Exam 8: Controls for Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Trust Services Framework reliability principle that states sensitive information be protected from unauthorized disclosure is known as

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

C

Describe what a man-trap is and how it contributes to information security.

Free
(Essay)
4.8/5
(42)
Correct Answer:
Verified

A man-trap is a specially designed room to trap unauthorized individuals.Typically,a man-trap room contains two doors.Entry to the first door requires the person insert and ID card and enter a password.Successful authentication opens the first door,permitting the individual into the room.Once inside the room,the door closes and locks behind the individual.Then,the individual must successfully pass a second set of authentication controls that typically includes a biometric credential.Failure to pass results in the individual being trapped in the room.

A special purpose hardware device or software running on a general purpose computer,which filters information that is allowed to enter and leave the organization's information system,is known as a(n)

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

D

Which of the following is not one of the three fundamental information security concepts?

(Multiple Choice)
4.9/5
(33)

There are "white hat" hackers and "black hat" hackers.Cowboy451 was one of the "black hat" hackers.He had researched an exploit and determined that he could penetrate the target system,download a file containing valuable data,and cover his tracks in eight minutes.Six minutes into the attack he was locked out of the system.Using the notation of the time-based model of security,which of the following must be true?

(Multiple Choice)
4.8/5
(39)

________ is/are an example of a detective control.

(Multiple Choice)
4.9/5
(31)

It was 8:03 A.M.when Jiao Jan,the Network Administrator for South Asian Technologies,was informed that the intrusion detection system had identified an ongoing attempt to breach network security.By the time that Jiao had identified and blocked the attack,the hacker had accessed and downloaded several files from the company's server.Using the notation for the time-based model of security,in this case

(Multiple Choice)
4.9/5
(39)

The Trust Services Framework reliability principle that states access to the system and its data should be controlled and restricted to legitimate users is known as

(Multiple Choice)
4.9/5
(47)

COBIT 5 management practice APO01.08 stresses the importance of ________ of both employee compliance with the organization's information security policies and overall performance of business processes.

(Multiple Choice)
4.8/5
(36)

The process of turning off unnecessary features in the system is known as

(Multiple Choice)
5.0/5
(31)

The Trust Services Framework reliability principle that states access to the system and its data should be accessible to meet operational and contractual obligations to legitimate users is known as

(Multiple Choice)
4.8/5
(29)

The most effective method for protecting an organization from social engineering attacks is providing

(Multiple Choice)
4.8/5
(42)

Identify the statement below which is not a useful control procedure regarding access to system outputs.

(Multiple Choice)
4.8/5
(38)

Verifying the identity of the person or device attempting to access the system is an example of

(Multiple Choice)
4.7/5
(33)

Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?

(Multiple Choice)
4.9/5
(40)

This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.

(Multiple Choice)
4.8/5
(37)

Describe the differences between virtualization and cloud computing.

(Essay)
4.9/5
(38)

An access control matrix

(Multiple Choice)
4.9/5
(41)

This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination.

(Multiple Choice)
4.8/5
(42)

Which of the following is not a requirement of effective passwords?

(Multiple Choice)
5.0/5
(39)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)