-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathSPM
19987 lines (14290 loc) · 810 KB
/
SPM
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
True
4. A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
True
11. A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for pre-configured signatures. _________________________
True
12. The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________
True
2. The Secret Service is charged with the detection and arrest of any person committing a U.S. federal offense relating to computer fraud, as well as false identification crimes.
True
3. Deterrence is the best method for preventing an illegal or unethical activity. ____________
True
5. Due diligence requires that an organization make a valid and ongoing effort to protect others. ____________
True
6. The Gramm-Leach-Bliley (GLB) Act (also known as the Financial Services Modernization Act of 1999) contains a number of provisions that affect banks, securities firms, and insurance companies. ___________
True
2. A clearly directed strategy flows from top to bottom rather than from bottom to top.
True
5. Penetration testing is often conducted by penetration testers—consultants or outsourced contractors who might be referred to as red teams.
True
9. Enterprise risk management is a valuable approach that can better align security functions with the business mission while offering opportunities to lower costs.
True
1. Policies must specify penalties for unacceptable behavior and define an appeals process.
True
2. One of the goals of an issue-specific security policy is to indemnify the organization against liability for an employee's inappropriate or illegal use of the system.
True
7. Information security policies are designed to provide structure in the workplace and explain the will of the organization's management. ____________
True
1. Small organizations spend more per user on security than medium- and large-sized organizations.
True
5. On-the-job training can result in substandard work performance while the trainee gets up to speed.
True
7. Planners need to estimate the effort required to complete each task, subtask, or action step.
True
9. A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable. _________________________
True
10. Each organization has to determine its own project management methodology for IT and information security projects.
True
5. On-the-job training can result in substandard work performance while the trainee gets up to speed.
True
7. Planners need to estimate the effort required to complete each task, subtask, or action step.
True
9. A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable. _________________________
True
10. Each organization has to determine its own project management methodology for IT and information security projects.
True
2. The InfoSec community often takes on the leadership role in addressing risk.
True
4. The Australian and New Zealand Risk Management Standard 4360 uses qualitative methods to determine risk based on a threat's probability of occurrence and expected results of a successful attack.
True
5. Some threats can manifest in multiple ways, yielding multiple vulnerabilities for an asset-threat pair.
True
1. Risks can be avoided by countering the threats facing an asset or by eliminating the exposure of an asset.
True
3. The criterion most commonly used when evaluating a strategy to implement InfoSec controls and safeguards is economic feasibility.
True
4. Unlike other risk management frameworks, FAIR relies on the qualitative assessment of many risk components using scales with value ranges.
True
5. The ISO 27005 Standard for InfoSec Risk Management includes a five-stage management methodology; among them are risk treatment and risk communication.
True
8. The risk control strategy that attempts to reduce the impact of the loss caused by a realized incident, disaster, or attack through effective contingency planning and preparation is known as the mitigation risk control strategy. ____________
True
12. Also known as an economic feasibility study, the formal assessment and presentation of the economic expenditures needed for a particular security control, contrasted with its projected value to the organization is known as cost-benefit analysis (CBA). ____________
True
13. The risk control strategy that eliminates all risk associated with an information asset by removing it from service is known as the termination risk control strategy.
Nâng cấp để gỡ bỏ quảng cáo
Chỉ 35,99 US$/năm
True
14. Due care and due diligence occur when an organization adopts a certain minimum level of security—that is, what any prudent organization would do in similar circumstances. ____________
b
16. Application of training and education is a common method of which risk control strategy?
a. mitigation b. defense
c. acceptance d. transferal
d
17. Which of the following describes an organization's efforts to reduce damage caused by a realized incident or disaster?
a. acceptance b. avoidance
c. transference d. mitigation
a
18. Strategies to limit losses before and during a realized adverse event is covered by which of the following plans in the mitigation control approach?
a. incident response plan b. business continuity plan
c. disaster recovery plan d. damage control plan
c
19. The only use of the acceptance strategy that is recognized as valid by industry practices occurs when the organization has done all but which of the following?
a. Determined the level of risk posed to the information asset
b. Performed a thorough cost-benefit analysis
c. Determined that the costs to control the risk to an information asset are much lower than the benefit gained from the information asset
d. Assessed the probability of attack and the likelihood of a successful exploitation of a vulnerability
b
20. Which of the following can be described as the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility?
a. residual risk b. risk appetite
c. risk assurance d. risk termination
c
21. Which of the following is NOT a valid rule of thumb on risk control strategy selection?
a. When a vulnerability exists: Implement security controls to reduce the likelihood of a vulnerability being exploited.
b. When a vulnerability can be exploited: Apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack.
c. When the attacker's potential gain is less than the costs of attack: Apply protections to decrease the attacker's cost or reduce the attacker's gain, by using technical or operational controls.
d. When the potential loss is substantial: Apply design principles, architectural designs, and technical and non-technical protections to limit the extent of the attack, thereby reducing the potential for loss.
d
22. Which of the following affects the cost of a control?
a. liability insurance b. CBA report
c. asset resale d. maintenance
b
23. By multiplying the asset value by the exposure factor, you can calculate which of the following?
a. annualized cost of the safeguard b. single loss expectancy
c. value to adversaries d. annualized loss expectancy
a
24. What is the result of subtracting the post-control annualized loss expectancy and the ACS from the pre-control annualized loss expectancy?
a. cost-benefit analysis b. exposure factor
c. single loss expectancy d. annualized rate of occurrence
b
25. Which of the following determines acceptable practices based on consensus and relationships among the communities of interest.
a. organizational feasibility b. political feasibility
c. technical feasibility d. operational feasibility
c
26. The Microsoft Risk Management Approach includes four phases. Which of the following is NOT one of them?
a. conducting decision support b. implementing controls
c. evaluating alternative strategies d. measuring program effectiveness
a
27. What does FAIR rely on to build the risk management framework that is unlike many other risk management frameworks?
a. qualitative assessment of many risk components b. quantitative valuation of safeguards
c. subjective prioritization of controls d. risk analysis estimates
d
28. In which technique does a group rate or rank a set of information, compile the results and repeat until everyone is satisfied with the result?
a. OCTAVE b. FAIR
c. Hybrid Measures d. Delphi
c
29. Once a control strategy has been selected and implemented, what should be done on an ongoing basis to determine their effectiveness and to estimate the remaining risk?
a. analysis and adjustment b. review and reapplication
c. monitoring and measurement d. evaluation and funding
c
30. Which of the following is not a step in the FAIR risk management framework?
a. identify scenario components b. evaluate loss event frequency
c. assess control impact d. derive and articulate risk
b
31. What should each information asset-threat pair have at a minimum that clearly identifies any residual risk that remains after the proposed strategy has been executed?
a. probability calculation b. documented control strategy
c. risk acceptance plan d. mitigation plan
c
32. Which of the following describes the financial savings from using the defense risk control strategy to implement a control and eliminate the financial ramifications of an incident?
a. feasibility analysis b. asset valuation
c. cost avoidance d. cost-benefit analysis
c
33. Which of the following is NOT an alternative to using CBA to justify risk controls?
a. benchmarking b. due care and due diligence
c. selective risk avoidance d. the gold standard
d
34. The ISO 27005 Standard for Information Security Risk Management includes five stages including all but which of the following?
a. risk assessment b. risk treatment
c. risk communication d. risk determination
a
35. The NIST risk management approach includes all but which of the following elements?
a. inform b. assess
c. frame d. respond
d
Chapter 1
15. Communications security involves the protection of which of the following?.
a. radio handsets b. people, physical assets
c. the IT department d. media, technology, and content
b
16. According to the C.I.A. triad, which of the following is a desirable characteristic for computer security?
a. accountability b. availability
c. authorization d. authentication
d
17. Which of the following is a C.I.A. characteristic that ensures that only those with sufficient privileges and a demonstrated need may access certain information?
a. Integrity b. Availability
c. Authentication d. Confidentiality
d
18. The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process?
a. accountability b. authorization
c. identification d. authentication
c
19. What do audit logs that track user activity on an information system provide?
a. identification b. authorization
c. accountability d. authentication
d
20. Which of the following is the principle of management that develops, creates, and implements strategies for the accomplishment of objectives?
a. leading b. controlling
c. organizing d. planning
a
21. Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives?
a. organization b. planning
c. controlling d. leading
d
22. In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
a. zombie-in-the-middle b. sniff-in-the-middle
c. server-in-the-middle d. man-in-the-middle
c
23. Which of the following is the first step in the problem-solving process?
a. Analyze and compare the possible solutions
b. Develop possible solutions
c. Recognize and define the problem
d. Select, implement and evaluate a solution
c
24. Which of the following is NOT a step in the problem-solving process?
a. Select, implement and evaluate a solution
b. Analyze and compare possible solutions
c. Build support among management for the candidate solution
d. Gather facts and make assumptions
d
25. Which of the following is NOT a primary function of Information Security Management?
a. planning b. protection
c. projects d. performance
b
26. Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines?
a. planning b. policy
c. programs d. people
b
27. Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program?
a. protection
b. people
c. projects
d. policy
c
28. Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
a. bypass b. theft
c. trespass d. security
d
29. ____________________ are malware programs that hide their true nature, and reveal their designed behavior only when activated.
a. Viruses b. Worms
c. Spam d. Trojan horses
c
30. As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________.
a. false alarms b. polymorphisms
c. hoaxes d. urban legends
b
31. Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________.
a. threats b. education
c. hugs d. paperwork
a
32. "4-1-9" fraud is an example of a ____________________ attack.
a. social engineering b. virus
c. worm d. spam
b
33. Which type of attack involves sending a large number of connection or information requests to a target?
a. malicious code b. denial-of-service (DoS)
c. brute force d. spear fishing
a
34. Which of the following is not among the 'deadly sins of software security'?
a. Extortion sins
b. Implementation sins
c. Web application sins
d. Networking sins
b
35. Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____.
a. SSL b. SLA
c. MSL d. MIN
b
36. Blackmail threat of informational disclosure is an example of which threat category?
a. Espionage or trespass b. Information extortion
c. Sabotage or vandalism d. Compromises of intellectual property
a
37. One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
a. hacktivist b. phreak
c. hackcyber d. cyberhack
b
38. A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
a. denial-of-service b. distributed denial-of-service
c. virus d. spam
c
39. Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls?
a. brute force b. DoS
c. back door d. hoax
a
40. A short-term interruption in electrical power availability is known as a ____.
a. fault
b. brownout
c. blackout d. lag
c
Chapter 2
12. Which subset of civil law regulates the relationships among individuals and among individuals
and organizations?
a. tort b. criminal
c. private d. public
c
13. Which law addresses privacy and security concerns associated with the electronic transmission of PHI?
a. USA Patriot Act of 2001
b. American Recovery and Reinvestment Act
c. Health Information Technology for Economic and Clinical Health Act
d. National Information Infrastructure Protection Act of 1996
c
14. The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following?
a. For purposes of commercial advantage
b. For private financial gain
c. For political advantage
d. In furtherance of a criminal act
d
15. Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management, use, or operation of each federal computer system?
a. The Telecommunications Deregulation and Competition Act
b. National Information Infrastructure Protection Act
c. Computer Fraud and Abuse Act
d. The Computer Security Act
a
16. Which act is a collection of statutes that regulates the interception of wire, electronic, and oral communications?
a. The Electronic Communications Privacy Act of 1986
b. The Telecommunications Deregulation and Competition Act of 1996
c. National Information Infrastructure Protection Act of 1996
d. Federal Privacy Act of 1974
c
17. Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information, as well as policies and procedures to maintain them?
a. ECPA
b. Sarbanes-Oxley
c. HIPAA
d. Gramm-Leach-Bliley
b
18. Which law extends protection to intellectual property, which includes words published in electronic formats?
a. Freedom of Information Act b. U.S. Copyright Law
c. Security and Freedom through Encryption Act d. Sarbanes-Oxley Act
d
19. Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics?
a. Applied ethics b. Meta-ethics
c. Normative ethics d. Deontological ethics
d
20. Which of the following is an international effort to reduce the impact of copyright, trademark,
and privacy infringement, especially via the removal of technological copyright protection measures?
a. U.S. Copyright Law
b. PCI DSS
c. European Council Cybercrime Convention
d. DMCA
b
21. Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question, what do others think is right?
a. Applied ethics b. Descriptive ethics
c. Normative ethics d. Deontological ethics
d
22. Which ethical standard is based on the notion that life in community yields a positive outcome for the individual, requiring each individual to contribute to that community?
a. utilitarian b. virtue
c. fairness or justice d. common good
b
23. There are three general categories of unethical behavior that organizations and society should seek to eliminate. Which of the following is NOT one of them?
a. ignorance b. malice
c. accident d. intent
b
24. Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws, policies and technical controls.
a. remediation b. deterrence
c. persecution d. rehabilitation
a
25. Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications? The code includes the canon: Provide diligent and competent service to principals.
a. (ISC)2 b. ACM
c. SANS d. ISACA
b
26. Which of the following is compensation for a wrong committed by an employee acting with or without authorization?
a. liability b. restitution
c. due diligence d. jurisdiction
b
27. Any court can impose its authority over an individual or organization if it can establish which of the following?
a. jurisprudence b. jurisdiction
c. liability d. sovereignty
c
Chapter 3
10. Which of the following explicitly declares the business of the organization and its intended areas of operations?
a. vision statement b. values statement
c. mission statement d. business statement
a
11. Which type of planning is the primary tool in determining the long-term direction taken by an organization?
a. strategic b. tactical
c. operational d. managerial
a
12. Which of the following is true about planning?
a. Strategic plans are used to create tactical plans
b. Tactical plans are used to create strategic plans
c. Operational plans are used to create tactical plans
d. Operational plans are used to create strategic plans
d
13. Which level of planning breaks down each applicable strategic goal into a series of incremental objectives?
a. strategic b. operational
c. organizational d. tactical
d
14. Which type of planning is used to organize the ongoing, day-to-day performance of tasks?
a. Strategic b. Tactical
c. Organizational d. Operational
c
15. The basic outcomes of InfoSec governance should include all but which of the following?
a. Value delivery by optimizing InfoSec investments in support of organizational objectives
b. Performance measurement by measuring, monitoring, and reporting information security governance metrics to ensure that organizational objectives are achieved
c. Time management by aligning resources with personnel schedules and organizational objectives
d. Resource management by utilizing information security knowledge and infrastructure efficiently and effectively
c
16. Internal and external stakeholders such as customers, suppliers, or employees who interact with the information in support of their organization's planning and operations are known as ____________.
a. data owners
b. data custodians
c. data users
d. data generators
a
17. The National Association of Corporate Directors (NACD) recommends four essential practices for boards of directors. Which of the following is NOT one of these recommended practices?
a. Hold regular meetings with the CIO to discuss tactical InfoSec planning
b. Assign InfoSec to a key committee and ensure adequate support for that committee
c. Ensure the effectiveness of the corporation's InfoSec policy through review and approval
d. Identify InfoSec leaders, hold them accountable, and ensure support for them
b
18. Which of the following should be included in an InfoSec governance program?
a. An InfoSec development methodology
b. An InfoSec risk management methodology
c. An InfoSec project management assessment from an outside consultant
d. All of these are components of the InfoSec governance program
a
19. According to the Corporate Governance Task Force (CGTF), which phase in the IDEAL model and framework lays the groundwork for a successful improvement effort?
a. Initiating b. Establishing
c. Acting d. Learning
b
20. According to the Corporate Governance Task Force (CGTF), during which phase in the IDEAL model and framework does the organization plan the specifics of how it will reach its destination?
a. Initiating b. Establishing
c. Acting d. Learning
b
21. Which of the following is an information security governance responsibility of the Chief Security Officer?
a. Communicate policies and the program
b. Set security policy, procedures, programs and training
c. Brief the board, customers and the public
d. Implement policy, report security vulnerabilities and breaches
a
22. ISO 27014:2013 is the ISO 27000 series standard for ____________.
a. Governance of Information Security
b. Information Security Management
c. Risk Management
d. Policy Management
c
23. Which of the following is a key advantage of the bottom-up approach to security implementation?
a. strong upper-management support
b. a clear planning and implementation process
c. utilizes the technical expertise of the individual administrators
d. coordinated planning from upper management
b
24. Which of these is a systems development approach that incorporates teams of representatives from multiple constituencies, including users, management, and IT, each with a vested interest in the project's success?
a. software engineering b. joint application design
c. sequence-driven policies d. event-driven procedures
d
25. Which model of SecSDLC does the work product from each phase fall into the next phase to serve as its starting point?
a. modular continuous b. elementary cyclical
c. time-boxed circular d. traditional waterfall
a
26. Individuals who control, and are therefore responsible for, the security and use of a particular set of information are known as ____________.
a. data owners
b. data custodians
c. data users
d. data generators
b
27. What is the first phase of the SecSDLC?
a. analysis b. investigation
c. logical design d. physical design
a
28. The individual responsible for the assessment, management, and implementation of information-protection activities in the organization is known as a(n) ____________.
a. chief information security officer
b. security technician
c. security manager
d. chief technology officer
d
29. In which phase of the SecSDLC does the risk management task occur?
a. physical design b. implementation
c. investigation d. analysis
b
30. An example of a stakeholder of a company includes all of the following except:
a. employees
b. the general public
c. stockholders
d. management
c
31. A project manager who understands project management, personnel management, and InfoSec technical requirements is needed to fill the role of a(n) ____________.
a. champion
b. end user
c. team leader
d. policy developer
c
32. The individual accountable for ensuring the day-to-day operation of the InfoSec program, accomplishing the objectives identified by the CISO and resolving issues identified by technicians are known as a(n) ____________.
a. chief information security officer
b. security technician
c. security manager
d. chief technology officer
a
33. A senior executive who promotes the project and ensures its support, both financially and administratively, at the highest levels of the organization is needed to fill the role of a(n) ____________ on a development team.
a. champion
b. end user
c. team leader
d. policy developer
a
34. When using the Governing for Enterprise Security (GES) program, an Enterprise Security Program (ESP) should be structured so that governance activities are driven by the organization's executive management, select key stakeholders, as well as the ____________.
a. Board Risk Committee
b. Board Finance Committee
c. Board Audit Committee
d. Chairman of the Board
b
35. A set of security tests and evaluations that simulate attacks by a malicious external source is known as ____________.
a. vulnerability assessment
b. penetration testing
c. exploit identification
d. safeguard neutralization
a
37. The process of identifying and documenting specific and provable flaws in the organization's information asset environment is known as ____________.
a. vulnerability assessment
b. penetration testing
c. exploit identification
d. safeguard neutralization
a
38. A 2007 Deloitte report found that valuable approach that can better align security functions with the business mission while offering opportunities to lower costs is ____________.
a. enterprise risk management.
b. joint application design
c. security policy review
d. disaster recovery planning
d
39. Which of the following set the direction and scope of the security process and provide detailed instruction for its conduct?
a. system controls b. technical controls
c. operational controls d. managerial controls
c
Chapter 4
11. Which of the following is NOT one of the basic rules that must be followed when shaping a policy?
a. policy should never conflict with law b. policy must be able to stand up in court if challenged
c. policy should be agreed upon by all employees and management d. policy must be properly supported and administered
b
13. Which of the following is NOT among the three types of InfoSec policies based on NIST's Special Publication 800-14?
a. Enterprise information security policy
b. User-specific security policies
c. Issue-specific security policies
d. System-specific security policies
d
14. In addition to specifying the penalties for unacceptable behavior, what else must a policy specify?
a. appeals process b. legal recourse
c. what must be done to comply d. the proper operation of equipment
d
15. Which policy is the highest level of policy and is usually created first?
a. SysSP b. USSP
c. ISSP d. EISP
b
16. Which type of document is a more detailed statement of what must be done to comply with a policy?
a. procedure b. standard
c. guideline d. practice
b
17. Which of the following is an element of the enterprise information security policy?
a. access control lists
b. information on the structure of the InfoSec organization
c. articulation of the organization's SDLC methodology
d. indemnification of the organization against liability
a
18. Which type of security policy is intended to provide a common understanding of the purposes for which an employee can and cannot use a resource?
a. issue-specific b. enterprise information
c. system-specific d. user-specific
a
19. Which section of an ISSP should outline a specific methodology for the review and modification of the ISSP?
a. Policy Review and Modification
b. Limitations of Liability
c. Systems Management
d. Statement of Purpose
a
20. Which of the following sections of the ISSP should provide instructions on how to report observed or suspected policy infractions?
a. Violations of Policy
b. Systems Management
c. Prohibited Usage of Equipment
d. Authorized Access and Usage of Equipment
a
21. Which of the following is a disadvantage of the individual policy approach to creating and managing ISSPs?
a. can suffer from poor policy dissemintation, enforcement, and review
b. may skip vulnerabilities otherwise reported
c. may be more expensive than necessary
d. implementation can be less difficult to manage
a
22. Which of the following are the two general groups into which SysSPs can be separated?
a. technical specifications and managerial guidance b. business guidance and network guidance
c. user specifications and managerial guidance d. technical specifications and business guidance
d
23. What are the two general methods for implementing technical controls?
a. profile lists and configuration filters
b. firewall rules and access filters
c. user profiles and filters
d. access control lists and configuration rules
b
24. Which of the following is NOT an aspect of access regulated by ACLs?
a. what authorized users can access b. where the system is located
c. how authorized users can access the system d. when authorized users can access the system
c
25. Which of the following are instructional codes that guide the execution of the system when information is passing through it?
a. access control lists b. user profiles
c. configuration rules d. capability tables
d
26. A detailed outline of the scope of the policy development project is created during which phase of the SecSDLC?
a. design b. analysis
c. implementation d. investigation
a
27. In which phase of the SecSDLC must the team create a plan to distribute and verify the distribution of the policies?
a. design b. implementation
c. investigation d. analysis
b
28. A risk assessment is performed during which phase of the SecSDLC?
a. implementation b. analysis
c. design d. investigation
d
29. According to NIST SP 800-18, Rev. 1, which individual is responsible for the creation, revision, distribution, and storage of the policy?
a. policy developer b. policy reviewer
c. policy enforcer d. policy administrator
b
30. When an organization demonstrates that it is continuously attempting to meet the requirements of the market in which it operates, what is it ensuring?
a. policy administration b. due diligence
c. adequate security measures d. certification and accreditation
d
Chapter 5
13. Which of the following variables is the most influential in determining how to structure an information security program?
a. Security capital budget b. Organizational size
c. Security personnel budget d. Organizational culture
d
14. Which of the following is true about the security staffing, budget, and needs of a medium-sized organization?
a. they have a larger security staff than a small organization
b. they have a larger security budget (as percent of IT budget) than a small organization
c. they have a smaller security budget (as percent of IT budget) than a large organization
d. they have larger information security needs than a small organization
b
15. Which of the following functions includes identifying the sources of risk and may include offering advice on controls that can reduce risk?
a. Risk management b. Risk assessment
c. Systems testing d. Vulnerability assessment
a
16. Which of the following functions needed to implement the information security program evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness?
a. Systems testing b. Risk assessment
c. Incident response d. Systems security administration
c
17. Which function needed to implement the information security program includes researching, creating, maintaining, and promoting information security plans?
a. compliance b. policy
c. planning d. systems security administration
b
18. Which of the following is NOT among the functions typically performed within the InfoSec department as a compliance enforcement obligation?
a. policy
b. centralized authentication
c. compliance audit
d. risk management
a
19. Which of the following would be responsible for configuring firewalls and IDPSs, implementing security software, and diagnosing and troubleshooting problems?
a. A security technician b. A security analyst
c. A security consultant d. The security manager
c
20. GGG security is commonly used to describe which aspect of security?
a. technical b. software
c. physical d. theoretical
c
21. What is the SETA program designed to do?
a. reduce the occurrence of external attacks
b. improve operations
c. reduce the occurence of accidental security breaches
d. increase the efficiency of InfoSec staff
c
22. A SETA program consists of three elements: security education, security training, and which of the following?.
a. security accountability b. security authentication
c. security awareness d. security authorization
b
23. The purpose of SETA is to enhance security in all but which of the following ways?
a. by building in-depth knowledge
b. by adding barriers
c. by developing skills
d. by improving awareness
c
24. Advanced technical training can be selected or developed based on which of the following?
a. level of previous education b. level of previous training
c. technology product d. number of employees
c
25. Which of the following is the first step in the process of implementing training?
a. Identify training staff
b. Identify target audiences
c. Identify program scope, goals, and objectives
d. Motivate management and employees
c
26. Which of the following is an advantage of the one-on-one method of training?
a. Trainees can learn from each other b. Very cost-effective
c. Customized d. Maximizes use of company resources
d
27. Which of the following is a disadvantage of the one-on-one training method?
a. Inflexible
b. May not be responsive to the needs of all the trainees
c. Content may not be customized to the needs of the organization
d. Resource intensive, to the point of being inefficient
d
28. Which of the following is an advantage of the formal class method of training?
a. Personal
b. Self-paced, can go as fast or as slow as the trainee needs
c. Can be scheduled to fit the needs of the trainee
d. Interaction with trainer is possible
a
29. Which of the following is an advantage of the user support group form of training?
a. Usually conducted in an informal social setting
b. Formal training plan
c. Can be live, or can be archived and viewed at the trainee's convenience
d. Can be customized to the needs of the trainee
b