Information Asset Security and Controls 2.0 Flashcards
WHAT type of of firewall would best protect a network from an Internet attack?
A Screened Subnet Firewall
i.e. The subnet would isolate Internet-based traffic from the rest of the corporate network.
What does the disabling of a Dynamic Host Configuration Protocol (DHCP) - at all of an entity’s wireless access points do?
It reduces the risk of unauthorized access to the network
i.e. DHCP automatically assigns IP addresses to anyone connecting to the network. With DHCP disabled, static IP addresses must be used.
WHAT is the purpose of a mantrap in controlling access to a computer facility?
To prevent piggybacking
WHAT is normally the next line of defense after the network firewall has been compromised?
The Intrusion Detection System (IDS)
i.e. This would detect anomalies in the network/server activity and try to detect the perpetrator
WHAT environmental control is appropriate to protect computer equipment against short-term reductions in electrical power?
A. Power line conditioners
i.e. This is used to compensate for peaks and valleys in the power supply and reduce peaks in the power flow to what is needed by the machine (SHORT TERM)
WHAT intrusion detection system will likely generate false alarms resulting from normal network activity?
The “Statistical-based” system
WHY? - Because an statistical-based intrusion detection system (IDS) relies on a definition of known and expected behavior of systems (AND normal network activity may, at times, include unexpected behavior)
WHAT could an IS auditor do to test wireless security at branch office locations?
War Driving
i.e. a technique for locating and gaining access to wireless networks by driving or walking around a building with a wireless-equipped computer
HOW are distributed denial-of-service (DDoS) attacks on Internet sites typically evoked by hackers?
By using Botnets (a number of Internet-connected devices)
Note: Botnets can be used to perform distributed denial-of-service (DDoS) attacks, steal data, send spam, and allows an attacker to access a device and its connection
WHAT is an effective control to reduce the exposure risk of intercepting data transmitted to and from remote site?
Encryption
i.e. Encryption of data is the most secure method of protecting confidential data from exposure
WHAT is a characteristic of User Datagram Protocol (UDP) in network communication?
Packets may arrive out of order
i.e. UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated or get dropped
WHAT is the purpose of a receiver recalculating the cryptographic hash sum of a message?
To ensure the integrity of data transmitted by the sender
i.e. If the hash sum is different from what is expected, it implies that the message has been altered
True or False.
A digital signature contains a message digest to show if a message has been altered after transmission.
TRUE.
The message digest is calculated and included in a digital signature to prove that the message has not been altered
True or False.
Validated digital signatures in an email software application will provide confidentiality.
FALSE.
Validated digital signatures in an email software application will help detect spam.
Validated electronic signatures are based on qualified certificates that are created by a certificate authority, with the technical standards required to ensure the key can neither be forced nor reproduced in a reasonable time.
WHAT type of scenario could result in eavesdropping of VoIP traffic?
Corruption of the Address Resolution Protocol cache in Ethernet switches
i.e. If an ARP cache is intentionally corrupted with an ARP poisoning attack, some Ethernet switches simply “flood” the directed traffic to all ports of the switch
What would be a major concern in reviewing a newly installed VoIP system in the wiring closets of a building?
The local area network (LAN) switches are not connected to uninterruptible power supply units
i.e. If the LAN switches do not have backup power, the phones will lose power if there is a utility interruption and potentially not be able to make emergency calls