Term
| If VoIP traffic needs to traverse through a WAN with congestion, you need |
|
Definition
|
|
Term
| T/F The up-to-date Common Vulnerabilities & Exposure list is maintained and managed by the U.S. Department of Finance. |
|
Definition
|
|
Term
| T/F The Delphi method is the estimated loss due to a specific realized threat. The formula to calculate this loss is =SLE × ARO. |
|
Definition
|
|
Term
| What is meant by multi-tenancy? |
|
Definition
| A database feature that allows different groups of users to access the database without being able to access each other’s data. |
|
|
Term
| Which of the following is the definition of system owner? |
|
Definition
| The person responsible for the daily operation of a system and for ensuring that the system continues to operate in compliance with the conditions set out by the AO. |
|
|
Term
| A security awareness program includes |
|
Definition
All: teaching employees about security objectives motivating users to comply with security policies informing users about trends and threats in society |
|
|
Term
| T/F System owners are in control of data classification. |
|
Definition
|
|
Term
| Voice and unified communications are ________ applications that use 64-byte IP packets. |
|
Definition
|
|
Term
| T/F A way to protect your organization from personnel-related security violationsis to use job rotation. This minimizes risk by rotating employees among various systems or duties, which prevents collusion. |
|
Definition
|
|
Term
| What term is used to describe communication that doesn’t happen in real time but rather consists of messages (voice or e-mail) that are stored on a server and downloaded to endpoint devices? |
|
Definition
| store-and-forward communications |
|
|
Term
| What is meant by promiscuous mode? |
|
Definition
| The mode in which sniffers operate; it is nonintrusive and does not generate network traffic. This means that every data packet is captured and can be seen by the sniffer. |
|
|
Term
| The act of transforming clear text data into undecipherable cipher text is the definition of __________. |
|
Definition
|
|
Term
| ________ is the difference between the security controls you have in place and the controls youneed to have in place in order to address all vulnerabilities. |
|
Definition
|
|
Term
| The recovery point objective (RPO) identifies the amount of _________ that is acceptable. |
|
Definition
|
|
Term
| T/F The term Bring Your Own Device (BYOD) refers to an organizational policy of allowing or even encouraging employees, contractors, and others to connect their own personal equipment to the corporate network; this offers cost savings and other benefits but also presents security risks. |
|
Definition
|
|
Term
| T/F Until the mid-1980s, personal and business communications involved three primary tools: telephone, answering machines and voicemail, and the Internet. |
|
Definition
|
|
Term
| SIP is a ___________ protocol used to support real-time communications. |
|
Definition
|
|
Term
| A ________ is a collection of computers connected to one another or to a common connection medium. |
|
Definition
|
|
Term
| T/F A DoS attack is a coordinated attempt to deny service by causing a computer to perform an unproductive task. |
|
Definition
|
|
Term
| ________ is the basis for unified communications and is the protocol used by real-timeapplications such as IM chat, conferencing, and collaboration. |
|
Definition
| Session Initiation Protocol (SIP) |
|
|
Term
| T/F Authority-level policy is adatabase feature that allows different groups of users to access the database without being able to access each other’s data. |
|
Definition
|
|
Term
| Which of the following adequately defines continuous authentication? |
|
Definition
| An authentication method in which a user is authenticated at multiple times or event intervals. |
|
|
Term
| What is meant by call control? |
|
Definition
| The software in a phone system that performs the call switching from an inboundtrunk to a phone extension. |
|
|
Term
| What is meant by digital subscriber line (DSL)? |
|
Definition
| A high-speed digital broadband service that uses copper cabling for Internet access. |
|
|
Term
| What is the Project Management Body of Knowledge (PMBOK)? |
|
Definition
| A collection of the knowledge and best practices of the project management profession. |
|
|
Term
| T/F The network security group is responsible for the Internet-to-WAN Domain. |
|
Definition
|
|
Term
| What name is given to a high-speed broadband networking technology that uses a 53-byte cell to support real-time voice, video, or data communications? |
|
Definition
| dense wavelength division multiplexing (DWDM) |
|
|
Term
| What is meant by risk register? |
|
Definition
| A list of identified risks that results from the risk-identification process. |
|
|
Term
| A method of restricting resource access to specific periods of time is called ________. |
|
Definition
|
|
Term
| ________ is a method that black-hat hackers use to attempt to compromise logon and password access controls, usually following a specific attack plan, including the use of social engineering to obtain user information. |
|
Definition
| Brute-force password attack |
|
|
Term
| T/F A benchmark is the standard by which a system is compared to determine whether it is securely configured. One technique in an audit is to compare the current setting of a computer or device with a benchmark to help identify differences. |
|
Definition
|
|
Term
| ________ states that users must never leave sensitive information in plain view on an unattended desk or workstation. |
|
Definition
| Clean desk/clear screen policy |
|
|
Term
| T/F Many jurisdictions require audits by law. |
|
Definition
|
|
Term
| T/F The difference between black-hat hackers and white-hat hackers is that black-hat hackers are mainly concerned with finding weaknesses for the purpose of fixing them, and white-hat hackers want to find weaknesses just for the fun of it or to exploit them. |
|
Definition
|
|
Term
| What is meant by rootkit? |
|
Definition
| A type of malware that modifies or replaces one or more existing programs to hide the fact that a computer has been compromised. |
|
|
Term
| T/F AnSOC 1 report is commonly implemented for organizations that must comply with Sarbanes-Oxley (SOX) or the Gramm-Leach-Bliley Act (GLBA). |
|
Definition
|
|
Term
| T/F Having too many risks in the risk register is much better than overlooking any severe risk that does occur. |
|
Definition
|
|
Term
| The physical part of the LAN Domain includes a __________, which is an interface between the computer and the LAN physical media. |
|
Definition
| network interface card (NIC) |
|
|
Term
| What is meant by certification? |
|
Definition
| The technical evaluation of a system to provide assurance that you have implemented the system correctly. |
|
|
Term
| Which of the following is the definition of business drivers? |
|
Definition
| The collection of components, including people, information, and conditions, that support business objectives. |
|
|
Term
| What is a Security Information and Event Management (SIEM) system? |
|
Definition
| Software and devices that assist in collecting, storing, and analyzing the contents of log files. |
|
|
Term
| T/F An attacker will use exploit software when performing vulnerability assessments and intrusive penetration testing. |
|
Definition
|
|
Term
| The goal of ____________ is to quantify possible outcomes of risks, determine probabilities of outcomes, identify high-impact risks, and develop plans based on risks. |
|
Definition
| quantitative risk analysis |
|
|
Term
| Because personnel are so important to solid security, one of the best security controls you can develop is a strong security ___________ and awareness program. |
|
Definition
|
|
Term
| As users upgrade LANs to GigE or 10GigE, switches must support ________ and data IP traffic. |
|
Definition
|
|
Term
| T/F Successfully connecting to a computer using a modem makes it impossible to access the rest of the organization’s network. |
|
Definition
|
|
Term
| E-commerce changed how businesses sell, and the ________ changed how they market. |
|
Definition
|
|
Term
| The ___________ framework defines the scope and contents of three levels of audit reports. |
|
Definition
| Service Organization Control (SOC) |
|
|
Term
| T/F Voice and data traffic should be segmented on different backbone links to optimize performance, segment voice, and data traffic on separate GigE or 10GigEfiber-optic trunks. |
|
Definition
|
|
Term
| T/F The International Information Systems Security Certification Consortium (ISC)2, has two certifications: Systems Security Certified Practitioner (SSCP®) and Certified Information Systems Security Professional (CISSP®). CISSP candidates must pass a difficult and comprehensive exam and have at least 5 years of professional information security experience. |
|
Definition
|
|
Term
| ________ is an authorization method in which access to resources is decided by the user’s formal status. |
|
Definition
|
|
Term
| T/F Resources are protected objects in a computing system, such as files, computers, or printers. |
|
Definition
|
|
Term
| An organization’s facilities manager might give you a security card programmed with your employee ID number, also known as a ________. |
|
Definition
|
|
Term
| T/F The weakest link in the security of an IT infrastructure is the server. |
|
Definition
|
|
Term
| You can use quantitative risk analysis for all risks on the risk register;however, the amount of effort required may be overkill for _____________ risks. |
|
Definition
low probability low impact |
|
|
Term
| T/F The audit itself sets new policies. |
|
Definition
|
|
Term
| What is meant by application convergence? |
|
Definition
| The integration of applications to enhance productivity. Unified communications is an example of application convergence. Unified communications integrates recorded voice messages into e-mail so that voice messages are retrievable via e-mail. |
|
|
Term
| The ____________ represents the fourth layer of defense for a typical IT infrastructure. |
|
Definition
|
|
Term
| Which of the following defines network mapping? |
|
Definition
| Using tools to determine the layout and services running on an organization’s systems and networks. |
|
|
Term
| Malicious software can be hidden in a ________. |
|
Definition
URL link PDF file ZIP file all of the above |
|
|
Term
| ________ is the process of managing changes to computer/device configuration or application software. |
|
Definition
|
|
Term
| This device uses public key infrastructure (PKI) technology—for example, a certificate signed by a trusted certification authority—and doesn’t provide one-time passwords. |
|
Definition
|
|
Term
| T/F The process of managing the baseline settings of a system device is the definition of configuration control. |
|
Definition
|
|
Term
| As your organization evolves and as threats mature, it is important to make sure your __________ still meet(s) the risks you face today. |
|
Definition
|
|
Term
| What name is given to a U.S. federal law that requires U.S. government agencies to protect citizens’ private data and have proper security controls in place? |
|
Definition
Federal Information Security Management Act (FISMA) Encryption |
|
|
Term
| A ________ examines the network layer address and routes packets based on routing protocol path determination decisions. |
|
Definition
|
|
Term
| Which of the following is the definition of net cat? |
|
Definition
| A network utility program that reads from and writes to network connections. |
|
|
Term
| ____________ is the amount of time it takes to recover and make a system, application, and data available for use after an outage. |
|
Definition
| Recovery time objective (RTO) |
|
|
Term
| The total number of errors divided by the total number of bits transmitted is the definition of __________. |
|
Definition
|
|
Term
| A common DSL service is ________, where the bandwidth is different for downstream and upstream traffic. |
|
Definition
| asymmetric digital subscriber line (ADSL) |
|
|
Term
| What fills security gaps and software weaknesses? |
|
Definition
| Testing and quality assurance |
|
|
Term
| T/F A physically constrained user interface isa user interface that does not provide a physical means of entering unauthorized information. |
|
Definition
|
|
Term
| What name is given to an attack that uses ping or ICMP echo-request, echo-reply messages to bring down the availability of a server or system? |
|
Definition
|
|
Term
| For all the technical solutions you can devise to secure your systems, the __________ remains your greatest challenge. |
|
Definition
|
|
Term
| RTO identifies the maximum allowable ________ to recover the function. |
|
Definition
|
|
Term
| T/F Even though 3G networks provided mobile devices with connection capabilities similar to those of wired networks, they still did not use true IP network addressing. |
|
Definition
|
|
Term
| T/F The Delphi method is the estimated loss due to a specific realized threat. The formula to calculate this loss is =SLE × ARO. |
|
Definition
|
|
Term
| T/F A time-based synchronization system is a mechanism that limits access to computer systems and network resources. |
|
Definition
|
|
Term
| T/F Single loss expectancy (SLE) means the expected loss for a single threat occurrence. The formula to calculate SLE is SLE= Resource Value × EF. |
|
Definition
|
|
Term
| Which of the following is the definition of pattern-based IDS? |
|
Definition
| An intrusion detection system that uses pattern matching and state full matching to compare current traffic with activity patterns (signatures) of known network intruders. |
|
|
Term
| _________ was developed for organizations such as insurance and medical claims processors, telecommunication service providers, managed services providers, and credit card transaction processing companies. |
|
Definition
|
|
Term
| What term is used to describe a packet-based WAN service capable of supporting one-to-many and many-to-many WAN connections? |
|
Definition
|
|
Term
| When you accept a __________, you take no further steps to resolve. |
|
Definition
|
|
Term
| Which of the following is the definition of cipher text? |
|
Definition
| The opposite of clear text. Data sent as cipher text is not visible and not decipherable. |
|
|
Term
| T/F In 2011, the United States ranked second globally as a source of network attacks and highest as a source of attacks in North America, even if they originate outside the United States. |
|
Definition
|
|
Term
T/F Sprint means one of the small project iterations used in the “agile” method of developing software, in contrast with the usual long project schedules of other ways of developing software. |
|
Definition
|
|
Term
| Security audits help ensure that your rules and __________ are up to date, documented, and subject to change control procedures. |
|
Definition
|
|
Term
| T/F Annual loss expectancy (ALE) means the process of identifying, assessing, prioritizing, and addressing risks. |
|
Definition
|
|
Term
| ________ is an authentication credential that is generally longer and more complex than a password. |
|
Definition
|
|
Term
| T/F Role-based access control (RBAC) means limiting users’ access to database views, as opposed to allowing users to access data in database tables directly. |
|
Definition
|
|
Term
| A parallel test evaluates the effectiveness of the ________ by enabling full processing capability at an alternate data center without interrupting the primary data center. |
|
Definition
|
|
Term
| T/F An organization can choose to plan for any interruption time frame, but in many BIAs, restoration plans assume that access to primary resources will not be possible for at least 60 days. |
|
Definition
|
|
Term
| Audio conferencing is a software-based, real-time audio conference solution for ________ callers. |
|
Definition
|
|
Term
| The primary difference between SOC 2 and SOC 3 reports is ________. |
|
Definition
|
|
Term
| T/F Initiating changes to avoid expected problems is the definition of proactive change management. |
|
Definition
|
|
Term
| T/F The process of managing the baseline settings of a system device is the definition of configuration control. |
|
Definition
|
|
Term
| Which of the following is an accurate description of cloud computing? |
|
Definition
| The practice of using computing services that are delivered over a network. |
|
|
Term
| T/F Synchronous token means a device used as a logon authenticator for remote users of a network. |
|
Definition
|
|
Term
| _____________ is the process of dividing a task into a series of unique activities performed by different people, each of whom is allowed to execute only one part of the overall task. |
|
Definition
|
|
Term
| T/F The term security kernel database describes a database made up of rules that determine individual users’ access rights. |
|
Definition
|
|
Term
| In a ________, the attacker sends a large number of packets requesting connections to the victim computer. |
|
Definition
|
|
Term
| The process of managing risks starts by identifying __________. |
|
Definition
|
|
Term
| During the late 1980s into the early 1990s, service providers converted the core switches at their central offices from ______________ to digital central office (CO) switches. |
|
Definition
|
|
Term
| The ________ in analog communications is one error for every 1,000 bits sent; in digital communications, the __________ is one error for every 1,000,000 bits sent. |
|
Definition
|
|
Term
| T/F Mandatory access control (MAC) isa means of restricting access to an object based on the object’s classification and the user’s security clearance. |
|
Definition
|
|
Term
| The tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and ________ Web site. |
|
Definition
| Secure Sockets Layer virtual private network (SSL-VPN) |
|
|
Term
| A(n) ___________ fingerprint scanner is a software program that allows an attackerto send logon packets to an IP host device. |
|
Definition
|
|
Term
| A___________ primarily addresses the processes, resources, equipment,and devices needed to continue conducting critical business activities when an interruption occurs that affects the business’s viability. |
|
Definition
| business continuity plan (BCP) |
|
|
Term
| What term is used to describe a reconnaissance technique that enables an attacker to use port mapping to learn which operating system and version arerunning on a computer? |
|
Definition
| operating system fingerprinting |
|
|
Term
| T/F SOC 3 reports are intended for public consumption. |
|
Definition
|
|
Term
| Which of the following is the definition of access control? |
|
Definition
| The process of protecting a resource so that it is used only by those allowed to use it; a particular method used to restrict or allow access to resources. |
|
|
Term
| What is meant by certification? |
|
Definition
| The technical evaluation of a system to provide assurance that you have implemented the system correctly. |
|
|
Term
| The goal and objective of a __________ is to provide a consistent definition for how an organization should handle and secure different types of data. |
|
Definition
| data classification standard |
|
|
Term
| T/F The term clipping level refers to a value used in security monitoring that tells controls to ignore activity that falls below a stated value. |
|
Definition
|
|
Term
| A _________ has a hostile intent, possesses sophisticated skills, and may be interested in financial gain. They represent the greatest threat to networks and information resources. |
|
Definition
|
|
Term
| A ___________ is a tool used to scan IP host devices for open ports that have been enabled. |
|
Definition
|
|
Term
| __________ tests interrupt the primary data center and transfer processing capability to an alternate site. |
|
Definition
|
|
Term
| War dialers are becoming more frequently used given the rise of digital telephony and now IP telephony or Voice over IP (VoIP). |
|
Definition
|
|
Term
| An encrypted channel used for remote access to a server or system, commonly used in Linux and UNIX servers and applications, is the definition of __________. |
|
Definition
|
|
Term
| T/F A physically constrained user interface isa user interface that does not provide a physical means of entering unauthorized information. |
|
Definition
|
|