Domain Review Flashcards

1
Q
  1. When writing a corporate policy that explains the security objectives of confidentiality, integrity, and availability; what is the best definition for integrity?

a. To protect information asset from modification or destruction of information assets
b. To prevent unauthorized personnel and/or program from accessing information assets
c. To protect information assets from unauthorized modification or destruction
d. To authorize personnel and/or program to access information assets

A

Domain: Information Security & Risk Management

Best answer: A

“Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.” (44 U.S.C. Section 3542)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A good and effective information security policy should have the following characteristics, except?

a. Delegation of roles and responsibilities
b. Explanation of management objectives that are aligned with business goals
c. Enumeration of short- and long-term goals
d. Definition of terms

A

Domain: Information Security & Risk Management

Best answer: C

A information security policy should:

  • Explain laws, regulations, business needs, and management’s expectations (goals & objectives)
  • Identify roles and delineate responsibilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. “Users should only have access to information that enables them to perform their assigned job functions.” Is a practice of which security implementation principles?

a. Need to know
b. Least privilege
c. Separation of duties
d. Confidentiality

A

Domain: Information Security & Risk Management

Best answer: A

“Need to know” is where users should only have access to information that enables them to perform their assigned job functions.
“Least privilege” is where users should only have sufficient access privilege that allow them to perform their assigned work.
“Separation of duties” is where no single person should be responsible for carrying out a series of critical tasks from beginning to end; where the tasks requires more than one internal controls to prevent fraud and errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What type of information security requirement is design to establish confidence that a control will perform as intended?

a. Functional requirements
b. Assurance requirements
c. Performance requirements
d. Operational requirements

A

Domain: Information Security & Risk Management

Best answer: B

Functional requirement describes the functionality or behavior which a system shall perform.

Assurance requirement measures level of confidence that the security function will perform as intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What type of security control is designed to preclude actions that violate policy or increase risks to information assets?

a. Directive
b. Preventive
c. Detective
d. Corrective

A

Domain: Information Security & Risk Management

Best answer B

  • Directive controls are intended to advise employees of the behavior expected of them during their interfaces with or use the organization’s information systems.
  • Preventive controls are the physical, administrative, and technical measures intended to preclude actions violating policy or increasing risk to system resources.
  • Detective controls involve the use of practices, processes, and tools that identify and possibly react to security violations.
  • Corrective controls involve physical, administrative, and technical measures designed to react to detection of an incident in order to reduce or eliminate the opportunity for the unwanted event to recur.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. As a security professional, how would you explain the definition of a risk?

a. An entity that may act on a vulnerability
b. Any potential danger to information (/ system) life cycle
c. The likelihood of a threat source take advantage of a vulnerability
d. An instance of being compromised by a threat source.

A

Domain: Information Security & Risk Management

Best answer: C

Risk is the likelihood of a threat source exploiting vulnerability.

Vulnerability is a weakness or flaw that may provide an opportunity to a threat source to exploit.

Threat is any potential danger to information (/ system) life cycle.

Risk = Threat X Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is the process that determines what security controls are needed to adequately protect the information system that supports the operations and assets of an organization?

a. Risk management
b. Threat assessment
c. Vulnerability assessment
d. Security audit

A

Domain: Information Security & Risk Management

Best answer: A

Threat and vulnerability assessments are a part of risk management process.

Security audit determines whether the required controls have been implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. In information security management, what is the primary responsibility of an information (/ data) owner?

a. Ensure accuracy of the data
b. Authorizes user access and determine privilege
c. Back up data regularly
d. Determine the data sensitivity (/ classification) level

A

Domain: Information Security & Risk Management

Best answer: D

The owner of information (/ data) that understands the value and potential impact should determine the sensitivity of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. As the information security engineer estimating the annual budget for an information security program, what would be the appropriate amount you would recommend to protect an asset valued at $1 million from a threat that has annualized rate of occurrence (ARO) of once every 5 years and an exposure factor (EF) of 30%?

a. $1,500
b. $60,000
c. $150,000
d. $300,000

A

Domain: Information Security & Risk Management

Best answer: B

SLE = Asset value x EF ($1,000,000 x 30% = $300,000)
ALE = ARO x SLE (1/5 x $300,000 = $60,000)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. In an enterprise, who is primarily responsible for determining the level of protection needed for information assets?

a. Senior management
b. Program manager
c. Auditor
d. Information systems security engineer

A

Domain: Information Security & Risk Management

Best answer: D

Security engineers or analysts determine the level of protection based on the risk assessment results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. When using quantitative risk assessment method, which of the following statement is incorrect?

a. Assessment & results are based substantially on independently objective processes & metrics. Thus, meaningful statistical analysis is supported.
b. A credible basis for cost/benefit assessment of risk mitigation measures is provided. Thus, information security budget decision-making is supported.
c. Risk assessment & results are essentially subjective in both process & metrics.
d. Calculations are complex.

A

Domain: Information Security & Risk Management

Best answer: C

Quantitative risk assessment method is not subjective. It requires the value of information be expressed in monetary terms. Hence the calculations are complex and the assessment results are objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What is the primary rationale for implementing security controls?

a. To eliminate risk and the potential for loss.
b. To eliminate risk and reduce the potential for loss.
c. To mitigate risk and reduce the potential for loss.
d. To mitigate risk and eliminate the potential for loss.

A

Domain: Information Security & Risk Management

Best answer: D

Risk can be accepted, mitigated, or transferred, but cannot be eliminated.

Implement security controls can eliminate potential for loss.

If a security control cannot fully eliminate the potential for loss, then the risk would have to be accepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. A disciplined approach to evaluate level of conformance to the prescribed security requirements and the implemented security controls is?

a. Certification
b. Accreditation
c. Risk management
d. Vulnerability assessment

A

Domain: Information Security & Risk Management

Best answer: A

Accreditation is the official management decision of operate the certified system. It is also a formal acceptance of the responsibility to the security of the certified system.

Risk management is a process for managing risks to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Using the “reasonable and prudent person” concept; performing background investigation, interviewing references, conducting counterintelligence and lifestyle polygraphs are what type of personnel security activities?

a. Due diligence
b. Due care
c. Due process
d. Management controls

A

Domain: Information Security & Risk Management

Best answer: B

Due care are the actions taken to minimize risks.

Due diligence are the continual actions that an organization doing to protect and minimize risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Why is configuration management a key component of information security management?

a. Ensures the change does not affect the system accreditation.
b. Ensures the change is documented.
c. Ensures the change improves the security posture baseline.
d. Ensures the change does not adversely affect the security posture baseline.

A

Domain: Information Security & Risk Management

Best answer: D

Configuration management ensures the system configuration baseline is recorded and changes are documented, so associated risks maybe assessed and actions can be taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is the document that illustrates an integrated view of enterprise system architecture from a perspective of meeting the organizational security policy, standards, and process?

a. The enterprise security architecture
b. The security architecture reference model
c. The trusted facility manual
d. The security model

A

Domain: Security Architecture & Design

Best answer: A

Enterprise security architecture is an integrated view of the enterprise system architecture from a perspective of meeting the organizational security policy, standards, and processes.

17
Q
  1. What is the importance of an architecture framework?

a. It provides an investment alignment between the business and the IT organizations.
b. It ensures interoperability between systems within an enterprise.
c. It explains the concept of how a system shall meet the operational needs of an enterprise.
d. It provides a common standard of terminology, description, and models to facilitate communications amongst the project stakeholders.

A

Domain: Security Architecture & Design

Best answer: D

An architecture framework provides a common standard of terminology, description, and models to facilitate communications amongst the project stakeholders such as:
• Program Managers and System Designers (Contextual).
• System Designers and System Engineers (Conceptual).
• System Engineers and System Developers (Logical).
• System Developers and System Integrators (Physical).
• System Integrators and System Operators (Component).
• System Users to System Engineers, Developers, Integrators, and Operators (Concept of Operations).

18
Q
  1. What security model is expressed using access control matrices that explain operations between subjects and objects and it has no rule for state-transitions?

a. Graham-Denning
b. Bell-LaPadula
c. Biba
d. Clark-Wilson

A

Domain: Security Architecture & Design

Best answer: A

Graham-Denning is usually expressed using access control matrices that explain how subjects can perform actions on objects. It has no rule for state-transitions.

Bell-LaPadula, Biba, and Clark-Wilson are state-machine models.

19
Q
  1. What security model is designed for controlled access to classified national security information and focuses on meeting the confidentiality objective only?

a. Graham-Denning
b. Bell-LaPadula
c. Biba
d. Clark-Wilson

A

Best answer: B

Bell-LaPadula is a state-machine model has 3 access actions: read-only, write-only, and read & write. It focuses on meeting the confidentiality objective only.

20
Q
  1. In the Bell-LaPadula security model, what does the * (star) property mean?

a. Subject cannot read object of higher sensitivity
b. Subject cannot write to object of lower sensitivity
c. Subject cannot read/write to object of higher/lower sensitivity
d. Subject cannot write to object of higher integrity

A

Domain: Security Architecture & Design

Best answer: B

  • Simple security property: Subject cannot read object of higher sensitivity (No read up)
  • property: Subject cannot write to object of lower sensitivity (No write down)
  • Strong * property: Subject cannot read/write to object of higher/lower sensitivity (No read up and write down)
21
Q
  1. What security model is designed to address the integrity of information and systems that focuses on preventing unauthorized subjects from modifying objects?

a. Graham-Denning
b. Bell-LaPadula
c. Biba
d. Clark-Wilson

A

Domain: Security Architecture & Design

Best answer: C

Biba security model focuses on preservation of data and system integrity.

22
Q
  1. In the Biba security model, what does the integrity * (star) property mean?

a. Subject cannot read objects of lesser integrity
b. Subject cannot write to objects of higher integrity
c. Subject cannot send messages to object of higher integrity
d. Subject cannot write to objects of lower sensitivity

A

Domain: Security Architecture & Design

Best answer: B

  • Simple integrity condition: Subject cannot read objects of lesser integrity (No read down)
  • Integrity * (star) property: Subject cannot write to objects of higher integrity (No write up)
  • Invocation property: Subject cannot send messages (logical service request) to object of higher integrity (No invocation up)
23
Q
  1. What security model requires the use of access triple of subject-program-object to ensure well-formed transactions for preserving data integrity, preventing arbitrary modification, and separation of duty?

a. Graham-Denning
b. Bell-LaPadula
c. Biba
d. Clark-Wilson

A

Domain: Security Architecture & Design

Best answer: D

Clark-Wilson is a security model address the integrity goals of:
• Preventing unauthorized subjects from modifying objects
• Preventing authorized subjects from making improper modification to objects
• Maintaining internal and external consistency
To ensure well-formed transaction, Clark-Wilson security model requires program to certify and enforce policy rules.

24
Q
  1. What security model is often implemented in modern database management systems (DBMS)?

a. Graham-Denning
b. Bell-LaPadula
c. Biba
d. Clark-Wilson

A

Domain: Security Architecture & Design

Best answer: D

Most modern DBMS such as Oracle, DB2, or MS SQL, implements Clark-Wilson security model to preserve data/system integrity and ensures separation of duty.

25
Q
  1. What security model is designed to prevent conflict of interest?

a. Brewer-Nash
b. Bell-LaPadula
c. Biba
d. Clark-Wilson

A

Domain: Security Architecture & Design

Best answer: A

Brewer-Nash security model is designed to implement dynamically changing access permissions to prevent conflict of interest.

26
Q
  1. What security mode of operation where it assumes all users have the necessary clearance, need-to-know, and can access to the system?

a. Dedicated security mode
b. System high-security mode
c. Multi-level security mode
d. Compartmented security mode

A

Domain: Security Architecture & Design

Best answer: A

In dedicated operating mode, all users have the required security clearance, the need-to-know for all, and can access to all.

27
Q
  1. What security mode of operation where the system operates at the highest security classification level, all users have the necessary clearance, access to all system components, but not all users have the need-to-know for all information?

a. Dedicated security mode
b. System high-security mode
c. Multi-level security mode
d. Compartmented security mode

A

Domain: Security Architecture & Design

Best answer: B

In system high mode, all users have the required security clearance, can access to all system components, but do not have the need-to-know for all information within the system.

28
Q
  1. What security mode of operation allows system to operate and process information at multiple classification levels?

a. Dedicated security mode
b. System high-security mode
c. Multi-level security mode
d. Compartmented security mode

A

Domain: Security Architecture & Design

Best answer: C

In multi-level security (MLS) mode of operation, the system that has implemented Bell-LaPadula security model can operate and process information at multiple classification levels.

29
Q
  1. What is the security architecture concept that describes an abstract machine that mediates all subjects’ accesses to objects?

a. Trusted computing base (TCB)
b. Clark-Wilson security model
c. Reference monitor
d. Security kernel

A

Domain: Security Architecture & Design

Best answer: C

  • Reference monitor is a concept performed by a reference validation mechanism.
  • Trusted computing base (TCB) is the totality of protection mechanisms that focuses on meeting the security objective of confidentiality and integrity.
  • Security kernel is a software mechanism that is an implementation of reference monitor and is a part of TCB.
30
Q
  1. What is the information security system design concept that consists of hardware, firmware, software, data processes, and transports for meeting the confidentiality and integrity security objectives?

a. Trusted computing base (TCB)
b. Reference monitoring mechanism
c. Security kernel
d. Rings of protection

A

Domain: Security Architecture & Design

Best answer: A

  • Trusted computing base (TCB) is the totality of protection mechanisms that focuses on meeting the security objective of confidentiality and integrity.
  • Reference monitoring mechanism does not specify the security policy model, or mechanisms. And it does not specify the security objectives.
  • Security kernel is a software mechanism that is an implementation of reference monitor and is a part of TCB.
31
Q
  1. In an operating system, what type of process scheduling is where the operating system schedules computational processes by a series of threads that enables multiple users to request services?

a. Multi-programming
b. Multi-tasking
c. Multi-threading
d. Multi-processing

A

Domain: Security Architecture & Design

Best answer: C

  • Multi-programming: An operating system process scheduling can coordinate multiple sets of programmed instructions.
  • Multi-tasking: An operating system process scheduling that allows a user to run multiple programs.
  • Multi-threading: An operating system process scheduling that allows multiple users/ programs to request services and execute them in a series of threads.
  • Multi-processing: An operating system process scheduling that allows multiple users/ programs to request services and allocate them to multiple CPUs for execution.
32
Q
  1. In management of virtual memory in a modern computing system, the act of moving information between primary and secondary memory storages is called?

a. Paging
b. Swapping
c. Relocating
d. Data input and output

A

Domain: Security Architecture & Design

Best answer: B

  • Paging splits memory into equal-sized blocks called page frames.
  • Swapping is the act of transferring pages between physical memory and the swap space on a disk.
33
Q
  1. Which of the following security evaluation standard focuses on meeting the confidentiality objective?

a. Trusted Computer System Evaluation Criteria (TCSEC)
b. Information Technology Security Evaluation Criteria (ITSEC)
c. Common Criteria Evaluation and Validation Scheme (CCEVS)
d. Security Content Automation Protocol (SCAP)

A

Domain: Security Architecture & Design

Best answer: A

Trusted Computer System Evaluation Criteria (TCSEC) (a.k.a. Orange Book/ DoD 5200.28-STD) focuses primarily on meeting the confidentiality objective, because the security policy is based on Bell-LaPadula security model.

34
Q
  1. In Trusted Computer System Evaluation Criteria (TCSEC), what certification class requires meeting the security policy requirements of discretionary access control (DAC) and object reuse?

a. C1: Discretionary Security Protection
b. C2: Controlled Access Protection
c. B1: Labeled Security Protection
d. B2: Structured Protection

A

Domain: Security Architecture & Design

Best answer: B

In TCSEC, Division C is for discretionary access control. Certification class C2 is C1 + object reuse.

35
Q
  1. In Trusted Computer System Evaluation Criteria (TCSEC), what certification division requires mandatory access control (MAC), objects must carry the sensitivity labels, and the system design document must include a mathematical proof of the security model?

a. Division D: Minimal Protection
b. Division C: Discretionary Protection
c. Division B: Mandatory Protection
d. Division A: Verified Protection

A

Domain: Security Architecture & Design

Best answer: D

In TCSEC, certification class B2: Structured Protection is the lowest evaluation level that requires covert channel analysis.