Domain 5: Protection of Information Assets (Part 5B) Flashcards
After installing a network, an organization implemented a vulnerability assessment tool to identify possible weaknesses. Which type of reporting poses the MOST serious risk associated with such tools?
False- negative
A benefit of quality of service is that the:
participating applications will have bandwidth guaranteed.
A company determined that its web site was compromised, and a rootkit was installed on the server hosting the application. Which of the following choices would have MOST likely prevented the incident?
A host-based intrusion prevention system
The computer security incident response team of an organization disseminates detailed descriptions of recent threats. An IS auditor’s GREATEST concern should be that the users may:
use this information to launch attacks.
A cyclic redundancy check is commonly used to determine the:
validity of data transfer.
A data center has a badge-entry system. Which of the following is MOST important to protect the computing assets in the center?
A process for promptly deactivating lost or stolen badges is followed.
During an IS audit of a global organization, the IS auditor discovers that the organization uses Voice-over Internet Protocol over the Internet as the sole means of voice connectivity among all offices. Which of the following presents the MOST significant risk for the organization’s VoIP infrastructure?
Distributed denial-of- service attack
During a review of intrusion detection logs, an IS auditor notices traffic coming from the Internet, which appears to originate from the internal IP address of the company payroll server. Which of the following malicious activities would MOST likely cause this type of result?
Spoofing
During the collection of forensic evidence, which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?
Rebooting the system
Electromagnetic emissions from a terminal represent a risk because they:
can be detected and displayed.
An employee has received a digital photo frame as a gift and has connected it to his/her work PC to transfer digital photos. The PRIMARY risk that this scenario introduces is that:
the photo frame could be infected with malware.
The FIRST step in a successful attack to a system is:
gathering information.
The GREATEST risk from an improperly implemented intrusion prevention system is:
blocking of critical systems or services due to false triggers.
A hacker could obtain passwords without the use of computer tools or programs through the technique of:
social engineering.
If inadequate, which of the following would be the MOST likely contributor to a denial- of-service attack?
Router configuration and rules
Inadequate programming and coding practices increase the risk of:
buffer overflow exploitation.
An information security policy stating that “the display of passwords must be masked or suppressed” addresses which of the following attack methods?
Shoulder surfing
An Internet-based attack using password sniffing can:
be used to gain access to systems containing proprietary information.
An IS auditor discovers that uniform resource locators (URLs) for online control self-assessment questionnaires are sent using URL shortening services. The use of URL shortening services would MOST likely increase the risk of which of the following attacks?
Phishing
An IS auditor has been asked by management to review a potentially fraudulent transaction. The PRIMARY focus of an IS auditor while evaluating the transaction should be to:
assure that the integrity of the evidence is maintained.
An IS auditor has found that employees are emailing sensitive company information to public web-based email domains. Which of the following is the BEST remediation option for the IS auditor to recommend?
Data loss prevention
An IS auditor is performing a review of a network. Users report that the network is slow and web pages periodically time out. The IS auditor confirms the users’ feedback and reports the findings to the network manager. The most appropriate action for the network management team should be to FIRST:
use a protocol analyzer to perform network analysis and review error logs of local area network equipment.
An IS auditor is reviewing an organization to ensure that evidence related to a data breach case is preserved. Which of the following choices would be of MOST concern to the IS auditor?
There is no chain of custody policy.
An IS auditor is reviewing security incident management procedures for the company. Which of the following choices is the MOST important consideration?
Chain of custody of electronic evidence
An IS auditor reviewing a network log discovers that an employee ran elevated commands on their PC by invoking the task scheduler to launch restricted applications. This is an example what type of attack?
A privilege escalation
An IS auditor reviewing digital rights management applications should expect to find an extensive use for which of the following technologies?
Steganography
An IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if:
the IDS is used to detect encrypted traffic.
An IS auditor selects a server for a penetration test that will be carried out by a technical specialist. Which of the following is MOST important?
Permission from the data owner of the server
An IS auditor suspects an incident is occurring while an audit is being performed on a financial system. What should the IS auditor do FIRST?
Report the incident to management.