2. From a control perspective, the PRIMARY objective of classifying information assets is to:



Similar documents
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Section 12 MUST BE COMPLETED BY: 4/22

CTS2134 Introduction to Networking. Module Network Security

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Controls for the Credit Card Environment Edit Date: May 17, 2007

Guideline on Auditing and Log Management

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

GFI White Paper PCI-DSS compliance and GFI Software products

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

USM IT Security Council Guide for Security Event Logging. Version 1.1

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

436 Which of the following functions should be performed by the application owners to

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Payment Card Industry Self-Assessment Questionnaire

ICANWK406A Install, configure and test network security

Global Partner Management Notice

Achieving PCI-Compliance through Cyberoam

Payment Card Industry (PCI) Compliance. Management Guidelines

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Wireless Network Security

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

SonicWALL PCI 1.1 Implementation Guide

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

E-BUSINESS THREATS AND SOLUTIONS

74% 96 Action Items. Compliance

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

PCI DSS Requirements - Security Controls and Processes

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

A Rackspace White Paper Spring 2010

Course: Information Security Management in e-governance

Chapter 84. Information Security Rules for Street Hail Livery Technology System Providers. Table of Contents

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Passing PCI Compliance How to Address the Application Security Mandates

Cisco Advanced Services for Network Security

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Network Security: Introduction

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

INTRUSION DETECTION SYSTEMS and Network Security

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

Ovation Security Center Data Sheet

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Chapter 9 Firewalls and Intrusion Prevention Systems

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

COSC 472 Network Security

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Module 4 Protection of Information Systems Infrastructure and Information Assets. Chapter 6: Network Security

Security Goals Services

Content Teaching Academy at James Madison University

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Securing Cisco Network Devices (SND)

Central Agency for Information Technology

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Technical Standards for Information Security Measures for the Central Government Computer Systems

Site to Site Virtual Private Networks (VPNs):

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Network Instruments white paper

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

FileCloud Security FAQ

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

This chapter covers the following topics:

Did you know your security solution can help with PCI compliance too?

Network Incident Report

Fundamentals of Network Security - Theory and Practice-

Network Security Guidelines. e-governance

Security vulnerabilities in the Internet and possible solutions

How To Prevent Hacker Attacks With Network Behavior Analysis

HANDBOOK 8 NETWORK SECURITY Version 1.0

By David G. Holmberg, Ph.D., Member ASHRAE

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Security Awareness. Wireless Network Security

NON-PROFIT ORGANIZATIONS NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT CONTRACTING

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Network- vs. Host-based Intrusion Detection

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Becoming PCI Compliant

Data Management Policies. Sage ERP Online

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Security Recommendations for Multifunction Printers Will Urbanski, Virginia Tech IT Security Office and Lab

Network Segmentation

Transcription:

MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected on the network? a) Use the IP address of an existing file server or domain controller b) Pause the scanning every few minutes to allow thresholds to reset c) Conduct the scans during evening hours when no one is logged- in d) Use multiple scanning tools since each tool has different characteristics 2. From a control perspective, the PRIMARY objective of classifying information assets is to: a) Establish guidelines for the level of access controls that should be assigned b) Ensure access controls are assigned to all information assets c) Assist management and auditors in risk assessment d) Identify which assets need to be insured against losses 3. Which of the following types of penetration tests simulates a real attack and is used to test incident handling and response capability of the target? a) Blind testing b) Targeted testing c) Double- blind testing d) External testing 4. Which of the following is a passive attack to a network? a) Message modification b) Masquerading c) Denial of service d) Traffic analysis 5. Which of the following is the BEST way to handle obsolete magnetic tapes before disposing of them? a) Overwriting the tapes b) Initializing the tape labels c) Degaussing the tapes d) Erasing the tapes

6. Which of the following wide area network (WAN) transmission techniques offers the BEST error and flow control procedures while transmitting data? a) Message switching b) Packet switching c) Circuit switching d) Virtual circuits 7. A business application system accesses a corporate database using a single ID and password embedded in a program. Which of the following would provide efficient access control over the organization's data? a) Introduce a secondary authentication method such as card swipe b) Apply role- based permissions within the application system c) Have users input the ID and password for each database transaction d) Set an expiration period for the database password embedded in the program 8. An IS Auditor has observed brute- force attacks on the administrator account. The BEST recommendation to prevent a successful brute force attack would be to: a) Increase the password length for the user b) Configure a session timeout mechanism c) Perform periodic vulnerability scans d) Configure a hard- to- guess username 9. A technical lead who was working on a major project has left the organization. The project manager reports suspicious system activities on one of the servers that is accessible to the whole team. What would be of GREATEST concern if discovered during a forensic investigation? a) Audit logs are not enabled for the system b) A logon ID for the technical lead still exists c) Spyware is installed on the system d) A Trojan is installed on the system 10. Certification of an enterprise's public key by a recognized authority is essential because: a) The publicly available key might have been revoked b) Everyone has access to the enterprise's public key c) The enterprise's private key is not published d) The enterprise's public key may not be linked to the private key used

11. Which of the following is the MOST effective method for dealing with the spreading of a network worm that exploits vulnerability in a protocol? a) Install the vendor s security fix for the vulnerability b) Block the protocol traffic in the perimeter firewall c) Block the protocol traffic between internal network segments d) Stop the service until an appropriate security fix is installed 12. The BEST way to minimize the risk of communication failures in an e- commerce environment would be to use a) Compression software to minimize transmission duration b) Functional or message acknowledgments c) A packet- filtering firewall to reroute messages d) Leased asynchronous transfer mode lines 13. Naming conventions for system resources are important for access control because they a) Ensure that resource names are not ambiguous b) Reduce the number of rules required to adequately protect resources c) Ensure that user access to resources is clearly and uniquely identified d) Ensure that internationally recognized names are used to protect resources 14. A hacker could obtain passwords without the use of computer tools or programs through the technique of a) Social engineering b) Sniffers c) Back doors d) Trojan horses 15. Which of the following implementation modes would provide the GREATEST amount of security for outbound data connecting to the Internet? a) Secure Sockets Layer (SSL) mode b) Tunnel mode with AH plus ESP c) Triple Data Encryption Standard (triple DES) encryption mode d) Transport mode with authentication header (AH) plus encapsulating security payload (ESP)

16. An IS auditor reviewing the operating system integrity of a server would PRIMARILY: a) Verify that privileged programs or services cannot be invoked by user programs b) Determine whether administrator accounts have proper password controls c) Ensure that tile permissions are correct on configuration tiles d) Verify that programs or services running on the server are from valid sources 17. An organization stores and transmits sensitive customer information within a secure wired network. IT has implemented an additional wireless local area network (WLAN) to support general- purpose staff computing needs. A few employees with WLAN access have legitimate business reasons for also accessing customer information. Which of the following represents the BEST control to ensure separation of the two networks? a) Establish two physically separate networks b) Implement virtual local area network (VLAN) segmentation c) Install a dedicated router between the two networks d) Install a firewall between the networks 18. ABC Inc. offers a number of services though its web site. During one day, senior executives of ABC Inc. were surprised to discover that sensitive data on their servers were being leaked to unauthorized individuals on the Internet. Post incident investigations revealed that ABC lnc.'s key servers were infected with a Trojan. The incident occurred alter deployment of a newly acquired module from a software vendor, which was tested on test servers in accordance with functional specifications. The incident had gone unnoticed for a period of about four weeks. A potential cause of the leak may have been malware embedded in the new module: Intrusion detection system (IDS) Vulnerability scan process Firewall rule set review Access control monitoring 19. What is the BEST way to verify that a digital signature is valid? a) Verify that the sender's public key certificate is from a trusted certificate authority (CA) b) Use a hash algorithm from the CA to determine whether the message has been tampered with c) Verify the digital signature through a manual comparison of the hash value d) Obtain the public key from the sender, and verify the digital signature

20. Which of the following Internet security threats could compromise integrity? a) Theft of data from the client b) Exposure of network configuration information c) A Trojan horse browser d) Eavesdropping on the net 21. Which of the following should concern an IS auditor when reviewing security in a client- server environment? a) Protecting data using an encryption technique b) Preventing unauthorized access using a diskless workstation c) Enabling users to access and modify the database directly d) Disabling floppy drives on the users' machines 22. A web server is attacked and compromised. Which of the following should be performed FIRST to handle the incident? a) Dump the volatile storage data to a disk b) Run the server in a fail- safe mode c) Disconnect the web server from the network d) Shut down the web server 23. An IS auditor at a bank is performing compliance testing and has discovered that one of the branches has virus signatures that have not been updated in over six months in this case, the IS auditor should recommend: a) Security awareness and education regarding the importance of updating antivirus software b) An automated process initiated from the main office to update antivirus software at each branch c) Reconfiguration of the firewall to a most- restrictive policy and implementation of an intrusion prevention system (IPS) d) That the branch re- certify the machines after the updates are installed 24. In Internet Protocol Security (IPSec), which of the following PRIMARILY provides data protection? a) Semantic net b) Encapsulated security payload (ESP) c) Authentication header (AH) d) Digital signature

25. During a review of intrusion detection logs an IS auditor notices traffic coming from the Internet which appears to originate from the Internal IP address of the company payroll server. Which of the following malicious activities would MOST likely cause this type of result? a) Denial- of- Service (DoS) attack b) Spoofing c) Port Scanning d) A man in the middle attack 26. An employee has received a digital photo frame as a gift and has connected it to his/her work PC to transfer digital photos. The PRIMARY risk that this scenario introduces is that: a) The photo frame storage media could be used to steal corporate data b) The drivers for the photo frame may be incompatible and crash the user's PC c) The employee may bring inappropriate photographs into the office d) The photo frame could be infected with malware 27. Which of the following functions should be performed by the application owners to ensure an adequate segregation of duties between IS and end users? a) System analysis b) Authorization of access to data c) Application programming d) Data administration 28. A new business application has been designed in a large, complex organization and the business owner has requested that the various reports be viewed on a need to know basis. Which of the following access control methods would be the BEST method to achieve this requirement? a) Mandatory b) Role based c) Discretionary d) Single Sign- On (SSO) 29. Certification of an enterprise's public key by a recognized authority is essential because: a) The publicly available key might have been revoked b) Everyone has access to the enterprise's public key c) The enterprise's private key is not published d) The enterprise's public key may not be linked to the private key used

30. When reviewing the procedures for the disposal of computers, which of the following should be the GREATEST concern for the IS auditor? a) Hard disks are overwritten several times at the sector level, but are not reformatted before leaving the organization b) All files and folders on hard disks are separately deleted, and the hard disks are formatted before leaving the organization c) Hard disks are rendered unreadable by hole- punching through the platters at specific positions before leaving the organization d) The transport of hard disks is escorted by internal security staff to a nearby metal recycling company, where the hard disks are registered and then shredded