記憶度
14問
35問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
You have just won a contact for a small software development firm, which has asked you to perform a risk analysis. The firm provided you information on previous incidents and has a list of the known environmental threats in the geographic area. The firm’s president believes that risk is something that can be eliminated. As a CISSP, how should you respond to this statement?
Risk can be reduced, but cannot be eliminated.
2
Which term describes the method of identifying vulnerabilities and threats and assessing the possible damage to determine where to implement security safeguards?
Risk analysis
3
Proper security management dictates separation of duties of all the following reasons except which one?
It reduces the need for personnel.
4
As a potencial CISSP, you need to know Common Request for Comments (RFCs) and National Institute of Standards and Technology (NIST) standards. One such RFC is 2196. This Internet Engineering Task Force (IETF) document provides basic guidance on security in a networked environment. What is the title of this document?
“Site Security Handbook”
5
Mr. Hunting, your former college math teacher, hears that you are studying for your CISSP exam and asks if you know the formula for total risk. What is the correct response?
Threat * Vulnerability * Asset Value = Total Risk
6
What document gives detailed instructions on how to perform specific operations, providing a step-by-step guide?
Procedures
7
Your CEO has hinted that security audits may be implemented next year. As a result, your director has become serious about performing some form of risk assessment. You are delegated the task of determining which type of risk assessment to perform. The director wants to learn more about the type of risk assessment that involves a team of internal business managers and technical staff. He does not want the assessment to place dollar amounts on identified risks. He wants the group to assign one of 26 common controls to each threat as it is identified. Which type of riks assessment does your manager want?
Facilitated Risk Assesment Process (FRAP)
8
Which of the following is a document that is considered high-level in that it defines formal rules by which employees of the organization must abide?
Policies
9
Management requires that all employees with a company laptop keep their virus signatures up to date and run a full system scan at least weekly. It is suggested, however, that they update signatures every night if possible. In what document type would such suggestions likely be made?
Guidelines
10
What document is similar to a standard, but provides only broad guidance and recommendations?
Guidelines
11
You are asked to speak at the next staff meeting about security governance and discuss why risk analysis is important. What will you say?
Risk analysis is something every company should perform to demonstrate that it is in control of its assets, resources, and destiny.
12
One of your coworkers, who knows that you are studying for your CISSP exam, comes to you with the following question: What is a cost-benefit analysis? How will you answer?
A cost-benefit analysis should identify safeguards that offer the maximum amout of protection for the minimum cost.
13
Your risk management team has just finished calculating the treats to a company during a disaster. They determine that the company will suffer long-term reputation damage in the community that will reduce their future customer base in the event off a Personally Identifiable Information (PII) breach. The team believes that customers will go to another company. This is an example of:
Delayed loss
14
Your consulting firm has won a contract for a small, yet growing, technology firm. The CEO has wisely decided that the firm’s proprietary technology is worth protecting and wants to find out whether anyone is in noncompliance. Which of the following is NOT a reason why this organization should develop information classification?
Information classification should be implemented to ensure successful prosecution of intellectual property violators.
15
Your administrative assistant has started an online risk assessment certificate program. She has a question: What primary security concept difines the rights and privileges of a validated user? What will your answer be?
Authorization
16
Which of the following can be used to protect confidentiality?
Encryption
17
Your company has brought in a group of contract programmers and is concerned about the potential risk. Althogh management feels it is important to track these user’s activities, they also want to make sure that any changes to program code or data can be tied to a specific infividual. Which of the following best describes the means by which an individual cannot deny having performed an action or caused an event?
Nonrequdiation
18
Which of the following can be used to protect integrity?
Checksums
19
Christine has been given network access to pilot engineering design documents. Although she can view the documents, she cannot print them or make changes. Which of the following does she lack?
Authorization
20
Which of the following can be used to provide accountability?
Closed Circuit TV (CCTV)
21
Which of the following BEST describes estimating that a risk will happen, determining safeguards to mitigate a risk, assessing vulnerability, and assigning values to assets?
Risk analysis steps
22
Which of the following can be used to protect availability?
Redundant array of inexpensive disks (RAID)
23
Which data classification method uses labels such as “confidential”, “private”, and “sensitive”?
Commercial
24
Your risk assesment team has completed a review of the threat of natural disasters damaging your facility. Based on the information in Table 1.1, what is the Single Loss Expectancy (SLE) and the Annual Loss Expectancy (ALE)?
SLE is $300,000; the ALE is $30,000
25
Which data classification method uses labels such as “confidential”, “sensitive but unclassified”, and “unclassified”?
Government
26
You are an advisory board member for a local nonprofit organization. Because your fellow board members know of your expertise in security, they approach you with the following question: Who is ultimately responsible for information security? How will you answer them?
Senior management
27
Examine Table 1.2 and list which line item is NOT correct.
Facility
28
What is the correct order for the following items?
Identify, authenticate, authorize
29
What is ARO?
Annualized Rate of Occurrence
30
Which of the following does NOT require prior employee notification?
Monitoring unsuccessful login attempts
31
Your intern comes to you with the following question about your company’s change control board: What is NOT one of the primary reasons why a change control board is needed? How do you answer?
Change control is needed so that changes can be made quickly.
32
Which of the following should be performed in conjunction with a termination?
Exit interview
33
What is the highest level of government data classification?
Top secret
34
Your manager is concerned about a new piece of software being developed by a contractor. Your manager wants you to verify that no means of unauthenticated access is left in the finished product. What is another name for a method of unauthenticated access into a program?
Backdoor
35
Which of the following is the lowest level of private-sector data classification?
Public
36
Whose role is to examine security policies and procedures and provide reports to senior management about the effectiveness of security controls?
Auditor
37
What is the process of determining the level of risk at which the organization can operate and function effectively?
Risk mitigation
38
Who has the functional responsibility of security?
Infosec security officer
39
James, the summer intern, ask if you can show him how to calculate ALE. What do you tell him?
Single Loss Expectancy (SLE) * Annualized Rate of Occurrence (ARO) = ALE
40
What is the lowest level of government data classification?
Unclassified
41
Which of the following is NOT an acceptable response to risk?
Displacement
42
You are an advisory board member for a local organaization. The organization has been given a new server, and members plan to use it to connect their 20 client computers to the Internet for email access. Currently, none of these computers has antivirus software installed. Your research indicates that there is a 90 percent chance that these systems will become infected after email is in use. There’s a good chance that a virus could bring down the network for an entire day. The nonprofit’s 10 paid employees make about $12 an hour. A local vendor has offered to sell 20 copies of antivirus software to the nonprofit organization for $500. The nonprofit wants to know what the ALE for this proposed change would be. Assuming that employees work an eight-hour day, how you answer?
$864
43
The organization that you are an advisory board member of decides to go forward with the proposed Internet and email connectivity project. The CEO wants like to know how much money, if any, will be saved through the purchase of antivirus software. Here are the projected details: - 20 computers are connected to the Internet. - There’s a 90 percent probability of virus infection. - 10 paid employees make $12 an hour. - A successful virus outage could bring down the network for an entire day. - 20 copies of antivirus will cost the nonprofit $500.
$364
44
Which of the following describes the process of revealing only external properties to other components?
Data hiding
45
Which of the following is the highest level of private-sector (commercial) data classification?
Confidential
46
Which of the following is used to segregate details to focus on only one particular piece or item?
Abstraction
47
You have been asked to apply the principles of qualitative risk analysis to the organization. How do you accomplish this task?
(1) Develop risk scenarios, (2) analyze each scenario to determine the outcome, (3) rank the resulting risk and the importance of the asset.
48
According to NIST Special Publication (SP) 8002-7, what should be an organization’s goal in regard to risk?
Risk should be reduced to an acceptable level.
49
Your director has asked you to implement a security awareness program. When considering a security awareness program which of the following is NOT correct?
A security awareness program should run continuously and visibly reprimand those who are in noncompliance.
50
Management wants you to evaluate the organization’s security policy. Those at the organization believe that encryption should be used on their network now that it is connected to the Internet. Primarily, they are concerned that malicious hackers may be able to tap into their systems and steal donor information and demographic data. Based on the principles of risk management, what should your decision to use encryption be based on? Choose the most correct answer.
If the network is vulnerable, the cost of protecting the system should be weighed against the costs associated with such a disclosure.
51
Data abstraction is a practical necessity at what Trusted Computer System Evaluation Criteria (TCSEC) layer?
B3
52
You work for a company that has a large web-based storefront. Recently, a vulnerability was discovered in the application’s front-end software. If this vulnerability is exploited, your company’s database could be breached. Any breach would mean the loss of competitive customer account information. Although no credit card information is on file, any pilfered information would result in the demise of your corporation. This website produces $500,000 in profit monthly. A new commercial application to secure websites like your company’s is available for $2 million. Your current application’s vendor is writing a patch to make available a workaround product that costs $20,000. Your insurance company will not cover any damages that occur under your current configuration. For an added fee of $1,000 a day, it will cover the patched configuration. For no added cost, it will cover all losses if you acquired the new commercial application. Meanwhile, your company has already spent $1.5 million writing your own replacement application. This application is undergoing a parallel test and is scheduled to be released in two more months. Which course of action should you recommend to your company?
Acquire the patch and workaround product, and use them until your replacement product is available.
53
Which term describes the efforts taken by a prudent person who implements controls to behave responsibly when caring for data entrusted to him or her?
Due care
54
Replace the italic words in the following sentence with the terms commonly used when discussing risk managment: A software product used by your company includes an unknown [weakness]. This [risk] can lead to an exploit from the Internet and enable a malicious hacker to [access] your costomer’s credit cards.
Vulnerability, threat, exposure
55
Place the following steps of the life cycle of a security program in sequential order.
Organize, implement, operate, monitor, evaluate
56
Who is responsible for the security of data?
The data’s owner
57
What formula identifies residual risk (RR)?
Annual Loss Expectancy (ALE) * Control Gap
58
Information security seeks to protect a triad of principles. Which of the following is NOT included in that triad?
Authorization
59
With regard to the classification of information, the levels of sensitivity used by the U.S. military include all the following except which one?
Controlled
60
What does a company practice by developing and implementing security policies, procedures, and standards?
Due care
61
Which of the following terms is NOT related to quantitative risk analysis?
Annual Risk Acceptance (ARA)
62
Which of the following is NOT part of the commercial information classification system?
Unclassified
63
As part of the risk assessment team, you are asked to describe which of the following is a flaw, loophole, oversight, or error that makes your company susceptible to attack or damage. What is your answer?
Vulnerability
64
Which of the following terms is in the most logical order.
Asset valuation, threat analysis, control analysis, mitigation, policy creation, awareness
65
Examine Table 1.3. What does the table represent?
Risk register
66
The result of a recent risk assessment has led to the upgrade of the organization’s firewall. Which risk control most closely fits this response?
Mitigate the risk
67
Quantitative risk assessments seek to perform all the following except which one?
Use questionnaires and interviews to determine high-risk items
68
You are asked to calculate the ALE for a new IT asset where the ARO is 60 percent. If the Asset Value is $500 and the Single Loss Expectancy (SLE) is $450, what is the Exposure Factor (EF)?
90 percent
69
You are called back to do more caluculations for a pending risk assessment because the company has gathered additional information. If the AV is now $1,000, what will the ALE be with an SLE of $800 and an ARO of twice yearly?
$1,600
70
Your final risk-assessment task is to provide your manager with a quick assessment on a new asset. To do so, you are given the following information. Can you calculate the ALE? SLE = $2,500 , EF = .9 , ARO = .4 , RR = $30
$1,000.00
71
Place the following risk assessment steps in order, from last to first. I. Derive annual loss potential II. Assign value to assets III. Reduce, transfer, or avoid the risk IV. Estimate potential loss V. Perform a threat analysis
III, I, V, IV, II
72
What kind of qualitative risk assessment features anonymous feedback?
Delphi
73
What element of the risk assessment process denotes the percentage of risk that a company would suffer if an asset were compromised by a realized risk?
Exposure factor
74
You are asked to work with your manager to develop new security objectives. Which of these would be considered very short-term in nature?
Operational
75
Which form of risk assessment takes the most time, and why?
Quantitative, because even with tools for automation, a large amout of data must be gathered
76
The National Security Agency’s (NSA’s) Infosec Assessment Methodology (IAM) is a good example of a qualitative risk-assessment methodology. As such, which of the following statements is LEAST correct?
It features a good method of performing numeric calculations such as ALE and ARO.
77
What term best describes an instance of being vulnerable to losses from a threat?
Exposure
78
Which of the following statements is incorrect?
Procedures are a high-level document.
79
How do you find out what level of risk the enterprise can safely tolerate and still continue to function effectively?
Risk mitigation
80
How is SLE determined?
By multiplying the AV by the amount vulnerable or exposed
81
What was the original name of ISO 27002?
ISO 17799
82
OCTAVE is designed to act as a framework to support risk analysis. How many phases are in the OCTAVE framework?
3
83
You are asked to review some existing security documentation. Which of the following documents could best be described as descretionary and not mandatory?
Guideline
84
You are asked to calculate the total cost of ownership (TCO). Which of the following does TCO NOT include?
Replacement cost
85
You have several clients throughout the U.S. for which you are assigned to manage risk. One client is in Washington, D.C., another is in San Jose, and third is in Boston. Use the following scale to assess the quantitative risk-impact score for Boston.
A score of four
86
Standards define compulsory requirements.
True
87
A parallel run is an example of a change management technique.
True
88
Lavels are a requirement of TCSEC C-level security.
False
89
Tangible value are all that need to be examined when performing an asset evaluation.
False
90
A policy is a management-driven objective.
True
91
The security officer is ultimately responsible for security.
False
92
The risk analysis team should be composed only of peaple from security management.
False
93
The asset owner is responsible for the security controls that are designed to protect the asset.
True
94
Application error is one type of risk that the organization should be concerned about.
True