Intro to Cyberspace & Cybersec Modules 7-12 Review Assignments

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/591

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

592 Terms

1
New cards

Upper management should learn more about the budgetary needs of the information security function and the positions within it. _____

True

False

True

2
New cards

The position of security analyst can be an entry-level position.

True

False

True

3
New cards

ISSEP stands for Information Systems Security Experienced Professional. _____

True

False

False

4
New cards

The general management community of interest must plan for the proper staffing of the information security function. _____

True

False

False

5
New cards

The use of standardized job descriptions can increase the degree of professionalism in the information security field.

True

False

True

6
New cards

Many who enter the field of information security are technical professionals such as _____ who find themselves working on information security applications and processes more often than traditional IT assignments.

All of the other answers are correct

networking experts or systems administrators

programmers

database administrators

All of the other answers are correct

7
New cards

When new employees are introduced into the organization's culture and workflow, they should receive an extensive information security briefing as part of their employee _____.

orientation

8
New cards

In many organizations, information security teams lack established rules and responsibilities.

True

False

False

9
New cards

_____ is the requirement that every employee be able to perform the work of another employee.

Two-man control

Duty exchange

Task rotation

Collusion

Task rotation

10
New cards

Friendly departures include termination for cause, permanent downsizing, temporary lay-off, or some instances of quitting. _____

True

False

False

11
New cards

Like the CISSP, the SSCP certification is more applicable to the security_____ than to the security _____.

technician, manager

manager, engineer

manager, technician

technician, executive

manager, technician

12
New cards

Which of the following is not one of the categories of positions defined by Schwartz?

Builder

Definer

User

Administrator

User

13
New cards

Many organizations use a(n) _____ interview to remind the employee of contractual obligations, such as nondisclosure agreements, and to obtain feedback on the employee's tenure in the organization.

hostile

departure

exit

termination

exit

14
New cards

Though CISOs are business managers first and technologists second, they must be conversant in all areas of information security, including the technical, planning, and _____ areas.

policy

15
New cards

The ISSEP concentration allows CISSP certificate holders to demonstrate expert knowledge of all of the following except _____.

international laws

technical management

systems security engineering

certification and accreditation/risk management framework

international laws

16
New cards

The _____ acts as the spokesperson for the information security team.

CISO

17
New cards

The process of integrating information security perspectives into the hiring process includes with reviewing and updating all job descriptions.

True

False

True

18
New cards

The information security function cannot be placed within physical security, as a peer of physical security or protective services.

True

False

False

19
New cards

Mandatory training provides the organization with the ability to audit the work of an individual. _____

True

False

False

20
New cards

The (ISC)2 CISSP concentrations are available for currently certified CISSP professionals to demonstrate knowledge that is part of the CISSP common body of knowledge.

True

False

False

21
New cards

The CISA credential is promoted by ISACA as the certification that is appropriate for all but which type of professionals?

accounting

auditing

networking

security

accounting

22
New cards

The security manager position is much more general than that of the CISO.

True

False

False

23
New cards

ISSAP stands for Information Systems Security Architecture Professional. _____

True

False

True

24
New cards

ISACA promotes the CISA certification as being appropriate for accounting, networking, and security professionals. _____

True

False

False

25
New cards

The (ISC)2 _____ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the basic certification's common body of knowledge.

C|CISO

CISSP

CISA

CISM

CISSP

26
New cards

The CISSP certification requires both the successful completion of the examination and a(n) _____ by a qualified third party, typically another similarly certified professional, the candidate's employer, or a licensed, certified, or commissioned professional.

endorsement

27
New cards

The advice "Know more than you say, and be more skillful than you let on" for information security professionals indicates that an information security professional should avoid speaking to users in technical jargon.

True

False

False

28
New cards

The Cybersecurity Analyst+ certification from _____ is an intermediate certification with both knowledge-based and performance-based assessment.

SANS

ISACA

ACM

CompTIA

CompTIA

29
New cards

To maintain a secure facility, all contract employees should be escorted from room to room, as well as into and out of the facility.

True

False

True

30
New cards

"Builders" in the field of information security provide day-to-day systems monitoring and are used to support an organization's goals and objectives.

True

False

False

31
New cards

The general management community of interest must work with information security professionals to integrate solid information security concepts into the personnel management practices of the organization.

True

False

True

32
New cards

_____ departures include resignation, retirement, promotion, or relocation.

Friendly

33
New cards

ISSMP stands for Information Systems Security Monitoring Professional. _____

True

False

False

34
New cards

The Associate of (ISC)2 program is geared toward those who want to take the CISSP or SSCP exam before obtaining the requisite _____ for certification.

experience

35
New cards

Many who move to business-oriented information security were formerly_____ who were often involved in national security or cybersecurity.

military personnel

lawyers

marketing managers

business analysts

military personnel

36
New cards

_____ are hired by the organization to serve in a temporary position or to supplement the existing workforce.

Consultants

Temporary employees

Self-employees

Contractors

Temporary employees

37
New cards

SANS developed a series of technical security certifications in 1999 that are known as the Global Information _____ Certification or GIAC family of certifications.

Assurance

38
New cards

In many cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates.

True

False

True

39
New cards

Because the goals and objectives of _____ and CISOs tend to contradict each other, InformationWeek recommends: "The people who do and the people who watch shouldn't report to a common manager."

CIOs

40
New cards

_____ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization's security technology is properly implemented.

CSOs

CISOs

Security managers

Security analysts

Security analysts

41
New cards

_____________ are contracted workers hired for a specific one-time purpose, commonly to provide expertise the organization does not have internally.

Consultants

42
New cards

The former System Administration, Networking, and Security Organization is now better known as _____.

SANO

SANSO

SANS

SAN

SANS

43
New cards

An organization should integrate security awareness education into a new hire's ongoing job orientation and make it a part of every employee's on-the-job security training.

True

False

True

44
New cards

_____ is a cornerstone in the protection of information assets and in the prevention of financial loss.

Business separation

Separation of duties

Fire suppression

Collusion

Separation of duties

45
New cards

The breadth and depth covered in each of the domains makes the _____ one of the most difficult-to-attain certifications on the market.

CISA

ISEP

Security+

CISSP

CISSP

46
New cards

The model commonly used by large organizations places the information security department within the _____ department.

production

physical security

management

information technology

information technology

47
New cards

In some organizations, the CISO's position may be combined with physical security responsibilities or may even

report to a security manager who is responsible for both logical (information) security and physical security and such a

position is generally referred to as a _____.

CSO

CNSO

CTO

CPSO

CSO

48
New cards

The (ISC)2 CISSP-ISSEP concentrationfocuses on the knowledge area including systems lifecycle management, threat intelligence and incident managements.

True

False

False

49
New cards

Existing information security-related certifications are typically well understood by those responsible for hiring in organizations.

True

False

False

50
New cards

A(n) _____ agency provides specifically qualified individuals at the paid request of another company.

temp

51
New cards

The SSCP examination is much more rigorous than the CISSP examination.

True

False

False

52
New cards

A background check must always be conducted to determine the level of trust the business can place in a candidate for an information security position.

True

False

True

53
New cards

It is important to gather employee _____ early about the information security program and respond to it quickly.

feedback

54
New cards

In most cases, organizations look for a technically qualified information security _____ who has a solid understanding of how an organization operates.

expert

specialist

generalist

internist

generalist

55
New cards

Security managers accomplish objectives identified by the CISO and resolve issues identified by technicians. _____

True

False

True

56
New cards

Security _____ are accountable for the day-to-day operation of the information security program.

managers

57
New cards

The CISA credential is geared toward experienced information security managers and others who may have similar management responsibilities. _____

True

False

False

58
New cards

Security managers accomplish _____ identified by the CISO and resolve issues identified by technicians

tasks

objectives

tactics

strategies

objectives

59
New cards

According to Schwartz, "_____" are the real techies who create and install security solutions.

Builders

Administrators

Definers

Engineers

Builders

60
New cards

To assess the effect that changes will have on the organization's personnel management practices, the organization should conduct a behavioral feasibility study before the program is _____.

planned

considered

budgeted

implemented

implemented

61
New cards

The latest forecasts for information security-related positions expect _____ openings than in many previous years..

fewer

more

the same number of

many fewer

more

62
New cards

The _____ is the title most commonly associated with the top information security officer in the organization.

CEO

CFO

CTO

CISO

CISO

63
New cards

Organizations are not required by law to protect employee information that is sensitive or personal.

True

False

False

64
New cards

Separation of _____ is used to reduce the chance of an individual violating information security and breaching the confidentiality, integrity, or availability of information.

duties

65
New cards

Once a candidate has accepted a job offer, the employment _____ becomes an important security instrument.

contract

66
New cards

ISACA offers the CGEIT as well as the CISA and _____ certifications.

CISM

67
New cards

The ISSMP concentration examination is designed to provide CISSPs with a mechanism to demonstrate competence in _____.

business continuity planning and disaster recovery planning

enterprise security management practices

security management practices

All of these answers are correct

All of these answers are correct

68
New cards

_____ are designed to recognize experts in their respective fields.

Certifications

69
New cards

CompTIA offers a vendor-specific certification program called the Security+ certification.

True

False

False

70
New cards

Security administrators are accountable to provide day-to-day systems monitoring to support an organization's goals

and objectives.

True

False

True

71
New cards

Security administrators provide day-to-day systems monitoring to support an organization's goals and objectives.

True

False

True

72
New cards

To assess the effect that changes will have on the organization's personnel management practices, the organization should conduct a _____feasibility study before the program is implemented.

behavioral

73
New cards

In many organizations, information security teams lack established roles and responsibilities.

True

False

True

74
New cards

The information security function can be placed within the _____.

All of the other answers are correct

legal department

administrative services function

insurance and risk management function

All of the other answers are correct

75
New cards

Many hiring managers in information security prefer to recruit a security professional who alreadyhas proven HR skills and professional experience, since qualified candidates with information security experience are scarce. _____

True

False

False

76
New cards

"Administrators" provide the policies, guidelines, and standards in the Schwartz classification. _____

True

False

False

77
New cards

The most common credential for a CISO-level position is the Security+ certification. _____

True

False

False

78
New cards

The process of ensuring that no unnecessary access to data exists and that employees are able to perform only the minimum operations necessary on a set of data is referred to as the principle of _____.

(2 Words)

least privilege

79
New cards

Related to the concept of separation of duties is that of _____, the requirement that two individuals review and approve each other's work before the task is categorized as finished.

two-person control

80
New cards

Job _____ can greatly increase the chance that an employee's misuse of the system or abuse of information will be detected by another employee.

rotation

81
New cards

GIAC stands for Global Information Architecture Certification. _____

True

False

False

82
New cards

A firewall device must never be accessible directly from the _____ network.

public

83
New cards

In most common implementation models, the content filter has two components: _____.

rating and filtering

allow and deny

filtering and encoding

rating and decryption

rating and filtering

84
New cards

The static packet filtering firewall can react to an emergent event and update or create rules to deal with that event. _____

True

False

False

85
New cards

Most current operating systems require specialized software to connect to VPN servers, as support for VPN services is no longer built into the clients.

True

False

False

86
New cards

The architecture of a(n) _____ firewall protects a DMZ.

(2 Words)

screened subnet

87
New cards

When a bastion host approach is used, the host contains two CPUs, forcing all traffic to go through the device. _____

True

False

False

88
New cards

Discretionary access control is an approach whereby the organization specifies use of resources based on the assignment of data classification schemes to resources and clearance levels to users.

True

False

False

89
New cards

Authentication is a mechanism whereby unverified entities who seek access to a resource provide a label by which they are known to the system. _____

True

False

False

90
New cards

Because the _____ host stands as a sole defender on the network perimeter, it is commonly referred to as the sacrificial host.

trusted

DMZ

domain

bastion

bastion

91
New cards

A(n) intranet ​is a segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public. _____

True

False

False

92
New cards

The application firewall is also known as a(n) application layer _____ server.

proxy

93
New cards

_____ inspection firewalls keep track of each network connection between internal and external systems.

Stateful

Dynamic

Static

Stateless

Stateful

94
New cards

When Web services are offered outside the firewall, SMTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture. _____

True

False

False

95
New cards

Authentication is the process of validating and verifying an unauthenticated entity's purported identity.

True

False

True

96
New cards

_____ filtering requires that the firewall's filtering rules for allowing and denying packets are manually developed and installed with the firewall.

Dynamic

Stateful

Static

Stateless

Static

97
New cards

In SESAME, the user is first authenticated to an authentication server and receives a token. The token is then presented to a privilege attribute server as proof of identity to gain a(n) _____.

VPN

ticket

PAC

ECMA

PAC

98
New cards

The _____ is an intermediate area between a trusted network and an untrusted network.

DMZ

domain

firewall

perimeter

DMZ

99
New cards

Kerberos _____ provides tickets to clients who request services.

AS

KDS

TGS

VPN

TGS

100
New cards

The DMZ can be a dedicated port on the firewall device linking a single bastion host.

True

False

True