Information Asset Security and Controls 2.0 Flashcards

1
Q

WHAT type of of firewall would best protect a network from an Internet attack?

A

A Screened Subnet Firewall

i.e. The subnet would isolate Internet-based traffic from the rest of the corporate network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the disabling of a Dynamic Host Configuration Protocol (DHCP) - at all of an entity’s wireless access points do?

A

It reduces the risk of unauthorized access to the network

i.e. DHCP automatically assigns IP addresses to anyone connecting to the network. With DHCP disabled, static IP addresses must be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHAT is the purpose of a mantrap in controlling access to a computer facility?

A

To prevent piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT is normally the next line of defense after the network firewall has been compromised?

A

The Intrusion Detection System (IDS)

i.e. This would detect anomalies in the network/server activity and try to detect the perpetrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT environmental control is appropriate to protect computer equipment against short-term reductions in electrical power?

A

A. Power line conditioners

i.e. This is used to compensate for peaks and valleys in the power supply and reduce peaks in the power flow to what is needed by the machine (SHORT TERM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT intrusion detection system will likely generate false alarms resulting from normal network activity?

A

The “Statistical-based” system

WHY? - Because an statistical-based intrusion detection system (IDS) relies on a definition of known and expected behavior of systems (AND normal network activity may, at times, include unexpected behavior)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT could an IS auditor do to test wireless security at branch office locations?

A

War Driving

i.e. a technique for locating and gaining access to wireless networks by driving or walking around a building with a wireless-equipped computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HOW are distributed denial-of-service (DDoS) attacks on Internet sites typically evoked by hackers?

A

By using Botnets (a number of Internet-connected devices)

Note: Botnets can be used to perform distributed denial-of-service (DDoS) attacks, steal data, send spam, and allows an attacker to access a device and its connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WHAT is an effective control to reduce the exposure risk of intercepting data transmitted to and from remote site?

A

Encryption

i.e. Encryption of data is the most secure method of protecting confidential data from exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT is a characteristic of User Datagram Protocol (UDP) in network communication?

A

Packets may arrive out of order

i.e. UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated or get dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHAT is the purpose of a receiver recalculating the cryptographic hash sum of a message?

A

To ensure the integrity of data transmitted by the sender

i.e. If the hash sum is different from what is expected, it implies that the message has been altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False.

A digital signature contains a message digest to show if a message has been altered after transmission.

A

TRUE.

The message digest is calculated and included in a digital signature to prove that the message has not been altered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False.

Validated digital signatures in an email software application will provide confidentiality.

A

FALSE.

Validated digital signatures in an email software application will help detect spam.

Validated electronic signatures are based on qualified certificates that are created by a certificate authority, with the technical standards required to ensure the key can neither be forced nor reproduced in a reasonable time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT type of scenario could result in eavesdropping of VoIP traffic?

A

Corruption of the Address Resolution Protocol cache in Ethernet switches

i.e. If an ARP cache is intentionally corrupted with an ARP poisoning attack, some Ethernet switches simply “flood” the directed traffic to all ports of the switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What would be a major concern in reviewing a newly installed VoIP system in the wiring closets of a building?

A

The local area network (LAN) switches are not connected to uninterruptible power supply units

i.e. If the LAN switches do not have backup power, the phones will lose power if there is a utility interruption and potentially not be able to make emergency calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT is the (Public/Private) combination when using public key encryption to secure data being transmitted across a network?

A

The key used to encrypt is public, but the key used to decrypt the data is private

i.e. With “Public key encryption”, also known as asymmetric key cryptography, a public key is used to encrypt the message and a private key to decrypt it

17
Q

WHAT would be a Major concern when evaluating the technical aspects of logical access security?

A

Unencrypted passwords are used

WHY? - Because it would be assumed that remote access would be over an untrusted network where passwords could be discovered

18
Q

WHAT should be the first action triggered by an IDS?

A

Create an entry in the log

19
Q

What method/technology supplies the most relevant information for proactively strengthening security settings?

A

A Honeypot

i.e. A honeypot allows the attack to continue, so as to obtain information about the hacker’s strategy and methods

20
Q

WHAT public key infrastructure (PKI) elements describes procedure for disabling a compromised private key?

A

Certification Practice Statement

i.e. This is the how-to document used in policy-based public key infrastructure (PKI).