Information Assurance Test Preparation - 706 Verified Questions

Page 1


Information Assurance Test Preparation

Course Introduction

Information Assurance focuses on the strategies, processes, and tools necessary to protect and manage information and information systems. This course covers the principles of ensuring the confidentiality, integrity, availability, authenticity, and non-repudiation of data. Students will explore risk management, security policies, legal and ethical considerations, threat analysis, vulnerability assessment, and incident response. Through real-world case studies and practical exercises, learners will gain a comprehensive understanding of how to safeguard information assets against various security threats in organizational and networked environments.

Recommended Textbook Management of Information Security 5th Edition by Michael E. Whitman

Available Study Resources on Quizplus

12 Chapters

706 Verified Questions

706 Flashcards

Source URL: https://quizplus.com/study-set/2555

Page 2

Chapter 1: Introduction to the Management of Information Security

Available Study Resources on Quizplus for this Chatper

63 Verified Questions

63 Flashcards

Source URL: https://quizplus.com/quiz/50835

Sample Questions

Q1) List the specialized areas of security.

Answer: Physical securityOperations securityCommunications securityNetwork security

Q2) Which of the following is not among the 'deadly sins of software security'?

A) Extortion sins

B) Implementation sins

C) Web application sins

D) Networking sins

Answer: A

Q3) Discuss the planning element of information security.

Answer: Planning in InfoSec management is an extension of the basic planning model.Included in the InfoSec planning model are activities necessary to support the design,creation,and implementation of InfoSec strategies within the IT planning environment.The business strategy is translated into the IT strategy.Both the business strategy and the IT strategy are then used to develop the InfoSec strategy.For example,the CIO uses the IT objectives gleaned from the business unit plans to create the organization's IT strategy.

Q4) A(n)____________________ hacks the public telephone network to make free calls or disrupt services.

Answer: phreaker

Page 3

To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Compliance: Law and Ethics

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/50836

Sample Questions

Q1) Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information,as well as policies and procedures to maintain them?

A) ECPA

B) Sarbanes-Oxley

C) HIPAA

D) Gramm-Leach-Bliley

Answer: C

Q2) ___________________ is a subset of civil law that allows individuals to seek redress in the event of personal,physical,or financial injury.

Answer: tort law

Q3) Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications?  The code includes the canon: Provide diligent and competent service to principals.

A) (ISC)²

B) ACM

C) SANS

D) ISACA

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Governance and Strategic Planning for Security

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/50837

Sample Questions

Q1) A set of security tests and evaluations that simulate attacks by a malicious external source is known as ____________.

A) vulnerability assessment

B) penetration testing

C) exploit identification

D) safeguard neutralization

Answer: B

Q2) When using the Governing for Enterprise Security (GES)program,an Enterprise Security Program (ESP)should be structured so that governance activities are driven by the organization's executive management,select key stakeholders,as well as the

A) Board Risk Committee

B) Board Finance Committee

C) Board Audit Committee

D) Chairman of the Board

Answer: A

Q3) The ______________________ phase is the last phase of SecSDLC,but perhaps the most important.

Answer: maintenance and change

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Information Security Policy

Available Study Resources on Quizplus for this Chatper

56 Verified Questions

56 Flashcards

Source URL: https://quizplus.com/quiz/50838

Sample Questions

Q1) Which of the following is a disadvantage of the individual policy approach to creating and managing ISSPs?

A) can suffer from poor policy dissemintation, enforcement, and review

B) may skip vulnerabilities otherwise reported

C) may be more expensive than necessary

D) implementation can be less difficult to manage

Q2) When issues are addressed by moving from the general to the specific, always starting with policy.

A) capability table

B) statement of purpose

C) Bull's eye model

D) SysSP

E) Procedures

F) InfoSec policy

G) standard

H) access control lists

I) systems management

J) ISSP

Q3) List the advantages and disadvantages of using a modular approach for creating and managing the ISSP.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Developing the Security Program

Available Study Resources on Quizplus for this Chatper

65 Verified Questions

65 Flashcards

Source URL: https://quizplus.com/quiz/50839

Sample Questions

Q1) Which of the following is a disadvantage of the one-on-one training method?

A) Inflexible

B) May not be responsive to the needs of all the trainees

C) Content may not be customized to the needs of the organization

D) Resource intensive, to the point of being inefficient

Q2) Explain the conflict between the goals and objectives of the CIO and the CISO.

Q3) The goal of a security ____________________ program is to keep information security at the forefront of users' minds on a daily basis.

Q4) Which of the following is an advantage of the one-on-one method of training?

A) Trainees can learn from each other

B) Very cost-effective

C) Customized

D) Maximizes use of company resources

Q5) Which of the following is true about a company's InfoSec awareness Web site?

A) it should contain large images to maintain interest

B) appearance doesn't matter if the information is there

C) it should be placed on the Internet for public use

D) it should be tested with multiple browsers

Q6) What minimum attributes for project tasks does the WBS document?

Q7) What is the role of help desk personnel in the InfoSec team?

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Risk Management: Identifying and Assessing Risk

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50840

Sample Questions

Q1) A prioritized lists of assets and threats can be combined with exploit information into a specialized report known as a TVA worksheet.

A)True

B)False

Q2) Why is threat identification so important in the process of risk management?

Q3) List the stages in the risk identification process in order of occurrence.

Q4) Occurs when a manufacturer performs an upgrade to a hardware component at the customer's premises.

A) risk management

B) risk analysis

C) classification categories

D) risk identification

E) field change order

F) threat assessment

G) risk appetite

H) qualitative assessment

I) residual risk

J) ranked vulnerability risk worksheet

Page 8

Q5) For the purposes of relative risk assessment how is risk calculated?

Q6) What are the included tasks in the identification of risks?

To view all questions and flashcards with answers, click on the resource link above.

Page 9

Chapter 7: Risk Management: Controlling Risk

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50841

Sample Questions

Q1) Once a control strategy has been selected and implemented,what should be done on an ongoing basis to determine their effectiveness and to estimate the remaining risk?

A) analysis and adjustment

B) review and reapplication

C) monitoring and measurement

D) evaluation and funding

Q2) The ____________________ risk control strategy attempts to shift the risk to other assets,  processes,or organizations.

Q3) Briefly describe the five basic strategies to control risk that result from vulnerabilities.

Q4) Application of training and education is a common method of which risk control strategy?

A) mitigation

B) defense

C) acceptance

D) transferal

Q5) The goal of InfoSec is not to bring residual risk to zero; rather,it is to bring residual risk in line with an organization's risk ___________.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: Security Management Models

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50842

Sample Questions

Q1) Which of the following provides advice about the implementation of sound controls and control objectives for InfoSec,and was created by ISACA and the IT Governance Institute?

A) COBIT

B) COSO

C) NIST

D) ISO

Q2) Dumpster delving is an information attack that involves searching through a target organization's trash and recycling bins for sensitive information.

A)True

B)False

Q3) There are seven access controls methodologies categorized by their inherent characteristics. List and briefly define them.

Q4) Lattice-based access control specifies the level of access each subject has to each object,if any.

A)True

B)False

Q5) Under what circumstances should access controls be centralized vs.decentralized?

Q6) Access controls are build on three key principles. List and briefly define them.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Security Management Practices

Available Study Resources on Quizplus for this Chatper

59 Verified Questions

59 Flashcards

Source URL: https://quizplus.com/quiz/50843

Sample Questions

Q1) Data or the trends in data that may indicate the effectiveness of security countermeasures or controls-technical and managerial-implemented in the organization are known as program measurements.

A)True

B)False

Q2) Attaining certification in security management is a long and difficult process,but once attained,an organization remains certified for the life of the organization.

A)True

B)False

Q3) Which of the following is the first phase in the NIST process for performance measurement implementation?

A) Develop the business case

B) Obtain resources

C) Prepare for data collection

D) Identify corrective actions

Q4) A practice related to benchmarking is ____________,which is a measurement against a prior assessment or an internal goal.

Q5) Compare and contrast accreditation and certification.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: Planning for Contingencies

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50844

Sample Questions

Q1) Which of the following is a responsibility of the crisis management team?

A) Restoring the data from backups

B) Evaluating monitoring capabilities

C) Keeping the public informed about the event and the actions being taken

D) Restoring the services and processes in use

Q2) Which of the following allows investigators to determine what happened by examining the results of an event-criminal,natural,intentional,or accidental?

A) Digital malfeasance

B) E-discovery

C) Forensics

D) Evidentiary procedures

Q3) A(n)____________________ is a document containing contact information of the individuals to notify in the event of an actual incident.

Q4) A(n)____________________ is an agency that provides,in the case of DR/BC planning,physical facilities for a fee.

Q5) When undertaking the BIA,what should the organization consider?

Q6) What teams are involved in contingency planning and contingency operations?

Q7) Compare and contrast a hot site,a warm site,and a cold site.

Q8) Describe the methodology an organization should follow in an investigation.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Personnel and Security

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50845

Sample Questions

Q1) According to Schwartz et al.,employees who create and install security solutions fall under which classification of InfoSec positions?

A) Definers

B) Administers

C) Builders

D) Architects

Q2) The most common qualification for a CISO includes the CISSP and CISM certifications.

A)True

B)False

Q3) Which of the following policies makes it difficult for an individual to violate InfoSec and is quite useful in monitoring financial affairs?

A) Task rotation

B) Mandatory vacations

C) Separation of duties

D) Job rotation

Q4) Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?

Q5) Briefly describe at least five types of background checks.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Protection Mechanisms

Available Study Resources on Quizplus for this Chatper

61 Verified Questions

61 Flashcards

Source URL: https://quizplus.com/quiz/50846

Sample Questions

Q1) What is asymmetric encryption?

Q2) Was developed by Netscape in 1994 to provide security for online e-commerce transactions.

A) VPN

B) transport mode

C) SSL

D) PKI

E) digital certificate

F) asymmetric encryption

G) Vernam cipher

H) transposition cipher

I) content filter

J) footprinting

Q3) Describe in basic terms what an IDPS is.

Q4) What is the range of the well-known ports used by TCP and UDP?

A) 1024-65,536

B) 0-1023

C) 0-65,536

D) 20, 21, 25, 53, 80

Q5) What should you look for when selecting a firewall for your network?

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook