Review Questions

1. 

What is the policy that includes all aspects of the security of an organization called?

  1. Security management policy

  2. Information security policy

  3. Physical security policy

  4. Information classification policy

a. the security management policy encompasses items b, c, andd in this question. all aspects of security in the organization areencompassed in the security management policy.

2. 

Which policy deals with information sensitivity and usage?

  1. Security policy

  2. Information classification policy

  3. Use policy

  4. Configuration management policy

b. the information classification policy discusses informationsensitivity and access to information.

3. 

What is the policy that identifies which software and hardware components can be used in the organization called?

  1. Backup policy

  2. Configuration management policy

  3. Inventory policy

  4. Use policy

b. the configuration management policy is concerned with howsystems are configured and what software can be installed on systems.

4. 

Which document dictates the layout of the network and what the existing configuration is?

  1. Change documentation

  2. Use policy

  3. Systems architecture

  4. BIA

c. the systems architecture documentation identifies the configurationand changes that have been made to the network. these documentshelp keep track of the network, and they are useful in troubleshootingnetwork problems.

5. 

The process of ensuring that all policies, procedures, and standards are met is a function of which process?

  1. Education

  2. Enforcement

  3. Responsibility

  4. Change management

b. enforcement of policies, procedures, and standards is essential foreffective sustainability of security efforts. the saying `inspect whatyou expect` is relevant in this situation.

6. 

The set of guidelines that outline the components of an effective security management is called what?

  1. Best practices

  2. Forensics

  3. Chain of evidence

  4. Use policy

a. the term best practices refers to the essential elements of aneffective security management effort.

7. 

Which policy identifies the files and data that must be archived?

  1. Information classification policy

  2. Use policy

  3. Logs and inventories policy

  4. Information retention policy

d. information retention policies dictate what information must bearchived and the duration those archives must be kept.

8. 

Which of the following is not a necessary part of a forensic investigation?

  1. Acquiring evidence

  2. Authenticating evidence

  3. Analyzing evidence

  4. Security policy

d. the three a's of an investigation are acquiring, authenticating,and analyzing evidence. a security policy might dictate that a forensicinvestigation is needed in a given situation, but it is not part ofthe investigation.

9. 

Which policy defines upgrade and systems requirements?

  1. Configuration management policy

  2. Use policy

  3. Logs and inventory policy

  4. Backup policy

a. configuration management policy dictate the configurations andupgrades of systems in the organization.

10. 

Which of the following storage areas would be suitable for storing a disk drive as evidence?

  1. Environmentally controlled cage

  2. Maintenance spares closet

  3. Outside storage shed

  4. Computer room media storage cabinet

a. evidence should be kept in a limited access area that is environmentally appropriate for the media. believe it or not, each of theseother areas has been used as a storage area for evidence in severalforensic sites-with poor results.

11. 

Which of the following would be an acceptable method of protecting the disk drive contents in an investigation?

  1. Locked closet

  2. Encrypted disk drive

  3. Date-stamped sealed plastic bag

  4. System log

b. authenticating evidence means that a way must be used to ensurethat the contents of drive do not change. encrypting the drive usinga hashing-based algorithm (such as sha or md5) ensures the information will not be altered without being detected.

12. 

Which of the following tasks should be accomplished before analyzing a hard drive for forensic clues?

  1. Create a backup drive, and then analyze the original.

  2. Create a backup drive, and then analyze the backup.

  3. Encrypt the drive.

  4. Make a CD copy of the system files.

b. the first step in conducting an investigation would be to create adisk image of the original. if at all possible, all investigations should beperformed on the backup drive, not the original.

13. 

What is a chain of custody?

  1. A detailed log of all activities that occur with evidence

  2. A physical storage device used to store evidence

  3. A method of determining the current location of evidence

  4. A process of protecting evidence

a. the chain of custody demonstrates to the court the events andactivities that have involved the evidence. usually, this includes a logshowing all of the activities involving the evidence from collection topresentation to the court as evidence.

14. 

Which policy dictates the processes used to create archival copies of records?

  1. Backup policy

  2. Security policy

  3. Use policy

  4. User management policy

a. the backup policy identifies the methods used to archive electronicand paper file systems. this policy works in conjunction with theinformation retention and storage policies.

15. 

Which topic would not normally be covered in a user-oriented security- awareness program?

  1. Security management policy

  2. Use policy

  3. Network technology and administration

  4. Account and password criteria

c. network technology and administration would not be covered ina user security-awareness program. issues of policy, responsibilities,and importance of security would be key aspects of this program.

16. 

Which group would most benefit from an overall briefing on security threats and issues?

  1. Management

  2. Users

  3. Developers

  4. Network administrators

a. managers would derive the most benefit from a high-level explanation of security threats and issues. users need to know how tofollow the policies and why they are important. developers andnetwork administrators need specific and focused information on howto better secure networks and applications.

17. 

Which process is concerned with tracking evidence as it is used in an investigation?

  1. Forensics

  2. Chain of custody

  3. Preservation of evidence

  4. Collection of evidence

b. the chain of custody identifies each and every step taken with theevidence in an investigation.

18. 

Who should be consulted before involving law enforcement in an investigation?

  1. Management

  2. Network administrators

  3. Developers

  4. Security professionals

a. management of the organization should be consulted before lawenforcement is involved in an incident. management will usually wantto seek legal counsel as part of their decision-making process.

19. 

Which of the following is essential in collecting evidence in an investigation?

  1. Meticulous records by investigators

  2. Privacy of evidence

  3. Photographs of the evidence

  4. Locked storage closet

a. investigators should be prepared to testify in legal proceedingsabout the methods used to collect evidence. it is extremely essentialthat investigators keep good records. a trial may not occur for severalyears from the time an investigation begins.

20. 

Which of the following should occur when a computer system becomes surplus?

  1. All files should be erased.

  2. Disk drives should be initialized.

  3. Disk drives should be formatted.

  4. Computer screens should be degaussed.

b. the only way to guarantee that data and applications on a diskdrive are unreadable is to perform a low-level initialization of thestorage media. this sets every storage location into a newly initializedstate. this process is also referred to as disk wiping .

Answers

1. 

A. The security management policy encompasses items B, C, and D in this question. All aspects of security in the organization are encompassed in the security management policy.

2. 

B. The information classification policy discusses information sensitivity and access to information.

3. 

B. The configuration management policy is concerned with how systems are configured and what software can be installed on systems.

4. 

C. The systems architecture documentation identifies the configuration and changes that have been made to the network. These documents help keep track of the network, and they are useful in troubleshooting network problems.

5. 

B. Enforcement of policies, procedures, and standards is essential for effective sustainability of security efforts. The saying "Inspect what you expect" is relevant in this situation.

6. 

A. The term best practices refers to the essential elements of an effective security management effort.

7. 

D. Information retention policies dictate what information must be archived and the duration those archives must be kept.

8. 

D. The three A's of an investigation are acquiring, authenticating, and analyzing evidence. A security policy might dictate that a forensic investigation is needed in a given situation, but it is not part of the investigation.

9. 

A. Configuration management policy dictate the configurations and upgrades of systems in the organization.

10. 

A. Evidence should be kept in a limited access area that is environmentally appropriate for the media. Believe it or not, each of these other areas has been used as a storage area for evidence in several forensic sites—with poor results.

11. 

B. Authenticating evidence means that a way must be used to ensure that the contents of drive do not change. Encrypting the drive using a hashing-based algorithm (such as SHA or MD5) ensures the information will not be altered without being detected.

12. 

B. The first step in conducting an investigation would be to create a disk image of the original. If at all possible, all investigations should be performed on the backup drive, not the original.

13. 

A. The chain of custody demonstrates to the court the events and activities that have involved the evidence. Usually, this includes a log showing all of the activities involving the evidence from collection to presentation to the court as evidence.

14. 

A. The backup policy identifies the methods used to archive electronic and paper file systems. This policy works in conjunction with the information retention and storage policies.

15. 

C. Network technology and administration would not be covered in a user security-awareness program. Issues of policy, responsibilities, and importance of security would be key aspects of this program.

16. 

A. Managers would derive the most benefit from a high-level explanation of security threats and issues. Users need to know how to follow the policies and why they are important. Developers and network administrators need specific and focused information on how to better secure networks and applications.

17. 

B. The chain of custody identifies each and every step taken with the evidence in an investigation.

18. 

A. Management of the organization should be consulted before law enforcement is involved in an incident. Management will usually want to seek legal counsel as part of their decision-making process.

19. 

A. Investigators should be prepared to testify in legal proceedings about the methods used to collect evidence. It is extremely essential that investigators keep good records. A trial may not occur for several years from the time an investigation begins.

20. 

B. The only way to guarantee that data and applications on a disk drive are unreadable is to perform a low-level initialization of the storage media. This sets every storage location into a newly initialized state. This process is also referred to as disk wiping.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net