IS3110 CHAP 8 Flashcards

1
Q

A check to see if an organization is following rules and guidelines. A vulnerability assessment check to see if internal policies are followed

A

Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A series of events recorded in one or more logs. It records who, what, where, and when. They can be in operating system logs like the MicrosoftSecurity log, or application logs like a firewall log.

A

Audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A formal process requiring that changes be made only after they have been reviewed and submitted. This reduces outages caused by unauthorized changes.

A

Change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ testing that tries to exploit vulnerabilities. Vulnerability testing identifies potential vulnerabilities, and ___ determines if the vulnerabilities can actually be exploited. ___ can take down systems.
(All blanks are the same term)

A

Exploit testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A report created by comparing exploits that should be controlled, with the exploits that are controlled. Any uncontrolled exploits represent a gap in analysis. A ___ is often performed when an organization is trying to comply with legal requirements such as HIPAA.

A

Gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security principle that grants users only the minimum rights and permissions needed to perform their job. This is similar to the need-to-know principle. However, the need-to-know principle focuses only on permissions for data, not rights.

A

Least-privilege principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security principle that grants users access only to the data they need to perform their job. This is similar to the least-privilage-principle. However, the least-privilege principle includes rights and permissions, while the ___ principle focuses only on permissions for data.

A

Need-to-know principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Testing performed to see if a vulnerability can be exploited. ___ is done after a vulnerability assessment. It can be invasive and can take systems down.

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tactics used to trick people into revealing sensitive information or taking unsafe actions. ___ tactics include conning people over the phone or in person. It also includes phishing and other technical tactics.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An attempt that targets a specific company. ___ looks as if it came from someone within the company and is more successful against unaware employees.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A process used to identify and evaluate potential threats. The goal is to identify as many potential threats as possible. These threats are then evaluated to determine the likelihood of the threat.

A

Threat assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A database term that allows several database statements to succeed as a whole, or if any single statement fails, the entire ___ fails. A failed ___ is not applied to the database.

A

Transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. The two major categories of threats are human and ___.
A

Natural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. A threat is any activity that represents a possible danger, with the potential to affect confidentiality, integrity, or availability.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following methods can be used to identify threats?
  2. Review historical data
  3. Perform threat modeling
  4. 1 & 2
  5. None of above
A

Review historical data

Perform threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What are some sources of internal threats? (Select all that apply)
  2. Disgruntled employee
  3. Equipment failure
  4. Software failure
  5. Data loss
A

Disgruntled employee
Equipment failure
Software failure
Data loss

17
Q
  1. Which of the following choices is not considered a best practice when identifying threats?
  2. Verify systems operate and are controlled as expected
  3. Limit the scope of the assessment
  4. Consider threats to confidentiality, integrity, and availability
  5. Assume the systems have not changed since the last threat assessment
A

Assume the systems have not changed since the last threat assessment

18
Q
  1. A ___ assessment is used to identify vulnerabilities within an organization.
A

Vulnerability

19
Q
  1. Who should perform vulnerability assessments?
  2. Internal security professionals working as employees
  3. External security professionals hired as consultants
  4. Either internal or external security professionals or both
  5. Only the IT personnel that own the systems
A

Either internal or external security professionals or both

20
Q
  1. What is the name of a common tool used to perform an automated vulnerability assessment scan?
  2. Wireshark
  3. Superscan
  4. Nessus
  5. VA Scanner
A

Nessus

21
Q
  1. What is a common drawback or weakness of a vulnerability scanner?
  2. A high false-positive error rate
  3. A high false-negative error rate
  4. A low false-positive error rate
  5. A low false-negative error rate
A

A high false-positive error rate

22
Q

Your organization wants to check compliance with internal rules and guidelines. They want to ensure that existing policies are being followed. What should be performed?

  1. Threat assessment
  2. Gap analysis
  3. An audit trail
  4. An audit
A

An audit

23
Q
  1. You want to know if users are granted the rights and permissions needed to do their job only, and no more. You should perform a(n) ___ test.
A

Access control

24
Q
  1. You want to identify if any of the discovered vulnerabilities can be expiated. What should you perform?
  2. Audit
  3. Transaction and applications test
  4. Functionality test
  5. Exploit assessment
A

Exploit assessment

25
Q
  1. Your organization is governed by HIPAA. You suspect that your organization is not in compliance. What would document the differences between what is required and what is currently implemented?
  2. Gap analysis
  3. Vulnerability assessment
  4. Threat assessment
  5. Penetration test
A

Gap analysis

26
Q
  1. What management program can be implemented to ensure that the configuration of systems is not modified without a formal approval?
  2. Configuration management
  3. Change management
  4. Gap analysis
  5. Process analysis
A

Change management

27
Q
  1. Configuration management ensures that changes are not made to a system without formal approval.
    TRUE OR FALSE
A

FALSE