ISACA 701 -800 Flashcards
Applying a digital signature to data traveling in a network provides:
A. confidentiality and integrity.
B. security and nonrepudiation.
C. integrity and nonrepudiation.
D. confidentiality and nonrepudiation.
C. integrity and nonrepudiation.
At a hospital, medical personal carry handheld computers, which contain patient health data. These handheld computers are synchronized with PCs which transfer data from a hospital database. Which of the following would be of the most importance?
A. The handheld computers are properly protected to prevent loss of data confidentiality, in case of theft or loss.
B. The employee who deletes temporary files from the local PC, after usage, is authorized to maintain PCs.
C. Timely synchronization is ensured by policies and procedures.
D. The usage of the handheld computers is allowed by the hospital policy.
A. The handheld computers are properly protected to prevent loss of data confidentiality, in case of theft or loss.
The BEST filter rule for protecting a network from being used as an amplifier in a denial-of- service (DoS) attack is to DENY all:
A. outgoing traffic with Internet Protocol (IP) source addresses external to the network.
B. incoming traffic with discernible spoofed IP source addresses.
C. incoming traffic with IP options set.
D. incoming traffic to critical hosts.
A. outgoing traffic with Internet Protocol (IP) source addresses external to the network.
A business application system accesses a corporate database using a single ID and password embedded in a program. Which of the following would provide efficient access control over the organization’s data?
A. Introduce a secondary authentication method such as card swipe.
B. Apply role-based permissions within the application system.
C. Have users input the ID and password for each database transaction.
D. Set an expiration period for the database password embedded in the program.
B. Apply role-based permissions within the application system.
A characteristic of User Datagram Protocol (UDP) in network communications is:
A. packets may arrive out of order.
B. increased communication latency.
C. incompatibility with packet broadcast.
D. error correction may slow down processing.
A. packets may arrive out of order.
A company has decided to implement an electronic signature scheme based on public key infrastructure (PKI). The user’s private key will be stored on the computer’s hard drive and protected by a password. The MOST significant risk of this approach is:
A. use of the user’s electronic signature by another person if the password is compromised.
B. forgery by using another user’s private key to sign a message with an electronic signature.
C. impersonation of a user by substitution of the user’s public key with another person’s public key.
D. forgery by substitution of another person’s private key on the computer.
A. use of the user’s electronic signature by another person if the password is compromised.
Confidentiality of the data transmitted in a wireless local area network (WLAN) is BEST protected if the session is:
A. restricted to predefined media access control (MAC) addresses.
B. encrypted using static keys.
C. encrypted using dynamic keys.
D. initiated from devices that have encrypted storage.
C. encrypted using dynamic keys.
The cryptographic hash sum of a message is recalculated by the receiver. This is to ensure:
A. the confidentiality of the message.
B. nonrepudiation by the sender.
C. the authenticity of the message.
D. the integrity of data transmitted by the sender.
D. the integrity of data transmitted by the sender.
Digital signatures require the:
A. signer to have a public key and the receiver to have a private key.
B. signer to have a private key and the receiver to have a public key.
C. signer and receiver to have a public key.
D. signer and receiver to have a private key.
B. signer to have a private key and the receiver to have a public key.
Distributed denial-of-service (DDoS) attacks on Internet sites are typically evoked by hackers using which of the following?
A. Logic bombs
B. Phishing
C. Spyware
D. Trojan horses
D. Trojan horses
During a logical access controls review, an IS auditor observes that user accounts are shared. The GREATEST risk resulting from this situation is that:
A. an unauthorized user may use the ID to gain access.
B. user access management is time consuming.
C. user accountability is not established.
D. passwords are easily guessed.
C. user accountability is not established.
During an access control review for a mainframe application, an IS auditor discovers user security groups without designated owners. Which of the following is the PRIMARY reason that this is a concern to the IS auditor? Without ownership there is no responsibility for:
A. updating group metadata.
B. reviewing existing user access.
C. approval of user access.
D. removing terminated users.
C. approval of user access.
During an audit of an enterprise that is dedicated to e-commerce, the IS manager states that digital signatures are used when receiving communications from customers. To substantiate this, an IS auditor must prove that which of the following is used?
A. A biometric, digitalized and encrypted parameter with the customer’s public key
B. A hash of the data that is transmitted and encrypted with the customer’s private key
C. A hash of the data that is transmitted and encrypted with the customer’s public key
D. The customer’s scanned signature encrypted with the customer’s public key
B. A hash of the data that is transmitted and encrypted with the customer’s private key
During an audit of an internally developed, web-based purchase approval application, an IS auditor discovers that all business users share a common access profile. Which of the following is the MOST important recommendation for the IS auditor to include in the report?
A. Ensure that all user activity is logged and that the logs are reviewed by management.
B. Develop additional profiles within the application to restrict user access per the job profiles.
C. Ensure that a policy exists to control what activities users can perform within the application.
D. Ensure that a virtual private network (VPN) is implemented so that users can log on to the application securely.
B. Develop additional profiles within the application to restrict user access per the job profiles.
During an audit of a telecommunications system, an IS auditor finds that the risk of intercepting data transmitted to and from remote sites is very high. The MOST effective control for reducing this exposure is:
A. encryption.
B. callback modems.
C. message authentication.
D. dedicated leased lines.
A. encryption.
Email message authenticity and confidentiality is BEST achieved by signing the message using the:
A. sender’s private key and encrypting the message using the receiver’s public key.
B. sender’s public key and encrypting the message using the receiver’s private key.
C. receiver’s private key and encrypting the message using the sender’s public key.
D. receiver’s public key and encrypting the message using the sender’s private key.
A. sender’s private key and encrypting the message using the receiver’s public key.
The feature of a digital signature that ensures the sender cannot later deny generating and sending the message is called:
A. data integrity.
B. authentication.
C. nonrepudiation.
D. replay protection.
C. nonrepudiation.
A firewall is being deployed at a new location. Which of the following is the MOST important factor in ensuring a successful deployment?
A. Reviewing logs frequently
B. Testing and validating the rules
C. Training a local administrator at the new location
D. Sharing firewall administrative duties
B. Testing and validating the rules
The FIRST step in a successful attack to a system would be:
A. gathering information.
B. gaining access.
C. denying services.
D. evading detection.
A. gathering information.
The GREATEST risk from an improperly implemented intrusion prevention system (IPS) is:
A. that there will be too many alerts for system administrators to verify.
B. decreased network performance due to IPS traffic.
C. the blocking of critical systems or services due to false triggers.
D. reliance on specialized expertise within the IT organization.
C. the blocking of critical systems or services due to false triggers.
Inadequate programming and coding practices introduce the risk of:
A. phishing.
B. buffer overflow exploitation.
C. synchronize (SYN) flood.
D. brute force attacks.
B. buffer overflow exploitation.
In an online banking application, which of the following would BEST protect against identity theft?
A. Encryption of personal password
B. Restricting the user to a specific terminal
C. Two-factor authentication
D. Periodic review of access logs
C. Two-factor authentication
In a public key infrastructure (PKI), a registration authority:
A. verifies information supplied by the subject requesting a certificate.
B. issues the certificate after the required attributes are verified and the keys are generated.
C. digitally signs a message to achieve nonrepudiation of the signed message.
D. registers signed messages to protect them from future repudiation.
A. verifies information supplied by the subject requesting a certificate.
In a public key infrastructure (PKI), which of the following may be relied upon to prove that an online transaction was authorized by a specific customer?
A. Nonrepudiation
B. Encryption
C. Authentication
D. Integrity
A. Nonrepudiation
An Internet-based attack using password sniffing can:
A. enable one party to act as if they are another party.
B. cause modification to the contents of certain transactions.
C. be used to gain access to systems containing proprietary information.
D. result in major problems with billing systems and transaction processing agreements.
C. be used to gain access to systems containing proprietary information.
In transport mode, the use of the Encapsulating Security Payload (ESP) protocol is advantageous over the Authentication Header (AH) protocol because it provides:
A. connectionless integrity.
B. data origin authentication.
C. antireplay service.
D. confidentiality.
D. confidentiality.
In wireless communication, which of the following controls allows the receiving device to verify that the received communications have not been altered in transit?
A. Device authentication and data origin authentication
B. Wireless intrusion detection (IDS) and prevention systems (IPS)
C. The use of cryptographic hashes
D. Packet headers and trailers
C. The use of cryptographic hashes
An IS auditor discovers that the configuration settings for password controls are more stringent for business users than for IT developers. Which of the following is the BEST action for the IS auditor to take?
A. Determine whether this is a policy violation and document it.
B. Document the observation as an exception.
C. Recommend that all password configuration settings be identical.
D. Recommend that logs of IT developer access are reviewed periodically.
A. Determine whether this is a policy violation and document it.
An IS auditor discovers that uniform resource locators (URLs) for online control self-assessment questionnaires are sent using URL shortening services. The use of URL shortening services would MOST likely increase the risk of which of the following attacks?
A. Internet Protocol (IP) spoofing
B. Phishing
C. Structured query language (SQL) injection
D. Denial-of-service (DoS)
B. Phishing
An IS auditor examining a biometric user authentication system establishes the existence of a control weakness that would allow an unauthorized individual to update the centralized database on the server that is used to store biometric templates. Of the following, which is the BEST control against this risk?
A. Kerberos
B. Vitality detection
C. Multimodal biometrics
D. Before-image/after-image logging
A. Kerberos
An IS auditor finds that a database administrator (DBA) has read and write access to production data. The IS auditor should:
A. accept the DBA access as a common practice.
B.assess the controls relevant to the DBA function.
C. recommend the immediate revocation of the DBA access to production data.
D. review user access authorizations approved by the DBA.
B. assess the controls relevant to the DBA function.
An IS auditor finds that conference rooms have active network ports. Which of the following is MOST important to ensure?
A. The corporate network is using an intrusion prevention system (IPS).
B. This part of the network is isolated from the corporate network.
C. A single sign-on has been implemented in the corporate network.
D. Antivirus software is in place to protect the corporate network.
B. This part of the network is isolated from the corporate network.
An IS auditor is reviewing an organization’s controls over email encryption. The company’s policy states that all sent email must be encrypted to protect the confidentiality of the message because the organization shares nonpublic information through email. To ensure that personnel are complying with the policy, an IS auditor must be sure the message is:
A. encrypted with the sender’s private key and decrypted with the sender’s public key.
B. encrypted with the recipient’s private key and decrypted with the sender’s private key.
C. encrypted with the sender’s private key and decrypted with the recipient’s private key.
D. encrypted with the recipient’s public key and decrypted with the recipient’s private key.
D. encrypted with the recipient’s public key and decrypted with the recipient’s private key.
An IS auditor is reviewing a software-based firewall configuration. Which of the following represents the GREATEST vulnerability? The firewall software:
A. is configured with an implicit deny rule as the last rule in the rule base.
B. is installed on an operating system with default settings.
C. has been configured with rules permitting or denying access to systems or networks.
D. is configured as a virtual private network (VPN) endpoint.
B. is installed on an operating system with default settings.
An IS auditor is reviewing system access and discovers an excessive number of users with privileged access. The IS auditor discusses the situation with the system administrator, who states that some personnel in other departments need privileged access and management has approved the access. Which of the following would be the BEST course of action for the IS auditor?
A. Determine whether compensating controls are in place.
B. Document the issue in the audit report.
C. Recommend an update to the procedures.
D. Discuss the issue with senior management.
A. Determine whether compensating controls are in place.
An IS auditor performing a telecommunication access control review should be concerned PRIMARILY with the:
A. maintenance of access logs of usage of various system resources.
B. authorization and authentication of the user prior to granting access to system resources.
C. adequate protection of stored data on servers by encryption or other means.
D. accountability system and the ability to identify any terminal accessing system resources.
B. authorization and authentication of the user prior to granting access to system resources.
An IS auditor performing detailed network assessments and access control reviews should FIRST:
A. determine the points of entry.
B. evaluate users’ access authorization.
C. assess users’ identification and authorization.
D. evaluate the domain-controlling server configuration.
A. determine the points of entry.
An IS auditor reviewing access controls for a client-server environment should FIRST:
A. evaluate the encryption technique.
B. identify the network access points.
C. review the identity management system.
D. review the application level access controls.
B. identify the network access points.
An IS auditor reviewing the implementation of an intrusion detection system (IDS) should be MOST concerned if:
A. IDS sensors are placed outside of the firewall.
B. a behavior-based IDS is causing many false alarms.
C. a signature-based IDS is weak against new types of attacks.
D. the IDS is used to detect encrypted traffic.
D. the IDS is used to detect encrypted traffic.
An IS auditor reviewing wireless network security determines that the Dynamic Host Configuration Protocol (DHCP) is disabled at all wireless access points. This practice:
A. reduces the risk of unauthorized access to the network.
B. is not suitable for small networks.
C. automatically provides an IP address to anyone.
D. increases the risk associated with Wireless Encryption Protocol (WEP).
A. reduces the risk of unauthorized access to the network.