Domain 7 Flashcards
What must be true about audit trails in order to help ensure their admissibility into court?
a) They are conducted on a regular basis
b) They are synchronized to GMT
c) They are in commonly accepted format
d) They are safely stored in a central repository
They are conducted on a regular basis
What should you do in order to correlate the many logs produced by your different systems?
a) Configure for daylight saving changes
b) Standardize your systems on 24-hour based GMT
c) Store all logs in a common format on a central server
d) Use a reliable and accurate time source
Use a reliable and accurate time source
In the context of intrusion detection, how does integrity checking work?
a) By comparing the current hash values of files to their known good hash values
b) By monitoring changes to the Modify, Access, and Create (MAC) timestamps of critical files
c) By evaluating the properly syntax, field size, and content of network packets
d) By verifying the identity and authorization of all requested transactions, sessions, and services
By comparing the current hash values of files to their known good hash values
What is the most important reason that sensitive audit information should be given proper care?
a) It often contains the private data of staff or clients
b) To avoid possible second amendment privacy issues
c) So as not to alert a suspect to your investigation
d) It lists vulnerabilities in your network
It lists vulnerabilities in your network
Which of the following is the MOST efficient deterrent against fraud?
a) Firewalls
b) Audit Trails
c) Vulnerability Assessments
d) Armed guards
Audit Trails
What is usually the first step that should be taken before hiring any given individual?
a) Verification of past employment
b) Blood test
c) Family history
d) Interview friends
Verification of past employment
What is one way to cut down on the amount of fraud in the IT department?
a) Suspect everyone.
b) Install monitoring software on every PC without telling anyone.
c) Regularly rotate positions.
Regularly rotate positions
Which of the following ensures that individuals are responsible for their own actions?
a) Encryption
b) Auditing
c) Virtual Private Network
Auditing
Ensuring that only people that have a need to access certain information or resources will be authorized to do so is an example of:
a) Least Privilege
b) Need to Know
c) Minimal Access
Need to Know
Ensuring that only the minimum required access is given at any time is an example of which of the following?
a) Need to Know
b) Maximum Access
c) Least Privilege
d) Due Course
Least Privilege
Policies, standards, guidelines, personnel screening, and security awareness training fall under which of the following control category?
a) Preventative controls
b) Detective controls
c) Directive controls
d) Corrective controls
Directive controls
Firewalls, encryption, identification, and authentication fall under which of the following control category?
a) Preventive controls
b) Directive controls
c) Corrective controls
d) Detective controls
Preventive controls
Log review, auditing, and integrity checkers fall under which of the following control categories?
a) Preventative controls
b) Corrective controls
c) Detective controls
d) Directive controls
Detective controls
Instruction manuals and audit trails fall under which of the following control categories?
a) Directive controls
b) Preventative controls
c) Detective controls
d) Corrective controls
Corrective controls
Which of the following monitoring techniques records all keys, and in some cases, all mouse clicks and menu selections while a user is at a computer?
a) Sniffer
b) Anti-virus
c) Keystroke
Keystroke