chapter-7
chapter-7
Multiple-Choice Questions
A. Monitor
B. Audit
C. Improve
D. Secure
Explanation: During the audit phase of a security review, professionals review the logs
and overall environment to provide independent analysis of how well the security policy
and controls work.
2. Christopher is designing a security policy for his organization. He would like to use an
approach that allows a reasonable list of activities but does not allow other activities.
Which permission level is he planning to use?
A. Promiscuous
B. Permissive
C. Prudent
D. Paranoid
Explanation: The prudent permission level allows a reasonable list of activities to take
place and prohibits all other activities. This permission level is suitable for most
businesses.
4. Which regulatory standard would NOT require audits of companies in the United
States?
Explanation: PIPEDA is a Canadian law and would not affect companies in the United
States.
5. Emily is the information security director for a large company that handles sensitive
personal information. She is hiring an auditor to conduct an assessment demonstrating
that her firm is satisfying requirements regarding customer private data. What type of
assessment should she request?
A. SOC 1
B. SOC 2
C. SOC 3
D. SOC 4
Answer: C Reference: Customer Confidence
Explanation: The SOC 3 report is commonly required for the customers of SOC 2 service
providers to verify and validate that the organization is satisfying customer private data
and compliance law requirements.
6. Which item is an auditor least likely to review during a system controls audit?
A. ISO 27002
B. Control Objectives for Information and related Technology (COBIT)
C. IT Infrastructure Library (ITIL)
D. NIST Cybersecurity Framework (CSF)
A. Checklist
B. Interviews
C. Questionnaires
D. Observation
Explanation: Auditors use checklists to ensure that they have covered all of the relevant
information items during their data collection process.
Explanation: When auditing an identity management system, you should focus on three
key questions. First, who grants approval for access requests? Second, which
mechanisms are used for specific security requirements? Finally, does the organization
have an effective password policy and is it uniformly enforced? Firewalls are not
generally in scope for an identity management system audit.
10. What information should an auditor share with the client during an exit interview?
Explanation: During the exit interview, the auditor should alert key personnel of major
issues and recommendations that will come later in the audit report. This enables
management to respond quickly and act on serious issues. Aside from these early alerts,
auditors should not provide details before the final report.
A. Findings
B. System configurations
C. Recommendations
D. Timeline for Implementation
Explanation: The audit report generally contains these broad sections: findings,
recommendations, timeline for implementation, level of risk, management response,
and follow-up
12. What type of security monitoring tool would be most likely to identify an
unauthorized change to a computer system?
A. Network IDS
B. System integrity monitoring
C. CCTV
D. Data loss prevention
Explanation: System integrity monitoring tools, such as Tripwire, enable you to watch
computer systems for unauthorized changes and report them to administrators in near
real time.
14. Anthony is responsible for tuning his organization's intrusion detection system. He
notices that the system reports an intrusion alert each time that an administrator
connects to a server using Secure Shell (SSH). What type of error is occurring?
Explanation: A false positive error occurs when a system indicates malicious activity but
it is not a real security event. False alarms are distractions that waste administrative
effort.
15. Isaac is responsible for performing log reviews for his organization in an attempt to
identify security issues. He has a massive amount of data to review. What type of tool
would best assist him with this work?
Explanation: SIEM systems help organizations manage the explosive growth of log files.
SIEMs provide a platform to capture and analyze logs from many different sources.
16. Which intrusion detection system strategy relies upon pattern matching?
A. Behavior detection
B. Traffic-based detection
C. Statistical detection
D. Signature detection
Explanation: Signature detection systems use rule-based detection and rely upon pattern
matching to compare current traffic with activity patterns of known network attacks.
17. Which security testing activity uses tools that scan for services running on systems?
A. Reconnaissance
B. Penetration testing
C. Network mapping
D. Vulnerability testing
Explanation: Network mapping uses software tools that scan for services running on an
organization's systems and networks.
A. Black-box test
B. White-box test
C. Grey-box test
D. Blue-box test
Explanation: In a black-box test, the assessor uses test methods that aren't directly
based on knowledge of a program's architecture or deign. The tester does not have the
source code.
A. Managers should write a report after receiving the final audit report.
B. Managers should include their responses to the draft audit report in the final audit
report.
C. Managers should not have an opportunity to respond to audit findings.
D. Managers should write a letter to the Board following receipt of the audit report.
Explanation: Managers should review the draft audit report and have an opportunity to
provide a management response to each finding that will be included in the final copy of
the audit report.
20. Which activity is an auditor least likely to conduct during the information-gathering
phase of an audit?
A. Vulnerability testing
B. Report writing
C. Penetration testing
D. Configuration review
True/False Questions
A. True
B. False
Explanation:
Type: True/False
A. True
B. False
Type: True/False
3. An SOC 1 report is commonly implemented for organizations that must comply with
Sarbanes-Oxley (SOX) or the Gramm-Leach-Bliley Act (GLBA).
A. True
B. False
Explanation:
Type: True/False
A. True
B. False
Explanation:
Type: True/False
5. During an audit, an auditor compares the current setting of a computer or device with
a benchmark to help identify differences.
A. True
B. False
Explanation:
Type: True/False
A. True
B. False
Answer: A Reference: Post-Audit Activities
Explanation:
Type: True/False
7. During the secure phase of a security review, you review and measure all controls to
capture actions and changes on the system.
A. True
B. False
Explanation: During the monitor phase, you review and measure all controls to capture
actions and changes on the system. In the secure phase, you ensure that new, and
existing, controls work together to protect the intended level of security.
Type: True/False
8. Regarding security controls, the four most common permission levels are poor,
permissive, prudent, and paranoid.
A. True
B. False
Explanation: The four most common permission levels are promiscuous, permissive,
prudent, and paranoid.
Type: True/False
9. SOC 2 reports are created for internal and other authorized stakeholders and are
commonly implemented for service providers, hosted data centers, and managed cloud
computing providers.
A. True
B. False
Explanation:
Type: True/False
10. During the planning and execution phases of an audit, an auditor will most likely
review risk analysis output.
A. True
B. False
Explanation:
Type: True/False
A. True
B. False
Type: True/False
12. Performing security testing includes vulnerability testing and penetration testing.
A. True
B. False
Explanation:
Type: True/False
13. In security testing data collection, observation is the input used to differentiate
between paper procedures and the way the job is really done.
A. True
B. False
Explanation:
Type: True/False
14. A report indicates that a system's disk is 80 percent full is a good indication that
something is wrong with that system.
A. True
B. False
Explanation: A report indicating that a system's disk is 80 percent full is not necessarily
an indication that something is wrong with that system. You need to know what normal
looks like on that system by establishing a baseline, so you know when something is
wrong.
Type: True/False
15. Data loss prevention (DLP) uses business rules to classify sensitive information to
prevent unauthorized end users from sharing it.
A. True
B. False
Explanation:
Type: True/False
16. Regarding log monitoring, false negatives are alerts that seem malicious but are not
real security events.
A. True
B. False
Explanation: False positives are alerts that seem malicious but are not real security
events. False negatives are the failure of the alarm system to detect a serious event.
Type: True/False
17. The four main types of logs that you need to keep to support security auditing
include event, access, user, and security.
A. True
B. False
Explanation: The four main types of logs that you need to keep to support security
auditing include event, access, security, and audit.
Type: True/False
18. Anomaly-based intrusion detection systems compare current activity with stored
profiles of normal (expected) activity.
A. True
B. False
Explanation:
Type: True/False
A. True
B. False
Explanation:
Type: True/False
20. Regarding an intrusion detection system (IDS), stateful matching looks for specific
sequences appearing across several packets in a traffic stream rather than just in
individual packets.
A. True
B. False
Explanation:
Type: True/False
Category Stats
Analyze: 2
Apply: 5
Evaluate: 0
Remember: 2
Understand: 11
Difficulty Stats
Easy: 5 Medium: 12 Hard: 3