ISO/IEC 27001 - Information Security Foundation Exam Flashcards
In order to take out a fire insurance, an organization must determine the value of the data that it manages. Which factor is NOT important for determining the value of data for an organization?
A) The amount of storage required for the data
B) The degree to which missing data can be recovered
C) The indispensability of data for the business processes
D) The importance of the processes that use the data
A) The amount of storage required for the data
A) Correct. The value of data is not determined by technical factors (such as storage) but by the significance it has to the users. (Literature: A, Chapter 4.10.4)
B) Incorrect. Missing, incomplete or incorrect data that can be easily recovered is less valuable than data that is difficult or impossible to recover.
C) Incorrect. The indispensability of data for business processes in part determines the value.
D) Incorrect. Data critical to important business processes is therefore valuable.
Besides integrity and confidentiality, what is the third reliability aspect of information?
A) Accuracy
B) Availability
C) Completeness
D) Value
B) Availability
A) Incorrect. The three reliability aspects of information are availability, integrity, and confidentiality.
B) Correct. The three reliability aspects of information are availability, integrity, and confidentiality.
(Literature: A, Chapter 3.3)
C) Incorrect. The three reliability aspects of information are availability, integrity, and confidentiality.
D) Incorrect. The three reliability aspects of information are availability, integrity, and confidentiality.
An organization has a network printer in the hallway of the company. Many employees do not pick up their printouts immediately and leave them on the printer. What is the consequence of this to the reliability of the information?
A) The availability of the information is no longer guaranteed.
B) The confidentiality of the information is no longer guaranteed.
C) The integrity of the information is no longer guaranteed.
B) The confidentiality of the information is no longer guaranteed.
A) Incorrect. The information is still available in the system that was used to create and print it.
B) Correct. The information can end up with, or be read by persons who should not have access to this
information. (Literature: A, Chapter 3.4)
C) Incorrect. The integrity of the information on the prints is still guaranteed, for it is on paper.
A database contains a few million transactions of a phone company. An invoice for a customer has been generated and sent. What does this invoice contain for the customer?
A) Data
B) Information
C) Data and information
B) Information
A) Incorrect. The database contains data, however when an invoice is generated and send to a recipient it becomes information for the recipient.
B) Correct. The invoice contains valuable data for the recipient, it has a meaning therefore it is information. (Literature: A, Chapter 4.10.5)
C) Incorrect. The invoice contains information for the recipient and not data.
What is the BEST description of the focus of information management?
A) Allowing business activities and processes to continue without interruption
B) Ensuring that the value of information is identified and exploited
C) Preventing unauthorized persons from having access to automated systems
D) Understanding how information flows through an organization
B) Ensuring that the value of information is identified and exploited
A) Incorrect. This statement relates to business continuity management (BCM). The purpose of BCM is to prevent business activities from being disrupted, to protect critical processes against the consequences of far-reaching disruptions in information systems, and to allow for speedy recovery.
B) Correct. Information management describes the means by which an organization efficiently plans, collects, organizes, uses, controls, disseminates and disposes of its information, and through which it ensures that the value of that information is identified and exploited to the fullest extent. (Literature: A, Chapter 4.11)
C) Incorrect. This is the focus of access management, which ensures that unauthorized persons or processes do not have access to automated systems, databases, and programs.
D) Incorrect. This is the focus of information analysis. Information analysis provides a clear picture of how an organization handles information – how the information flows through the organization.
A database system has not had the latest security patches applied to it and was hacked. The hackers were able to access the data and delete it. What information security concept describes the lack of security patching?
A) Impact
B) Risk
C) Threat
D) Vulnerability
D) Vulnerability
A) Incorrect. Impact is the effect an event has on the organization or its information.
B) Incorrect. A risk is the combination of the likelihood and impact of an event happening.
C) Incorrect. An example of a threat is an external entity trying to exploit a vulnerability; in this case, the hackers form the threat.
D) Correct. An example of a vulnerability is a lack of protection. (Literature: A, Chapter 3.10)
An administration office is determining the dangers to which it is exposed. What is a possible event that can have a disruptive effect on the reliability of information called?
A) A dependency
B) A risk
C) A threat
D) A vulnerability
C) A threat
A) Incorrect. A dependency is not an event.
B) Incorrect. A risk is the average expected damage over a period of time as a result of one or more threats leading to disruption.
C) Correct. A threat is a possible event that can have a disruptive effect on the reliability of information. (Literature: A, Chapter 3.9)
D) Incorrect. Vulnerability is the degree to which an object is susceptible to a threat.
What is a purpose of risk management?
A) To determine the probability that a certain risk will occur
B) To direct and control an organization with regard to risk
C) To investigate the damage caused by possible security incidents
D) To outline the threats to which IT resources are exposed
B) To direct and control an organization with regard to risk
A) Incorrect. This is part of risk analysis.
B) Correct. Risk management are the coordinated activities to direct and control an organization with
regard to risk. (Literature: A, Chapter 3.13)
C) Incorrect. This is part of risk analysis.
D) Incorrect. This is part of risk analysis
Which is a human threat?
A) A leak causes a failure of the electricity supply.
B) A USB stick passes on a virus to a network.
C) There is too much dust in the server room.
B) A USB stick passes on a virus to a network.
A) Incorrect. A leak is not a human threat, but a non-human threat.
B) Correct. A USB stick is always inserted by a person. Thus, if by doing so a virus enters the network,
then it is a human threat. (Literature: A, Chapter 3.16)
C) Incorrect. Dust is not a human threat, but a non-human threat.
A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is NOT one of the four main objectives of a risk analysis?
A) Determine relevant vulnerabilities and threats
B) Establish a balance between the costs of an incident and the costs of a measure
C) Identify assets and their value
D) Implement measures and controls
D) Implement measures and controls
A) Incorrect. This is one of the main objectives of a risk analysis.
B) Incorrect. This is one of the main objectives of a risk analysis.
C) Incorrect. This is one of the main objectives of a risk analysis.
D) Correct. This is not an objective of a risk analysis. (Literature: A, Chapter 3.13.3)
There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had melted and many other documents were lost. What indirect damage is caused by this fire?
A) Burned computer systems
B) Burned documents
C) Melted back-up tapes
D) Water damage
D) Water damage
A) Incorrect. Burned computer systems are direct damage caused by the fire.
B) Incorrect. Burned documents are direct damage caused by the fire.
C) Incorrect. Melted back-up tapes are direct damage caused by the fire.
D) Correct. Water damage due to the fire extinguishers is indirect damage caused by the fire. This is a side effect of putting out the fire, which is aimed at minimizing the damage caused by the fire. (Literature: A, Chapter 3.17)
An office is situated in an industrial area. The company next to the office works with flammable materials. What is the relationship between the threat of fire and the risk of fire?
A) The threat of fire comes from the company next to the office, which poses a risk of fire by working with flammable materials in a vulnerable industrial area.
B) The threat of fire comes from the flammable materials, which poses a risk of fire to the office if the office has the vulnerability of not being fire-proof.
C) The threat of fire comes from the probability that the office will suffer damage because of the risk of fire the flammable materials pose.
D) The threat of fire comes from the vulnerable office in the industrial area, which is working close to a company that poses a risk of fire.
B) The threat of fire comes from the flammable materials, which poses a risk of fire to the office if the office has the vulnerability of not being fire-proof.
A) Incorrect. The threat is the flammable materials, not the company. The flammable materials are not a risk.
B) Correct. The relationship is as explained in the answer. (Literature: A, Chapter 3.8, 3.9 and 3.10)
C) Incorrect. The probability that the office will suffer damage is a risk, not a threat. The flammable
materials are a threat, not a risk.
D) Incorrect. The office is a vulnerability, not a threat.
A fire breaks out in a branch office of a health insurance company. The employees are transferred to neighboring branches to continue their work. Where in the incident cycle is moving to a stand-by arrangement found?
A) Between the damage and recovery stages
B) Between the incident and damage stages
C) Between the recovery and threat stages
D) Between the threat and incident stages
B) Between the incident and damage stages
A) Incorrect. Damage and recovery are limited by the stand-by arrangement.
B) Correct. A stand-by arrangement is a corrective measure that is initiated in order to limit the damage.
(Literature: A, Chapter 16.5)
C) Incorrect. The recovery stage takes place after putting a stand-by arrangement into operation.
D) Incorrect. Carrying out a stand-by arrangement without an incident is very expensive.
How is the purpose of information security policy BEST described?
A) An information security policy documents the analysis of risks and the search for countermeasures.
B) An information security policy gives direction and support to the organization regarding information security.
C) An information security policy makes the security plan concrete by providing it with the necessary details.
D) An information security policy provides insight into threats and the possible consequences.
B) An information security policy gives direction and support to the organization regarding information securitY.
A) Incorrect. The analysis of risks and the search for countermeasures is the purpose of risk analysis and risk management.
B) Correct. With the security policy, management provides direction and support regarding information security. (Literature: A, Chapter 5.1.1)
C) Incorrect. The security plan makes the information security policy concrete. The plan includes which measures have been chosen, who is responsible for what, the guidelines for the implementation of measures, etc.
D) Incorrect. The purpose of a threat analysis is to provide insight into threats and the possible consequences.
An employee from an insurance company discovers that the expiration date of a policy has been changed without his knowledge. He is the only person authorized to do this. He reports this security incident to the helpdesk. The helpdesk worker records the following information regarding this incident:
- date and time
- description of the incident
- possible consequences of the incident
What important information about the incident is missing here?
A) The name of the person reporting the incident
B) The name of the software package
C) The names of the informed people
D) The PC number
A) The name of the person reporting the incident
A) Correct. When reporting an incident, the name of the reporter must be recorded at a minimum. (Literature: A, Chapter 16.2)
B) Incorrect. This is additional information that may be added later.
C) Incorrect. This is additional information that may be added later.
D) Incorrect. This is additional information that may be added later.
Juliana is the owner of a courier company. She employs a few people who, while waiting to make a delivery, can carry out other tasks. She notices, however, that they use this time to send and read their private e-mail and surf the internet. In legal terms, in which way can the use of the internet and e-mail best be regulated?
A) By blocking all websites
B) By drafting a code of conduct
C) By implementing privacy regulations
D) By installing a virus scanner
B) By drafting a code of conduct
A) Incorrect. Blocking all websites regulates the use of internet only. It cannot regulate time spent on private use. This is a technical measure.
B) Correct. In a code of conduct, the use of internet and e-mail can be documented which websites may or may not be visited and to which extent private use is permitted. These are internal regulations. (Literature: A, Chapter 7)
C) Incorrect. Privacy regulations only regulate the use of personal data of personnel and customers, not the use of internet and e-mail.
D) Incorrect. A virus scanner checks incoming e-mail and internet connections on malicious software. It does not regulate the use of internet and e-mail. It is a technical measure.
Which system guarantees the coherence of information security in the organization?
A) Information Security Management System (ISMS)
B) Intrusion detection system (IDS)
C) Rootkit
D) Security regulations for special information
A) Information Security Management System (ISMS)
A) Correct. The ISMS includes organizational structure, policies, planning activities, responsibilities, practices, procedures, processes, and resources. This creates coherence in the organization. (Literature: A, Chapter 3.1)
B) Incorrect. An IDS monitors the network traffic and host activities but does not create coherence.
C) Incorrect. A rootkit is a malicious set of software tools often used by a third party (usually a hacker)
after having gained access to a system.
D) Incorrect. This is a governmental set of rules how to handle special information.
A security incident regarding a web server is reported to a help desk employee. His colleague has more experience with web servers, so he transfers the case to her. Which term describes this transfer?
A) Functional escalation
B) Hierarchical escalation
C) Privilege escalation
A) Functional escalation
A) Correct. If the helpdesk employee is not able to deal with the incident personally, the incident can be reported to someone with more expertise who may be able to resolve the problem. This is called a functional (horizontal) escalation (Literature: A, Chapter 16.1)
B) Incorrect. This is called a functional (horizontal) escalation. Hierarchical escalation is when a task is transferred to someone with more authority.
C) Incorrect. Privilege escalation is a step after gaining access to a computer system. This is typically a step during a hack or penetration test.
Who is responsible for the translation of the business strategy and objectives to security strategy and objectives?
A) Chief information security officer (CISO)
B) General management
C) Information security officer (ISO)
D) Information security policy officer
A) Chief information security officer (CISO)
A) Correct. The CISO is at the highest management level of the organization and develops the general security strategy for the entire business. (Literature: A, Chapter 6.1)
B) Incorrect. General management defines the strategy that is input for the CISO to define the general security strategy.
C) Incorrect. The ISO develops the information security policy of a business unit based on the company policy and ensures that it is observed.
D) Incorrect. The information security policy officer is responsible to maintain policy that is derived from the security strategy.
What is a repressive measure in case of a fire?
A) Putting out a fire after it has been detected
B) Repairing damage caused by the fire
C) Taking out a fire insurance
A) Putting out a fire after it has been detected
A) Correct. This repressive measure minimizes the damage caused by the fire. (Literature: A, Chapter 3.15.4)
B) Incorrect. This is not a repressive measure. It does not minimize the damage caused by the fire.
C) Incorrect. Taking out an insurance protects against the financial consequences of a fire and is risk
insurance.
What is the goal of classification of information?
A) Applying labels to make the information easier to recognize
B) Creating a manual on how to handle mobile devices
C) Structuring information according to its sensitivity
C) Structuring information according to its sensitivity
A) Incorrect. Applying labels to information is designation, a special form of categorizing information which follows on the classification of information.
B) Incorrect. Creating a manual has to do with user guidelines and is not classification of information.
C) Correct. Classification of information is used to define the different levels of sensitivity into which
information can be structured. (Literature: A, Chapter 8.5)
Which threat can occur as a result of the absence of a physical measure?
A) A confidential document is left in the printer.
B) A server shuts down because of overheating.
C) A user can view the files belonging to another user.
D) Hackers can freely enter the computer network.
B) A server shuts down because of overheating.
A) Incorrect. A security policy should cover the rules how to handle confidential documents. All employees should be aware of this policy and practice the rules. This is an organizational measure.
B) Correct. Physical security measures take care of the protection of equipment through climate control (air conditioning, air humidity). (Literature: A, Chapter 11.2)
C) Incorrect. Logical access control is a technical measure which prevents unauthorized access to documents of another user.
D) Incorrect. Preventing hackers to enter the computer or network is a technical measure.
A computer room is protected by a pass reader. Only the system management department has a pass. What type of security measure is this?
A) A corrective security measure
B) A physical security measure
C) A logical security measure
D) A repressive security measure
B) A physical security measure
A) Incorrect. A corrective security measure is a recovery measure. This pass reader system does not recover the impact of an incident.
B) Correct. This is a physical security measure. (Literature: A, Chapter 11.1.2)
C) Incorrect. A logical security measure controls the access to software and information, not the physical access to rooms.
D) Incorrect. A repressive security measure is intended to minimize the consequences of a disruption.
The back-ups of the central server are kept in the same locked room as the server. What risk does the organization most likely face?
A) If the server crashes, it will take a long time before the server is operational again.
B) In the event of a fire, it is impossible to get the system back to its former state.
C) No one is responsible for these back-ups.
D) Unauthorized persons have easy access to the back-ups.
B) In the event of a fire, it is impossible to get the system back to its former state.
A) Incorrect. On the contrary, this would help to make the system operational more quickly.
B) Correct. The chance that the back-ups may also be destroyed in a fire is very high. (Literature: A,
Chapter 3.6 and 11.2.1)
C) Incorrect. The responsibility has nothing to do with the storage location.
D) Incorrect. The server room should be locked.
What is ‘establishing whether someone’s identity is correct’ called?
A) Authentication
B) Authorization
C) Identification
A) Authentication
A) Correct. Establishing whether someone’s identity is correct is called authentication. (Literature: A, Chapter 9.2)
B) Incorrect. Authorization is the process of giving access rights for a computer or network.
C) Incorrect. Identification is the process of making an identity known.
What sort of security does a public key infrastructure (PKI) offer?
A) A PKI verifies which person or system belongs to a specific public key.
B) A PKI ensures that backups of company data are made on a regular basis.
C) A PKI shows customers that a web-based business is secure.
A) A PKI verifies which person or system belongs to a specific public key.
A) Correct. A characteristic of a PKI is that through agreements, procedures and an organization structure, it provides guarantees regarding which person or system belongs to a specific public key. (Literature: A, Chapter 10.2.3)
B) Incorrect. A PKI does not ensure making backups.
C) Incorrect. A PKI provides guarantees regarding which person or system belongs to a specific public key.
In the IT department of a medium-sized company, confidential information has come into the wrong hands several times. This has hurt the image of the company. Therefore, the company is looking into organizational security measures to protect laptops at the company. What is the first step that should be taken?
A) Appoint additional security employees
B) Encrypt storage devices and hard disks of laptops
C) Formulate a policy regarding mobile devices
D) Set up an access control policy
C) Formulate a policy regarding mobile devices
A) Incorrect. This might be a good solution in the end, but it is not a good thing to start with.
B) Incorrect. Encrypting the hard disks of laptops and storage devices is a technical measure. This can be carried out based on an organizational measure.
C) Correct. This policy is an organizational measure. (Literature: A, Chapter 6.2)
D) Incorrect. Access control policy is an organizational measure, which only covers the access to buildings or IT-systems. It does not solve the problem.
What is the most important reason for applying segregation of duties?
A) To create joint responsibility by all employees for the mistakes they make
B) To ensure that employees do the same work at the same time
C) To make clear who is responsible for what tasks and activities
D) To minimize the misuse of business assets or the chance of unauthorized or unintended changes
D) To minimize the misuse of business assets or the chance of unauthorized or unintended changes
A) Incorrect. Segregation of duties separates tasks and responsibilities. It does not make a group of people jointly responsible.
B) Incorrect. Segregation of duties is used to avoid the chance of unauthorized or unintended changes, or the misuse of the organization’s assets. It does not define when activities should be performed.
C) Incorrect. The segregation of duties is used to avoid the chance of unauthorized or unintended changes, or the misuse of the organization’s assets. Its objective is not to make clear who is responsible for what.
D) Correct. Duties must be segregated to avoid the chance of unauthorized or unintended changes, or the misuse of the organization’s assets. (Literature: A, Chapter 6.1.1)