IS3110 CHAP 6 Flashcards

1
Q

You are beginning an RA for a system. You should define both the operational characteristics and the mission of the system in the early stages of the RA.
TRUE OR FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following should you identify during a risk assessment?

  1. Assets
  2. Threats
  3. Vulnerabilities
  4. Countermeasure
  5. All the above
A

Assets
Threats
Vulnerabilities
Countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Of the following choices, what would be considered an asset?

  1. Hardware
  2. Software
  3. Personnel
  4. Data and information
  5. All the above
A

Hardware
Software
Personnel
Data and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When defining the system for the risk assessment, what should you ensure is included?

  1. Only the title of the system
  2. The current configuration of the system
  3. A list of possible attacks
  4. A list of previous risk assessments
A

The current configuration of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can you use to identify relevant vulnerabilities?

  1. Historical data
  2. Threat modeling
  3. CBA
  4. A and B only
  5. None of the above
A

None of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of assessment can you perform to identify weaknesses in a system without exploiting the weaknesses?

  1. Vulnerability assessment
  2. Risk assessment
  3. Exploit assessment
  4. Penetration test
A

Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An acceptable use policy is an example of an ___ security control.

A

Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your organization requires users to log on with smart cards. This is an example of a ___ security control.

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You use video cameras to monitor the entrance of secure areas of your building. This is an example of a ___ security control.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following should you match with a control to mitigate a relevant risk?

  1. Threats
  2. Vulnerabilities
  3. Threat/vulnerability pair
  4. Residual risk
A

Threat/vulnerability pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a qualitative RA use to prioritize a risk?

  1. Probability and impact
  2. SLE, ARO, and ALE
  3. Safeguard value
  4. Cost-benefit analysis
A

Probability and impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a quantitative RA use to prioritize a risk?

  1. Probability and impact
  2. SLE, ARO, and ALE
  3. Safeguard value
  4. Cost-benefit analysis
A

SLE, ARO, and ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your organization purchased a control and installed it on several servers. This control is consuming too many server resources, and the servers can no longer function. What was not evaluated before the control was purchased?

  1. The cost and time to implement the control
  2. The operational impact of the control
  3. The in-place and planned controls
  4. The impact of the risk
A

The operational impact of the control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is included in an RA that helps justify the cost of a control?

  1. Probability and impact
  2. ALE
  3. CBA
  4. POAM
A

CBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is created with a risk assessment to track the implementation of the controls?

  1. CBA
  2. POAM
  3. ALE
  4. SLE
A

POAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Control in place from the rules and guidelines directed by upper-level management.

A

Administrative security control

17
Q

A list used in a spam filter to block email. It is a list of email addresses or email domains. You add the addresses or domains to the list to ensure that email from these sources is always marked as spam.

A

Blacklist

18
Q

A security control or safeguard. It is put into place to reduce a risk. It reduces the risk by reducing the vulnerability or threat impact.

A

Countermeasure

19
Q

An attempt to discover what vulnerabilities an attacker can exploit. Exploit assessments are also called penetration tests.

A

Exploit assessment

20
Q

An automated management tool. You can configure a setting once and it will apply to all users or computers equally. It is much more efficient than configuring the setting on individual computers.

A

Group Policy

21
Q

A measure that is currently installed. Countermeasures can be in place or planned.

A

In-Place countermeasure

22
Q

The effect of a security control on operations. It frequently consumes resources. These resources can impact normal operations if not controlled.

A

Operational impact

23
Q

Controls the physical environment. It includes locks and guards to restrict physical access. It also includes heating and cooling systems to control the environment.

A

Physical security control

24
Q

This is planned to be added at some point in the future and can be in place or planned.

A

Planned countermeasure

25
Q

A control that uses computers or software to protect systems and provides automation.

A

Technical security control

26
Q

A process used to identify possible threats on a system. Threat modeling attempts to look at a system from the attacker’s perspective.

A

Threat modeling

27
Q

A process used to discover weaknesses in a system. The assessment will then prioritize the vulnerabilities to determine which weaknesses are relevant.

A

Vulnerability assessment

28
Q

A list used in a spam filter to allow email. It is a list of email addresses or email domains. You add the addresses or domains to ensure that email from these sources is not marked as spam.

A

Whitelist