Security Operations & Administration

Which of the following is a recommendation to use when a specific standard or procedure does not exist?
Guideline
A code of ethics provides for all but which of the following
Clearly defines course action to take when a complex issue is encountered
Computer policies include a special category called user rights. Which actions do they allow an administrator to perform?
Identify users who can perform maintenance tasks on computers in the OU
Which of the following development modes is a method used by programmers while writing programs that allow for optimal control over coherence, security, accuracy, and comprehensibility?
Structured programming
A process performed in a controlled environment by a third party which verifies that an IS meets a specific set of security standards before being granted the approval to operate is known as?
Accreditation
All of the files on a companies protected network are backed up every 24 hours. The backup solution imposed on the network is designed to provide protection for what security service?
Availability
You want to ensure that all users in the Development OU use specific network communication security settings when transmitting files. Which method should you use?
Create a GPO computer policy for the computers in the Development OU
Which of the following is an action which must take place during the release stage of the SDLC
Vendors develop and release patches in response to exploited vulnerabilities that have been discovered
By definition, which security concept ensures that only authorized parties can access data?
Confidentiality
Who is assigned the task of judging the security system or network and granting it an approval to operate?
Designated Approval Authority
When developing the totality of security policy documentation, what type of policy document will contain instructions or information on remaining in compliance with regulations and industry standards?
Standards
In which phase of the system life cycle is software testing performed?
Software Development
A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security goals is most at risk?
Confidentiality
Which phase or step of a security assessment is a passive activity?
Reconnaissance
Which of the following best describes the concept of due care or due diligence?
Reasonable precautions, based on industry best practices, are utilized and documented
Which of the following is a representative example of an assigned level of a system that was judged through Common Criteria?
EAL5
Which is the operation mode of the system that is deployed in such a way so that it operates at a single level of classification and all users who can access the system all have that same specific clearance level as well as all of the need to know over all the data on the system?
Dedicated
Which of the following is the best protection against security violations?
Defense in depth
Who has the responsibility for the development of a security policy?
Senior Management
Which of the following is not a protection against collusion?
Cross training
Which of the following best describes the Security Target (ST) in the Common Criteria (CC) evaluation system?
The ST is a document that describes the security properties of a security product
Which of the following is not an element of the termination process?
Dissolution of the NDA (non-disclosure agreement)
What is the primary purpose of imposing software life cycle management concepts?
Increase the quality of software
If your organization relies on high-end customized software developed by an external company, what security protection should be implemented to protect yourself against the software developer going out of business?
Code escrow
Your company security policy requires separation of duties for all network security matters. Which of the following scenarios best describes this concept?
System administrator configures remote access privileges and the security officer reviews and activates each account
Which of the following defines layering in regards to system access control?
Various tasks are divided into a hierarchical manner to provide security
What are the goals and mission of an organization defined?
Strategic security policy
Which statement is true regarding application of GPO settings?
If a setting is defined in the Local Group Policy and is not defined in the GPO linked to the OU, the setting will be applied
You’ve crafted a message to be sent to another user. Before transmission, you hash the message, then encrypt the hash using your private key. You then attach this encrypted hash to you message as a digital signature before sending it to the other user? What protection does the private key signing activity of this process provide?
Non-repudiation
Which of the following is the least reliable means to clean or purge media?
Degaussing
In which phase of the system life cycle is security integrated into the product?
Project initiation
Which of the following defines system high mode?
All systems and peripherals within a system are classified and then protected according to the level of classification assigned to the most highly classified object which resides on the system
What is the primary purpose of forcing employees to take mandatory one-week minimum vacations every year?
To check for evidence of fraud
You’ve crafted a message to be sent to another user. Before, transmission, you hash the message, then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, what protection does the hashing activity provide?
Integrity
What of the following is not used bu the reference monitor to determine levels of access?
Ring architecture
Which of the following is the best protection to prevent attacks on mobile phones through the Bluetooth protocol?
Disable Bluetooth on the phone
When a sender encrypts a message using their own private key, what security service is being provided to the recipient?
Non-repudiation
What is the primary purpose of source code power?
To obtain change rights over software after the vendor goes out of business
Which of the following terms restricts the ability of a program to read and write to memory according to its permissions or access level?
Confinement
Which of the following is a high-level, general statement about the role of security in the organization?
Policy
Which of the following is a policy that defines appropriate and inappropriate activities and usage for company resources, assets, and communications?
Acceptable use policy
Which of the following is a term used to describe a level of confidence that the evaluation methods were thorough and complete so that the security designation can be trusted?
Assuarance
What is the principal purpose of change control?
Prevent un-managed change
You have a set of CD-Rs that you have used to store confidential product development data. Now that the project is over, you need to dispose of the discs. Which method should you use to dispose of the media?
Shredding
The best ways to initiate solid administrative control over an organizations employees is to have what element in place?
Distinct job descriptions
Cell phones with cameras and data transfer capabilities pose a risk to which security goal?
Confidentiality
Which of the following terms describes the product that is evaluated against the security requirements in the Common Criteria (CC) evaluation system?
Target of Evaluation (TOE)
Which of the following components of Common Criteria (CC) evaluation system is a document written by a user or community that identifies the security requirements for a specific purpose?
Protection Profile (PP)