Deck 8: Controls for Information Security

ملء الشاشة (f)
exit full mode
سؤال
Kuzman Jovan called a meeting of the top management at Jovan Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."What do you intend to do?" Which of the following is the best answer?

A)Evaluate and modify the system using COBOL.
B)Evaluate and modify the system using the CTC checklist.
C)Evaluate and modify the system using the Trust Services framework
D)Evaluate and modify the system using the COSO Internal Control Framework.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
According to the Trust Services Framework,the reliability principle of integrity is achieved when the system produces data that

A)is available for operation and use at times set forth by agreement.
B)is protected against unauthorized physical and logical access.
C)can be maintained as required without affecting system availability, security, and integrity.
D)is complete, accurate, and valid.
سؤال
The Trust Services Framework reliability principle that states access to the system and its data should be accessible to meet operational and contractual obligations to legitimate users is known as

A)availability.
B)security.
C)privacy.
D)integrity.
سؤال
There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?

A)P < 6
B)D = 6
C)P = 6
D)P > 6
سؤال
Identify a party below who was involved with developing the Trust Services Framework.

A)FASB
B)COSO
C)AICPA
D)PCAOB
سؤال
In the time-based model of information security,P represents

A)the time it takes to respond to and stop the attack.
B)the time it takes for the organization to detect that an attack is in progress.
C)the time it takes an attacker to break through the various controls that protect the organization's information assets.
D)the time it takes to assess threats and select risk response.
سؤال
The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as

A)availability.
B)security.
C)privacy.
D)integrity.
سؤال
It was 8:03 A.M.when Jiao Jan,the Network Administrator for South Asian Technologies,was informed that the intrusion detection system had identified an ongoing attempt to breach network security.By the time that Jiao had identified and blocked the attack,the hacker had accessed and downloaded several files from the company's server.Using the notation for the time-based model of security,in this case

A)D > P
B)P > D
C)P > C
D)C > P
سؤال
Which of the following is not one of the essential criteria for successfully implementing each of the principles that contribute to systems reliability,as discussed in the Trust Services Framework?

A)Developing and documenting policies.
B)Effectively communicating policies to all outsiders.
C)Designing and employing appropriate control procedures to implement policies.
D)Monitoring the system and taking corrective action to maintain compliance with policies.
سؤال
Information security procedures protect information integrity by

A)preventing fictitious transactions.
B)reducing the system cost.
C)making the system more efficient.
D)making it impossible for unauthorized users to access the system.
سؤال
Security is a technology issue and not just a management issue.
سؤال
According to the Trust Services Framework,the reliability principle of availability is achieved when the system produces data that

A)is available for operation and use at times set forth by agreement.
B)is protected against unauthorized physical and logical access.
C)can be maintained as required without affecting system availability, security, and integrity.
D)is complete, accurate, and valid.
سؤال
The Trust Services Framework reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as

A)availability.
B)security.
C)maintainability.
D)integrity.
سؤال
Describe the five principles of the Trust Services Framework.Select one of the principles and discuss the why it is important to an organization.
سؤال
The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as

A)availability.
B)security.
C)confidentiality.
D)integrity.
سؤال
Which of the following is not one of the three fundamental information security concepts?

A)Information security is a technology issue based on prevention.
B)Security is a management issue, not a technology issue.
C)The idea of defense-in-depth employs multiple layers of controls.
D)The time-based model of security focuses on the relationship between preventive, detective and corrective controls.
سؤال
If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack,then security is

A)effective.
B)ineffective.
C)overdone.
D)undermanaged.
سؤال
According to the Trust Services Framework,the confidentiality principle of integrity is achieved when the system produces data that

A)is available for operation and use at times set forth by agreement.
B)is protected against unauthorized physical and logical access.
C)can be maintained as required without affecting system availability, security, and integrity.
D)is complete, accurate, and valid.
سؤال
The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as

A)availability.
B)security.
C)privacy.
D)integrity.
سؤال
In the time-based model of information security,D represents

A)the time it takes to respond to and stop the attack.
B)the time it takes for the organization to detect that an attack is in progress.
C)the time it takes an attacker to break through the various controls that protect the organization's information assets.
D)the time it takes to assess threats and select risk response.
سؤال
The steps that criminals take to trick an unsuspecting employee into granting them access is called

A)scanning and mapping the target.
B)social engineering.
C)research.
D)reconnaissance.
سؤال
Describe the basic steps criminal use to attack an organization's information system.Select one of the steps and find a news story that relates to the step that you have chosen.
سؤال
The steps that criminals take to find known vulnerabilities and learn how to take advantage of those vulnerabilities is called

A)scanning and mapping the target.
B)social engineering.
C)research.
D)reconnaissance.
سؤال
________ is/are an example of a preventive control.

A)Emergency response teams
B)Encryption
C)Log analysis
D)Intrusion detection
سؤال
________ is/are an example of a detective control.

A)Physical access controls
B)Encryption
C)Emergency response teams
D)Log analysis
سؤال
________ is/are an example of a preventive control.

A)Continuous monitoring
B)Encryption
C)Emergency response teams
D)Log analysis
سؤال
Verifying the identity of the person or device attempting to access the system is an example of

A)authentication.
B)authorization.
C)identification.
D)threat monitoring.
سؤال
Which of the following is an example of a corrective control?

A)Physical access controls.
B)Encryption.
C)Intrusion detection.
D)Incident response teams.
سؤال
Social engineering attacks often take place over the Internet.
سؤال
Describe the steps in the security life cycle.
سؤال
Which of the following is an example of a detective control?

A)Physical access controls.
B)Encryption.
C)Continuous monitoring.
D)Incident response teams.
سؤال
In the time-based model of information security,R represents

A)the time it takes to respond to and stop the attack.
B)the time it takes for the organization to detect that an attack is in progress.
C)the time it takes an attacker to break through the various controls that protect the organization's information assets.
D)the time it takes to assess threats and select risk response.
سؤال
Which of the following is not a requirement of effective passwords?

A)Passwords should be changed at regular intervals.
B)Passwords should be no more than 8 characters in length.
C)Passwords should contain a mixture of upper and lowercase letters, numbers and characters.
D)Passwords should not be words found in dictionaries.
سؤال
The steps that criminals take to identify potential points of remote entry is called

A)scanning and mapping the target.
B)social engineering.
C)research.
D)reconnaissance.
سؤال
Organizations are infrequently the target of deliberate attacks.
سؤال
The steps that criminals take to study their target's physical layout to learn about the controls it has in place is called

A)scanning and mapping the target.
B)social engineering.
C)research.
D)reconnaissance.
سؤال
Multi-factor authentication

A)involves the use of two or more basic authentication methods.
B)is a table specifying which portions of the systems users are permitted to access.
C)provides weaker authentication than the use of effective passwords.
D)requires the use of more than one effective password.
سؤال
Restricting access of users to specific portions of the system as well as specific tasks,is an example of

A)authentication.
B)authorization.
C)identification.
D)threat monitoring.
سؤال
Identify the statement below which is not a useful control procedure regarding access to system outputs.

A)Restricting access to rooms with printers.
B)Coding reports to reflect their importance.
C)Allowing visitors to move through the building without supervision.
D)Requiring employees to log out of applications when leaving their desk.
سؤال
Which of the following is an example of a preventive control?

A)The creation of a "security-aware" culture.
B)The creation of a "Log user friendly" culture.
C)The creation of a "continuous monitoring" culture.
D)The creation of a chief information security officer position.
سؤال
This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.

A)access control list
B)Internet protocol
C)packet switching protocol
D)transmission control protocol
سؤال
A well-known hacker started her own computer security consulting business.Many companies pay her to attempt to gain unauthorized access to their network.If she is successful,she offers advice as to how to design and implement better controls.What is the name of the testing for which the hacker is being paid?

A)Penetration test.
B)Vulnerability scan.
C)Deep packet inspection
D)Buffer overflow test.
سؤال
A special purpose hardware device or software running on a general purpose computer,which filters information that is allowed to enter and leave the organization's information system,is known as a(n)

A)demilitarized zone.
B)intrusion detection system.
C)intrusion prevention system.
D)firewall.
سؤال
This network access control determines which IP packets are allowed entry to a network and which are dropped.

A)access control list
B)deep packet inspection
C)stateful packet filtering
D)static packet filtering
سؤال
The process of maintaining a table listing all established connections between the organization's computers and the internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as

A)packet filtering.
B)deep packet inspection.
C)access control list.
D)access control matrix
سؤال
________ is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system.

A)Log analysis test
B)Intrusion test
C)Penetration test
D)Vulnerability test
سؤال
Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?

A)Training.
B)Controlling physical access.
C)Controlling remote access.
D)Host and application hardening.
سؤال
Which of the following preventive controls are necessary to provide adequate security for social engineering threats?

A)Controlling physical access.
B)Encryption.
C)Profiling.
D)Awareness training.
سؤال
The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as

A)an intrusion prevention system.
B)stateful packet filtering.
C)static packet filtering.
D)deep packet inspection.
سؤال
The most common input-related vulnerability is called the

A)softening attack.
B)hardening attack.
C)cross-site scripting attack.
D)buffering attack.
سؤال
The process that allows a firewall to be more effective by examining the data in the body of an IP packet,instead of just the header,is known as

A)deep packet inspection.
B)stateful packet filtering.
C)static packet filtering.
D)an intrusion prevention system.
سؤال
The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as

A)access control list.
B)deep packet inspection.
C)intrusion filtering.
D)packet filtering.
سؤال
The process that uses automated tools to identify whether a system possesses any well-known security problems is known as a(n)

A)intrusion detection system.
B)log analysis.
C)penetration test.
D)vulnerability scan.
سؤال
An access control matrix

A)is the process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform.
B)is used to implement authentication controls.
C)matches the user's authentication credentials to his authorization.
D)is a table specifying which portions of the system users are permitted to access.
سؤال
A separate network located outside the organization's internal information system that permits controlled access from the Internet to selected resources is known as a(n)

A)demilitarized zone.
B)intrusion detection system.
C)intrusion prevention system.
D)firewall.
سؤال
This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination.

A)access control list
B)Internet protocol
C)packet switching protocol
D)transmission control protocol
سؤال
Which of the below keeps a record of the network traffic permitted to pass through a firewall?

A)Intrusion detection system.
B)Vulnerability scan.
C)Log analysis.
D)Penetration test.
سؤال
Tools called ________ can be used to identify unused and,therefore,unnecessary programs that represent potential security threats.

A)router scanners
B)vulnerabilities scanners
C)deep inspection scanners
D)TCP scanners
سؤال
The process of turning off unnecessary features in the system is known as

A)deep packet inspection.
B)hardening.
C)intrusion detection.
D)modaling.
سؤال
Compatibility tests utilize a(n)________,which is a list of authorized users,programs,and data files the users are authorized to access or manipulate.

A)validity test
B)biometric matrix
C)logical control matrix
D)access control matrix
سؤال
New employees of Baker Technologies are assigned user names and appropriate permissions.Their credentials are then entered into the company's information system's access control matrix.This is an example of a(n)

A)authentication control.
B)biometric device.
C)remote access control.
D)authorization control.
سؤال
A major financial institution hired a renowned security firm to attempt to compromise its computer network.A few days later,the security firm reported that it had successfully entered the financial institution's computer system without being detected.The security firm presented an analysis of the vulnerabilities that had been found to the financial institution.This is an example of a

A)preventive control.
B)detective control.
C)corrective control.
D)security control.
سؤال
Describe four requirements of effective passwords .
سؤال
A border router

A)routes electronic communications within an organization.
B)connects an organization's information system to the Internet.
C)permits controlled access from the Internet to selected resources.
D)serves as the main firewall.
سؤال
Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as

A)change management.
B)cloud computing.
C)patch management.
D)user account management.
سؤال
Identify six physical access controls.
سؤال
Explain social engineering.
سؤال
The most effective method for protecting an organization from social engineering attacks is providing

A)a firewall.
B)stateful packet filtering.
C)a demilitarized zone.
D)employee awareness training.
سؤال
ShareIt is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits.As a consequence,the size of the information technology department has been growing very rapidly,with many new hires.Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility.This is an example of a(n)

A)authentication control.
B)biometric device.
C)remote access control.
D)authorization control.
سؤال
A demilitarized zone

A)routes electronic communications within an organization.
B)connects an organization's information system to the Internet.
C)permits controlled access from the Internet to selected resources.
D)serves as the main firewall.
سؤال
Which of the following is commonly true of the default settings for most commercially available wireless access points?

A)The security level is set at the factory and cannot be changed.
B)Security is set to an adjustable level that changes depending on the wireless network the device is connected.
C)Security is set to the lowest level that the device is capable of handling.
D)Security is set to the highest level that the device is capable of handling.
سؤال
Residents in Berryhill received an e-mail stating that there is an armed robber on the loose.The e-mail claimed to be from the Berryhill police department,but it wasn't.Computer forensic experts later determined that the e-mail was sent from a computer lab in the Berryhill's public library.The police were then able to uniquely identify the computer that was used by means of its network interface card's ________ address.Security cameras later help the police to reveal the identity of the individual responsible for the hoax.

A)IDS
B)TCP/IP
C)MAC
D)DMZ
سؤال
Describe what information security process the term hardening refers to.
سؤال
Identify three ways users can be authenticated and give an example of each.
سؤال
All employees of E.C.Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted.Entry to secure areas,such as the Information Technology Department offices,requires further procedures.This is an example of a(n)

A)authentication control.
B)authorization control.
C)physical access control.
D)hardening procedure.
سؤال
Explain the value of penetration testing.
سؤال
The most effective way to protect network resources that are exposed to the internet,yet reside outside of a network is

A)a firewall.
B)employee training.
C)a demilitarized zone.
D)stateful packet filtering.
سؤال
New employees of Baker Technologies are assigned user names and appropriate permissions.Each of them were given a company's issued laptop that have an integrated fingerprint reader.In order to log in,the user's fingerprint must be recognized by the reader.This is an example of a(n)

A)authorization control.
B)biometric device.
C)remote access control.
D)defense in depth.
سؤال
In recent years,many of the attacks carried out by hackers have relied on this type of vulnerability in computer software.

A)Code mastication.
B)Boot sector corruption.
C)URL injection.
D)Buffer overflow.
سؤال
The ________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.

A)chief information officer
B)chief operations officer
C)chief security officer
D)computer emergency response team
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Controls for Information Security
1
Kuzman Jovan called a meeting of the top management at Jovan Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."What do you intend to do?" Which of the following is the best answer?

A)Evaluate and modify the system using COBOL.
B)Evaluate and modify the system using the CTC checklist.
C)Evaluate and modify the system using the Trust Services framework
D)Evaluate and modify the system using the COSO Internal Control Framework.
C
2
According to the Trust Services Framework,the reliability principle of integrity is achieved when the system produces data that

A)is available for operation and use at times set forth by agreement.
B)is protected against unauthorized physical and logical access.
C)can be maintained as required without affecting system availability, security, and integrity.
D)is complete, accurate, and valid.
D
3
The Trust Services Framework reliability principle that states access to the system and its data should be accessible to meet operational and contractual obligations to legitimate users is known as

A)availability.
B)security.
C)privacy.
D)integrity.
A
4
There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?

A)P < 6
B)D = 6
C)P = 6
D)P > 6
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
5
Identify a party below who was involved with developing the Trust Services Framework.

A)FASB
B)COSO
C)AICPA
D)PCAOB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
6
In the time-based model of information security,P represents

A)the time it takes to respond to and stop the attack.
B)the time it takes for the organization to detect that an attack is in progress.
C)the time it takes an attacker to break through the various controls that protect the organization's information assets.
D)the time it takes to assess threats and select risk response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Trust Services Framework reliability principle that states personal information should be protected from unauthorized disclosure is known as

A)availability.
B)security.
C)privacy.
D)integrity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
8
It was 8:03 A.M.when Jiao Jan,the Network Administrator for South Asian Technologies,was informed that the intrusion detection system had identified an ongoing attempt to breach network security.By the time that Jiao had identified and blocked the attack,the hacker had accessed and downloaded several files from the company's server.Using the notation for the time-based model of security,in this case

A)D > P
B)P > D
C)P > C
D)C > P
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is not one of the essential criteria for successfully implementing each of the principles that contribute to systems reliability,as discussed in the Trust Services Framework?

A)Developing and documenting policies.
B)Effectively communicating policies to all outsiders.
C)Designing and employing appropriate control procedures to implement policies.
D)Monitoring the system and taking corrective action to maintain compliance with policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
10
Information security procedures protect information integrity by

A)preventing fictitious transactions.
B)reducing the system cost.
C)making the system more efficient.
D)making it impossible for unauthorized users to access the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
11
Security is a technology issue and not just a management issue.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
12
According to the Trust Services Framework,the reliability principle of availability is achieved when the system produces data that

A)is available for operation and use at times set forth by agreement.
B)is protected against unauthorized physical and logical access.
C)can be maintained as required without affecting system availability, security, and integrity.
D)is complete, accurate, and valid.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
13
The Trust Services Framework reliability principle that states that users must be able to enter,update,and retrieve data during agreed-upon times is known as

A)availability.
B)security.
C)maintainability.
D)integrity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
14
Describe the five principles of the Trust Services Framework.Select one of the principles and discuss the why it is important to an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as

A)availability.
B)security.
C)confidentiality.
D)integrity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is not one of the three fundamental information security concepts?

A)Information security is a technology issue based on prevention.
B)Security is a management issue, not a technology issue.
C)The idea of defense-in-depth employs multiple layers of controls.
D)The time-based model of security focuses on the relationship between preventive, detective and corrective controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
17
If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack,then security is

A)effective.
B)ineffective.
C)overdone.
D)undermanaged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
18
According to the Trust Services Framework,the confidentiality principle of integrity is achieved when the system produces data that

A)is available for operation and use at times set forth by agreement.
B)is protected against unauthorized physical and logical access.
C)can be maintained as required without affecting system availability, security, and integrity.
D)is complete, accurate, and valid.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
19
The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as

A)availability.
B)security.
C)privacy.
D)integrity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
20
In the time-based model of information security,D represents

A)the time it takes to respond to and stop the attack.
B)the time it takes for the organization to detect that an attack is in progress.
C)the time it takes an attacker to break through the various controls that protect the organization's information assets.
D)the time it takes to assess threats and select risk response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
21
The steps that criminals take to trick an unsuspecting employee into granting them access is called

A)scanning and mapping the target.
B)social engineering.
C)research.
D)reconnaissance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
22
Describe the basic steps criminal use to attack an organization's information system.Select one of the steps and find a news story that relates to the step that you have chosen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
23
The steps that criminals take to find known vulnerabilities and learn how to take advantage of those vulnerabilities is called

A)scanning and mapping the target.
B)social engineering.
C)research.
D)reconnaissance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
24
________ is/are an example of a preventive control.

A)Emergency response teams
B)Encryption
C)Log analysis
D)Intrusion detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
25
________ is/are an example of a detective control.

A)Physical access controls
B)Encryption
C)Emergency response teams
D)Log analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
26
________ is/are an example of a preventive control.

A)Continuous monitoring
B)Encryption
C)Emergency response teams
D)Log analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
27
Verifying the identity of the person or device attempting to access the system is an example of

A)authentication.
B)authorization.
C)identification.
D)threat monitoring.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is an example of a corrective control?

A)Physical access controls.
B)Encryption.
C)Intrusion detection.
D)Incident response teams.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
29
Social engineering attacks often take place over the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
30
Describe the steps in the security life cycle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is an example of a detective control?

A)Physical access controls.
B)Encryption.
C)Continuous monitoring.
D)Incident response teams.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
32
In the time-based model of information security,R represents

A)the time it takes to respond to and stop the attack.
B)the time it takes for the organization to detect that an attack is in progress.
C)the time it takes an attacker to break through the various controls that protect the organization's information assets.
D)the time it takes to assess threats and select risk response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is not a requirement of effective passwords?

A)Passwords should be changed at regular intervals.
B)Passwords should be no more than 8 characters in length.
C)Passwords should contain a mixture of upper and lowercase letters, numbers and characters.
D)Passwords should not be words found in dictionaries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
34
The steps that criminals take to identify potential points of remote entry is called

A)scanning and mapping the target.
B)social engineering.
C)research.
D)reconnaissance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
35
Organizations are infrequently the target of deliberate attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
36
The steps that criminals take to study their target's physical layout to learn about the controls it has in place is called

A)scanning and mapping the target.
B)social engineering.
C)research.
D)reconnaissance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
37
Multi-factor authentication

A)involves the use of two or more basic authentication methods.
B)is a table specifying which portions of the systems users are permitted to access.
C)provides weaker authentication than the use of effective passwords.
D)requires the use of more than one effective password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
38
Restricting access of users to specific portions of the system as well as specific tasks,is an example of

A)authentication.
B)authorization.
C)identification.
D)threat monitoring.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
39
Identify the statement below which is not a useful control procedure regarding access to system outputs.

A)Restricting access to rooms with printers.
B)Coding reports to reflect their importance.
C)Allowing visitors to move through the building without supervision.
D)Requiring employees to log out of applications when leaving their desk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following is an example of a preventive control?

A)The creation of a "security-aware" culture.
B)The creation of a "Log user friendly" culture.
C)The creation of a "continuous monitoring" culture.
D)The creation of a chief information security officer position.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
41
This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.

A)access control list
B)Internet protocol
C)packet switching protocol
D)transmission control protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
42
A well-known hacker started her own computer security consulting business.Many companies pay her to attempt to gain unauthorized access to their network.If she is successful,she offers advice as to how to design and implement better controls.What is the name of the testing for which the hacker is being paid?

A)Penetration test.
B)Vulnerability scan.
C)Deep packet inspection
D)Buffer overflow test.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
43
A special purpose hardware device or software running on a general purpose computer,which filters information that is allowed to enter and leave the organization's information system,is known as a(n)

A)demilitarized zone.
B)intrusion detection system.
C)intrusion prevention system.
D)firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
44
This network access control determines which IP packets are allowed entry to a network and which are dropped.

A)access control list
B)deep packet inspection
C)stateful packet filtering
D)static packet filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
45
The process of maintaining a table listing all established connections between the organization's computers and the internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as

A)packet filtering.
B)deep packet inspection.
C)access control list.
D)access control matrix
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
46
________ is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system.

A)Log analysis test
B)Intrusion test
C)Penetration test
D)Vulnerability test
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
47
Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?

A)Training.
B)Controlling physical access.
C)Controlling remote access.
D)Host and application hardening.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which of the following preventive controls are necessary to provide adequate security for social engineering threats?

A)Controlling physical access.
B)Encryption.
C)Profiling.
D)Awareness training.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
49
The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as

A)an intrusion prevention system.
B)stateful packet filtering.
C)static packet filtering.
D)deep packet inspection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
50
The most common input-related vulnerability is called the

A)softening attack.
B)hardening attack.
C)cross-site scripting attack.
D)buffering attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
51
The process that allows a firewall to be more effective by examining the data in the body of an IP packet,instead of just the header,is known as

A)deep packet inspection.
B)stateful packet filtering.
C)static packet filtering.
D)an intrusion prevention system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
52
The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as

A)access control list.
B)deep packet inspection.
C)intrusion filtering.
D)packet filtering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
53
The process that uses automated tools to identify whether a system possesses any well-known security problems is known as a(n)

A)intrusion detection system.
B)log analysis.
C)penetration test.
D)vulnerability scan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
54
An access control matrix

A)is the process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform.
B)is used to implement authentication controls.
C)matches the user's authentication credentials to his authorization.
D)is a table specifying which portions of the system users are permitted to access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
55
A separate network located outside the organization's internal information system that permits controlled access from the Internet to selected resources is known as a(n)

A)demilitarized zone.
B)intrusion detection system.
C)intrusion prevention system.
D)firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
56
This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination.

A)access control list
B)Internet protocol
C)packet switching protocol
D)transmission control protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the below keeps a record of the network traffic permitted to pass through a firewall?

A)Intrusion detection system.
B)Vulnerability scan.
C)Log analysis.
D)Penetration test.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
58
Tools called ________ can be used to identify unused and,therefore,unnecessary programs that represent potential security threats.

A)router scanners
B)vulnerabilities scanners
C)deep inspection scanners
D)TCP scanners
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
59
The process of turning off unnecessary features in the system is known as

A)deep packet inspection.
B)hardening.
C)intrusion detection.
D)modaling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
60
Compatibility tests utilize a(n)________,which is a list of authorized users,programs,and data files the users are authorized to access or manipulate.

A)validity test
B)biometric matrix
C)logical control matrix
D)access control matrix
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
61
New employees of Baker Technologies are assigned user names and appropriate permissions.Their credentials are then entered into the company's information system's access control matrix.This is an example of a(n)

A)authentication control.
B)biometric device.
C)remote access control.
D)authorization control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
62
A major financial institution hired a renowned security firm to attempt to compromise its computer network.A few days later,the security firm reported that it had successfully entered the financial institution's computer system without being detected.The security firm presented an analysis of the vulnerabilities that had been found to the financial institution.This is an example of a

A)preventive control.
B)detective control.
C)corrective control.
D)security control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
63
Describe four requirements of effective passwords .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
64
A border router

A)routes electronic communications within an organization.
B)connects an organization's information system to the Internet.
C)permits controlled access from the Internet to selected resources.
D)serves as the main firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
65
Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as

A)change management.
B)cloud computing.
C)patch management.
D)user account management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
66
Identify six physical access controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
67
Explain social engineering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
68
The most effective method for protecting an organization from social engineering attacks is providing

A)a firewall.
B)stateful packet filtering.
C)a demilitarized zone.
D)employee awareness training.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
69
ShareIt is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits.As a consequence,the size of the information technology department has been growing very rapidly,with many new hires.Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility.This is an example of a(n)

A)authentication control.
B)biometric device.
C)remote access control.
D)authorization control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
70
A demilitarized zone

A)routes electronic communications within an organization.
B)connects an organization's information system to the Internet.
C)permits controlled access from the Internet to selected resources.
D)serves as the main firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
71
Which of the following is commonly true of the default settings for most commercially available wireless access points?

A)The security level is set at the factory and cannot be changed.
B)Security is set to an adjustable level that changes depending on the wireless network the device is connected.
C)Security is set to the lowest level that the device is capable of handling.
D)Security is set to the highest level that the device is capable of handling.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
72
Residents in Berryhill received an e-mail stating that there is an armed robber on the loose.The e-mail claimed to be from the Berryhill police department,but it wasn't.Computer forensic experts later determined that the e-mail was sent from a computer lab in the Berryhill's public library.The police were then able to uniquely identify the computer that was used by means of its network interface card's ________ address.Security cameras later help the police to reveal the identity of the individual responsible for the hoax.

A)IDS
B)TCP/IP
C)MAC
D)DMZ
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
73
Describe what information security process the term hardening refers to.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
74
Identify three ways users can be authenticated and give an example of each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
75
All employees of E.C.Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted.Entry to secure areas,such as the Information Technology Department offices,requires further procedures.This is an example of a(n)

A)authentication control.
B)authorization control.
C)physical access control.
D)hardening procedure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
76
Explain the value of penetration testing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
77
The most effective way to protect network resources that are exposed to the internet,yet reside outside of a network is

A)a firewall.
B)employee training.
C)a demilitarized zone.
D)stateful packet filtering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
78
New employees of Baker Technologies are assigned user names and appropriate permissions.Each of them were given a company's issued laptop that have an integrated fingerprint reader.In order to log in,the user's fingerprint must be recognized by the reader.This is an example of a(n)

A)authorization control.
B)biometric device.
C)remote access control.
D)defense in depth.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
79
In recent years,many of the attacks carried out by hackers have relied on this type of vulnerability in computer software.

A)Code mastication.
B)Boot sector corruption.
C)URL injection.
D)Buffer overflow.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
80
The ________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.

A)chief information officer
B)chief operations officer
C)chief security officer
D)computer emergency response team
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 100 في هذه المجموعة.