Information Asset Security and Controls Flashcards

1
Q

What would be considered an comprehensive control in a remote access network with multiple and diverse subsystems?

A

A Virtual Private Network

i.e. The best way to secure remote access is through the use of encrypted VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what capacity would an IS auditor MOST likely see a hash function applied?

A

Authentication

i.e. the purpose of a hash function is to produce a “fingerprint” of data that can be used to ensure integrity and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is of HIGH concern when a common gateway interface (CGI) is “untested?”

A

Unauthorized access

i.e. This creates security weaknesses that allow unauthorized access to private systems because CGIs are typically executed on publicly available Internet servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should be of highest concern to an IS auditor when auditing a network setup?

A

Wiring and schematic diagram

i.e. The IS auditor needs to know what equipment, configuration and addressing is used on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT method of attack can circumvent a Two-Factor authentication?

A

A “Man-in-the-middle” attack

i.e. similar to piggybacking in that the attacker pretends to be the legitimate destination, and then merely retransmits whatever is sent by the authorized user along with additional transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HOW should an IS auditor recommend setting up a network intrusion detection system (IDS) to detect attack attempts a firewall may be unable to recognize?

A

BETWEEN the web server and the firewall

WHY? - Because by placing the IDS after the web server, this would identify attacks that have made it past the web server but will not indicate whether the firewall would have been able to detect the attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT type of secure communication is most appropriate for a small group?

A

Web of Trust

i.e. It is used by tools such as pretty good privacy and distributes the public keys of users within a group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT is the purpose of a registration authority in a public key infrastructure?

A

To verify information supplied by the subject requesting a certificate

i.e. A registration authority is responsible for verifying information supplied by the subject requesting a certificate and verifies the requestor’s right to request a certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a task that the certificate authority (CA) can delegate?

A

Establishing a link between the requesting entity and its public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT component is responsible for the collection of data in an intrusion detection system?

A

The “Sensor” (i.e. they are responsible for collecting data)

Note: Sensors may be attached to a network, server or other location and may gather data from many points for later analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHAT is a significant function of the corporate public key infrastructure and certificate authority employing X.509 digital certificate?

A

It binds a digital certificate and its public key to an individual subscriber’s identity

i.e. Public key infrastructure (PKI) is primarily used to gain assurance that protected data or services originated from a legitimate source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT are some of the benefits of using a global system for mobile communications (GSM) technology?

A

THE prevention of eavesdropping, session hijacking or unauthorized use of the GSM carrier network

Note: GSM does not allow any devices to connect to the system unless all relevant security features are active and enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT is considered the “Best” quantitative measure of the performance of biometric control devices?

A

Equal-error rate (a combination of a low false-rejection rate (FRR) and a low false-acceptance rate (FAR))

i.e. is a measure of the number of times that the FRR and FAR are equal

Note: A low EER is the measure of the more effective biometrics control device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT key combination do Digital Signatures require?

A

The “Signer” to have a private key and the “Receiver” to have a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT tool would provide the most assurance that transmission of information is secure between an entity and its Service Provider (located in another country)?

A

The use of a Virtual Private Network (VPN) tunnel

I.e. establishing an encrypted VPN tunnel would best ensure that the transmission of information is secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT would be considered the “First” step in data classification?

A

Establishing Ownership

17
Q

WHAT would be a major concern for an IS auditor when reviewing an intrusion detection system?

A

Low coverage of network traffic

WHY? - Because cybersecurity attacks might not be timely identified if only small portion of network traffic is analyzed

18
Q

What is an IS auditor’s MAIN concern if they discover user security groups without designated owners?

Hint - It involves user access controls review

A

Approval of user access

WHY? - Because without an owner to provide approval for user access to the group, unauthorized individuals could potentially gain access to any sensitive data within the rights of the group.

19
Q

What would greatly limit the impact of server failures in a distributed environment?

A

Clustering

Why? - Because this allows two or more servers to work as a unit so that when one of them fails, the other takes over

20
Q

What is a main advantage of elliptic curve encryption (ECC) over RSA encryption?

A

Computation speed

This is due in part to the use of much smaller keys in the ECC algorithm than in RSA