Security Event Management 1.0 Flashcards

1
Q

What is the main reason a certification and accreditation process is performed on critical systems

A

To ensure that security compliance has been technically evaluated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What risk is likely increased with the use of URL shortening services?

A

Phishing

URL shortening services have been adopted by hackers to fool users and spread malware (i.e., phishing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False

Spoofing applies to destination addressing.

A

FALSE.

Spoofing applies to source addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the “First” step in a successful system attack?

A

Gathering information

i.e. Successful attacks start by gathering information about the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is “Parameter Tampering”?

A

The use of hidden fields to save information about a client session or to submit hidden parameters, such as the language of the end user.

E.g. Saving the contents of a customer’s shopping cart on a retail web site application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of plan would an organization use that specifically addresses how to detect cyberattacks against it’s IT systems and how to recover from an attack?

A

An incident response plan

This determines the information security responses to incidents such as cyberattacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a cyclic redundancy check (commonly) used for?

A

To determine the validity of data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What measure would most likely prevent a web site from compromise and a rootkit from being installed on a company’s server hosting the application?

A

A host-based intrusion prevention system

i.e. This prevents unauthorized changes to the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What control would most effectively reduce the risk of loss due to fraudulent online payment requests?

A

Transaction monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What consideration is most important when reviewing security incident management procedures for a company?

A

Chain of custody of electronic evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an effective control to mitigate the risk of pharming attacks to an Internet banking application?

A

Domain name system server security hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly