CISA: Skills Cert Pro (1)

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 263

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

264 Terms

1

You are an information system auditor of HDA Inc. Which of the following provides the MOST useful information regarding an organization‘s risk appetite and tolerance?

A. Risk assessment reports

B. Risk Register

C. Risk profile

D. Incident response plans

Risk profile

Explanation: A risk profile provides comprehensive information about an organization‘s risk appetite and tolerance. It encompasses an understanding of the organization‘s willingness to take on risks to achieve its objectives and the level of risk it can tolerate. The risk profile considers various factors such as industry norms, regulatory requirements, strategic objectives, and stakeholder expectations. It helps in setting risk management strategies, prioritizing risk responses, and aligning risk-taking decisions with the organization‘s overall goals.

New cards
2

You are an information system auditor of HDA Inc. You noted that a security loop was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following could be the most common cause?

A. Absence of a qualified developer

B. Absence of UAT and business sign-off procedures

C. Inadequate code review process

D. Lack of intrusion detection systems

Absence of UAT and business sign-off procedures

Explanation: UAT involves testing the application in a real-world environment with actual users to ensure it meets their requirements and performs as expected. Business sign-off procedures involve obtaining formal approval from business stakeholders, indicating their acceptance of the application‘s functionality and readiness for production. The absence of UAT and business sign-off procedures increases the risk of undetected issues or vulnerabilities remaining in the application. If the application was not adequately tested by end-users or did not receive formal approval, it could lead to the recurrence of the same issue. Without comprehensive testing and validation, it is possible that the original issue was not completely resolved, resulting in its reappearance after the release.

New cards
3

What is the primary objective of implementing parallel processing while a new system is being made live?

A. Reduced implementation time and cost

B. Improved system performance and scalability

C. Enhanced data security and integrity

D. To determine whether the new system will support the functional requirements

To determine whether the new system will support the functional requirements

Explanation: In the context of a new system implementation, parallel processing can be used to execute the new system alongside the existing system during a transition phase. By implementing parallel processing, organizations can evaluate and compare the performance and functionality of the new system in parallel with the existing system. This approach allows them to assess whether the new system adequately meets the functional requirements of the business. It provides an opportunity to identify any gaps or deficiencies in the new system and make necessary adjustments or enhancements before fully migrating to it.

New cards
4

What is the primary objective of an IT balanced scorecard?

A. To allocate IT budgets effectively

B. To ensure compliance with IT policies

C. To measure the performance of the IT

D. To manage IT projects efficiently

To measure the performance of the IT

Explanation: The primary objective of an IT balanced scorecard is to measure the performance of the IT function within an organization. It provides a comprehensive framework for evaluating and assessing various aspects of IT performance, including financial, customer, internal processes, and learning and growth perspectives.

New cards
5

Which of the following is the best tool to measure the performance, risks, and capabilities of an IT environment?

A. IT balanced scorecard

B. SWOT analysis

C. Root cause analysis

D. Project management software

IT balanced scorecard

Explanation: The IT balanced scorecard is a comprehensive tool used to measure the performance, risks, and capabilities of an IT environment. It provides a balanced view of various aspects of IT management, including financial, customer, internal processes, and learning and growth perspectives. The IT balanced scorecard allows organizations to track key performance indicators (KPIs) related to IT, such as system uptime, response time, customer satisfaction, security incidents, and employee training. By measuring these KPIs, organizations can assess the overall performance and identify areas for improvement within their IT environment.

New cards
6

You are the information system auditor of HDA Inc. You are conducting an assessment of an organization‘s vulnerability scanning system and have discovered that it is configured to use vendor default settings to identify vulnerabilities. What is your MAIN concern regarding this configuration?

A. System may generate excessive false positives, leading to alert fatigue.

B. System may not effectively detect and prevent data breaches.

C. Organization may incur additional costs for customizing the DLP system.

D. Identified vulnerabilities may not match the organization‘s risk profile.

Identified vulnerabilities may not match the organization‘s risk profile.

Explanation: The main concern in this scenario is that by relying solely on vendor default settings, the organization‘s vulnerability scanning system may not adequately align with the specific risk profile and security requirements of the organization. Customizing the vulnerability scanning system based on the organization‘s risk profile ensures that it focuses on identifying and preventing violations that are most relevant to the organization‘s specific environment and data protection needs.

New cards
7

You are an information system auditor of HDA Inc. You have been assigned the task of implementing a data classification program. Your first step should be:

A. To conduct a risk assessment of the organization‘s data assets.

B. To train employees on data classification policies and procedures.

C. To establish a cross-functional data classification team.

D. To ensure the availability of an approved data classification policy.

To ensure the availability of an approved data classification policy.

Explanation: When implementing a data classification program, the first step should be to ensure the availability of an approved data classification policy. This policy serves as the foundation and reference point for the entire program. It outlines the criteria, guidelines, and procedures for classifying data within the organization.

Conducting a risk assessment of the organization‘s data assets is an important step in the implementation process, but it typically follows the establishment of a data classification policy. The policy provides the framework for assessing risks and assigning appropriate classification levels to data.

New cards
8

Which of the following methods is considered the most effective in aligning IT with business objectives?

A. Implementing the latest technology trends

B. Hiring a skilled IT workforce

C. Developing and monitoring key performance indicators (KPIs)

D. Conducting regular IT audits

Developing and monitoring key performance indicators (KPIs)

Explanation: Aligning IT with business objectives is essential for the successful operation of an organization. By developing and monitoring key performance indicators (KPIs), businesses can effectively measure and evaluate the performance of their IT systems and processes in relation to their overall business goals. KPIs provide measurable and quantifiable metrics that reflect the progress and success of IT initiatives in contributing to the organization‘s objectives.

New cards
9

You are the information system auditor of HDA Inc. You are reviewing the installation of a new server. You would primarily  ensure that:

A. The server hardware meets the organization‘s performance requirements.

B. The server is compatible with the existing network infrastructure.

C. The server software is properly licensed.

D. Security settings are set as per the information security policy of the organization.

Security settings are set as per the information security policy of the organization.

Explanation: As an information system auditor, one of the primary objectives during the review of a new server installation is to ensure that security settings are set in accordance with the organization‘s information security policy.

New cards
10

You are the information system auditor of HDA Inc. You observed employees often made mistakes  and classify the data at the incorrect level. Your best recommendation would be: 

A. Implement stricter data classification policies and guidelines.

B. Increase the number of data classification personnel.

C. Enhance the data classification software and tools.

D. Conduct frequent training and awareness about information classification policies.

Conduct frequent training and awareness about information classification policies.

Explanation: When data is frequently classified at the incorrect level within an organization, it indicates a lack of understanding or awareness regarding information classification policies. Conducting frequent training and raising awareness about these policies is the most effective way to improve the situation.

New cards
11

Which of the following is the most effective method to optimize data storage?

A. Implementing a robust backup system

B. Allowing unlimited email attachment sizes

C. conducting frequent employee training

D. Email attachment should not be allowed to exceed a specified limit

Email attachment should not be allowed to exceed a specified limit

Explanation: The most effective method to optimize data storage is by not allowing email attachments to exceed a specified limit. Limiting the size of email attachments helps to control the amount of storage space consumed by emails. By setting a maximum attachment size, organizations can prevent the unnecessary accumulation of large files within email systems, which can quickly consume storage resources. This strategy encourages users to adopt alternative methods for sharing large files, such as utilizing file sharing services or cloud storage solutions, thereby optimizing data storage and maintaining efficient email systems.

New cards
12

You are auditing the adequacy of the organization‘s privacy policy. Which of the following is the BEST source of information for you to use as a baseline?

A. Industry best practices

B. Company‘s financial statements

C. Applicable privacy regulations

D. Employee feedback

Applicable privacy regulations

Explanation: When assessing the adequacy of an organization‘s privacy policy, the best source of information for an IS auditor to use as a baseline is applicable privacy regulations. Privacy regulations, such as the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA), provide legal requirements and standards that organizations must adhere to regarding the handling of personal information. These regulations outline the necessary safeguards, consent requirements, breach notification procedures, and other privacy-related aspects that should be included in a comprehensive privacy policy. By referring to the applicable privacy regulations, the IS auditor can ensure that the organization‘s privacy policy aligns with the legal requirements and industry standards, providing a solid foundation for privacy protection.

Industry best practices may offer additional insights, but they do not provide the same level of regulatory compliance assurance as applicable privacy regulations.

New cards
13

You are auditing a data center and assessing the deployment of environmental equipment. Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?

A. Water sensors

B. Fire extinguishers

C. Security cameras

D. HVAC systems

Water sensors

Explanation: One of the primary concerns in a data center is the prevention of water damage, as water can cause severe disruptions and hardware failures. To mitigate this risk, data centers often deploy water sensors below the floor tiles. These sensors are designed to detect water leaks or flooding and trigger alarms or alerts when moisture is detected. By placing water sensors below the floor tiles, any water leakage from sources like broken pipes or leaks from cooling systems can be quickly identified, allowing prompt action to prevent or minimize damage.

New cards
14

Which of the following audit finding should be considered as highest risk in a network audit?

A. Insufficient firewall rule documentation.

B. Weak password policies across user accounts

C. Outdated antivirus software on workstations.

D. Network device inventory is not maintained.

Network device inventory is not maintained

Explanation: The highest-risk finding among the given options is the lack of network device inventory maintenance. Maintaining an accurate inventory of network devices is crucial for effective network security management. Without an updated inventory, it becomes challenging to identify unauthorized or rogue devices connected to the network. This increases the risk of potential security breaches, unauthorized access, or compromised network infrastructure. Additionally, maintaining an inventory helps in planning, monitoring, and implementing appropriate security controls for network devices.

New cards
15

You are an information system auditor at HDA Inc. You want to discuss a few risks in relation to data quality. You should primarily contact :

A. Chief Financial Officer (CFO).

B. Chief Compliance Officer (CCO).

C. Information Security Team

D. Business owner.

Business owner

Explanation: The business owner holds the primary responsibility for the data and related processes within an organization. As such, they are best positioned to understand the potential impact of IT control risks on data quality and make informed decisions about accepting those risks. The business owner has a deep understanding of the business objectives, requirements, and dependencies associated with the data, enabling them to weigh the potential benefits and consequences of accepting such risks.

New cards
16

You are an information system auditor at HDA Inc. You are reviewing the organization’s data classification scheme. You should be primarily determine that:

A. The data classification scheme is reviewed and updated regularly

B. The procedure to protect the information is documented for each type of classification

C. The data classification scheme is aligned with industry standards

D. The data classification scheme is reviewed by an external auditor

The procedure to protect the information is documented for each type of classification

Explanation: Having a documented procedure in place for protecting information based on its classification helps to ensure that the appropriate level of protection is applied to the information. This can help to prevent unauthorized access or disclosure of sensitive information, and can help to ensure that the information is protected in accordance with its level of sensitivity.

New cards
17

You are an information system auditor at HDA Inc. You are reviewing the organization‘s data migration procedure. Which of the following is the most important action?

A. Availability of migration audit procedure

B. Compliance with data protection regulations.

C. Documentation of project timelines.

D. Availability of a roll-back plan.

Availability of a roll-back plan

Explanation: When evaluating an organization‘s data conversion and infrastructure migration plan, the availability of a roll-back plan is the most important aspect for an IS auditor to verify. A roll-back plan outlines the procedures and steps to revert to the previous state in case the data conversion or infrastructure migration encounters issues or failures. It is a crucial risk mitigation measure that ensures business continuity and minimizes potential disruptions or data loss during the conversion or migration process. Verifying the availability of a roll-back plan demonstrates that the organization has considered the potential risks and has a contingency strategy in place to address unforeseen issues.

New cards
18

You are an information system auditor at HDA Inc. You are evaluating data backup procedures of the organization. Which of the following is the most important aspect to ensure availability of backup data in case of a disaster?

A. Regularly updating backup software.

B. Implementing robust access controls.

C. Frequent restoration testing.

D. Frequent patch management procedures

Frequent restoration testing.

Explanation: To ensure that a backup copy is available for the after a disaster, frequent restoration testing is the best practice. Restoration testing involves periodically testing the backup copies to verify their integrity and the ability to restore the data successfully. By conducting these tests regularly, the organization can identify any issues or discrepancies with the backup data and take corrective actions in a timely manner. This ensures that in the event of a disaster, the mission-critical data can be restored promptly without any loss or corruption.

New cards
19

You are an information system auditor at HDA Inc. Your IT head has requested you to suggest the best alternative for backup storage considering the shortage of backup devices. Your best recommendation would be: 

A. Full backup procedure.

B. Differential backup procedure.

C. Real time backup procedure.

D. Mirror backup procedure.

Differential backup procedure

Explanation: When there is a shortage of backup devices, the best alternative for backup storage is the differential backup procedure. In a differential backup approach, only the data that has changed since the last full backup is backed up. This means that each differential backup captures all the changes made to the data since the last full backup, regardless of subsequent backups. This approach allows for a more efficient backup process and reduces the storage space required compared to a full backup procedure.

New cards
20

Which of the following is considered as a preventive control?

A. Implement audit procedures

B. Implement log monitoring procedures

C. Implement access review procedures

D. Implement secure data disposal procedures

Implement secure data disposal procedures

Explanation: Implementing secure data disposal procedures is a preventive control because it aims to prevent the unauthorized access or disclosure of sensitive information by properly disposing of data when it is no longer needed. By securely disposing of data, the risk of data leakage or unauthorized disclosure is reduced.

The other options are detective controls rather than preventive controls.

New cards
21

You are an information system auditor of HDA Inc. A critical application of HDA was developed by a small vendor who has gone out of business. Additionally, you have noted that the code available under escrow is an old version. In this situation, what is your best recommendation?

A. Create a new application from scratch

B. Seek alternative vendors to replace the defunct vendor

C. Update the source code to the latest version available

D. Determine the business risk associated with using the older version

Determine the business risk associated with using the older version

Explanation: he best recommendation in this scenario is to determine the business risk associated with using the older version of the application‘s source code. As the small vendor is no longer in business and the available code is outdated, it is crucial to assess the potential risks involved in using the older version. This evaluation helps identify any security vulnerabilities, compatibility issues, or functional limitations that may arise from utilizing outdated code. By understanding the business risks, HDA Inc. can make informed decisions about the application, such as whether to update the code, seek alternative vendors, or develop a new application.

New cards
22

You are an information system auditor of HDA Inc. You have discovered that various business units within the organization have directly purchased cloud-based applications without involving the IT department. In this context, which area is of most concern?

A. Application may not be included in BCP (Business Continuity Plan)

B. Procurement policy may not be followed

C. Increased operational costs

D. Application may not support information security requirements of the IT

Application may not support information security requirements of the IT

Explanation: The area of most concern in this situation is that the purchased cloud-based applications may not support the information security requirements of the IT department. When business units directly purchase applications without IT involvement, there is a risk that the applications may not meet the necessary security standards and protocols established by the IT department. This can lead to vulnerabilities, data breaches, and unauthorized access to sensitive information.

New cards
23

What is the objective of a top-down maturity model?

A. To establish a hierarchy of processes within an organization

B. To identify the processes that need to be improved

C. To assess the industry level performance

D. To standardize processes across different departments

To identify the processes that need to be improved

Explanation: The objective of a top-down maturity model is to assess the maturity and effectiveness of processes within an organization and identify areas that require improvement. By using this model, organizations can evaluate their processes from a high-level perspective and drill down to specific processes or sub-processes. The primary goal is to identify areas of weakness or inefficiency, allowing organizations to focus their efforts on improving those processes.

New cards
24

You are an information system auditor of HDA Inc. You are currently evaluating the effectiveness of controls in the company‘s information system. In this context, which of the following options would be the MOST effective method for you to employ in order to assess the adequacy of controls?

A. Risk assessment

B. Policy review

C. Control testing

D. Incident response analysis

Control testing

Explanation: Control testing refers to the process of evaluating the implementation and functionality of controls within an information system. It involves conducting various tests and procedures to verify whether the controls are operating as intended and effectively mitigating risks. While risk assessment (option A) is an important activity in identifying and prioritizing risks, it does not directly assess the effectiveness of controls.

New cards
25

You are an information system auditor at HDA Inc. You are reviewing a newly acquired system for a critical process. You should be primarily concerned about:

A. Inadequate user training on the new system.

B. Lack of documentation for system configuration.

C. New system does not support the data format of the legacy system.

D. Insufficient system performance monitoring.

New system does not support the data format of the legacy system.

Explanation: When reviewing the deployment of a new automated system, finding that the new system does not support the data format of the legacy system presents the most significant risk. This finding indicates that there may be challenges in migrating or integrating the existing data from the legacy system into the new system. It can result in data loss, data corruption, or data inconsistency, which can impact business operations, decision-making, and data integrity. It may require additional effort and resources to convert or transform the data to a compatible format, leading to potential delays, cost overruns, and system performance issues.

New cards
26

Upon identification of data mismatch in product profitability reports produced by Guava Trading Inc’s finance and marketing department, the information systems auditor should recommend:

A. standardization of reporting tools

B. establishing and/or enhancing the data governance process

C. conducting a formal user acceptance testing for all reports before productionization

D. obtaining formal management sign-offs for all reports before productionization

establishing and/or enhancing the data governance process

Explanation: The mismatch between the product profitability report produced by the two departments of the same organization reflects an underlying weakness in how the data is created and used across the organization which is best addressed by implementing an adequate data governance process in the organization.

New cards
27

Jim, an information security architect with the Cocoa Exports Company, is overseeing the implementation of a remote virtual private network (VPN) in the organization. The VPN is intended to allow external system development services providers to securely participate in the extranet using public networks. Identify the most prevalent security risk with this implementation. [BFI]

A. Bank's VPN gateway could be compromised

B. Partner's VPN logon could be spoofed

C. Partner's VPN traffic could be sniffed and decrypted

D. Malicious code could spread across the network

Malicious code could spread across the network

Explanation: The most prevalent security risk with VPN implementation to allow external partners to collaborate and join the extranet is the spread of malicious code to the network. In general, VPN technology has robust controls against other listed threats.

New cards
28

Identify the correct option from following to ensure the confidentiality, integrity, and authenticity of a message. [BFC]

A. Encrypt the hash of the message and message with the sender's private key and the receiver's private key respectively

B. Encrypt the hash of the message and message with the sender's private key and the receiver's public key respectively

C. Encrypt the hash of the message and message with the sender's public key and the receiver's public key respectively

D. Encrypt the hash of the message and message with the sender's public key and the receiver's private key respectively

Encrypt the hash of the message and message with the sender's private key and the receiver's public key respectively

Explanation: Encryption of the hash of the message with the sender’s private key ensures message integrity and authenticity. Encryption of message with the receiver’s public key ensures confidentiality.

New cards
29

The system has a defined RPO of 24 hours. Identify from following a suitable restoration mechanism commensurating with the business requirement.

A. Mirroring

B. Tape restoration

C. Disk-based backups

D. Real-time replication

Tape restoration

Explanation: The tape restoration method is suitable for a system that has a recovery point objective (RPO) of 24 hours. Real-time replication, mirroring and restoration from disk-based backups are better suited for systems with a shorter RPO.

New cards
30

Lisa, an information systems auditor at a non-profit charitable organization, is reviewing the security of the wireless network. Identify a concerning observation from the following.

A. Media access control (MAC) address filtering used

B. Broadcasting of service set identification (SSID) enabled

C. Wi-fi protected access (WPA/WPA2) enabled

D. All wireless clients and devices have antivirus software installed

Broadcasting of service set identification (SSID) enabled

Explanation: Most concerned about an enabled SSID broadcasting since it allows a user to browse for available wireless networks and to access them without authorization. set identifier (SSID) is a unique identifier, also referred to as a network name, that acts as a password when a mobile device tries to connect to the basic service set (BSS).

New cards
31

Identify a relevant contract term to be included in the agreement for a third-party alternate site BCM arrangements. [BEB]

A. Round the clock guarded security

B. Total number of concurrent users (subscribers)

C. Feedback and references by other industry subscribers

D. Total number of contracted subscribers

Total number of concurrent users (subscribers)

Explanation: It is important for a subscriber to include a contract term in the agreement for a third-party alternate site BCM arrangements to limit the number of concurrent users (subscribers). This helps to address the concern about whether the vendor can sustain to the reliability of the site(s) being.

New cards
32

Fair Lending has implemented a disaster recovery plan. Andrew, CFO of Fair Lending, wants to ensure that the implemented plan is adequate. Identify the immediate next step from the following. [AGJ]

A. Initiate the Full Operational Test

B. Initiate the Desk-based Evaluation

C. Initiate the Preparedness Test

D. Socialize with the Senior Management and Obtain Sponsorship

Initiate the Desk-based Evaluation

Explanation: The immediate next step to evaluate the adequacy of a disaster recovery plan once it has been implemented is to conduct a desk-based evaluation which is also known as a paper test. The paper test involves walking through the plan and discussion on what might happen in a particular type of service disruption with the major stakeholders. As per the best practice, the paper test precedes the preparedness test.

New cards
33

Identify from following that is not a valid network resiliency method.

A. Diverse routing

B. Alternative routing

C. Redundancy

D. Tape backups

Tape backups

Explanation: Tape backups are not really relevant to network resiliency.

New cards
34

Jim, an information security architect with the Cocoa Exports Company, is tasked to identify a suitable quantitative measure to aid in the selection of a better performing biometric device. Identify the best measure from the following.

A. False Rejection Rate

B. Estimated Error Rate

C. False Acceptance Rate

D. Equal Error Rate

Equal Error Rate (EER)

Explanation: Equal error rate (EER) is a quantitative measure combining the false acceptance rate and false rejection rate. A lower equal error rate value is a measure of higher accuracy of a biometric system.

New cards
35

Andrew, CFO of Fair Lending, is working on a business expansion plan to have a street presence across North America. Andrew wants to ensure the disaster recovery plan is comprehensive and provides adequate coverage in a potential business interrupting scenario. The other consideration for Andrew is to have an adequate and cost-effective evaluation method. Identify suitable evaluation methods from the following.

A. Preparedness Test

B. Full Operational Test

C. Desk-based Evaluation

D. Annual Tape Backup Recovery Test

Preparedness Test

Explanation: A preparedness test is a localized version of a full operational test, wherein actual resources are expended in the simulation of a system crash. This test is performed regularly on different aspects of the disaster recovery plan and can be a cost-effective way to gradually obtain evidence about how good the plan is whereas a full operational test is one step away from an actual service disruption and may not be cost-effective. The desk-based evaluation also called a paper test, may not be sufficient to test all necessary aspects of a disaster recovery plan.

New cards
36

Lorena, an information systems auditor with the Town Bank, observed an inadequate coverage of potential risks in the security policy likely arising from an inadequate security policy development process. Lorena should recommend the following. [AGD]

A. Asset identification be ensured as part of security policy development

B. Business objectives are considered while developing the security policy

C. The outcome of the risk management process be considered while developing the security policy

D. The software design decisions are made based on the security policy and guidelines

The outcome of the risk management process be considered while developing the security policy

Explanation: The outcome of the risk management process is considered while developing the security policy to ensure adequate coverage to underlying risks.

New cards
37

Lisa, an information systems auditor at a non-profit charitable organization, is reviewing password protection controls in the organization. Lisa is concerned that a malicious actor could steal passwords without the use of computers or programs. What is Lisa concerned about?

A. Wireshark

B. Keylogger

C. Social engineering techniques

D. Network sniffers

Social engineering techniques

Explanation: Social engineering thrives on weakness in human behavior and exploits the weaknesses. A malicious actor could deploy social engineering techniques to compromise the passwords without using a computer or a program.

New cards
38

Identify a valid statement about disaster recovery testing methods from the following.

A. Checklist review is about moving the systems to the alternate processing site and performing processing operations

B. Structured walk-through involves representatives from each of the functional areas coming together to go over the plan

C. Full interruption test is conducted by distributing copies of the plan to the various functional areas for review

D. Structured walk-through involves all employees who participate in the day-to-day operations coming together to practice executing the plan

Structured walk-through involves representatives from each of the functional areas coming together to go over the plan

Explanation: During the structured walk-through, the functional area representatives come together to go over the plan i.e. implement the plans on paper and review each step to assess its effectiveness, identify enhancements, constraints, and deficiencies.

New cards
39

Easy Micropayments wants to amend the existing outsourced services contracts to minimize costs and improve service levels. Identify from following the most useful clause for Easy Micropayments to consider introducing in the contracts to achieve the stated objective.

A. Adopt the fixed bid contract model

B. Adopt the time and material contract model

C. Penalties for non-compliance to agreed service levels

D. Gain-sharing performance bonuses

Gain-sharing performance bonuses

Explanation: Introducing gain-sharing performance bonuses may prove the best clause to introduce since it motivates the outsourced services provider to achieve the objective that may eventually help Easy Micropayments achieve its objective of minimizing costs as well as improve service levels. Changing the contract model to a fixed bid or to time and material may be helpful but the question does not include enough information to determine the best model. Implementing penalties for non-compliance is helpful only to a limited extent.

New cards
40

Julio, head of information technology architecture with the Palm Trading Company, thinks that transaction audit trails are essential for a well-designed system. Identify the main consideration of Julio in this case. [AJD]

A. Transaction audit trails are for information systems auditors to help them in transactions tracing

B. Transaction audit trails help to make capacity planning more accurate by providing useful data for planning

C. Transaction audit trails are essential for ensuring non-repudiation

D. Transaction audit trails help to improve the efficiency of the backup process

Transaction audit trails are essential for ensuring non-repudiation

Explanation: The main consideration for Julio to think the usefulness of transaction audit trails is that they help to determine accountability and responsibility for processed transactions, and ensuring non-repudiation.

New cards
41

An information systems auditor discovers that some magnetic hard drives disposed of by Guava Trading Inc were not sanitized in a manner that would reasonably ensure the data could not be recovered. In addition, the enterprise does not have a written policy on data disposal. The first step for the auditor to take:

A. Develop an appropriate data disposal policy for the organization

B. Discuss with the business unit head for their view on the data disposal practices

C. Draft an audit finding, and discuss it with the audit leader

D. Determine the sensitivity of the data on the magnetic hard drives

Determine the sensitivity of the data on the magnetic hard drives

Explanation: The immediate first step for an auditor will to determine the sensitivity of the data on inadequately disposed of disks.

New cards
42

Identify an optional component of the business continuity plan from the following. [WTCSFHBHYCISA]

A. Transportation plan

B. Continuity of operations plan

C. Disaster Recovery Plan

D. Business resumption plan

Transportation plan

Explanation: Mandatory components of a business continuity plan are (1) continuity of operations plan, (2) disaster recovery plan, and (3) business resumption plan. A transportation plan falls under non-mandatory or optional components.

New cards
43

Blue Xylo Systems, a software development startup, intends to implement a suitable testing method to test the functional operating effectiveness of the information system without regard to any specific internal program structure. Identify from following the right testing method to meet this objective.

A. Alpha test

B. Beta test

C. Black box test

D. White box test

Black box test

Explanation: Black box testing is a test type that does not require knowledge of internal working or program logic and is usually a tool-driven testing form. It is a testing method to focus on the information system’s functional operating effectiveness without regard to any specific internal program structure.

New cards
44

Identify from the following the best technique to assist in project duration estimation.

A. Component-based development

B. Program evaluation and review technique (PERT) chart

C. Artificial intelligence (AI)

D. Software cost estimation

Program evaluation and review technique (PERT) chart

Explanation: Program Evaluation and Review Technique (PERT) is a project management technique used in the planning and control of system projects. A PERT chart helps in identifying the duration of the project once all the activities and the work involved are known.

New cards
45

Jim, an information security architect with the Cocoa Exports Company, is overseeing the implementation of an intrusion detection system (IDS) in the organization. Identify the most important aspect of IDS implementation from the following. [BFB]

A. The resilience of the IDS system

B. Placement within the enterprise network

C. Adequate threat intelligence

D. Protection against DDoS attacks

Placement within the enterprise network

Explanation: An intrusion detection system (IDS) secures networks and complements firewalls by monitoring network usage anomalies on routers and firewalls. Placement of the intrusion detection systems (IDS) within the enterprise network is most crucial amongst the available options. Improper placement of an IDS may not provide sufficient coverage of key network parts thus becoming less effective.

New cards
46

The firm’s in-house financial management application data is migrated to a new vendor supported off-the-shelf industry renown financial management product. Which of the following stakeholders should be primarily responsible for reviewing and signing-off on the accuracy and completeness of the data before going live?

A. Data Owner

B. Firm's Migration Project Manager

C. Internal Audit Department

D. Vendor's Implementation Manager

Data Owner

Explanation: The “data owner”, usually from the business leadership, is the rightful owner of the underlying business data – therefore is responsible for making sure the data accuracy and completeness.

New cards
47

Cocoa Exports is exploring an online business model to boost their revenue. Jim, an information security architect, is tasked to adequately protect the online platform’s confidentiality, authentication, non-repudiation, and integrity. Identify the best control mechanism from the following.

A. Virtual Private Network (VPN)

B. Transport Layer Security (TLS)

C. Public Key Infrastructure (PKI)

D. Secure Sockets Layer (SSL)

Public Key Infrastructure

Explanation: Public key infrastructure (PKI) provides the best overall protection ensuring confidentiality, integrity, and reliability.

New cards
48

The sender A sends a message to the receiver B. The message hash and the message itself is encrypted by A’s private key. Identify from the following the purpose of this encryption arrangement. [BGF]

A. Authenticity and Integrity

B. Authenticity and Privacy

C. Integrity and Privacy

D. Privacy and Nonrepudiation

Authenticity and Integrity

Explanation: Since the message can be decrypted by the sender’s public key. this method won’t ensure the privacy of the message. However, this encryption arrangement is helpful in ensuring the authenticity of the sender and the message integrity.

New cards
49

Their security responsibilities include authorizing access, ensuring that access rules are updated when personnel changes occur, and regularly review access rules for the data for which they are responsible. Identify the appropriate role for the abovementioned responsibility.

A. Data Users

B. Data Custodians

C. Data Owners

D. Security Administrator

Data Owners

Explanation: The mentioned responsibility falls under the remit of data owners. Data owners are usually business leaders responsible for using information for running and controlling the business. Data custodians are people responsible for storing and safeguarding the data and include IT personnel. Data users include the user communities with access levels authorized by the data owners. Security administrators have the responsibility to provide physical and logical security for data, software, and hardware.

New cards
50

An information systems auditor, while reviewing the IT strategic plan, should ensure that the plan:

A. identifies and addresses the required operational controls

B. recognizes the need and incorporates cutting edge technology

C. a long-term plan describing how IT resources will contribute to the enterprise’s strategic objectives

D. clearly sets out project management practices

a long-term plan describing how IT resources will contribute to the enterprise’s strategic objectives

Explanation: IT strategic plan is a long-term plan (i.e. three to five-year horizon) in which business and IT management cooperatively describe how IT resources will contribute to the enterprise’s strategic objectives (goals).

New cards
51

Identify the correct answer from the following to be included in an organization’s information systems security policy? [ACE]

A. Relevant software security features

B. Criteria for access authorization

C. Inventory of key IT resources to be secured

D. Identity of sensitive security features

Criteria for access authroization

Explanation: The security policy provides the broad framework of security including a definition of those authorized to grant access and the basis for granting the access. Other choices are more detailed and are likely candidates for inclusion in standards/procedures.

New cards
52

Identify the correct feature of a digital signature from below that confirms the authorizer of a transaction or sender of a message unrefutably.

A. Nonrepudiation

B. Confidentiality

C. Encryption

D. Authorization

E. Integrity

F. Authentication

Nonrepudiation

Explanation: The feature that ensures undeniability is called nonrepudiation. Digital signatures are used to sign the transactions to confirm the authorization which cannot be denied later.

New cards
53

Biometrics is a security technique used in modern systems and implementations to verify identity by analyzing a unique physical attribute of an individual such as a handprint. Identify a valid example of a biometric replay attack from the following.

A. Use in multi-factor authentication (MFA) to authorize access

B. Using a copy of the impression left on the thumbprint scanner

C. Use of stolen biometric information to launch a brute force

D. Use of shoulder surfing to gain unauthorized access

Using a copy of the impression left on the thumbprint scanner

Explanation: A biometric replay attack is carried out using residual biometric information such as a thumb impression on a biometric scanner.

New cards
54

The information system auditor discovers that both the technology and accounting functions are being performed by the same user of the financial system during a compliance audit of a small local cooperative bank. Identify the best supervisor review control from the following:

A. Database table dump containing audit trails of date/time of each transaction

B. Daily summary of number of transactions and sum total of value of each transaction

C. User account administration report

D. Computer log files that show individual transactions in the financial system

Computer log files that show individual transactions in the financial system

Explanation: While other supervisory review controls are important, the most important in this situation is to review the computer log files that show individual transactions in the financial system

New cards
55

Manuel, CFO at Evergreen Bank, has requested reviewing and updating business continuity plans (BCP) as needed. As part of this exercise business impact analysis (BIA) is also being reviewed and re-validated. Identify from following the primary purpose of BIA in business continuity planning.

A. Identify business and operational continuity impacting events

B. Ensuring adequate coverage to diverse operations resumption requirements

C. Senior management emphasis on physical and logical security

D. Emphasize information security and data privacy requirements

Identify business and operational continuity impacting events

Explanation: Business impact analysis (BIA) is a key step in the business continuity strategy development and implementation of countermeasures, known as the business continuity plan (BCP) altogether. BIA identifies business and operational continuity impacting events that are then used in the development of an effective business continuity plan (BCP).

New cards
56

Frank, an information security analyst at Micro Lending Inc, has been tasked to classify enterprise information assets. Identify from following the primary control objective for this classification.

A. Establish information assets access controls guidelines

B. Ensure all information assets have the same level of rigorous access controls

C. Input to a risk assessment performed by the management and auditors

D. Determine information assets be insured

Establish information assets access controls guidelines

Explanation: Information asset classification helps to establish information assets access controls guidelines in the firm. Information assets need to have access control based on the sensitivity and criticality of systems and data in order to meet business objectives and regulatory requirements.

New cards
57

Bily is an information systems auditor at Easy Micropayments. The organization has been recently downsized. In addition, an organizational restacking exercise has also taken place. Identify Bily’s primary focus in a logical access controls review initiated soon after this event.

A. The auditor is concerned about all system access is authorized and appropriate for an individual's role and responsibilities considering the leavers/movers in the organization

B. The auditor wants to ensure that the management has authorized appropriate access for all newly-hired individuals

C. The auditor wants to ensure that the existing process of access authorization forms, that is used to grant or modify access to individuals, remains operational

D. The auditor wants to ensure that only the system administrators have the authority to grant or modify access to individuals

The auditor is concerned about all system access is authorized and appropriate for an individual's role and responsibilities considering the leavers/movers in the organization

Explanation: The auditor’s primary focus will be test logical access control to ensure that access for all leavers have been revoked and those who have changed is concerned about all system access is authorized and appropriate for an individual’s role and responsibilities considering the leavers/movers in the organization would have increased significantly due to the downsizing and restacking exercises.

New cards
58

Lorena, an information systems auditor with the Town Bank, conducted a review of the bank’s core banking system and observed anomalous data attributes in some accounting tables. Identify the most effective control that the IT department implements to avoid such anomalies in the future.

A. Implement sample review by IT department

B. Implement database integrity constraints

C. Implement logging controls for all tables

D. Implement before-and-after image reporting

Implement database integrity constraints

Explanation: Database integrity constraints are automated and preventive controls to ensure the integrity of the data attributes, tables, and the entire database. The constraints can help to validate the data against the predefined master data, against the predefined ruleset and the tables against each other for referential integrity.

New cards
59

Blue Xylo Systems, a software development startup, intends to implement a suitable testing method to test the effectiveness of software program logic and determine the procedural accuracy of a program’s specific logic paths. Identify from following the right testing method to meet this objective. [BIG]

A. Black box test

B. Structured walkthrough

C. White box test

D. Paper test

White box test

Explanation: White box testing is a test type that focuses on the effectiveness of software program logic and uses test data to determine the procedural accuracy of a program’s specific logic paths.

New cards
60

Identify the correct option from the following that uses test data as part of a comprehensive test of program controls for ongoing accurate operation of the system.

A. Base-Case System Evaluation (BCSE)

B. System Integration Test

C. Parallel Run

D. Test Data

Base-Case System Evaluation (BCSE)

Explanation: Base case system evaluation (BCSE) uses a standardized body of data created for testing purposes. Users normally establish the data. Base cases validate production application systems and test the ongoing accurate operation of the system.

New cards
61

The Federal Information Processing Standards (FIPS) are primarily for use by (choose all that apply):

A. All non-military government agencies

B. US government contractors

C. A private and public colleges in the US

D. All military government agencies

All non-military government agencies &

US government contractors

Explanation: Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States Federal government for use by all nonmilitary government agencies and by government contractors. Many FIPS standards are modified versions of standards used in the wider community.

New cards
62

Most trojan horse programs are spread through:

A. e-mails.

B. MS Office.

C. Word template.

D. MP3.

e-mails

Explanation: Most trojan horse programs are spread through e-mails. Some earlier trojan horse programs were bundled in “”Root Kits””. For example, the Linux Root Kit version 3 (lrk3) which was released in December 96 had tcp wrapper trojans included and enhanced in the kit. Portable devices that run Linux can also be affected by trojan horse. The Trojan.Linux.JBellz Trojan horse runs as a malformed mp3 file.

New cards
63

One major improvement in WPA over WEP is the use of a protocol which dynamically changes keys as the system is used. What protocol is this?

A. EKIP

B. TKIP

C. OKIP

D. SKIP

E. RKIP

TKIP

Explanation: Wi-Fi Protected Access (WPA / WPA2) is a class of systems to secure wireless computer networks. It implements the majority of the IEEE 802.11i standard, and is designed to work with all wireless network interface cards (but not necessarily with first generation wireless access points). One major improvement in WPA over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used.

New cards
64

Which of the following are examples of tools for launching Distributed DoS Attack (choose all that apply):

A. TFN

B. TFN2K

C. Trin00

D. Tripwire

E. Stacheldracht

TFN

TFN2K

Trin00

Stacheldracht

Explanation: Distributed DoS Attack is a network-based attack from many servers used remotely to send packets. Examples of tools for conducting such attack include TFN, TFN2K, Trin00, Stacheldracht, and variants. The best defense is to make sure all systems patches are up-to-date. Also make sure your firewalls are configured appropriately.

New cards
65

To install backdoors, hackers generally prefer to use:

A. either Trojan horse or eavedropper.

B. either eavedropper or computer worm.

C. either Trojan horse or computer worm.

D. either Tripwire or computer virus.

either Trojan horse or computer worm

Explanation: A backdoor is a method of bypassing normal authentication procedures. Many computer manufacturers used to preinstall backdoors on their systems to provide technical support for customers. Hackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, hackers prefer to use either Trojan horse or computer worm.

New cards
66

Gimmes often work through:

A. email attachment

B. SMS

C. news

D. file download

E. IRC chat

email attachment

Explanation: Gimmes take advantage of curiosity or greed to deliver malware. Also known as a Trojan Horse, gimmes can arrive as an email attachment promising anything. The recipient is expected to give in to the need to the program and open the attachment. In addition, many users will blindly click on any attachments they receive that seem even mildly legitimate.

New cards
67

Default permit is only a good approach in an environment where:

A. security threats are serious and severe.

B. security threats are non-existent or negligible.

C. security threats are non-negligible.

D. users are trained.

security threats are non-existent or negligible

Explanation: Everything not explicitly permitted is forbidden (default deny) improves security at a cost in functionality. This is a good approach if you have lots of security threats. On the other hand, Everything not explicitly forbidden is permitted (default permit) allows greater functionality by sacrificing security. This is only a good approach in an environment where security threats are non- existent or negligible.

New cards
68

Which of the following is a tool you can use to simulate a big network structure on a single computer?

A. honeyd

B. honeytube

C. honeymoon

D. honeytrap

honeyd

Explanation: honeyd is a GPL licensed software you can use to simulate a big network structure on a single computer.

New cards
69

Integer overflow occurs primarily with:

A. input verifications

B. debug operations

C. output formatting

D. string formatting

E. arithmetic operations

arithmetic operations

Explanation: An integer overflow occurs when an arithmetic operation attempts to create a numeric value that is larger than can be represented within the available storage space. On some processors the result saturates – once the maximum value is reached attempts to make it larger simply return the maximum result.

New cards
70

Which of the following types of attack makes use of unfiltered user input as the format string parameter in the printf() function of the C language?

A. format string vulnerabilities

B. command injection

C. buffer overflows

D. code injection

E. integer overflow

format string vulnerabilities

Explanation: Format string attacks are a new class of vulnerabilities recently discovered. It can be used to crash a program or to execute harmful code. The problem stems from the use of unfiltered user input as the format string parameter in certain C functions that perform formatting, such as printf(). A malicious user may use the %s and %x format tokens, among others, to print data from the stack or possibly other locations in memory. One may also write arbitrary data to arbitrary locations using the %n format token.

New cards
71

What should be done to determine the appropriate level of audit coverage for an organization’s IT environment?

A. define an effective system upgrade methodology.

B. determine the company's quarterly budget requirement.

C. calculate the company's yearly budget requirement.

Ddefine an effective network implementation methodology.

E. define an effective assessment methodology.

define an effective assessment methodology

Explanation: To determine the appropriate level of audit coverage for the organization’s IT environment, you must define an effective assessment methodology and provide objective information to prioritize the allocation of audit resources properly.

New cards
72

Effective transactional controls are often capable of offering which of the following benefits (choose all that apply):

A. shortened contract cycle times

B. reduced administrative and material costs

C. enhanced procurement decisions

D. diminished legal risk

all of the options

Explanation: Transactional systems provide a baseline necessary to measure and monitor contract performance and provide a method for appraising efficiency against possible areas of exposure. Effective transactional controls reduce administrative and material costs, shorten contract cycle times, enhance procurement decisions, and diminish legal risk.

New cards
73

The PRIMARY purpose of implementing Redundant Array of Inexpensive Disks (RAID) level 1 in a file server is to:

A. ensure availability of data.

B. provide user authentication.

C. achieve performance improvement.

D. ensure the confidentiality of data.

ensure availability of data

Explanation: AID level 1 provides disk mirroring. Data written to one disk are also written to another disk. Users in the network access data in the first disk; if disk one fails, the second disk takes over. This redundancy ensures the availability of data. RAID level 1 does not improve performance, has no relevance to authentication and does nothing to provide for data confidentiality.

New cards
74

Which of the following terms is used more generally for describing concealment routines in a malicious program?

A. trojan horse

B. worm

C. rootkits

D. virus

E. spyware

rootkits

Explanation: Rootkits can prevent a malicious process from being reported in the process table, or keep its files from being read. Originally, a rootkit was a set of tools installed by a human attacker on a Unix system where the attacker had gained administrator access. Today, the term is used more generally for concealment routines in a malicious program.

New cards
75

Iptables is based on which of the following frameworks?

A. NetDoom

B. NetCheck

C. Netfilter

D. NetSecure

Netfilter

Explanation: ipchains is a free software based firewall running on earlier Linux. It is a rewrite of ipfwadm but is superseded by iptables in Linux 2.4 and above. Iptables controls the packet filtering and NAT components within the Linux kernel. It is based on Netfilter, a framework which provides a set of hooks within the Linux kernel for intercepting and manipulating network packets.

New cards
76

Which of the following is a good time frame for making changes to passwords?

A. every 30 to 45 days

B. every 180 to 365 days

C. every 10 to 20 days

D. every 90 to 120 days

every 90 to 120 days

Explanation: Passwords are the first defensive line in protecting your data and information. A good password has mixed-case alphabetic characters, numbers, and symbols. Make sure to use a password that is at least eight or more characters. You may want to run a “”password cracker”” program periodically, and require users to immediately change any easily cracked passwords. In any case ask them to change their passwords every 90 to 120 days.

New cards
77

Why is it not preferable for a firewall to treat each network frame or packet in isolation?

A. Such a firewall has no way of knowing if any given packet is part of an existing connection, is trying to establish a new connection, or is just a rogue packet.

B. Such a firewall is too complicated to maintain.

C. Such a firewall offers poor compatibility.

D. Such a firewall is CPU hungry.

E. Such a firewall is costly to setup.

Such a firewall has no way of knowing if any given packet is part of an existing connection, is trying to establish a new connection, or is just a rogue packet.

Explanation: A stateless firewall treats each network frame or packet in isolation. Such a firewall has no way of knowing if any given packet is part of an existing connection, is trying to establish a new connection, or is just a rogue packet.

New cards
78

Which of the following refers to an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer?

A. integer misappropriation

B. code injection

C. buffer overflow

D. format string vulnerabilities

buffer overflow

Explanation: A buffer overflow is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include other buffers, variables and program flow data.

New cards
79

Which of the following is not a good tactic to use against hackers?

A. Enticement

B. Entrapment

Entrapment

Explanation: Enticement occurs after somebody has gained unlawful access to a system and then subsequently lured to a honey pot. Entrapment encourages the commitment of unlawful access. The latter is not a good tactic to use as it involves encouraging someone to commit a crime.

New cards
80

Cisco IOS based routers perform basic traffic filtering via which of the following mechanisms?

A. stateful inspection

B. datagram scanning

C. state checking

D. link progressing

E. access lists

access lists

Explanation: In addition to deploying stateful firewall, you may setup basic traffic filtering on a more sophisticated router. As an example, on a Cisco IOS based router you may use ip access lists (ACL) to perform basic filtering on the network edge. Note that if they have denied too much traffic, something is obviously being too restrictive and you may want to reconfigure them.

New cards
81

Buffer overflow aims primarily at corrupting:

A. network firewall

B. system memory

C. disk storage

D. system processor

system memory

Explanation: A buffer overflow is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include other buffers, variables and program flow data.

New cards
82

Which of the following software tools is often used for stealing money from infected PC owner through taking control of the modem?

A. System patcher

B. T1 dialer

C. Porn dialer

D. T3 dialer

E. War dialer

Porn dialer

Explanation: One way of stealing money from infected PC owner is to take control of the modem and dial an expensive toll call. Dialer such as porn dialer software dials up a premium-rate telephone number and leave the line open, charging the toll to the infected user.

New cards
83

The ‘trusted systems’ approach has been predominant in the design of:

A. the IBM AS/400 series

B. the SUN Solaris series

C. many earlier Microsoft OS products

D. most OS products in the market

many earlier Microsoft OS products

Explanation: The ‘trusted systems’ approach has been predominant in the design of many Microsoft OS products, due to the long-standing Microsoft policy of emphasizing functionality and ‘ease of use’.

New cards
84

What is wrong with a Black Box type of intrusion detection system?

A. you cannot test it

B. you cannot examine its internal workings from outside.

C. you cannot tune it

D. you cannot patch it

you cannot examine its internal workings from outside

Explanation: An intrusion detection system should to able to run continually without human supervision. The system must be reliable enough to allow it to run in the background of the system being observed.However, it should not be a black box, because you want to ensure its internal workings are examinable from outside.

New cards
85

With Deep packet inspection, which of the following OSI layers are involved?

A. Layer 3 through Layer 7

B. Layer 2 through Layer 7

C. Layer 3 through Layer 6

D. Layer 2 through Layer 5

E. Layer 2 through Layer 6

Layer 2 through Layer 7

Explanation: Deep packet inspection (DPI) is a form of computer network packet filtering that examines the data part of a through-passing packet, searching for non- protocol compliance or predefined criteria to decide if the packet can pass. DPI devices have the ability to look at Layer 2 through Layer 7 of the OSI model.

New cards
86

In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as:

A. trojannets

B. botnets

C. wormnets

D. spynets

E. rootnets

botnets

Explanation: In order to coordinate the activity of many infected computers, attackers ave used coordinating systems known as botnets. In a botnet, the malware or malbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously.

New cards
87

Under the concept of “”defense in depth””, subsystems should be designed to:

A. fail secure

B. react to attack

C. react to failure

D. fail insecure

fail secure

Explanation: With “defense in depth”, more than one subsystem needs to be compromised to compromise the security of the system and the information it holds. Subsystems should default to secure settings, and wherever possible should be designed to “ail secure rather than fail insecure

New cards
88

In a botnet, malbot logs into a particular type of system for making coordinated attack attempts. What type of system is this?

A. SMS system

B. Chat system

C. Email system

D. Log system

E. Kernel system

Chat system

Explanation: In order to coordinate the activity of many infected computers, attackers have used coordinating systems known as botnets. In a botnet, the malware or malbot logs in to an Internet Relay Chat channel or other chat system. The attacker can then give instructions to all the infected systems simultaneously.

New cards
89

Back Orifice is an example of:

A. a virus.

B. a backdoor that takes the form of an installed program.

C. a legitimate remote control software.

D. an eavesdropper.

Explanation: A backdoor may take the form of an installed program (e.g., Back Orifice) or could be in the form of an existing “legitimate” program, or executable file. A specific form of backdoors are rootkits, which replaces system binaries and/or hooks into the function calls of the operating system to hide the presence of other programs, users, services and open ports.

New cards
90

Which of the following are often considered as the first defensive line in protecting a typical data and information environment?

A. certificates

B. password

C. biometrics

D. security token

password

Explanation: Passwords are the first defensive line in protecting your data and information. Your users need to be made aware of what a password provides them and what can be done with their password. They also need to be made aware of the things that make up a good password versus a bad password.

New cards
91

Screening router inspects traffic through examining:

A. virus payload

B. message header.

C. attachment type

D. message content

message header

Explanation: The simplest and almost cheapest type of firewall is a packet filter that stops messages with inappropriate network addresses. It usually consists of a screening router and a set of rules that accept or reject a message based on information in the message header.

New cards
92

If a database is restored using before-image dumps, where should the process begin following an interruption?

A. After the last transaction

B. As the last transaction before the latest checkpoint

C. As the first transaction after the latest checkpoint

D. Before the last transaction

Before the last transaction

Explanation: If before images are used, the last transaction in the dump will not have updated the database prior to the dump being taken. The last transaction will not have updated the database and must be reprocessed. Program checkpoints are irrelevant in this situation.

New cards
93

Which of the following terms refers to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders?

A. ILP&C

B. ILR&D

D. ILD&P

E. ICT&P

ILD&P

Explanation: Information Leakage Detection and Prevention (ILD&P) is a computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders. Network ILD&P are gateway-based systems installed on the organization’s internet network connection and analyze network traffic to search for unauthorized information transmissions. Host Based ILD&P systems run on end-user workstations to monitor and control access to physical devices and access information before it has been encrypted.

New cards
94

What would be the major purpose of rootkit?

A. to encrypt files for system administrators.

B. to corrupt files for system administrators.

C. to hijack system sessions.

D. to hide evidence from system administrators.

to hide evidence from system administrators.

Explanation: rootkit originally describes those recompiled Unix tools that would hide any trace of the intruder. You can say that the only purpose of rootkit is to hide evidence from system administrators so there is no way to detect malicious special privilege access attempts.

New cards
95

Which of the following is by far the most common prevention system from a network security perspective?

A. Hardened OS

B.Firewall

C. Intrusion Prevention System (IPS)

D. Intrusion Detection System (IDS)

E. Tripwire

Firewall

Explanation: User account access controls and cryptography can protect systems files and data, respectively. On the other hand, firewalls are by far the most common prevention systems from a network security perspective as they can shield access to internal network services, and block certain kinds of attacks through packet filtering.

New cards
96

Everything not explicitly permitted is forbidden has which of the following kinds of tradeoff?

A. it improves functionality at a cost in security.

B. it improves performance at a cost in functionality.

C. it improves security at a cost in system performance.

D. it improves security at a cost in functionality.

it improves security at a cost in functionality.

Explanation: Everything not explicitly permitted is forbidden (default deny) improves security at a cost in functionality. This is a good approach if you have lots of security threats. On the other hand, Everything not explicitly forbidden is permitted (default permit) allows greater functionality by sacrificing security. This is only a good approach in an environment where security threats are non- existent or negligible.

New cards
97

Which of the following refers to a method of bypassing normal system authentication procedures?

A. trojan horse

B. backdoor

C. virus

D. rootkits

E. worm

backdoor

Explanation: A backdoor is a method of bypassing normal authentication procedures. Many computer manufacturers used to preinstall backdoors on their systems to provide technical support for customers. Hackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors, hackers prefer to use either Trojan horse or computer worm.

New cards
98

Which of the following BEST describes the concept of “defense in depth”?

A. more than one subsystem needs to be compromised to compromise the security of the system and the information it holds.

B. multiple firewalls are implemented.

C. intrusion detection and firewall filtering are required.

D. multiple firewalls and multiple network OS are implemented.

more than one subsystem needs to be compromised to compromise the security of the system and the information it holds.

Explanation: With ”defense in depth”, more than one subsystem needs to be compromised to compromise the security of the system and the information it holds. Subsystems should default to secure settings, and wherever possible should be designed to “fail secure” rather than “fail insecure”

New cards
99

Which of the following types of attack often take advantage of curiosity or greed to deliver malware?

A. Soft coding

B. Tripwire

C. Gimmes

D. Pretexting

E. Icing

Gimmes

Explanation: Gimmes take advantage of curiosity or greed to deliver malware. Also known as a Trojan Horse, gimmes can arrive as an email attachment promising anything. The recipient is expected to give in to the need to the program and open the attachment. In addition, many users will blindly click on any attachments they receive that seem even mildly legitimate.

New cards
100

Pretexting is an act of:

A. social engineering

B. eavedropping

C. DoS

D. soft coding

E. hard coding

social engineering

Explanation: Pretexting is the act of creating and using an invented scenario to persuade a target to release information or perform an action and is usually done over the telephone. It is more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information.

New cards

Explore top notes

note Note
studied byStudied by 344 people
752 days ago
5.0(2)
note Note
studied byStudied by 5 people
815 days ago
5.0(1)
note Note
studied byStudied by 138 people
970 days ago
5.0(1)
note Note
studied byStudied by 16 people
691 days ago
5.0(2)
note Note
studied byStudied by 35 people
861 days ago
5.0(1)
note Note
studied byStudied by 16 people
720 days ago
5.0(1)
note Note
studied byStudied by 31 people
521 days ago
5.0(1)
note Note
studied byStudied by 15 people
741 days ago
5.0(2)

Explore top flashcards

flashcards Flashcard (33)
studied byStudied by 9 people
757 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 4 people
543 days ago
5.0(3)
flashcards Flashcard (22)
studied byStudied by 57 people
708 days ago
4.5(2)
flashcards Flashcard (50)
studied byStudied by 5 people
554 days ago
5.0(1)
flashcards Flashcard (42)
studied byStudied by 12 people
485 days ago
5.0(1)
flashcards Flashcard (33)
studied byStudied by 1 person
694 days ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 23 people
780 days ago
5.0(1)
flashcards Flashcard (54)
studied byStudied by 18568 people
709 days ago
4.5(362)
robot