Domain 1 Flashcards
- What is the final step of a quantitative risk analysis?
a. Determine asset value.
b. Assess the annualized rate of occurrence.
c. Derive the annualized loss expectancy.
d. Conduct a cost/benefit analysis.
D. The final step of a quantitative risk analysis is conducting a cost/benefit analysis to determine whether the organization should implement proposed countermeasure(s).
- An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat?
a. Spoofing
b. Information disclosure
c. Repudiation
d. Tampering
A. Spoofing attacks use falsified identities. Spoofing attacks may use false IP addresses, email addresses, names, or, in the case of an evil twin attack, SSIDs.
- Under the Digital Millennium Copyright Act (DMCA), what type of offenses do not require prompt action by an Internet service provider after it receives a notification of infringement claim from a copyright holder?
a. Storage of information by a customer on a provider’s server
b. Caching of information by the provider
c. Transmission of information over the provider’s network by a customer
d. Caching of information in a provider search engine
C. The DMCA states that providers are not responsible for the transitory activities of their users. Transmission of information over a network would qualify for this exemption. The other activities listed are all nontransitory actions that require remediation by the provider.
- FlyAway Travel has offices in both the European Union and the United States and transfers personal information between those offices regularly. Which of the seven requirements for processing personal information states that organizations must inform individuals about how the information they collect is used?
a. Notice
b. Choice
c. Onward Transfer
d. Enforcement
A. The Notice principle says that organizations must inform individuals of the information the organization collects about individuals and how the organization will use it. These principles are based upon the Safe Harbor Privacy Principles issued by the US Department of Commerce in 2000 to help US companies comply with EU and Swiss privacy laws when collecting, storing, processing or transmitting data on EU or Swiss citizens.
- Which one of the following is not one of the three common threat modeling techniques?
a. Focused on assets
b. Focused on attackers
c. Focused on software
d. Focused on social engineering
D. The three common threat modeling techniques are focused on attackers, software, and assets. Social engineering is a subset of attackers.
- Which one of the following elements of information is not considered personally identifiable information that would trigger most US state data breach laws?
a. Student identification number
b. Social Security number
c. Driver’s license number
d. Credit card number
A. Most state data breach notification laws are modeled after California’s law, which covers Social Security number, driver’s license number, state identification card number, credit/debit card numbers, bank account numbers (in conjunction with a PIN or password), medical records, and health insurance information.
a. In 1991, the federal sentencing guidelines formalized a rule that requires senior executives to take personal responsibility for information security matters. What is the name of this rule?
a. Due diligence rule
b. Personal liability rule
c. Prudent man rule
d. Due process rule
C. The prudent man rule requires that senior executives take personal responsibility for ensuring the due care that ordinary, prudent individuals would exercise in the same situation. The rule originally applied to financial matters, but the Federal Sentencing Guidelines applied them to information security matters in 1991.
- Which one of the following provides an authentication mechanism that would be appropriate for pairing with a password to achieve multifactor authentication?
a. Username
b. PIN
c. Security question
d. Fingerprint scan
D. A fingerprint scan is an example of a “something you are” factor, which would be appropriate for pairing with a “something you know” password to achieve multifactor authentication. A username is not an authentication factor. PINs and security questions are both “something you know,” which would not achieve multifactor authentication when paired with a password because both methods would come from the same category, failing the requirement for multifactor authentication.
- What United States government agency is responsible for administering the terms of safe harbor agreements between the European Union and the United States under the EU Data Protection Directive?
a. Department of Defense
b. Department of the Treasury
c. State Department
d. Department of Commerce
D. The US Department of Commerce is responsible for implementing the EU-US Safe Harbor agreement. The validity of this agreement was in legal question in the wake of the NSA surveillance disclosures.
- Yolanda is the chief privacy officer for a financial institution and is researching privacy issues related to customer checking accounts. Which one of the following laws is most likely to apply to this situation?
a. GLBA
b. SOX
c. HIPAA
d. FERPA
A. The Gramm-Leach-Bliley Act (GLBA) contains provisions regulating the privacy of customer financial information. It applies specifically to financial institutions.
a. Tim’s organization recently received a contract to conduct sponsored research as a government contractor. What law now likely applies to the information systems involved in this contract?
a. FISMA
b. PCI DSS
c. HIPAA
d. GISRA
A. The Federal Information Security Management Act (FISMA) specifically applies to government contractors. The Government Information Security Reform Act (GISRA) was the precursor to FISMA and expired in November 2002. HIPAA and PCI DSS apply to healthcare and credit card information, respectively.
- Chris is advising travelers from his organization who will be visiting many different countries overseas. He is concerned about compliance with export control laws. Which of the following technologies is most likely to trigger these regulations?
a. Memory chips
b. Office productivity applications
c. Hard drives
d. Encryption software
D. The export of encryption software to certain countries is regulated under US export control laws.
- Bobbi is investigating a security incident and discovers that an attacker began with a normal user account but managed to exploit a system vulnerability to provide that account with administrative rights. What type of attack took place under the STRIDE model?
a. Spoofing
b. Repudiation
c. Tampering
d. Elevation of privilege
D. In an elevation of privilege attack, the attacker transforms a limited user account into an account with greater privileges, powers, and/or access to the system. Spoofing attacks falsify an identity, while repudiation attacks attempt to deny accountability for an action. Tampering attacks attempt to violate the integrity of information or resources.
- You are completing your business continuity planning effort and have decided that you wish to accept one of the risks. What should you do next?
a. Implement new security controls to reduce the risk level.
b. Design a disaster recovery plan.
c. Repeat the business impact assessment.
d. Document your decision-making process.
D. Whenever you choose to accept a risk, you should maintain detailed documentation of the risk acceptance process to satisfy auditors in the future. This should happen before implementing security controls, designing a disaster recovery plan, or repeating the business impact analysis (BIA).
- Which one of the following control categories does not accurately describe a fence around a facility?
a. Physical
b. Detective
c. Deterrent
d. Preventive
B. A fence does not have the ability to detect intrusions. It does, however, have the ability to prevent and deter an intrusion. Fences are an example of a physical control.
- Tony is developing a business continuity plan and is having difficulty prioritizing resources because of the difficulty of combining information about tangible and intangible assets. What would be the most effective risk assessment approach for him to use?
a. Quantitative risk assessment
b. Qualitative risk assessment
c. Neither quantitative nor qualitative risk assessment
d. Combination of quantitative and qualitative risk assessment
D. Tony would see the best results by combining elements of quantitative and qualitative risk assessment. Quantitative risk assessment excels at analyzing financial risk, while qualitative risk assessment is a good tool for intangible risks. Combining the two techniques provides a well-rounded risk picture.
- What law provides intellectual property protection to the holders of trade secrets?
a. Copyright Law
b. Lanham Act
c. Glass-Steagall Act
d. Economic Espionage Act
D. The Economic Espionage Act imposes fines and jail sentences on anyone found guilty of stealing trade secrets from a US corporation. It gives true teeth to the intellectual property rights of trade secret owners.
- Which one of the following principles imposes a standard of care upon an individual that is broad and equivalent to what one would expect from a reasonable person under the circumstances?
a. Due diligence
b. Separation of duties
c. Due care
d. Least privilege
C. The due care principle states that an individual should react in a situation using the same level of care that would be expected from any reasonable person. It is a very broad standard. The due diligence principle is a more specific component of due care that states that an individual assigned a responsibility should exercise due care to complete it accurately and in a timely manner.
- Darcy is designing a fault tolerant system and wants to implement RAID-5 for her system. What is the minimum number of physical hard disks she can use to build this system?
a. One
b. Two
c. Three
d. Five
C. RAID level 5, disk striping with parity, requires a minimum of three physical hard disks to operate.
- Which one of the following is an example of an administrative control?
a. Intrusion detection system
b. Security awareness training
c. Firewalls
d. Security guards
B. Awareness training is an example of an administrative control. Firewalls and intrusion detection systems are technical controls. Security guards are physical controls.
- Keenan Systems recently developed a new manufacturing process for microprocessors. The company wants to license the technology to other companies for use but wishes to prevent unauthorized use of the technology. What type of intellectual property protection is best suited for this situation?
a. Patent
b. Trade secret
c. Copyright
d. Trademark
A. Patents and trade secrets can both protect intellectual property related to a manufacturing process. Trade secrets are appropriate only when the details can be tightly controlled within an organization, so a patent is the appropriate solution in this case.
- Which one of the following actions might be taken as part of a business continuity plan?
a. Restoring from backup tapes
b. Implementing RAID
c. Relocating to a cold site
d. Restarting business operations
B. RAID technology provides fault tolerance for hard drive failures and is an example of a business continuity action. Restoring from backup tapes, relocating to a cold site, and restarting business operations are all disaster recovery actions.
- When developing a business impact analysis, the team should first create a list of assets. What should happen next?
a. Identify vulnerabilities in each asset.
b. Determine the risks facing the asset.
c. Develop a value for each asset.
d. Identify threats facing each asset.
C. After developing a list of assets, the business impact analysis team should assign values to each asset.
- Mike recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Mike pursuing?
a. Risk acceptance
b. Risk avoidance
c. Risk mitigation
d. Risk transference
C. Risk mitigation strategies attempt to lower the probability and/or impact of a risk occurring. Intrusion prevention systems attempt to reduce the probability of a successful attack and are, therefore, examples of risk mitigation.
- Which one of the following is an example of physical infrastructure hardening?
a. Antivirus software
b. Hardware-based network firewall
c. Two-factor authentication
d. Fire suppression system
D. Fire suppression systems protect infrastructure from physical damage. Along with uninterruptible power supplies, fire suppression systems are good examples of technology used to harden physical infrastructure. Antivirus software, hardware firewalls, and two-factor authentication are all examples of logical controls.
- Which one of the following is normally used as an authorization tool?
a. ACL
b. Token
c. Username
d. Password
A. Access control lists are used for determining a user’s authorization level. Usernames are identification tools. Passwords and tokens are authentication tools.
- The International Information Systems Security Certification Consortium uses the logo below to represent itself online and in a variety of forums. What type of intellectual property protection may it use to protect its rights in this logo?
Image
Diagram shows the logo of International Information Systems Security Certification Consortium.
a. Copyright
b. Patent
c. Trade secret
d. Trademark
D. Trademark protection extends to words and symbols used to represent an organization, product, or service in the marketplace.
- Mary is helping a computer user who sees the following message appear on his computer screen. What type of attack has occurred?
Image
Cryptolocker dialog box shows the warning message that Your personal files are encrypted, any attempt to remove or damage this software will lead to the immediate destruction of the private key by server.
a. Availability
b. Confidentiality
c. Disclosure
d. Distributed
A. The message displayed is an example of ransomware, which encrypts the contents of a user’s computer to prevent legitimate use. This is an example of an availability attack.
- Which one of the following organizations would not be automatically subject to the terms of HIPAA if they engage in electronic transactions?
a. Healthcare provider
b. Health and fitness application developer
c. Health information clearinghouse
d. Health insurance plan
B. HIPAA regulates three types of entities—healthcare providers, health information clearinghouses, and health insurance plans—as well as the business associates of any of those covered entities.
- John’s network begins to experience symptoms of slowness. Upon investigation, he realizes that the network is being bombarded with ICMP ECHO REPLY packets and believes that his organization is the victim of a Smurf attack. What principle of information security is being violated?
a. Availability
b. Integrity
c. Confidentiality
d. Denial
A. A Smurf attack is an example of a denial of service attack, which jeopardizes the availability of a targeted network.
- Renee is designing the long-term security plan for her organization and has a three- to five-year planning horizon. What type of plan is she developing?
a. Operational
b. Tactical
c. Summary
d. Strategic
D. Strategic plans have a long-term planning horizon of up to five years in most cases. Operational and tactical plans have shorter horizons of a year or less.
- What government agency is responsible for the evaluation and registration of trademarks?
a. USPTO
b. Library of Congress
c. TVA
d. NIST
A. The United States Patent and Trademark Office (USPTO) bears responsibility for the registration of trademarks.
- The Acme Widgets Company is putting new controls in place for its accounting department. Management is concerned that a rogue accountant may be able to create a new false vendor and then issue checks to that vendor as payment for services that were never rendered. What security control can best help prevent this situation?
a. Mandatory vacation
b. Separation of duties
c. Defense in depth
d. Job rotation
B. When following the separation of duties principle, organizations divide critical tasks into discrete components and ensure that no one individual has the ability to perform both actions. This prevents a single rogue individual from performing that task in an unauthorized manner.
- Which one of the following categories of organizations is most likely to be covered by the provisions of FISMA?
a. Banks
b. Defense contractors
c. School districts
d. Hospitals
B. The Federal Information Security Management Act (FISMA) applies to federal government agencies and contractors. Of the entities listed, a defense contractor is the most likely to have government contracts subject to FISMA.
- Robert is responsible for securing systems used to process credit card information. What standard should guide his actions?
a. HIPAA
b. PCI DSS
c. SOX
d. GLBA
B. The Payment Card Industry Data Security Standard (PCI DSS) governs the storage, processing, and transmission of credit card information.
- Which one of the following individuals is normally responsible for fulfilling the operational data protection responsibilities delegated by senior management, such as validating data integrity, testing backups, and managing security policies?
a. Data custodian
b. Data owner
c. User
d. Auditor
A. The data custodian role is assigned to an individual who is responsible for implementing the security controls defined by policy and senior management. The data owner does bear ultimate responsibility for these tasks, but the data owner is typically a senior leader who delegates operational responsibility to a data custodian.
- Alan works for an e-commerce company that recently had some content stolen by another website and republished without permission. What type of intellectual property protection would best preserve Alan’s company’s rights?
a. Trade secret
b. Copyright
c. Trademark
d. Patent
B. Written works, such as website content, are normally protected by copyright law. Trade secret status would not be appropriate here because the content is online and available outside the company. Patents protect inventions and trademarks protect words and symbols used to represent a brand, neither of which is relevant in this scenario.
- Florian receives a flyer from a federal agency announcing that a new administrative law will affect his business operations. Where should he go to find the text of the law?
a. United States Code
b. Supreme Court rulings
c. Code of Federal Regulations
d. Compendium of Laws
C. The Code of Federal Regulations (CFR) contains the text of all administrative laws promulgated by federal agencies. The United States Code contains criminal and civil law. Supreme Court rulings contain interpretations of law and are not laws themselves. The Compendium of Laws does not exist.
- Tom is installing a next-generation firewall (NGFW) in his data center that is designed to block many types of application attacks. When viewed from a risk management perspective, what metric is Tom attempting to lower?
a. Impact
b. RPO
c. MTO
d. Likelihood
D. Installing a device that will block attacks is an attempt to lower risk by reducing the likelihood of a successful application attack.
- Which one of the following individuals would be the most effective organizational owner for an information security program?
a. CISSP-certified analyst
b. Chief information officer
c. Manager of network security
d. President and CEO
B. The owner of information security programs may be different from the individuals responsible for implementing the controls. This person should be as senior an individual as possible who is able to focus on the management of the security program. The president and CEO would not be an appropriate choice because an executive at this level is unlikely to have the time necessary to focus on security. Of the remaining choices, the CIO is the most senior position who would be the strongest advocate at the executive level.