IT Security / Compliance Analyst

46 Questions | Attempts: 538
Share

SettingsSettingsSettings
IT SecurITy / Compliance Analyst - Quiz

This quiz will help us better understand your experience and knowledge. Thank you for your participation.


Questions and Answers
  • 1. 
    Which of the following would be the first step in establishing an information security program?
    • A. 

      Adoption of a corporate information security policy statement

    • B. 

      Development and implementation of an information security standards manual

    • C. 

      Development of a security awareness-training program

    • D. 

      Purchase of security access control software

  • 2. 
    When developing an information security policy, what is the FIRST step that should be taken?
    • A. 

      Obtain copies of mandatory regulations.

    • B. 

      Gain management approval.

    • C. 

      Seek acceptance from other departments.

    • D. 

      Ensure policy is compliant with current working practices.

  • 3. 
    Which one of the following should NOT be contained within a computer policy?
    • A. 

      Definition of management expectations.

    • B. 

      Responsibilities of individuals and groups for protected information.

    • C. 

      Statement of senior executive support.

    • D. 

      Definition of legal and regulatory controls.

  • 4. 
    Which must bear the primary responsibility for determining the level of protection needed for information systems resources?
    • A. 

      IS security specialists

    • B. 

      Senior Management

    • C. 

      Seniors security analysts

    • D. 

      System auditors

  • 5. 
    A biometric fingerprint scanner is an example of which of the following?
    • A. 

      Two-factor authentication

    • B. 

      SSO

    • C. 

      Three-factor authentication

    • D. 

      Single-factor authentication

  • 6. 
    Which of the following would an IS auditor consider to be the most helpful when evaluating the effectiveness and adequacy of a computer preventive maintenance program?
    • A. 

      Vendors reliability figures

    • B. 

      Regularly scheduled maintenance log

    • C. 

      A system downtime log

    • D. 

      A written preventive maintenance schedule .

  • 7. 
    Which of the following procedures would most effectively detect the loading of illegal softwarepackages?
    • A. 

      Policies that result in instant dismissal if violated

    • B. 

      The use of diskless workstations

    • C. 

      The use of current antivirus software

    • D. 

      Periodic checking of hard drives

  • 8. 
    The internal audit department of an organization has developed and maintained ACL scripts for continuous auditing purposes. These scripts were provided to IT management for continuous monitoring purposes. This situation resulted in a potential conflict related to the auditor's independence and objectivity. Which of the following actions would best resolve the issue?
    • A. 

      The internal audit team should stop sharing the scripts so that IT management must develop its own scripts.

    • B. 

      Since continuous monitoring and continuous auditing are similar functions, IT management should assign the continuous monitoring tasks the internal audit department.

    • C. 

      IT management should continue to use the scripts for continuous monitoring purposes with the understanding that it is responsible for testing and maintaining the scripts that it uses.

    • D. 

      The internal audit team should review the areas where these scripts are being used and reduce the audit scope and frequency for these areas.

  • 9. 
    An IS auditor evaluating the resilience of a high-availability network should be most concernedif:
    • A. 

      The network servers are clustered in a site

    • B. 

      The setup is geographically dispersed

    • C. 

      The use of current antivirus software

    • D. 

      Policies that result in instant dismissal if violated

  • 10. 
    Information for detecting unauthorized input from a terminal would be best provided by the:
    • A. 

      Transaction journal

    • B. 

      Automated suspense file listing

    • C. 

      User error report

    • D. 

      Console log printout

  • 11. 
    Which of the following could result from inadequate software baselining?
    • A. 

      Scope creep

    • B. 

      Signoff delays

    • C. 

      Software integrity violations

    • D. 

      Inadequate controls

  • 12. 
    While reviewing sensitive electronic work papers, the IS auditor noticed that they were not encrypted. This could compromise the:
    • A. 

      Audit trail of the versioning of the work papers

    • B. 

      Approval of the audit phases

    • C. 

      Access rights to the work papers

    • D. 

      Confidentiality of the work papers

  • 13. 
    The MOST important reason for an IS auditor to obtain sufficient and appropriate audit evidence is to: 
    • A. 

      Comply with regulatory requirements

    • B. 

      Provide a basis for drawing reasonable conclusions

    • C. 

      Ensure complete audit coverage

    • D. 

      Perform the audit according to the defined scope

  • 14. 
    What function does the auditor provide?
    • A. 

      Second set of eyes, which are external from the subject under review

    • B. 

      Independent assurance that the claims of management are correct

    • C. 

      Assistance by fixing problems found during the audit

    • D. 

      Adapting standards to fit the needs of the client

  • 15. 
    Which one of the following is an important characteristic of an information security policy?
    • A. 

      Identifies major functional areas of information.

    • B. 

      Quantifies the effect of the loss of the information.

    • C. 

      Requires the identification of information owners.

    • D. 

      Lists applications that support the business function.

  • 16. 
    In which one of the following documents is the assignment of individual roles and responsibilities MOST appropriately defined?
    • A. 

      Security policy

    • B. 

      Enforcement guidelines

    • C. 

      Acceptable use policy

    • D. 

      Program manual

  • 17. 
    Which one of the following is NOT a fundamental component of a Regulatory Security Policy?
    • A. 

      What is to be done.

    • B. 

      When it is to be done.

    • C. 

      Who is to do it.

    • D. 

      Why is it to be done

  • 18. 
    Network Security is a process that is:
    • A. 

      Product

    • B. 

      Protocols

    • C. 

      Ever evolving

    • D. 

      Quick-fix solution

  • 19. 
    A high profile company has been receiving a high volume of attacks on their web site. The network administrator wants to be able to collect information on the attacker(s) so legal action can be taken. What should be implemented?
    • A. 

      DMZ (Demilitarized Zone)

    • B. 

      A honey pot

    • C. 

      A firewall

    • D. 

      A new subnet

  • 20. 
    You are running cabling for a network through a boiler room where the furnace and some other heavy machinery reside. You are concerned about interference from these sources. Which of the following types of cabling provides the best protection from interference in this area?
    • A. 

      STP

    • B. 

      UTP

    • C. 

      Coaxial

    • D. 

      Fiber-optic

  • 21. 
    In order for a user to obtain a certificate from a trusted CA (Certificate Authority), the user must present proof of identity and a?
    • A. 

      Private Key

    • B. 

      Public Key

    • C. 

      Password

    • D. 

      Kerberos Key

  • 22. 
    While performing a routing site audit of your wireless network, you discover an unauthorized Access Point placed on your network under the desk of Accounting department security. When questioned, she denies any knowledge of it, but informs you that her new boyfriend has been to visit her several times, including taking her to lunch one time. What type of attack have you just become a victim of?
    • A. 

      Piggybacking

    • B. 

      Masquerading

    • C. 

      Man-in-the-middle attack

    • D. 

      Social Engineering

  • 23. 
    While connected from home to an ISP (Internet Service Provider), a network administrator performs a port scan against a corporate server and encounters four open TCP (Transmission Control Protocol) ports: 25, 110, 143 and 389. Corporate users in the organization must be able to connect from home, send and receive messages on the Internet, read e-mail by beams of the IMAPv.4 (Internet Message Access Protocol version 4) protocol, and search into a directory services database for user e-mail addresses, and digital certificates. All the e-mail relates services, as well as the directory server, run on the scanned server. Which of the above ports can be filtered out to decrease unnecessary exposure without affecting functionality?
    • A. 

      25

    • B. 

      110

    • C. 

      143

    • D. 

      389

  • 24. 
    A piece of malicious code that can replicate itself, has no productive purpose, and exists only to damage computer systems or create further vulnerabilities is called a?
    • A. 

      Logic Bomb

    • B. 

      Worm

    • C. 

      Trojan Horse

    • D. 

      Virus

  • 25. 
    A user ID, PIN, and a palm scan are all required to authenticate a system. Which of the following is this an example of?
    • A. 

      SSO

    • B. 

      Two-factor authentication

    • C. 

      Single-factor authentication

    • D. 

      Three-factor authentication

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.