CISM Practice B Topic 3 Flashcards
Who can BEST advocate the development of and ensure the success of an information security program?
Internal auditor
Chief operating officer (COO)
Steering committee
IT management
Steering committee
Which of the following BEST ensures that information transmitted over the Internet will remain confidential?
Virtual private network (VPN)
Firewalls and routers
Biometric authentication
Two-factor authentication
Virtual private network (VPN)
The effectiveness of virus detection software is MOST dependent on which of the following?
Packet filtering
Intrusion detection
Software upgrades
Definition tables
Definition tables
Which of the following is the MOST effective type of access control?
Centralized
Role-based
Decentralized
Discretionary
Role-based
Which of the following devices should be placed within a DMZ?
Router
Firewall
Mail relay
Authentication server
Mail relay
An intrusion detection system should be placed:
outside the firewall.
on the firewall server.
on a screened subnet.
on the external router.
on a screened subnet.
The BEST reason for an organization to have two discrete firewalls connected directly to the Internet and to the same DMZ would be to:
provide in-depth defense.
separate test and production.
permit traffic load balancing.
prevent a denial-of-service attack.
permit traffic load balancing.
An extranet server should be placed:
outside the firewall.
on the firewall server.
on a screened subnet.
on the external router.
on a screened subnet.
Which of the following is the BEST metric for evaluating the effectiveness of security awareness twining? The number of:
password resets.
reported incidents.
incidents resolved.
access rule violations.
reported incidents.
Security monitoring mechanisms should PRIMARILY:
focus on business-critical information.
assist owners to manage control risks.
focus on detecting network intrusions.
record all security violations.
focus on business-critical information.
Which of the following is the BEST method for ensuring that security procedures and guidelines are known and understood?
Periodic focus group meetings
Periodic compliance reviews
Computer-based certification training (CBT)
Employee’s signed acknowledgement
Computer-based certification training (CBT)
When contracting with an outsourcer to provide security administration, the MOST important contractual element is the:
right-to-terminate clause.
limitations of liability.
service level agreement (SLA).
financial penalties clause.
service level agreement (SLA).
Which of the following is the BEST metric for evaluating the effectiveness of an intrusion detection mechanism?
Number of attacks detected
Number of successful attacks
Ratio of false positives to false negatives
Ratio of successful to unsuccessful attacks
Ratio of false positives to false negatives
Which of the following is MOST effective in preventing weaknesses from being introduced into existing production systems?
Patch management
Change management
Security baselines
Virus detection
Change management
Which of the following tools is MOST appropriate for determining how long a security project will take to implement?
Gantt chart
Waterfall chart
Critical path
Rapid Application Development (RAD)
Critical path
Which of the following is MOST effective in preventing security weaknesses in operating systems?
Patch management
Change management
Security baselines
Configuration management
Patch management
When a proposed system change violates an existing security standard, the conflict would be BEST resolved by:
calculating the residual risk.
enforcing the security standard.
redesigning the system change.
implementing mitigating controls.
calculating the residual risk.
Who can BEST approve plans to implement an information security governance framework?
Internal auditor
Information security management
Steering committee
Infrastructure management
Steering committee
Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information?
Baseline security standards
System access violation logs
Role-based access controls
Exit routines
Role-based access controls
Which of the following is generally used to ensure that information transmitted over the Internet is authentic and actually transmitted by the named sender?
Biometric authentication
Embedded steganographic
Two-factor authentication
Embedded digital signature
Embedded digital signature
Which of the following is the MOST appropriate frequency for updating antivirus signature files for antivirus software on production servers?
Daily
Weekly
Concurrently with O/S patch updates
During scheduled change control updates
Daily
Which of the following devices should be placed within a demilitarized zone (DMZ)?
Network switch
Web server
Database server
File/print server
Web server
On which of the following should a firewall be placed?
Web server
Intrusion detection system (IDS) server
Screened subnet
Domain boundary
Domain boundary
An intranet server should generally be placed on the:
internal network.
firewall server.
external router.
primary domain controller.
internal network.
Access control to a sensitive intranet application by mobile users can BEST be implemented through:
data encryption.
digital signatures.
strong passwords.
two-factor authentication.
two-factor authentication.
When application-level security controlled by business process owners is found to be poorly managed, which of the following could BEST improve current practices?
Centralizing security management
Implementing sanctions for noncompliance
Policy enforcement by IT management
Periodic compliance reviews
Centralizing security management
Security awareness training is MOST likely to lead to which of the following?
Decrease in intrusion incidents
Increase in reported incidents
Decrease in security policy changes
Increase in access rule violations
Increase in reported incidents
The information classification scheme should:
consider possible impact of a security breach.
classify personal information in electronic form.
be performed by the information security manager.
classify systems according to the data processed.
consider possible impact of a security breach.
Which of the following is the BEST method to provide a new user with their initial password for email system access?
Interoffice a system-generated complex password with 30 days expiration
Give a dummy password over the telephone set for immediate expiration
Require no password but force the user to set their own in 10 days
Set initial password equal to the user ID with expiration in 30 days
Give a dummy password over the telephone set for immediate expiration
An information security program should be sponsored by:
infrastructure management.
the corporate audit department.
key business process owners.
information security management.
key business process owners.
Which of the following is the MOST important item to include when developing web hosting agreements with third-party providers?
Termination conditions
Liability limits
Service levels
Privacy restrictions
Service levels
The BEST metric for evaluating the effectiveness of a firewall is the:
number of attacks blocked.
number of packets dropped.
average throughput rate.
number of firewall rules
number of attacks blocked.
Which of the following ensures that newly identified security weaknesses in an operating system are mitigated in a timely fashion?
Patch management
Change management
Security baselines
Acquisition management
Patch management
The MAIN advantage of implementing automated password synchronization is that it:
reduces overall administrative workload.
increases security between multi-tier systems.
allows passwords to be changed less frequently.
reduces the need for two-factor authentication.
reduces overall administrative workload.
Which of the following tools is MOST appropriate to assess whether information security governance objectives are being met?
SWOT analysis
Waterfall chart
Gap analysis
Balanced scorecard
Balanced scorecard
Which of the following is MOST effective in preventing the introduction of a code modification that may reduce the security of a critical business application?
Patch management
Change management
Security metrics
Version control
Change management
An operating system (OS) noncritical patch to enhance system security cannot be applied because a critical application is not compatible with the change. Which of the following is the BEST solution?
Rewrite the application to conform to the upgraded operating system
Compensate for not installing the patch with mitigating controls
Alter the patch to allow the application to run in a privileged state
Run the application on a test platform; tune production to allow patch and application
Compensate for not installing the patch with mitigating controls
Which of the following is MOST important to the success of an information security program?
Security awareness training
Achievable goals and objectives
Senior management sponsorship
Adequate start-up budget and staffing
Senior management sponsorship
Which of the following is MOST important for a successful information security program?
Adequate training on emerging security technologies
Open communication with key process owners
Adequate policies, standards and procedures
Executive management commitment
Executive management commitment
Which of the following is the MOST effective solution for preventing individuals external to the organization from modifying sensitive information on a corporate database?
Screened subnets
Information classification policies and procedures
Role-based access controls
Intrusion detection system (IDS)
Screened subnets
Which of the following technologies is utilized to ensure that an individual connecting to a corporate internal network over the Internet is not an intruder masquerading as an authorized user?
Intrusion detection system (IDS)
IP address packet filtering
Two-factor authentication
Embedded digital signature
Two-factor authentication
What is an appropriate frequency for updating operating system (OS) patches on production servers?
During scheduled rollouts of new applications
According to a fixed security patch management schedule
Concurrently with quarterly hardware maintenance
Whenever important security patches are released
Whenever important security patches are released
Which of the following devices should be placed within a DMZ?
Proxy server
Application server
Departmental server
Data warehouse server
Application server
A border router should be placed on which of the following?
Web server
IDS server
Screened subnet
Domain boundary
Domain boundary
An e-commerce order fulfillment web server should generally be placed on which of the following?
Internal network
Demilitarized zone (DMZ)
Database server
Domain controller
Demilitarized zone (DMZ)
Secure customer use of an e-commerce application can BEST be accomplished through:
data encryption.
digital signatures.
strong passwords.
two-factor authentication.
data encryption.