(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide. Mike Chapple

Чтение книги онлайн.

Читать онлайн книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple страница 52

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple

Скачать книгу

have the CEO or CISO perform the activities of security governance. Which of the following is true about security governance?Security governance ensures that the requested activity or access to an object is possible given the rights and privileges assigned to the authenticated identity.Security governance is used for efficiency. Similar elements are put into groups, classes, or roles that are assigned security controls, restrictions, or permissions as a collective.Security governance is a documented set of best IT security practices that prescribes goals and requirements for security controls and encourages the mapping of IT security ideals to business objectives.Security governance seeks to compare the security processes and infrastructure used within the organization with knowledge and insight obtained from external sources.

      5 You have been tasked with crafting a long-term security plan that is fairly stable. It needs to define the organization's security purpose. It also needs to define the security function and align it to the goals, mission, and objectives of the organization. What are you being asked to create?Tactical planOperational planStrategic planRollback plan

      6 Annaliese's organization is undergoing a period of increased business activity where they are conducting a large number of mergers and acquisitions. She is concerned about the risks associated with those activities. Which of the following are example of those risks? (Choose all that apply.)Inappropriate information disclosureIncreased worker complianceData lossDowntimeAdditional insight into the motivations of inside attackersFailure to achieve sufficient return on investment (ROI)

      7 Which security framework was initially crafted by a government for domestic use but is now an international standard, which is a set of recommended best practices for optimization of IT services to support business growth, transformation, and change; which focuses on understanding how IT and security need to be integrated with and aligned to the objectives of an organization; and which is often used as a starting point for the crafting of a customized IT security solution within an established infrastructure?ITILISO 27000CISCSF

      8 A security role is the part an individual plays in the overall scheme of security implementation and administration within an organization. What is the security role that has the functional responsibility for security, including writing the security policy and implementing it?Senior managementSecurity professionalCustodianAuditor

      9 Control Objectives for Information and Related Technology (COBIT) is a documented set of best IT security practices crafted by the Information Systems Audit and Control Association (ISACA). It prescribes goals and requirements for security controls and encourages the mapping of IT security ideals to business objectives. COBIT is based on six key principles for governance and management of enterprise IT. Which of the following are among these key principles? (Choose all that apply.)Holistic ApproachEnd-to-End Governance SystemProvide Stakeholder ValueMaintaining Authenticity and AccountabilityDynamic Governance System

      10 In today's business environment, prudence is mandatory. Showing due diligence and due care is the only way to disprove negligence in an occurrence of loss. Which of the following are true statements? (Choose all that apply.)Due diligence is establishing a plan, policy, and process to protect the interests of an organization.Due care is developing a formalized security structure containing a security policy, standards, baselines, guidelines, and procedures.Due diligence is the continued application of a security structure onto the IT infrastructure of an organization.Due care is practicing the individual activities that maintain the security effort.Due care is knowing what should be done and planning for it.Due diligence is doing the right action at the right time.

      11 Security documentation is an essential element of a successful security program. Understanding the components is an early step in crafting the security documentation. Match the following components to their respective definitions.PolicyStandardProcedureGuidelineA detailed, step-by-step how-to document that describes the exact actions necessary to implement a specific security mechanism, control, or solution.A document that defines the scope of security needed by the organization and discusses the assets that require protection and the extent to which security solutions should go to provide the necessary protection.A minimum level of security that every system throughout the organization must meet.Offers recommendations on how security requirements are implemented and serves as an operational guide for both security professionals and users.Defines compulsory requirements for the homogenous use of hardware, software, technology, and security controls.1 – I; 2 – IV; 3 – II; 4 - V1 – II; 2 – V; 3 – I; 4 - IV1 – IV; 2 – II; 3 – V; 4 - I1 – V; 2 – I; 3 – IV; 4 - III

      12 STRIDE is often used in relation to assessing threats against applications or operating systems. When confidential documents are exposed to unauthorized entities, which element of STRIDE is used to reference that violation?STRIDE

      13 A development team is working on a new project. During the early stages of systems development, the team considers the vulnerabilities, threats, and risks of their solution and integrates protections against unwanted outcomes. What concept of threat modeling is this?Threat huntingProactive approachQualitative approachAdversarial approach

      14 Supply chain risk management (SCRM) is a means to ensure that all the vendors or links in the supply chain are reliable, trustworthy, reputable organizations. Which of the following are true statements? (Choose all that apply.)Each link in the supply chain should be responsible and accountable to the next link in the chain.Commodity vendors are unlikely to have mined their own metals or processed the oil for plastics or etched the silicon of their chips.If the final product derived from a supply chain meets expectations and functional requirements, it is assured to not have unauthorized elements.Failing to properly secure a supply chain can result in flawed or less reliable products, or even embedded listing or remote control mechanisms.

      15 Your organization has become concerned with risks associated with the supply chain of their retail products. Fortunately, all coding for their custom product is done in-house. However, a thorough audit of a recently completed product revealed that a listening mechanism was integrated into the solution somewhere along the supply chain. The identified risk is associated with what product component in this scenario?SoftwareServicesDataHardware

      16 Cathy's employer has asked her to perform a documentation review of the policies and procedures of a third-party supplier. This supplier is just the final link in a software supply chain. Their components are being used as a key element of an online service operated for high-end customers. Cathy discovers several serious issues with the vendor, such as failing to require encryption for all communications and not requiring multifactor authentication on management interfaces. What should Cathy do in response to this finding?Write up a report and submit it to the CIO.Void the ATO of the vendor.Require that the vendor review their terms and conditions.Have the vendor sign an NDA.

      17 Whenever an organization works with a third party, its supply chain risk management (SCRM) processes should be applied. One of the common requirements is the establishment of minimum security requirements of the third party. What should these requirements be based on?Existing security policyThird-party auditOn-site assessmentVulnerability scan results

      18 It's common to pair threats with vulnerabilities to identify threats that can exploit assets and represent significant risks to the organization. An ultimate goal of threat modeling is to prioritize the potential threats against an organization's valuable assets. Which of the following is a risk-centric threat-modeling approach that aims at selecting or developing countermeasures in relation to the value of the assets to be protected?VASTSD3+CPASTASTRIDE

      19 The next step after threat modeling is reduction analysis. Reduction analysis is also known as decomposing the application, system, or environment. The purpose of this task is to gain a greater understanding of the logic of the product, its internal components, as well as its interactions with external elements. Which of the following are key components to identify when performing decomposition? (Choose all that apply.)Patch or update versionsTrust boundariesDataflow pathsOpen vs. closed source code useInput pointsPrivileged operationsDetails about security stance and approach

      20 Defense

Скачать книгу