Practice Exam Flashcards

1
Q

(ISC)² publishes a Common Body of Knowledge (CBK) that IT security practitioners should be familiar with; this is recognized throughout the industry as a set of material that is useful for practitioners to refer to. Certifications can be issued for demonstrating expertise in this Common Body of Knowledge. What kind of document is the Common Body of Knowledge?

A

Standard
(The Common Body of Knowledge is used throughout the industry, recognized among many people, countries and organizations. This is a standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zarma is an (ISC)² member and a security analyst for Triffid Corporation. One of Zarma’s colleagues is interested in getting an (ISC)2  certification and asks Zarma what the test questions are like. What should Zarma do?

A

Explain the style and format of the questions, but no detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Siobhan is an (ISC)² member who works for Triffid Corporation as a security analyst. Yesterday, Siobhan got a parking ticket while shopping after work. What should Siobhan do?

A

Pay the parking ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In risk management concepts, a(n) _________ is something a security practitioner might need to protect.

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tina is an (ISC)² member and is invited to join an online group of IT security enthusiasts. After attending a few online sessions, Tina learns that some participants in the group are sharing malware with each other, in order to use it against other organizations online. What should Tina do?

A

Stop participating in the group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Triffid Corporation has a policy that all employees must receive security awareness instruction before using email; the company wants to make employees aware of potential phishing attempts that the employees might receive via email. What kind of control is this instruction?

A

Administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hoshi is an (ISC)2  member who works for the Triffid Corporation as a data manager. Triffid needs a new firewall solution, and Hoshi is asked to recommend a product for Triffid to acquire and implement. Hoshi’s cousin works for a firewall vendor; that vendor happens to make the best firewall available. What should Hoshi do?

A

disclose the relationship, but recommend the vendor/product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Olaf is a member of (ISC)² and a security analyst for Triffid Corporation. During an audit, Olaf is asked whether Triffid is currently following a particular security practice. Olaf knows that Triffid is not adhering to that standard in that particular situation, but that saying this to the auditors will reflect poorly on Triffid. What should Olaf do?

A

Tell the auditors the truth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an example of a “something you know” authentication factor?

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Steve is a security practitioner assigned to come up with a protective measure for ensuring cars don’t collide with pedestrians. What is probably the most effective type of control for this task?

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Aphrodite is a member of (ISC)² and a data analyst for Triffid Corporation. While Aphrodite is reviewing user log data, Aphrodite discovers that another Triffid employee is violating the acceptable use policy and watching streaming videos during work hours. What should Aphrodite do?

A

Inform Triffid management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The city of Grampon wants to know where all its public vehicles (garbage trucks, police cars, etc.) are at all times, so the city has GPS transmitters installed in all the vehicles. What kind of control is this?

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Triffid Corporation publishes a policy that states all personnel will act in a manner that protects health and human safety. The security office is tasked with writing a detailed set of processes on how employees should wear protective gear such as hardhats and gloves when in hazardous areas. This detailed set of processes is a _________.

A

Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Glen is an (ISC)² member. Glen receives an email from a company offering a set of answers for an (ISC)² certification exam. What should Glen do?

A

Inform (ISC)²

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In risk management concepts, a(n) ___________ is something or someone that poses risk to an organization or asset.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A software firewall is an application that runs on a device and prevents specific types of traffic from entering that device. This is a type of ________ control.

A

Technical
(A software firewall is a technical control because it is a part of the IT environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Grampon municipal code requires that all companies that operate within city limits will have a set of processes to ensure employees are safe while working with hazardous materials. Triffid Corporation creates a checklist of activities employees must follow while working with hazardous materials inside Grampon city limits. The municipal code is a ______, and the Triffid checklist is a ________.

A

Law, procedure
(The municipal code was created by a governmental body and is a legal mandate; this is a law. The Triffid checklist is a detailed set of actions which must be used by Triffid employees in specific circumstances; this is a procedure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing ________.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A bollard is a post set securely in the ground in order to prevent a vehicle from entering an area or driving past a certain point. Bollards are an example of ______ controls.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Druna is a security practitioner tasked with ensuring that laptops are not stolen from the organization’s offices. Which sort of security control would probably be best for this purpose?

A

Physical
(Because laptops are tangible objects, and Druna is trying to ensure that these objects are not moved from a certain place, physical controls are probably best for the purpose)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Who approves the incident response policy?

A

Senior management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the risk associated with delaying resumption of full normal operations after a disaster?

A

The impact of running alternate operations for extended periods
(Alternate operations are typically more costly than normal operations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the risk associated with resuming full normal operations too soon after a DR effort?

A

The danger posed by the disaster might still be present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False? Business continuity planning is a reactive procedure that restores business operations after a disruption occurs.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the goal of an incident response effort?

A

Reduce the impact of incidents on operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the goal of Business Continuity efforts?

A

Keep critical business functions operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When should a business continuity plan (BCP) be activated?

A

When senior management decides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

All of the following are typically perceived as drawbacks to biometric systems, except:

A

Lack of accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Prachi works as a database administrator for Triffid, Inc. Prachi is allowed to add or delete users, but is not allowed to read or modify the data in the database itself. When Prachis logs onto the system, an access control list (ACL) checks to determine which permissions Prachi has.

Which security concept is being applied in this situation?

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following would be considered a logical access control?

A

A fingerprint reader that allows an employee to access a laptop computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that operational managers have the utmost personal choice in determining which employees get access to which systems/data. Which method should Handel select?

A

Discretionary access controls (DAC)
(DAC gives managers the most choice in determining which employees get access to which assets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that employees who are assigned to new positions in the company do not retain whatever access they had in their old positions. Which method should Handel select?

A

Role-based access controls (RBAC)
(RBAC can aid in reducing privilege creep, where employees who stay with the company for a long period of time might get excess permissions within the environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Guillermo logs onto a system and opens a document file. In this example, Guillermo is:

A

The subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Larry and Fern both work in the data center. In order to enter the data center to begin their workday, they must both present their own keys (which are different) to the key reader, before the door to the data center opens.

Which security concept is being applied in this situation?

A

Dual control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following is a biometric access control mechanism?

A

A door locked by a voiceprint identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is probably most useful at the perimeter of a property?

A

A fence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following will have the most impact on determining the duration of log retention?

A

Applicable laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Trina and Doug both work at Triffid, Inc. Doug is having trouble logging into the network. Trina offers to log in for Doug, using Trina’s credentials, so that Doug can get some work done.

What is the problem with this?

A

Anything either of them do will be attributed to Trina

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Prina is a database manager. Prina is allowed to add new users to the database, remove current users and create new usage functions for the users. Prina is not allowed to read the data in the fields of the database itself. This is an example of:

A

Role-based access controls (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of these is an example of a physical access control mechanism?

A

A lock on a door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Handel is a senior manager at Triffid, Inc., and is in charge of implementing a new access control scheme for the company. Handel wants to ensure that employees transferring from one department to another, getting promoted, or cross-training to new positions can get access to the different assets they’ll need for their new positions, in the most efficient manner. Which method should Handel select?

A

Role-based access controls (RBAC)
(RBAC is the most efficient way to assign permissions to users based on their job duties)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following is not an appropriate control to add to privileged accounts?

A

Security deposit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Trina is a security practitioner at Triffid, Inc. Trina has been tasked with selecting a new product to serve as a security control in the environment. After doing some research, Trina selects a particular product. Before that product can be purchased, a manager must review Trina’s selection and determine whether to approve the purchase. This is a description of:

A

Segregation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the following statements is true?

A

It is best to use a blend of controls in order to provide optimum security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A tool that monitors local devices to reduce potential threats from hostile software.

A

Anti-malware

46
Q

Which type of fire-suppression system is typically the safest for humans?

A

Water

47
Q

A tool that filters inbound traffic to reduce potential threats.

A

Firewall

48
Q

The logical address of a device connected to the network or Internet.

A

Internet Protocol (IP) address

49
Q

Which of the following activities is usually part of the configuration management process, but is also extremely helpful in countering potential attacks?

A

Updating and patching systems

50
Q

Triffid, Inc., has deployed anti-malware solutions across its internal IT environment. What is an additional task necessary to ensure this control will function properly?

A

Update the anti-malware solution regularly

51
Q

An IoT (Internet of Things) device is typified by its effect on or use of the _____ environment.

A

Physical

(IoT devices typically have some interaction with the physical realm, either by having some physical effect (a vacuum cleaner, refrigerator, light) or by monitoring the physical environment itself (a camera, sensor, etc.))

52
Q

The section of the IT environment that is closest to the external world; where we locate IT systems that communicate with the Internet.

A

DMZ (demilitarized zone)

53
Q

Which type of fire-suppression system is typically the least expensive?

A

Water

54
Q

“Wiring _____” is a common term meaning “a place where wires/conduits are often run, and equipment can be placed, in order to facilitate the use of local networks.”

A

Closet

55
Q

A device typically accessed by multiple users, often intended for a single purpose, such as managing email or web pages.

A

Server

56
Q

Which of the following would be best placed in the DMZ of an IT environment?

A

Mail server

57
Q

Cyril wants to ensure all the devices on his company’s internal IT environment are properly synchronized. Which of the following protocols would aid in this effort?

A

NTP (Network Time Protocol)

58
Q

The common term for systems that ensure proper temperature and humidity in the data center.

A

HVAC

59
Q

Gary is an attacker. Gary is able to get access to the communication wire between Dauphine’s machine and Linda’s machine and can then surveil the traffic between the two when they’re communicating. What kind of attack is this?

A

On-path
(the attackers insert themselves between communicating parties)

60
Q

Carol is browsing the Web. Which of the following ports is she probably using?

A

80 (HTTP traffic)

61
Q

Bert wants to add a flashlight capability to a smartphone. Bert searches the internet for a free flashlight app, and downloads it to the phone. The app allows Bert to use the phone as a flashlight, but also steals Bert’s contacts list. What kind of app is this?

A

Trojan

62
Q

A tool that inspects outbound traffic to reduce potential threats.

A

DLP (data loss prevention)

63
Q

Who dictates policy?

A

Senior management

64
Q

Data retention periods apply to ____ data.

A

All of the answers - Sensitive, secret, and medical

65
Q

Dieter wants to send a message to Lupa and wants to be sure that Lupa knows the message has not been modified in transit. What technique/tool could Dieter use to assist in this effort?

A

Hashing

(a means to provide a security check)

66
Q

The output of any given hashing algorithm is always _____.

A

The same length

67
Q

Proper alignment of security policy and business goals within the organization is important because:

A

Security policy that conflicts with business goals can inhibit productivity

68
Q

By far, the most crucial element of any security instruction program.

A

Preserve health and human safety

69
Q

Data _____ is data left behind on systems/media after normal deletion procedures have been attempted.

A

Remanence

70
Q

If two people want to use symmetric encryption to conduct a confidential conversation, how many keys do they need?

A

1

71
Q

Log data should be kept ______.

A

On a device other than where it was captured

72
Q

Triffid, Inc., wants to host streaming video files for the company’s remote users, but wants to ensure the data is protected while it’s streaming. Which of the following methods are probably best for this purpose?

A

Symmetric encryption

73
Q

The organization should keep a copy of every signed Acceptable Use Policy (AUP) on file, and issue a copy to _______.

A

The user who signed it

74
Q

Logs should be reviewed ______.

A

Continually

75
Q

Archiving is typically done when _________.

A

Data is not needed for regular work purposes

76
Q

Chad is a security practitioner tasked with ensuring that the information on the organization’s public website is not changed by anyone outside the organization.

Which concept does this task demonstrate?

A

Integrity

77
Q

Which of the following is an example of a “Something you are” authentication factor?

A

A photograph of your face

78
Q

For which of the following assets is integrity probably the MOST important security aspect?

A

The file that contains passwords used to authenticate users

79
Q

In risk management, which concept reflects something a security practitioner might need to protect?

A

Asset

80
Q

Of the following, which would probably NOT be considered a threat?

A

A laptop with sensitive data on it
(A laptop, and the data on it, are assets, not threats)

81
Q

Which of the following probably poses the MOST risk?

A

A high-likelihood, high-impact event

82
Q

Within the organization, who can identify risk?

A

Anyone

83
Q

Kerpak works in the security office of a medium-sized entertainment company. Kerpak is asked to assess a particular threat, and he suggests that the best way to counter this threat would be to purchase and implement a particular security solution.

What concept does Kerpak’s solution demonstrate?

A

Mitigation

84
Q

Fill in the missing word:

Sophia is visiting Las Vegas and decides to put a bet on a particular number on a roulette wheel.

This is an example of _________.

A

Acceptance
(Sophia is accepting the risk that the money will be lost, even though the likelihood is high; Sophia has decided that the potential benefit (winning the bet), while low in likelihood, is worth the risk.)

85
Q

Phrenal is selling a used laptop in an online auction. Phrenal has estimated the value of the laptop to be $100, but has seen other laptops of similar type and quality sell for both more and less than that amount. Phrenal hopes that the laptop will sell for $100 or more, but is prepared to take less for it if nobody bids that amount.

What concept does this demonstrate?

A

Risk tolerance

86
Q

At the airport, there are red lines painted on the ground next to the runway, which prohibits traffic from crossing it.

Which type of control does this exemplify?

A

Physical

87
Q

The city of San Jose wants to ensure that all of its citizens are protected from malware, so the city council creates a rule that anyone caught creating and launching malware within the city limits will receive a fine and go to jail.

What kind of rule is this?

A

Law
(The city council is a governmental body making a legal mandate; this is a law)

88
Q

The Triffid Corporation publishes a strategic overview of the company’s intent to secure all the data the company possesses. This document is signed by Triffid’s senior management.

What kind of document is this?

A

Policy
(This is an internal, strategic document, and is therefore a policy)

89
Q

The Payment Card Industry (PCI) Council is a committee made up of representatives from major credit card providers (Visa, Mastercard, American Express) in the United States.

The PCI Council issues rules that merchants must follow if the merchants choose to accept payment via credit card. These rules describe best practices for securing credit card processing technology, activities for securing credit card information, and how to protect personal data of customers.

Which of the following describes this set of rules?

A

Standard
(This set of rules is known as the Data Security Standard, and it is accepted throughout the industry)

90
Q

You are reviewing log data from a router; there is an entry showing that a user sent traffic through the router at 11:45 a.m., local time, yesterday.

Which of the following does this exemplify?

A

Event
(any observable occurrence within the IT environment)

91
Q

An attacker outside the organization attempts to gain access to the organization’s internal files.

Which of the following does this scenario exemplify?

A

Intrusion (an attempt (successful or otherwise) to gain unauthorized access)

92
Q

Business Continuity efforts are

A

about sustaining critical business functions during periods of potential interruption, such as emergencies, incidents, and disasters

93
Q

Which of the following is likely to be included in the business continuity plan?

A

Alternate work areas for personnel affected by a natural disaster

94
Q

What is the overall objective of a disaster recovery (DR) effort?

A

Return to normal, full operations (DR efforts are intended to return the organization to normal, full operations)

95
Q

Prachi works as a database administrator for Triffid, Inc. Prachi is allowed to add or delete users, but is not allowed to read or modify the data in the database itself. When Prachi logs on to the system, an access control list (ACL) checks to determine which permissions he has.

In this situation, Prachi represents what?

A

The subject
(Prachi manipulates the database; this makes Prachi the subject)

96
Q

Which of the following is a record of something that has occurred?

A

Log

97
Q

Gary is unable to log in to the production environment. Gary tries three times and is then locked out of trying again for one hour.

Why could this be?

A

Gary’s actions look like an attack

98
Q

Suvid works at Triffid, Inc. When Suvid attempts to log in to the production environment, a message appears stating that he has to reset his password.

What may have occurred to cause this?

A

Suvid’s password has expired

99
Q

What type of device filters network traffic in order to enhance overall security/performance?

A

Firewall
(Firewalls filter traffic in order to enhance the overall security or performance of the network, or both)

100
Q

Triffid, Inc., has many remote workers who use their own IT devices to process Triffid’s information. The Triffid security team wants to deploy some sort of sensor on user devices in order to recognize and identify potential security issues.

Which of the following is probably most appropriate for this specific purpose?

A

HIDS (host-based intrusion-detection systems)
(expressly designed for this purpose; each HIDS is installed on each endpoint machine)

101
Q

Inbound traffic from an external source seems to indicate much higher rates of communication than normal, to the point where the internal systems might be overwhelmed.

Which security solution can often identify and potentially counter this risk?

A

Firewall

(Firewalls can often identify hostile inbound traffic, and potentially counter it)

102
Q

Which common cloud service model offers the customer the MOST control of the cloud environment?

A

Infrastructure as a service (IaaS)

103
Q

What type of device is commonly advisable to have on the perimeter between two networks?

A

Firewall

(often useful to monitor/filter traffic between two networks)

104
Q

To what data does security need to be provided?

A

All of the answers - Illegal, restricted, and private

(All data needs some form of security; even data that is not sensitive (such as data intended for public view) needs protection to ensure availability)

105
Q

What should security controls on log data reflect?

A

The sensitivity of the source device

106
Q

How often should logs be reviewed?

A

Continually

107
Q

Which of the following is used to ensure that configuration management activities are effective and enforced?

A

Verification and audit

(methods used to review the IT environment to ensure that configuration management activities have taken place and are achieving their intended purpose)

108
Q

What must an organization always be prepared to do when applying a patch?

A

Rollback

(Patches can sometimes cause unintended problems in the environment, so an organization must always be prepared to rollback the environment to the last known good state prior to when the patch was applied)

109
Q

Which one of the following is a benefit of computer-based training (CBT)?

A

Scalable

(it can be replicated uniformly for any number of users)

110
Q

If two people want to use asymmetric communication to conduct a confidential conversation, how many keys do they need?

A

4

(in asymmetric encryption, each party needs their own key pair (a public key and a private key) to engage in confidential communication)