CHAPTER SUMMARY

Threats are always present and can’t be eliminated. The potential for a threat to do harm or the impact of a threat can be reduced but not the threat itself. However, many steps can be taken to reduce vulnerabilities. The most important vulnerabilities are those that are likely to match up as a threat/vulnerability pair. Once the likely threat/vulnerability pairs have been identified, mitigation techniques can be implemented.

The U.S. federal government has many resources that organizations can use to manage risk. The National Institute of Standards and Technology (NIST) has published several Special Publications. The SP 800 series includes many publications targeted for IT security. The Department of Homeland Security also has many divisions focused on IT security. Its resources are freely available to IT and security professionals.

KEY CONCEPTS AND TERMS

CHAPTER 2 ASSESSMENT

  1. What is a security policy?
    1. A document with a rigid set of rules created so that people follow it explicitly to be effective and avoid technical problems
    2. A technical control used to enforce security
    3. A physical control used to enforce security
    4. A document created by senior managers that identifies the role of security in the organization and is used as a defense mechanism to protect the assets of the organization
  2. What should be used to ensure that users are granted only the rights to perform actions required for their jobs?
    1. Principle of least privilege
    2. Principle of need to know
    3. Principle of limited rights
    4. Separation of duties
  3. What should be used to ensure that the amount spent on mitigating a risk (such as buying insurance) is proportional to the risk?
    1. Principle of least privilege
    2. Principle of proportionality
    3. Principle of limited rights
    4. Principle of limited permissions
  4. Which of the following security principles divides job responsibilities to reduce fraud?
    1. Need to know
    2. Least privilege
    3. Separation of duties
    4. Mandatory vacations
  5. What can be used to ensure that unauthorized changes are not made to systems?
    1. Input validation
    2. Patch management
    3. Version control
    4. Configuration management
  6. What are two types of intrusion detection systems?
    1. Intentional and unintentional
    2. Natural and man-made
    3. Host based and network based
    4. Technical and physical
  7. A technical control prevents unauthorized personnel from having physical access to a secure area or secure system.
    1. True
    2. False
  8. What allows an attacker to gain additional privileges on a system by sending unexpected code to the system?
    1. Buffer overflow
    2. MAC flood
    3. Input validation
    4. Spiders
  9. What is hardening a server?
    1. Securing it from the default configuration
    2. Ensuring it cannot be powered down
    3. Locking it in a room that is hard to access
    4. Enabling necessary protocols and services
  10. Which of the following steps could be taken to harden a server?
    1. Removing unnecessary services and protocols
    2. Keeping the server up to date
    3. Changing defaults
    4. Enabling local firewalls
    5. All of the above
  11. Which government agency includes the Information Technology Laboratory and publishes SP 800-30?
    1. NIST
    2. DHS
    3. NCCIC
    4. US-CERT
  12. Which of the following is a Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Lifecycle Approach?
    1. SP 800-34
    2. SP 800-35
    3. SP 800-37
    4. SP 800-84
  13. Which U.S. government agency regularly publishes alerts and bulletins related to security threats?
    1. NIST
    2. FBI
    3. US-CERT
    4. MITRE Corporation
  14. The CVE list is maintained by _______.
  15. What is the standard used to create information security vulnerability names?
    1. CVE
    2. MITRE
    3. DISA
    4. CSI
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.150.59