暗記メーカー
ログイン
CHAPTER 1 - Security and Risk Management
  • Papyrus_35

  • 問題数 94 • 9/16/2023

    記憶度

    完璧

    14

    覚えた

    35

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    You have just won a contact for a small software development firm, which has asked you to perform a risk analysis. The firm provided you information on previous incidents and has a list of the known environmental threats in the geographic area. The firm’s president believes that risk is something that can be eliminated. As a CISSP, how should you respond to this statement?

    Risk can be reduced, but cannot be eliminated.

  • 2

    Which term describes the method of identifying vulnerabilities and threats and assessing the possible damage to determine where to implement security safeguards?

    Risk analysis

  • 3

    Proper security management dictates separation of duties of all the following reasons except which one?

    It reduces the need for personnel.

  • 4

    As a potencial CISSP, you need to know Common Request for Comments (RFCs) and National Institute of Standards and Technology (NIST) standards. One such RFC is 2196. This Internet Engineering Task Force (IETF) document provides basic guidance on security in a networked environment. What is the title of this document?

    “Site Security Handbook”

  • 5

    Mr. Hunting, your former college math teacher, hears that you are studying for your CISSP exam and asks if you know the formula for total risk. What is the correct response?

    Threat * Vulnerability * Asset Value = Total Risk

  • 6

    What document gives detailed instructions on how to perform specific operations, providing a step-by-step guide?

    Procedures

  • 7

    Your CEO has hinted that security audits may be implemented next year. As a result, your director has become serious about performing some form of risk assessment. You are delegated the task of determining which type of risk assessment to perform. The director wants to learn more about the type of risk assessment that involves a team of internal business managers and technical staff. He does not want the assessment to place dollar amounts on identified risks. He wants the group to assign one of 26 common controls to each threat as it is identified. Which type of riks assessment does your manager want?

    Facilitated Risk Assesment Process (FRAP)

  • 8

    Which of the following is a document that is considered high-level in that it defines formal rules by which employees of the organization must abide?

    Policies

  • 9

    Management requires that all employees with a company laptop keep their virus signatures up to date and run a full system scan at least weekly. It is suggested, however, that they update signatures every night if possible. In what document type would such suggestions likely be made?

    Guidelines

  • 10

    What document is similar to a standard, but provides only broad guidance and recommendations?

    Guidelines

  • 11

    You are asked to speak at the next staff meeting about security governance and discuss why risk analysis is important. What will you say?

    Risk analysis is something every company should perform to demonstrate that it is in control of its assets, resources, and destiny.

  • 12

    One of your coworkers, who knows that you are studying for your CISSP exam, comes to you with the following question: What is a cost-benefit analysis? How will you answer?

    A cost-benefit analysis should identify safeguards that offer the maximum amout of protection for the minimum cost.

  • 13

    Your risk management team has just finished calculating the treats to a company during a disaster. They determine that the company will suffer long-term reputation damage in the community that will reduce their future customer base in the event off a Personally Identifiable Information (PII) breach. The team believes that customers will go to another company. This is an example of:

    Delayed loss

  • 14

    Your consulting firm has won a contract for a small, yet growing, technology firm. The CEO has wisely decided that the firm’s proprietary technology is worth protecting and wants to find out whether anyone is in noncompliance. Which of the following is NOT a reason why this organization should develop information classification?

    Information classification should be implemented to ensure successful prosecution of intellectual property violators.

  • 15

    Your administrative assistant has started an online risk assessment certificate program. She has a question: What primary security concept difines the rights and privileges of a validated user? What will your answer be?

    Authorization

  • 16

    Which of the following can be used to protect confidentiality?

    Encryption

  • 17

    Your company has brought in a group of contract programmers and is concerned about the potential risk. Althogh management feels it is important to track these user’s activities, they also want to make sure that any changes to program code or data can be tied to a specific infividual. Which of the following best describes the means by which an individual cannot deny having performed an action or caused an event?

    Nonrequdiation

  • 18

    Which of the following can be used to protect integrity?

    Checksums

  • 19

    Christine has been given network access to pilot engineering design documents. Although she can view the documents, she cannot print them or make changes. Which of the following does she lack?

    Authorization

  • 20

    Which of the following can be used to provide accountability?

    Closed Circuit TV (CCTV)

  • 21

    Which of the following BEST describes estimating that a risk will happen, determining safeguards to mitigate a risk, assessing vulnerability, and assigning values to assets?

    Risk analysis steps

  • 22

    Which of the following can be used to protect availability?

    Redundant array of inexpensive disks (RAID)

  • 23

    Which data classification method uses labels such as “confidential”, “private”, and “sensitive”?

    Commercial

  • 24

    Your risk assesment team has completed a review of the threat of natural disasters damaging your facility. Based on the information in Table 1.1, what is the Single Loss Expectancy (SLE) and the Annual Loss Expectancy (ALE)?

    SLE is $300,000; the ALE is $30,000

  • 25

    Which data classification method uses labels such as “confidential”, “sensitive but unclassified”, and “unclassified”?

    Government

  • 26

    You are an advisory board member for a local nonprofit organization. Because your fellow board members know of your expertise in security, they approach you with the following question: Who is ultimately responsible for information security? How will you answer them?

    Senior management

  • 27

    Examine Table 1.2 and list which line item is NOT correct.

    Facility

  • 28

    What is the correct order for the following items?

    Identify, authenticate, authorize

  • 29

    What is ARO?

    Annualized Rate of Occurrence

  • 30

    Which of the following does NOT require prior employee notification?

    Monitoring unsuccessful login attempts

  • 31

    Your intern comes to you with the following question about your company’s change control board: What is NOT one of the primary reasons why a change control board is needed? How do you answer?

    Change control is needed so that changes can be made quickly.

  • 32

    Which of the following should be performed in conjunction with a termination?

    Exit interview

  • 33

    What is the highest level of government data classification?

    Top secret

  • 34

    Your manager is concerned about a new piece of software being developed by a contractor. Your manager wants you to verify that no means of unauthenticated access is left in the finished product. What is another name for a method of unauthenticated access into a program?

    Backdoor

  • 35

    Which of the following is the lowest level of private-sector data classification?

    Public

  • 36

    Whose role is to examine security policies and procedures and provide reports to senior management about the effectiveness of security controls?

    Auditor

  • 37

    What is the process of determining the level of risk at which the organization can operate and function effectively?

    Risk mitigation

  • 38

    Who has the functional responsibility of security?

    Infosec security officer

  • 39

    James, the summer intern, ask if you can show him how to calculate ALE. What do you tell him?

    Single Loss Expectancy (SLE) * Annualized Rate of Occurrence (ARO) = ALE

  • 40

    What is the lowest level of government data classification?

    Unclassified

  • 41

    Which of the following is NOT an acceptable response to risk?

    Displacement

  • 42

    You are an advisory board member for a local organaization. The organization has been given a new server, and members plan to use it to connect their 20 client computers to the Internet for email access. Currently, none of these computers has antivirus software installed. Your research indicates that there is a 90 percent chance that these systems will become infected after email is in use. There’s a good chance that a virus could bring down the network for an entire day. The nonprofit’s 10 paid employees make about $12 an hour. A local vendor has offered to sell 20 copies of antivirus software to the nonprofit organization for $500. The nonprofit wants to know what the ALE for this proposed change would be. Assuming that employees work an eight-hour day, how you answer?

    $864

  • 43

    The organization that you are an advisory board member of decides to go forward with the proposed Internet and email connectivity project. The CEO wants like to know how much money, if any, will be saved through the purchase of antivirus software. Here are the projected details: - 20 computers are connected to the Internet. - There’s a 90 percent probability of virus infection. - 10 paid employees make $12 an hour. - A successful virus outage could bring down the network for an entire day. - 20 copies of antivirus will cost the nonprofit $500.

    $364

  • 44

    Which of the following describes the process of revealing only external properties to other components?

    Data hiding

  • 45

    Which of the following is the highest level of private-sector (commercial) data classification?

    Confidential

  • 46

    Which of the following is used to segregate details to focus on only one particular piece or item?

    Abstraction

  • 47

    You have been asked to apply the principles of qualitative risk analysis to the organization. How do you accomplish this task?

    (1) Develop risk scenarios, (2) analyze each scenario to determine the outcome, (3) rank the resulting risk and the importance of the asset.

  • 48

    According to NIST Special Publication (SP) 8002-7, what should be an organization’s goal in regard to risk?

    Risk should be reduced to an acceptable level.

  • 49

    Your director has asked you to implement a security awareness program. When considering a security awareness program which of the following is NOT correct?

    A security awareness program should run continuously and visibly reprimand those who are in noncompliance.

  • 50

    Management wants you to evaluate the organization’s security policy. Those at the organization believe that encryption should be used on their network now that it is connected to the Internet. Primarily, they are concerned that malicious hackers may be able to tap into their systems and steal donor information and demographic data. Based on the principles of risk management, what should your decision to use encryption be based on? Choose the most correct answer.

    If the network is vulnerable, the cost of protecting the system should be weighed against the costs associated with such a disclosure.

  • 51

    Data abstraction is a practical necessity at what Trusted Computer System Evaluation Criteria (TCSEC) layer?

    B3

  • 52

    You work for a company that has a large web-based storefront. Recently, a vulnerability was discovered in the application’s front-end software. If this vulnerability is exploited, your company’s database could be breached. Any breach would mean the loss of competitive customer account information. Although no credit card information is on file, any pilfered information would result in the demise of your corporation. This website produces $500,000 in profit monthly. A new commercial application to secure websites like your company’s is available for $2 million. Your current application’s vendor is writing a patch to make available a workaround product that costs $20,000. Your insurance company will not cover any damages that occur under your current configuration. For an added fee of $1,000 a day, it will cover the patched configuration. For no added cost, it will cover all losses if you acquired the new commercial application. Meanwhile, your company has already spent $1.5 million writing your own replacement application. This application is undergoing a parallel test and is scheduled to be released in two more months. Which course of action should you recommend to your company?

    Acquire the patch and workaround product, and use them until your replacement product is available.

  • 53

    Which term describes the efforts taken by a prudent person who implements controls to behave responsibly when caring for data entrusted to him or her?

    Due care

  • 54

    Replace the italic words in the following sentence with the terms commonly used when discussing risk managment: A software product used by your company includes an unknown [weakness]. This [risk] can lead to an exploit from the Internet and enable a malicious hacker to [access] your costomer’s credit cards.

    Vulnerability, threat, exposure

  • 55

    Place the following steps of the life cycle of a security program in sequential order.

    Organize, implement, operate, monitor, evaluate

  • 56

    Who is responsible for the security of data?

    The data’s owner

  • 57

    What formula identifies residual risk (RR)?

    Annual Loss Expectancy (ALE) * Control Gap

  • 58

    Information security seeks to protect a triad of principles. Which of the following is NOT included in that triad?

    Authorization

  • 59

    With regard to the classification of information, the levels of sensitivity used by the U.S. military include all the following except which one?

    Controlled

  • 60

    What does a company practice by developing and implementing security policies, procedures, and standards?

    Due care

  • 61

    Which of the following terms is NOT related to quantitative risk analysis?

    Annual Risk Acceptance (ARA)

  • 62

    Which of the following is NOT part of the commercial information classification system?

    Unclassified

  • 63

    As part of the risk assessment team, you are asked to describe which of the following is a flaw, loophole, oversight, or error that makes your company susceptible to attack or damage. What is your answer?

    Vulnerability

  • 64

    Which of the following terms is in the most logical order.

    Asset valuation, threat analysis, control analysis, mitigation, policy creation, awareness

  • 65

    Examine Table 1.3. What does the table represent?

    Risk register

  • 66

    The result of a recent risk assessment has led to the upgrade of the organization’s firewall. Which risk control most closely fits this response?

    Mitigate the risk

  • 67

    Quantitative risk assessments seek to perform all the following except which one?

    Use questionnaires and interviews to determine high-risk items

  • 68

    You are asked to calculate the ALE for a new IT asset where the ARO is 60 percent. If the Asset Value is $500 and the Single Loss Expectancy (SLE) is $450, what is the Exposure Factor (EF)?

    90 percent

  • 69

    You are called back to do more caluculations for a pending risk assessment because the company has gathered additional information. If the AV is now $1,000, what will the ALE be with an SLE of $800 and an ARO of twice yearly?

    $1,600

  • 70

    Your final risk-assessment task is to provide your manager with a quick assessment on a new asset. To do so, you are given the following information. Can you calculate the ALE? SLE = $2,500 , EF = .9 , ARO = .4 , RR = $30

    $1,000.00

  • 71

    Place the following risk assessment steps in order, from last to first. I. Derive annual loss potential II. Assign value to assets III. Reduce, transfer, or avoid the risk IV. Estimate potential loss V. Perform a threat analysis

    III, I, V, IV, II

  • 72

    What kind of qualitative risk assessment features anonymous feedback?

    Delphi

  • 73

    What element of the risk assessment process denotes the percentage of risk that a company would suffer if an asset were compromised by a realized risk?

    Exposure factor

  • 74

    You are asked to work with your manager to develop new security objectives. Which of these would be considered very short-term in nature?

    Operational

  • 75

    Which form of risk assessment takes the most time, and why?

    Quantitative, because even with tools for automation, a large amout of data must be gathered

  • 76

    The National Security Agency’s (NSA’s) Infosec Assessment Methodology (IAM) is a good example of a qualitative risk-assessment methodology. As such, which of the following statements is LEAST correct?

    It features a good method of performing numeric calculations such as ALE and ARO.

  • 77

    What term best describes an instance of being vulnerable to losses from a threat?

    Exposure

  • 78

    Which of the following statements is incorrect?

    Procedures are a high-level document.

  • 79

    How do you find out what level of risk the enterprise can safely tolerate and still continue to function effectively?

    Risk mitigation

  • 80

    How is SLE determined?

    By multiplying the AV by the amount vulnerable or exposed

  • 81

    What was the original name of ISO 27002?

    ISO 17799

  • 82

    OCTAVE is designed to act as a framework to support risk analysis. How many phases are in the OCTAVE framework?

    3

  • 83

    You are asked to review some existing security documentation. Which of the following documents could best be described as descretionary and not mandatory?

    Guideline

  • 84

    You are asked to calculate the total cost of ownership (TCO). Which of the following does TCO NOT include?

    Replacement cost

  • 85

    You have several clients throughout the U.S. for which you are assigned to manage risk. One client is in Washington, D.C., another is in San Jose, and third is in Boston. Use the following scale to assess the quantitative risk-impact score for Boston.

    A score of four

  • 86

    Standards define compulsory requirements.

    True

  • 87

    A parallel run is an example of a change management technique.

    True

  • 88

    Lavels are a requirement of TCSEC C-level security.

    False

  • 89

    Tangible value are all that need to be examined when performing an asset evaluation.

    False

  • 90

    A policy is a management-driven objective.

    True

  • 91

    The security officer is ultimately responsible for security.

    False

  • 92

    The risk analysis team should be composed only of peaple from security management.

    False

  • 93

    The asset owner is responsible for the security controls that are designed to protect the asset.

    True

  • 94

    Application error is one type of risk that the organization should be concerned about.

    True