Information Asset Security and Controls 1.0 Flashcards

1
Q

What concern is being primarily addressed when upgrading an existing virtual private network to support Voice-over Internet Protocol communication via tunneling?

A

Reliability and Quality of service (QoS)

i.e. Voice communications require consistent levels of service, which may be provided through QoS and class of service controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT would be considered an effective control for restricting access to unauthorized Internet sites in an organization?

A

Routing outbound Internet traffic through a content-filtering proxy server

i.e. this will effectively monitor user access to Internet sites and block access to unauthorized web sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a secure and economical method for connecting a private network over the Internet in a small- to medium-sized organization?

A

A Virtual Private Network (VPN)

i.e. this method allows data to travel securely from a private network to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What risk is increased when an entity replaces its existing wired local area network with a wireless infrastructure (to accommodate the increased use of mobile devices)?

A

War Driving

i.e. This attack uses a wireless Ethernet card, set in promiscuous mode, and a powerful antenna to penetrate wireless systems from outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT is the “ BEST” way to minimize unauthorized access to unattended end-user PC systems?

A

Enforcing the use of a password-protected screen saver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT is a Major factor with regard to the privacy of the accounting data (when dealing with a new cloud-based accounting service provider)?

A

Return or destruction of information

i.e. The most important consideration with regard to the privacy of the data is the clause concerning the return or secure destruction of information at the end of the contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a Secure Socket Layer (SSL) ensure confidentiality of a message?

A

BY using symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT would be considered a significant threat for an IS auditor when reviewing the logical access to an application?

A

The file storing the application ID password is in cleartext in the production code

  • Compromise of the application ID password can result in untraceable, unauthorized changes to production data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of control will most effectively detect the presence of bursts of errors in network transmissions?

A

Cyclic redundancy check (CRC)

i.e. CRC can detect all single-bit and double-bit errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of IS attack is the “Replay” attack?

A

One that uses residual biometric information to gain unauthorized access

E.g. Residual biometric characteristics, such as fingerprints left on a biometric capture device, may be reused by an attacker to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHAT is an effective control to ensure accountability for users accessing sensitive data in an human resource management system (HRMS)?

A

Audit trails

I.e. This capture which user, at what time, and date, along with other details, has performed a transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between the Encapsulating Security Payload protocol and the authentication header protocol?

A

The Encapsulating Security Payload protocol provides confidentiality via encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What would allow for the automated assurance that proper data files are being used during processing?

A

File header record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of firewalls provides the greatest degree of control (and level of granularity)?

A

Application Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT is the purpose of having a voltage regulator at a data center from an IS audit perspective?

A

To ensure hardware is protected against power surges.

i.e. this protects against short-term power fluctuations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT is the primary objective of classifying information assets (from a control (perspective)?

A

To establish guidelines for the level of access controls that should be assigned

i.e. This helps management establish guidelines for the level of access controls that should be assigned

17
Q

HOW can the confidentiality of transmitted data best be delivered?

A

By encrypting the session key with the receiver’s public key

i.e. This helps ensure that the session key can only be obtained using the receiver’s private key

18
Q

How can an IS auditor best assess whether the enterprise properly manages staff member access to the operating system?

A

By determining whether the enterprise performs periodic reviews of user activity logs

i.e. Reviewing these logs may identify users performing activities that should not have been permitted

19
Q

What should an IS auditor first assess involving an organization’s defined IT security baseline?

A

Sufficiency

i.e. The IS auditor should first evaluate the definition of the minimum baseline level by ensuring the sufficiency of the control baseline to meet security requirements

20
Q

What would be considered a great overall control for an Internet business looking for confidentiality, reliability and integrity of data?

A

Secure Sockets Layer (SSL)

i.e. This sets up a secure channel for communications providing confidentiality through a combination of public and symmetric key encryption and integrity through hash message authentication code