by 0x4b4d


keywords:
Bookmark and Share



Front Back
1. Which policy dictates how an organization manages certificates and certificate acceptance?
Certificate policy
Certificate access list
CA accreditation
CRL rule
1. A. A certificate policy dictates how an organization uses, manages, and validates certificates.
2. You're giving hypothetical examples during a required security training session when the subject of certificates comes up. A member of the audience wants to know how a party is verified as genuine. Which party in a transaction is responsible for verifying the identity of a certificate holder?
Subscriber
Relying party
Third party
Omni registrar
2. C. The third party is responsible for assuring the relying party that the subscriber is genuine.
3. MTS is in the process of increasing all security for all resources. No longer will the legacy method of assigning rights to users as they're needed be accepted. From now on, all rights must be obtained for the network or system through group membership. Which of the following groups is used to manage access in a network?
Security group
Single sign-on group
Resource sharing group
AD group
3. A. A security group is used to manage user access to a network or system.
4. Which process inspects procedures and verifies that they're working?
Audit
Business continuity plan
Security review
Group privilege management
4. A. An audit is used to inspect and test procedures within an organization to verify that those procedures are working and up-to-date. The result of an audit is a report to management.
5. Which ISO standard states: "Privileges should be allocated to individuals on a need-to-use basis and on an event-by-event basis, i.e. the minimum requirement for their functional role when needed"?
27002
27102
20102
20112
5. A. The ISO standard 27002 (which updates 17799) states: "Privileges should be allocated to individuals on a need-to-use basis and on an event-by-event basis, i.e. the minimum requirement for their functional role when needed."
6. On a NetWare-based system, which account is equivalent to the administrator account in Windows?
Auditor
Supervisor
Root
Master
6. B. The supervisor user in NetWare is equivalent to the administrator user in Windows.
7. Which type of policy would govern whether employees can engage in practices such as taking gifts from vendors?
Termination policy
Endowment policy
Ethics policy
Benefit policy
7. C. An ethics policy is the written policy governing accepted organizational ethics.
8. Which of the following occurs under the security policy administered by a trusted security domain?
Positive inspection
Confident poll
Voucher session
Trusted transaction
8. D. A trusted transaction occurs under the security policy administered by a trusted security domain. Your organization may decide that it can serve as its own trusted security domain and that it can use third-party CAs, thus allowing for additional flexibility.
9. A periodic security audit of which of the following can help determine whether privilege-granting processes are appropriate and whether computer usage and escalation processes are in place and working?
Event logs
User account and ldp settings
User access and rights review
System security log files
9. C. A periodic security audit of user access and rights review can help determine whether privilege-granting processes are appropriate and whether computer usage and escalation processes are in place and working.
10. Which Windows Firewall events are logged by default in Windows 7?
Dropped packets
Successful connections
Both dropped packets and successful connections
Neither dropped packets nor successful connections
10. D. By default, Windows Firewall in Windows 7 logs neither dropped packets nor successful connections. Logging occurs only when one or both of these are turned on.
11. Which audits help ensure that procedures and communications methods are working properly in the event of a problem or issue?
Communication
Escalation
Selection
Preference
11. B. Escalation audits help ensure that procedures and communications methods are working properly in the event of a problem or issue.
12. Most CAs require what to define certificate issue processes, record keeping, and subscribers' legal acceptance of terms?
CPS
DAC
SRC
GPM
12. A. Most CAs require a Certificate Practice Statement (CPS), which defines certificate issue processes, record keeping, and subscribers' legal acceptance of the terms of the CPS.
13. Which of the following is one of the most common certificates in use today?
X.733
X.50
X.509
X.500
13. C. One of the most common certificates in use today is the X.509 certificate. It includes encryption, authentication, and a reasonable level of validity.
14. People in an organization can withhold classified or sensitive information from others in the company when governed by what type of policy?
Nondisclosure
Suppression
Need-to-know
Revelation
14. C. People in an organization can withhold classified or sensitive information from others in the company when governed by need-to-know policies.
15. The process of establishing boundaries for information sharing is called:
Disassociation
Compartmentalization
Isolation
Segregation
15. B. The process of establishing boundaries for information sharing is called compartmentalization.
16. Which policies define how individuals are brought into an organization?
Service policies
Continuity policies
Pay policies
Hiring policies
16. D. Hiring policies define how individuals are brought into an organization. They also establish the process used to screen prospective employees for openings.
17. A policy of mandatory vacations should be implemented in order to assist in:
The prevention of fraud
Identifying employees no longer needed
Reducing insurance expenses
Enforcing privilege management
17. A. A policy of mandatory vacations should be implemented in order to assist in the prevention of fraud.
18. On a Linux-based system, which account is equivalent to the administrator account in Windows?
Auditor
Supervisor
Root
Master
18. C. The root user in Linux is equivalent to the administrator user in Windows.
19. Which of the following is the basic premise of least privilege?
Always assign responsibilities to the administrator who has the minimum permissions required.
When assigning permissions, give users only the permissions they need to do their work and no more.
Regularly review user permissions and take away one that they currently have to see if they will complain or even notice that it is missing.
Do not give management more permissions than users.
19. B. The basic premise of least privilege is: When assigning permissions, give users only the permissions they need to do their work and no more.
20. Which policy defines what constitutes sensitive data and applies protection to it?
Classification
BCP
Data review
Data theft
20. D. A data theft policy defines what constitutes sensitive data and applies protection to it.
Least Privilege
Assigning users only the rights that are required to perform their immediate duties.
ISO 27002
Human Resource Policies
Hiring Policies (screening)
Termination Policies (ending access)
Ethics policies (acceptable use) Privacy policies (confidentiality)  
Certificate Policies
Trusted CAs Certificate Uses Certificate Issuance
Privilege Audit
Verifying that users and groups have only the permissions necessary to perform their duties
Purpose of an Audit
testing and verifying the effectiveness of Policies and Procedures
Data Loss Policy (DLP)
Outlines responsibilities associated with data in an effort to minimize data loss or unauthorized access
Separation of Duties (user accounts)
Users with elevated privileges should have two accounts: one with elevated privileges and one without. The elevated account should only be used to perform functions that explicitly require elevated privileges.
Time of Day restrictions
Setting limits on the hours of the day that a user can log in. This reduces the likelihood of that account being used in an attack.
Ex. a 9-5 worker could have access hours of 8-6 M-F. This would reduce the vulnerability from 168 hours (24x7) to 50 hours (10x5)
Mandatory Vacations
Force an employee to take time off. This reduces the risk of burnout and illegal activity as well as making sure that someone else can perform a given job if necessary
Job rotations
Have employees switch jobs periodically. This reduces the risk of burnout and illegal activity as well as making sure that someone else can perform a given job if necessary
Trusted Transaction
Subscribing PArty - presents a certificate
Relying Party - receives a certificate
Third Pary (CA) - assures the certificate
x of y cards