Chapter 1 Practice Test

8 September 2022
4.7 (114 reviews)
72 test answers

Unlock all answers in this set

Unlock answers (68)
question
Which of the following is NOT a unique function of Information Security Management?
answer
principles
question
The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process?
answer
authentication
question
It is possible to take a very complex operation and diagram it in PERT if you can answer three key questions about each activity. Which of the following is NOT one of them?
answer
What other activities require the same resources as this activity?
question
The first step in solving problems is to gather facts and make assumptions.
answer
F
question
Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program?
answer
people
question
Which of the following is a C.I.A. characteristic that ensures that only those with sufficient privileges and a demonstrated need may access certain information?
answer
Confidentiality
question
Information security project managers often follow methodologies based on what methodology promoted by the Project Management Institute?
answer
Project Management Body of Knowledge (PMBoK)
question
What do audit logs that track user activity on an information system provide?
answer
accountability
question
Which of the following is the first step in the problem-solving process?
answer
Recognize and define the problem
question
Corruption of information can occur only while information is being stored.
answer
False
question
In the WBS approach, the project plan is first broken down into tasks placed on the WBS task list. The minimum attributes that should be identified for each task include all but which of the following?
answer
The number of people and other resources needed for each task
question
Which of the following is the process that develops, creates, and implements strategies for the accomplishment of objectives?
answer
planning
question
Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives?
answer
organization
question
The authorization process takes place before the authentication process.
answer
F
question
Which of the following was originally developed in the late 1950s to meet the need of the rapidly expanding engineering projects associated with government acquisitions such as weapons systems?
answer
PERT
question
What is one of the most frequently cited failures in project management?
answer
Failure to meet project deadlines
question
Communications security involves the protection of which of the following?
answer
media, technology, and content
question
Which of the following is NOT a step in the problem-solving process?
answer
Build support among management for the candidate solution
question
Which of the following is NOT a knowledge area in the Project Management knowledge body?
answer
Technology
question
Using the Program Evaluation and Review Technique, which of the following identifies the sequence of events or activities that requires the longest duration to complete, and that therefore cannot be delayed without delaying the entire project?
answer
critical path
question
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines?
answer
policy
question
The management of human resources must address many complicating factors; which of the following is NOT among them?
answer
All workers operate at approximately the same level of efficiency
question
A project can have more than one critical path.
answer
T
question
Which type of planning is used to organize the ongoing, day-to-day performance of tasks?
answer
Operational
question
The primary goal of external monitoring is to maintain an informed awareness of the state of all of the organization's networks, information systems, and information security defenses
answer
F
question
resources include people, hardware, and the supporting system elements and resources associated with the management of information in all its states
answer
Physical
question
According to the Corporate Governance Task Force (CGTF), which phase in the IDEAL model and framework lays the groundwork for a successful improvement effort?
answer
Initiating
question
The National Association of Corporate Directors (NACD) recommends four essential practices for boards of directors. Which of the following is NOT one of these recommended practices?
answer
Hold regular meetings with the CIO to discuss tactical InfoSect planning
question
In which level of planning are budgeting, resource allocation, and manpower critical components?
answer
tactical
question
Which of the following should be included in an InfoSec governance program?
answer
An InfoSec risk management methodology
question
A top-down approach to information security usually begins with a systems administrator's attempt to improve the security of their systems.
answer
F
question
Which type of attack involves sending a large number of connection or information requests to a target?
answer
denial-of-service (DoS)
question
Penetration testing is often conducted by contractors, who are commonly referred to as black-hats.
answer
F
question
What is the first phase of the SecSDLC?
answer
investigation
question
Because it sets out general business intentions, a mission statement does not need to be concise.
answer
F
question
Which type of planning is the primary tool in determining the long-term direction taken by an organization?
answer
strategic
question
overflow is an application error that occurs when the system can't handle the amount of data that is sent.
answer
buffer
question
Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls?
answer
back door
question
A top-down approach to information security usually begins with a systems administrator's attempt to improve the security of their systems.
answer
F
question
Which of the following set the direction and scope of the security process and provide detailed instruction for its conduct?
answer
managerial controls
question
Which of the following is a key advantage of the bottom-up approach to security implementation?
answer
utilizes the technical expertise of the individual administrators
question
Which of the following explicitly declares the business of the organization and its intended areas of operations?
answer
mission statement
question
phase is the last phase of SecSDLC, but perhaps the most important.
answer
maintenance and change
question
testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt their own systems by exploiting documented vulnerabilities.
answer
penetration testing
question
In which model in the SecSDLC does the work products of each phase fall into the next phase to serve as its starting point?
answer
waterfall
question
Which of the following is true about planning?
answer
Strategic plans are used to create tactical plans
question
Which of the following has the main goal of restoring normal modes of operation with minimal cost and disruption to normal business activities after an event?
answer
contingency planning
question
is a document containing contact information of the individuals to notify in the event of an actual incident.
answer
alert roster
question
plan is a detailed set of processes and procedures that anticipate, detect, and mitigate the effects of an unexpected event that might compromise information resources and assets
answer
incident response
question
When dealing with an incident, the incident response team must conduct a(n) ____________________, which entails a detailed examination of the events that occurred from first detection to final recovery.
answer
after action review
question
When a disaster renders the current business location unusable, which plan is put into action?
answer
business continuity
question
Which contingency plan strategy do individuals work on their own tasks and are responsible for identifying the faults in their own procedures?
answer
simulation
question
The bulk batch-transfer of data to an off-site facility is known as
answer
electronic vaulting
question
testing of contingency plans, the individuals follow each and every procedure, including the interruption of service, restoration of data from backups, and notification of appropriate individuals.
answer
full-interruption
question
In which contingency plan strategy do individuals act as if an actual incident occurred, and begin performing their required tasks and executing the necessary procedures, without interfering with the normal operations of the business?
answer
parallel testing
question
What is the last stage of the business impact analysis?
answer
prioritize resources associated with the business processes
question
In which type of site are no computer hardware or peripherals provided?
answer
cold site
question
In the event of an incident or disaster, which team sets up and starts off-site operations?
answer
business continuity
question
In most organizations, the COO is responsible for creating the IR plan
answer
F
question
Which of the following is a tool that can be useful in resolving the issue of what business function is the most critical?
answer
weighted analysis tool
question
After an incident, but before returning to its normal duties, the CSIRT must do which of the following?
answer
conduct an after-action review
question
Which of the following is a responsibility of the crisis management team?
answer
Activating the alert roster
question
is an agency that provides, in the case of DR/BC planning, physical facilities for a fee.
answer
full-interruption
question
If operations at the primary site cannot be quickly restored, the ____________________ occurs concurrently with the DR plan, enabling the business to continue at an alternate site.
answer
BCP BC plan business continuity plan
question
Which of the following is true about a hot site?
answer
It duplicates computing resources, peripherals, phone systems, applications, and workstations.
question
is an agency that provides, in the case of DR/BC planning, physical facilities for a fee.
answer
service bureau
question
In a warm site, all services and communications links are fully configured and the site can be fully functional within minutes.
answer
F
question
When an incident takes place, the disaster recovery (DR) plan is invoked before the incident response (IR) plan.
answer
F
question
Which of the following is usually conducted via leased lines or secure Internet connections whereby the receiving server archives the data as it is received
answer
Electronic vaulting
question
Which of the following is the process of examining a possible incident and determining whether it constitutes an actual incident
answer
Incident classification
question
is a document containing contact information of the individuals to notify in the event of an actual incident.
answer
alert roster
question
Training should be as specialized as possible; personnel who are responsible for one duty should not be trained on other duties to avoid confusion during a disaster
answer
F