Security Event Management 1.0 Flashcards
What is the main reason a certification and accreditation process is performed on critical systems
To ensure that security compliance has been technically evaluated
What risk is likely increased with the use of URL shortening services?
Phishing
URL shortening services have been adopted by hackers to fool users and spread malware (i.e., phishing).
True or False
Spoofing applies to destination addressing.
FALSE.
Spoofing applies to source addressing.
What is the “First” step in a successful system attack?
Gathering information
i.e. Successful attacks start by gathering information about the target system
What is “Parameter Tampering”?
The use of hidden fields to save information about a client session or to submit hidden parameters, such as the language of the end user.
E.g. Saving the contents of a customer’s shopping cart on a retail web site application
What type of plan would an organization use that specifically addresses how to detect cyberattacks against it’s IT systems and how to recover from an attack?
An incident response plan
This determines the information security responses to incidents such as cyberattacks
What is a cyclic redundancy check (commonly) used for?
To determine the validity of data transfer
What measure would most likely prevent a web site from compromise and a rootkit from being installed on a company’s server hosting the application?
A host-based intrusion prevention system
i.e. This prevents unauthorized changes to the host
What control would most effectively reduce the risk of loss due to fraudulent online payment requests?
Transaction monitoring
What consideration is most important when reviewing security incident management procedures for a company?
Chain of custody of electronic evidence
What is an effective control to mitigate the risk of pharming attacks to an Internet banking application?
Domain name system server security hardening