Security Architecture Domain 4 Flashcards

1
Q

Three risk analysis methods

A

OCTAVE
NIST 800-30
ISO/IEC27005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Quantitative Risk Analysis
This approach employs two fundamental elements;

A

the probability of an event
occurring and a value or measure for the loss should it occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Quantitative risk analysis makes use of a single figure produced from these elements. This is called the _____________________ or the ______________

A

‘Annual Loss Expectancy (ALE)’
‘Estimated Annual Cost (EAC)’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Quantitative risk is calculated by multiplying

A

Single loss event SLE x annual rate of occurrence AR0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most qualitative risk analysis methodologies make use of a number of interrelated elements:

A

THREATS
Things that can go wrong or attack the system
VULNERABILITIES
These weaknesses make a system more prone to attack by a threat or make an attack more likely to have some success or impact.
CONTROLS
These are the countermeasures for vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where is the attack vector in emails

A

there are potentially two, the email itself and the attachment to the email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key differences between a worm and a virus

A

Worms can generally spread without needing human interaction.
Virus needs a host file, it attaches to an executable file, document or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Most European countries data protection laws follow principles detailed in two EU directives, whether or not these countries are part of the European Union. These directives are

A
  1. Directive 95/46/EC of the European Parliament on the Protection
    of Individuals with Regard to the Processing of Personal Data and
    on the Free Movement of Such Data (commonly called the Data
    Protection Directive) 20 and
  2. Directive 2002/58/EC Concerning the Processing of Personal Data
    and the Protection of Privacy in the Electronic Communications
    Sector 21. The first directive applies to the collection, storage,
    disclosure, and other uses of personal data. The second directive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The __________________ was born out of the necessity to expand product security assurance programs in the United States, Canada, United Kingdom, France, and Germany.

A

Common criteria CC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Product evaluations began in the United States with the ___________________, which was the criterion for evaluating secure systems and vendor products.

A

Orange Book TCSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Orange Book had an assurance range from

A

D2 up to A-3. The
D class had the least amount of rigorous testing, and A class consisted of more formal evaluation methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Orange Book only addressed

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The next evaluation criteria, _____________, was created by Canada, the United Kingdom, France, Spain, and Germany.

A

the ITSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ITSEC addressed

A

Confidentiality and Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Common Criteria is useful as a guide for the development, evaluation, or procurement of IT products with security functionality. It addresses

A

Confidentiality, Integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Common Criteria consists of three parts

A

Introduction and general model
Security functional requirements
Security Assurance requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Common criteria
Part 2 - Security Functional Requirements establish a set of functional components as a standard way of

A

expressing the functional requirements for the Target of Evaluation (TOE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Common Critera
Part 3 - Security Assurance Requirements establish a set of assurance components as a standard way of

A

expressing the assurance requirements for the TOE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The purpose of this arrangement is to advance those objectives by bringing about a situation in which IT products and protection profiles that earn a Common Criteria certificate can be procured or used without

A

the need for further evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When did Australia and New Zealand join the mutual recognition arrangement

A

October 1999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Common Criteria evaluated products begin the process by being
evaluated in a

A

certified laboratory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The National Voluntary Laboratory Accreditation Program (NVLAP) provides third-party accreditation to

A

testing and calibration laboratories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Part 2 of the Common Criteria defines the

A

Security functional components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does TOE mean

A

Target of Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Is a TOE a product

A

It could be but it does not have to be. It might be an IT product, a part of an IT product, a set of IT products, a unique technology
that may never be made into a product, or a combination of these.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How many Evaluation Assurance Levels are there?

A

Seven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When is EAL1 Applicable

A

EALI is applicable where some confidence in correct operation is required, but the threats to security are not viewed as serious. but the threats to security are not viewed as serious. It will be of value where independent assurance is required to support the contention that due care has been exercised with respect to the protection of personal or similar information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When is EAL2 Applicable

A

EAL.2 is, therefore, applicable in those circumstances where developers or users require a low to moderate level of independently assured security in the absence of ready availability of the complete development record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

EAL1 means what kind of testing

A

Functional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

EAL2 means what kind of testing

A

Structural

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

EAL3 means what kind of testing

A

Methodically tested and checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

EAL4 means what kind of testing

A

Methodically Designed, Tested, and Reviewed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

EAL5 means what what kind of testing

A

Semiformally Designed and Tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

EAL6 means what what kind of testing

A

Semiformally verified design and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

EAL7 means what what kind of testing

A

Formally verified design and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

When is EAL3 applicable

A

It is applicable in those circumstances where developers or users require a moderate level of independently assured security, and require a thorough investigation of the TOE and its development
without substantial reengineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

When is EAL4 applicable

A

It is the highest level at which it is likely to be economically feasible
to retrofit to an existing product line. It is, therefore, applicable in those circumstances where developers or users require a moderate to high level of independently assured security in conventional commodity TOEs and are prepared to incur additional security-specific engineering costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

When is an EAL5 applicable

A

When users require a high level of independently assured security in a planned developments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

When is an EAL6 applicable

A

Applicable to the development of security TOEs for application in high-risk situations where the value of the protected assets justifies the additional costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

When is an EAL7 applicable

A

EAL7 is applicable to the development of security TOEs for application in extremely high-risk situations or where the high value of the assets justifies the higher costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The Common Criteria Part 3 begins with

A

a philosophy of the approach to
assurance that will permit the reader to understand the rationale behind the
assurance requirements.

42
Q

IT security breaches come from the intentional exploitation or _______________ of vulnerabilities in the application of IT within business concerns.

A

unintentional triggering

43
Q

To the extent feasible vulnerabilities should be

A
  1. Eliminated, by taking steps to expose, remove, or neutralize all
    exercisable vulnerabilities.
  2. Minimized, by taking steps to reduce to an acceptable level residual
    potential impact of any risks or vulnerability.
  3. Monitored, by taking steps to ensure that any attempt to exercise
    a residual vulnerability will be detected so that steps can be taken
    to limit the damage.
44
Q

____________ is the traditional way of gaining assurance. It serves as the basis of the Common Criteria approach.

A

Evaluation

45
Q

In the common criteria what is penetration testing

A

one method of evaluation

46
Q

The Common Criteria philosophy asserts that greater assurance results from

A

the application of greater evaluation effort

47
Q

What is The Common Criteria Evaluation Assurance Scale

A

Scope - That is, the effort is greater because a larger portion of the IT
product is included.
Depth - That is, the effort is greater because it is deployed to a finer
level of design and implementation detail.
Rigor - That is, the effort is greater because it is applied in a more
structured, formal manner.

48
Q

The CMMI-DEV model provides guidance for

A

applying Capability Maturity Model best practices in a development organization. Best

49
Q

Sources of the Capability Maturity Model (CMM)

A

The Software Engineering Institute (SEI) developed an initial version of a
maturity model with the assistance of the MITRE corporation

50
Q

The CMMI for Development may be put to the following uses:

A
  • Software process improvement,
  • Software process assessments
  • Software capability evaluations,
51
Q

In CMM-DEV (Capability Maturity Model Integration for Development), the terms continuous representation and staged representation refer to

A

two different ways of assessing and improving process maturity within an organization.

52
Q

What are two different ways of assessing and improving process maturity within an organization.

A

Continuous representation
Staged representation

53
Q

The staged representation organizes process improvement into

A

five maturity levels, where each level builds on the previous one.

54
Q

The continuous representation focuses on

A

improving specific process areas independently, rather than requiring an organization-wide maturity level.

55
Q

What are the continuous representation maturity levels

A

Level 0 Incomplete
Level 1 Performed
Level 2 Managed
Level 3 Defined
Level 4 (N/A)
Level 5 (N/A)

56
Q

What are the staged representation maturity levels

A

Level O (N/A)
Level 1 Initial
Level 2 Managed
Level 3 Defined
Level 4 Quantitatively Managed
Level 5 Optimizing

57
Q

A capability level 2 process is characterised as a managed process. What is a managed capability or process

A

A managed process is a performed process that is planned and executed in accordance with policy

58
Q

A capability level 3 process is characterised as a defined process. A defined process is

A

A managed process that is tailored from the organisation’s set of standard processes according to the organisation’s tailoring guidelines

59
Q

The process discipline reflected by capability level 2 helps to ensure that

A

existing practices are retained during times of stress.

60
Q

A critical distinction between maturity levels 3 and 4

A

is the predictability of process performance.

61
Q

At maturity level 5, an organization continually

A

improves its processes based on a quantitative understanding of its business objectives and performance needs.

62
Q

At maturity level ____, the
organisation and projects focus on understanding and controlling performance at the subprocess level and using the results to manage projects. At maturity level __________, the organisation is concerned with overall organisational performance using data collected from multiple projects.

63
Q

Organizations wanting to understand and improve their capability to develop software effectively and professionals wanting to understand the key practices that are part of effective processes for developing or maintaining software could consider using which CMM

A

The Software Engineering Institute’s CMMI for Development

64
Q

The CMMI for Development Level 2 says that processes must be repeatable in the areas of

A

Project planning, tracking and oversight

65
Q

The CMMI for Development Level 2 says that processes must be repeatable all level 2 task areas and

A

have defined processes for organisational process focus, process definition, training, integrated software management, intergroup coordination, and peer reviews

66
Q

What is the purpose of ISO 7498

A

To provide a common basis for the coordination of standards development for the purpose of systems interconnection

67
Q

The term Open Systems Interconnection (OSI) qualifies standards for the exchange of information among systems that are

A

“open” to one another for this purpose by virtue of their
mutual use of the applicable standards.

68
Q

Three primary elements of defense in depth include the following

A

People
Technology
Operations

69
Q

ISSE

A

Information System Security Engineering

70
Q

What is ISSE

A

The art and science of discovering users information protection needs and designing information systems to protect them

71
Q

What is the first step of an ISSE process

A

Discovering the protection needs

72
Q

What is the last step of an ISSE process

A

Assessing the effectiveness

73
Q

What is the basis for creating and information Protection Plan

A

An information management model and a threat analysis

74
Q

The results of these two activities should be documented in the information management plan

A

The threat analysis and the Information Protection Plan

75
Q

What comes first the systems security requirements, or the information protection needs

A

Information protection needs

76
Q

Where do you find the systems security requirements

A

In the Statements of Work, Statements of Requirement or Statements of Objective, or SLAs

77
Q

Design validation requires the development of a

A

test and evaluation plan

78
Q

Design validation is done during which phase of the systems development life cycle

79
Q
  1. The approach in which policies, procedures, technology, and personnel
    are considered in the system security development process is called
    A. defense in depth.
    B. requirements analysis.
    C. risk assessment.
    D. attack vectors.
A

The correct option is A
Best security practices should include an architecture that provides defense in depth where layers of technology are designed and implemented to provide data protection. These layers include people, technology, and operations (including processes and procedures).

80
Q
  1. Software that adds hidden components to a system without end user knowledge is
    A. Virus.
    B. Spyware.
    C. Adware.
    D. Malware.
A

The correct option is B
Spyware is software that adds hidden components to your system on the sly.

81
Q
  1. Risk is assessed by which of the following formulas?
    A. Risk = Vulnerability × Threat × Impact Divided by Countermeasure
    B. Risk = Annual Loss Opportunity ÷ Single Loss Expectancy
    C. Risk = Exposure Facture divided by Asset Value
    D. Risk = Vulnerability × Annual Loss Expectancy
A

The correct option is A
Option a is correct the others are mixed-up derivatives of risk management.

82
Q
  1. Requirements definition is a process that should be completed in the following order:
    A. Document, identify, verify and validate.
    B. Identify, verify, validate, document
    C. Characterize, analyze, validate, and verify.
    D. Analyze, verify, validate, and characterize.
A

The correct option is B

83
Q
  1. A path by which a malicious actor gains access to a computer or
    network in order to deliver a malicious payload is a
    A. penetration test.
    B. attack vector.
    C. vulnerability assessment.
    D. risk assessment.
A

The correct option is B
Option b is the definition of an attack vector. Risk and vulnerability assessments
and penetration testing deal with ways of analyzing and protecting the system.

84
Q
  1. Which of the following is BEST as a guide for the development,
    evaluation, and/or procurement of IT products with security
    functionality?
    A. ISO/IEC 27001
    B. FIPS 140-2
    C. Common Criteria
    D. SEI-CMM
A

The correct option is C

85
Q
  1. Which of the following BEST defines evaluation criteria for Protection Profile (PP) and Security Target (ST) and presents evaluation assurance levels rating assurance for the TOE?
    A. Part 3—Security assurance requirements
    B. Part 2 Security functional requirements
    C. Part 1-Introduction and general model
    D. Part 4— History and previous versions
A

The correct option is A
Parts 2 and 1 deal with other security requirements and general CC model and
part 4 does not exist.

86
Q
  1. The National Voluntary Laboratory Accreditation Program (NVLAP)
    must be in full conformance with which of the following standards?
    A. ISO/IEC 27001 and 27002
    B. ISO/IEC 17025 and Guide 58
    C. NIST SP 800-53A
    D. ANSI/ISO/IEC Standard 17024
A

The correct option is B
Option a deals with best practice implementation on the system. Option
c provides IA controls for federal government systems, and Option d is the standard for certifications such as the CISSP*.

87
Q
  1. A software application in combination with an operating system, a
    workstation, smart card integrated circuit, or cryptographic processor
    would be considered examples of a
    A. Functional Communications (FCO)
    B. Functional Trusted Path (FTP)
    C. Target of Evaluation (TOE)
    D. Security Target (ST)
A

The correct option is C
Options a and b refer to families of security functions, and Option d refers to the evaluation criteria that TOE (Option c) will be assessed by.

88
Q
  1. A security architect requires a device with a moderate level of
    independently assured security, and a thorough investigation of the
    TOE and its development without substantial reengineering. It should
    be evaluated at which CC EAL?
    A. EAL6
    B. EAL5
    C. EAL4
    D. EAL3
A

The correct option is D
Option d refers to the criteria for EAL3 evaluation by definition. EALG is semiformally verified design and tested, EALS is semiformally designed but not verified, and EAL4 is methodically designed, tested, and reviewed.

89
Q
  1. At which Common Criteria EAL would a security architect select a
    device appropriate for application in extremely high-risk situations or
    where the high value of the assets justifies the higher costs?
    A. EAL4
    B. EAL5
    C. EAL6
    D. EAL7
A

The correct option is D
Again, Option d refers to the criteria for EAL 7 evaluation by definition. EAL6
is semi-formally verified design and tested, EAL 5 is semi-formally designed but not verified, and EAL 4 is methodically designed, tested, and reviewed.
Options a, b, or c would not be appropriate for extremely high-risk situations.

90
Q

Which EAL is semi-formally designed but not verified

91
Q
  1. A list of Common Criteria-evaluated products can be found on the Internet on the site at the
    A. NIAP
    B. CCEVS
    C. IASE
    D. CERIS
A

The correct option is B
NIAP is the partnership between NIST and NSA for the evaluation of products, and IASE is the site run by DISA to promote best security practices. CERIS is a consortium run by the University of Notre Dame Computer Science and Information Security department. * CCEVS is the site that lists all evaluated products, those in the evaluation process, and those that have been removed or superseded.

92
Q
  1. Which of the following describes the purpose of the Capability
    Maturity Model?
    A. Determine business practices to ensure creditability for the
    company’s commitment to quality and excellence.
    B. Provide assurance through active investigation and evaluation of
    the IT product in order to determine its security properties.
    C. Establish a metric to judge in a repeatable way the maturity of
    an organization’s software process as compared to the state of the
    industry practice.
    D. Provide an overview of standards related to the Information
    Security Management family for uniformity and consistency of
    fundamental terms and definitions.
A

The correct option is C
Options a and d are from ISO/IEC 27001, and Option b is from the Common Criteria.

93
Q
  1. Which one of the following describes the key practices that correspond
    to a range of maturity levels 1-5?
    A. Common Criteria
    B. SEI-CMM
    C. ISO/IEC 27002
    D. IATF v3
A

The correct option is B

94
Q
  1. Which of the following CMMI levels include quantitative process
    management and software quality management as the capstone
    activity?
    A. CMMI Level 5
    B. CMMI Level 4
    C. CMMI Level 3
    D. CMMI Level 2
A

The correct option is B
CMMI Level 4 includes quantitative process management and software quality management as the capstone activity.

95
Q
  1. Where can the general principles of the OSI Reference Model
    architecture be found that describes the OSI layers and what layering means?
    A. Clause 3
    B. Clause 5
    C. Clause 7
    D. Clause 9
A

The correct option is B
ISO 7498 discusses the OSI model. Within the model are clauses that describe the basis reference model. Clause 7 provides the description of the specific layers, and Clause 9 specifies compliance and consistency with the OSI reference model.

96
Q

ISO 7498 discusses the OSI model. Within the model are clauses that describe the basis reference model. Clause 7 provides the description of

A

of the specific layers

97
Q

ISO 7498 discusses the OSI model. Within the model are clauses that describe the basis reference model. Clause 9 specifies

A

compliance and consistency with the OSI reference model.

98
Q

ISO 7498 discusses the OSI model. Within the model are clauses that describe the basis reference model. Clause 5 describes

A

the OSI layers and what layering means

99
Q
  1. A privately held toy company processing, storing, or transmitting
    payment card data must be compliant with which of the following?
    A. Gramm-Leach-Bliley Act (GLBA)
    B. Health Insurance Portability and Accountability Act (HIPAA)
    C. Sarbanes-Oxley Act of 2002
    D. PCI-DSS
A

The correct option is D
Options a, b and c do not have anything to do with card payment or credit card data.

100
Q
  1. In which phase of the IATF does formal risk assessment begin?
    A. Assess effectiveness
    B. Design system security architecture
    C. Define system security requirements
    D. Discover information protection needs
A

The correct option is B
Although risk assessment occurs during the assess effectiveness process after each stage, a formal risk assessment is conducted at the end of the Design System Security Architecture phase.