CHAPTER SUMMARY

This chapter covered some of the technologies used to ensure IT policy compliance. Imaging technologies can deploy identical baseline images for new systems. The chapter discussed the importance of a gold master image. However, the baseline is up to date only for a short period of time. As patches are released or other changes are approved, the baseline becomes out of date. The difference between the baseline and the required changes represents a vulnerability or a security gap. This gap must be closed to ensure systems stay secure.

Many automated tools are available to IT administrators today. These tools can examine systems to ensure the baseline security settings have not changed. They can also scan systems for vulnerabilities such as ensuring the computers have current patches. Many tools include the ability to scan for issues and deploy changes to correct the issues. NIST published standards for SCAP in SP 800-126. These standards have resulted in a wealth of available tools to increase security for networks today. You also learned about how penetration testing is an important test of the effectiveness of controls. Finally, the case studies in this chapter illustrated how the lack of compliance can lead to significant impact to an organization.

KEY CONCEPTS AND TERMS

CHAPTER 15 ASSESSMENT

  1. A(n) _____________ is a starting point or standard. Within IT, it provides a standard focused on a specific technology used within an organization.
  2. An operating system and different applications are installed on a system. The system is then locked down with various settings. You want the same operating system, applications, and settings deployed to 50 other computers. What’s the easiest way?
    1. Scripting
    2. Imaging
    3. Doing it manually
    4. Spreading the work among different departments
  3. After a set of security settings has been applied to a system, there is no need to recheck these settings on the system.
    1. True
    2. False
  4. The time between when a new vulnerability is discovered and when software developers start writing a patch is known as a(n) _____________.
  5. Your organization wants to automate the distribution of security policy settings. What should be considered?
    1. Training of administrators
    2. Organizational acceptance
    3. Testing for effectiveness
    4. All of the above
  6. Several tools are available to automate the deployment of security policy settings. Some tools can deploy baseline settings. Other tools can deploy changes in security policy settings.
    1. True
    2. False
  7. An organization uses a decentralized IT model with a central IT department for core services and security. The organization wants to ensure that each department is complying with primary security requirements. What can be used to verify compliance?
    1. Group Policy
    2. Centralized change management policies
    3. Centralized configuration management policies
    4. Random audits
  8. Change requests are tracked in a control work order database. Approved changes are also recorded in a CMDB.
    1. True
    2. False
  9. An organization wants to maintain a database of system settings. The database should include the original system settings and any changes. What should be implemented within the organization?
    1. Change management
    2. Configuration management
    3. Full ITIL life cycle support
    4. Security Content Automation Protocol
  10. An organization wants to reduce the possibility of outages when changes are implemented on the network. What should the organization use?
    1. Change management
    2. Configuration management
    3. Configuration management database
    4. Simple Network Management Protocol
  11. A security baseline image of a secure configuration that is then replicated during the deployment process is sometimes called a _____________.
    1. Master copy
    2. Zero-day image
    3. Gold master
    4. Platinum image
  12. Microsoft created the Web-Based Enterprise Management (WBEM) technologies for Microsoft products.
    1. True
    2. False
  13. A common method of scoring risk is reflected in the following formula: Risk = _____________ × _____________ .
  14. What is a valid approach for validating compliance to security baseline?
    1. Vulnerability scanner
    2. Penetration test
    3. A and B
  15. It is important to protect your gold master because an infected copy could quickly result in widespread infection with malware.
    1. True
    2. False
  16. A(n) _____________ can be used with a downloaded file. It offers verification that the file was provided by a specific entity. It also verifies the file has not been modified.
  17. If an organization implements the COSO internal control framework, then it cannot implement another control framework like COBIT.
    1. True
    2. False
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.200.77