Quiz 7 Information Security Fundamentals

8 September 2022
4.7 (114 reviews)
29 test answers

Unlock all answers in this set

Unlock answers (25)
question
What type of security monitoring tool would be most likely to identify an unauthorized change to a computer system?
answer
System integrity monitoring
question
Christopher is designing a security policy for his organization. He would like to use an approach that allows a reasonable list of activities but does not allow other activities. Which permission level is he planning to use?
answer
Prudent
question
What information should an auditor share with the client during an exit interview?
answer
Details on major issues
question
Gina is preparing to monitor network activity using packet sniffing. Which technology is most likely to interfere with this effort if used on the network?
answer
Secure Sockets Layer (SSL)
question
Regarding log monitoring, false negatives are alerts that seem malicious but are not real security events.
answer
False
question
Which audit data collection method helps ensure that the information-gathering process covers all relevant areas?
answer
Checklist
question
SOC 2 reports are created for internal and other authorized stakeholders and are commonly implemented for service providers, hosted data centers, and managed cloud computing providers.
answer
True
question
Committee of Sponsoring Organizations (COSO) is a set of best practices for IT management.
answer
False
question
During the secure phase of a security review, you review and measure all controls to capture actions and changes on the system.
answer
False
question
Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets in a traffic stream rather than justin individual packets.
answer
True
question
Curtis is conducting an audit of an identity management system. Which question is NOT likely to be in the scope of his audit?
answer
Does the firewall properly block unsolicited network connection attempts?
question
When should an organization's managers have an opportunity to respond to the findings in an audit?
answer
Managers should include their responses to the draft audit report in the final audit report.
question
Which regulatory standard would NOT require audits of companies in the United States?
answer
Personal Information Protection and Electronic Documents Act (PIPEDA)
question
An auditing benchmark is the standard by which a system is compared to determine whether it is securely configured.
answer
True
question
The four main types of logs that you need to keep to support security auditing include event, access, user, and security.
answer
False
question
Data loss prevention (DLP) uses business rules to classify sensitive information to prevent unauthorized end users from sharing it.
answer
True
question
Which intrusion detection system strategy relies upon pattern matching?
answer
Signature detection
question
Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion alert each time that an administrator connects to a server using Secure Shell (SSH). What type of error is occurring?
answer
False positive error
question
A report indicating that a system's disk is 80 percent full is a good indication that something is wrong with that system.
answer
False
question
What is NOT generally a section in an audit report?
answer
System configurations
question
Many jurisdictions require audits by law.
answer
True
question
An SOC 1 report primarily focuses on security.
answer
False
question
Ricky is reviewing security logs to independently assess security controls. Which security review process is Ricky engaging in?
answer
Audit
question
During an audit, an auditor compares the current setting of a computer or device with a benchmark to help identify differences.
answer
True
question
Which activity is an auditor least likely to conduct during the information-gathering phase of an audit?
answer
Report writing
question
Jacob is conducting an audit of the security controls at an organization as an independent reviewer. Which question would NOT be part of his audit?
answer
Is the security control likely to become obsolete in the near future?
question
Isaac is responsible for performing log reviews for his organization in an attempt to identify security issues. He has a massive amount of data to review. What type of tool would best assist him with this work?
answer
Security information and event management (SIEM)
question
In security testing, reconnaissance involves reviewing a system to learn as much as possible about the organization, its systems, and its networks.
answer
True
question
Performing security testing includes vulnerability testing and penetration testing.
answer
True