access

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtualization refers to the ability of

A

running multiple systems simultaneously on one physical computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Cloud computing can potentially generate significant cost savings for an organization

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Cloud computing is traditionally more secure than traditional computing

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Trust Services Framework reliability principle that stats personal information should be protected from unauthorized disclosure is known as

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is not a useful way to control procedure regarding access to system outputs

A

allowing visitors to move through the building without supervision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

verifying the identity of the person or device attempting to access the system is an example of

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

restricting access of users to specific portions of the system as well as specific tasks, is an example of

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

this is an example of a preventative control

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

this is an example of a detective control

A

log analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is an example of a corrective control

A

incident response teams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

multi factor authentication

A

involves the use of two or more basic authentication methods

22
Q

identify the best description of an access control matrix below

A

is a table specifying which portions of the system users are permitted to access

23
Q

perimeter defense is an example of which preventative controls that are necessary to provide adequate security

A

controlling remote access

24
Q

which preventative controls are necessary to provide adequate security for social engineering threats

A

awareness training

25
Q

a special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization’s information system, is known as a

A

firewall

26
Q

this protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.

A

transmission control protocol

27
Q

This protocol specifies the structure of packets sent over the internet and the route to get the to the proper destination

A

internet protocol

28
Q

This network access control determines which IP packets are allowed entry to a network and which are dropped

A

access control list

29
Q

a list of authorized users, programs, and data files the users are authorized to access or manipulate, compatibility tests utilize this

A

access control matrix

30
Q

the process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as

A

static packet filtering

31
Q

the process of maintaining a table listing all established connections between the organization’s computers and the internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as

A

stateful packet filtering

32
Q

the process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as

A

deep packet inspection

33
Q

the security technology that evaluates P packet traffic patterns in order to identify attacks against a system is known as

A

an intrusion prevention system

34
Q

this is used to identify rogue modems (or by hackers to identify targets)

A

war dialing

35
Q

the process of turning off unnecessary features in the system is known as

A

hardening

36
Q

the most common input related vulnerability is

A

buffer overflow attack

37
Q

this keeps a record of the network traffic permitted to pass through the firewall

A

intrusion detection system

38
Q

the process that uses automate tools to identify whether a system possesses any well known security problems is known as

A

vulnerability scan

39
Q

an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization’s information system

A

penetration test

40
Q

this person disseminates information about fraud, errors, breaches and other improper system uses and their consequences

A

chief security officer

41
Q

hiring a security firm to attempt to compromise a computer network and being successful at entering the system without being detected and then presented an analysis of the vulnerabilities that had been found is an example of a

A

detective control

42
Q

this commonly true of the default settings for most commercially available wireless access points

A

security is set to the lowest level that the device is capable of

43
Q

in recent years, many of the attacks carrie out by hackers have relied on this type of vulnerability in computer software

A

buffer overflow

44
Q

Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility. this is an example of an

A

authentication control

45
Q

When new employees are hired by Pacific technologies, they are assigned user names and appropriate permissions are entered into the information system’s access control matrix. This is an example of a

A

authorization control

46
Q

the most effective way to protect network resources that are exposed to the internet, yet reside outside of a network is

A

a demilitarized zone

47
Q

All employees of E.C. Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted. Entry to secure areas, such as the Information Technology Department offices, requires further procedures. This is an example of a

A

physical access control

48
Q

Identify three ways users can be authenticated and give an example of each

A
  1. something they know (password)
  2. something hey have (smart card or ID)
  3. something they are (biometric identification of fingerprint
49
Q

describe four requirements of effective passwords

A
  1. Strong passwords should be at least 8 characters
  2. Passwords should use a mixture of upper and lowercase letters, numbers and characters
  3. Passwords should be random and not words found in dictionaries
  4. Passwords should be changed frequently
50
Q

connects an organization’s information system to the internet

A

border router

51
Q

permits controlled access from the internet to selected resources

A

a demilitarized zone

52
Q

the most important element of any preventive control is

A

the people