CS205 Grand Quiz Solution and Discussion
What does check content explain about rule in DISA STIG?
Describes the control
Describes the benefit of implementing control
Tells how to check whether control is implemented or not
Tells how to apply control
One of the challenges in effective implementation of a security transformation project in a small-sized organization is_______________.
Adhoc culture and lack of discipline
Old and outdated IT environment
Multiple data center sites
Lack of a disaster recovery (DR) site
The purpose of the information security lifecycle is to ensure that___________________.
Project management is conducted adequately
The sequence is documented
There is a completion date to security projects
All security projects & activities consistently follow the same sequence and steps
For effective information security implementation, the security journey should start with___________.
Developing comprehensive policies and procedures
Security hardening and vulnerability management of IT assets
A penetration test
A policy is___________________.
Mandatory and limited in scope to a department
Mandatory and applies to entire organization; signed off by senior management
Not mandatory but a guideline only
Signed off by information security department
In an enterprise which software should be allowed to install and execute?
Softwares included in white-list.
Any freely available software.
Only paid software.
Softwares displayed on notice board.
Which activity is carried out in security hardening layer?
Address security configuration of all it assets
Scanning to inspect patching of all it assets
Aggregative controls involving people, process, and technology
Ensure the proper utilization, ROI and audits of purchased devices
What are the three types of redundant site models in an enterprise network?
Hot site, cold site and warm site
Primary site, secondary site and DR site
Highly available site, fault tolerant site and DR site
Both a & b
Anthem insurance breach 2014 was initiated through?
Man in the middle attack
Sql injection attack
What do you mean by RTO in a business continuity plan?
Minimum frequency of backups
Maximum downtime an organization can handle
Maximum age of files that an organization must recover from backup storage for normal operations to resume after disaster
Both a & b
The 4 layer security transformation model and isms requirements and controls__________________.
Are both separate security programs
Are both separate security projects
May form essential elements of the security program
None of the given
As per carneige mellon university computing consortium commercial software contains?
20 to 30 bugs for every 1000 lines of code
20 to 30 bugs for every 10,000 lines of code
40 to 50 bugs for every 1000 lines of code
40 to 50 bugs for every 10,000 lines of code
Checklist of applicable security controls step includes?
Make a checklist for progress tracking and share with it teams
Document controls in sop
Research for applicable controls
Both b and C
Policy & compliance practice of “governance” function of software assurance maturity model is focused on________________.
On arming personnel involved in software lifecycle with knowledge and resources to design develop and deploy secure software
Understanding and meeting external legal and regulatory requirements
On establishing a framework within an organization for a software security assurance program
On proactively specifying the expected behavior of software with respect to security
How security of outsourced services can be evaluated?
Include outsourced scope in internal audit
Ask for 3rd party security review
Vulnerability assessment and penetration testing
Spot security checks
What should standard secure configuration images represent?
Default configuration version of OS only.
Hardened versions of OS only.
Hardened versions of application installed on system only.
Hardened versions of underlying OS and application installed on system.