grheb Flashcards
1. You're the chief security contact for MTS. One of your primary tasks is to document everything related to security and to create a manual that can be used to manage the company in your absence. Which documents should be referenced in your manual as the ones that identify the methods used to accomplish a given task? A. Policies B. Standards C. Guidelines D. BIA
C
Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than policies or standards.
2. Consider the following scenario. The asset value of your company's primary servers is $2 million, and they are housed in a single office building in Anderson, Indiana. Field offices are scattered throughout the United States, but the workstations located at the field offices serve as thin clients and access data from the Anderson servers. Tornados in this part of the country are not uncommon, and it is estimated that one will level the building every 60 years. Which of the following is the SLE for this scenario? A. $2 million B. $1 million C. $500,000 D. $33,333.33 E. $16,666.67
A
It does not matter how frequent a loss is projected (only once every 60 years, in this case). What does matter is that each occurrence will be disastrous: SLE (single loss expectancy) is equal to asset value (AV) times exposure factor (EF). In this case, asset value is $2 million and the exposure factor is 1.
3. Consider the following scenario. The asset value of your company’s primary servers is $2 million, and they are housed in a single office building in Anderson, Indiana. Field offices are scattered throughout the United States, but the workstations located at the field offices serve as thin clients and access data from the Anderson servers. Tornados in this part of the country are not uncommon, and it is estimated that one will level the building every 60 years. Which of the following amounts is the ALE for this scenario? A. $2 million B. $1 million C. $500,000 D. $33,333.33 E. $16,666.67
D ALE (annual loss expectancy) is equal to the SLE times the annualized rate of occurrence. In this case, the SLE is $2 million and the ARO is 1/60.
4. Consider the following scenario. The asset value of your company's primary servers is $2 million, and they are housed in a single office building in Anderson, Indiana. Field offices are scattered throughout the United States, but the workstations located at the field offices serve as thin clients and access data from the Anderson servers. Tornados in this part of the country are not uncommon, and it is estimated that one will level the building every 60 years. Which of the following is the ARO for this scenario? A. 0.0167 B. 1 C. 5 D. 16.7 E. 60
A ARO (annualized rate of occurrence) is the frequency (in number of years) that an event can be expected to happen. In this case, ARO is 1/60, or 0.0167.
5. Which of the following strategies involves identifying a risk and making the decision to discontinue engaging in the action? A. Risk acceptance B. Risk avoidance C. Risk mitigation D. Risk transference
B
Risk avoidance involves identifying a risk and making the decision no longer to engage in the actions associated with that risk
6. Which of the following policy statements may include an escalation contact in the event that the person dealing with a situation needs to know who to contact? A. Scope B. Exception C. Overview D. Accountability
B
The exception policy statement may include an escalation contact in the event that the person dealing with a situation needs to know who to contact.
7.Which of the following policies are designed to reduce the risk of fraud and prevent other losses in an organization? A. Separation of duties B. Acceptable use C. Least privilege D. Physical access control
A
A separation of duties policy is designed to reduce the risk of fraud and to prevent other losses in an organization.
8. What is the term used for events that were mistakenly flagged although they weren't truly events about which to be concerned? A. Fool's gold B. Non-incidents C. Error flags D. False positives
D
False positives are events that were mistakenly flagged and aren’t truly events to be concerned about.
9. Which of the following is the structured approach that is followed to secure a company's assets? A. Audit management B. Incident management C. Change management D. Skill management
C
Change management is the structured approach that is followed to secure a company’s assets.
10. Which of the following strategies involves sharing some of the risk burden with someone else, such as an insurance company? A. Risk acceptance B. Risk avoidance C. Risk deterrence D. Risk mitigation E. Risk transference
E
Risk transference involves sharing some of the risk burden with someone else, such as an insurance company.
11. The risk assessment component, in conjunction with the \_\_\_\_\_\_\_\_, provides the organization with an accurate picture of the situation facing it. A. RAC B. ALE C. BIA D. RMG
C
The risk assessment component, in conjunction with the business impact analysis (BIA), provides an organization with an accurate picture of the situation it faces.
12. Which of the following policy statements should address who is responsible for ensuring that the policy is enforced? A. Scope B. Exception C. Overview D. Accountability
D
The accountability policy statement should address who is responsible for ensuring that the policy is enforced.
13. Which of the following strategies is accomplished any time you take steps to reduce risk? A. Risk acceptance B. Risk avoidance C. Risk transference D. Risk mitigation
D
Risk mitigation is accomplished any time you take steps to reduce
14. If you calculate the SLE to be $4,000 and that there will be 10 occurrences a year (ARO), then the ALE is: A. $400 B. $4,000 C. $40,000 D. $400,000
C
If you calculate the SLE to be $4,000 and that there will be 10 occurrences a year (ARO), then the ALE is $40,000 ($4,000 × 10).
15. Which of the following policies describes how the employees in an organization can use company systems and resources, both software and hardware? A. Separation of duties B. Acceptable use C. Least privilege D. Physical access control
B
The acceptable use policies describe how the employees in an organization can use company systems and resources, both software and hardware.
16. Separation of duties helps to prevent an individual from embezzling money from a company. To embezzle funds successfully, an individual would need to recruit others to commit an act of \_\_\_\_\_\_\_\_\_\_\_\_\_\_ (an agreement between two or more parties established for the purpose of committing deception or fraud). A. Misappropriation B. Misuse C. Collusion D. Fraud
C
Collusion is an agreement between two or more parties established for the purpose of committing deception or fraud. Collusion, when part of a crime, is also a criminal act in and of itself.
17. Which of the following agreements contains the technical information regarding the technical and security requirements of the interconnection between two or more organizations? A. BPA B. MOA C. ISA D. MOU
C The ISA (interconnection security agreement) specifies the technical and security requirements of the interconnection.
18. If you calculate SLE to be $25,000 and that there will be one occurrence every four years (ARO), then what is the ALE? A. $6,250 B. $12,500 C. $25,000 D. $100,000
A
If you calculate SLE to be $25,000 and that there will be one occurrence every four years (ARO), then the ALE is $6,250 ($25,000 × 0.25).
19. Which of the following policies should be used when assigning permissions, giving users only the permissions they need to do their work and no more? A. Separation of duties B. Acceptable use C. Least privilege D. Physical access control
C
The principle of least privilege should be used when assigning permissions. Give users only the permissions that they need to do their work and no more.
20. Which of the following strategies necessitates an identified risk that those involved understand the potential cost/damage and agree to live with it? A. Risk acceptance B. Risk avoidance C. Risk transference D. Risk mitigation
A
Risk acceptance necessitates an identified risk that those involved understand the potential cost or damage and agree to accept it.
1.A periodic update that corrects problems in one version of a product is called a(n) \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_. A. Hotfix B. Overhaul C. Service pack D. Security update
C
A periodic update that corrects problems in one version of a product is called a service pack. Option A is incorrect; a hotfix is an immediate and urgent fix for a specific problem. Option B is incorrect: overhaul is not a term used in the industry. Option D is incorrect; a patch is done to fix a specific problem.
2.Which device monitors network traffic in a passive manner? A. Sniffer B. IDS C. Firewall D. Web browser
B
An IDS monitors network traffic, but it does not take any specific action and is therefore considered passive. Option A is incorrect because sniffers tend to be run for a specific period of time by a human operator. Option C is incorrect; a firewall is for blocking traffic, not monitoring, and is not passive. Option D is incorrect; a web browser is for viewing web pages.
3.What is a system that is intended or designed to be broken into by an attacker?
A. Honeypot
B. Honeybucket
C. Decoy
D. Spoofing system
E. Deleted if the employee has been terminated
A
A honeypot is a system specifically designed to be being broken into. Options B, C, and D are not the terms used in the industry.
4.In intrusion detection system vernacular, which account is responsible for setting the security policy for an organization? A. Supervisor B. Administrator C. Root D. Director
B
An administrator is the term for someone setting security policy in an IDS. Options A, C, and D are not the terms used in the industry.