Chapter 12 - 12 True/False Indicate whether the statement...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
12 True/False Indicate whether the statement is true or false. ____ 1. If an organization deals successfully with change and has created procedures and systems that can be adjusted to the environment, the existing security improvement program will probably continue to work well. ____ 2. As threats evolve or new vulnerabilities in the systems emerge, the information security team must determine if a shift in the priorities of the organization’s security posture is required. ____ 3. The tracking of trouble tickets should include tracking problem resolution. ____ 4. Policies can be considered enforceable even if they have not been understood and agreed to. ____ 5. Users do not participate in configuration management. ____ 6. Documentation procedures are not required for configuration and change management processes. ____ 7. When the amount of data stored on a particular hard drive averages 30-40% of available capacity for a pro- longed period, consider an upgrade for the hard drive. ____ 8. A maintenance model such as the ISO model deals with methods to manage and operate systems. ____ 9. External monitoring entails collecting intelligence from various data sources, and then giving that intelligence context and meaning for use by decision makers within the organization. ____ 10. Often, US-CERT is viewed as a definitive authority with regard to computer and information security events. ____ 11. Many publicly accessible information sources, both mailing lists and Web sites, are available to those organ- izations and individuals who have the time, expertise, and grant access to make use of them. ____ 12. Over time, external monitoring processes should capture information about the external environment in a format that can be referenced both across the organization as threats emerge and for historical use. ____ 13. The value of internal monitoring is low when the resulting knowledge of the network and systems configura- tion is fed into the vulnerability assessment and remediation maintenance domain. ____ 14. The characteristics concerned with manufacturer and software versions are about technical functionality — and they should be kept highly accurate and up-to-date. ____ 15. The target selection step involves using the external monitoring intelligence to configure a test engine (such as Nessus) for the tests to be performed. ____ 16. The intranet scan starts with an Internet search engine. ____ 17. All systems that are mission critical should be enrolled in PSV measurement. ____ 18. All telephone numbers controlled by an organization should be tested, unless the configuration of the phone equipment on premises can assure that no number can be dialed from the worldwide telephone system. ____ 19. The vulnerability database, like the risk, threat, and attack database, both stores and tracks information. ____ 20. Remediation of vulnerabilities can be accomplished by accepting or transferring the risk, removing the threat, or repairing the vulnerability. ____ 21. In some instances, risk is acknowledged as being part of an organization’s business process. ____ 22. Threats cannot be removed without requiring a repair of the vulnerability.
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
____ 23. Rehearsal adds value by exercising the procedures, identifying shortcomings, and providing security person- nel the opportunity to improve the security plan before it is needed. ____ 24. Policy needs to be reviewed periodically. ____ 25. Major planning components should be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate. Modified True/False Indicate whether the statement is true or false. If false, change the identified word or phrase to make the statement true. ____ 26. The CISO uses the results of maintenance activities and the review of the information security program to de- termine if the status quo can adequately meet the threats at hand. _________________________ ____ 27. In the original ISO model, real management is the process of identifying, tracking, diagnosing, and resolving faults in the system. _________________________ ____ 28. A trouble ticket is closed when a user calls about an issue. _________________________ ____ 29. Facilities management is the administration of the configuration of the components of the security program. _________________________ ____ 30. In order to assist in the actual management of information security programs, organizations should adopt a formal management standard that can provide some insight about what processes and procedures are needed. _________________________ ____ 31. ISO 7799 (Part 2) introduces a process model with a set of steps called Plan-Do-Check-Act. _________________________ ____ 32. CERTs stands for computer emergency recovery teams. _________________________ ____ 33. UN-CERT is a set of moderated mailing lists full of detailed, full-disclosure discussions and announcements about computer security vulnerabilities. _________________________ ____ 34. Specific routine bulletins are issued when developing threats and specific attacks pose a measurable risk to the organization. _________________________ ____ 35. The basic function of the external monitoring process is to monitor activity, report results, and escalate warn- ings. The summaries present either statistical results or itemized lists of significant new vulnerabilities. _________________________ ____ 36. The primary goal of the external monitoring domain is to maintain an informed awareness of the state of all of the organization’s networks, information systems, and information security defenses. _________________________ ____ 37. Organizations should have a carefully planned and fully populated inventory of all their network devices, communication channels, and computing devices. _________________________ ____ 38. The primary value of active evolution in an organization-wide IT governance process is the increased aware- ness of the impact of change. _________________________ ____ 39. Many organizations have an architecture review board designated to plan, review, and approve managed tech- nology. _________________________ ____ 40. To be put to the most effective use, the information that comes from the IDPS must be integrated into the in - ventory process. _________________________
Image of page 2
____ 41. An example of the type of vulnerability exposed via traffic analysis can be observed when an organization is trying to determine if all its device signatures have been adequately masked. _________________________ ____ 42. The process of identifying and documenting specific and provable flaws in the organization’s information as- set environment is called VA . _________________________ ____ 43. The internal vulnerability assessment is usually performed against all public-facing addresses, using every possible penetration testing approach. _________________________ ____ 44. You can document the results of the verification by saving a(n) profile . _________________________ ____ 45. WLAN stands for wide local area network. _________________________ ____ 46. The final process in the vulnerability assessment and remediation domain is the exit phase. _________________________ ____ 47. The optimum solution in most cases is to repair the vulnerability . _________________________ ____ 48. When possible, major plan elements should be rehearsed . _________________________ ____ 49. The CERT uses the results of maintenance activities and the review of the information security program to determine if the status quo can adequately meet the threats at hand. _________________________ ____ 50. A(n) war game puts a subset of plans in place to create a realistic test environment. _________________________ Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 51. ____ are a component of the security triple. a. Threats c. Vulnerabilities b. Assets d. All of the above
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern