Various 2 Flashcards

1
Q

The time when computer systems are susceptible to compromise while the system is loading and before the security front end becomes active is called? Computer software is also vulnerable to configuration changes at this time.

A

Initial program load (IPL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An internationally recognized, government-mandated standard for crisis command during disaster recovery and business continuity events

A

Incident Command System (ICS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A short sequence of six to eight characters used in type 1 (weak) authentication

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Creates reports that may be used only for internal purposes. These reports contain a known bias, which reduces their corresponding representations to a low or moderate value.

A

Internal audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A malicious hacker program designed to unsuspectingly install a backdoor without the consent of the system user. This will subvert the operating system kernel security and operate in stealth to hide its existence.

A

Root kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A check file of a fixed length created by a source file of any length. The purpose is to indicate whether the source file may have been changed.

A

Message hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Having no significant bearing on the final outcome, also known as trivial information

A

Irrelevant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the names of the keys used for PKI?

A

The public key and the private (secret) key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Criteria based on impact, anticipated duration of outage, or immediate lack of sufficient information to calculate the actual impact. It’s always better to overreact when compared to the consequences of delay.

A

Activation criteria for business continuity and disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The most common method of providing secure access to the network for a remote user that uses encryption

A

IPsec virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To grant a right to perform some type of action

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The progressive development of software through a succession of multiple versions

A

Iterative development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An organization that is responsible for issuing and maintaining certificates

A

Certificate authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The persons and organization being audited

A

Auditee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The lowest level of control, usually governing system use or internal program controls. These types of controls are easily subverted if higher-level controls governing the operating environment are missing or ineffective.

A

Application controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The term used when an auditor has no reservations with their findings, and there are no special restrictions on the use of the audit report.

A

Unqualified opinion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The process of streamlining existing operations in an effort to improve efficiency and reduce cost. Benefits may be derived by eliminating unnecessary steps as the organization has progressed through the learning curve, or by expanding capability for more work.

A

Business process reengineering (BPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A less formal process used to determine value or relevance to the intended use. The results will be of low to moderate value. These results are used for internal purposes only.

A

Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Multiple communication channels that are multiplexed over a single cable

A

Broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A historical score of business process performance. Unfortunately, the score may indicate that a failure has occurred before corrective action can be taken.

A

Key performance indicator (KPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When two or more obligators (persons or organizations) bind themselves without actual partnership or corporate designation in a specific venture with the risk, liability, and potential profits shared between the parties. All parties share a communal liability for the failure of the other party.

A

Joint venture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An engineering technique used to steal the secrets of your competitor for the purpose of developing your own product. Usually a violation of the software user license agreement.

A

Reverse engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Changing the normal function of keys to execute different commands

A

Keyboard remapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the name of the protection method used when encryption keys are re-encrypted with a different algorithm using a different key to obscure the original key?

A

Key wrapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Electronic access to a system without being physically present

A

Logical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A best practice for recording the analysis of problems and improvements that worked

A

Lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A biometrics technique that maps the unique pattern of veins in the back of the human eyeball

A

Retinal scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the purpose of a certification practice statement (CPS)?

A

The CPS is a formal document outlining the issuer’s certificate policy and enforcement policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The process of copying the current data files for records retention but ignoring deleted files and temporary system data in swap space

A

Logical backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the most important actions to be taken when someone is terminated or laid off?

A

Disable user accounts, physically remove access to desktops, and collect any company property remaining in their possession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Early hierarchical design created by IBM for connecting different computers

A

Systems Network Architecture (SNA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A method of transmitting data through a variety of different paths en route to its destination. The user is billed by the data packets sent and not by the route or distance traveled.

A

Packet-switched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Connection of redundant network links

A

Meshed network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A potential danger that, if realized, will have a negative effect on assets

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A computer system or network device to be evaluated under the Common Criteria standard (ISO 15408)

A

Target of evaluation (TOE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A term for utility software that operates on the program interfaces and is invisible to both the user and the database server. Performs an intermediary service between two programs.

A

Middleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Lower-level controls placed on specific procedures

A

Detailed controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The ability for hardware and software systems from different manufacturers to communicate with each other

A

Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

To conserve processing, space occupied by these files is simply marked as eligible for overwriting. The contents remain on the disk.

A

Deleted files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A programmed procedure inside a computer software application designed to cause damage on the occurrence of a particular event, date, or time. Extremely difficult to locate.

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A secret point of entry into a system. Usually a hidden access technique left in the software by the developer for future use by their technical support staff.

A

Trapdoor

42
Q

A technical system designed to alert personnel to activity that may indicate the presence of a hacker. Provides a type of network hacker alarm.

A

Intrusion detection and prevention system (IDPS)

43
Q

A unique process, tool, formula, pattern, or knowledge possessed by its creator and hidden from everyone else for the purpose of obtaining an advantage in the market

A

Trade secret

44
Q

A standardized reference listing of all the programmer’s data descriptions and files used in a computer program

A

Data dictionary

45
Q

The probability of error. A rating of 95 percent is considered a ________ in IS auditing.

A

Confidence coefficient

46
Q

Which method will provide faster restoration of data files: an incremental backup or a differential backup?

A

A differential backup

47
Q

Evaluates the management of a system, including its configuration. The purpose is to determine how well the system is managed by collecting evidence indicating the computer’s specific configuration settings.

A

System audit

48
Q

A program applet designed by Microsoft with access throughout the entire system. More dangerous than Java applets because it can circumvent or defeat the security of Microsoft Windows.

A

ActiveX

49
Q

The risk that errors may be introduced or may not be identified and corrected in a timely manner

A

Control risk

50
Q

A program designed to send system event logs to a remote system. Log files are protected from the attacker, and the extra copy of log files will enforce separation of duties.

A

Syslog

51
Q

A special area on the hard disk designated as a temporary location for data to be offloaded from RAM. This improves system performance by moving selected tasks out of the way while other data is processed.

A

Swap space

52
Q

What type of internal control protects your assets and information from physical access by unauthorized personnel?

A

Preventive control implemented by using physical methods

53
Q

A small group of computers and devices sharing the same broadcast domain

A

A subnet, also known as a subnetwork

54
Q

A systematic process of collecting evidence to test or confirm a statement or to confirm a record of transaction

A

Audit

55
Q

To sharpen the details of an average population by using a stratified mean (such as demographics) to further define the data into small units

A

Defuzzification

56
Q

What are the advantages of using fiber optics instead of unshielded twisted-pair cabling (UTP)?

A

Fiber optics are immune to interference and difficult to tap, and can be used on longer runs.

57
Q

The address of a router used to communicate with systems located on a different subnet or a different network

A

Default gateway

58
Q

Refers to evidence that specifically proves or disproves a particular point

A

Best evidence

59
Q

What is the principal difference between the DoS and DDoS attacks?

A

The distributed DoS (DDoS) attack uses multiple computers focused on attacking one target.

60
Q

A set of related data files

A

Data set

61
Q

The implementation of a computer program using a cryptographic algorithm and keys to encrypt and decrypt messages

A

Cryptographic system

62
Q

Another name for records management

A

Data retention

63
Q

The system sensor that acquires a biometric image and converts it into biometric minutiae for digital storage or comparison

A

Biometric template generator

64
Q

Used in disaster recovery testing to simulate the basic recovery process in order to clean any errors from the procedure

A

Functional testing

65
Q

What is the purpose of a mantrap?

A

Mantraps are designed to prevent an unauthorized person from gaining access by piggybacking behind an authorized user.

66
Q

A special bit-by-bit backup of physical media that records all the contents, including deleted files and current contents of swap space or slack space

A

Bitstream imaging

67
Q

A collection of persistence data items that are maintained in a grouping

A

Database

68
Q

Name of the procedure and formula used to direct communications across the available path

A

Routing protocol

69
Q

An access control system based on rules that require the user to have an explicit level of access that matches the appropriate security label. The only way to increase access is by a formal promotion of the user ID to the next security level.

A

Mandatory access control (MAC)

70
Q

Compares a biometric image template just acquired by the sensor to the biometric minutiae already stored inside the biometrics database

A

Biometric template matcher

71
Q

A committee or reporting hierarchy to convey questionable situations involving management to the highest level of authority, often the board of directors

A

Management oversight

72
Q

A networking topology that creates two paths between the senders and receivers. The most common implementation is IBM for a local area network. The public telephone company uses a similar topology for redundant connections between central offices.

A

Ring topology

73
Q

A formal policy concerning the intended use of biometric data, including a supporting operating standard of how the data is collected, stored, protected, transmitted, used, and disposed of

A

Biometric management

74
Q

What is S/MIME used to encrypt?

A

Secure/Multipurpose Internet Mail Extensions (S/MIME) is used to encrypt email. S/MIME is the replacement for the older Privacy Enhanced Mail (PEM).

75
Q

Formal approval by management to accept all the responsibilities and consequences for a system to be used in production for a period of 90 days, 180 days, or 365 days (annual)

A

Accreditation

76
Q

What is a table of user login IDs specifying their individual level of access to computer resources?

A

Access control list (ACL)

77
Q

Changes to data in the database are held in a temporary file. This transaction can be reversed (discarded) until the program writes the change into the master file. What is this temporary log file called?

A

After-image

78
Q

A type of exercise used in planning to uncover previous assumptions and interesting quirks used in the decision process. Assumptions may no longer be valid. You may discover additional defects in the decision criteria.

A

Scenario approach

79
Q

The process of verifying a user’s identity. The user’s claim will be tested against a known reference. If a match occurs, the user claim is verified as true and allowed to proceed. A mismatch will deny the request.

A

Authentication

80
Q

A temporary record of work in progress. This database journal file contains the original data before a new transaction is written.

A

Before-image

81
Q

Intentionally hiding malicious software inside a normal program

A

Trojan horse

82
Q

The principle that says if the database transaction fails, the change is discarded and the original data is kept.

A

ACID principle. A = atomicity (all or nothing), C = consistency, I = isolation, D = durability (data written to disk).

83
Q

Terminology referring to the agreed-upon reference point

A

Baseline

84
Q

The lowest layer of the OSI model that deals with cabling and electrical signals

A

Physical layer

85
Q

Microsoft’s technique for software developers to digitally sign downloadable ActiveX applets. It does not protect the user from malicious software or poorly written programs.

A

Authenticode

86
Q

A formal process of verifying that the system meets the user’s requirements during the SDLC Implementation phase

A

User acceptance testing

87
Q

A formal statement of policy signed by management and acknowledged by the user with their signature. Normally this policy is enforced by the HR department. This policy should state that computer use is for company business only and that noncompany activities, including those related to religion or topics of questionable use, are prohibited.

A

Acceptable use policy (AUP)

88
Q

The process of reviewing risks, threats, and vulnerabilities to determine appropriate controls

A

Risk assessment

89
Q

A type of test designed to gauge possible penetration through the system security mechanisms by exploiting a known weakness or security flaw

A

Penetration testing

90
Q

A micromanagement methodology to force development within a series of short time boxes. Primarily used for the development of prototypes.

A

Agile development

91
Q

The possibility that material errors may exist that the auditor is unable to detect

A

Audit risk

92
Q

The family of automated test software using a computerized audit procedure with specialized utilities

A

Computer-assisted audit tools (CAAT)

93
Q

A temporary memory location used to stage data before or after processing

A

Buffer

94
Q

Group of additional internal controls that reduce the potential for loss by error or omission. Used when the primary control choice is not possible.

A

Compensating control

95
Q

A nickname for individuals who execute scripted programs or utilities without comprehensive knowledge of the internal mechanisms being executed

A

Script kiddies

96
Q

A physical location that may be used for disaster recovery of noncritical processes. The entire computing environment must be shipped in and then assembled.

A

Cold site

97
Q

Name of the chosen acceptable performance objective in the Common Criteria standard for systems under evaluation. Failing this target would result in a lower assurance rating.

A

Security target (ST)

98
Q

An encrypted message displayed in unreadable text that appears as gibberish

A

Ciphertext

99
Q

Which communications method charges for transmissions based on distance?

A

Circuit-switched, also known as leased line

100
Q

Name of the web-based program that runs on the server, also known as server-side includes

A

Servlet