PoIS - PRACTICE 3

_________ allows for the major security control components to be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.
System Review
Project Review
Program Review
Application Review
The __________ vulnerability assessment process is designed to find and document any vulnerability that is present on systems that may have telephone connections to the organization’s networks.
Modem
Phone-in
Battle-dialing
Network
The __________ vulnerability assessment is a process that is designed to find and document selected vulnerabilities that are likely to be present on the internal network of the organization.
Intranet
Internet
WAN
LAN
A step commonly used for Internet vulnerability assessment includes __________, which is when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.
Scanning
Subrogation
Delegation
Targeting
_________ penetration testing is usually used when a specific system or network segment is suspect and the organization wants the pen tester to focus on a particular aspect of the target
White box
Black box
Gray box
Green box
________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).
Penetration testing
Penetration simulation
Attack simulation
Attack testing
The __________ is a statement of the boundaries of the RA.
Scop
Disclaimer
Footer
Head
One approach that can improve the situational awareness of the information security function uses a process known as __________ to quickly identify changes to the internal environment
Baseline
Difference analysis
Differential
Revision
A process called __________ examines the traffic that flows through a system and its associated devices to identifies the most frequently used devices.
Difference analysis
Traffic analysis
Schema analysis
Data flow assessment
__________ is the requirement that every employee be able to perform the work of another employee.
Two-man control
Collusion
Duty exchange
Task rotation
Detailed __________ on the highest risk warnings can include identifying which vendor updates apply to which vulnerabilities as well as which types of defenses have been found to work against the specific vulnerabilities reported
Escalation
Intelligence
Monitoring
Elimination
The __________ mailing list includes announcements and discussion of an open-source IDPS
Nmap-hackers
Packer Storm
Security Focus
Snort-SIGs
The __________ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University
US-CERT
Bugtraq
CM-CERT
CERT/CC
The __________ commercial site focuses on current security tool resources
Nmap-hackerz
Packet Storm
Security Laser
Snort-SIGs
Control __________ baselines are established for network traffic and also for firewall performance and IDPS performance
System
Application
Performance
Environment
The __________ list is intended to facilitate the development of the leading free network exploration tool.
Nmap-dev
Packet Storm
Security Focus
Snort-sigs
________ is a cornerstone in the protection of information assets and in the prevention of financial loss.
Fire suppression
Business separation
Separation of duties
Collusion
A primary mailing list for new vulnerabilities, called simply __________, provides time-sensitive coverage of emerging vulnerabilities, documenting how they are exploited, and reporting on how to remediate them. Individuals can register for the flagship mailing list or any one of the entire family of its mailing lists.
Bug
Bugfix
Buglist
Bugtraq
When the memory usage associated with a particular CPU-based system averages __________% or more over prolonged periods, consider adding more memory
40
60
10
100
To evaluate the performance of a security system, administrators must establish system performance __________.
Baselines
Profiles
Maxima
Means
A __________ is the recorded state of a particular revision of a software or hardware configuration item
State
Version
Configuration
Baseline
A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle
Revision
Update
Change
Configuration
CompTIA offers a vendor-specific certification program called the Security+ certification
True
False
The SSCP examination is much more rigorous that the CISSP examination
True
False
A background check must always be conducted to determine the level of trust the business can place in a candidate for an information security position.
True
False
{"name":"PoIS - PRACTICE 3", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"_________ allows for the major security control components to be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate., The __________ vulnerability assessment process is designed to find and document any vulnerability that is present on systems that may have telephone connections to the organization’s networks., The __________ vulnerability assessment is a process that is designed to find and document selected vulnerabilities that are likely to be present on the internal network of the organization.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker