Insights
Save
Terms in this set (208)
In a public key infrastructure (PKI), You are correct, the answer is A.
which of the following may be relied
upon to prove that an online
transaction was authorized by a A. Nonrepudiation, achieved through the use of
specific customer? digital signatures, prevents the senders from later
denying that they generated and sent the message.
Correct A. Nonrepudiation
B. Encryption may protect the data transmitted over
B. Encryption the Internet, but may not prove that the transactions
were made.
C. Authentication
C. Authentication is necessary to establish the
D. Integrity identification of all parties to a communication.
. D. Integrity ensures that transactions are accurate but
does not provide the identification of the customer
,Which of the following BEST ensures You are correct, the answer is C.
the integrity of a server's operating
system (OS)?
A. Protecting the server in a secure location is a
A. Protecting the server in a secure good practice, but does not ensure that a user will
location not try to exploit logical vulnerabilities and
compromise the operating system (OS).
B. Setting a boot password
B. Setting a boot password is a good practice, but
Correct C. Hardening the server does not ensure that a user will not try to exploit
configuration logical vulnerabilities and compromise the OS.
D. Implementing activity logging C. Hardening a system means to configure it in the
most secure manner (install latest security patches,
properly define access authorization for users and
administrators, disable insecure options and uninstall
unused services) to prevent nonprivileged users from
gaining the right to execute privileged instructions
and, thus, take control of the entire machine,
jeopardizing the integrity of the OS.
D. Activity logging has two weaknesses in this
scenario—it is a detective control (not a preventive
one), and the attacker who already gained privileged
access can modify logs or disable them.
,The IS auditor is reviewing an You answered B. The correct answer is D.
organization's human resources (HR)
database implementation. The IS
auditor discovers that the database A. Digital signatures are used for authentication and
servers are clustered for high nonrepudiation, and are not commonly used in
availability, all default database databases. As a result, this is not an area in which the
accounts have been removed and IS auditor should investigate.
database audit logs are kept and
reviewed on a weekly basis. What B. A nonce is defined as a "parameter that changes
other area should the IS auditor check over time" and is similar to a number generated to
to ensure that the databases are authenticate one specific user session. Nonces are
appropriately secured? not related to database security (they are commonly
used in encryption schemes).
A. Database digital signatures
C. A media access control (MAC) address is the
Incorrect B. Database encryption hardware address of a network interface. MAC
nonces and other variables address authentication is sometimes used with
wireless local area network (WLAN) technology, but
C. Database media access control is not related to database security.
(MAC) address authentication
D. When a database is opened, many of its
D. Database initialization parameters configuration options are governed by initialization
parameters. These parameters are usually governed
by a file ("init.ora" in the case of Oracle DBMS), which
contains many settings. The system initialization
parameters address many "global" database settings,
including authentication, remote access and other
critical security areas. To effectively audit a database
implementation, the IS auditor must examine the
database initialization parameters.
, Which of the following processes will You answered C. The correct answer is B.
be MOST effective in reducing the risk
that unauthorized software on a
backup server is distributed to the A. Even if replication is be conducted manually with
production server? due care, there still remains a risk to copying
unauthorized software from one server to another.
A. Manually copy files to accomplish
replication. B. It is common practice for software changes to be
tracked and controlled using version control
B. Review changes in the software software. An IS auditor should review reports or logs
version control system. from this system to identify the software that is
promoted to production. Only moving the versions
Incorrect C. Ensure that developers on the version control system (VCS) program will
do not have access to the backup prevent the transfer of development or earlier
server. versions.
D. Review the access control log of C. If unauthorized code was introduced onto the
the backup server. backup server by developers, controls on the
production server and the software version control
system should mitigate this risk.
D. Review of the access log will identify staff access
or the operations performed; however, it may not
provide enough information to detect the release of
unauthorized software.