CISM Practice B Topic 5 Flashcards
Which of the following should be determined FIRST when establishing a business continuity program?
Cost to rebuild information processing facilities
Incremental daily cost of the unavailability of systems
Location and cost of offsite recovery facilities
Composition and mission of individual recovery teams
Incremental daily cost of the unavailability of systems
A desktop computer that was involved in a computer security incident should be secured as evidence by:
- disconnecting the computer from all power sources.
- disabling all local user accounts except for one administrator.
- encrypting local files and uploading exact copies to a secure server.
- copying all files using the operating system (OS) to write-once media.
disconnecting the computer from all power sources.
A company has a network of branch offices with local file/print and mail servers; each branch individually contracts a hot site. Which of the following would be the GREATEST weakness in recovery capability?
Exclusive use of the hot site is limited to six weeks
The hot site may have to be shared with other customers
The time of declaration determines site access priority
The provider services all major companies in the area
The provider services all major companies in the area
Which of the following actions should be taken when an online trading company discovers a network attack in progress?
Shut off all network access points
Dump all event logs to removable media
Isolate the affected network segment
Enable trace logging on all events
Isolate the affected network segment
The BEST method for detecting and monitoring a hacker’s activities without exposing information assets to unnecessary risk is to utilize:
firewalls.
bastion hosts.
decoy files.
screened subnets.
decoy files.
The FIRST priority when responding to a major security incident is:
documentation.
monitoring.
restoration.
containment.
containment
Which of the following is the MOST important to ensure a successful recovery?
Backup media is stored offsite
Recovery location is secure and accessible
More than one hot site is available
Network alternate links are regularly tested
Backup media is stored offsite
Which of the following is the MOST important element to ensure the success of a disaster recovery test at a vendor-provided hot site?
Tests are scheduled on weekends
Network IP addresses are predefined
Equipment at the hot site is identical
Business management actively participates
Business management actively participates
At the conclusion of a disaster recovery test, which of the following should ALWAYS be performed prior to leaving the vendor’s hot site facility?
Erase data and software from devices
Conduct a meeting to evaluate the test
Complete an assessment of the hot site provider
Evaluate the results from all test scripts
Erase data and software from devices
An incident response policy must contain:
updated call trees.
escalation criteria.
press release templates.
critical backup files inventory.
escalation criteria.
The BEST approach in managing a security incident involving a successful penetration should be to:
allow business processes to continue during the response.
allow the security team to assess the attack profile.
permit the incident to continue to trace the source.
examine the incident response process for deficiencies.
allow business processes to continue during the response.
A post-incident review should be conducted by an incident management team to determine:
relevant electronic evidence.
lessons learned.
hacker’s identity.
areas affected.
lessons learned.
An organization with multiple data centers has designated one of its own facilities as the recovery site. The MOST important concern is the:
communication line capacity between data centers.
current processing capacity loads at data centers.
differences in logical security at each center.
synchronization of system software release versions.
current processing capacity loads at data centers.
Which of the following is MOST important in determining whether a disaster recovery test is successful?
Only business data files from offsite storage are used
IT staff fully recovers the processing infrastructure
Critical business processes are duplicated
All systems are restored within recovery time objectives (RTOs)
Critical business processes are duplicated
Which of the following is MOST important when deciding whether to build an alternate facility or subscribe to a third-party hot site?
Cost to build a redundant processing facility and invocation
Daily cost of losing critical systems and recovery time objectives (RTOs)
Infrastructure complexity and system sensitivity
Criticality results from the business impact analysis (BIA)
Infrastructure complexity and system sensitivity
A new e-mail virus that uses an attachment disguised as a picture file is spreading rapidly over the Internet. Which of the following should be performed FIRST in response to this threat?
Quarantine all picture files stored on file servers
Block all e-mails containing picture file attachments
Quarantine all mail servers connected to the Internet
Block incoming Internet mail, but permit outgoing mail
Block all e-mails containing picture file attachments
When a large organization discovers that it is the subject of a network probe, which of the following actions should be taken?
Reboot the router connecting the DMZ to the firewall
Power down all servers located on the DMZ segment
Monitor the probe and isolate the affected segment
Enable server trace logging on the affected segment
Monitor the probe and isolate the affected segment
Which of the following terms and conditions represent a significant deficiency if included in a commercial hot site contract?
A hot site facility will be shared in multiple disaster declarations
All equipment is provided “at time of disaster, not on floor”
The facility is subject to a “first-come, first-served” policy
Equipment may be substituted with equivalent model
All equipment is provided “at time of disaster, not on floor”
Which of the following should be performed FIRST in the aftermath of a denial-of-service attack?
Restore servers from backup media stored offsite
Conduct an assessment to determine system status
Perform an impact analysis of the outage
Isolate the screened subnet
Conduct an assessment to determine system status
Which of the following is the MOST important element to ensure the successful recovery of a business during a disaster?
Detailed technical recovery plans are maintained offsite
Network redundancy is maintained through separate providers
Hot site equipment needs are recertified on a regular basis
Appropriate declaration criteria have been established
Detailed technical recovery plans are maintained offsite
The business continuity policy should contain which of the following?
Emergency call trees
Recovery criteria
Business impact assessment (BIA)
Critical backups inventory
Recovery criteria
The PRIMARY purpose of installing an intrusion detection system (IDS) is to identify:
weaknesses in network security.
patterns of suspicious access.
how an attack was launched on the network.
potential attacks on the internal network.
potential attacks on the internal network.
When an organization is using an automated tool to manage and house its business continuity plans, which of the following is the PRIMARY concern?
Ensuring accessibility should a disaster occur
Versioning control as plans are modified
Broken hyperlinks to resources stored elsewhere
Tracking changes in personnel and plan assets
Ensuring accessibility should a disaster occur
Which of the following is the BEST way to verify that all critical production servers are utilizing up-to-date virus signature files?
Verify the date that signature files were last pushed out
Use a recently identified benign virus to test if it is quarantined
Research the most recent signature file and compare to the console
Check a sample of servers that the signature files are current
Check a sample of servers that the signature files are current
Which of the following actions should be taken when an information security manager discovers that a hacker is foot printing the network perimeter?
Reboot the border router connected to the firewall
Check IDS logs and monitor for any active attacks
Update IDS software to the latest available version
Enable server trace logging on the DMZ segment
Check IDS logs and monitor for any active attacks
Which of the following are the MOST important criteria when selecting virus protection software?
Product market share and annualized cost
Ability to interface with intrusion detection system (IDS) software and firewalls
Alert notifications and impact assessments for new viruses
Ease of maintenance and frequency of updates
Ease of maintenance and frequency of updates
Which of the following is the MOST serious exposure of automatically updating virus signature files on every desktop each Friday at 11:00 p.m. (23:00 hrs.)?
Most new viruses’ signatures are identified over weekends
Technical personnel are not available to support the operation
Systems are vulnerable to new viruses during the intervening week
The update’s success or failure is not known until Monday
Systems are vulnerable to new viruses during the intervening week
When performing a business impact analysis (BIA), which of the following should calculate the recovery time and cost estimates?
Business continuity coordinator
Information security manager
Business process owners
Industry averages benchmarks
Business process owners
Which of the following is MOST closely associated with a business continuity program?
Confirming that detailed technical recovery plans exist
Periodically testing network redundancy
Updating the hot site equipment configuration every quarter
Developing recovery time objectives (RTOs) for critical functions
Developing recovery time objectives (RTOs) for critical functions
Which of the following application systems should have the shortest recovery time objective (RTO)?
Contractor payroll
Change management
E-commerce web site
Fixed asset system
E-commerce web site
A computer incident response team (CIRT) manual should PRIMARILY contain which of the following documents?
Risk assessment results
Severity criteria
Emergency call tree directory
Table of critical backup files
Severity criteria
The PRIMARY purpose of performing an internal attack and penetration test as part of an incident response program is to identify:
weaknesses in network and server security.
ways to improve the incident response process.
potential attack vectors on the network perimeter.
the optimum response to internal hacker attacks.
weaknesses in network and server security.
Which of the following would represent a violation of the chain of custody when a backup tape has been identified as evidence in a fraud investigation? The tape was:
removed into the custody of law enforcement investigators.
kept in the tape library pending further analysis.
sealed in a signed envelope and locked in a safe under dual control.
handed over to authorized independent investigators.
kept in the tape library pending further analysis.
When properly tested, which of the following would MOST effectively support an information security manager in handling a security breach?
Business continuity plan
Disaster recovery plan
Incident response plan
Vulnerability management plan
Incident response plan