CS205 Grand Quiz Solution and Discussion
-
Which team tests the patches in test environment in vulnerability management process?
Risk & compliance team
Business team
IT operations team
Audit team -
What should standard secure configuration images represent?
Default configuration version of OS only.
Hardened versions of OS only.
Hardened versions of application installed on system only.
Hardened versions of underlying OS and application installed on system. -
How security of outsourced services can be evaluated?
Include outsourced scope in internal audit
Ask for 3rd party security review
Vulnerability assessment and penetration testing
Spot security checks -
Policy & compliance practice of “governance” function of software assurance maturity model is focused on________________.
On arming personnel involved in software lifecycle with knowledge and resources to design develop and deploy secure software
Understanding and meeting external legal and regulatory requirements
On establishing a framework within an organization for a software security assurance program
On proactively specifying the expected behavior of software with respect to security -
Checklist of applicable security controls step includes?
Make a checklist for progress tracking and share with it teams
Document controls in sop
Research for applicable controls
Both b and C -
As per carneige mellon university computing consortium commercial software contains?
20 to 30 bugs for every 1000 lines of code
20 to 30 bugs for every 10,000 lines of code
40 to 50 bugs for every 1000 lines of code
40 to 50 bugs for every 10,000 lines of code -
The 4 layer security transformation model and isms requirements and controls__________________.
Are both separate security programs
Are both separate security projects
May form essential elements of the security program
None of the given -
-
Anthem insurance breach 2014 was initiated through?
Windows vulnerability
Phishing email
Man in the middle attack
Sql injection attack -
What are the three types of redundant site models in an enterprise network?
Hot site, cold site and warm site
Primary site, secondary site and DR site
Highly available site, fault tolerant site and DR site
Both a & b -
Which activity is carried out in security hardening layer?
Address security configuration of all it assets
Scanning to inspect patching of all it assets
Aggregative controls involving people, process, and technology
Ensure the proper utilization, ROI and audits of purchased devices -
In an enterprise which software should be allowed to install and execute?
Softwares included in white-list.
Any freely available software.
Only paid software.
Softwares displayed on notice board. -
A policy is___________________.
Mandatory and limited in scope to a department
Mandatory and applies to entire organization; signed off by senior management
Not mandatory but a guideline only
Signed off by information security department -
For effective information security implementation, the security journey should start with___________.
Developing comprehensive policies and procedures
Management commitment
Security hardening and vulnerability management of IT assets
A penetration test -
The purpose of the information security lifecycle is to ensure that___________________.
Project management is conducted adequately
The sequence is documented
There is a completion date to security projects
All security projects & activities consistently follow the same sequence and steps -
One of the challenges in effective implementation of a security transformation project in a small-sized organization is_______________.
Adhoc culture and lack of discipline
Old and outdated IT environment
Multiple data center sites
Lack of a disaster recovery (DR) site