a. Determine asset value.
b. Assess the annualized rate of occurrence.
c. Derive the annualized loss expectancy.
d. Conduct a cost/benefit analysis.
D. The final step of a quantitative risk analysis is conducting a cost/benefit analysis to determine whether the organization should implement proposed countermeasure(s).
a. Spoofing
b. Information disclosure
c. Repudiation
d. Tampering
A. Spoofing attacks use falsified identities. Spoofing attacks may use false IP addresses, email addresses, names, or, in the case of an evil twin attack, SSIDs.
a. Storage of information by a customer on a provider’s server
b. Caching of information by the provider
c. Transmission of information over the provider’s network by a customer
d. Caching of information in a provider search engine
C. The DMCA states that providers are not responsible for the transitory activities of their users. Transmission of information over a network would qualify for this exemption. The other activities listed are all nontransitory actions that require remediation by the provider.
a. Notice
b. Choice
c. Onward Transfer
d. Enforcement
A. The Notice principle says that organizations must inform individuals of the information the organization collects about individuals and how the organization will use it. These principles are based upon the Safe Harbor Privacy Principles issued by the US Department of Commerce in 2000 to help US companies comply with EU and Swiss privacy laws when collecting, storing, processing or transmitting data on EU or Swiss citizens.
a. Focused on assets
b. Focused on attackers
c. Focused on software
d. Focused on social engineering
D. The three common threat modeling techniques are focused on attackers, software, and assets. Social engineering is a subset of attackers.
a. Student identification number
b. Social Security number
c. Driver’s license number
d. Credit card number
A. Most state data breach notification laws are modeled after California’s law, which covers Social Security number, driver’s license number, state identification card number, credit/debit card numbers, bank account numbers (in conjunction with a PIN or password), medical records, and health insurance information.
a. In 1991, the federal sentencing guidelines formalized a rule that requires senior executives to take personal responsibility for information security matters. What is the name of this rule?
a. Due diligence rule
b. Personal liability rule
c. Prudent man rule
d. Due process rule
C. The prudent man rule requires that senior executives take personal responsibility for ensuring the due care that ordinary, prudent individuals would exercise in the same situation. The rule originally applied to financial matters, but the Federal Sentencing Guidelines applied them to information security matters in 1991.
a. Username
b. PIN
c. Security question
d. Fingerprint scan
D. A fingerprint scan is an example of a “something you are” factor, which would be appropriate for pairing with a “something you know” password to achieve multifactor authentication. A username is not an authentication factor. PINs and security questions are both “something you know,” which would not achieve multifactor authentication when paired with a password because both methods would come from the same category, failing the requirement for multifactor authentication.
a. Department of Defense
b. Department of the Treasury
c. State Department
d. Department of Commerce
D. The US Department of Commerce is responsible for implementing the EU-US Safe Harbor agreement. The validity of this agreement was in legal question in the wake of the NSA surveillance disclosures.
a. GLBA
b. SOX
c. HIPAA
d. FERPA
A. The Gramm-Leach-Bliley Act (GLBA) contains provisions regulating the privacy of customer financial information. It applies specifically to financial institutions.
a. Tim’s organization recently received a contract to conduct sponsored research as a government contractor. What law now likely applies to the information systems involved in this contract?
a. FISMA
b. PCI DSS
c. HIPAA
d. GISRA
A. The Federal Information Security Management Act (FISMA) specifically applies to government contractors. The Government Information Security Reform Act (GISRA) was the precursor to FISMA and expired in November 2002. HIPAA and PCI DSS apply to healthcare and credit card information, respectively.
a. Memory chips
b. Office productivity applications
c. Hard drives
d. Encryption software
D. The export of encryption software to certain countries is regulated under US export control laws.
a. Spoofing
b. Repudiation
c. Tampering
d. Elevation of privilege
D. In an elevation of privilege attack, the attacker transforms a limited user account into an account with greater privileges, powers, and/or access to the system. Spoofing attacks falsify an identity, while repudiation attacks attempt to deny accountability for an action. Tampering attacks attempt to violate the integrity of information or resources.
a. Implement new security controls to reduce the risk level.
b. Design a disaster recovery plan.
c. Repeat the business impact assessment.
d. Document your decision-making process.
D. Whenever you choose to accept a risk, you should maintain detailed documentation of the risk acceptance process to satisfy auditors in the future. This should happen before implementing security controls, designing a disaster recovery plan, or repeating the business impact analysis (BIA).
a. Physical
b. Detective
c. Deterrent
d. Preventive
B. A fence does not have the ability to detect intrusions. It does, however, have the ability to prevent and deter an intrusion. Fences are an example of a physical control.
a. Quantitative risk assessment
b. Qualitative risk assessment
c. Neither quantitative nor qualitative risk assessment
d. Combination of quantitative and qualitative risk assessment
D. Tony would see the best results by combining elements of quantitative and qualitative risk assessment. Quantitative risk assessment excels at analyzing financial risk, while qualitative risk assessment is a good tool for intangible risks. Combining the two techniques provides a well-rounded risk picture.
a. Copyright Law
b. Lanham Act
c. Glass-Steagall Act
d. Economic Espionage Act
D. The Economic Espionage Act imposes fines and jail sentences on anyone found guilty of stealing trade secrets from a US corporation. It gives true teeth to the intellectual property rights of trade secret owners.
a. Due diligence
b. Separation of duties
c. Due care
d. Least privilege
C. The due care principle states that an individual should react in a situation using the same level of care that would be expected from any reasonable person. It is a very broad standard. The due diligence principle is a more specific component of due care that states that an individual assigned a responsibility should exercise due care to complete it accurately and in a timely manner.
a. One
b. Two
c. Three
d. Five
C. RAID level 5, disk striping with parity, requires a minimum of three physical hard disks to operate.
a. Intrusion detection system
b. Security awareness training
c. Firewalls
d. Security guards
B. Awareness training is an example of an administrative control. Firewalls and intrusion detection systems are technical controls. Security guards are physical controls.
a. Patent
b. Trade secret
c. Copyright
d. Trademark
A. Patents and trade secrets can both protect intellectual property related to a manufacturing process. Trade secrets are appropriate only when the details can be tightly controlled within an organization, so a patent is the appropriate solution in this case.
a. Restoring from backup tapes
b. Implementing RAID
c. Relocating to a cold site
d. Restarting business operations
B. RAID technology provides fault tolerance for hard drive failures and is an example of a business continuity action. Restoring from backup tapes, relocating to a cold site, and restarting business operations are all disaster recovery actions.
a. Identify vulnerabilities in each asset.
b. Determine the risks facing the asset.
c. Develop a value for each asset.
d. Identify threats facing each asset.
C. After developing a list of assets, the business impact analysis team should assign values to each asset.
a. Risk acceptance
b. Risk avoidance
c. Risk mitigation
d. Risk transference
C. Risk mitigation strategies attempt to lower the probability and/or impact of a risk occurring. Intrusion prevention systems attempt to reduce the probability of a successful attack and are, therefore, examples of risk mitigation.