CISSP Exam Test 1 Flashcards
- Which of the following forms the foundation for information systems security?
a. Procedure
b. Policy
c. Software
d. Hardware
b. Policy
- A security policy document usually does not contain which of the following?
a. Rights
b. Responsibilities
c. Authority
d. Requirements
d. Requirements
- A security policy can be violated in all of the following ways except:
a. Knowingly
b. By collusion
c. Unknowingly
d. By committee input
d. By committee input
- An example of a security policy than can be legally monitored is:
a. Keystroke monitoring
b. E-mail monitoring
c. Web browser monitoring
d. Password monitoring
d. Password monitoring
- All of the following are important elements of a good security policy except:
a. Communication
b. Implementation
c. Perception
d. Retraction
c. Perception
- Which of the following is the largest security threat?
a. Internet
b. Users
c. Intranet
d. Extranet
b. Users
- All of the following provide a false sense of security except?
a. Security policy document
b. Password management
c. Policy enforcement
d. Access security rules
c. Policy enforcement
- Which of the following has both advantages and disadvantages?
a. Connecting to the Internet
b. Planting viruses
c. Stealing corporate data
d. Tinkering with configuration settings
a. Connecting to the Internet
- Which of the following is not a common method of attacking a computer system?
a. Password cracking
b. Packet sniffing
c. Encryption key breaking
d. Sendmail
c. Encryption key breaking
- An uncommon information systems security threat is directed at which of the following?
a. Hardware
b. Individuals
c. Software
d. Data
b. Individuals
- A major international threat to networks is:
a. Electrical interference
b. Employees
c. Hackers
d. Telephone line failures
b. Employees
- A common security problem is:
a. Discarded storage media
b. Telephone wiretapping
c. Intelligence consultants
d. Electronic bugs
a. Discarded storage media
- Which of the following is a legal activity?
a. Competitive intelligence
b. Industrial espionage
c. Economic espionage
d. Corporate espionage
a. Competitive intelligence
- Which of the following would not protect an organization from exposure to the Internet?
a. Firewall technology
b. Public networks
c. Passwords
d. Virtual private networks
b. Public networks
- A macro virus is most difficult to:
a. Prevent
b. Detect
c. Correct
d. Attach
b. Detect
- Which of the following is not an example of a first line of defense?
a. Physical security
b. Network monitors
c. Software testing
d. Quality assurance
c. Software testing
- Which of the following is seldom considered by system users?
a. Internet security
b. Residual data security
c. Network security
d. Application system security
b. Residual data security
- Which of the following U.S. legislation addresses privacy and security on the Internet?
a. The Encryption Communication Privacy Act
b. The Computer Security Act of 1987
c. The Privacy Act of 1974
d. The Economic Espionage and Protection of Proprietary Economic Information Act of 1996
a. The Encryption Communication Privacy Act
- Limiting access to information systems should be based on which of the following?
a. Trustworthiness of employees
b. Access time frames
c. Level hierarchy
d. As requested
c. Level hierarchy
- Which of the following is more risky?
a. Permanent access
b. Guest access
c. Temporary access
d. Contractor access
c. Temporary access
- Which of the following provides the most valuable information about a network’s vulnerabilities?
a. Periodic drills
b. Periodic staged intrusions
c. Periodic policy updates
d. Periodic procedure updates
b. Periodic staged intrusions
- The System Administrator’s Tool for Analyzing Networks (SATAN) is an example of:
a. A staged intrusion test
b. A computer virus test
c. A host firewall test
d. A Trojan horse test
a. A staged intrusion test
- Which of the following is not a problem associated with bootleg (pirated) software?
a. It allows users to obtain software from unauthorized sources
b. It introduces viruses that may exist within the software
c. It can be downloaded from the Internet
d. It can be freeware but the owner retains the copyright
d. It can be freeware but the owner retains the copyright
- Which of the following is not usually notified at all or notified last when a computer security incident has occurred?
a. System administrator
b. Legal counsel
c. Disaster recovery coordinator
d. Hardware and software vendors
b. Legal counsel
- Who should be the single point of contact during a computer security incident?
a. The same individual who is the first point of contact
b. The same individual who is the last point of contact
c. The individual who has both technical and management expertise
d. The individual who has the technical expertise
c. The individual who has both technical and management expertise
- A risk represented by a caller reporting a computer security incident is that he could be a:
a. Hardware engineer
b. Social engineer
c. Software engineer
d. Computer engineer
b. Social engineer
- A major reason why computer security incidents go unreported is:
a. To avoid negative publicity
b. To fix system problems
c. To learn from system attacks
d. To take legal action against the attacker
a. To avoid negative publicity
- The major purpose of conducting a post-incident analysis for a computer security incident is:
a. To determine how security threats and vulnerabilities were addressed
b. To learn how the attack was done
c. To recreate the original attack
d. To execute the response to an attack
a. To determine how security threats and vulnerabilities were addressed
- The last step when an insider violates a security policy is:
a. Verbal warning
b. Dismissal
c. Legal action
d. Written warning
c. Legal action
- A security policy does not usually provide information about:
a. How to implement a protective system
b. How to install monitoring software
c. How to respond to security violations
d. How to report security violations
c. How to respond to security violations
- Dumpster diving is:
a. Legal
b. Illegal
c. Legal if not caught
d. Illegal if not caught
a. Legal
- A firewall can become less effective for:
a. Centralized and bounded networks
b. Decentralized and bounded networks
c. Distributed and unbounded networks
d. Distributed and bounded networks
c. Distributed and unbounded networks