Matching And Brain Dump Flashcards
Approves audit budget and resource allocation.
Executive mgmt
Provide audit oversight
Audit committee
Ensure the achievement & maintenance of org requirements with applicable certifications
Compliance officer
Develop and maintain knowledge and subject matter expertise relevant to the type of audit
External auditor
What are the correct order of steps in an information security assessment
- Define the perimeter
- Identify the vulnerability
- Assess the risk
- Determine the actions
A physical or electronic token stores a set of secrets between the claimant and the credential service provider.
- Out of band token
- Memorized secret token
- Pre-registered Knowledge Token
- Look up Secret Token
Pre-registered Knowledge Token
A physical token that is uniquely addressable and can receive a verifier selected secret of one time use
- Out of band token
- Memorized secret token
- Pre-registered Knowledge Token
- Look up Secret Token
Out of band token
A series of responses to a set of prompts or challenges established by the subscriber and credential service provider during the registration process.
- Out of band token
- Memorized secret token
- Pre-registered Knowledge Token
- Look up Secret Token
Look up secret token
A secret shared between the subscriber and credential service provider that is typically character strings
- Out of band token
- Memorized secret token
- Pre-registered Knowledge Token
- Look up Secret Token
Memorized secret token
Name the type of control: labeling of sensitive data
1. Logical
2. Technical
3. Physical
4. Administrative
Administrative
Name the type of control: Biometrics for authentication
1. Logical
2. Technical
3. Physical
4. Administrative
Technical
Name the type of control: Constrained user interface
1. Logical
2. Technical
3. Physical
4. Administrative
Logical
Name the type of control: Radio frequency identification (RFID) badge
1. Logical
2. Technical
3. Physical
4. Administrative
Physical
Match the name of access control model with the restriction: End user cannot set controls
1. Role based
2. Discretionary
3. Mandatory
4. Rule based
Mandatory
Match the name of access control model with the restriction: Subject has total control over objects
1. Role based
2. Discretionary
3. Mandatory
4. Rule based
Discretionary
Match the name of access control model with the restriction: Dynamically assigns permissions to particular duties on job function
1. Role based
2. Discretionary
3. Mandatory
4. Rule based
Role based
Match the name of access control model with the restriction: dynamically assigns roles to subjects based on criteria assigned by a custodian
1. Role based
2. Discretionary
3. Mandatory
4. Rule based
Rule based
A software security engineer is developing a black box-based plan that will measure the system’s reaction to incorrect or illegal inputs or unexpected operational errors and situations. Match Input parameter with the functional testing technique:
Select one input that doesn’t belong to any of the identified partitions.
- Equivalence class
- State-based
- Boundary value
- Decision table
State-based
A software security engineer is developing a black box-based plan that will measure the system’s reaction to incorrect or illegal inputs or unexpected operational errors and situations. Match Input parameter with the functional testing technique:
Select inputs that are at the external limits of the domain of valid values
- Equivalence class
- State-based
- Boundary value
- Decision table
Equivalence class
A software security engineer is developing a black box-based plan that will measure the system’s reaction to incorrect or illegal inputs or unexpected operational errors and situations. Match Input parameter with the functional testing technique:
Select invalid combinations of input values.
- Equivalence class
- State-based
- Boundary value
- Decision table
Decision table
A software security engineer is developing a black box-based plan that will measure the system’s reaction to incorrect or illegal inputs or unexpected operational errors and situations. Match Input parameter with the functional testing technique:
Select unexpected inputs corresponding to each known condition.
- Equivalence class
- State-based
- Boundary value
- Decision table
boundary value
Below are the common phases to creating a Business Continuity/Disaster Recovery (BC/DR) plan starting with the Risk assessment. Put the remaining BC\DR phases to the appropriate corresponding order.
BC/DR Plan Development
Plan Maintenance
Business Impact Analysis
Training, Testing, & Auditing
Mitigation Strategy Development
Risk Assessment
BIA
Mitigation Strategy Development
BC/DR Plan Development
TTA
Maintenance
Match the objectives to the assessment question in the governance domain of Software Assurance Maturity Model (SAMM).
Do you advertise shared security services with guidance for project teams?
- Eduction & Guidance
- Secure Architecture
- Strategy & Metrics
- Vulnerability Management
Secure Architecture
Match the objectives to the assessment question in the governance domain of Software Assurance Maturity Model (SAMM).
Are most people tested to ensure a baseline skill set for secure development practices?
- Eduction & Guidance
- Secure Architecture
- Strategy & Metrics
- Vulnerability Management
Education & guidance
Match the objectives to the assessment question in the governance domain of Software Assurance Maturity Model (SAMM).
Does most of the org know about what’s required based on risk ratings?
1. Eduction & Guidance
2. Secure Architecture
3. Strategy & Metrics
4. Vulnerability Management
Strategy & metrics
Match the objectives to the assessment question in the governance domain of Software Assurance Maturity Model (SAMM).
Are most project teams aware of their security point(s) of contact and response team(s)?
- Eduction & Guidance
- Secure Architecture
- Strategy & Metrics
- Vulnerability Management
Vulnerability mgmt
In the network design below, where is the MOST secure Local Area Network (LAN) segment to deploy a Wireless Access Point (WAP) that provides contractors access to the Internet and authorized enterprise services?
LAN 4