Domain 5: Protection of Information Assets (Part 5B) Flashcards

1
Q

After installing a network, an organization implemented a vulnerability assessment tool to identify possible weaknesses. Which type of reporting poses the MOST serious risk associated with such tools?

A

False- negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A benefit of quality of service is that the:

A

participating applications will have bandwidth guaranteed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company determined that its web site was compromised, and a rootkit was installed on the server hosting the application. Which of the following choices would have MOST likely prevented the incident?

A

A host-based intrusion prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The computer security incident response team of an organization disseminates detailed descriptions of recent threats. An IS auditor’s GREATEST concern should be that the users may:

A

use this information to launch attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cyclic redundancy check is commonly used to determine the:

A

validity of data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A data center has a badge-entry system. Which of the following is MOST important to protect the computing assets in the center?

A

A process for promptly deactivating lost or stolen badges is followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During an IS audit of a global organization, the IS auditor discovers that the organization uses Voice-over Internet Protocol over the Internet as the sole means of voice connectivity among all offices. Which of the following presents the MOST significant risk for the organization’s VoIP infrastructure?

A

Distributed denial-of- service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

During a review of intrusion detection logs, an IS auditor notices traffic coming from the Internet, which appears to originate from the internal IP address of the company payroll server. Which of the following malicious activities would MOST likely cause this type of result?

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

During the collection of forensic evidence, which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?

A

Rebooting the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Electromagnetic emissions from a terminal represent a risk because they:

A

can be detected and displayed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An employee has received a digital photo frame as a gift and has connected it to his/her work PC to transfer digital photos. The PRIMARY risk that this scenario introduces is that:

A

the photo frame could be infected with malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The FIRST step in a successful attack to a system is:

A

gathering information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The GREATEST risk from an improperly implemented intrusion prevention system is:

A

blocking of critical systems or services due to false triggers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A hacker could obtain passwords without the use of computer tools or programs through the technique of:

A

social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If inadequate, which of the following would be the MOST likely contributor to a denial- of-service attack?

A

Router configuration and rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Inadequate programming and coding practices increase the risk of:

A

buffer overflow exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An information security policy stating that “the display of passwords must be masked or suppressed” addresses which of the following attack methods?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An Internet-based attack using password sniffing can:

A

be used to gain access to systems containing proprietary information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An IS auditor discovers that uniform resource locators (URLs) for online control self-assessment questionnaires are sent using URL shortening services. The use of URL shortening services would MOST likely increase the risk of which of the following attacks?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An IS auditor has been asked by management to review a potentially fraudulent transaction. The PRIMARY focus of an IS auditor while evaluating the transaction should be to:

A

assure that the integrity of the evidence is maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An IS auditor has found that employees are emailing sensitive company information to public web-based email domains. Which of the following is the BEST remediation option for the IS auditor to recommend?

A

Data loss prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An IS auditor is performing a review of a network. Users report that the network is slow and web pages periodically time out. The IS auditor confirms the users’ feedback and reports the findings to the network manager. The most appropriate action for the network management team should be to FIRST:

A

use a protocol analyzer to perform network analysis and review error logs of local area network equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An IS auditor is reviewing an organization to ensure that evidence related to a data breach case is preserved. Which of the following choices would be of MOST concern to the IS auditor?

A

There is no chain of custody policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An IS auditor is reviewing security incident management procedures for the company. Which of the following choices is the MOST important consideration?

A

Chain of custody of electronic evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An IS auditor reviewing a network log discovers that an employee ran elevated commands on their PC by invoking the task scheduler to launch restricted applications. This is an example what type of attack?

A

A privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An IS auditor reviewing digital rights management applications should expect to find an extensive use for which of the following technologies?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if:

A

the IDS is used to detect encrypted traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An IS auditor selects a server for a penetration test that will be carried out by a technical specialist. Which of the following is MOST important?

A

Permission from the data owner of the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An IS auditor suspects an incident is occurring while an audit is being performed on a financial system. What should the IS auditor do FIRST?

A

Report the incident to management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The MAIN reason for requiring that all computer clocks across an organization are synchronized is to:

A

support the incident investigation process.

31
Q

The management of an organization has decided to establish a security awareness program. Which of the following would MOST likely be a part of the program?

A

Training provided on a regular basis to all current and new employees

32
Q

The MOST important factor in planning a black box penetration test is:

A

knowledge by the management staff of the client organization.

33
Q

The MOST likely explanation for a successful social engineering attack is:

A

judgment errors.

34
Q

Neural networks are effective in detecting fraud because they can:

A

address problems that require consideration of a large number of input variables.

35
Q

An organization discovers that the computer of the chief financial officer has been infected with malware that includes a keystroke logger and a rootkit. The FIRST action to take would be to:

A

disconnect the PC from the network.

36
Q

A perpetrator looking to gain access to and gather information about encrypted data being transmitted over a network would MOST likely use:

A

traffic analysis.

37
Q

The PRIMARY purpose of audit trails is to:

A

establish accountability for processed transactions.

38
Q

The reason a certification and accreditation process is performed on critical systems is to ensure that:

A

security compliance has been technically evaluated.

39
Q

The reliability of an application system’s audit trail may be questionable if:

A

users can amend audit trail records when correcting system errors.

40
Q

To ensure compliance with a security policy requiring that passwords be a combination of letters and numbers, an IS auditor should recommend that:

A

an automated password management tool be used.

41
Q

To prevent Internet Protocol (IP) spoofing attacks, a firewall should be configured to drop a packet for which the sender of a packet:

A

specifies the route that a packet should take through the network (the source routing field is enabled).

42
Q

Users are issued security tokens to be used in combination with a personal identification number (PIN) to access the corporate virtual private network. Regarding the PIN, what is the MOST important rule to be included in a security policy?

A

Users should never write down their PIN.

43
Q

Web and email filtering tools are valuable to an organization PRIMARILY because they:

A

protect the organization from viruses and nonbusiness materials.

44
Q

Web application developers sometimes use hidden fields on web pages to save information about a client session. This technique is used, in some cases, to store session variables that enable persistence across web pages, such as maintaining the contents of a shopping cart on a retail web site application. The MOST likely web-based attack due to this practice is:

A

parameter tampering.

45
Q

A web server is attacked and compromised. Organizational policy states that incident response should balance containment of an attack with retaining freedom for later legal action against an attacker. Under the circumstances, which of the following should be performed FIRST?

A

Disconnect the web server from the network.

46
Q

What is the BEST approach to mitigate the risk of a phishing attack?

A

User education

47
Q

When conducting a penetration test of an IT system, an organization should be MOST concerned with:

A

estoring systems to the original state.

48
Q

When installing an intrusion detection system, which of the following is MOST important?

A

Properly locating it in the network architecture

49
Q

When performing a computer forensic investigation, in regard to the evidence gathered, an IS auditor should be MOST concerned with:

A

preservation.

50
Q

Which of the following antivirus software implementation strategies would be the MOST effective in an interconnected corporate network?

A

Enterprise- based antivirus software

51
Q

Which of the following controls would be MOST effective in reducing the risk of loss due to fraudulent online payment requests?

A

Transaction monitoring

52
Q

Which of the following criteria are MOST needed to ensure that log information is admissible in court? Ensure that data have been:

A

verified to ensure log integrity.

53
Q

Which of the following is a control that can be implemented to reduce risk of internal fraud if application programmers are allowed to move programs into the production environment in a small organization?

A

Registration and review of changes

54
Q

Which of the following is an example of a passive cybersecurity attack?

A

Traffic analysis

55
Q

Which of the following is a passive attack to a network?

A

Traffic analysis

56
Q

Which of the following is MOST indicative of the effectiveness of an information security awareness program?

A

Employees report more information regarding security incidents.

57
Q

Which of the following is the BEST control to mitigate the risk of pharming attacks to an Internet banking application?

A

Domain name system server security hardening

58
Q

Which of the following is the BEST criterion for evaluating the adequacy of an organization’s security awareness program?

A

Job descriptions contain clear statements of accountability for information security.

59
Q

Which of the following is the BEST way for an IS auditor to determine the effectiveness of a security awareness and training program?

A

Interview a sample of employees.

60
Q

Which of the following is the MAIN reason an organization should have an incident response plan? The plan helps to:

A

minimize the duration and impact of system outages and security incidents.

61
Q

Which of the following is the MOST important action in recovering from a cyberattack?

A

Activating an incident response team

62
Q

Which of the following is the MOST reliably effective method for dealing with the spread of a network worm that exploits vulnerability in a protocol?

A

Stop the services that the protocol uses.

63
Q

Which of the following methods BEST mitigates the risk of disclosing confidential information through the use of social networking sites?

A

Providing security awareness training

64
Q

Which of the following potentially blocks hacking attempts?

A

Intrusion prevention system

65
Q

Which of the following presents an inherent risk with no distinct identifiable preventive controls?

A

Data diddling

66
Q

Which of the following procedures would MOST effectively detect the loading of illegal software packages onto a network?

A

Periodic checking of hard drives

67
Q

Which of the following results in a denial-of-service attack?

A

Ping of death

68
Q

Which of the following situations would increase the likelihood of fraud?

A

Application programmers are implementing changes to production programs.

69
Q

Which of the following specifically addresses how to detect cyberattacks against an organization’s IT systems and how to recover from an attack?

A

An incident response plan

70
Q

Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?

A

Data mining techniques

71
Q

Which of the following types of penetration tests effectively evaluates the incident handling and response capability of the system administrator?

A

Double-blind testing

72
Q

Which of the following would be an indicator of the effectiveness of a computer security incident response team?

A

Financial impact per security incident

73
Q

Which of the following would MOST effectively reduce social engineering incidents?

A

Security awareness training

74
Q

While conducting an audit, an IS auditor detects the presence of a virus. What should be the IS auditor’s NEXT step?

A

Inform appropriate personnel immediately.