CYSA All in One Practice PDF
CYSA All in One Practice PDF
CYSA All in One Practice PDF
CHAPTER 1
Applying Reconnaissance
Techniques
Q QUESTIONS
A IN-DEPTH ANSWERS
CHAPTER 2
Analyzing the Results of
Reconnaissance
Q QUESTIONS
A IN-DEPTH ANSWERS
Q QUESTIONS
A. Illustration A
B. Illustration B
C. Both illustrations
D. Neither illustration
15. Ensuring patches are properly tested and deployed can be a
challenging but necessary task. Which of the following
statements are true regarding patching? (Choose all that apply.)
A. Patch testing should be done very soon after vendor release.
B. Before patches are deployed, patches should be carefully
tested, staged, and finally rolled out to production.
C. If done carefully, patches can be tested, staged, and sent to
production at the same time.
D. If time is critical, patches can be tested and staged at the same
time.
16. A cybersecurity analyst has identified a significant
vulnerability to the company’s payroll server application. The
analyst’s recommendation is to immediately patch the
vulnerability. Unfortunately, because the application was
developed internally and its developer has since left, the
application cannot be patched. Without a patch, the analyst has
to use other options to lessen the risk. Such options include
using a host-based IDS on the application server and additional
logging on upstream network devices. What is the term to
describe the analyst’s options?
A. Network isolation
B. Location-based access control
C. Mandatory access control
D. Compensating controls
17. What hardening technique can be described as “minimizing
the attack surface”?
A. Blocking unused ports and services
B. Endpoint security
C. Compensating controls
D. Role-based access control
18. What access control model involves granting explicit
authorization for a given object, per a given user?
A. Group policies
B. RBAC
C. MAC
D. Role-based
19. What is a technique that allows system administrators to
apply configuration changes to several systems at once?
A. NAC
B. GPO
C. ACL
D. IDS
20. A company would like for access only to be granted if the
employee’s laptop meets a number of criteria. Specific
conditions that each laptop must meet include only the approved
version of Windows, mail application v2.5 or higher, web
browser v8.0, and database application v1.18. Also, each laptop
must have no unauthorized storage attached. What access
control model would you recommend the company use?
A. Location-based
B. Rule-based
C. Role-based
D. Mandatory access control
QUICK ANSWER KEY
1. A
2. A, B, D
3. D
4. B
5. A, B, D, E, F
6. C
7. A, C
8. B
9. C
10. A
11. A, C
12. B
13. C
14. A
15. A, B, D
16. D
17. A
18. C
19. B
20. B
A IN-DEPTH ANSWERS
• Penetration testing
• Reverse engineering
• Risk evaluation
Q QUESTIONS
A IN-DEPTH ANSWERS
CHAPTER 5
Implementing Vulnerability
Management Processes
Q QUESTIONS
A IN-DEPTH ANSWERS
CHAPTER 6
Vulnerability Scanning
Q QUESTIONS
A IN-DEPTH ANSWERS
1. What are the most important types of results to identify from
a vulnerability scan report? (Choose two.)
A. False positives
B. False negatives
C. Policy validation
D. Exceptions to policy
A and D are correct. The two early results to identify in a scan
report are false positives and policy exceptions. After factoring
out false positives (those that seem like a vulnerability but are
not) and policy exceptions (those that are authorized), then the
remaining vulnerabilities need responses.
B and C are incorrect. B is incorrect because false negatives
are not identified and hence not to be found on the report. C is
incorrect because policy validation does not make sense.
2. What is the main purpose of the report after a vulnerability
scan is complete?
A. It is to be analyzed by the cybersecurity team responsible for
the scan.
B. It is used to evaluate the team responsible for the target
environment.
C. It is included in the full report given to executive
management.
D. It is used as a baseline for future vulnerability scans.
A is correct. The first goal is to analyze the report. That is done
by the team responsible for the scan.
B, C, and D are incorrect. B is incorrect because evaluating the
internal team is not a responsibility of the scan team. C is
incorrect because although the results will go in the final report,
merely inserting the results is obviously not the primary goal. D
is incorrect because, again, it’s not a primary goal, even though
the scan might act as a baseline for future scans, or be compared
against a prior scan.
3. A report outcome that at first seems suspicious but later
proves to be neutral is called a what?
A. False negative
B. True positive
C. True negative
D. False positive
D is correct. A false positive is a result that seems suspicious
or valid at first, but when later investigated is deemed not an
issue.
A, B, and C are incorrect. A is incorrect because a false
negative is a genuine vulnerability that escapes being reported. B
is incorrect because a true positive is a silly answer. C is
incorrect because a true negative is also a silly answer.
4. When it comes to prioritizing report outcomes, which of the
following would you consider when deciding on response
actions? (Select all that apply.)
A. True negatives
B. False positives
C. Policy exceptions
D. Validated vulnerabilities
A and D are correct. True negatives (genuine, reported
vulnerabilities) will be evaluated for responses. The same goes
for validated vulnerabilities.
B and C are incorrect. B is incorrect because false positives
should be identified and removed from consideration because
they are not actual vulnerabilities. The same goes for C, policy
exceptions, because they are authorized to remain as
vulnerabilities.
5. Vulnerability scanning does not always return reliable and
accurate results. The results depend heavily on the systems
being scanned. Which of the following systems would be the least
likely to be identified and return genuine scan results? (Choose
two.)
A. CCTV camera, web-enabled with embedded Apache
B. An open source firewall, customized by the scan target client
C. Windows 2012 server, missing three months of patches and
the latest Service Pack
D. Novell NetWare 6.5
A and B are correct. Devices with embedded Apache server or
lightweight versions of Linux tend to be especially challenging
targets. Likewise, the firewall, customized by the customer,
might present a unique profile to the scanner.
C and D are incorrect. C is incorrect because the Windows
server is a standard, well-known system for the scanner, and
likely to produce fairly reliable results. Similarly for D, the
NetWare system should be a recognizable target.
6. Alongside results in the scan report, it’s common to see
references to external sources such as OSVDB and NVD. What is
the reason for vulnerability scanners to include information
from those databases?
A. The sources provide validation to the scan results.
B. The sources offer additional information and possibly
mitigating actions.
C. The sources provide links to upload sanitized data from the
scan.
D. The sources specify whether a result is a false positive or a
genuine vulnerability.
B is correct. These databases provide additional information
and sometimes even mitigating solutions.
A, C, and D are incorrect. A is incorrect because the databases
cannot validate your findings. C is incorrect because the results
would not be uploaded to such sources. D is incorrect because
such databases do not help validate or confirm a result as a false
positive.
7. What is primary value of STIGs and NSA guides?
A. They are a source of “best practice” principles.
B. They are a proven source of vulnerability validation steps.
C. They provide checklists detailing regulatory compliance.
D. They specify configuration steps for secure networking.
A is correct. The STIGs (Security Technical Implementation
Guides) and NSA guides are configuration guides on how to
harden government information systems; hence, they provide
excellent reference for “best practices.”
B, C, and D are incorrect. B is incorrect because these guides
do not offer steps on how to validate vulnerability scan results. C
is incorrect because they might offer checklists to a degree, but
such checklists are not their primary value. D is incorrect
because, although some guides may offer hardening steps for
networking devices, this is not their primary value.
8. Which of the following are good sources of validating scan
results? (Choose all that apply.)
A. Interviewing the system’s owner
B. Reviewing the system’s event log
C. Comparing against past vulnerability reports and results
D. Examining system and network data such as open ports and
services
B and D are correct. Reviewing the system’s logs is a good way
of actually validating results. Also, checking system- and
network-related data such as what ports are open or what
services are actually running is another method for validating
report results.
A and C are incorrect. A is incorrect because the system’s
owner might really believe an additional service isn’t running,
but it is. C is incorrect because although comparing against past
reports may show a trend, it doesn’t really validate results.
9. What method allows the internal security team to tailor threat
mitigation strategies, evaluate how effective those strategies are,
and see the change of controls over time?
A. Comparing a system against similar systems in the
environment
B. Comparing the current system against the original image,
when available
C. Comparing the system’s trend in reported vulnerabilities
D. Comparing the results with the system’s logs
C is correct. Comparing the system over time, or how the
vulnerabilities trend, is a likely feature in the vulnerability
scanner.
A, B, and D are incorrect. A is incorrect because every system
is unique. Comparing against other systems to make decisions is
not recommended. B is incorrect because comparing against the
original image would likely be very misleading. D is incorrect
because comparing reported results with system logs helps
validate the results but doesn’t give much value over time.
10. What is best described as comparing a scan report against
the personal and documented notes of the scan operator? Such
notes would include scanning steps as well as observations
around the scan devices’ configuration and operation.
A. Trending the results
B. Validating the results
C. Reconciling the results
D. Managing the results
C is correct. Reconciling results involves comparing the scan
report findings with the scan operator’s notes and observations.
It is critical to take detailed notes; these are invaluable for
verifying and validating the report.
A, B, and D are incorrect. A is incorrect because trending the
results is not the same as comparing results to notes. B is
incorrect because validating the results sounds reasonable but is
not as thorough as reconciling against the operator’s notes. D is
incorrect because managing the results is not a sensible term.
11. What type of scanning target would commonly have
vulnerabilities due to the existence of unnecessary services and
open ports?
A. IDS
B. SCADA device
C. VPN
D. Server
D is correct. A common vulnerability in servers is having
unnecessary services running or open ports.
A, B, and C are incorrect. A is incorrect because an IDS doesn’t
run services like a server. B is incorrect because it is less
common for SCADA devices to be running unnecessary services
than it is for servers. SCADA devices will typically run only the
essential services, albeit unpatched. C is incorrect because VPNs
don’t include services and open ports.
12. For which type of scanning target is it particularly easy to
show duplicate vulnerabilities?
A. VPN
B. Virtual infrastructure
C. Mobile device
D. SCADA device
B is correct. A virtual infrastructure such as a virtual machine
(VM) starts with a VM image. VMs are far more easily copied and
replicated. A vulnerability in the origin VM image is simply
copied to the replicated VMs, making vulnerabilities easily
duplicated across many machines.
A, C, and D are incorrect. A is incorrect because VPNs are
typically not as common as virtual infrastructure. C is incorrect
because mobile devices can be unique, with vulnerabilities
varied between vendors and owners. D is incorrect because
although SCADA devices may have vulnerabilities due to
infrequent updates, those vulnerabilities are not commonly
duplicated across devices.
13. A vulnerability found in a hypervisor threatens the security
of what devices? (Choose two.)
A. Endpoint
B. Host server
C. Virtual machine
D. Network device
B and C are correct. The hypervisor sits between a host server
and the virtual machines. Therefore, a vulnerability in the
hypervisor can potentially affect both host and guest machines.
A and D are incorrect. Network devices and endpoints are not
dependent on a hypervisor (unless they are virtual devices).
14. A cybersecurity analyst is briefing the CEO on the encrypted
nature of VPNs. The CEO, understanding how well VPNs protect
confidentiality, asks what their primary vulnerability is. What
should be the cybersecurity analyst’s response?
A. VPNs connect external devices to the internal network.
B. VPNs mask network traffic from monitoring.
C. VPN encryption is difficult to configure.
D. VPNs have no vulnerabilities.
A is correct. VPNs can introduce vulnerabilities because they
connect unsecured devices to the protected, internal network.
B, C, and D are incorrect. B is incorrect because although
VPNs do mask network monitoring, if need be a host-based or
server-based IDS can monitor traffic. C is incorrect because
encryption should not be difficult for the person responsible for
setting it up. D is incorrect because every cybersecurity analyst
knows that every device has vulnerabilities.
15. An attacker seeks to enter a protected corporate network.
Fortunately, the company’s cybersecurity team has locked down
the network well. Instead, the attacker discovers an open port in
a maintenance-related network. Moving laterally, the attacker
then moves onto the protected network. What is the source of
the vulnerability overlooked by the cybersecurity team?
A. VPN connection
B. Virtualized switch
C. No encryption on either network
D. Interconnected networks
D is correct. Networks that are unrelated but connected can
provide pathways for persistent attackers. Interconnected
networks are an often-overlooked vulnerability.
A, B, and C are incorrect. A is incorrect because it’s unlikely
that a VPN was involved. B is incorrect because there was no
mention of a virtualized switch. C is incorrect because
encryption probably wouldn’t have helped here.
16. What type of scanning target would commonly have
vulnerabilities due to limitations imposed by carriers?
A. Mobile device
B. Virtual network infrastructure
C. Server
D. Industrial control system
A is correct. Mobile device owners can find they are limited by
their carrier in terms of upgrading or updating their operating
systems.
B, C, and D are incorrect. Carriers have little to no influence
on virtualized network infrastructures, servers, and industrial
control systems.
17. What is a source of vulnerabilities for essentially all devices?
A. No encryption
B. Patch updates and upgrades
C. Low memory and/or storage space
D. Policy exceptions
B is correct. Being slow to patch or update is a vulnerability
common to nearly every device or platform.
A, C, and D are incorrect. A is incorrect because encryption is
not common enough that a lack of it is considered a universal
vulnerability. C is incorrect because memory and storage space
are cheap and are not a common problem. D is incorrect because
although policy exceptions may be an accepted vulnerability,
they are not so common.
18. Which term describes what permits a VM to connect to an
outside network?
A. Management interface
B. Interconnected network
C. Virtual private network
D. Virtual network
D is correct. It is the virtual network that enables the VM to
communicate with the outside world.
A, B, and C are incorrect. A is incorrect because a management
interface is not what connects a VM to a network; rather, it
manages the connection. B is incorrect because “interconnected
network” refers to more than one network type being connected.
C is incorrect because a VPN is a means of connecting two
devices and segregating traffic from their network. However,
VPNs are not restricted to virtual machines.
19. What do the network protocols IPSec, L2TP, TLS, and DTLS
have in common?
A. They facilitate virtual private networks.
B. All are Layer 2 protocols.
C. They are used exclusively for virtual networks.
D. They build interconnections between protected and
peripheral networks.
A is correct. These protocols all can be found when you’re
setting up a VPN.
B, C, and D are incorrect. These protocols are not exclusively
Layer 2 protocols and are not found only on virtual networks.
Also, they are not intended for linking dissimilar networks.
20. Which of the following characteristics is prominent in
Supervisory Control and Data Acquisition systems?
A. They typically cover a wide geographical area.
B. They contain several types of control systems, including ICS
(industry control systems).
C. They are common, with only one person operating them
locally.
D. They rely on obscure networking protocols such as IPX/SPX.
A is correct. SCADA systems are known for covering a large
geographical area.
B, C, and D are incorrect. B is incorrect because SCADA does
not include ICS systems; instead, it’s the other way around.
SCADA is a subset of industry control systems. C is incorrect
because SCADA systems are typically unmanned, with no one
operating them locally. D is incorrect because, up until recently,
the security of SCADA systems relied on the obscurity of its
communications. However, IPX/SPX, the NetWare protocols of
the 1990s, were not the protocols used.
21. After creating several virtual machines, a system
administrator took great effort to harden the virtual systems.
When finished, the administrator sought approval from the
security team and asked the cybersecurity analyst to try to
compromise any one of the machines. Within a short amount of
time, the administrator noticed that all the machines were
running with great difficulty. A little investigation revealed the
virtual systems were running with only one-fourth of the original
memory. The host system was operating normally. When asked,
the administrator claimed no machine was accessed. Where was
the likely vulnerability?
A. Virtual network
B. Management interface
C. Host system physical memory
D. WAP
B is correct. The cybersecurity analyst accessed the
unprotected management interface, then reduced the memory of
the VMs to demonstrate access to the interface.
A, C, and D are incorrect. A is incorrect because accessing the
virtual network would not have effectively removed three-
fourths of the memory in all VMs. C is incorrect because
changing the host system’s memory would not have affected the
VM memory this way. D is incorrect because accessing a wireless
access point would not have changed the VM memory.
22. What is the term used to describe when an attacker is able to
leap from a virtual machine to the host machine?
A. Lateral move
B. Virtual interruption
C. Escape
D. Sandbox jump
C is correct. Leaving the VM and accessing the host system is
called an escape.
A, B, and D are incorrect. None of these is the correct term to
describe moving from the VM to the host.
23. What are the most common vulnerabilities found in a
network infrastructure? (Select two)
A. Misconfiguration
B. Broadcast storms
C. WAP
D. Enabled COM port
A and C are correct. The misconfiguration of network devices
and the wireless access point are the biggest vulnerabilities.
B and D are incorrect. Broadcast storms and having
unprotected COM ports are both fairly rare events for network
devices. And when they do occur, we can likely blame
misconfiguration.
24. In terms of mitigating vulnerabilities, network appliances
should be treated as specialized forms of what type of device?
A. WAP
B. Endpoint
C. Server
D. Virtual host
C is correct. A network appliance is essentially a customized
server, performing some specialized function, such as web proxy
or caching server.
A, B, and D are incorrect. Network appliances are generally
servers, more so than wireless access points, endpoints, or
virtual hosts.
25. Stuxnet, which targeted the uranium enrichment centrifuges
run in Iran, was an example of malware targeting what type of
system?
A. VM
B. ICS
C. HMI
D. NAC
B is correct. The malware Stuxnet, written solely to attack the
uranium enrichment program in Iran, specifically targeted the
industry control system (ICS) running within the facility.
A, C, and D are incorrect. Stuxnet didn’t target a VM (virtual
machine), a human-machine interface (HMI), or any network
access control (NAC).
26. What type of system presents a unique challenge in updating
due to how critical its uptime is?
A. HVAC
B. Finance server
C. SCADA
D. Perimeter network protection
C is correct. SCADA systems typically allow for no downtime
because they provide critical services. No allowable downtime
means no maintenance for updates or patching.
A, B, and D are incorrect. A is incorrect because HVAC
(heating, ventilation, and air conditioning) is not exactly critical
infrastructure. B is incorrect because finance servers would be
permitted some downtime for patching. D is incorrect because
perimeter network protection devices would certainly need to be
kept up to date and would probably include some level of
redundancy to allow for downtime.
27. An employee has come to you with concerns about installing
a software package on their desktop. When you ask how
confident they are that the software is secure and from a safe
vendor, the employee assures you the package was “signed by a
certificate.” However, the employee mentioned that during the
installation an error appeared, complaining about the signing
certificate, but they clicked the error too quickly to actually
understand it. A dialog box is still on the desktop screen,
showing additional information about the certificate. From
Figure 6-1, can you determine what the likely error was?
A. The certificate has expired.
B. The certificate is from an untrusted source.
C. The certificate is based on inadequate encryption.
D. The certificate fingerprint is invalid.
Figure 6-1 Certificate details
• Containment techniques
• Eradication techniques
• Response validation
• Corrective actions
Q QUESTIONS
13. Referring again to Figure 7-1, consider the roles that should
be involved when the company’s server for handling payment
transactions is compromised by an external hacker. Which of the
following list of names includes all the stakeholders?
A. Brown, Vaughn, Jobu, Cerrano, Hays
B. Phelps, Brown, Jobu, Hays
C. Phelps, Brown, Vaughn, Hays
D. Phelps, Brown, Vaughn, Cerrano, Hays
14. A company recently finished responding to a serious incident
of attempted sabotage. The attack seemed suspiciously like it was
caused by a current employee. Although the investigation to
identify the precise employee is still ongoing, the internal
cybersecurity analysts are certain the attack originated from
accounts payable in the finance department. The incident
summary report has been finished and was sent in encrypted
format to the department heads and local managers of admin,
HR, finance, manufacturing, and shipping. Select from the
following list the one risk that could have been avoided.
A. Communication disclosure based on regulatory requirements
B. Extensive communication with management
C. Insecure method of communication
D. Inadvertent release of information to the public
15. Allowing for budget, what option does a company have when
its lack of technical expertise means the company doesn’t have
its own internal CSIRT team?
A. Retain an incident response provider.
B. Cross-train all employees in incident response techniques.
C. None. The company has no ability to respond to incidents.
D. Empower the night security guard to watch over the data
center.
16. What are the main challenges for the technical role of
incident response? (Choose two.)
A. Having the necessary technical expertise to address the
incident
B. Licensing the proper software tools
C. Granting or delegating the authority for unforeseen decisions
D. Overcoming personality differences and in-house rivalries
17. A company that has grown quickly in size has not yet
developed a proper communication escalation process in the
event of a security incident. Instead, managers of the
cybersecurity team post their analysis and findings on the
company’s internal blog site. In an effort to maintain
confidentiality, the blog posts are kept hidden, with no link on
the front page. What is the shortcoming of this communication
process?
A. Disclosure based on legislative requirements
B. Possible inadvertent release of information
C. No encryption
D. Little opportunity for discussion and questions
QUICK ANSWER KEY
1. E
2. A
3. A
4. D
5. D
6. B
7. D
8. C
9. C
10. D
11. C
12. A
13. D
14. B
15. A
16. A, C
17. B
IN-DEPTH ANSWERS A
1. Which of the following is not considered an important
stakeholder during incident response?
A. The organization’s legal department.
B. Human resources.
C. Marketing.
D. Management.
E. All are important stakeholders in incident response.
E is correct. All of the named stakeholders are important and
should be involved during the incident response process.
A, B, C, and D are incorrect. Each of these—legal, HR,
marketing, and management—is an important stakeholder that
should be a part of the incident response process.
2. In the course of incident response, what phase strives to
prevent or reduce the spread of the incident?
A. Containment
B. Sanitization
C. Detection
D. Patching
A is correct. Containment, the first phase of incident response,
includes reducing the spread of the incident.
B, C, and D are incorrect. B is incorrect because sanitization,
part of eradication phase, involves cleaning up after the incident.
C is incorrect because detection is not a phase. D is incorrect
because patching is a corrective action, done long after
containment.
3. During incident response, what phase seeks to return all
systems to a known-good state?
A. Eradication
B. Segmentation
C. Removal
D. Scanning
A is correct. Eradication is the phase where you strive to
return the system to a known-good state.
B, C, and D are incorrect. B is incorrect because segmentation
is a containment tactic for isolating by network segment. C is
incorrect because removal is the action of taking a known-
compromised system completely offline. D is incorrect because
scanning is a validation technique.
4. During incident response, what phase requires
understanding how the incident took place in order to
implement countermeasures or controls to prevent the attack
from happening again?
A. Reverse engineering
B. Sanitization
C. Reconstruction
D. Validation
D is correct. Validation is done to verify the attack vectors and
to implement countermeasures.
A, B, and C are incorrect. A is incorrect because reverse
engineering is an earlier step, a part of containment. B is
incorrect because sanitization is part of ridding the problem
systems of their malware or issues. C is incorrect because
reconstruction is, like sanitization, part of the eradication phase.
5. Which of the following terms refers to a containment
technique to permit cybersecurity analysts to still monitor the
system’s activity without jeopardizing the whole network?
A. Removal
B. Secure disposal
C. Verifying logging/communication
D. Isolation
E. Patching
D is correct. Isolation means to segregate the system (or
systems) but not completely remove it from communicating with
others. It’s more an exercise of drawing a perimeter around the
problem system, rather than removing it entirely.
A, B, C, and E are incorrect. A is incorrect because removal
means to take the system offline, whereas isolation allows the
analyst to still monitor the system. B is incorrect because secure
disposal describes cleaning or destroying the compromised
media. C is incorrect because verifying logging and
communication is a reference to the validation phase. E is
incorrect because patching references the corrective actions
phase.
6. The cybersecurity team just finished recovering from an
incident, but within a few days, similar indicators of
compromise appear. The cybersecurity team determined that an
attacker hijacked an account with elevated privileges. After the
team investigated further, it seemed both incidents took
advantage of the same attack vector. What was the root cause of
the incident that the team failed to address in the earlier
incident?
A. Eradication
B. Permissions
C. Patching
D. Containment
B is correct. Permissions is the corrective action that was
missed in the first incident recovery. Seems an account with
elevated privileges was compromised and abused, but after the
first incident that risk was not adequately mitigated.
A, C, and D are incorrect. A is incorrect because it seems
eradication was done correctly in the first incident. C is incorrect
because patching is not the solution for the compromised
account. D is incorrect because it seems containment was
handled properly in both incidents.
7. In what phase of incident response do cybersecurity team
members discuss with stakeholders their experience and
understanding of the incident?
A. During the containment phase through the eradication phase
B. The validation phase
C. As the team completes the corrective action phase
D. Throughout all phases
D is correct. Communication is critical in all phases.
A, B, and C are incorrect. Communication with the
stakeholders is needed in all phases of incident response.
8. How is any experience gained as a result of the incident being
shared among management?
A. Via constant communication, from start to finish
B. Through a change control process report
C. Through a lessons learned report
D. In the executive summary to the response plan update
C is correct. Concluding the incident response is the “lessons
learned” report, where input from everyone involved in the
event is used to summarize how the incident response went and
how the incident could have been handled better.
A, B, and D are incorrect. A is incorrect because although
constant communication is important, it is the lessons learned
report that focuses on what lessons were gained over the course
of the incident. B is incorrect because there isn’t a change
control process report. D is incorrect because there isn’t an
executive summary to the response plan update.
9. Performing corrective actions as incident recovery concludes
is a vital phase of incident response. What corrective step helps
ensure that any procedural gaps identified during the response
are fixed in preparation for the next response?
A. Reviewing the change control process
B. Publishing a summary report
C. Updating the incident response plan
D. Securely disposing of the compromised systems
C is correct. Updating the incident response plan helps
improve the process for when (not if) an incident happens again.
A, B, and D are incorrect. A is incorrect because reviewing the
change control process is important, but not with the end goal of
correcting gaps in incident response. B is incorrect because
although a summary report might communicate what gaps were
identified, it does not directly remediate them. D is incorrect
because secure disposal does nothing for helping gaps in the IR
process.
10. Post-incident, after all corrective actions have been
performed, including compiling a full lessons learned report,
what is the final documentation step?
A. New incident response plan
B. Reverse engineering report
C. Validation scan and report
D. Incident summary report
D is correct. An incident summary report is the final
documentation created directly as a result of the incident. Its
length and audience vary, depending on the organization.
A, B, and C are incorrect. These answers either are not
expected at the conclusion or are not expected at all.
11. A company is dealing with an incident that required
involvement with a law enforcement agency (LEA). Cooperation
between the cybersecurity team and the LEA was very difficult,
given how much the goals and perspectives of the LEA,
management, and the cybersecurity team differed. What was the
likely reason for this bad experience?
A. The incident response plan didn’t include law enforcement.
B. The LEA demanded to retain hardware as evidence.
C. The cybersecurity team had no prior incident practice with
the LEA.
D. Management was unable to lead alongside the LEA.
C is correct. It is good practice to involve law enforcement
when performing incident response practice runs. Only by
running through the exercise (or actual incident) can the
divergent goals and motivations of different groups be
determined.
A, B, and D are incorrect. A is incorrect because the incident
response plan probably does mention law enforcement.
Otherwise, someone wouldn’t have involved he LEA during the
incident. B is incorrect because, although the LEA might want
the hardware as evidence, it is not the primary reason for the
difficulty. D is incorrect because management is likely capable of
leading with or without law enforcement being involved.
12. The company Major League Manifolds, Ltd., had an incident,
with three main stakeholders involved. Referring to the list of
roles and employees, shown in Figure 7-1, you see that Phelps,
Brown, and Hayes were the employees involved. From the
following possible incidents, which is the probable incident
that’s occurring.
A. A senior-level employee’s e-mail account was hacked.
B. The external payroll provider’s database server was
compromised.
C. An HR employee was discovered working for a competitor.
D. An undocumented exception to the patching policy was
discovered.
CHAPTER 8
Determining the Impact of
Incidents
Q QUESTIONS
IN-DEPTH ANSWERS A
1. In terms of skill and determination, what type of adversary is
regarded as the most capable and resourceful?
A. Script kiddie
B. Advanced persistent threat
C. Haxor
D. Zero-day
B is correct. The advanced persistent threat (APT) is by far the
most skilled, most resourceful of threats.
A, C, and D are incorrect. A is incorrect because a script kiddie
is the name for someone who is inexperienced, like a child
(kiddie), and only knows how to run a script. C is incorrect
because a “haxor,” or hacker, generally is someone who possess
some skill, but acts alone, without massive resources behind
them. D is incorrect because zero-day threats are neither skilled
nor resourceful; the zero-day threat is dangerous because it is a
new threat with no known mitigation.
2. A company has recently installed an IDS that’s capable of
detecting a broad set of malicious traffic and operates on
signature-based identification. Which of the following types of
threats will this IDS identify? (Choose all that apply.)
A. Zero-day
B. Threats labeled by CVE
C. Unknown threats
D. EICAR file
E. Known threats
B, D, and E are correct. If an IDS is signature-based, you can
assume it’s not capable of detecting unknown malware or
detecting based on anomalous behavior. Threats with a CVE ID
number very likely have a known signature assigned to them.
The EICAR file is a well-known test file for malware detection.
Known threats, as you can tell by the name, will have a signature.
A and C are incorrect. A is incorrect because a zero-day is
likely unknown to a signature-based device. C is incorrect
because unknown threats, as obvious by the name, are unknown
to a signature-based device.
3. A cybersecurity team is responding to an incident. To help
prioritize their actions, an analyst requests a list of essential
business processes from the CIO. Select from the following
factors which one the analyst is most concerned with to help
prioritize the team’s response.
A. Downtime
B. System process criticality
C. Recovery time
D. Economic
B is correct. System process criticality is the factor that defines
whether or not business processes are essential.
A, C, and D are incorrect. A is incorrect because the downtime
factor involves how much downtime is allowable. C is incorrect
because recovery time, which is related to downtime, describes
how quickly business processes will be recovered. D is incorrect
because economic factors include direct and indirect financial
impacts.
4. Of the following metrics, which ones rely on a company being
able to endure a certain amount of downtime? (Choose all that
apply.)
A. Designated acceptable downtime (DAD)
B. Key performance indicators (KPIs)
C. Maximum tolerable downtime (MTD)
D. Recovery time objective (RTO)
C and D are correct. Both the MTD and RTO presume a
company can survive some downtime to some degree. The MTD
is the maximum tolerable downtime before an organization’s
essential systems suffer critically, while the recovery time
objective (RTO) describes the period of time when a company
strives to recover from a disaster before suffering significant
damage.
A and B are incorrect. A is incorrect because DAD is a fictional
term. B is incorrect because KPIs have nothing to do with
downtime.
5. Multiple factors can affect the severity of an incident. Which
of the following factors does not necessarily impact an incident’s
severity?
A. Downtime
B. Probability of corruption
C. MTD
D. System process criticality
E. None of the above
B is correct. There is no direct correlation between measuring
an incident’s severity and the probability of corruption.
A, C, D, and E are incorrect. A is incorrect because downtime
directly affects the severity of the incident. C is incorrect because
MTD, or maximum tolerable downtime, affects an incident’s
severity. D is incorrect because system process criticality is how
essential a business process is—a direct factor on how severe the
impact caused by an incident is. E is incorrect because B is a
correct answer.
6. Of the many factors that affect incident severity, which of the
following takes the cybersecurity team the longest time to detect
issues for or determine the scope of its impact?
A. Data integrity
B. System process criticality
C. Recovery time
D. Type of data
A is correct. Certainly in relation to the other answers, it takes
much longer to determine whether data was or wasn’t altered by
an attacker or incident.
B, C, and D are incorrect. B is incorrect because system
process criticality is known and discussed immediately after the
incident. C is incorrect because recovery time is on everyone’s
mind right away if an incident causes downtime. D is incorrect
because the type of data (for example, HIPAA or PHI) is known
and considered in parallel with incident recovery.
7. What is the desired relationship when comparing RTO and
MTD?
A. The RTO should be longer than the MTD.
B. The RTO should be shorter than the MTD.
C. The MTD and RTO should be roughly the same length.
D. The MTD should as close to zero as possible.
E. The RTO needs to be twice the MTD.
F. The MTD needs to be twice the RTO.
B is correct. The recovery time objective should be shorter
than the maximum tolerable downtime.
A, C, D, E, and F are incorrect. Each of these incorrect answers
offers a wrong or ridiculous statement about the relationship
between RTO and MTD.
8. The United States Privacy Act of 1974 created rules regarding
the collection, storage, and use of what kind of data?
A. Financial
B. Intellectual property
C. PII
D. Payment card information
C is correct. Personally identifiable information (PII) is
protected by the U.S. Privacy Act of 1974.
A, B, and D are incorrect. A is incorrect because financial
information is not protected by the U.S. Privacy Act of 1974 but
instead by Sarbanes-Oxley and the Graham-Leach Bliley Act. B is
incorrect because intellectual property (IP) is not protected by
the U.S. Privacy Act of 1974 but instead by local or state laws
regarding IP. D is incorrect because payment card information is
governed by PCI DSS.
9. Which of the following is not a PCI DSS goal or requirement?
A. Regularly monitor and test networks.
B. Maintain an information security policy.
C. Build and maintain a secure network and systems.
D. Enforce employee security awareness training.
E. Protect cardholder data.
D is correct. Security awareness training is not a PCI DSS
requirement.
A, B, C, and E are incorrect. All these answers are
requirements of the Payment Card Industry Data Security
Standard.
10. Select from the following the data types that fall under the
term “intellectual property.” (Choose all that apply.)
A. The patent behind a company’s best-selling product
B. Your favorite shoe company’s trademark
C. The secret recipe of a chicken flavoring
D. The details about a company’s marketing campaign
A, B, and C are correct. A is correct because patents are
intellectual property. B is correct because a trademark is
intellectual property. Finally, C is correct because a secret recipe
is a company’s trade secret, which is also intellectual property.
D is incorrect. A company’s marketing campaign is not
intellectual property. Instead, a marketing campaign would
likely be labeled “corporate confidential.”
11. An analyst is reviewing DLP logs of sensitive documents
attached to outgoing e-mails. The analyst discovers a sent
document titled “Hilltop Organization Chart,” apparently titled
after the analyst’s own company, Hilltop Cabinets. The document
was sent to Hilltop’s primary competitor, a company called
Sanctuary Sinks. What type of data does this incident cover?
A. Mergers and acquisitions
B. Accounting data
C. Corporate confidential
D. Intellectual property
C is correct. Given the nature of the document and the fact that
it is considered “sensitive,” you can assume the e-mailed
attachment about the organization chart was marked “corporate
confidential.”
A, B, and D are incorrect. A is incorrect because mergers and
acquisitions involves a company’s takeover of or union with
another company, which the document does not suggest. B is
incorrect because accounting data wasn’t e-mailed. D is incorrect
because the organization chart doesn’t contain intellectual
property (IP).
12. A new virus called MSB3417, dubbed “Wildfire,” is sweeping
through organizations, infecting systems by exploiting a
previously unknown vulnerability. Wildfire identifies and
exfiltrates any spreadsheet documents with large dollar
amounts. The documents are then covertly sent to a known and
powerful adversarial country. What is this type of malware
called?
A. APT exploit
B. Zero-day exploit
C. Financial exfiltration malware
D. Economic threat
B is correct. Malware that works based on exploiting a
previously unknown vulnerability is called a zero-day exploit.
A, C, and D are incorrect. A is incorrect because such an
exploit is not called an APT exploit just because of the nation
from which it supposedly originated. C and D are incorrect
because these are not normal terms, despite what the question’s
malware did.
13. What is the particular criminal threat when data related to a
company’s intent to integrate with another company is
mishandled?
A. Leaked information could lead to trading based on privileged
knowledge.
B. Shareholders of both companies could vote to stop the
merger.
C. Leaked trade secrets could lead to increased competition.
D. Violations of HIPAA requirements.
A is correct. Leaked information about a merger in progress or
even a desired merger could lead to a stockholder deciding to
trade their shares. Trading based on that privileged information
is a crime called insider trading.
B, C, and D are incorrect. B is incorrect because, even if
shareholders somehow became privy to the knowledge, they
wouldn’t get a chance to vote until the decision was legally
eligible to be put up for a vote. C is incorrect because trade
secrets wouldn’t be shared between the companies to be merged
until the deal was done. There should be no threat to either
company’s trade secrets. D is incorrect because there was no
mention of personal health information (PHI).
14. Which of the following factors determines some noted event
will be considered a security incident?
A. Downtime
B. Scope of impact
C. Economic
D. Types of data affected
B is correct. Scope of impact is the official determination that
has an event crossing the boundary into being a defined security
incident.
A, C, and D are incorrect. A is incorrect because downtime is a
serious outcome of an incident, but it is not the trait that
distinguishes an incident from an event. C is incorrect because
the economic effects of an incident are typically not measurable
in the short term compared to other factors. D is incorrect
because the types of data, especially those under regulatory
protection, often distinguish a severe incident from a moderate
one. However, this is not a factor that can push an event into
being an incident.
15. In the context of long-term effects from a security incident,
particularly to a company’s reputation and ability to gain
potential business, which factor is the most impactful on an
incident’s severity?
A. Recovery time
B. Data integrity
C. Economic
D. System process criticality
C is correct. The economic factors of an incident affect a
company over the long haul, often in terms of its reputation.
A, B, and D are incorrect. A is incorrect because recovery time
is a short-term factor. B is incorrect because even though it takes
longer to determine the effects of data integrity, it is still a
relatively short-term factor. D is incorrect because system
process criticality is definitely a short-term, well-defined factor
in determining an incident’s severity.
16. For which of the following types of data is it suggested that a
company take additional steps, beyond policy and legal guidance,
to protect the data’s confidentiality from unauthorized eyes? Not
protecting the selected data type might jeopardize the company’s
sustainability.
A. HR personnel information
B. PII
C. Payment card information
D. Accounting data
D is correct. The security of accounting data is more critical to
a business’s sustainability, relative to the other answers.
A, B, and C are incorrect. A is incorrect because HR personnel
information must be kept confidential, but its release wouldn’t
necessarily threaten the company’s well-being. B is incorrect
because personally identifiable information (PII) is not critical
to a company’s health. C is incorrect because payment card
information should be protected as required by PCI DSS.
Although its release would certainly jeopardize a company’s
reputation, it’s hardly a significant threat to the business itself.
17. Which of the following are possible consequences for
unauthorized disclosure of PHI, depending on one’s
involvement. (Choose all that apply.)
A. Documented record in employee file
B. Suspension from employment
C. Monetary fine
D. Jail time
E. Public execution
A, B, C, and D are correct. Depending on the employee’s
involvement, the consequences can range from a record in the
employee’s file to possible jail time.
E is incorrect. Although disclosing personal health
information is a serious offense, it’s not worthy of public
execution.
CHAPTER 9
Preparing the Incident
Response Toolkit
Q QUESTIONS
CHAPTER 10
Selecting the Best Course of
Action
This chapter includes questions on the following topics:
A IN-DEPTH ANSWERS
CHAPTER 11
Frameworks, Policies,
Controls, and Procedures
Before a security analyst can complain they are too busy, the
analyst needs to understand why they are busy. Before the first
configuration change is made and before any management tool
is used, the organization needs to know what it wants to enforce
and monitor. Before the environment can be secured, there
needs to be documented steps on how to carry that out. These
answers and much more are provided by the organization’s
policies and procedures. The policies state the “why,” while the
procedures specify the “how.”
Q QUESTIONS
A IN-DEPTH ANSWERS
CHAPTER 12
Identity and Access
Management
Q QUESTIONS
IN-DEPTH ANSWERS A
1. Which of the following context-based authentication methods
is the most difficult to forge or falsify?
A. Time
B. Frequency
C. Location
D. Behavior
C is correct. Location is understood to be the most difficult
techniques to falsify of the four context-based approaches to
authentication. Context-based authentication by location means
using someone physical location, presumably via GPS, to
determine whether that person should be authenticated.
A, B, and D are incorrect. Time-based authentication would be
fairly straightforward to forge. Frequency is determined by a
reasonable assessment of how often someone attempts to
authenticate. Naturally, if someone attempts 30 times a second,
this couldn’t possibly be the correct person. Behavior-based
authentication is possible after learning someone’s routine and
expected performance. It would be difficult, but not impossible if
you knew the target user very well.
2. Your company plans to employ single sign-on for services and
web-based applications. It needs to choose a federated identity
technology for authorization and, if possible, authentication.
Which of the following technologies satisfy the company’s needs?
(Choose all that apply.)
A. SAML
B. Active Directory Federated Services
C. OAuth2
D. OpenID
A, B, and C are correct. Security Assertion Markup Language
(SAML) is commonly used for both authentication and
authorization. AD Federated Services is used for both
authentication and authorization, primarily in Windows
environments. The OAuth2 protocol is used generally for
authorization, commonly for services. Although OAuth2 is used
inside of authentication protocols, it’s technically not a
standalone replacement. In any case, the company requires
authorization, not authentication.
D is incorrect. OpenID is commonly used for authentication.
However, unlike SAML, OAuth2, and AD Federated Services,
OpenID cannot be used for authorization.
3. When you’re securing endpoints, what is their main
vulnerability in comparison to other identities with regard to
authentication?
A. Relative to servers, securing the endpoints is difficult to scale.
B. Compared to applications, endpoints can only rely on token-
based authentication.
C. Relative to services, endpoints are vulnerable to replay
attacks.
D. Compared to personnel, endpoints are more difficult to lock
down.
C is correct. In terms of authentication, endpoints are
particularly vulnerable to replay attacks.
A, B, and D are incorrect. Servers are typically authenticated
by certificates, as defined by the X.509 standard. The use of PKI
certificates makes authenticating servers fairly straightforward,
but not on a massive scale. Endpoints do not require
authentication by token. Also, endpoints are not more difficult to
secure when dealing with larger numbers. An administrator
might argue that with volume licensing, standardized images,
and group policy, a large number of workstations can be
relatively simple to lock down. Personnel are by far the most
difficult to “lock down” when you consider that human error and
the tendency to want to help are constant vulnerabilities to
personnel.
4. Which of the following context-based authentication methods
is likely to reveal someone attempting to brute-force an account
using an automated script?
A. Time
B. Frequency
C. Location
D. Behavior
B is correct. If someone is using an automated script to guess
someone’s credentials via brute force, the frequency of attempts
will be far greater than a person could reasonably perform.
A, C, and D are incorrect. Whether by script or not, the time of
those attempts isn’t mentioned. The location may or may not be
the same, meaning the brute-force attack could be performed
locally or remotely. The behavior aspect does not apply here,
because the attacker hasn’t logged on yet. Behavior means
monitoring a user’s activity, such as websites visited and
applications used.
5. A company utilizes a resource for storing employee
credentials, otherwise known as an identity repository. In
general, all employees have their network access validated by a
central server. Although most employees work in the
headquarters building, a small set of users work in locations that
provide all their needed productivity services locally, except for
the authentication. Communications between headquarters and
these other locations either rely on a dedicated but unreliable
low-bandwidth connection or occur across the Internet. All of
the following identity repositories, except one, would be
acceptable as a solution. Which repository must use a fully
reliable and secure network?
A. RADIUS
B. TACAS+
C. LDAP
D. XTACACS
A is correct. The Remote Authentication Dial-In User Service
(RADIUS) uses UDP, not TCP. Additionally, RADIUS allows the
use of a “shared secret” across the network. For both these
reasons, using an unreliable or untrusted network is highly
discouraged if the company is wanting to use RADIUS.
B, C, and D are incorrect. B is incorrect because Terminal
Access Controller Access Control System Plus (TACAS+) uses
TCP, so it is a viable solution for the low-bandwidth network.
However, because TACAS+ does not use encryption, it is
vulnerable to reply attacks. Therefore, authenticating across the
Internet is not recommended. C is incorrect because Lightweight
Directory Access Protocol (LDAP) is an option over the dedicated
line. D is incorrect because XTACACS is a later, extended version
of TACACS and also uses encryption, so the untrusted network is
not a big risk.
6. Figure 12-1 shows a hierarchical relationship of
organizational resources and users. According to RFC 1779,
which of the following is a correctly represented distinguished
name (DN)?
A. cn=Bowmani,ou=Temple,o=Galactic Empire
B. cn=Bowmani,ou=Temple,ou=Coruscant,o=Galactic Empire
C. cn=Offee,ou=Coruscant,o=Galactic Empire
D. cn=Vader,ou=Killun Station,ou=Killun 71,o=Galactic Empire
Figure 12-1 RFC 1779 organization
CHAPTER 13
Putting in Compensating
Controls
This chapter includes questions on the following topics:
Q QUESTIONS
IN-DEPTH ANSWERS A
1. You’re the manager of a small team of information security
specialists. The team recently ended a challenging period of a
few incidents and one forensic investigation involving law
enforcement. Given that the incidents and investigation are
finished, the team seems to be struggling considerably. In fact,
you notice that the patch rollout cycle is inconsistent,
occasionally taking twice as long as it should. What might you
consider to be most helpful to the team?
A. Succession planning
B. Awarding team members for dedication
C. Mandatory vacation
D. Cross-training
C is correct. After the described recent workload, the team is
likely tired and weary. Further, as the narrative explained about
the inconsistent patch management cycle, the team has grown
complacent. In this case, mandatory vacation is required to
ensure team members get the needed rest.
A, B, and D are incorrect. A is incorrect because succession
planning is an organization’s planned transition of
responsibilities from the current person to the successor. In this
case, succession planning would be useful if current personnel
decided to leave, but such planning should have already been
done. B is incorrect because recognition, while nice and
appreciated, will do little to subside the team’s exhaustion and
complacency. D is incorrect because cross-training is certainly
useful in order to mitigate the loss of skills when a specialist is
absent (such as on mandatory vacation), but implementing
training at this time would only add to the team’s workload.
Mandatory vacation should come first.
2. Over time, the specific needs on systems, applications, and
business processes will change. How an organization approaches
and accomplishes these changes depends on the maturity of the
organization. In the context of continual changes, what
distinguishes a mature organization from other organizations?
A. Process improvement
B. Process definition
C. Process documentation
D. Process management
A is correct. Continual process improvement is a defining
characteristic of a mature organization.
B, C, and D are incorrect. These wrong answers are worded to
mirror the maturity levels of the process appraisal program,
Capability Maturity Model Integration (CMMI). When an
organization’s maturity is evaluated, the program’s
representative levels, escalating in increasing maturity, are as
follows: Initial, Managed, Defined, Quantitatively Managed, and
Optimizing. Optimizing, as the final, most mature level,
represents the practice of continually improving processes.
3. An incoming CIO starts their first day on the job by reading
and becoming familiar with the company’s security policies. The
CIO dusts off policies about the management of pagers, fax
machines, and CRT monitors, among other policies that seem to
apply to technology no longer applicable to the business’s goals
and operations today. What might the incoming CIO add to their
to-do list to address this issue?
A. Retirement of processes
B. Automated reporting
C. Deputy CIO
D. Scheduled reviews
D is correct. Given the outdated policies, it seems the
organization is lacking any review of security policies. Holding
regularly or periodically scheduled security reviews helps
validate policies as effective and relevant.
A, B, and C are incorrect. A is incorrect because the retirement
of processes is correct concerning the relevance and practicality
of processes, but not when dealing with policies. B is incorrect
because automated reporting addresses the feature of sending
alerts or notifications by a security monitoring product after its
analysis shows a team’s attention is warranted. C is incorrect
because although having a deputy CIO might be useful, adding
another management level wouldn’t directly affect the outdated
policies.
4. What software approach can ensure that the security and
management functions of an organization can operate and
cooperate together?
A. Cross-training
B. Custom APIs
C. Security suites
D. Security appliances
C is correct. Security suites are a type of software that offers
multiple security and management-related functions. Also called
“multilayered security,” security suites ensure a level of
consistency and interoperability that having several disparate,
single-function applications cannot offer.
A, B, and D are incorrect. A is incorrect because cross-training
helps employees be effective at tasks normally performed by
their peers. This helps personnel, but systems need to be more
“interoperable.” B is incorrect because developing custom APIs
is not a practical or sustainable solution to ensuring several
security functions working together. D is incorrect because
although a security appliance performs multiple security
functions, it is a hardware solution, not a software one.
5. A company has recently implemented Elasticsearch, Logstash,
and Kibana (ELK) as a central part of its SIEM. Which features
has the company gained in their SIEM that were likely missing
before? (Select two.)
A. Data outsourcing
B. Data aggregation
C. Data correlation
D. Data automation
B and C are correct. The aggregation and correlation of data
are both well handled by ELK, or the three applications known
fully as Elasticsearch, Logstash, and Kibana. With so many
varied types of data, from a myriad of source applications and
devices, it becomes quickly overwhelming to a person to collect,
review, and analyze all this data to glean actionable information
from it.
A and D are incorrect. A is incorrect because data outsourcing
is not what’s being done. D is incorrect because although “data
automation” could describe what is being done, this is not the
recognized term.
6. Which of the following is not a key concern for organizations
relying on an outsourcing firm?
A. Sufficient vetting
B. Access to sensitive data by non-employees
C. Redundancy of efforts
D. Agreement on incident-handling responsibilities and
decision-making
C is correct. When you’re dealing with outsourcing, the
redundancy of efforts is not the problem.
A, B, and D are incorrect. A is incorrect because it is difficult to
sufficiently vet and clear the presumed many outsourced
employees. B is incorrect because outsourcing means granting
access to sensitive data and access to internal networks, both of
which mean strict access control is required. D is incorrect
because an organization and the outsourcing firm may both
attempt to handle an event or incident, without considerable
planning and practice for a variety of events.
7. A recent incident at a company revealed that a normal
employee has been using special network-analyzing software to
capture and read internal e-mails. What control could be put in
place to immediately stop this?
A. E-mail signatures
B. Cryptography
C. Two-factor login authentication
D. Network segmentation between departments
B is correct. If cryptography were in place to protect e-mail
while in transit, attempts to capture and read it would prove
futile.
A, C, and D are incorrect. E-mail signatures, such as inserting
contact information at the bottom of every message, do no good
in ensuring confidentiality. Two-factor login authentication is an
improvement in protecting logging in to the system. However, e-
mail would continue to be sent in the clear. Network
segmentation would be an improvement to some degree, such as
segmenting network traffic between departments. However, we
don’t know if the snooping employee is reading their own
department’s e-mail.
8. Compensating controls are available from both personnel and
technology categories. Which of the following are technology-
based controls? (Choose all that apply.)
A. Automated log review and reporting
B. Load balancers
C. Dual control
D. Cross-training
E. Network design
A, B, and E are correct. Automated log review and reporting,
load balancers, and network design are technology-based
compensating controls. Technology-based controls provide the
speed, automation, and opportunities to minimize the impact of
human error and complacency.
C and D are incorrect. Dual control and cross-training are two
personnel-based compensating controls. Personnel-based
controls, and personnel in general, provide what computers
cannot do (yet), such as making judgment calls and adding the
“human” element to make businesses valued by their customers.
CHAPTER 14
Secure Software
Development
Q QUESTIONS
A IN-DEPTH ANSWERS
CHAPTER 15
Tool Sets
• When and how you might use different tools and technologies
There is that old adage that “knowledge is power.” But even the
most knowledgeable information security analysts still require
tools to apply that power. As with any skilled trade, an analyst
can’t get far without the use of tools. What sets the analyst apart
from everybody else is that the infosec analyst will know which
tool is required for a given scenario.
Q QUESTIONS
A IN-DEPTH ANSWERS