Deck 5: Planning for Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/108
Play
Full screen (f)
Deck 5: Planning for Security
1
The security framework is a more detailed version of the security blueprint.
False
2
Information security safeguards provide two levels of control: managerial and remedial.
False
3
Quality security programs begin and end with policy.
True
4
The Security Area Working Group endorses ISO/IEC 17799.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
5
The global information security community has universally agreed with the justification for the code of practices as identified in the ISO/IEC 17799.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
6
NIST 800-14,The Principles for Securing Information Technology Systems,provides detailed methods for assessing,designing,and implementing controls and plans for applications of varying size.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
7
Each policy should contain procedures and a timetable for periodic review.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
8
To remain viable,security policies must have a responsible individual,a schedule of reviews,a method for making recommendations for reviews,and a policy issuance and planned revision date.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
9
The policy administrator is responsible for the creation,revision,distribution,and storage of the policy.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
10
The ISSP sets out the requirements that must be met by the information security blueprint or framework.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
11
A standard is a plan or course of action that conveys instructions from an organization's senior management to those who make decisions,take actions,and perform other duties.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
12
Failure to develop an information security system based on the organization's mission,vision,and culture guarantees the failure of the information security program.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
13
A managerial guidance SysSP document is created by the IT experts in a company to guide management in the implementation and configuration of technology.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
14
A policy should state that if employees violate a company policy or any law using company technologies,the company will protect them,and the company is liable for the employee's actions.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
15
ISO/IEC 17799 is more useful than any other information security management approach.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
16
You can create a single comprehensive ISSP document covering all information security issues.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
17
Many industry observers claim that ISO/IEC 17799 is not as complete as other frameworks.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
18
NIST Special Publication 800-18 Rev.1,The Guide for Developing Security Plans for Federal Information Systems,includes templates for major application security plans.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
19
Management controls address the design and implementation of the security planning process and security program management.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
20
ACLs are more specific to the operation of a system than rule-based policies and they may or may not deal with users directly.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
21
A cold site provides many of the same services and options of a hot site.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
22
A disaster recovery plan addresses the preparation for and recovery from a disaster,whether natural or man-made.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
23
The gateway router can be used as the front-line defense against attacks,as it can be configured to allow only set types of protocols to enter.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
24
Informational controls guide the development of education,training,and awareness programs for users,administrators,and management.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
25
Security training provides detailed information and hands-on instruction to employees to prepare them to perform their duties securely.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
26
Systems-specific security policies are formalized as written documents readily identifiable as policy._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
27
A(n)integrated information security policy is also known as a general security policy._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
28
NIST documents can assist in the design of a security framework._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
29
The security blueprint is the basis for the design,selection,and implementation of all security program elements including such things as policy implementation and ongoing policy management._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
30
Disaster recovery personnel must know their roles without supporting documentation.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
31
The Federal Bureau of Investigation deals with many computer crimes that are categorized as felonies.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
32
Every member of the organization needs a formal degree or certificate in information security.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
33
Some policies may also need a(n)sunset clause indicating their expiration date._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
34
The standard should begin with a clear statement of purpose._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
35
A(n)capability table specifies which subjects and objects users or groups can access._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
36
The vision of an organization is a written statement of an organization's purpose._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
37
Database shadowing only processes a duplicate in real-time data storage but does not duplicate the databases at the remote site.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
38
Policies are living documents that must be managed._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
39
Laws are more detailed statements of what must be done to comply with policy._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
40
Additional redundancy to RAID can be provided by mirroring entire servers called redundant servers or server fault tolerance.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
41
A firewall can be a single device or a firewall extranet,which consists of multiple firewalls creating a buffer between the outside and inside networks._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
42
Technical controls are the tactical and technical implementations of security in the organization._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
43
____ often function as standards or procedures to be used when configuring or maintaining systems.
A)ESSPs
B)EISPs
C)ISSPs
D)SysSPs
A)ESSPs
B)EISPs
C)ISSPs
D)SysSPs
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
44
The ____ is based on and directly supports the mission,vision,and direction of the organization and sets the strategic direction,scope,and tone for all security efforts.
A)ISP
B)EISP
C)GSP
D)ISSP
A)ISP
B)EISP
C)GSP
D)ISSP
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
45
A security ____ is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization.
A)plan
B)framework
C)mission
D)blanket
A)plan
B)framework
C)mission
D)blanket
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
46
A(n)sequential roster is activated as the first person calls a few people on the roster,who in turn call a few other people._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
47
SP 800-18 Rev.1,The Guide for Developing Security Plans for Federal Information Systems,must be customized to fit the particular needs of a(n)organization._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
48
Proxy servers can temporarily store a frequently visited Web page,and thus are sometimes called demilitarized servers._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
49
A(n)contingency plan is prepared by the organization to anticipate,react to,and recover from events that threaten the security of information and information assets in the organization,and,subsequently,to restore the organization to normal modes of business operations._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
50
A(n)full backup only archives the files that have been modified that day,and thus requires less space and time than the differential._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
51
Evidence is the physical object or documented information that proves an action occurred or identifies the intent of a perpetrator._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
52
The Federal Agency Security Practices (FASP)site is a popular place to look up best practices._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
53
Strategic planning is the process of moving the organization towards its ____.
A)standard
B)policy
C)mission
D)vision
A)standard
B)policy
C)mission
D)vision
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
54
A service bureau is an agency that provides a service for a fee._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
55
Standards may be published,scrutinized,and ratified by a group,as in formal or ____ standards.
A)de formale
B)de public
C)de jure
D)de facto
A)de formale
B)de public
C)de jure
D)de facto
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
56
Within security perimeters the organization can establish security circles._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
57
A(n)IR plan ensures that critical business functions continue if a catastrophic incident or disaster occurs._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
58
A(n)honeynet is usually a computing device or a specially configured computer that allows or prevents access to a defined area based on a set of rules._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
59
Host-based IDPSs are usually installed on the machines they protect to monitor the status of various files stored on those machines._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
60
One of the basic tenets of security architectures is the layered implementation of security,which is called defense in layers._________________________
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
61
____-based IDPSs look at patterns of network traffic and attempt to detect unusual activity based on previous baselines.
A)Firewall
B)Host
C)Network
D)Domain
A)Firewall
B)Host
C)Network
D)Domain
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
62
The transfer of large batches of data to an off-site facility is called ____.
A)security perimeter
B)remote journaling
C)electronic vaulting
D)database shadowing
A)security perimeter
B)remote journaling
C)electronic vaulting
D)database shadowing
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
63
The Security Area Working Group acts as an advisory board for the protocols and areas developed and promoted by the Internet Society and the ____.
A)IETF
B)ISO/IEC
C)ISOC
D)IRTF
A)IETF
B)ISO/IEC
C)ISOC
D)IRTF
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
64
The spheres of ____ are the foundation of the security framework and illustrate how information is under attack from a variety of sources.
A)defense
B)assessment
C)security
D)information
A)defense
B)assessment
C)security
D)information
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
65
An alert ____ is a document containing contact information for the people to be notified in the event of an incident.
A)message
B)roster
C)plan
D)list
A)message
B)roster
C)plan
D)list
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
66
A ____ site provides only rudimentary services and facilities.
A)cool
B)warm
C)hot
D)cold
A)cool
B)warm
C)hot
D)cold
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
67
Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality,integrity,and availability of information and information assets during or just following an incident.
A)assessment
B)evaluation
C)recovery
D)plan
A)assessment
B)evaluation
C)recovery
D)plan
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
68
What country adopted ISO/IEC 17799?
A)United States
B)Germany
C)Japan
D)None of the above
A)United States
B)Germany
C)Japan
D)None of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
69
A buffer against outside attacks is frequently referred to as a(n)____.
A)proxy server
B)no-man's land
C)DMZ
D)firewall
A)proxy server
B)no-man's land
C)DMZ
D)firewall
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
70
The first phase in the development of the contingency planning process is the ____.
A)BIA
B)BRP
C)DP9
D)IRP
A)BIA
B)BRP
C)DP9
D)IRP
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
71
Redundancy can be implemented at a number of points throughout the security architecture,such as in ____.
A)firewalls
B)proxy servers
C)access controls
D)All of the above
A)firewalls
B)proxy servers
C)access controls
D)All of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
72
A(n)____ plan deals with the identification,classification,response,and recovery from an incident.
A)CM
B)BC
C)DR
D)IR
A)CM
B)BC
C)DR
D)IR
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
73
The stated purpose of ____ is to "give recommendations for information security management for use by those who are responsible for initiating,implementing,or maintaining security in their organization."
A)NIST SP800-18
B)RFC 2196
C)ISO/IEC 27002
D)BS7799 (Part 2)
A)NIST SP800-18
B)RFC 2196
C)ISO/IEC 27002
D)BS7799 (Part 2)
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
74
Security ____ are the areas of trust within which users can freely communicate.
A)perimeters
B)domains
C)rectangles
D)layers
A)perimeters
B)domains
C)rectangles
D)layers
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
75
RAID ____ drives can be hot swapped.
A)2
B)3
C)4
D)5
A)2
B)3
C)4
D)5
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
76
Effective management includes planning and ____.
A)organizing
B)leading
C)controlling
D)All of the above
A)organizing
B)leading
C)controlling
D)All of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
77
The SETA program is the responsibility of the ____ and is a control measure designed to reduce the incidences of accidental security breaches by employees.
A)CIO
B)CISCO
C)CISO
D)end users
A)CIO
B)CISCO
C)CISO
D)end users
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
78
SP 800-14,Generally Accepted Principles and Practices for Securing Information Technology Systems,provides best practices and security principles that can direct the security team in the development of a security ____.
A)plan
B)standard
C)policy
D)blueprint
A)plan
B)standard
C)policy
D)blueprint
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
79
____ controls address personnel security,physical security,and the protection of production inputs and outputs.
A)Informational
B)Operational
C)Technical
D)Managerial
A)Informational
B)Operational
C)Technical
D)Managerial
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
80
____ controls cover security processes that are designed by strategic planners and implemented by the security administration of the organization.
A)Managerial
B)Technical
C)Operational
D)Informational
A)Managerial
B)Technical
C)Operational
D)Informational
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck