Domain 5: Protection of Information Assets Flashcards

1
Q

Enterprise requirements for complying with adopted global security standards is PRIMARILY determined by:

A.internal compliance.
B.legal compliance.
C.regulatory compliance.
D.contractual compliance.

A

A. Complying with adopted global security standards is primarily determined by internal compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An enterprise can ensure that the recipients of emails from its employees can authenticate the identity of the sender by:

A.digitally signing all email messages.
B.encrypting all email messages.
C.compressing all email messages.
D.password protecting all email messages.

A

A. By digitally signing all email messages, the receiver is able to validate the authenticity of the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the MOST important input for defining an information security framework for an enterprise?

Options:

A.Information security policies
B.Regulatory compliance requirements
C.Risk assessment results
D.Global security standards

A

D. Global security standards provide required high-level essential controls. These assist enterprises to define a security framework that meets the requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Users are issued security tokens to be used in combination with a personal identification number (PIN) to access the enterprise virtual private network. Regarding the PIN, what is the MOST important rule to be included in a security policy?

A.Users should not leave tokens where they can be stolen.
B.Users must never keep the token in the same bag as their laptop computer.
C.Users should select a PIN that is completely random, with no repeating digits.
D.Users should never write down their PIN.

A

D. If a user writes their PIN on a slip of paper, an individual with the token, the slip of paper and the computer can access the enterprise network. A token and the PIN are a two-factor authentication method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The implementation of access controls FIRST requires:

A.a classification of information systems (IS) resources.
B.the labeling of IS resources.
C.the creation of an access control list.
D.an inventory of IS resources.

A

D. The first step in implementing access controls is an inventory of IS resources, which is the basis for establishing ownership and classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An enterprise has created a policy that defines the types of websites that users are forbidden to access. What is the MOST effective technology to enforce this policy?

A.Stateful inspection firewall
B.Web content filter
C.Web cache server
D.Proxy server

A

B. A web content filter accepts or denies web communications according to the configured rules. To help the administrator properly configure the tool, enterprises and vendors have made available uniform resource locator blacklists and classifications for millions of websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In an enterprise where an IT security baseline has been defined, an information systems (IS) auditor should FIRST ensure:

A.implementation.
B.compliance.
C.documentation.
D.sufficiency.

A

D. An IS auditor should first evaluate the definition of the minimum baseline level by ensuring the sufficiency of the control baseline to meet security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To ensure compliance with a security policy requiring that passwords be a combination of letters and numbers, an information systems (IS) auditor should recommend that:

A.the enterprise policy be changed.
B.passwords are periodically changed.
C.an automated password management tool be used.
D.security awareness training is delivered.

A

C. The use of an automated password management tool is a preventive control measure. The software prevents repetition (semantic) and enforces syntactic rules, thus making the passwords robust. It also provides a method for ensuring frequent changes and prevents the same user from reusing his/her old password for a designated period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the MOST effective method for disposing of magnetic media that contains confidential information?

A.Degaussing
B.Defragmenting
C.Erasing
D.Destroying

A

D. Destroying magnetic media is the only way to assure that confidential information cannot be recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enterprise governance of IT frameworks MAINLY helps organizations address business issues by:

A.aligning high-level strategic objectives with operational-level objectives, followed by direct work outcomes.
B.establishing a risk management capability to address business issues and preserve the value delivered to stakeholders.
C.developing a roadmap to help fill in the gap between the current state (as-is) and the desired state (to-be).
D.conducting multiple meetings with different stakeholder groups to learn about their expectations.

A

A. The strategic alignment between business objectives and enterprise IT objectives is one of the most important advantages of applying enterprise governance of information and technology (EGIT) frameworks because it helps in achieving enterprise objectives and delivering value at a reasonable cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the BEST audit procedure to determine if a firewall is configured in compliance with the enterprise security policy?

A.Review the parameter settings.
B.Interview the firewall administrator.
C.Review the actual procedures.
D.Review the device’s log file for recent attacks.

A

A. A review of the parameter settings provides a good basis for comparison of the actual configuration to the security policy and provides audit evidence documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

From a control perspective, the PRIMARY objective of classifying information assets is to:

A.establish guidelines for the level of access controls that should be assigned.
B.ensure access controls are assigned to all information assets.
C.assist management and auditors in risk assessment.
D.identify which assets need to be insured against losses.

A

A. Information has varying degrees of sensitivity and criticality in meeting business objectives. By assigning classes or levels of sensitivity and criticality to information resources, management can establish guidelines for the level of access controls that should be assigned. End user management and the security administrator will use these classifications in their risk assessment process to assign a given class to each asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following methods BEST mitigates the risk of disclosing confidential information through the use of social networking sites?

A.Providing security awareness training
B.Requiring a signed acceptable use policy
C.Monitoring the use of social media
D.Blocking access to social media

A

A. Providing security awareness training is the best method to mitigate the risk of disclosing confidential information on social networking sites. It is important to remember that users may access these services through other means, such as mobile phones and home computers; therefore, awareness training is most critical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An information systems (IS) auditor inspected a windowless room containing phone switching and networking equipment and documentation binders. The room was equipped with two handheld fire extinguishers—one filled with carbon dioxide (CO2) and the other filled with halon gas. Which of the following should be given the HIGHEST priority in the IS auditor’s report?

A.The halon extinguisher should be removed because halon has a negative impact on the atmospheric ozone layer.
B.Both fire suppression systems present a risk of suffocation when used in a closed room.
C.The CO2 extinguisher should be removed because CO2 is ineffective for suppressing fires involving solid combustibles (paper).
D.The documentation binders should be removed from the equipment room to reduce potential risk.

A

B. Protecting people’s lives should always be of the highest priority in fire suppression activities. Carbon dioxide (CO2) and halon both reduce the oxygen ratio in the atmosphere, which can induce serious personal hazards. In many countries, installing or refilling halon fire suppression systems is not allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following exposures associated with the spooling of sensitive reports for offline printing should an information systems (IS) auditor consider to be the MOST serious?

A.Sensitive data might be read by operators.
B.Data might be amended without authorization.
C.Unauthorized report copies might be printed.
D.Output might be lost in the event of system failure.

A

C. Spooling for offline printing may enable additional copies to be printed unless adequate safeguards exist as compensating controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is BEST prevented by a raised floor in the computer machine room?

A.Damage of wires around computers and servers
B.A power failure from static electricity
C.Shocks from earthquakes
D.Water flood damage

A

A. The primary reason for having a raised floor is to enable ventilation systems, power cables and data cables to be installed underneath the floor. This eliminates the safety and damage risk posed when cables are scattered on an open floor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is the MOST effective control over visitor access to a data center?

A.Visitors are escorted.
B.Visitor badges are required.
C.Visitors sign in.
D.Visitors are spot-checked by operators.

A

A. Escorting visitors provides the best assurance that visitors have permission to access defined areas within the data processing facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When auditing security for a data center, an information systems (IS) auditor should look for the presence of a voltage regulator to ensure that the:

A.hardware is protected against power surges.
B.integrity is maintained if the main power is interrupted.
C.immediate power will be available if the main power is lost.
D.hardware is protected against long-term power fluctuations.

A

A. A voltage regulator protects against short-term power fluctuations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An information systems (IS) auditor is reviewing the physical security measures of an enterprise. Regarding the access card system, the IS auditor should be MOST concerned that:

A.nonpersonalized access cards are given to the cleaning staff, who use a sign-in sheet but show no proof of identity.
B.access cards are not labeled with the enterprise’s name and address to facilitate easy return of a lost card.
C.card issuance and rights administration for the cards are done by different departments, causing unnecessary lead time for new cards.
D.the computer system used for programming the cards can only be replaced after three weeks in the event of a system failure.

A

A. Physical security is meant to control who is entering a secured area, so identification of all individuals is of utmost importance. It is not adequate to trust unknown external people by allowing them to write down their alleged name without proof (e.g., identity card or driver’s license).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An information systems (IS) auditor is reviewing the network infrastructure of a call center and determines that the internal telephone system is based on Voice-over Internet Protocol (VoIP) technology. Which of the following is the GREATEST concern?

A.Voice communication uses the same equipment that is used for data communication.
B.Ethernet switches are not protected by uninterrupted power supply units.
C.Voice communication is not encrypted on the local network.
D.The team that supports the data network also is responsible for the telephone system.

A

B. VoIP telephone systems use the LAN infrastructure of an enterprise for communication, typically using Ethernet connectivity to connect individual phones to the system. Most enterprises have a backup power supply for the main servers and systems, but typically do not have uninterrupted power supply units for the LAN switches. In the case of even a brief power outage, not having backup power on all network devices makes it impossible to send or receive phone calls, which is a concern, particularly in a call center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An enterprise is proposing to establish a wireless local area network (WLAN). Management asks the information systems (IS) auditor to recommend security controls for the WLAN. Which of the following is the MOST appropriate recommendation?

A.Physically secure wireless access points to prevent tampering.
B.Use service set identifiers that clearly identify the enterprise.
C.Encrypt traffic using the wired equivalent privacy (WEP) mechanism.
D.Implement the Simple Network Management Protocol (SNMP) to allow active monitoring.

A

A. Physically securing access points, such as wireless routers, and preventing theft address the risk of malicious parties tampering with device settings. If access points can be physically reached, it is often a simple matter to restore weak default passwords and encryption keys, or to totally remove authentication and encryption from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An information systems (IS) auditor is reviewing the physical security controls of a data center and notices several areas for concern. Which of the following areas is the MOST important?

A.The emergency power off button cover is missing.
B.Scheduled maintenance of the fire suppression system was not performed.
C.There are no security cameras inside the data center.
D.The emergency exit door is blocked.

A

D. Life safety is always the highest priority; therefore, the blocking of the emergency exit is the most serious problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When reviewing the procedures for the disposal of computers, which of the following should be the GREATEST concern for the information systems (IS) auditor?

A.Hard disks are overwritten several times at the sector level but are not reformatted before leaving the enterprise.
B.All files and folders on hard disks are separately deleted, and the hard disks are formatted before leaving the enterprise.
C.Hard disks are rendered unreadable by hole-punching through the platters at specific positions before leaving the enterprise.
D.The transport of hard disks is escorted by internal security staff to a nearby metal recycling enterprise, where the hard disks are registered and then shredded.

A

B. Overwriting a hard disk at the sector level completely erases data, directories, indices and master file tables. Reformatting is not necessary, because all contents are destroyed. Overwriting several times makes useless some forensic measures, which are able to reconstruct former contents of newly overwritten sectors by analyzing special magnetic features of the platter’s surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An information systems (IS) auditor is reviewing an enterprise’s network operations center (NOC). Which of the following choices is of the GREATEST concern? The use of:

A.a wet pipe-based fire suppression system.
B.a rented rack space in the NOC.
C.a carbon-dioxide-based fire suppression system.
D.an uninterrupted power supply with 10 minutes of backup power.

A

C. CO2 systems should not be used in areas where people are present, because their function will cause suffocation in the event of a fire. Controls should consider personnel safety first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following environmental controls is appropriate to protect computer equipment against short-term reductions in electrical power?

A.Power-line conditioners
B.Surge-protection devices
C.Alternative power supplies
D.Interruptible power supplies

A

A. Power-line conditioners are used to compensate for peaks and valleys in the power supply and reduce peaks in the power flow to what is needed by the machine. Any valleys are removed by power stored in the equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Electromagnetic emissions from a terminal represent a risk because they:

A.can damage or erase nearby storage media.
B.can disrupt processor functions.
C.can have adverse health effects on personnel.
D.can be detected and displayed.

A

D. Emissions can be detected by sophisticated equipment and displayed, thus giving unauthorized persons access to data. TEMPEST is a term referring to the investigation and study of compromising emanations of unintentional intelligence-bearing signals that, if intercepted and analyzed, may reveal their contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which is the MOST important step an auditor should consider while developing an audit plan based on a risk-based approach?

A.Inventory the information systems in use in the enterprise and categorize them.
B.Assess what risk affect systems and the severity of the impact on the business.
C.Determine which systems impact critical enterprise functions and how close to real time they operate.
D.Rank the systems based on risk assessment and decide the audit priority, resources, schedule and frequency.

A

C. While planning the audit, the auditor decides what level of audit risk they are willing to accept. The more effective and extensive the audit work is, the less risk of a weakness going undetected. Understanding the critical systems of an enterprise and how close to real time they operate will help ensure that the auditor has the information needed to make a risk decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

During an access control review for a mainframe application, an information systems (IS) auditor discovers user security groups without designated owners. The PRIMARY reason that this is a concern to the IS auditor is that, without ownership, there is no one with clear responsibility for:

A.updating group metadata.
B.reviewing existing user access.
C.approval of user access.
D.removing terminated users.

A

C. Without an owner to provide approval for user access to the group, unauthorized individuals can potentially gain access to any sensitive data within the rights of the group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following should an information systems (IS) auditor be MOST concerned about in a financial application?

A.Programmers have access to source code in the user acceptance testing environment.
B.Secondary controls are documented for identified role conflicts.
C.The information security officer does not authorize all application changes.
D.Programmers have access to the production database.

A

D. Programmers having access to the production database is considered a separation of duties conflict.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A new business application was designed in a large, complex enterprise, and the business owner requested that the various reports be viewed on a need-to-know basis. Which of the following access control methods is the BEST method to achieve this requirement?

A.Mandatory
B.Role-based
C.Discretionary
D.Single sign-on (SSO)

A

B. Role-based access control limits access according to job roles and responsibilities and is the best method to allow only authorized users to view reports on a need-to-know basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An information systems (IS) auditor reviewing access controls for a client-server environment should FIRST:

A.evaluate the encryption technique.
B.identify the network access points.
C.review the identity management system.
D.review the application-level access controls.

A

B. A client-server environment typically contains several access points and uses distributed techniques, increasing the risk of unauthorized access to data and processing. To evaluate the security of the client server environment, all network access points should be identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

During a logical access controls review, an information systems (IS) auditor observes that user accounts are shared. The GREATEST risk resulting from this situation is that:

A.an unauthorized user may use the ID to gain access.
B.user access management is time consuming.
C.passwords are easily guessed.
D.user accountability may not be established.

A

D. The use of a user ID by more than one individual precludes knowing who used that ID to access a system; therefore, it is impossible to hold anyone accountable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

While auditing an internally developed web application, an information systems (IS) auditor determines that all business users share a common access profile. Which of the following is the MOST relevant recommendation to prevent the risk of unauthorized data modification?

A.Enable detailed logging of user actions.
B.Customize user access profiles per job responsibility.
C.Enforce a strong password policy for all accounts.
D.Implement regular access rights review.

A

B. The strongest control is a preventive control that is automated through the system. Developing additional access profiles ensures that the system restricts users to privileges defined by their job responsibilities and that an audit trail exists for those user actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The implementation of which of the following would MOST effectively prevent unauthorized access to a system administration account on a web server?

A.Host intrusion detection software installed on the server
B.Password expiration and lockout policy
C.Password complexity rules
D.Two-factor authentication

A

D. Two-factor authentication requires a user to use a password in combination with another identification factor that is not easily stolen or guessed by an attacker. Types of two-factor authentication include electronic access tokens that show one-time passwords on their display panels and biometric authentication systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An organization with extremely high security requirements is evaluating the effectiveness of biometric systems. Which of the following performance indicators is MOST important?

A.False-acceptance rate (FAR)
B.Equal-error rate (EER)
C.False-rejection rate (FRR)
D.False-identification rate (FIR)

A

A. False-acceptance rate (FAR) is the frequency of accepting an unauthorized person as authorized, thereby granting access when it should be denied. In an enterprise with high security requirements, limiting the number of false acceptances is more important than the impact on the false reject rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The BEST overall quantitative measure of the performance of biometric control devices is:

A.false-rejection rate (FRR).
B.false-acceptance rate (FAR) .
C.equal error rate (EER).
D.estimated-error rate.

A

C. A low equal error rate (EER) is a combination of a low FRR and a low FAR. EER, expressed as a percentage, is a measure of the number of times that the FRR and FAR are equal. A low EER is the measure of the more effective biometrics control device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following is the BEST access control procedure?

A.The data owner formally authorizes access and an administrator implements the user authorization tables.
B.Authorized staff implements the user authorization tables and the data owner approves them.
C.The data owner and an information systems (IS) manager jointly create and update the user authorization tables.
D.The data owner creates and updates the user authorization tables.

A

A. The data owner holds the privilege and responsibility for formally establishing the access rights. An information systems (IS) administrator should then implement or update user authorization tables at the direction of the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

In an online banking application, which of the following would BEST protect against identity theft?

A.Encryption of personal password
B.Restricting the user to a specific terminal
C.Multifactor authentication (MFA)
D.Periodic review of access logs

A

C. Multifactor authentication (MFA) requires two or more independent methods for establishing identity and privileges. Factors include something the user knows, such as a password; something the user has, such as a token; and something the user is, which is biometric. Requiring two or more of these factors makes identity theft more difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

There is a concern that the risk of unauthorized access may increase after implementing a single sign-on (SSO) process. To prevent unauthorized access, the MOST important action is to:

A.monitor failed authentication attempts.
B.review log files regularly.
C.deactivate unused accounts promptly.
D.mandate a strong password policy.

A

D. Strong passwords are important in any environment but take on special importance in an single sign-on (SSO) environment, where a user enters a password only one time and thereafter has general access throughout the environment. Of the options given, only a strong password policy offers broad preventative effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

An accuracy measure for a biometric system is:

A.system response time.
B.registration time.
C.input file size.
D.false-acceptance rate (FAR).

A

D. Three main accuracy measures are used for a biometric solution: false-rejection rate (FRR), cross-error rate (CER) and false-acceptance rate (FAR). FRR is a measure of how often valid individuals are rejected. FAR is a measure of how often invalid individuals are accepted. CER is a measure of when the false-rejection rate equals the false-acceptance rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

An information systems (IS) auditor reviewing the authentication controls of an enterprise should be MOST concerned if:

A.user accounts are not locked out after five failed attempts.
B.passwords can be reused by employees within a defined time frame.
C.system administrators use shared login credentials.
D.password expiration is not automated.

A

C. The use of shared login credentials makes accountability impossible. This is especially a risk with privileged accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

An information systems (IS) auditor evaluating logical access controls should FIRST:

A.document the controls applied to the potential access paths to the system.
B.test controls over the access paths to determine if they are functional.
C.evaluate the security environment in relation to written policies and practices.
D.obtain an understanding of the security risk to information processing.

A

D. When evaluating logical access controls, an IS auditor should first obtain an understanding of the security risk facing information processing by reviewing relevant documentation, inquiries, and conducting a risk assessment. This is necessary so that the IS auditor can ensure that the controls are adequate to address risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following groups would create the MOST concern to an information systems (IS) auditor if the group has full access to the production database?

A.Application developers
B.System administrators
C.Business users
D.Information security team

A

A. Application developers having access to the production environment bear the highest risk. Due to their focus on delivery of changes, they tend to bypass quality assurance controls installing deficient changes into the production environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

When reviewing an enterprise’s logical access security to its remote systems, which of the following would be of GREATEST concern to an information systems (IS) auditor?

A.Passwords are shared.
B.Unencrypted passwords are used.
C.Redundant logon IDs exist.
D.Third-party users possess administrator access.

A

B. When evaluating the technical aspects of logical security, unencrypted passwords represent the greatest risk because it is assumed that remote access is over an untrusted network where passwords can be discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

An information systems (IS) auditor is reviewing system access and discovers an excessive number of users with privileged access. The IS auditor discusses the situation with the system administrator, who states that some personnel in other departments need privileged access and management has approved the access. Which of the following is the BEST course of action for the IS auditor?

A.Determine whether compensating controls are in place.
B.Document the issue in the audit report.
C.Recommend an update to the procedures.
D.Discuss the issue with senior management.

A

A. An excessive number of users with privileged access is not necessarily an issue if compensating controls are in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

An information systems (IS) auditor is reviewing access controls for a manufacturing organization. During the review, the IS auditor discovers that data owners can change access controls for a low-risk application. The BEST course of action for the IS auditor is to:

A.recommend that mandatory access control be implemented.
B.report this as a finding to upper management
C.report this to the data owners to determine whether it is an exception.
D.not report this issue because discretionary access controls are in place.

A

D. DAC allows data owners to modify access, which is a normal procedure and is a characteristic of DAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A key IT systems developer has suddenly resigned from an enterprise. Which of the following will be the MOST important action?

A.Set up an exit interview with human resources.
B.Initiate the handover process to ensure continuity of the project.
C.Terminate the developer’s logical access to IT resources.
D.Ensure that management signs off on the termination paperwork.

A

C. To protect IT assets, terminating logical access to IT resources is the first and most important action to take after management has confirmed the employee’s clear intention to leave the enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The responsibility for authorizing access to a business application system belongs to the:

A.data owner.
B.security administrator.
C.IT security manager.
D.requestor’s immediate supervisor.

A

A. When a business application is developed, a good practice is to assign an information or data owner to the application. The information owner should be responsible for authorizing access to the application itself or to back-end databases for queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Web and email filtering tools are valuable to an enterprise PRIMARILY because they:

A.protect the enterprise from viruses and nonbusiness materials.
B.maximize employee performance.
C.safeguard the enterprise’s image.
D.assist the enterprise in preventing legal issues.

A

A. The main reason for investing in web and email filtering tools is that they significantly reduce risk related to viruses, spam, mail chains, recreational surfing and recreational email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The review of router access control lists should be conducted during:

A.an environmental review.
B.a network security review.
C.a business continuity review.
D.a data integrity review.

A

B. Network security reviews include reviewing router access control lists, port scanning, internal and external connections to the system, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following is the MOST effective control when granting temporary access to vendors?

A.Vendor access corresponds to the service level agreement (SLA).
B.User accounts are created with expiration dates and are based on services provided.
C.Administrator access is provided for a limited period.
D.User IDs are deleted when the work is completed.

A

B. The most effective control is to ensure that the granting of temporary access is based on services to be provided and that there is an expiration date (automated is best) associated with each unique ID. The use of an identity management system enforces temporary and permanent access for users, at the same time ensuring proper accounting of their activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

An information systems (IS) auditor discovers that the configuration settings for password controls are more stringent for business users than for IT developers. Which of the following is the BEST action for the IS auditor to take?

A.Determine whether this is a policy violation and document it.
B.Document the observation as an exception.
C.Recommend that all password configuration settings be identical.
D.Recommend that logs of IT developer access are reviewed periodically.

A

A. If the policy documents the purpose and approval for different procedures, then an information systems (IS) auditor only needs to document observations and tests about whether the procedures are followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

With the help of a security officer, granting access to data is the responsibility of:

A.data owners.
B.programmers.
C.system analysts.
D.librarians.

A

A. Data owners are responsible for the access to and use of data. Written authorization for users to gain access to computerized information should be provided by the data owners. Security administration with the owners’ approval sets up access rules stipulating which users or group of users are authorized to access data or files and the level of authorized access (e.g., read or update).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following is the BEST control to prevent the deletion of audit logs by unauthorized individuals in an enterprise?

A.Actions performed on log files should be tracked in a separate log.
B.Write access to audit logs should be disabled.
C.Only select personnel should have rights to view or delete audit logs.
D.Backups of audit logs should be performed periodically.

A

C. Granting audit-log access to only system administrators and security administrators reduces the possibility of these files being deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which stage of a biometrics system operation should the information systems (IS) auditor review FIRST?

A.Enrollment
B.Identification
C.Verification
D.Storage

A

A. The users must first be enrolled to use a biometric device; therefore, the information systems (IS) auditor should review this stage first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Due to resource constraints, a developer requires full access to production data to support certain problems reported by production users. Which of the following choices is a good compensating control for controlling unauthorized changes in production?

A.Provide and monitor separate developer login IDs for programming and for production support.
B.Capture activities of the developer in the production environment by enabling detailed audit trails.
C.Back up all affected records before allowing the developer to make production changes.
D.Ensure that all changes are approved by the change manager prior to implementation.

A

A. Providing separate login IDs that only allow a developer privileged access when required is a good compensating control, but it must also be backed up with monitoring and supervision of the activity of the developer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Authorizing access to application data is the responsibility of the:

A.data custodian.
B.application administrator.
C.data owner.
D.security administrator.

A

C. Data owners have authority to grant or withhold access to the data and applications for which they are responsible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

A data center has a badge-entry system. Which of the following is MOST important to protect the computing assets in the center?

A.Badge readers are installed in locations where tampering would be noticed.
B.The computer that controls the badge system is backed up frequently.
C.A process for promptly deactivating lost or stolen badges is followed.
D.All badge entry attempts are logged, whether or not they succeed.

A

C. The biggest risk is from unauthorized individuals who can enter the data center, whether they are employees or not. Thus, having and following a process of deactivating lost or stolen badges is important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

During a logical access controls review, an information systems (IS) auditor observes that user accounts are shared. The GREATEST risk resulting from this situation is that:

A.an unauthorized user may use a shared ID to gain access.
B.user access management is time consuming.
C.user accountability is not established.
D.passwords are easily guessed.

A

C. The use of a single user ID by more than one individual precludes knowing who, in fact, used that ID to access a system; therefore, it is more difficult to hold anyone accountable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which of the following is a form of two-factor user authentication?

A.A smart card and personal identification number
B.A unique User ID and complex, nondictionary password
C.An iris scan and a fingerprint scan
D.A magnetic-strip card and a proximity badge

A

A. A smart card is something that a user has, while a personal identification number paired with the card is something the user knows. This is an example of two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

An information systems (IS) auditor is assessing a biometric system used to protect physical access to a data center containing regulated data. Which of the following observations is the GREATEST concern to the auditor?

A.Administrative access to the biometric scanners or the access control system is permitted over a virtual private network.
B.Biometric scanners are not installed in restricted areas.
C.Data transmitted between the biometric scanners and the access control system do not use a securely encrypted tunnel.
D.Biometric system risk analysis was last conducted three years ago.

A

C. Data transmitted between the biometric scanners and the access control system should use a securely encrypted tunnel to protect the confidentiality of the biometric data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

The information systems (IS) auditor is reviewing the implementation of a storage area network (SAN). The SAN administrator indicates that logging and monitoring is active, hard zoning is used to isolate data belonging to different business units and all unused SAN ports are disabled. The administrator implemented the system, performed and documented security testing during implementation and is the only user with administrative rights to the system. What should the IS auditor’s initial determination be?

A.There is no significant potential risk.
B.Soft zoning presents a potential risk.
C.Disabling unused ports presents a potential risk.
D.The SAN administrator presents a potential risk.

A

D. The potential risk in this scenario is posed by the SAN administrator. One concern is having a single point of failure. Because only one administrator has the knowledge and access required to administer the system, the enterprise is susceptible to risk. For example, if the SAN administrator decided to quit unexpectedly or was otherwise unavailable, the enterprise may not be able to adequately administer the SAN. In addition, having a single administrator for a large, complex system, such as a SAN, also presents a separation of duties risk. The enterprise currently relies entirely on the SAN administrator to implement, maintain and validate all security controls; this means that the SAN administrator can modify or remove those controls without detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

A business application system accesses an enterprise database using a single ID and password embedded in a program. Which of the following would provide efficient access control over the enterprise data?

A.Introduce a secondary authentication method such as card swipe.
B.Apply role-based permissions within the application system.
C.Have users input the ID and password for each database transaction.
D.Set an expiration period for the database password embedded in the program.

A

B. This is a normal process to allow the application to communicate with the database. Therefore, the best control is to control access to the application and procedures to ensure that access to data is granted based on a user’s role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which of the following is an effective preventive control to ensure that a database administrator (DBA) complies with the custodianship of the enterprise’s data?

A.Exception reports
B.Separation of duties (SoD)
C.Review of access logs and activities
D.Management supervision

A

B. Adequate segregation/separation of duties (SoD) is a preventative control that can restrict the activities of the DBA to those that have been authorized by the data owners. SoD can restrict what a DBA can do by requiring more than one person to participate to complete a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which of the following findings is of GREATEST concern to an information systems (IS) auditor during a review of logical access to an application?

A.Some developers have update access to production data.
B.Developers can run a debugging tool in the production environment.
C.The change control team has knowledge of the application ID password.
D.The application does not enforce the use of strong passwords.

A

B. A debugging tool displays the execution of a program step by step and allows the user to modify data during execution. Using such a tool in production may result in unauthorized modification of production data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

An enterprise uses a biometric control system for managing access. Which of the following indicates the MOST effective biometric control system?

A.The highest equal error rate (EER)
B.The lowest EER
C.A false-rejection rate (FRR) equal to the false-acceptance rate (FAR)
D.A FRR equal to the failure-to-enroll rate (FER)

A

B. The EER of a biometric system denotes the percent at which the false-acceptance rate (FAR) is equal to the false-rejection rate (FRR). The biometric that has the lowest EER is the most effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which of the following is the GREATEST concern associated with the use of peer-to-peer computing?

A.Virus infection
B.Data leakage
C.Network performance issues
D.Unauthorized software usage

A

B. Peer-to-peer computing can share the contents of a user hard drive over the Internet. The risk that sensitive data can be shared with others is the greatest concern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The reason a certification and accreditation process is performed on critical systems is to ensure that:

A.security compliance has been technically evaluated.
B.data have been encrypted and are ready to be stored.
C.the systems have been tested to run on different platforms.
D.the systems have followed the phases of a waterfall model.

A

A. Certified and accredited systems are systems that have had their security compliance technically evaluated for running in a specific environment and configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Which of the following is a passive attack to a network?

A.Message modification
B.Masquerading
C.Denial-of-service
D.Traffic analysis

A

D. Traffic analysis allows a watching threat actor to determine the nature of the flow of traffic between defined hosts, which may allow the threat actor to guess the type of communication taking place without taking an active role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which of the following types of transmission media provide the BEST security against unauthorized access?

A.Copper wire
B.Shielded twisted pair
C.Fiber-optic cables
D.Coaxial cables

A

C. Fiber-optic cables have proven to be more secure and more difficult to tap than the other media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which of the following is the BEST way to minimize unauthorized access to unattended end-user PC systems?

A.Enforce the use of a password-protected screen saver.
B.Implement a proximity-based authentication system.
C.Terminate the user session at predefined intervals.
D.Adjust power management settings so the monitor screen is blank.

A

A. A password-protected screen saver with a proper time interval is the best measure to prevent unauthorized access to unattended end-user systems. It is important to ensure that users lock the workstation when they step away from the machine, which is something that can be reinforced via awareness training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

The technique used to ensure security in virtual private networks is called:

A.data encapsulation.
B.data wrapping.
C.data transformation.
D.data hashing.

A

A. Encapsulation, or tunneling, is a technique used to encrypt the traffic payload so that it can be securely transmitted over an insecure network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which of the following would be the BEST overall control for an Internet business looking for confidentiality, reliability and integrity of data?

A.Transport Layer Security (TLS)
B.Intrusion detection system (IDS)
C.Public key infrastructure
D.Virtual private network (VPN)

A

A. Transport Layer Security (TLS) is used for many ecommerce applications to set up a secure channel for communications that provides confidentiality through a combination of public and symmetric key encryption and integrity through hash message authentication code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

An enterprise stores and transmits sensitive customer information within a secure wired network. It has implemented an additional wireless local area network (WLAN) to support general-purpose staff computing needs. A few employees with WLAN access have legitimate business reasons for also accessing customer information. Which of the following represents the BEST control to ensure separation of the two networks?

A.Establish two physically separate networks.
B.Implement virtual local area network (VLAN) segmentation.
C.Install a dedicated router between the two networks.
D.Install a firewall between the networks.

A

D. In this case, a firewall can be used as a strong control to allow authorized users on the wireless network to access the wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A characteristic of User Datagram Protocol (UDP) in network communications is:

A.packets may arrive out of order.
B.increased communication latency.
C.incompatibility with packet broadcast.
D.error correction may slow down processing.

A

A. User Datagram Protocol (UDP) uses a simple transmission model without implicit handshaking routines for providing reliability, ordering or data integrity. Thus, UDP provides an unreliable service, and datagrams may arrive out of order, appear duplicated or get dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Validated digital signatures in an email software application will:

A.help detect unauthorized email.
B.provide confidentiality.
C.add to the workload of gateway servers.
D.significantly reduce available bandwidth.

A

A. Validated electronic signatures are based on qualified certificates that are created by a certificate authority, with the technical standards required to ensure the key can neither be forced nor reproduced in a reasonable time. Such certificates are only delivered through a registration authority after proof of identity has been passed. Using strong signatures in email traffic, nonrepudiation can be assured, and a sender can be tracked. The recipient can configure his/her email server or client to automatically delete emails from specific senders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

An information systems (IS) auditor performing detailed network assessments and access control reviews should FIRST:

A.determine the points of entry into the network.
B.evaluate users’ access authorization.
C.assess users’ identification and authorization.
D.evaluate the domain-controlling server configuration.

A

A. In performing detailed network assessments and access control reviews, an information systems (IS) auditor should first determine the points of entry to the system and review the points of entry, accordingly, for appropriate controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

An enterprise has established a guest network for visitor access. Which of the following should be of GREATEST concern to an information systems (IS) auditor?

A.A login screen is not displayed for guest users.
B.The guest network is not segregated from the production network.
C.Guest users who are logged in are not isolated from each other.
D.A single-factor authentication technique is used to grant access.

A

B. The implication of this is that guests have access to the enterprise network. Allowing untrusted users to connect to the enterprise network can introduce malware and potentially allow these individuals inappropriate access to systems and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

An organization requests that an information systems (IS) auditor provide a recommendation to enhance the security and reliability of its Voice-over Internet Protocol (VoIP) system and data traffic. Which of the following meets this objective?

A.VoIP infrastructure needs to be segregated using virtual local area networks.
B.Buffers need to be introduced at the VoIP endpoints.
C.Ensure that end-to-end encryption is enabled in the VoIP system.
D.Ensure that emergency backup power is available for all parts of the VoIP infrastructure.

A

A. Segregating the Voice-over Internet Protocol (VoIP) traffic using virtual local area networks (VLANs) best protects the VoIP infrastructure from network-based attacks, potential eavesdropping and network traffic issues (which helps to ensure uptime).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Enterprise XYZ has outsourced production support to service provider ABC located in another country. The ABC service provider personnel remotely connect to the enterprise network of the XYZ outsourcing entity over the Internet. Which of the following would provide the BEST assurance that only authorized users of ABC connect over the Internet for production support to XYZ?

A.Single sign-on (SSO) authentication
B.Password complexity requirements
C.Multifactor authentication (MFA)
D.Internet Protocol (IP) address restrictions

A

C. Multifactor authentication (MFA) is the best method to provide a secure connection because it uses multiple factors, typically, what you have (e.g., a device to generate one-time passwords), what you are (e.g., biometric characteristics) or what you know (e.g., a personal identification number or password). Using a password without the use of one or more of the other factors is not the best method for this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

An information systems (IS) auditor performing an audit of the newly installed Voice-over Internet Protocol system is inspecting the wiring closets on each floor of a building. What would be the GREATEST concern?

A.The local area network (LAN) switches are not connected to uninterruptible power supply units.
B.Network cabling is disorganized and not properly labeled.
C.The telephones are using the same cable used for LAN connections.
D.The wiring closet also contains power lines and breaker panels.

A

A. Voice-over Internet Protocol (VoIP) telephone systems use standard network cabling and typically each telephone gets power over the network cable (power over Ethernet) from the wiring closet where the network switch is installed. If the local area network switches do not have backup power, the phones will lose power if there is a utility interruption and potentially not be able to make emergency calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

In a small enterprise, an employee performs computer operations and, when the situation demands, the program modifications. Considering the lack of separation of duties in the IT environment, which of the following should the information systems (IS) auditor recommend to the IT management to mitigate the risk?

A.Automated logging of changes to development libraries
B.Additional staff to provide segregation/separation of duties (SoD)
C.Procedures that verify that only approved program changes are implemented
D.Access controls to prevent the operator from making program modifications

A

C. An information systems (IS) auditor must consider recommending a better process. An IS auditor should recommend a formal change control process that manages and can detect changes to production source and object code, such as code comparisons, so the changes can be reviewed on a regular basis by a third party. This is a compensating control process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

An information systems (IS) auditor is reviewing a manufacturing enterprise and finds that mainframe users at a remote site connect to the mainframe at headquarters over the Internet via Telnet. Which of the following offers the STRONGEST security?

A.Use of a point-to-point leased line
B.Use of a firewall rule to allow only the internet protocol (IP) address of the remote site
C.Use of two-factor authentication
D.Use of a nonstandard port for Telnet

A

A. A leased line effectively extends the local area network of the headquarters to the remote site, and the mainframe Telnet connection travels over the private line, which is less of a security risk when using an insecure protocol such as Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following MOST effectively enhances the security of a challenge-response based authentication system?

A.Selecting a more robust algorithm to generate challenge strings
B.Implementing measures to prevent session hijacking attacks
C.Increasing the frequency of associated password changes
D.Increasing the length of authentication strings

A

B. Challenge-response-based authentication is prone to session hijacking or man-in-the-middle attacks. Security management should be aware of this and engage in risk assessment and control design such as periodic authentication when they employ this technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Java applets and Active X controls are distributed programs that execute in the background of a client web browser. This practice is considered reasonable when:

A.a firewall exists.
B.a secure web connection is used.
C.the source of the executable file is certain.
D.the host website is part of the enterprise.

A

C. Acceptance of these mechanisms should be based on established trust. The control is provided by only knowing the source and then allowing the acceptance of the applets. Hostile applets can be received from anywhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

The potential for unauthorized system access by way of terminals or workstations within an enterprise’s facility is increased when:

A.connecting points are available in the facility to connect laptops to the network.
B.users take precautions to keep their passwords confidential.
C.terminals with password protection are located in insecure locations.
D.terminals are located within the facility in small clusters under the supervision of an administrator.

A

A. Any person with wrongful intentions can connect a laptop to the network. The insecure connecting points make unauthorized access possible if the individual has knowledge of a valid user ID and password. The other choices are controls for preventing unauthorized network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

An IT auditor completed the fieldwork phase of a network security review and is preparing the initial draft of the audit report. Which of the following findings would be the BIGGEST risk to the enterprise?

A.Network penetration tests are performed by an internal team.
B.Network firewall rules are not approved by the chief information security officer (CISO) before implementation.
C.Network penetration tests are not performed.
D.The inventory of network devices was last updated two years ago.

A

D. Keeping an up-to-date asset inventory is the most important requirement to keep an enterprise’s information assets secure. Without a complete inventory list and asset criticality determination, the risk assessment cannot be completed and controls will be inadequate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

An organization has experienced a large amount of traffic being re-routed from its Voice-over Internet Protocol packet network. The organization believes it is a victim of eavesdropping. Which of the following can result in eavesdropping of Voice-over Internet Protocol (VoIP) traffic?

A.Corruption of the Address Resolution Protocol cache in Ethernet switches
B.Use of a default administrator password on the analog phone switch
C.Deploying virtual local area networks VLANs without enabling encryption
D.End users having access to software tools such as packet sniffer applications

A

A. On an Ethernet switch, there is a data table known as the address resolution protocol (ARP) cache that stores mappings between media access control and internet protocol (IP) addresses. During normal operations, Ethernet switches only allow directed traffic to flow between the ports involved in the conversation and no other ports can see that traffic. However, if the ARP cache is intentionally corrupted with an ARP poisoning attack, some Ethernet switches simply flood the directed traffic to all ports of the switch, which can allow an attacker to monitor traffic not normally visible to the port where the attacker was connected, and thereby eavesdrop on Voice-over Internet Protocol (VoIP) traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

An enterprise is implementing a Dynamic Host Configuration Protocol (DHCP). Which of the following conditions represents the GREATEST concern?

A.Most employees use laptops.
B.A packet filtering firewall is used.
C.The internet protocol (IP) address space is smaller than the number of PCs.
D.Access to a network port is not restricted.

A

D. Physical access to network ports is not restricted, allowing unauthorized individuals to connect to the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which of the following preventive controls BEST helps secure a web application?

A.Password masking
B.Developer training
C.Use of encryption
D.Vulnerability testing

A

B. Of the given choices, teaching developers to write secure code is the best way to secure a web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

To prevent internet protocol (IP) spoofing attacks, a firewall should be configured to drop a packet for which the sender of a packet:

A.specifies the route that a packet should take through the network (the source routing field is enabled).
B.puts multiple destination hosts (the destination field has a broadcast address).
C.indicates that the computer should immediately stop using the transmission control protocol (TCP) connection (a reset flag is turned on).
D.allows use of dynamic routing instead of static routing (Open Shortest Path First protocol is enabled).

A

A. internet protocol (IP) spoofing takes advantage of the source-routing option in the IP. With this option enabled, an attacker can insert a spoofed source IP address. The packet will travel the network according to the information within the source-routing field, bypassing the logic in each router, including dynamic and static routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which of the following types of firewalls provide the GREATEST degree and granularity of control?

A.Screening router
B.Packet filter
C.Application gateway
D.Circuit gateway

A

C. The application gateway is similar to a circuit gateway, but it has specific proxies for each service. To handle web services, it has a hypertext transmission protocol (HTTP) proxy that acts as an intermediary between externals and internals but is specifically for HTTP. This means that it not only checks the packet internet protocol (IP) addresses (open systems interconnection (OSI) Layer 3) and the ports it is directed to (in this case port 80, or layer 4), but also checks every HTTP command (OSI Layers 5 and 7). Therefore, it works in a more detailed (granularity) way than the other choices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

In transport mode, the use of the encapsulation security payload (ESP), protocol is advantageous over the authentication header protocol because it provides:

A.connectionless integrity.
B.data origin authentication.
C.antireplay service.
D.confidentiality.

A

D. Only the ESP protocol provides confidentiality via encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

After reviewing its business processes, a large enterprise is deploying a new web application based on Voice-over Internet Protocol (VoIP) technology. Which of the following is the MOST appropriate approach for implementing access control that will facilitate security management of the VoIP web application?

A.Fine-grained access control
B.Role-based access control
C.Access control lists
D.Network/service access control

A

B. Authorization in this case can best be addressed by role-based access control (RBAC) technology. RBAC controls access according to job roles or functions. RBAC is easy to manage and can enforce strong and efficient access controls in large-scale web environments including VoIP implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Which of the following functions is performed by a virtual private network (VPN)?

A.Hiding information from sniffers on the net
B.Enforcing security policies
C.Detecting misuse or mistakes
D.Regulating access

A

A. A virtual private network (VPN) hides information from sniffers on the Internet using tunneling. It works based on encapsulation and encryption of sensitive traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Which of the following types of firewalls would BEST protect a network from an Internet attack?

A.Screened subnet firewall
B.Application filtering gateway
C.Packet filtering router
D.Circuit-level gateway

A

A. A screened subnet firewall would provide the best protection. The screening router can be a commercial router or a node with routing capabilities and the ability to allow or avoid traffic between nets or nodes based on addresses, ports, protocols, interfaces, etc. The subnet would isolate Internet-based traffic from the rest of the enterprise network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which of the following line media would provide the BEST security for a telecommunication network?

A.Broadband network digital transmission
B.Baseband network
C.Dialup
D.Dedicated lines

A

D. Dedicated lines are set apart for a particular user or organization. Because there is no sharing of lines or intermediate entry points, the risk of interception or disruption of telecommunications messages is lower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

An enterprise provides information to its supply chain partners and customers through an extranet infrastructure. Which of the following should be the GREATEST concern to an information systems (IS) auditor reviewing the firewall security architecture?

A.A secure sockets layer (SSL) has been implemented for user authentication and remote administration of the firewall.
B.Firewall policies are updated based on changing requirements.
C.Inbound traffic is blocked unless the traffic type and connections have been specifically permitted.
D.The firewall is placed on top of the commercial operating system (OS) with all default installation options.

A

D. The greatest concern when implementing firewalls on top of commercial operating systems (OSs) is the potential presence of vulnerabilities that can undermine the security posture of the firewall platform itself. In most circumstances, when commercial firewalls are breached, that breach is facilitated by vulnerabilities in the underlying OS. Keeping all installation options available on the system further increases the risk of vulnerabilities and exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which of the following is an example of the defense in-depth security principle?

A.Using two firewalls to consecutively check the incoming network traffic
B.Using a firewall as well as logical access controls on the hosts to control incoming network traffic
C.Lack of physical signs on the outside of a computer center building
D.Using two firewalls in parallel to check different types of incoming traffic

A

B. Defense in-depth means using different security mechanisms that back up each other. When network traffic passes the firewall unintentionally, the logical access controls form a second line of defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

The IT team of an enterprise informs the information systems (IS) auditor of a concern that some users might be loading illegal software packages onto a network. Which of the following should the IS auditor recommend for identifying if the concern is valid?

A.Use of diskless workstations
B.Periodic checking of hard drives
C.Use of current antivirus software
D.Policies that result in instant dismissal if violated

A

B. The periodic checking of hard drives would be the most effective method of identifying illegal software packages loaded onto the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

An information systems (IS) auditor finds that conference rooms have active network ports. Which of the following prevents this from being of any concern for the enterprise?

A.The enterprise network is using an intrusion prevention system (IPS).
B.The conference rooms part of the network is isolated from the enterprise network.
C.A single sign-on (SSO) has been implemented in the enterprise network.
D.Antivirus software is in place to protect the enterprise network.

A

B. If the conference rooms have access to the enterprise network, unauthorized users may be able to connect to the enterprise network; therefore, both networks should be isolated either via a firewall or by being physically separated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

When planning an audit of a network setup, an information systems (IS) auditor should give highest priority to obtaining which of the following network documentation?

A.Wiring and schematic diagram
B.Users’ lists and responsibilities
C.Application lists and their details
D.Backup and recovery procedures

A

A. The wiring and schematic diagram of the network is necessary to carry out a network audit. The information systems (IS) auditor needs to know what equipment, configuration and addressing is used on the network to perform an audit of the network setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Enterprise XYZ has outsourced production support to service provider ABC, located in another country. The ABC service provider personnel remotely connect to the enterprise network of the XYZ outsourcing entity over the Internet. Which of the following would BEST provide assurance that transmission of information is secure while the production support team at ABC is providing support to XYZ?

A.Secret key encryption
B.Dynamic internet protocol (IP) address and port
C.Hash functions
D.Virtual private network (VPN) tunnel

A

D. Because ABC and XYZ are communicating over the Internet, which is an untrusted network, establishing an encrypted virtual private network (VPN) tunnel best ensures that the transmission of information is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

The BEST filter rule for protecting a network from being used as an amplifier in a denial-of-service attack is to deny all:

A.outgoing traffic with source addresses external to the network.
B.incoming traffic with discernible spoofed internet protocol (IP) source addresses.
C.incoming traffic that includes options set in the Internet Protocol.
D.incoming traffic whose destination address belongs to critical hosts.

A

A. Outgoing traffic with an internet protocol (IP) source address different than the internal IP range in the network is invalid. In most cases, it signals a denial-of-service attack originated by an internal user or by a previously compromised internal machine; in both cases, applying this filter will stop the infected machine from participating in the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which of the following is the MOST secure and economical method for connecting a private network over the Internet in a small- to medium-sized enterprise?

A.Virtual private network (VPN)
B.Dedicated line
C.Leased line
D.Integrated services digital network

A

A. The most secure method is a virtual private network (VPN), using encryption, authentication and tunneling to allow data to travel securely from a private network to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What is the MOST prevalent security risk when an organization implements remote virtual private network (VPN) access to its network?

A.Malicious code can be spread across the network.
B.The VPN logon can be spoofed.
C.Traffic can be sniffed and decrypted.
D.The VPN gateway can be compromised.

A

A. Virtual private network (VPN) is a mature technology; VPN devices are hard to break. However, when remote access is enabled, malicious code in a remote client can spread to the enterprise’s network. One problem is when the VPN terminates inside the network and the encrypted VPN traffic goes through the firewall. This means that the firewall cannot adequately examine the traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

The PRIMARY goal of a website certificate is:

A.authentication of the website that will be surfed.
B.authentication of the user who surfs through that site.
C.preventing surfing of the website by hackers.
D.the same purpose as that of a digital certificate.

A

A. Authenticating the site to be surfed is the primary goal of a web certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Which of the following provides the MOST relevant information for proactively strengthening security settings?

A.Bastion host
B.Intrusion detection system (IDS)
C.Honeypot
D.Intrusion prevention system (IPS)

A

C. The design of a honeypot is such that it lures the hacker and provides clues about the hacker’s methods and strategies, and the resources required to address such attacks. A honeypot allows the attack to continue, to obtain information about the hacker’s strategy and methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which of the following will BEST maintain the integrity of a firewall log?

A.Granting access to log information only to administrators
B.Capturing log events in the operating system (OS) layer
C.Writing dual logs onto separate storage media
D.Sending log information to a dedicated third-party log server

A

D. Establishing a dedicated third-party log server and logging events in it is the best procedure for maintaining the integrity of a firewall log. When access control to the log server is adequately maintained, the risk of unauthorized log modification is mitigated, therefore improving the integrity of log information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

The information systems (IS) management of a multinational enterprise is considering upgrading its existing virtual private network (VPN) to support Voice-over Internet Protocol (VoIP) communication via tunneling. Which of the following considerations should be PRIMARILY addressed?

A.Reliability and quality of service
B.Means of authentication
C.Privacy of voice transmissions
D.Confidentiality of data transmissions

A

A. Reliability and quality of service (QoS) are the primary considerations to be addressed. Voice communications require consistent levels of service, which may be provided through QoS and class of service controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

An organization is considering connecting a critical PC-based system to the Internet. Which of the following provides the BEST protection against hacking?

A.Application-level gateway
B.Remote access server
C.Proxy server
D.Port scanning

A

A. An application-level gateway is the best way to protect against hacking because it can be configured with detailed rules that describe the type of user or connection that is or is not permitted. It analyzes, in detail, each package—not only in layers one through four of the Open System Interconnection model, but also layers five through seven, which means that it reviews the commands of each higher-level protocol (Hypertext Transmission Protocol, File Transfer Protocol, Simple Network Management Protocol, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

An information systems (IS) auditor performing a telecommunication access control review should be concerned PRIMARILY with the:

A.maintenance of access logs of usage of various system resources.
B.authorization and authentication of the user prior to granting access to system resources.
C.adequate protection of stored data on servers by encryption or other means.
D.accountability system and the ability to identify any terminal accessing system resources.

A

B. The authorization and authentication of users before granting them access to system resources (networks, servers, applications, etc.) is the most significant aspect in a telecommunication access control review because it is a preventive control. Weak controls at this level can affect all other aspects of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

An information systems (IS) auditor found that employees are emailing sensitive enterprise information to public web-based email domains. Which of the following is the BEST remediation option for the IS auditor to recommend?

A.Encrypted mail accounts
B.Training and awareness
C.Activity monitoring
D.Data loss prevention

A

D. Data loss prevention is an automated preventive tool that can block sensitive information from leaving the network, while, at the same time, logging the offenders. This is a better choice than relying on training and awareness because it works equally well when there is intent to steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Which of the following measures is an effective method to deal with a data loss event experienced by an enterprise?

A.Sharing sensitive data via unencrypted email
B.Allowing unrestricted access to sensitive data
C.Implementing regular data backups
D.Using weak passwords for user accounts

A

C. Regular data backups are an effective method for data loss prevention. By creating frequent backups, enterprises can ensure that they can restore the data to its previous state in the event of data loss or corruption. This practice helps protect against accidental data deletion, hardware failure and data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Which of the following BEST describes the effect of adopting risk-based audit planning on audit resources? Risk-based auditing helps in:

A.increasing the frequency of internal audits.
B.enabling control self-assessments to replace audits.
C.reducing the level of detection risk.
D.allocating audit resources to a higher risk area.

A

D. A risk-based audit approach focuses on high-risk areas by allocating audit resources based on priority.

111
Q

Which of the following would be MOST appropriate for helping to detect sensitive information that is stored on the enterprise hard drive(s) with inappropriate authorization or security controls?

A.intrusion detection system (IDS)
B.data loss prevention (DLP)
C.intrusion prevention system (IPS)
D.Transport Layer Security (TLS)

A

B. Data loss prevention (DLP) systems identify sensitive information stored on endpoint systems or in transit over a network.

112
Q

Which of the following BEST helps in controlling false-positive alerts received during the implementation of a data loss prevention (DLP) solution?

A.Implement the data loss prevention (DLP) solution in monitor-mode.
B.Plan data loss prevention (DLP) implementation in a phased manner.
C.Appoint an external expert to define rules for the data loss prevention (DLP) solution.
D.Perform data classification before implementing the data loss prevention (DLP) solution.

A

B. Implementing a data loss prevention (DLP) solution in a phased manner with a limited number of devices and connections helps in optimizing rules to minimize false-positive alerts.

113
Q

Which of the following BEST describes the primary objective of a data loss prevention (DLP) solution?

A.To prevent any data loss incidents within an enterprise
B.To detect and respond to data loss incidents within an enterprise
C.To mitigate the risk of data loss incidents within an enterprise
D.To encrypt data within an enterprise to prevent unauthorized access

A

C. The primary objective of a DLP solution is to mitigate the risk of data loss incidents by implementing a range of preventive and detective controls, such as access controls, data classification, encryption, monitoring and response procedures. These controls help prevent unintentional or malicious data loss incidents, detect and respond to incidents promptly, and minimize the impact of data loss incidents on the enterprise.

114
Q

Which of the following is the MOST effective way to prevent accidental data loss caused by employees?

A.Blocking access to all external websites and email domains
B.Encrypting all sensitive data on all storage devices within the enterprise
C.Conducting regular user awareness training programs
D.Implementing strict access controls to restrict employee access to sensitive data

A

C. Accidental data loss caused by employees is a common occurrence in many enterprises. Regular training and awareness programs can help employees understand their roles and responsibilities in protecting sensitive data, identify potential risk and vulnerabilities, and take appropriate measures to prevent data loss incidents. Employee training and awareness are critical to any data protection strategy. Employees need to understand the value of the information that they handle, the consequences of data loss and their role in data protection. Regular training and awareness sessions should be conducted to keep employees updated about best practices for handling and protecting data.

115
Q

The PRIMARY purpose of installing data leak prevention software is to:

A.restrict user access to confidential files stored on servers.
B.detect attempts to destroy sensitive data in an internal network.
C.block external systems from accessing internal resources.
D.control confidential documents leaving the internal network.

A

D. A server running a DLP software application uses predefined criteria to check whether any confidential documents or data are leaving the internal network.

116
Q

Which of the following methods can BEST help prevent inadvertent data loss in an enterprise?

A.Employee training
B.Encryption
C.Firewall
D.Antivirus software

A

A. Employee training is a key component in data loss prevention strategies. Educating employees reduces the likelihood of data loss incidents. Proper training helps employees understand their responsibilities in handling sensitive data and recognizing potential threats; thus, an enterprise can mitigate the risk of unintentional loss caused by human error.

117
Q

Which of the following measures is the MOST effective method for preventing data exfiltration?

A.Disabling antivirus software on all devices
B.Implementing network segmentation
C.Allowing unrestricted USB device usage
D.Using default security configurations

A

B. Implementing network segmentation is an effective method for preventing data exfiltration. Enterprises can isolate sensitive data and limit access to authorized individuals by dividing a network into smaller segments. This helps prevent unauthorized users or malware from moving laterally within the network and accessing valuable data.

118
Q

Which of the following would the auditor consider MOST important for effective data protection using a data loss prevention (DLP) solution?

A.Ensuring that a single administrator maintains the DLP to prevent data disclosures
B.Ensuring that the DLP solution is properly configured and implemented
C.Ensuring the effectiveness of the enterprise’s DLP policies and procedures
D.Ensuring the effectiveness of the encryption and de-identification technologies

A

B. A DLP solution is only as effective as its configuration and implementation. If the DLP solution is not properly configured, it may not be able to detect or prevent sensitive data from being disclosed. Additionally, if the DLP solution is not properly implemented, it may be unable to enforce data protection policies effectively.

119
Q

Which control is the BEST way to ensure that the data in a file have not been changed during transmission?

A.Reasonableness check
B.Parity bits
C.Hash values
D.Check digits

A

C. Hash values are calculated on the file and are very sensitive to any changes in the data values in the file. Thus, they are the best way to ensure that data has not changed.

120
Q

Which of the following types of risk is BEST represented by an enterprise using manual controls instead of automated controls for data loss prevention?

A.Control risk
B.Inherent risk
C.Detection risk
D.Sampling risk

A

A. Automated controls are much more effective than manual controls for data loss prevention. Manual controls, therefore, have a higher control risk than automated controls.

121
Q

An information systems (IS) auditor is performing a review of a network. Users report that the network is slow and web pages periodically time out. The IS auditor confirms the users’ feedback and reports the findings to the network manager. The most appropriate action for the network management team should be to FIRST:

A.use a protocol analyzer to perform network analysis and review error logs of local area network (LAN) equipment.
B.take steps to increase the bandwidth of the connection to the Internet.
C.create a baseline using a protocol analyzer and implement quality of service to ensure that critical business applications work as intended.
D.implement virtual local area networks (VLANs) to segment the network and ensure performance.

A

A. In this case, the first step is to identify the problem through review and analysis of network traffic. Using a protocol analyzer and reviewing the log files of the related switches or routers determine whether there is a configuration issue or hardware malfunction.

122
Q

An enterprise allows for the use of universal serial bus drives to transfer operational data between offices. Which of the following is the GREATEST risk associated with the use of these devices?

A.Files not backed up
B.Theft of the devices
C.Use of the devices for personal purposes
D.Introduction of malware into the network

A

B. Because USB drives tend to be small, they are susceptible to theft or loss. This represents the greatest risk to the enterprise.

123
Q

An alert raised from a data loss prevention (DLP) solution about sensitive data in transit is BEST investigated and resolved by:

A.the security officer.
B.the data loss prevention (DLP) administrator.
C.the incident response team.
D.the data owner.

A

D. The data owner is the best person to make decisions regarding data being sent over networks. Therefore, the data owner should investigate and resolve any alerts from the data loss prevention (DLP) solution.

124
Q

A hard disk containing confidential data was damaged beyond repair. If the goal is to ensure with certainty that access to the data by anyone else is prevented, what should be done to the hard disk before it is discarded?

A.Overwriting
B.Low-level formatting
C.Degaussing
D.Destruction

A

D. Physically destroying the hard disk is the most effective way to ensure that data cannot be recovered.

125
Q

A cyclic redundancy check is commonly used to determine the:

A.accuracy of data input.
B.integrity of a downloaded program.
C.adequacy of encryption.
D.validity of data transfer.

A

D. The accuracy of blocks of data transfers, such as data transfer from hard disks, is validated by a cyclic redundancy check.

126
Q

Which of the following is the MOST important factor for an enterprise considering implementing a data loss prevention (DLP) solution?

A.Evaluating the features of different data loss prevention (DLP) products available
B.Understanding the location and nature of sensitive data
C.Educating users on the importance of data protection
D.Determining action to be taken by data loss prevention (DLP) in case of alerts

A

B. It is necessary to identify sensitive data and its location so that an enterprise can evaluate efforts required to protect data. The data should also be classified so that the proper level of protection can be applied to the data.

127
Q

When using a digital signature, the message digest is computed by the:

A.sender only.
B.receiver only.
C.sender and receiver both.
D.Certificate authority (CA).

A

C. A digital signature is an electronic identification of a person or entity. It is created using asymmetric encryption. To verify integrity of data, the sender uses a cryptographic hashing algorithm against the entire message to create a message digest to be sent along with the message. Upon receipt of the message, the receiver will recompute the hash using the same algorithm.

128
Q

Confidentiality of the data transmitted in a wireless local area network (WLAN) is BEST protected if the session is:

A.restricted to predefined media access control addresses.
B.encrypted using static keys.
C.encrypted using dynamic keys.
D.initiated from devices that have encrypted storage.

A

C. When using dynamic keys, the encryption key is changed frequently, thus reducing the risk of the key being compromised and the message being decrypted.

129
Q

The Transport Layer Security (TLS) protocol ensures the confidentiality of data and message by using:

A.symmetric encryption.
B.message authentication codes.
C.hash function.
D.digital signature certificates.

A

A. Transport Layer Security (TLS) uses a symmetric key for data and message encryption and asymmetric key for establishing session.

129
Q

The MOST important difference between hashing and encryption is that hashing:

A.is irreversible.
B.output is the same length as the original message.
C.is concerned with integrity and security.
D.is the same at the sending and receiving end.

A

A. Hashing works one way—by applying a hashing algorithm to a message, a message hash/digest is created. If the same hashing algorithm is applied to the message digest, it will not result in the original message. Therefore, hashing is irreversible, while encryption is reversible. This is the basic difference between hashing and encryption.

130
Q

An enterprise has decided to implement an electronic signature scheme based on a public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a password. The MOST significant risk of this approach is:

A.use of the user’s electronic signature by another person if the password is compromised.
B.forgery by using another user’s private key to sign a message with an electronic signature.
C.impersonation of a user by substitution of the user’s public key with another person’s public key.
D.forgery by substitution of another person’s private key on the computer.

A

A. The user’s digital signature is only protected by a password. Compromise of the password would enable access to the signature. This is the most significant risk.

131
Q

An information systems (IS) auditor is reviewing an enterprise’s controls related to email encryption. The enterprise’s policy states that all sent email must be encrypted to protect the confidentiality of the message because the enterprise shares nonpublic information through email. In a public-key infrastructure implementation properly configured to provide confidentiality, email is encrypted with:

A.the sender’s private key and decrypted with the sender’s public key.
B.the recipient’s private key and decrypted with the sender’s private key.
C.the sender’s private key and decrypted with the recipient’s private key.
D.the recipient’s public key and decrypted with the recipient’s private key.

A

D. Encrypting a message with the recipient’s public key and decrypting it with the recipient’s private key ensures message confidentiality, because only the intended recipient has the correct private key to decrypt the message.

132
Q

Which of the following cryptography options increases overhead/cost?

A.The encryption is symmetric rather than asymmetric.
B.A long asymmetric encryption key is used.
C.The hash is encrypted rather than the message.
D.A secret key is used.

A

B. Computer processing time is increased for longer asymmetric encryption keys, and the increase may be disproportionate. For example, one benchmark showed that doubling the length of an RSA key from 512 bits to 1,024 bits caused the decrypt time to increase nearly six-fold.

133
Q

The information systems (IS) auditor is reviewing findings from a prior IS audit of a hospital. One finding indicates that the organization was using email to communicate sensitive patient issues. The IT manager indicates that to address this finding, the organization has implemented digital signatures for all email users. What should the IS auditor’s response be?

A.Digital signatures are not adequate to protect confidentiality.
B.Digital signatures are adequate to protect confidentiality.
C.The IS auditor should gather more information about the specific implementation.
D.The IS auditor should recommend implementation of digital watermarking for secure email.

A

A. Digital signatures are designed to provide authentication and nonrepudiation for email and other transmissions but are not adequate for confidentiality. This implementation is not adequate to address the prior year’s finding.

134
Q

An information systems (IS) auditor is reviewing Transport Layer Security enabled websites for the enterprise. Which of the following choices would be the HIGHEST risk?

A.Expired digital certificates
B.Self-signed digital certificates
C.Using the same digital certificate for multiple websites
D.Using 56-bit digital certificates

A

B. Self-signed digital certificates are not signed by a certificate (certification) authority (CA) and can be created by anyone. Thus, they can be used by attackers to impersonate a website, which may lead to data theft or perpetrate a man-in-the-middle attack.

135
Q

When reviewing a digital certificate verification process, which of the following findings represents the MOST significant risk?

A.There is no registration authority for reporting key compromises.
B.The certificate revocation list is not current.
C.Digital certificates contain a public key that is used to encrypt messages and verify digital signatures.
D.Subscribers report key compromises to the certificate authority.

A

B. If the certificate revocation list is not current, there can be a digital certificate that is not revoked that can be used for unauthorized or fraudulent activities.

136
Q

Applying a digital signature to data traveling in a network provides:

A.confidentiality and integrity.
B.security and nonrepudiation.
C.integrity and nonrepudiation.
D.confidentiality and nonrepudiation.

A

C. A digital signature is created by signing a hash of a message with the private key of the sender. This provides for the integrity (through the hash) and the proof of origin (nonrepudiation) of the message.

137
Q

Which of the following is BEST suited for secure communications within a small group?

A.Key distribution center
B.Certificate authority
C.Web of trust
D.Kerberos Authentication System

A

C. Web of trust is a key distribution method suitable for communication in a small group. It is used by tools such as pretty good privacy and distributes the public keys of users within a group.

138
Q

A digital signature contains a message digest to:

A.show if the message has been altered after transmission.
B.define the encryption algorithm.
C.confirm the identity of the originator.
D.enable message transmission in a digital format.

A

A. The message digest is calculated and included in a digital signature to prove that the message has not been altered. The message digest sent with the message should have the same value as the recalculation of the digest of the received message.

139
Q

Email message authenticity and confidentiality is BEST achieved by signing the message using the:

A.sender’s private key and encrypting the message using the receiver’s public key.
B.sender’s public key and encrypting the message using the receiver’s private key.
C.receiver’s private key and encrypting the message using the sender’s public key.
D.receiver’s public key and encrypting the message using the sender’s private key.

A

A. By signing the message with the sender’s private key, the receiver can verify its authenticity using the sender’s public key. Encrypting with the receiver’s public key provides confidentiality.

140
Q

The use of digital signatures:

A.requires the use of a one-time password generator.
B.provides encryption to a message.
C.validates the source of a message.
D.ensures message confidentiality.

A

C. The use of a digital signature verifies the identity of the sender.

141
Q

Confidentiality of transmitted data can best be delivered by encrypting the:

A.message digest with the sender’s private key.
B.session key with the sender’s public key.
C.messages with the receiver’s private key.
D.session key with the receiver’s public key.

A

D. Encrypting the session key with the receiver’s public key ensures that the session key can only be obtained using the receiver’s private key, retained by the receiver.

142
Q

Which of the following effectively verifies the originator of a transaction?

A.Using a secret password between the originator and the receiver
B.Encrypting the transaction with the receiver’s public key
C.Using a portable document format to encapsulate transaction content
D.Digitally signing the transaction with the source’s private key

A

D. A digital signature is an electronic identification of a person, created using a public key algorithm, to verify the identity of the source of a transaction and the integrity of its content to a recipient.

143
Q

A Transmission Control Protocol/Internet Protocol (TCP/IP)-based environment is exposed to the Internet. Which of the following BEST ensures that complete encryption and authentication protocols exist for protecting information while transmitted?

A.Work is completed in tunnel mode with internet protocol (IP) security.
B.A digital signature with RSA has been implemented.
C.Digital certificates with RSA are being used.
D.Work is being completed in transmission control protocol (TCP) services.

A

A. Tunnel mode with internet protocol (IP) security provides encryption and authentication of the complete IP package. To accomplish this, the authentication header and encapsulating security payload services can be nested. This is known as IP Security.

144
Q

The role of the certificate (certification) authority (CA) as a third party is to:

A.provide secure communication and networking services based on certificates.
B.host a repository of certificates with the corresponding public and secret keys issued by that CA.
C.act as a trusted intermediary between two communication partners.
D.confirm the identity of the entity owning a certificate issued by that CA.

A

D. The primary activity of a CA is to issue certificates. The primary role of the CA is to check the identity of the entity owning a certificate and to confirm the integrity of any certificate it issued.

145
Q

During an audit of an enterprise that is dedicated to ecommerce, the information systems (IS) manager states that digital signatures are used when receiving communications from customers. To substantiate this, an IS auditor must prove that which of the following is used?

A.A biometric, digitalized and encrypted parameter with the customer’s public key.
B.A hash of the data that is transmitted and encrypted with the customer’s private key.
C.A hash of the data that is transmitted and encrypted with the customer’s public key.
D.The customer’s scanned signature encrypted with the customer’s public key.

A

B. The calculation of a hash, or digest, of the data that are transmitted, and its encryption require the private key of the client (sender) and is called a signature of the message, or digital signature. The receiver hashes the received message and compares the hash that they compute with the received hash, after the digital signature has been decrypted with the sender’s public key. If the hash values are the same, the conclusion is that there is integrity in the data that have arrived, and the origin is authenticated. The concept of encrypting the hash with the private key of the originator provides nonrepudiation because it can only be decrypted with their public key, and the private key would not be known to the recipient. Simply put, in a key-pair situation, anything that can be decrypted by a sender’s public key must have been encrypted with their private key, so they must have been the sender (i.e., nonrepudiation).

146
Q

An information systems (IS) auditor is reviewing an organization’s information security policy, which requires encryption of all data placed on USB drives. The policy also requires that a specific encryption algorithm be used. Which of the following algorithms would provide the greatest assurance that data placed on USB drives is protected from unauthorized disclosure?

A.Data Encryption Standard (DES)
B.Message digest 5
C.Advanced Encryption Standard (AES)
D.Secure Shell (SSH)

A

C. Advanced Encryption Standard (AES) provides the strongest encryption of all the choices listed and provides the greatest assurance that data are protected. Recovering data encrypted with AES is considered computationally infeasible; therefore, AES is the best choice for encrypting sensitive data.

147
Q

Which of the following provides the GREATEST assurance for database password encryption?

A.Secure hash algorithm-256
B.Advanced encryption standard (AES)
C.Secure Shell (SSH)
D.Triple DES (3DES)

A

B. The use of advanced encryption standard (AES) is a secure encryption algorithm that is appropriate for encrypting passwords.

148
Q

In what capacity would an information systems (IS) auditor MOST likely see a hash function applied?

A.Authentication
B.Identification
C.Authorization
D.Encryption

A

A. The purpose of a hash function is to produce a fingerprint of data that can be used to ensure integrity and authentication. A hash of a password also provides for authentication of a user or process attempting to access resources.

149
Q

Which of the following is a machine learning technique used for identifying patterns and relationships in unlabeled data?

A.Regression
B.Clustering
C.Decision tree
D.Naive Bayes

A

B. Clustering is a machine learning technique used for identifying patterns and relationships in unlabeled data. Clustering algorithms group similar data points together based on their inherent similarities or distance metrics.

150
Q

The feature of a digital signature that ensures that the sender cannot later deny generating and sending the message is called:

A.data integrity.
B.authentication.
C.nonrepudiation.
D.replay protection.

A

C. Integrity, authentication, nonrepudiation and replay protection are all features of a digital signature. Nonrepudiation ensures that the claimed sender cannot later deny generating and sending the message.

150
Q

The cryptographic hash sum of a message is recalculated by the receiver. This is to ensure:

A.the confidentiality of the message.
B.nonrepudiation by the sender.
C.the authenticity of the message.
D.the integrity of data transmitted by the sender.

A

D. If the hash sum is different from what is expected, it implies that the message has been altered. This is an integrity test.

151
Q

Which of the following is the MOST reliable method to ensure identity of the sender for messages transferred across the Internet?

A.Digital signatures
B.Asymmetric cryptography
C.Digital certificates
D.Message authentication code

A

C. Digital certificates are issued by a trusted third party. The message sender attaches the certificate and the recipient can verify authenticity with the certificate repository.

152
Q

The PRIMARY reason for using digital signatures is to ensure data:

A.confidentiality.
B.integrity.
C.availability.
D.correctness.

A

B. Digital signatures provide integrity because the digital signature of a signed message (file, mail, document, etc.) changes every time a single bit of the document changes; thus, a signed document cannot be altered. A digital signature provides for message integrity, nonrepudiation and proof of origin.

153
Q

An information systems (IS) auditor reviewing digital rights management applications should expect to find an extensive use for which of the following technologies?

A.Digitalized signatures
B.Hashing
C.Parsing
D.Steganography

A

D. Steganography is a technique for concealing the existence of messages or information within another message. An increasingly important steganographic technique is digital watermarking, which hides data within data (e.g., by encoding rights information in a picture or music file without altering the picture or music’s perceivable aesthetic qualities).

154
Q

Which of the following is an advantage of elliptic curve encryption over RSA encryption?

A.Computation speed
B.Ability to support digital signatures
C.Simpler key distribution
D.Message integrity controls

A

A. The main advantage of elliptical curve cryptography (ECC) over RSA encryption is its computation speed. This is due in part to the use of much smaller keys in the ECC algorithm than in RSA.

155
Q

During an audit of a telecommunications system, an information systems (IS) auditor finds that the risk of intercepting data transmitted to and from remote sites is very high. The MOST effective control for reducing this exposure is:

A.encryption.
B.callback modems.
C.message authentication.
D.dedicated leased lines.

A

A. Encryption of data is the most secure method of protecting confidential data from exposure.

156
Q

An online stock trading firm is in the process of implementing a system to provide secure email exchange with its customers. What is the BEST option to ensure confidentiality, integrity and nonrepudiation?

A.Symmetric key encryption
B.Digital signatures
C.Message digest algorithms
D.Digital certificates

A

D. A digital certificate contains the public key and identifying information about the owner of the public key. The associated private key pair is kept secret with the owner. These certificates are generally verified by a trusted authority, with the purpose of associating a person’s identity with the public key. Email confidentiality and integrity are obtained by following the public key-private key encryption. With the digital certificate verified by the trusted third party, nonrepudiation of the sender is obtained.

157
Q

Digital signatures require the:

A.signer to have a public key and the receiver to have a private key.
B.signer to have a private key and the receiver to have a public key.
C.signer and receiver to have a public key.
D.signer and receiver to have a private key.

A

B. Digital signatures are intended to verify to a recipient the integrity of the data and the identity of the sender. The digital signature standard is based on the sender encrypting a digest of the message with their private key and the receiver validating the message with the public key.

158
Q

When using public key encryption to secure data being transmitted across a network:

A.the keys used to encrypt and decrypt the data are public.
B.the key used to encrypt the data is private, but the key used to decrypt the data is public.
C.the key used to encrypt the data is public, but the key used to decrypt the data is private.
D.the keys used to encrypt and decrypt the data are private.

A

C. Public key encryption, also known as asymmetric key cryptography, uses a public key to encrypt the message and a private key to decrypt it.

159
Q

The information security policy that states “each individual must have his/her badge read at every controlled door” addresses which of the following attack methods?

A.Piggybacking
B.Shoulder surfing
C.Dumpster diving
D.Impersonation

A

A. Piggybacking refers to unauthorized persons following authorized persons, either physically or virtually, into restricted areas. This policy addresses the polite behavior problem of holding doors open for a stranger. If every employee must have their badge read at every controlled door, no unauthorized person can enter the sensitive area.

160
Q

In a public key infrastructure, a registration authority:

A.verifies information supplied by the subject requesting a certificate.
B.issues the certificate after the required attributes are verified and the keys are generated.
C.digitally signs a message to achieve nonrepudiation of the signed message.
D.registers signed messages to protect them from future repudiation.

A

A. A registration authority is responsible for verifying information supplied by the subject requesting a certificate and verifies the requestor’s right to request a certificate on behalf of themselves or their organization.

161
Q

Which of the following BEST describes the role of a directory server in a public key infrastructure?

A.Encrypts the information transmitted over the network
B.Makes other users’ certificates available to applications
C.Facilitates the implementation of a password policy
D.Stores certificate revocation lists

A

B. A directory server makes other users’ certificates available to applications.

162
Q

Which of the following manages the digital certificate life cycle to ensure that adequate security and controls exist in digital signature applications related to ecommerce?

A.Registration authority
B.Certificate authority (CA)
C.Certification revocation list
D.Certification practice statement

A

B. The CA maintains a directory of digital certificates for the reference of those receiving them. It manages the certificate life cycle, including certificate directory maintenance and certificate revocation list (CRL) maintenance and publication.

163
Q

Which of the following public key infrastructure (PKI) elements describes the procedure for disabling a compromised private key?

A.Certificate revocation list
B.Certification practice statement
C.Certificate policy
D.PKI disclosure statement

A

B. The certification practice statement is the how-to document used in policy-based public key infrastructure (PKI).

164
Q

A certificate (certification) authority (CA) can delegate the processes of:

A.revocation and suspension of a subscriber’s certificate.
B.generation and distribution of the CA public key.
C.establishing a link between the requesting entity and its public key.
D.issuing and distributing subscriber certificates.

A

C. Establishing a link between the requesting entity and its public key is a function of a registration authority. This may or may not be performed by a CA; therefore, this function can be delegated.

165
Q

Which of the following features of a public key infrastructure is MOST closely associated with proving that an online transaction was authorized by a specific customer?

A.Nonrepudiation
B.Encryption
C.Authentication
D.Integrity

A

A. Nonrepudiation, achieved with digital signatures, prevents the senders from later denying that they generated and sent the message.

166
Q

The purpose of a mantrap controlling access to a computer facility is PRIMARILY to:

A.prevent piggybacking.
B.prevent toxic gases from entering the data center.
C.starve a fire of oxygen.
D.prevent rapid movement in or out of the facility.

A

A. The intended purpose of a mantrap controlling access to a computer facility is primarily to prevent piggybacking.

167
Q

Which of the following would an information systems (IS) auditor consider a weakness when performing an audit of an enterprise that uses a public key infrastructure with digital certificates for its business-to-consumer transactions via the Internet?

A.Customers are widely dispersed geographically, but the certificate (certification) authority (CA) are not.
B.Customers can make their transactions from any computer or mobile device.
C.The CA has several data processing subcenters to administer certificates.
D.The enterprise is the owner of the CA.

A

D. If the CA belongs to the same enterprise, this poses a risk. The management of a CA must be based on trusted and secure procedures. If the enterprise has not set in place the controls to manage the registration, distribution and revocation of certificates, this can lead to a compromise of the certificates and loss of trust.

168
Q

Which of the following is the MOST significant function of an enterprise public key infrastructure and certificate authority employing X.509 digital certificates?

A.It provides the public/private key set for the encryption and signature services used by email and file space.
B.It binds a digital certificate and its public key to an individual subscriber’s identity.
C.It provides the authoritative source for employee identity and personal details.
D.It provides the authoritative authentication source for object access.

A

B. PKI is primarily used to gain assurance that protected data or services originated from a legitimate source. The process to ensure the validity of the subscriber identity by linking to the digital certificate/public key is strict and rigorous.

169
Q

An information systems (IS) auditor is reviewing a third-party agreement for a new cloud-based accounting service provider. Which of the following considerations is the MOST important with regard to the privacy of accounting data?

A.Data retention, backup and recovery
B.Return or destruction of information
C.Network and intrusion detection
D.A patch management process

A

B. When reviewing a third-party agreement, the most important consideration regarding the privacy of the data is the clause concerning the return or secure destruction of information at the end of the contract.

170
Q

An enterprise’s IT director approved the installation of a wireless local area network (WLAN) access point in a conference room for a team of consultants to access the Internet with their laptop computers. The BEST control to protect the corporate servers from unauthorized access is to ensure that:

A.encryption is enabled on the access point.
B.the conference room network is on a separate virtual local area network (VLAN).
C.antivirus signatures and patch levels are current on the consultants’ laptops.
D.default user IDs are disabled and strong passwords are set on the corporate servers.

A

B. The installation of the wireless network device presents risk to the corporate servers from authorized and unauthorized users. A separate virtual local area network (VLAN) is the best solution because it ensures that authorized and unauthorized users are prevented from gaining network access to database servers, while allowing Internet access to authorized users.

171
Q

Which of the following is the MOST important security consideration to an enterprise that wants to move a business application to external cloud service (PaaS) provided by a vendor?

A.Classification and categories of data processed by the application
B.Cost of hosting the application internally versus externally
C.Reputation of a vendor based on the market and feedback from clients
D.Drop in application performance due to use of shared services

A

A. Types of data and their sensitivity is a primary consideration because there might be legal obligations related to data hosting and its level of protection (e.g., personal information, banking information and health information).

172
Q

An enterprise is reviewing its contract with a cloud computing provider. For which of the following reasons would the enterprise want to remove a lock-in clause from the cloud service contract?

A.Availability
B.Portability
C.Agility
D.Scalability

A

B. When drawing up a contract with a cloud service provider, the ideal practice is to remove the customer lock-in clause. It may be important for the client to secure portability of their system assets (i.e., the right to transfer from one vendor to another).

173
Q

An information systems (IS) auditor discovers that the chief information officer (CIO) of an enterprise is using a wireless broadband modem using global system for mobile communications (GSM) technology. This modem is being used to connect the CIO’s laptop to the enterprise virtual private network when the CIO travels outside of the office. The IS auditor should:

A.do nothing because the inherent security features of GSM technology are appropriate.
B.recommend that the CIO stop using the laptop computer until encryption is enabled.
C.ensure that media access control (MAC) address filtering is enabled on the network so that unauthorized wireless users cannot connect.
D.suggest that multifactor authentication be used over the wireless link to prevent unauthorized communications.

A

A. The inherent security features of global system for mobile communications (GSM) technology combined with the use of a virtual private network (VPN) are appropriate. The confidentiality of the communication on the GSM radio link is ensured by the use of encryption, and the use of a VPN signifies that an encrypted session is established between the laptop and the enterprise network. GSM is a global standard for cellular telecommunications that can be used for voice and data. Currently deployed commercial GSM technology has multiple overlapping security features that prevent eavesdropping, session hijacking and unauthorized use of the GSM carrier network. While other wireless technologies such as 802.11 wireless local area network (LAN) technologies have been designed to allow the user to adjust or even disable security settings, GSM does not allow any devices to connect to the system unless all relevant security features are active and enabled.

174
Q

Which of the following is the responsibility of an infrastructure-as-a-service cloud provider during an audit of third-party management programs?

A.Security settings for the operating system
B.Maintenance of the host firewall
C.Security settings and maintenance of the hypervisor
D.Access control configuration for servers

A

C. For infrastructure as a service, the cloud provider is responsible for maintenance and security settings for the hypervisor and below. The cloud provider manages the infrastructure, while the customer purchases, installs, configures and manages software, which includes operating systems, middleware and applications installed above the hypervisor level.

175
Q

An enterprise is planning to deploy an outsourced cloud-based application that is used to track job applicant data for the human resources department. Which of the following should be the GREATEST concern to an information systems (IS) auditor?

A.The service level agreement (SLA) ensures strict limits for uptime and performance.
B.The cloud provider will not agree to an unlimited right-to-audit as part of the SLA.
C.The SLA is not explicit regarding the disaster recovery plan capabilities of the cloud provider.
D.The cloud provider’s physical data centers are in multiple cities and countries.

A

D. Having data in multiple countries is the greatest concern because HR applicant data can contain personally identifiable information. There may be legal compliance issues if these data are stored in a country with different laws regarding data privacy. Although the enterprise is bound by the privacy laws where it is based, it may not have legal recourse if a data breach happens in a jurisdiction where the same laws do not apply.

176
Q

Which one of the following can be used to provide automated assurance that proper data files are being used during processing?

A.File header record
B.Version usage
C.Parity checking
D.File security controls

A

A. A file header record provides assurance that proper data files are being used, and it allows for automatic checking.

177
Q

Which of the following should be a concern for an information systems (IS) auditor reviewing an enterprise’s cloud computing strategy that is based on a software as a service (SaaS) model with an external provider?

A.Workstation upgrades must be performed.
B.Long-term software acquisition costs are higher.
C.Contract with the provider does not include onsite technical support.
D.Incident handling procedures with the provider are not well defined.

A

D. A SaaS provider does not normally have onsite support for the enterprise. Therefore, incident handling procedures between the enterprise and its provider are critical for the detection, communication and resolution of incidents, including effective lines of communication and escalation processes.

178
Q

An information systems (IS) auditor performing an audit has determined that developers have been granted administrative access to the virtual machine management console to manage their own servers used for software development and testing. Which of the following choices is the PRIMARY concern for the IS auditor?

A.Developers can create or de-provision servers.
B.Developers can gain elevated access to production servers.
C.Developers can affect the performance of production servers with their applications.
D.Developers can install unapproved applications to any servers.

A

A. Virtualization offers the ability to create or destroy virtual machine (VM) through the administrative interface with administrative access. Although a developer is unlikely to de-provision a production server, the administrative console would grant them the ability to do this, which would be a significant risk.

179
Q

A human resources enterprise offers wireless Internet access to its guests, after authenticating with a generic user ID and password. The generic ID and password are requested from the reception desk. Which of the following controls BEST addresses the situation?

A.The password for the wireless network is changed on a weekly basis.
B.A stateful inspection firewall is used between the public wireless and enterprise networks.
C.The public wireless network is physically segregated from the enterprise network.
D.An intrusion detection system is deployed within the wireless network.

A

C. Keeping the wireless network physically separate from the enterprise network is the best way to secure the enterprise network from intrusion.

180
Q

An information systems (IS) auditor is evaluating a virtual-machine-based architecture used for all programming and testing environments. The production architecture is a three-tier physical architecture. What is the MOST important IT control to test to ensure availability and confidentiality of the web application in production?

A.Server configuration has been hardened appropriately.
B.Allocated physical resources are available.
C.System administrators are trained to use the virtual machine (VM) architecture.
D.The VM server is included in the disaster recovery plan.

A

A. The most important control to test in this configuration is the server configuration hardening. It is important to patch known vulnerabilities and to disable all nonrequired functions before production, especially when production architecture is different from development and testing architecture.

181
Q

Which of the following is the BEST control over a guest wireless ID that is given to vendor staff?

A.Assignment of a renewable user ID that expires daily.
B.A write-once log to monitor the vendor’s activities on the system.
C.Use of a user ID format similar to that used by employees.
D.Ensuring that wireless network encryption is configured properly.

A

A. A renewable user ID that expires daily is a good control because it ensures that wireless access will automatically terminate daily and cannot be used without authorization.

182
Q

Which of the following controls should an information systems (IS) auditor consider when reviewing the integrity of the wireless communications to ensure that the received communications have not been altered in transit?

A.Device authentication and data origin authentication
B.Wireless intrusion detection and intrusion prevention systems
C.The use of cryptographic hashes
D.Packet headers and trailers

A

C. Calculating cryptographic hashes for wireless communications allows the receiving device to verify that the received communications have not been altered in transit. This prevents masquerading and message modification attacks.

183
Q

When auditing an enterprise’s internet of things (IoT) environment, which of the following is a PRIMARY focus area?

A.Assessing the physical security measures of internet of things (IoT) devices
B.Reviewing the enterprise’s privacy policies related to IoT data
C.Evaluating the effectiveness of IoT device authentication controls
D.Verifying the availability of IoT device firmware updates

A

C. When auditing an enterprise’s IoT environment, the primary focus area is evaluating the effectiveness of IoT device authentication controls. Authentication ensures that only authorized individuals or devices can access and communicate with IoT devices. It is important to assess the strength and implementation of authentication controls to prevent unauthorized access and potential security breaches.

184
Q

An information systems (IS) auditor reviewing wireless network security determines that the Dynamic Host Configuration Protocol is disabled at all wireless access points. This practice:

A.reduces the risk of unauthorized access to the network.
B.is not suitable for small networks.
C.automatically provides an internet protocol (IP) address to anyone.
D.increases the risk associated with Wireless Encryption Protocol.

A

A. Dynamic Host Configuration Protocol (DHCP) automatically assigns internet protocol (IP) addresses to anyone connecting to the network. With DHCP disabled, static IP addresses must be used, and this requires either administrator support or a higher level of technical skill to attach to the network and gain Internet access.

185
Q

Which of the following BEST encrypts data on mobile devices?

A.Elliptical curve cryptography
B.Data encryption standard
C.Advanced encryption standard
D.The Blowfish algorithm

A

A. Elliptical curve cryptography (ECC) requires limited bandwidth resources and is suitable for encrypting mobile devices.

186
Q

An enterprise is planning to replace its wired networks with wireless networks. Which of the following would BEST secure the wireless network from unauthorized access?

A.Implement wired equivalent privacy (WEP).
B.Permit access to only authorized media access control addresses.
C.Disable open broadcast of service set identifiers.
D.Implement Wi-Fi Protected Access (WPA) 2.

A

D. Wi-Fi Protected Access (WPA) 2 implements most of the requirements of the IEEE 802.11i standard. The advanced encryption standard (AES) used in WPA2 provides better security. Also, WPA2 supports the Extensible Authentication Protocol (EAP) and the pre-shared secret key authentication model.

187
Q

Which of the following would be of MOST concern to an information systems (IS) auditor reviewing a virtual private network implementation? Computers on the network are located:

A.on the enterprise’s internal network.
B.at the backup site.
C.in third-party employees’ homes.
D.at the enterprise’s remote offices.

A

C. One risk of a virtual private network implementation is the chance of allowing high-risk computers onto the enterprise’s network. All machines that are allowed onto the virtual network should be subject to the same security policy. Home computers of third-party (vendor) employees are least subject to the enterprise security policies and, therefore, are high-risk computers. When a computer is hacked and owned, any network that trusts that computer is at risk. Implementation and adherence to enterprise security policy is easier when all computers on the network are on the enterprise’s campus.

188
Q

Which of the following is a KEY consideration when implementing machine learning (ML) models for cybersecurity applications?

A.Regularly updating and retraining the machine learning (ML) model with new data
B.Ensuring the ML model detects all types of threats
C.Using open-source ML libraries without considering their security vulnerabilities
D.Relying solely on ML models for all cybersecurity decision making

A

A. Regularly updating and retraining the model with new data is crucial when implementing machine learning (ML) models for cybersecurity applications. Cyberthreats and attack patterns evolve, and a static ML model may become less effective in detecting emerging threats. By continuously updating the model with new data, enterprises can improve the ML model accuracy and ensure that it remains effective against evolving threats.

189
Q

Which of the following controls is the MOST comprehensive in a remote access network with multiple and diverse subsystems?

A.Proxy server
B.Firewall installation
C.Demilitarized zone
D.Virtual private network

A

D. The best way to secure remote access is through the use of encrypted VPNs. This allows remote users a secure connection to the main systems.

190
Q

Which of the following is the BEST way for an information systems (IS) auditor to determine the effectiveness of a security awareness and training program?

A.Review the security training program.
B.Ask the security administrator.
C.Interview a sample of employees.
D.Review the security reminders to employees.

A

C. Interviewing a sample of employees is the best way to determine the effectiveness of a security awareness and training program because overall awareness must be determined, and effective security is dependent on people. Reviewing the security training program would not be the ultimate indicator of the effectiveness of the awareness training.

191
Q

Which of the following is the BEST criterion for evaluating the adequacy of an enterprise’s security awareness program?

A.Senior management is aware of critical information assets and demonstrates an adequate concern for their protection.
B.Job descriptions contain clear statements of accountability for information security.
C.In accordance with the degree of risk and business impact, there is adequate funding for security efforts.
D.No actual incidents have occurred that have caused a loss or a public embarrassment.

A

B. The inclusion of security responsibilities in job descriptions is a key factor in demonstrating the maturity of the security program and helps ensure that staff and management are aware of their roles with respect to information security.

192
Q

The risk of dumpster diving is BEST mitigated by:

A.implementing security awareness training.
B.placing shred bins in copy rooms.
C.developing a media disposal policy.
D.placing shredders in individual offices.

A

A. Dumpster diving is used to steal documents or computer media that were not properly discarded. Users should be educated to know the risk of carelessly discarding sensitive documents and other items.

193
Q

The management of an enterprise has decided to establish a security awareness program. Which of the following would MOST likely be a part of the program?

A.Using an intrusion detection system to report incidents.
B.Mandating the use of passwords to access all software.
C.Installing an efficient user log system to track the actions of each user.
D.Training provided on a regular basis to all current and new employees.

A

D. Regular training is an important part of a security awareness program.

194
Q

Which of the following MOST effectively reduces social engineering incidents?

A.Security awareness training
B.Increased physical security measures
C.Email monitoring policy
D.Intrusion detection systems (IDSs)

A

A. Social engineering exploits human nature and weaknesses to obtain information and access privileges. By increasing employee awareness of security issues, it is possible to reduce the number of successful social engineering incidents.

195
Q

Which of the following presents an inherent risk with no distinct identifiable preventive controls?

A.Piggybacking
B.Viruses
C.Data diddling
D.Unauthorized application shutdown

A

C. Data diddling involves changing data before they are entered into the computer. It is one of the most common abuses because it requires limited technical knowledge and occurs before computer security can protect the data. There are only compensating controls for data diddling.

196
Q

During an information systems (IS) audit of a global enterprise, the IS auditor discovers that the enterprise uses Voice-over Internet Protocol as the sole means of voice connectivity among all offices. Which of the following presents the MOST significant risk for the enterprise’s Voice-over Internet Protocol (VoIP) infrastructure?

A.Network equipment failure
B.Distributed denial-of-service attack
C.Premium-rate fraud (toll fraud)
D.Social engineering attack

A

B. A distributed denial of service (DDoS) attack would potentially disrupt the enterprise’s ability to communicate among its offices and have the highest impact. In a traditional voice network, a DDoS attack would only affect the data network, not voice communications.

197
Q

Which of the following is an example of a passive cybersecurity attack?

A.Traffic analysis
B.Masquerading
C.Denial-of-service
D.Email spoofing

A

A. Cybersecurity threats/vulnerabilities are divided into passive and active attacks. A passive attack is one that monitors or captures network traffic but does not in any way modify, insert or delete the traffic. Examples of passive attacks include network analysis, eavesdropping and traffic analysis.

198
Q

Which of the following results in a denial-of-service (DoS) attack?

A.Brute force attack
B.Ping of death
C.Leapfrog attack
D.Negative acknowledgment attack

A

B. The use of Ping with a packet size higher than 65 kilobyte (KB) and no fragmentation flag on will cause a denial of service.

199
Q

What method might an information systems (IS) auditor use to test wireless security at branch office locations?

A.War dialing
B.Social engineering
C.War driving
D.Password cracking

A

C. War driving is a technique for locating and gaining access to wireless networks by driving or walking around a building with a wireless-equipped computer.

200
Q

Which of the following potentially blocks hacking attempts?

A.Intrusion detection system (IDS)
B.Honeypot system
C.Intrusion prevention system (IPS)
D.Network security scanner

A

C. An intrusion prevention system (IPS) is deployed as an inline device on a network or host that can detect and block hacking attempts.

201
Q

Which of the following is the MOST reliably effective method for dealing with the spread of a network worm that exploits vulnerability in a protocol?

A.Install the latest vendor security patches immediately.
B.Block the protocol traffic in the perimeter firewall.
C.Block the protocol traffic between internal network segments.
D.Stop the services that the protocol uses.

A

D. Stopping the services is the most effective way to prevent a worm from spreading, because it directly addresses the means of propagation at the lowest practical level.

202
Q

An information security policy stating that “a fixed time duration of inactivity must initiate a password-enabled screensaver” addresses which of the following attack methods?

A.Piggybacking
B.Dumpster diving
C.Shoulder surfing
D.Impersonation

A

C. Shoulder surfing refers to observing a user while entering/viewing sensitive data on the screen. This may enable the observer to obtain login information or other sensitive information.

203
Q

The use of residual biometric information to gain unauthorized access is an example of which of the following attacks?

A.Replay
B.Brute force
C.Cryptographic
D.Mimic

A

A. Residual biometric characteristics, such as fingerprints left on a biometric capture device, may be reused by an attacker to gain unauthorized access.

204
Q

Distributed denial-of-service (DDoS ) attacks on Internet sites are typically evoked by hackers using which of the following?

A.Logic bombs
B.Phishing site
C.Spyware
D.Botnets

A

D. A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial of service (DDoS) attacks, steal data and send spam, and allow the attacker to access the device and its connection.

205
Q

Two-factor authentication can be circumvented through which of the following attacks?

A.Denial-of-service (DoS)
B.Man-in-the-middle
C.Key logging
D.Brute force

A

B. A man-in-the-middle attack is similar to piggybacking in that the attacker pretends to be the legitimate destination and then retransmits whatever is sent by the authorized user plus additional transactions after authentication has been accepted. This is done in many instances of bank fraud.

206
Q

Which of the following is MOST indicative of the effectiveness of an information security awareness program?

A.Employees report more information regarding security incidents.
B.All employees have signed the information security policy.
C.Most employees have attended an awareness session.
D.Information security responsibilities have been included in job descriptions.

A

A. Although the promotion of security awareness is a preventive control, it can also be a detective measure because it encourages people to identify and report possible security violations. The reporting of incidents implies that employees are acting because of the awareness program.

207
Q

The MOST likely explanation for a successful social engineering attack is:

A.computer error.
B.judgment error.
C.expertise.
D.technology.

A

B. Social engineering is fundamentally about obtaining from someone a level of trust that is not warranted.

208
Q

To protect a Voice-over Internet Protocol (VoIP) infrastructure against a denial-of-service (DoS) attack, it is MOST important to secure the:

A.access control servers.
B.session border controllers.
C.backbone gateways.
D.intrusion detection system (IDS).

A

B. Session border controllers enhance security in the access network and in the core. In the access network, they hide a user’s real address and provide a managed public address. This public address can be monitored, minimizing the opportunities for scanning and DoS attacks. Session border controllers permit access to clients behind firewalls while maintaining the firewall’s effectiveness. In the core, session border controllers protect the users and the network. They hide network topology and users’ real addresses. They can also monitor bandwidth and quality of service.

209
Q

An Internet-based attack using password sniffing can:

A.enable one party to act as if they are another party.
B.cause modification to the contents of certain transactions.
C.be used to gain access to systems containing proprietary information.
D.result in major problems with billing systems and transaction processing agreements.

A

C. Password sniffing attacks can be used to gain access to systems on which proprietary information is stored.

210
Q

A perpetrator looking to gain access to, and gather information about, encrypted data being transmitted over a network would MOST likely use:

A.eavesdropping.
B.spoofing.
C.traffic analysis.
D.masquerading.

A

C. In traffic analysis, which is a passive attack, an intruder determines the nature of the traffic flow between defined hosts and, through an analysis of session length, frequency and message length, the intruder is able to guess the type of communication taking place. This typically is used when messages are encrypted, and eavesdropping would not yield any meaningful results.

211
Q

Which of the following is the BEST control to mitigate the risk of pharming attacks to an Internet banking application?

A.User registration and password policies
B.User security awareness
C.Use of intrusion detection/intrusion prevention systems
D.Domain name system (DNS) server security hardening

A

D. The pharming attack redirects the traffic to an unauthorized website by exploiting vulnerabilities of the DNS server. To avoid this kind of attack, it is necessary to eliminate any known vulnerability that can allow DNS poisoning. Older versions of DNS software are vulnerable to this kind of attack and should be patched.

212
Q

Which of the following intrusion detection systems (IDSs) will MOST likely generate false alarms resulting from normal network activity?

A.Statistical-based
B.Signature-based
C.Neural network
D.Host-based

A

A. A statistical-based intrusion detection system (IDS) relies on a definition of known and expected behavior of systems. Because normal network activity may, at times, include unexpected behavior (e.g., a sudden massive download by multiple users), these activities will be flagged as suspicious.

213
Q

Web application developers occasionally use hidden fields on web pages to save information about a client session. This technique is used to store session variables that enable persistence across web pages, such as maintaining the contents of a shopping cart on a retail website application. The MOST likely web-based attack due to this practice is:

A.parameter tampering.
B.cross-site scripting.
C.cookie poisoning.
D.stealth commanding.

A

A. Web application developers sometimes use hidden fields to save information about a client session or to submit hidden parameters, such as the language of the end user, to the underlying application. Because hidden form fields do not display in the browser, developers may feel safe passing unvalidated data in the hidden fields (to be validated later). This practice is not safe because an attacker can intercept, modify and submit requests, which can discover information or perform functions that the web developer never intended. The malicious modification of web application parameters is known as parameter tampering.

214
Q

If inadequate, which of the following is the MOST likely contributor to a denial-of-service (DoS) attack?

A.Router configuration and rules
B.Design of the internal network
C.Updates to the router system software
D.Audit testing and review techniques

A

A. Improper router configuration and rules can lead to denial-of-service (DoS) attacks.

215
Q

Which of the following types of penetration tests simulates a real attack and is used to test incident handling and response capability of the target?

A.Blind testing
B.Targeted testing
C.Double-blind testing
D.External testing

A

C. Double-blind testing is also known as zero-knowledge testing. This refers to a test where the penetration tester is not given any information and the target organization is not given any warning—both parties are blind to the test. This is the best scenario for testing response capability because the target will react as if the attack were real.

216
Q

An organization is developing a new web-based application to process orders from customers. Which of the following security measures should be taken to protect this application from hackers?

A.Ensure that ports 80 and 443 are blocked at the firewall.
B.Inspect file and access permissions on all servers to ensure that all files have read-only access.
C.Perform a web application security review.
D.Make sure that only the internet protocol (IP) addresses of existing customers are allowed through the firewall.

A

C. Performing a web application security review is a necessary effort to uncover security vulnerabilities that can be exploited by hackers.

217
Q

What is the BEST approach to mitigate the risk of a phishing attack?

A.Intrusion detection
B.Security assessment
C.Strong authentication
D.User education

A

D. The best way to mitigate the risk of phishing is to educate users to take caution with suspicious Internet communications and not to trust them until verified. Users may require regular training to recognize suspicious web pages and email because the means and methods of threat actors evolve.

218
Q

Consider the following diagram:

To detect attack attempts that the firewall is unable to recognize, an information systems (IS) auditor should recommend placing a network intrusion detection system between the:

A.Firewall and the organization’s network.
B.Internet and the firewall.
C.Internet and the web server.
D.Web server and the firewall.

A

A. Attack attempts that cannot be recognized by the firewall will be detected if a network-based intrusion detection system (IDS) is placed between the firewall and the organization’s network.

219
Q

A hacker can obtain passwords without the use of computer tools or programs through the technique of:

A.social engineering.
B.sniffers.
C.back doors.
D.Trojan horses.

A

A. Social engineering is based on the divulgence of private information through dialogues, interviews, inquiries, etc., in which a user may be indiscreet regarding their or someone else’s personal data.

220
Q

During a review of intrusion detection logs, an information systems (IS) auditor notices traffic coming from the Internet, which appears to originate from the internal internet protocol (IP) address of the enterprise payroll server. Which of the following malicious activities would MOST likely cause this type of result?

A.Denial-of-service (DoS) attack
B.Spoofing
C.Port scanning
D.Man-in-the-middle attack

A

B. Spoofing is a form of impersonation where one computer tries to take on the identity of another computer. When an attack originates from the external network but uses an internal network address, the attacker is most likely trying to bypass firewalls and other network security controls by impersonating (or spoofing) the payroll server’s internal network address. By impersonating the payroll server, the attacker may be able to access sensitive internal resources.

221
Q

Information systems (IS) management recently replaced its existing wired local area network with a wireless infrastructure to accommodate the increased use of mobile devices within the enterprise. This will increase the risk of which of the following attacks?

A.Port scanning
B.Back door
C.Man-in-the-middle
D.War driving

A

D. A war driving attack uses a wireless Ethernet card, set in promiscuous mode, and a powerful antenna to penetrate wireless systems from outside.

222
Q

The FIRST step in a successful attack to a system is:

A.gathering information.
B.gaining access.
C.denying services.
D.evading detection.

A

A. Successful attacks start by gathering information about the target system. This is done in advance so that the attacker gets to know the target systems and the potential vulnerabilities that can be exploited in the attack.

223
Q

An enterprise discovers that the computer of the chief financial officer has been infected with malware that includes a keystroke logger and a rootkit. The FIRST action to take is to:

A.contact the appropriate law enforcement authorities to begin an investigation.
B.immediately ensure that no additional data are compromised.
C.disconnect the PC from the network.
D.update the antivirus signature on the PC to ensure that the malware or virus is detected and removed.

A

C. The most important task is to prevent further data compromise and preserve evidence by disconnecting the computer from the network.

224
Q

What is a risk associated with attempting to control physical access to sensitive areas, such as computer rooms, using card keys or locks?

A.Unauthorized individuals wait for controlled doors to open and walk in behind those authorized.
B.The contingency plan for the enterprise cannot effectively test controlled access practices.
C.Access cards, keys and pads can be easily duplicated allowing easy compromise of the control.
D.Removing access for those who are no longer authorized is complex.

A

A. Piggybacking (or tailgating) can compromise the physical access controls.

225
Q

An enterprise is planning to install a network-based intrusion detection system (IDS) to protect the website that it hosts. Where should the device be installed?

A.On the local network
B.Outside the firewall
C.In the demilitarized zone
D.On the server that hosts the website

A

C. Network-based IDSs detect attack attempts by monitoring network traffic. A public web server is typically placed on the protected network segment known as the DMZ. An IDS installed in the DMZ detects and reports on malicious activity originating from the Internet and the internal network, thus allowing the administrator to act.

226
Q

An information systems (IS) auditor evaluates security controls’ effectiveness by simulating real-world attacks during an audit review. Which of the following security testing techniques is the auditor using?

A.Vulnerability scanning
B.Security auditing
C.Code review
D.Penetration testing

A

D. Penetration testing focuses on evaluating the effectiveness of security controls by simulating real-world attacks. Penetration testing involves active testing and exploitation of vulnerabilities in the system to assess the enterprise’s resilience against attacks and identify areas for improvement.

227
Q

An information systems (IS) auditor selects a server for a penetration test that will be carried out by a technical specialist. Which of the following is MOST important?

A.The tools used to conduct the test
B.Certifications held by the IS auditor
C.Permission from the data owner of the server
D.An intrusion detection system (IDS) is enabled

A

C. The data owner should be informed of the risk associated with a penetration test, the timing of the test, what types of tests are to be conducted and other relevant details.

228
Q

When protecting an enterprise’s IT systems, which of the following is normally the next line of defense after the network firewall has been compromised?

A.Personal firewall
B.Antivirus programs
C.Intrusion detection system (IDS)
D.Virtual local area network (VLAN) configuration

A

C. An IDS is the next line of defense after the firewall. It detects anomalies in the network/server activity and tries to detect the perpetrator.

229
Q

An information systems (IS) auditor is reviewing a software-based firewall configuration. Which of the following represents the GREATEST vulnerability?

A.An implicit deny rule as the last rule in the rule base
B.Installation on an operating system configured with default settings
C.Rules permitting or denying access to systems or networks
D.Configuration as a virtual private network (VPN) endpoint

A

B. Default settings of most equipment—including operating systems—are often published and provide an intruder with predictable configuration information, which allows easier system compromise. To mitigate this risk, firewall software should be installed on a system using a hardened operating system that has limited functionality, providing only the services necessary to support the firewall software.

230
Q

When conducting a penetration test of an IT system, an enterprise should be MOST concerned with:

A.the confidentiality of the report.
B.finding all weaknesses in the system.
C.restoring systems to the original state.
D.logging changes made to production systems.

A

C. After the test is completed, the systems must be restored to their original state. In performing the test, changes may have been made to firewall rules, user IDs may have been created, or false files may have been uploaded. These must all be cleaned up before the test is completed.

231
Q

When reviewing an intrusion detection system, an information systems (IS) auditor should be MOST concerned about which of the following?

A.High number of false-positive alarms
B.Low coverage of network traffic
C.Network performance downgrade
D.Default detection settings

A

B. Cybersecurity attacks might not be timely identified if only a small portion of network traffic is analyzed.

232
Q

Neural networks are effective in detecting fraud because they can:

A.discover new trends because they are inherently linear.
B.solve problems where large and general sets of training data are not obtainable.
C.address problems that require consideration of a large number of input variables.
D.make assumptions about the shape of any curve relating variables to the output.

A

C. Neural networks can be used to attack problems that require consideration of numerous input variables. They are capable of capturing relationships and patterns often missed by other statistical methods, but they do not discover new trends.

233
Q

The MOST important factor in planning a black box penetration test is:

A.the documentation of the planned testing procedure.
B.a realistic evaluation of the environment architecture to determine scope.
C.knowledge by the management staff of the client organization.
D.scheduling and deciding on the timed length of the test.

A

C. Black box penetration testing assumes no prior knowledge of the infrastructure to be tested. Testers simulate an attack from someone who is unfamiliar with the system. It is important to have management knowledge of the proceedings so that if the test is identified by the monitoring systems, the legality of the actions can be determined quickly.

234
Q

After installing a network, an enterprise implemented a vulnerability assessment tool to identify possible weaknesses. Which type of reporting poses the MOST serious risk associated with such tools?

A.Differential
B.False-positive
C.False-negative
D.Less-detail

A

C. False-negative reporting on weaknesses means the control weaknesses in the network are not identified and, therefore, may not be addressed, leaving the network vulnerable to attack.

235
Q

Which of the following antispam filtering methods has the LOWEST possibility of false-positive alerts?

A.Rule-based
B.Checksum based
C.Heuristic filtering
D.Statistic-based

A

B. The advantage of this type of checksum-based filtering is that it lets ordinary users help identify spam, and not just administrators, thus, vastly increasing the pool of spam fighters. The disadvantage is that spammers can insert unique invisible gibberish—known as hashbusters—into the middle of each of their messages, thus making each message unique and having a different checksum. This leads to a race between the developers of the checksum software and the developers of the spam-generating software.

236
Q

A firewall is being deployed at a new location. Which of the following is the MOST important factor in ensuring a successful deployment?

A.Reviewing logs frequently
B.Testing and validating the rules
C.Training a local administrator at the new location
D.Sharing firewall administrative duties

A

B. A mistake in the rule set can render a firewall ineffective or insecure. Therefore, testing and validating the rules is the most important factor in ensuring a successful deployment.

237
Q

An information systems (IS) auditor reviewing a network log discovers that an employee ran elevated commands on their PC by invoking the task scheduler to launch restricted applications. This is an example of what type of attack?

A.Race condition
B.Privilege escalation
C.Buffer overflow
D.Impersonation

A

B. A privilege escalation attack obtains higher-level system authority by various methods. In this example, the task scheduler service runs with administrator permissions, and a security flaw allows programs launched by the scheduler to run at the same permission level.

238
Q

Security administration procedures require read-only access to:

A.access control tables.
B.security log files.
C.logging options.
D.user profiles.

A

B. Security administration procedures require read-only access to security log files to ensure that, once generated, the logs are not modified. Logs provide evidence and track suspicious transactions and activities.

239
Q

An information systems (IS) auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if:

A.IDS sensors are placed outside of the firewall.
B.a behavior-based IDS is causing many false alarms.
C.a signature-based IDS is weak against new types of attacks.
D.the IDS is used to detect encrypted traffic.

A

B. An excessive number of false alarms from a behavior-based intrusion detection system (IDS) indicates that additional tuning is needed. False positives cannot be eliminated entirely, but ignoring this warning sign may negate the value of the system by causing those responsible for monitoring its warnings to become convinced that anything reported is false.

240
Q

Which of the following controls would be MOST effective in reducing the risk of loss due to fraudulent online payment requests?

A.Transaction monitoring
B.Protecting web sessions using secure sockets layer (SSL)
C.Enforcing password complexity for authentication
D.Inputting validation checks on web forms

A

A. An electronic payment system can be the target of fraudulent activities. An unauthorized user can potentially enter false transactions. By monitoring transactions, the payment processor can identify potentially fraudulent transactions based on the typical usage patterns, monetary amounts, physical location of purchases, and other data that are part of the transaction process.

241
Q

An information systems (IS) auditor observes large outbound volumes of binary executable data at random intervals. Which of the following is the BEST recommendation for the IS auditor to make?

A.Check cloud service provider service level agreements to review storage terms.
B.Review historical peak hour timings and system testing schedules.
C.Review the firewall logs and network traffic.
D.Check for backup schedules for high volumes of binary executable data.

A

C. Ransomware infections often dump affected data at remote servers before encrypting the victim computers. A large volume of binary executable data can indicate this type of attack. A review of firewall and network logs can give an idea regarding increased traffic.

242
Q

During an information systems (IS) audit of a bank, the IS auditor is assessing whether the enterprise properly manages staff member access to the operating system. The IS auditor should determine whether the enterprise performs:

A.periodic review of user activity logs.
B.verification of user authorization at the field level.
C.review of data communication access activity logs.
D.periodic review of changing data files.

A

A. General operating system access control functions include logging user activities, events, etc. Reviewing these logs may identify users performing activities that should not have been permitted.

243
Q

The MOST serious challenge in the operation of an intrusion detection system is:

A.filtering false-positives alerts.
B.learning vendor-specific protocols.
C.updating detection signatures.
D.blocking eligible connections.

A

A. Because of the configuration and the way intrusion detection system (IDS) technology operates, the main problem in operating IDSs is the recognition (detection) of events that are not really security incidents or false positives. An information systems (IS) auditor needs to be aware of this and should check for implementation of related controls (such as IDS tuning) and incident handling procedures (such as the screening process) to know if an event is a security incident or a false positive.

244
Q

Which of the following controls will MOST effectively detect the presence of bursts of errors in network transmissions?

A.Parity check
B.Echo check
C.Block sum check
D.Cyclic redundancy check

A

D. The cyclic redundancy check (CRC) can check for a block of transmitted data. The workstations generate the CRC and transmit it with the data. The receiving workstation computes a CRC and compares it to the transmitted CRC. If both of them are equal, then the block is assumed error free. In this case (such as, in parity error or echo check), multiple errors can be detected. In general, CRC can detect all single-bit and double-bit errors.

245
Q

Which of the following is a MAJOR concern for an information systems (IS) auditor reviewing a security information and event management (SIEM) system that monitors logs from various devices?

A.The number of false-positive alerts generated by correlation rules have decreased.
B.Only security logs from critical systems and devices are collected for monitoring.
C.The security information and event management (SIEM) system has been configured to perform certain tasks automatically based on alerts.
D.Correlation rules for monitoring logs are reviewed once upon initial implementation.

A

D. Correlation rules are configured based on the nature of risk that the enterprise may want to monitor using a SIEM system. These rules need to be configured, monitored and reviewed periodically to reduce clutter, so that alerts can point out actual errors, events and incidents instead of false-positive alerts. However, a major concern is not reviewing and fine-tuning correlation rules to optimize the SIEM system.

246
Q

Which of the following activities is MOST important for a security team that uses a security information and event management (SIEM) system to carry out log monitoring and alert generation?

A.Periodic analysis of alerts to determine causes of false-positive alerts
B.Summarized information about incidents for reporting to management
C.Regular analysis of trends found by reviewing generated alerts
D.Periodic archiving of logs to ensure the expected performance of the system

A

C. Although a SIEM system generates alerts based on log analysis, it may not provide trends, like repetitive failed login attempts for critical system/user errors. These trends indicate possible brute-force attacks or any other attacks that may go undetected in the absence of trend analysis.

247
Q

The network engineer observed surges in logs generated by network activity at arbitrary intervals. Which of the following should the network engineer perform NEXT?

A.Block the excess traffic.
B.Review and analyze traffic logs.
C.Check with business if transaction volume increased.
D.Ask some users to log out.

A

B. Further log analysis can suggest whether the network infrastructure is infected by potential malware or a distributed denial of service, which could have caused the surge in logs.

248
Q

The PRIMARY purpose of audit trails is to:

A.improve response time for users.
B.establish accountability for processed transactions.
C.improve the operational efficiency of the system.
D.provide information to auditors who want to track transactions.

A

B. Enabling audit trails helps in establishing the accountability and responsibility of processed transactions by tracing transactions through the system.

249
Q

Which of the following systems or tools can recognize that a credit card transaction is MORE likely to have resulted from a stolen credit card than from the holder of the credit card?

A.Intrusion detection systems (IDSs)
B.Data mining techniques
C.Stateful inspection firewalls
D.Packet filtering routers

A

B. Data mining is a technique used to detect trends or patterns of transactions or data. If the historical pattern of charges against a credit card account is changed, then it is a flag that the transaction may have resulted from a fraudulent use of the card.

250
Q

When auditing a role-based access control system, the information systems (IS) auditor noticed that some IT security employees have system administrator privileges on some servers, which allows them to modify or delete transaction logs. Which would be the BEST recommendation that the IS auditor should make?

A.Ensure that these employees are adequately supervised.
B.Ensure that backups of the transaction logs are retained.
C.Implement controls to detect the changes.
D.Write transaction logs in real time to write once and read many (WORM) drives.

A

D. Allowing IT security employees access to transaction logs is often unavoidable because having system administrator privileges is required for them to do their job. The best control in this case, to avoid unauthorized modifications of transaction logs, is to write the transaction logs to write once and read many (WORM) drive media in real time. It is important to note that simply backing up the transaction logs to drives is not adequate because data can be modified prior (typically at night) to the daily backup job execution.

251
Q

Which of the following choices is the MOST effective control that should be implemented to ensure accountability for application users accessing sensitive data in the human resource management system (HRMS) and among interfacing applications to the HRMS?

A.Two-factor authentication
B.A digital certificate
C.Audit trails
D.Single sign-on (SSO) authentication

A

C. Audit trails capture which user performed the transaction, at what time date, and other details, and this helps in establishing accountability among application users.

252
Q

An enterprise determined that its website was compromised, and a rootkit was installed on the server hosting the application. Which of the following choices would have MOST likely prevented the incident?

A.A host-based intrusion prevention system (IPS)
B.A network-based intrusion detection system (IDS)
C.A firewall
D.Operating system (OS) patching

A

A. A host-based intrusion prevention system (IPS) prevents unauthorized changes to the host. If a malware attack attempted to install a rootkit, the IPS would refuse to permit the installation without the consent of an administrator.

253
Q

Which of the following controls would BEST detect intrusion?

A.User IDs and user privileges are granted through authorized procedures.
B.Automatic logoff is used when a workstation is inactive for a particular period of time.
C.Automatic logoff of the system occurs after a specified number of unsuccessful attempts.
D.Unsuccessful logon attempts are monitored by the security administrator.

A

D. Intrusion is detected by the active monitoring and review of unsuccessful logon attempts.

254
Q

An information systems (IS) auditor reviewing a cloud computing environment that is managed by a third party should be MOST concerned when:

A.The enterprise is not permitted to assess the controls in the participating vendor’s site.
B.The service level agreement (SLA) does not address the responsibility of the vendor in the case of a security breach.
C.Laws and regulations are different in the countries of the enterprise and the vendor.
D.The enterprise is using an older version of a browser and is vulnerable to certain types of security risk.

A

B. Administration of cloud computing occurs over the Internet and involves more than one participating entity. It is the responsibility of each of the partners in the cloud computing environment to take care of security issues in their own environments. When there is a security breach, the party responsible for the breach should be identified and made accountable. This is not possible if the service level agreement (SLA) does not address the responsibilities of the partners during a security breach.

255
Q

Which of the following is the MOST effective control for restricting access to unauthorized Internet sites in an enterprise?

A.Routing outbound Internet traffic through a content-filtering proxy server
B.Routing inbound Internet traffic through a reverse proxy server
C.Implementing a firewall with appropriate access rules
D.Deploying client software utilities that block inappropriate content

A

A. A content-filtering proxy server will effectively monitor user access to Internet sites and block access to unauthorized web sites.

256
Q

A programmer maliciously modified a production program to change data and then restored the program back to the original code. Which of the following would MOST effectively detect the malicious activity?

A.Comparing source code
B.Reviewing system log files
C.Comparing object code
D.Reviewing executable and source code integrity

A

B. Reviewing system log files is the only trail that may provide information about unauthorized activities in the production library.

257
Q

Which of the following is the MOST significant concern related to using artificial intelligence (AI) in automated decision-making systems?

A.artificial intelligence (AI) systems may lack transparency and explainability.
B.AI algorithms have limited accuracy and reliability.
C.AI technology is susceptible to cyberattacks and hacking.
D.AI implementation requires significant financial investment.

A

A. One of the significant concerns related to using artificial intelligence (AI) in automated decision-making systems is the lack of transparency and explainability. AI algorithms, especially those based on deep learning or neural networks, can be complex and difficult to interpret. This lack of transparency can make understanding how AI systems arrive at specific decisions or recommendations challenging, which may raise concerns about bias, ethics and accountability.

258
Q

The GREATEST risk from an improperly implemented intrusion prevention system (IPS) is:

A.too many alerts for system administrators to verify.
B.decreased network performance due to additional traffic.
C.blocking of critical systems or services due to false triggers.
D.reliance on specialized expertise within the IT organization.

A

C. An intrusion prevention system (IPS) prevents a connection or service based on how it is programmed to react to specific incidents. If the IPS is triggered based on incorrectly defined or nonstandard behavior, it may block the service or connection of a critical internal system.

259
Q

Which of the following components is responsible for the collection of data in an intrusion detection system?

A.Analyzer
B.Administration console
C.User interface
D.Sensor

A

D. Sensors are responsible for collecting data. Sensors may be attached to a network, server or other location and may gather data from many points for later analysis.

260
Q

Which of the following is the MAIN reason an enterprise should have an incident response plan? The plan helps to:

A.ensure prompt communication of adverse events to relevant management.
B.contain costs related to maintaining disaster recovery plan capabilities.
C.ensure that customers are promptly notified of issues, such as security breaches.
D.minimize the duration and impact of system outages and security incidents.

A

D. An incident response plan helps minimize the impact of an incident because it provides a controlled response to incidents. The phases of the plan include planning, detection, evaluation, containment, eradication, escalation, response, recovery, reporting, post-incident review and a review of lessons learned

261
Q

When reviewing the configuration of network devices, an information systems (IS) auditor should FIRST identify:

A.the good practices for the type of network devices deployed.
B.whether components of the network are missing.
C.the importance of the network devices in the topology.
D.whether subcomponents of the network are being used appropriately.

A

C. The first step is to understand the importance and role of the network device within the enterprise ’s network topology.

262
Q

An information systems (IS) auditor suspects an incident is occurring while an audit is being performed on a financial system. What should the IS auditor do FIRST?

A.Request that the system be shut down to preserve evidence.
B.Report the incident to management.
C.Ask for immediate suspension of the suspect accounts.
D.Investigate the source and nature of the incident.

A

B. Reporting the suspected incident to management will help initiate the incident response process, which is the most appropriate action. Management is responsible for making decisions regarding the appropriate response. It is not the IS auditor’s role to respond to incidents during an audit.

263
Q

When installing an intrusion detection system (IDS), which of the following is MOST important?

A.Properly locating it in the network architecture
B.Preventing denial-of-service (DoS) attacks
C.Identifying messages that need to be quarantined
D.Minimizing the rejection errors

A

A. Properly locating an intrusion detection system (IDS) in the network is the most important step during installation. A poorly located IDS can leave key areas of the network unprotected.

264
Q

Which of the following types of penetration tests effectively evaluates the incident handling and response capability of the system administrator?

A.Targeted testing
B.Internal testing
C.Double-blind testing
D.External testing

A

C. In double-blind testing, the penetration tester has little or limited knowledge about the target system, and personnel at the target site are not informed that a test is being performed. Because the administrator and security staff at the target are not aware of the test, it can effectively evaluate the incident handling and response capability of the system administrator.

265
Q

Which of the following antivirus software implementation strategies is the MOST effective in an interconnected enterprise network?

A.Server-based antivirus software
B.Enterprise-based antivirus software
C.Workstation-based antivirus software
D.Perimeter-based antivirus software

A

B. An important means of controlling the spread of viruses is to deploy an enterprisewide antivirus solution that will monitor and analyze traffic at many points. This provides a layered defense model that is more likely to detect malware regardless of how it comes into the enterprise— through a USB or portable storage, a network, an infected download or malicious web application.

266
Q

The computer security incident response team of an enterprise disseminates detailed descriptions of recent threats. An information systems (IS) auditor’s GREATEST concern should be that the users may:

A.use this information to launch attacks.
B.forward the security alert.
C.implement individual solutions.
D.fail to understand the threat.

A

A. The enterprise’s computer security incident response team (CSIRT) should disseminate recent threats, security guidelines and security updates to the users to assist them in understanding the security risk of errors and omissions. However, this introduces the risk that the users may use this information to launch attacks, directly or indirectly. An information systems (IS) auditor should ensure that the CSIRT is actively involved with users to assist them in mitigation of risk arising from security failures and to prevent additional security incidents resulting from the same threat.

267
Q

Which of the following is an indicator of the effectiveness of a computer security incident response team?

A.Financial impact per security incident
B.Number of security vulnerabilities that were patched
C.Percentage of business applications that are being protected
D.Number of successful penetration tests

A

A. The most important indicator is the financial impact per security incident. It may not be possible to prevent incidents entirely, but the team should be able to limit the cost of incidents through a combination of effective prevention, detection and response.

268
Q

Which of the following should an incident response team address FIRST after a major incident in an information processing facility (IPF)?

A.Restoration at the facility
B.Documentation of the facility
C.Containment at the facility
D.Monitoring of the facility

A

C. The first priority (after addressing life safety) is the containment of the incident at the facility so that spread of the damage is minimized. The incident team must gain control of the situation.

269
Q

Which of the following is the MOST important action in recovering from a cybersecurity incident?

A.Activating an incident response team
B.Appointing cyberforensic investigators
C.Executing a business continuity plan (BCP)
D.Preserving evidence

A

A. Hopefully, the incident response team and procedures were set up prior to the incident. The first step is to activate the team, contain the incident and keep the business operational.

270
Q

Which of the following specifically addresses how to deal with unauthorized activity on the enterprise’s IT systems and how to recover from an attack?

A.Incident response plan (IRP)
B.IT contingency plan
C.Business continuity plan (BCP)
D.Continuity of operations plan

A

A. The incident response plan (IRP) determines the information security responses to incidents such as cyberattacks on systems and/or networks. This plan establishes procedures to enable security personnel to identify, mitigate and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service or unauthorized changes to system hardware or software.

271
Q

Email traffic from the Internet is routed via firewall-1 to the mail gateway. Mail is routed from the mail gateway, via firewall-2, to the mail recipients in the internal network. Other traffic is not allowed. For example, the firewalls do not allow direct traffic from the Internet to the internal network. The intrusion detection system (IDS) detects traffic for the internal network that did not originate from the mail gateway.

The FIRST action triggered by the IDS should be to:

A.alert the appropriate staff.
B.create an entry in the log.
C.close firewall-2.
D.close firewall-1.

A

B. Creating an entry in the log is the first step taken by a network IDS. The IDS may also be configured to send an alert to the administrator, send a note to the firewall and may even be configured to record the suspicious packet.

272
Q

Over the long term, which of the following has the greatest potential to improve the security incident response process?

A.A walk-through review of incident response procedures
B.Simulation exercises performed by the security incident response team
C.Ongoing security training for users
D.Documenting responses to an incident

A

B. Simulation exercises to find the gaps and shortcomings in the actual incident response processes help to improve the process over time.

273
Q

A web server is attacked and compromised. Enterprise policy states that incident response should balance containment of an attack with retaining freedom for later legal action against an attacker. Under the circumstances, which of the following should be performed FIRST?

A.Dump the volatile storage data to a disk.
B.Run the server in a fail-safe mode.
C.Disconnect the web server from the network.
D.Shut down the web server.

A

C. The first action is to disconnect the web server from the network to secure the device for investigation, contain the damage and prevent more actions by the attacker.

274
Q

An information systems (IS) auditor is reviewing an organization to ensure that evidence related to a data breach case is preserved. Which of the following choices would be of MOST concern to the IS auditor?

A.End users are not aware of incident reporting procedures.
B.Log servers are not on a separate network.
C.Backups are not performed consistently.
D.There is no chain of custody policy.

A

D. Organizations should have a policy in place that directs employees to follow certain procedures when collecting evidence that may be used in a court of law. Chain of custody involves documentation of how digital evidence is acquired, processed, handled, stored and protected, and who handled the evidence and why. If there is no policy in place, it is unlikely that employees will ensure that the chain of custody is maintained during any data breach investigation.

275
Q

Which of the following criteria are MOST needed to ensure that log information is admissible in court? Ensure that data have been:

A.independently time stamped.
B.recorded by multiple logging systems.
C.encrypted by the most secure algorithm.
D.verified to ensure log integrity.

A

D. It is important to ensure that log information existed at a certain point of time and it has not been altered. Therefore, evidential credibility of log information is enhanced when there is proof that no one has tampered with this information, something typically accomplished by maintaining a documented chain of custody.

276
Q

An information systems (IS) auditor has been asked by management to review a potentially fraudulent transaction. The PRIMARY focus of the IS auditor while evaluating the transaction should be to:

A.maintain impartiality while evaluating the transaction.
B.ensure that the independence of the IS auditor is maintained.
C.ensure that the integrity of the evidence is maintained.
D.assess all relevant evidence for the transaction.

A

C. The IS auditor has been requested to perform an investigation to capture evidence that may be used for legal purposes, and, therefore, maintaining the integrity of the evidence should be the foremost goal. Improperly handled computer evidence is subject to being ruled inadmissible in a court of law.

277
Q

When performing a computer forensic investigation, in regard to the evidence gathered, an information systems (IS) auditor should be MOST concerned with:

A.analysis.
B.evaluation.
C.preservation.
D.disclosure.

A

C. Preservation and documentation of evidence for review by law enforcement and judicial authorities are of primary concern when investigating. Failure to properly preserve the evidence can jeopardize the admissibility of the evidence in legal proceedings.

278
Q

During the collection of forensic evidence, which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?

A.Dumping the memory content to a file
B.Generating disk images of the compromised system
C.Rebooting the system
D.Removing the system from the network

A

C. Rebooting the system may result in a change in the system state and the loss of files and important evidence stored in memory.

279
Q

An information systems (IS) auditor is reviewing security incident management procedures for the enterprise. Which of the following choices is the MOST important consideration?

A.Chain of custody of electronic evidence
B.System breach notification procedures
C.Escalation procedures to external agencies
D.Procedures to recover lost data

A

A. The preservation of evidence is the most important consideration in regard to security incident management. If data and evidence are not collected properly, valuable information can be lost and would not be admissible in a court of law should the enterprise decide to pursue litigation.