CISM Practice B Topic 4 Flashcards
The BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures is to:
perform penetration testing.
establish security baselines.
implement vendor default settings.
link policies to an independent standard.
establish security baselines.
A web-based business application is being migrated from test to production. Which of the following is the MOST important management signoff for this migration?
User
Network
Operations
Database
User
The BEST way to ensure that information security policies are followed is to:
distribute printed copies to all employees.
perform periodic reviews for compliance.
include escalating penalties for noncompliance.
establish an anonymous hotline to report policy abuses.
perform periodic reviews for compliance.
The MOST appropriate individual to determine the level of information security needed for a specific business application is the:
system developer.
information security manager.
steering committee.
system data owner.
system data owner.
Which of the following will MOST likely reduce the chances of an unauthorized individual gaining access to computing resources by pretending to be an authorized individual needing to have his or her password reset?
Performing reviews of password resets
Conducting security awareness programs
Increasing the frequency of password changes
Implementing automatic password syntax checking
Conducting security awareness programs
Which of the following is the MOST likely to change an organization’s culture to one that is more security conscious?
Adequate security policies and procedures
Periodic compliance reviews
Security steering committees
Security awareness campaigns
Security awareness campaigns
The BEST way to ensure that an external service provider complies with organizational security policies is to:
Explicitly include the service provider in the security policies.
Receive acknowledgment in writing stating the provider has read all policies.
Cross-reference to policies in the service level agreement
Perform periodic reviews of the service provider.
Perform periodic reviews of the service provider.
When an emergency security patch is received via electronic mail, the patch should FIRST be:
loaded onto an isolated test machine.
decompiled to check for malicious code.
validated to ensure its authenticity.
copied onto write-once media to prevent tampering.
validated to ensure its authenticity.
In a well-controlled environment, which of the following activities is MOST likely to lead to the introduction of weaknesses in security software?
Applying patches
Changing access rules
Upgrading hardware
Backing up files
Changing access rules
Which of the following is the BEST indicator that security awareness training has been effective?
Employees sign to acknowledge the security policy
More incidents are being reported
A majority of employees have completed training
No incidents have been reported in three months
More incidents are being reported
Which of the following metrics would be the MOST useful in measuring how well information security is monitoring violation logs?
Penetration attempts investigated
Violation log reports produced
Violation log entries
Frequency of corrective actions taken
Penetration attempts investigated
Which of the following change management activities would be a clear indicator that normal operational procedures require examination? A high percentage of:
similar change requests.
change request postponements.
canceled change requests.
emergency change requests.
emergency change requests.
Which of the following is the MOST important management signoff for migrating an order processing system from a test environment to a production environment?
User
Security
Operations
Database
User
Prior to having a third party perform an attack and penetration test against an organization, the MOST important action is to ensure that:
- the third party provides a demonstration on a test system.
- goals and objectives are clearly defined.
- the technical staff has been briefed on what to expect.
- special backups of production servers are taken.
goals and objectives are clearly defined.
When a departmental system continues to be out of compliance with an information security policy’s password strength requirements, the BEST action to undertake is to:
submit the issue to the steering committee.
conduct an impact analysis to quantify the risks.
isolate the system from the rest of the network.
request a risk acceptance from senior management.
conduct an impact analysis to quantify the risks.
Which of the following is MOST important to the successful promotion of good security management practices?
Security metrics
Security baselines
Management support
Periodic training
Management support
Which of the following environments represents the GREATEST risk to organizational security?
Locally managed file server
Enterprise data warehouse
Load-balanced, web server cluster
Centrally managed data switch
Locally managed file server
Nonrepudiation can BEST be assured by using:
delivery path tracing.
reverse lookup translation.
out-of-hand channels.
digital signatures.
digital signatures.
Of the following, the BEST method for ensuring that temporary employees do not receive excessive access rights is:
mandatory access controls.
discretionary access controls.
lattice-based access controls.
role-based access controls.
role-based access controls.
Which of the following areas is MOST susceptible to the introduction of security weaknesses?
Database management
Tape backup management
Configuration management
Incident response management
Configuration management
Security policies should be aligned MOST closely with:
industry best practices.
organizational needs.
generally accepted standards.
local laws and regulations.
organizational needs.
The BEST way to determine if an anomaly-based intrusion detection system (IDS) is properly installed is to:
simulate an attack and review IDS performance.
use a honeypot to check for unusual activity.
audit the configuration of the IDS.
benchmark the IDS against a peer site.
simulate an attack and review IDS performance.
The BEST time to perform a penetration test is after:
an attempted penetration has occurred.
an audit has reported weaknesses in security controls.
various infrastructure changes are made.
a high turnover in systems staff.
various infrastructure changes are made.
Successful social engineering attacks can BEST be prevented through:
preemployment screening.
close monitoring of users’ access patterns.
periodic awareness training.
efficient termination procedures.
periodic awareness training.
What is the BEST way to ensure that an intruder who successfully penetrates a network will be detected before significant damage is inflicted?
Perform periodic penetration testing
Establish minimum security baselines
Implement vendor default settings
Install a honeypot on the network
Install a honeypot on the network
Which of the following presents the GREATEST threat to the security of an enterprise resource planning (ERP) system?
User ad hoc reporting is not logged
Network traffic is through a single switch
Operating system (OS) security patches have not been applied
Database security defaults to ERP settings
Operating system (OS) security patches have not been applied
In a social engineering scenario, which of the following will MOST likely reduce the likelihood of an unauthorized individual gaining access to computing resources?
Implementing on-screen masking of passwords
Conducting periodic security awareness programs
Increasing the frequency of password changes
Requiring that passwords be kept strictly confidential
Conducting periodic security awareness programs
Which of the following will BEST ensure that management takes ownership of the decision making process for information security?
Security policies and procedures
Annual self-assessment by management
Security-steering committees
Security awareness campaigns
Security-steering committees
Which of the following is the MOST appropriate individual to implement and maintain the level of information security needed for a specific business application?
System analyst
Quality control manager
Process owner
Information security manager
Process owner
What is the BEST way to ensure that contract programmers comply with organizational security policies?
Explicitly refer to contractors in the security standards
Have the contractors acknowledge in writing the security policies
Create penalties for noncompliance in the contracting agreement
Perform periodic security reviews of the contractors
Perform periodic security reviews of the contractors
Which of the following activities is MOST likely to increase the difficulty of totally eradicating malicious code that is not immediately detected?
Applying patches
Changing access rules
Upgrading hardware
Backing up files
Backing up files
Security awareness training should be provided to new employees:
on an as-needed basis.
during system user training.
before they have access to data.
along with department staff.
before they have access to data.
What is the BEST method to verify that all security patches applied to servers were properly documented?
Trace change control requests to operating system (OS) patch logs
Trace OS patch logs to OS vendor’s update documentation
Trace OS patch logs to change control requests
Review change control documentation for key servers
Trace OS patch logs to change control requests
A security awareness program should:
present top management’s perspective.
address details on specific exploits.
address specific groups and roles.
promote security department procedures
address specific groups and roles.
The PRIMARY objective of security awareness is to:
ensure that security policies are understood.
influence employee behavior.
ensure legal and regulatory compliance.
notify of actions for noncompliance.
influence employee behavior.
Which of the following will BEST protect against malicious activity by a former employee?
Preemployment screening
Close monitoring of users
Periodic awareness training
Effective termination procedures
Effective termination procedures
Which of the following represents a PRIMARY area of interest when conducting a penetration test?
Data mining
Network mapping
Intrusion Detection System (IDS)
Customer data
Network mapping
The return on investment of information security can BEST be evaluated through which of the following?
Support of business objectives
Security metrics
Security deliverables
Process improvement models
Support of business objectives
To help ensure that contract personnel do not obtain unauthorized access to sensitive information, an information security manager should PRIMARILY:
set their accounts to expire in six months or less.
avoid granting system administration roles.
ensure they successfully pass background checks.
ensure their access is approved by the data owner.
avoid granting system administration roles.
Information security policies should:
address corporate network vulnerabilities.
address the process for communicating a violation.
be straightforward and easy to understand.
be customized to specific groups and roles.
be straightforward and easy to understand.
Which of the following is the BEST way to ensure that a corporate network is adequately secured against external attack?
Utilize an intrusion detection system.
Establish minimum security baselines.
Implement vendor recommended settings.
Perform periodic penetration testing.
Perform periodic penetration testing.
Which of the following presents the GREATEST exposure to internal attack on a network?
User passwords are not automatically expired
All network traffic goes through a single switch
User passwords are encoded but not encrypted
All users reside on a single internal subnet
User passwords are encoded but not encrypted
Which of the following provides the linkage to ensure that procedures are correctly aligned with information security policy requirements?
Standards
Guidelines
Security metrics
IT governance
Standards
Which of the following are the MOST important individuals to include as members of an information security steering committee?
Direct reports to the chief information officer
IT management and key business process owners
Cross-section of end users and IT professionals
Internal audit and corporate legal departments
IT management and key business process owners
Security audit reviews should PRIMARILY:
ensure that controls operate as required.
ensure that controls are cost-effective.
focus on preventive controls.
ensure controls are technologically current.
ensure that controls operate as required.
Which of the following is the MOST appropriate method to protect a password that opens a confidential file?
Delivery path tracing
Reverse lookup translation
Out-of-band channels
Digital signatures
Out-of-band channels
What is the MOST effective access control method to prevent users from sharing files with unauthorized users?
Mandatory
Discretionary
Walled garden
Role-based
Mandatory
Which of the following is an inherent weakness of signature-based intrusion detection systems?
A higher number of false positives
New attack methods will be missed
Long duration probing will be missed
Attack profiles can be easily spoofed
New attack methods will be missed
Data owners are normally responsible for which of the following?
Applying emergency changes to application data
Administering security over database records
Migrating application code changes to production
Determining the level of application security required
Determining the level of application security required
Which of the following is the MOST appropriate individual to ensure that new exposures have not been introduced into an existing application during the change management process?
System analyst
System user
Operations manager
Data security officer
System user
What is the BEST way to ensure users comply with organizational security requirements for password complexity?
Include password construction requirements in the security standards
Require each user to acknowledge the password requirements
Implement strict penalties for user noncompliance
Enable system-enforced password configuration
Enable system-enforced password configuration
Which of the following is the MOST appropriate method for deploying operating system (OS) patches to production application servers?
Batch patches into frequent server updates
Initially load the patches on a test machine
Set up servers to automatically download patches
Automatically push all patches to the servers
Initially load the patches on a test machine
Which of the following would present the GREATEST risk to information security?
Virus signature files updates are applied to all servers every day
Security access logs are reviewed within five business days
Critical patches are applied within 24 hours of their release
Security incidents are investigated within five business days
Security incidents are investigated within five business days
The PRIMARY reason for using metrics to evaluate information security is to:
identify security weaknesses.
justify budgetary expenditures.
enable steady improvement.
raise awareness on security issues.
enable steady improvement.
What is the BEST method to confirm that all firewall rules and router configuration settings are adequate?
Periodic review of network configuration
Review intrusion detection system (IDS) logs for evidence of attacks
Periodically perform penetration tests
Daily review of server logs for evidence of hacker activity
Periodically perform penetration tests
Which of the following is MOST important for measuring the effectiveness of a security awareness program?
Reduced number of security violation reports
A quantitative evaluation to ensure user comprehension
Increased interest in focus groups on security issues
Increased number of security violation reports
A quantitative evaluation to ensure user comprehension
Which of the following is the MOST important action to take when engaging third-party consultants to conduct an attack and penetration test?
Request a list of the software to be used
Provide clear directions to IT staff
Monitor intrusion detection system (IDS) and firewall logs closely
Establish clear rules of engagement
Establish clear rules of engagement
Which of the following will BEST prevent an employee from using a USB drive to copy files from desktop computers?
Restrict the available drive allocation on all PCs
Disable universal serial bus (USB) ports on all desktop devices
Conduct frequent awareness training with noncompliance penalties
Establish strict access controls to sensitive information
Restrict the available drive allocation on all PCs
Which of the following is the MOST important area of focus when examining potential security compromise of a new wireless network?
Signal strength
Number of administrators
Bandwidth
Encryption strength
Number of administrators
Good information security standards should:
define precise and unambiguous allowable limits.
describe the process for communicating violations.
address high-level objectives of the organization.
be updated frequently as new software is released.
define precise and unambiguous allowable limits.
Good information security procedures should:
define the allowable limits of behavior.
underline the importance of security governance.
describe security baselines for each platform.
be updated frequently as new software is released.
be updated frequently as new software is released.
What is the MAIN drawback of e-mailing password-protected zip files across the Internet? They:
all use weak encryption.
are decrypted by the firewall.
may be quarantined by mail filters.
may be corrupted by the receiving mail server.
may be quarantined by mail filters.