Topic 6: . Security Assessment and Testing
In which of the following programs is it MOST important to include the collection of security process data?
A.
Quarterly access reviews
B.
Security continuous monitoring
C.
Business continuity testing
D.
Annual security training
Quarterly access reviews
Which of the following could cause a Denial of Service (DoS) against an authentication system?
A.
Encryption of audit logs
B.
No archiving of audit logs
C.
Hashing of audit logs
D.
Remote access audit logs
Remote access audit logs
Which of the following is of GREATEST assistance to auditors when reviewing system configurations?
A.
Change management processes
B.
User administration procedures
C.
Operating System (OS) baselines
D.
System backup documentation
Change management processes
Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?
A.
Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken
B.
Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability
C.
Management teams will understand the testing objectives and reputational risk to the organization
D.
Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels
Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?
A.
Host VM monitor audit logs
B.
Guest OS access controls
C.
Host VM access controls
D.
Guest OS audit logs
Host VM monitor audit logs
When is a Business Continuity Plan (BCP) considered to be valid?
A.
When it has been validated by the Business Continuity (BC) manager
B.
When it has been validated by the board of directors
C.
When it has been validated by all threat scenarios
D.
When it has been validated by realistic exercises
When it has been validated by realistic exercises
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?
A.
Guaranteed recovery of all business functions
B.
Minimization of the need decision making during a crisis
C.
Insurance against litigation following a disaster
D.
Protection from loss of organization resources
Protection from loss of organization resources
What is the PRIMARY reason for implementing change management?
A.
Certify and approve releases to the environment
B.
Provide version rollbacks for system changes
C.
Ensure that all applications are approved
D.
Ensure accountability for changes to the environment
Ensure accountability for changes to the environment
What should be the FIRST action to protect the chain of evidence when a desktop
computer is involved?
A.
Take the computer to a forensic lab
B.
Make a copy of the hard drive
C.
Start documenting
D.
Turn off the computer
Start documenting
A continuous information security monitoring program can BEST reduce risk through which of the following?
A.
Collecting security events and correlating them to identify anomalies
B.
Facilitating system-wide visibility into the activities of critical user accounts
C.
Encompassing people, process, and technology
D.
Logging both scheduled and unscheduled system changes
Facilitating system-wide visibility into the activities of critical user accounts
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?
A.
Absence of a Business Intelligence (BI) solution
B.
Inadequate cost modeling
C.
Improper deployment of the Service-Oriented Architecture (SOA)
D.
Insufficient Service Level Agreement (SLA)
Inadequate cost modeling
An organization is found lacking the ability to properly establish performance indicators for
its Web hosting solution during an audit. What would be the MOST probable cause?
A.
Absence of a Business Intelligence (BI) solution
B.
Inadequate cost modeling
C.
proper deployment of the Service-Oriented Architecture (SOA)
D.
Insufficient Service Level Agreement (SLA)
Insufficient Service Level Agreement (SLA)
Page 4 out of 124 Pages |
Previous |