Information Systems Security Test 1 (Ch1 – ch6)

13 April 2024
5 (166 reviews)
68 test answers

Unlock all answers in this set

Unlock answers (64)
question
Which term describes any action that could damage an asset?
answer
Threat
question
Bob recently accepted a position as the information security and compliance manager for a medical practice. Which regulation is likely to most directly apply to Bob's employer?
answer
Health Insurance Portability and Accountability Act (HIPAA)
question
Rachel is investigating an information security incident that took place at the high school where she works. She suspects that students may have broken into the student records system and altered their grades. If correct, which one of the tenets of information security did this attack violate?
answer
Integrity
question
Which mitigation plan is most appropriate to limit the risk of unauthorized access to workstations?
answer
Password protection
question
Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would jeopardize confidentiality?
answer
Applying strong encryption
question
Which risk is most effectively mitigated by an upstream Internet service provider (ISP)?
answer
Distributed denial of service (DDoS)
question
Which one of the following is typically used during the identification phase of a remote access connection?
answer
Username
question
Which element of the security policy framework requires approval from upper management and applies to the entire organization?
answer
Policy
question
Which element of the security policy framework offers suggestions rather than mandatory actions?
answer
Guideline
question
Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is mandatory. Which type of document is Chris writing?
answer
Procedure
question
Which element of the IT security policy framework provides detailed written definitions for hardware and software and how they are to be used?
answer
Standard
question
Which classification level is the highest level used by the U.S. federal government?
answer
Top Secret
question
Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to communicate in a standard fashion?
answer
Interoperability
question
Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a web browser. Which service delivery model is Kaira's company using?
answer
Software a a Service (SaaS)
question
Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity and includes provisions that gwen should implement before accepting credit card transactions?
answer
Payment Card Industry Data Standard (PCI DSS)
question
Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?
answer
Applying security updates promptly
question
From a security perspective, which should organizations expect will occur as they become more dependent upon the internet of Things (IoT)?
answer
Security risks will increase
question
Which organization pursues standards for Internet of Things (IoT) devices and is widely recognized as the authority for creating standards on the Internet?
answer
Internet Engineering Task Force
question
Which compliance obligation includes security requirements that apply specifically to federal government agencies in the United States?
answer
Federal Information Security Management Act (FISMA)
question
With the use of Mobile IP, which device is response for keeping track of mobile nodes (MNs) and forwarding packets to the MN's current network?
answer
Home agent (HA)
question
Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data in aggregate?
answer
Deidentification
question
Which one of the following governs the use of Internet of Things (IoT) by healthcare providers, such as physicians and hospitals?
answer
Health Insurance Portability and Accountability Act (HIPAA)
question
Which one of the following is an advantage that the Internet of Things (IoT) brings to economic development for counties?
answer
Technical and Industry development
question
In Mobile IP, what term describes a device that would like to communicate with a mobile node (MN)?
answer
Correspondent node (CN)
question
Maria's company recently experienced a major system outage due to the failure of a critical component. During that time period, the company did not register any sales through its online site. Which type of loss did the company experience as a result of lost sales?
answer
Opportunity cost
question
Which tool can capture the packets transmitted between systems over a network
answer
Protocol analyzer
question
Bob is using a port scanner to identify open ports on a server in his environment. He is scanning a web server that uses Hypertext Transfer Protocol (HTTP). Which port should Bob expect to be open to support this service?
answer
80
question
Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
answer
Logic attack
question
Which term describes that can damage or compromise an asset?
answer
Threat
question
Which one of the following is an example of a disclosure threat?
answer
Espionage
question
Which type of attack involves the creation of some deception in order to trick unsuspecting users?
answer
Fabrication
question
In which type of attack does the attacker attempt to take over an existing connection between two systems?
answer
Session hijacking
question
Which group is the most likely targeted of a social engineering attack?
answer
Receptionists and administrative assistants
question
What type of malicious software masquerades as legitimate software to entice the user to ruin it?
answer
Trojan horse
question
Which type of attack against a web application uses a newly discovered vulnerability that is not patchable?
answer
Zero-day attack
question
Florian recently purchased a set of domain names that are similar to those of legitimate websites and used the newly purchased sites to host malware. Which type of attack is Florian using?
answer
Typosquatting
question
Which formula is typically used to describe the components of information security risks?
answer
Risk = Threat X Vulnerability
question
Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum allowable time to recover a particular function. What value is Alan determining?
answer
Recovery time objective (RTO)
question
Which one of the following is an example of a direct cost that might result from a business disruption?
answer
Facility repair
question
Tom is the IT manager for an organization that experienced a server failure that affected a single business function. What type of plan should guide the organization's recovery effort?
answer
Business continuity plan (BCP)
question
Dawn is selecting an alternative processing facility for her organization's primary data center. She would like to have a facility that balances cost and switchover time. What would be the best option in this situation?
answer
Warm site
question
As a follow-up to her annual testing, Holly would like to conduct quarterly disaster recovery tests that introduce as much realism as possible but do not require the use of technology resources. What type of test should Holly conduct?
answer
Simulation test
question
Betsy recently assumed an information security role for a hospital located in the United States. What compliance regulation applies specifically to healthcare providers?
answer
HIPAA
question
A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals?
answer
Payment Card Industry Data Security Standard (PCI DSS)
question
Which item in a Bring Your Own Device (BYOD) policy helps resolve intellectual property issues that may arise as the result of business use of personal devices?
answer
Data ownership
question
What is NOT one of the three tenets of information security?
answer
Safety
question
What compliance regulation applies specifically to the educational records maintained by schools about students?
answer
Family Education Rights and Privacy Act (FERPA)
question
What level of technology infrastructure should you expect to find in a cold site alternative data center facility?
answer
No technology infrastructure
question
Which one of the following is an example of a logical access control?
answer
Password
question
During which phase of the access control process does the system answer the question,"What can the requestor access?"
answer
Authorization
question
Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of access control is Ed concerned about?
answer
Accountability
question
The ___________ is the central part of a computing environment's hardware, software, and firmware that enforces access control.
answer
security kernel
question
Which type of password attack attempts all possible combinations of a password in an attempt to guess the correct value?
answer
Brute-force attack
question
Gary would like to choose an access control model in which the owner of a resource decides who may modify permissions on that resource. Which model fits that scenario?
answer
Discretionary access control (DAC)
question
Alan is evaluating different biometric systems and is concerned that users might not want to subject themselves to retinal scans due to privacy concerns. Which characteristic of a biometric system is he considering?
answer
Acceptability
question
What is a single sign-on (SSO) approach that relies upon the use of key distribution centers (KDCs) and ticket-granting servers (TGSs)?
answer
Kerberos
question
Which of the following is an example of a hardware security control?
answer
MAC filtering
question
Which security model does NOT protect the integrity of information?
answer
Bell-LaPadula
question
Janet is identifying the set of privileges that should be assigned to a new employee in her organization. Which phase of the access control process is she performing?
answer
Authorization
question
Mark is considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?
answer
Access to a high level of expertise
question
Biyu is making arrangements to use a third-party service provider for security services. She wants to document a requirement for timely notification of security breaches. What type of agreement is most likely to contain formal requirements of this type?
answer
Service level agreement (SLA)
question
Which agreement type is typically less formal than other agreements and expresses areas of common interest?
answer
Memorandum of understanding (MOU)
question
Karen is designing a process for issuing checks and decides that one group of users will have the authority to create new payees in the system while a separate group of users will have the authority to issue checks to those payees. The intent of this control is to prevent fraud. Which principle is Karen enforcing?
answer
Separation of duties
question
What is NOT a goal of information security awareness programs?
answer
Punish users who violate policy
question
Ann is creating a template for the configuration of Windows servers in her organization. It includes the basic security settings that should apply to all systems. What type of document should she create?
answer
Baseline
question
Which activity manages the baseline settings for a system or device?
answer
Configuration control
question
What is the correct order of steps in the change control process?
answer
Request, impact assessment, approval, build/test, implement, monitor
question
Marguerite is creating a budget for a software development project. What phase of the system lifecycle is she undertaking?
answer
Project initiation and planning