CS205 Grand Quiz Solution and Discussion
For effective information security implementation, the security journey should start with___________.
Developing comprehensive policies and procedures
Security hardening and vulnerability management of IT assets
A penetration test
A policy is___________________.
Mandatory and limited in scope to a department
Mandatory and applies to entire organization; signed off by senior management
Not mandatory but a guideline only
Signed off by information security department
In an enterprise which software should be allowed to install and execute?
Softwares included in white-list.
Any freely available software.
Only paid software.
Softwares displayed on notice board.
Which activity is carried out in security hardening layer?
Address security configuration of all it assets
Scanning to inspect patching of all it assets
Aggregative controls involving people, process, and technology
Ensure the proper utilization, ROI and audits of purchased devices
What are the three types of redundant site models in an enterprise network?
Hot site, cold site and warm site
Primary site, secondary site and DR site
Highly available site, fault tolerant site and DR site
Both a & b
Anthem insurance breach 2014 was initiated through?
Man in the middle attack
Sql injection attack
What do you mean by RTO in a business continuity plan?
Minimum frequency of backups
Maximum downtime an organization can handle
Maximum age of files that an organization must recover from backup storage for normal operations to resume after disaster
Both a & b
The 4 layer security transformation model and isms requirements and controls__________________.
Are both separate security programs
Are both separate security projects
May form essential elements of the security program
None of the given
As per carneige mellon university computing consortium commercial software contains?
20 to 30 bugs for every 1000 lines of code
20 to 30 bugs for every 10,000 lines of code
40 to 50 bugs for every 1000 lines of code
40 to 50 bugs for every 10,000 lines of code
Checklist of applicable security controls step includes?
Make a checklist for progress tracking and share with it teams
Document controls in sop
Research for applicable controls
Both b and C
Policy & compliance practice of “governance” function of software assurance maturity model is focused on________________.
On arming personnel involved in software lifecycle with knowledge and resources to design develop and deploy secure software
Understanding and meeting external legal and regulatory requirements
On establishing a framework within an organization for a software security assurance program
On proactively specifying the expected behavior of software with respect to security
How security of outsourced services can be evaluated?
Include outsourced scope in internal audit
Ask for 3rd party security review
Vulnerability assessment and penetration testing
Spot security checks
What should standard secure configuration images represent?
Default configuration version of OS only.
Hardened versions of OS only.
Hardened versions of application installed on system only.
Hardened versions of underlying OS and application installed on system.
Which team tests the patches in test environment in vulnerability management process?
Risk & compliance team
IT operations team
It would be correct to say that the security posture in Pakistan can be improved by____________.
More awareness and training
Effective actions taken by regulators, organizations, and building an effective cyber security eco-system
Regular technical security audits
Learning from regional countries
IT/ Infosec Teams require information security project report at ________basis.