Monday, April 25, 2016

Chapter1: Information Security Governance - 24%

Management Process
- Plan (ITIL -> Plan)
- Build (ITIL -> Do)
- Run (ITIL -> Check)
- Monitor (ITIL -> Act)


Information Security Manager's Responsibility
- Define and manage information security program
- Provide education and guidance to executive team
- Present options and information to decision making
- Act as on adviser

Governance dependent to Business strategy
Technology dependent to Policy


Objective of Information Security Governance
- Strategic alignment:
   o Aligned with business strategy to support objectives
- Risk management:
   o Mitigate risk and reduce impacts to acceptable levels
- Value delivery:
   o Optimizing security investments in support of objectives
- Resource optimization:
   o Security knowledge/infrastructure used efficiently/effectively
- Performance measurement:
   o Monitoring and reporting to ensure objectives achieved
- Integration:
   o Integrate relevant assurance factors to ensure that processes operate as intended from end to end


Business Goals and Objectives
Goals include:
- Providing strategic direction
- Ensuring that objectives are achieved
- Ascertaining that risk is managed appropriately
- Verifying that the enterprise's resources are used responsibly


Scope and Charter of IS Governance
- Information security deals with all aspects of information
- IT security is concerned with security of information within the boundaries of the technology domain.


Role and Responsibilities of Senior Management
- Board of directors/senior management:
   o Information security governance
- Executive management:
   o Implementing effective security governance and defining the strategic security objectives
- Steering committee:
   o Ensuring that all stakeholders impacted by security considerations are involved
- Chief information security officer (CISO)
   o Responsibilities currently range from the CISO who reports to the CEO to system administrators who have part-time responsibility for security management.


Information Security Role and Responsibilities
Information Security Manager (ISM): (ข้อสอบ)
- Develops security strategy with input from key business units and approval of strategy by senior leadership.
- Educates management

Information Security Requires:
- Leadership and ongoing support from senior management.
- Integration with and cooperation from organizational business unit management.
- Establishing reporting and communication channels.


Governance and Third-party Relationships
Rules in processes for:
- Service providers
- Outsourced operations
- Treading partners
- Merged or acquired organization


Effective Security Metrics
- It is difficult or impossible to manage any activity that cannot be measured.
- Standard security metrics may include:
   o Downtime due to viruses
   o Percentage of servers patched
   o Number of penetrations of systems

Governance Implementation Metrics
Key goal indicators (KGIs) and key performance indicators (KPIs) can:
- Be useful in providing information about achievement of process or service goals
- Help determine whether milestones are being met

* KGIs tend to reflect more strategic goals, e.g., strategic goals of information security governance, whereas KPIs tend to reflect more tactical goals, such as reducting the number of breaks-ins into systems.


Information Security Strategy Overview
People                                           Process                                               Output

Senior Manager      ------->   Business Strategy   ---------------> Business Objectives

Steering Committee and   ->  Risk Management/Information  --> Security Attributes
Executive Management          Security Strategy

CISO/Steering Committee-> Security Action Plan Policies, --> Security Programs
                                               Standards


Information Security Strategy Objectives
The six major goals of governance are:
- Strategic alignment  --> ล้อตามแผนกลยุทธ์
- Effective risk management --> การจัดการผลกระทบ
- Value delivery --> ให้คุณค่า
- Resource management --> บริหารทรัพยากร
- Performance management --> บริหารคุณภาพ
- Process assurance integration --> กระบวนการเพิ่มความเชื่อมั่น


The Desired State
- The desired state should include a snapshot of all relevant conditions at a particular point in the future: (ข้อสอบ)
   o Should include principles, policies and frameworks; processes; organizational structures; culture, ethics and behavior; information; services infrastructure and applications; and people, skills and competencies.
- A "desired state of security" must be defined qualitatively in terms of attributes, characteristics and outcomes:
   o Strategy development will have limits on the types of enforcement methods to consider.

The desired state according to COBIT:
- "Protecting the interests of those relying on information, and the processes, system and communications that handle, store and deliver the information, form harm resulting form failures of availability, confidentiality and integrity"
- Focus on IT-related processes from IT governance, management and control perspectives.

COBIT 5 is based on five key principles for governance and management of enterprise IT:
1. Meeting Stakeholder Needs
2. Covering the Enterprise End-to-end
3. Applying a Single, Integrated Framework
4. Enabling a Holistic Approach
5. Separating Governance From Management

The desired state of security may also be defined as levels in the Capability Maturity Model (CMM): (ข้อสอบ)
0. Nonexistent ----------------> ไม่ได้ทำ
1. Ad hoc --------------------> ทำแบบไม่มี formal
2. Repeatable but intuitive ----> มีผลลัพธ์
3. Defined process -----------> มี process
4. Managed and measurable --> สามารถวัดได้
5. Optimized ------------------> มีทางเลือกให้มากกว่า 1

Balanced Scorecard (ข้อสอบ)
is a strategic planning and management system that is used extensively in business and industry, government, and nonprofit organizations worldwide to align business activities to the vision and strategy of the organization, improve internal and external communications, and monitor organization.
Financial
Customer
Internal Business Processes
Learning and Growth




ISO/IEC 27001:2013 - the 14 major areas are:
A.5: Information security policies
A.6: Organization of information security
A.7: Human resource security (controls that are applied before, during, or after employment)
A.8: Asset management
A.9: Access control
A.10: Cryptography
A.11: Physical and environmental security
A.12: Operations security
A.13: Communications security
A.14: System acquisition, development and maintenance
A.15: Supplier relationships
A.16: Information security incident management
A.17: Information security aspects of business continuity


Risk
Current Risk
- The current state of risk must also be assessed through a comprehensive risk assessment
- After risk assessment, a business impact analysis/assessment (BIA) must be performed
   o Shows the impact of adverse events (e.g. outages) over different period of time
   o Provides some of the information needed to develop an effective strategy
   o The ultimate objective of security is to provide business process assurance, including minimizing the impact of adverse events.
   o The difference between acceptable levels of impact and current level of potential impacts must be addressed by the strategy (ข้อสอบ)

Information Security Strategy Development
- Must move from current state to desired state (ข้อสอบ)
- Basis for creating a road map
- A set of information security objectives coupled with available processes, methods, tools and techniques creates the means to construct a security strategy.

Strategy Resource
The Information Security manager must be aware of:
- Resources that are available
- Cultural or other reasons (e.g., management reluctance to change or modify policies) that certain options are precluded

Strategy Constraints
- Numerous constraints that set boundaries for options available to the ISM exist.
- They need to be thoroughly defined and understood before initiating strategy development.

Action Plan to Implement Strategy
- Implementing an information strategy requires one or more projects or initiatives.
- Analysis of the gap between the current state and the desired state for each defined metric identifies the requirements and priorities for the an overall plan or road map to achieve the objectives and close the gaps.

Implementing Security Governance Example
Implementing security governance utilizing the Capability Maturity Model:
- To define objectives (KGIs)
- To determine a strategy
- As a metric for progress
- CMM level 4 is a typical organizational desired state (ข้อสอบ)

==============================================================
Practice Question 1-1
A security strategy is important for an organization PRIMARILY because it provides:
   a. basis for determining the best logical security architecture for the organization.
   b. management intent and direction for security activities.
   c. provides users guidance on how to operate securely in everyday tasks.
   d. helps IT auditors ensure compliance.

Practice Question 1-2
Which of the following is the MOST important reason to provide effective communication about information security?
   a. It makes information security more palatable to resistant employees.
   b. It mitigates the weakest link in the information security landscape.
   c. It informs business units about the information security strategy.
   d. It helps the organization conform to regulatory information security requirements.

Practice Question 1-3
Which of the following approaches BEST helps the information security manager achieves compliance with various regulatory requirements?
   a. Rely on corporate counsel to advise which regulations are the most relevant.
   b. Stay current with all relevant regulations and request legal interpretation.
   c. involve all impacted departments and treat regulations as just another risk.
   d. Ignore many of the regulations that have no penalties.

Practice Question 1-4
The MOST important consideration in developing security policies is that:
   a. they are based on a threat profile.
   b. they are complete and no detail is left out.
   c. management signs off on them.
   d. all employee read and understand them.

Practice Question 1-5
The PRIMARY objective in creating good procedures is:
   a. to make sure that they work as intended.
   b. that they are unambiguous and meet the standards.
   c. that they be written in plain language and widely distributed.
   d. that compliance can be monitored.

Practice Question 1-6
Which of the following MOST helps ensure that assignment of roles and responsibilities is effective?
   a. Senior management is in support of the assignments.
   b. The assignments are consistent with existing proficiencies (แต่ละบุคคล).
   c. The assignments are mapped to required skill.
   d. The assignments are given on a voluntary basis.

Practice Question 1-7
What is the PRIMARY benefit organizations derive from effective information security governance?
   a. Maintaining appropriate regulatory compliance
   b. Ensuring disruptions are within acceptable levels
   c. Prioritizing allocation of remedial resources
   d. Maximizing return on security investments

Practice Question 1-8
From an information security manager's perspective, the MOST important factors regarding data retention are:
   a. business and regulatory requirements.
   b. document integrity and destructions.
   c. media availability and storage.
   d. data confidentiality and encryption.

Practice Question 1-9
Which role is in the BEST position to review and confirm appropriateness of a user access list?
   a. Data owner
   b. Information security manager
   c. Domain administrator
   d. Business manager

Practice Question 1-10
In implementing information security governance, the information security manager is PRIMARILY responsible for:
   a. developing the security strategy.
   b. reviewing the security strategy.
   c. communicating the security strategy.
   d. approving the security strategy.

Sunday, April 24, 2016

Chapter2: Information Risk Management and Compliance - 33%

Risk Management Overview
Risk management is:
- A process aimed at achieving an optimal balance between realizing opportunities for gain and minimizing vulnerabilities and loss.
- A process to ensure that loss events are either avoided their impact is kept within acceptable limits at acceptable cost.

Risk Management Objective
- Manage risks so that they do not have an adverse material impact on business processes.
- Risk is inherent to all business activities.

Risk Management Challenger
There is a high potential for misuse and misunderstanding of key terms:
- Risk
- Threats
- Vulnerabilities
There are many different approaches and techniques:
- Qualitative
- Quantitative - ALE/VAR --> Value at risk
- Semi-qualitative

Need to operate at multiple levels within the organization:
- Strategic level
- Operational level
- Project level

Risk Model
- All activities have an inherent risk
- Risk has a:
   o Likelihood/probability of occurrence
   o Consequence/business impact

Outcomes of Risk Management
Informed decision making based on understanding of:
- Organization's threat, vulnerability and risk profile
- Risk exposure and potential consequences of compromise

Results in:
- An organizational risk mitigation strategy sufficient to a achieve acceptable consequences.
- Organizational acceptance/deference based on an understanding of potential consequences of residual risk.
- Measurable evidence that risk management resources are used in an appropriate and cost-effective manner.

Risk Management Strategy
A risk management strategy:
- Is an integrated business process.
- Has defined objectives.
- Incorporates all of the risk management processes, activities, methodologies and policies adopted and carried out in an organization.

Developing a Risk Management Program
Developing the program requirements: (ขั้นตอนการทำ RM)
- Establish Context and Purpose
- Define Scope and Charter (ใครมี role อะไร มีผลกระทบอย่างไร)
- Define Authority, Structure and Reporting
- Ensure Asset Identification, Classification and Ownership (ผู้รับผิดชอบสูงสุดต่อ Asset นั้น)
- Determine Objectives
- Determine Methodologies
- Designate Program Development Team

Role and Responsibilities
- Information security risk management is an integral part of security governance:
   o Is the responsibility of the board of directors or the equivalent to ensure that these efforts are effective.
- Management must be involved in and sign off on acceptable risk levels and risk management objectives.

- A steering committee must:
   o Set risk management priorities.
   o Define risk management objectives in terms of supporting business strategy.
- The ISM is responsible for developing, collaborating and managing the information security risk management program to meet the defined objectives.

Concepts
Key information security risk management concepts include:
- Threats               - Criticality
- Vulnerabilities     - Sensitivity
- Exposures          - Recovery Time Objectives (RTOs) -> ระยะเวลากู้ระบบ
- Risk                    - Recovery Point Objectives (RPOs) -> ระยะเวลาที่ยอมให้ Data loss
- Impacts              - Service Delivery Objectives (SDOs) -> จำนวน Service ที่จะทำ DR
- Controls             - Acceptable Interruption Window (AIW) -> ระยะเวลาที่ยอมให้ระบบล่ม
- Countermeasures
- Resource valuation (คน, ของ)
- Information asset classification

Other risk management functions related to information security can include:
- Service level agreements (SLAs)
- System robustness and resilience
- Business continuity/disaster recovery
- Business process reengineering
- Project management timelines and complexity
- Enterprise and security architectures
- IT and information security governence
- Systems life cycle management
- Policies, standards and procedures

Risk Management Process
Risk management usually consists of the following processes:
- Establish scope and boundaries
- Risk assessment
- Risk treatment
- Acceptance of residual risk ----> implement control for mitigate risk
- Risk communication and monitoring

Defining a Risk Management Framework
Risk management frameworks should have similar risk management requirements, including:
- Policy
- Planning and resourcing
- Implementation program
- Management review
- Risk management process
- Risk management documentation

Developing a Risk Profile
A risk profile is essential for effective risk management.
- COBIT 5 approach --> อ้างถึง
- Risk register --> เก็บเป็นตาราง หรือฐานข้อมูล

Risk Assessment
Numerous risk management models are available including
- COBIT
- OCTAVE
- NIST 800-39
- HB 158-2010
- ISO/IEC 31000  ---> ISMS recommendation
- ITIL
- CRAMM

Identification of Risks
In selection a risk identification methodology, the following techniques should be considered:
- Team-based brainstorming where workshops can prove effective in building commitment and making use of different experiences.
- Structured techniques such as flow charting, system design review, systems analysis, hazard and operability studies, and operational modeling.
- "What-if" and scenario analysis for less clearly defined situations, such as the identification of strategic risks and processes with a more general structure.

Threats
Threats are usually categorized as:
- Natural -- Flood, fire, cyclones, rain/hail, plagues and earthquakes
- Unintentional -- Fire, water, building damage/collapse, loss of utility services and equipment failure
- Intentional physical -- Bombs, fire, water and theft
- Intentional nonphysical -- Fraud, espionage, hacking, identity theft, malicious code, social engineering, phishing attacks and denial-of-service attacks

Risk Treatment Options
- Terminate the activity:
   o This is exactly what is says -- the activity giving rise to risk is changed or terminated to eliminate the risk
- Transfer the risk:
   o Risk may be reduced to acceptable levels by transferring it to another entity (e.g., an insurance company)
   o Risk may also be transferred by contract to a service provider or other entity
   o The cost of mitigating risk must not exceed the value of the asset
- Mitigate the risk:
   o Controls and countermeasures are used
- Tolerate/accept the risk:
   o Sometimes an identified defined risk may be accepted when the cost of mitigating the risk is too high compared to the value of the asset
   o Accepted risk should be reviewed regularly

Residual Risk
Is the amount of risk that remains after countermeasures and controls have been implemented.

Impact
Impacts are determined by performing a business impact assessment (BIA) and subsequent analysis:
- The BIA helps prioritize risk management.
- When coupled with asset valuations, the BIA provides the basis for the level and types of protection required and the basis for developing a business case for controls.

Costs and Benefits
When considering costs, the total cost of ownership (TCO) must be considered for the full life cycle of the control or countermeasure. This can include such elements as:
- Acquisition costs
- Deployment and implementation costs
- Recurring maintenance costs
- Testing and assessment costs
- Compliance monitoring and enforcement
- Inconvenience to users
- Reduced throughput of controlled processes
- Training in new procedures or technologies as applicable
- End of life decommissioning

Third-party Service Providers
Key clauses that should be part of an SLA must include, but are not restricted to:
- Right to audit vendors books of accounts and premises
- Right to review their processes
- Insistence on standard operating prodedures (SOPs)
- Right to assess the skill sets of the vendor resources
- Advance information if the resource deployed are to be changed

==============================================================
Practice Question 2-1
The overall objective of risk management is to:
   a. eliminate all vulnerabilities, if possible.
   b. determine the best way to transfer risk.
   c. manager risks to an acceptable level.
   d. implement effective countermeasures.

Practice Question 2-2
The information security manager should treat regulatory compliance as:
   a. an organizational mandate.
   b. a risk management priority
   c. a purely operational issue.
   d. just another risk to be treated.

Practice Question 2-3
To address changes in risk, an effective risk management program should:
   a. ensure that continuous monitoring processes are in place.
   b. establish proper security baselines for all information resources.
   c. implement a complete data classification process.
   d. change security policies on a timely basis to address changing risks.

Practice Question 2-4
Information classification is important to properly manage risk PRIMARILY because:
   a. it ensures accountability for information resources as required by roles and responsibilities.
   b. it has a legal requirement under various regulations.
   c. there is no other way to meet the requirements for availability, integrity and auditability.
   d. it is used to identify the sensitivity and criminality of information to the organization.

Practice Question 2-5
Vulnerabilities discovered during an assessment should be:
   a. handled as a risk even though there is no threat.
   b. prioritized for remediation solely based on impact.
   c. a basis for analyzing the effectiveness of controls.
   d. evaluated for threat, impact and cost of mitigation.

Practice Question 2-6
Indemnity agreements (SLA) can be used to:
   a. ensure an agreed-upon level of service.
   b. reduce impacts on organizational resources.
   c. transfer responsibility to a third party.
   d. provide an effective countermeasure to threats.

Practice Question 2-7
Residual risk can be determined by:
   a. assessing remaining vulnerabilities
   b. performing a threat analysis
   c. conducting a risk assessment
   d. implementing a risk transfer

Practice Question 2-8
Data owners are PRIMARILY responsible for creating risk mitigation strategies to address which of the following areas?
   a. Platform security
   b. Entitlement changes  -> custodian เป็นคนดูแล
   c. Intrusion detection
   d. Antivirus controls

Practice Question 2-9
A risk analysis should:
   a. limit the scope to a benchmark of similar companies.
   b. assume an equal degree of protection for all assets.
   c. address the potential size and likelihood of loss.
   d. give more weight to the likelihood vs. the size of loss.

Practice Question 2-10
Which of the following is the FIRST step in selecting the appropriate controls to be implemented in a new business application?
   a. Business impact analysis (BIA)
   b. Cost-benefit analysis
   c. Return on investment (ROI) analysis
   d. Risk assessment

Saturday, April 23, 2016

Chapter 3: Information Security Program Development and Management - 25%

Information Security Program Management Overview
The three elements essential to ensure successful security program design, implementation and ongoing management:
- The execution of a well-developed information security strategy.
- Must be well-designed with cooperation and support from management and stakeholders.
- Effective metrics must be developed.

Information Security Program Development Overview
The ISM must realize that the objectives and expected benefits will work best if defined in business terms.

Implement of Information Security Program
A well-executed security program will serve to effectively:
- Design, implement, manage and monitor the security program, transforming strategy into actuality.
- Provide the capabilities to meet security objectives.
- Accommodate changes in security requirements.

Information Security Program Objectives
- Execute the information security strategy in the most cost-effective manner.
- Maximize support of business functions.
- Minimize business disruptions.

Information security program management uses a structured grouping of projects to produce clearly identified business value.

Information Security Program Concepts
A security program implementation effort should include a series of specific control objectives:
- Technical
- Procedural
- Physical

Concepts
Implementing and managing a security program will require the information security manager to understand and have a working knowledge of a number of management and process concepts including:
- System development life cycles (SDLCs)         - Control implementation and testing
- Requirements development                              - Control monitoring and metrics
- Specification development                               - Architectures
- Control objectives                                            - Documentation
- Control design and development                     - Quality assurance
- Project management                                        - Communications
- Business case development                             - Problem resolution
- Business process reengineering                      - Variance and noncompliance resolution
- Budgeting, costing and financial issues          - Risk management
- Deployment and integration strategies           - Compliance monitoring and enforcement
- Training needs assessments and approaches  - Personnel issues

Technology Resource
Technology itself is not a control-technology is used to implement controls:
- It is essential that Information Security Manager understand where a given technology fits into the basic prevention, detection containment, reaction and recovery framework.

There are numerous technologies related directly to information security with which the ISM should be familiar including:
- Firewalls
- Routers and switches
- IDS, NIDS, HIDS
- Cryptographic techniques (PKI,AES)
- Digital signatures
- Smart cards


Scope and Charter of an Information Security Program
Since the scope and charter are generally not explicitly stated, the ISM must gain a thorough understanding of the organization's:
- Goals
- Risk appetite and tolerance
- Principles, Policies, Frameworks
- Processes,
- Organizational Structures
- Culture, Ethics and Behaviors
- Information
- Services, Infrastructure and Applications
- People, Skill and Competencies


The Information Security Management Framework
- Should fundamentally describe the information security management components and their interactions.
- Information security management components include:
   o Roles
   o Policies
   o Standard operating procedures  --> procedure ที่ทุกคนต้องปฏิบัติ
   o Management procedures
   o Security architectures, etc.

ISO/IEC 27001:2013
The ISM should be aware of the breadth of the following information security management control areas:
- A.5: Information security policies
- A.6: Organization of information security
- A.7: Human resource security (controls that are applied before, during or afet employment)
- A.8: Asset control
- A.9: Access control
- A.10: Cryptography
- A.11: Physical and environmental security
- A.12: Operations security
- A.13: Communications security
- A.14: System acquisition, development and maintenance
- A.15: Supplier relationships
- A.16: Information security incident management
- A.17: Information security aspects of business continuity management
- A.18: Compliance (with internal requirements, such as policies, and with external requirements, such as laws)

Operational Components
- Operational components are ongoing activities that must be performed because of information security requirements.
- Operational components that are part of an information security program include:
   o Standard operating procedures (SOPs)
   o Business operations security practices
   o Maintenance and administration of security technologies (e.g., identity management, access control administration, and SIEM monitoring and analysis
- The ISM should determine the operational components needed to implement policies and standards:
   o Should then plan for deployment, monitoring and management of operational components

Management Components
- Set the stage for the information security program
- Take place less frequently than operational components
- Are often responsibility of middle and senior management
- Issues can be escalated to the board level (e.g. oversight)
- Include:
   o Standards development or modification
   o Policy reviews
   o Oversight of initiatives or program execution

Administrative Components
- The ISM must ensure effective administration of the information security program include matters related to:
   o Finance
   o HR
   o Support functions
- Strong working rapport with Finance and HR departments will help facilitate an effective information security program execution.
- The ISM must balance project efforts and ongoing operational overhead with:
   o Staff headcount
   o Utilization levels
   o External resources
- Resource utilization must be prioritized based on guidance from:
   o Steering committee
   o Executive management
- Workload balancing and external resources help addresses planned/unplanned spikes in activity

Educational and Information Components
Training and Education:
- Can be considered preventive measures
- Educate employees on:
   o Threats and risks
   o Appropriate practices
   o Repercussions of non-compliance
- Include:
   o Organizational policies and procedures
   o Appropriate Use Policy
   o Protection of Proprietary Information (POPI) Policy
   o Employee monitoring
- Generally communicated and administered by HR function.


Defining an Information Security Program Road Map
Key goals are universal and include:
- Strategic alignment
- Risk optimization
- Resource optimization
- Benefits realization
- Value delivery

An ISM roadmap helps define what each means to a given organization.
Because the ISM rarely begins with a blank slate, the ISM must be able to review* and evaluate the security level of existing:
- Data
- Applications
- Systems
- Facilities
- Processes

*Security reviews need to have an objective, scope, constraints, approach and result

Gap Analysis - Basis for an Action Plan
The ISM must:
- Identify where control objectives are not adequately supported by control activities.
- Establish procedures for continuously monitoring achievement of control objectives.
- Design and information security program with the flexibility to evolve and mature.


Information Infrastructure and Architecture
- Infrastructure - the underlying base or foundation upon which information systems are deployed.
- Security infrastructure - the foundation that enables security resource to be deployed.

When infrastructure is designed and implemented to support policies and standards, the infrastructure is said to be secure.

Enterprise Information Security Architecture
- Information security architecture includes multiple layers ranging from contextual to physical.
- The design is tightly aligned with the purpose. Good architecture is an articulation of policy.


Architecture Implementation
Numerous architectural frameworks have been developed to address the need for overall comprehensive model for information systems:
- COBIT
- ITIL
- ISO/IEC 27001:2013
- SABSA
- More

RACI Model
- Responsible
- Accountable
- Consulted
- Informed

Security Awareness, Training and Education
Topic for awareness training (Acceptable used policy) can include topics such as:
- Choosing password wisely and protecting them from exposure
- Avoiding e-mail and web-based malware
- Recognizing social engineering attacks
- Recognizing and reporting security incidents
- Securing electronic and paper media against theft and exposure
- Spotting malware that could lead to identity theft and desktop spying
- Backing up work-related files

Documentation -- ข้อสอบ
Primary documentation used to implement the information security program includes:
- Policies
- Standards
- Procedures
- Guidelines

Business Case Development
Purpose of a business case -- ข้อสอบ
- Obtain support of influencers and decision makers
- Require those proposing projects to provide a clear proposition
- Enable:
   o comparison between competing projects/proposals
   o objective decision-making
   o measurability of project success against projection

Business case content: (Outcome)
- Reference
- Context
- Value proposition
- Focus
- Deliverables
- Dependencies
- Project metrics
- Workload
- Required resources
- Commitments (importance)

Objectives of the business case process is to be:
- Adaptable
- Consistent
- Business oriented
- Comprehensive
- Understandable
- Measureable
- Transparent
- Accountable

Information Security Liaison Responsibilities
- Physical/Corporate Security    - Procurement
- IT Audit                                     - Compliance
- Information Technology Unit    - Privacy
- Business Unit Management     - Training
- Human Resources                   - Quality Assurance
- Legal Department                   - Insurance
- Employees                             - Third Party Management
                                                - Project Management Office


Controls and Countermeasures

Control Categories
Control categories include:
- Preventive
- Detective
- Corrective
- Compensatory
- Deterrent  -> เบี่ยงเบนความสนใจ

* Backup เป็น Control ประเภทใด? -> Corrective
* Malware Antivirus เป็น Control ประเภทใด? -> Preventive

==============================================================
Practice Question 3-1
When designing an intrusion detection system, the information security manager should recommend that it be placed:
   a. outside the firewall
   b. on the firewall server
   c. on a screened subnet
   d. on the external router

Practice Question 3-2
Which of the following is the BEST metric for evaluating the effectiveness of security awareness training? The number of:
   a. password resets
   b. reported incidents
   c. incidents resolved
   d. access rule violations

Practice Question 3-3
Security monitoring mechanisms should PRIMARILY:
   a. focus on business-critical information
   b. assist owners to manage control risks
   c. focus on detecting network intrusions
   d. record all security violations

Practice Question 3-4
When contracting with an outsourcer to provide security administration, the MOST important contractual element is the:
   a. right-to-terminate clause
   b. limitations of liability
   c. service level agreement (SLA)
   d. financial penalties clause

Practice Question 3-5
Which of the following is MOST effective in preventing security weaknesses in operating systems?
   a. Patch management
   b. Change management
   c. Security baselines
   d. Configuration management

Practice Question 3-6
Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information?
   a. Baseline security standards
   b. System access violation logs
   c. Role-based access controls
   d. Exit routines

Practice Question 3-7
Which of the following is the MOST important consideration when implementing an intrusion detection system (IDS)?
   a. Tuning
   b. Patching
   c. Encryption
   d. Packet filtering

Practice Question 3-8
Which of the following practices is BEST used to remove system access for contractors and other temporary users when it is no longer required?
   a. Log all account usage and send it to their manager
   b. Establish predetermined automatic expiration dates
   c. Require managers to email security when the user leaves
   d. Ensure that each individual has signed a security acknowledgement

Practice Question 3-9
Which of the following is MOST important for a successful information security program?
   a. Adequate training on emerging security technologies
   b. Open communication with key process owners
   c. Adequate policies, standards and procedures
   d. Executive management commitment

Practice Question 3-10
An enterprise is implementing an information security program. During which phase of the implementation should metrics be established to assess the effectiveness of the program over time?
   a. Testing
   b. Initiation
   c. Design
   d. Development

Friday, April 22, 2016

Chapter 4: Information Security Incident Management -18%

Incident Response Procedures
Incident response procedures (IRP) enable a business to:
- respond effectively when an incident occurs (ใช้รับมือ).
- to continue operations in the event of disruption (ใช้ดำเนินการต่อ).
- survive interruptions or security breaches in information systems.

Plans must be:
- Clearly documented.
- Readily accessible.
- Based on the long-range IT plan.
- Consistent with the overall (ร้อตาม BCP และ Security Strategy) business continuity and security strategies.

The process of developing and maintaining an appropriate plan for the defined scope of incident management and response should include:
- Incident Response Planning -> security breach/interrupt
- Business Continuity Planning -> interrupt
- Disaster Recovery Planning -> กู้คืนระบบ

Concepts
Incident handling is one service that involves all the processes or tasks associated with handling events and incidents. It involves multiple functions:
- Detection and reporting -> พบแล้วแจ้ง
- Triage -> Classify and priority
- Analysis -> วิเคราะห์
- Incident response -> ตอบสนอง

Incident response is the last step in an incident handling process.
It encompasses:
- Planning, coordination, and execution of any appropriate mitigation.
- Recovery strategies and actions.

Responsibilities
The ISM's incident response-related responsibilities include:
- Developing the information security incident management and response plans.
- Handling and coordinating information security incident response activities effectively and efficiently.
- Validating, verifying and reporting of protective or countermeasure solutions, both technical and administrative.
- Planning, budgeting and program development for all matters related to information security incident management and response.

Incident response goals include:
- Containing and minimizing the effects of the incident so that damage and losses do not escalate out of control.
- Notifying the appropriate people for the purpose of recovery or to provide needed information.
- Recovering quickly and efficiently from security incidents.
- Responding systematically and decreasing the likelihood of recurrence.
- Balancing operational and security processes.
- Dealing with legal and law enforcement-related issues.

The ISM must define what constitutes a security-related incident: (by Scenario)
- Malicious code attacks
- Unauthorized access to IT or information resources
- Unauthorized utilization of services
- Unauthorized changes to systems, network devices or information
- Denial of service
- Misuse
- Surveillance and espionage (โจรกรรม)
- Hoaxes/social engineering

Senior Management Commitment
- Senior management commitment is critical to the success of incident management and response.
- Incident management and response:
   o Is a component of risk management  -> ส่วนหนึ่งของ risk management
   o Needs the same level of support from the top


Incident Management Resources
- Develop a clear scope and objective  [ก่อน]
- Develop an implementation strategy   [หลัง]

Policies and Standards
The incident response plan must be backed up with well-defined policies, standards and procedures. This helps:
- Ensure activities are aligned with Incident Management Team (IMT) mission
- Set correct expectations -> กำหนดเป้าหมายได้ตรง
- Provide guidance on operational needs
- Maintain consistency and reliability of services
- Clearly understand roles and responsibilities
- Set requirements for identified alternates for all important functions -> resource of requirement

Incident Response Technology Concepts
IRT members should be familiar with:
- Basic Security Principles

IRT members must understand the impact to organizational system, including:
- Security vulnerabilities/weaknesses
- Internet
- Operating system (s)
- Malicious code
- Programming skills

Personnel
Composition of IMT:
- Information Security Manager
- Steering Committee/Advisory Board
- Perm/Dedicated Team Members
- Virtual/Temp Team Members

Team organizational types: (ORG syles)
- Centralizaed IRT
- Distributed IRT
- Coordinating IRT
- Outsourced IRT

Awareness and Education
Incident response training must include the following target groups:
- End users
- Management
- IMT team
- General IT team -> ระบบ custody

Detailed Plan of Action for Incident Management
- The incident management action plan is also known as the incident response plan (IRP).
- There are a number of approaches to developing the IRP.
- In the CMU/SEI technical report titled Defining Incident Management Processes, the approach is as follows:
1. Prepare/improve/sustain
2. Protect infrastructure
3. Detect events
4. Triage events (priority)
5. Respond

Developing an Incident Response Plan
CIAC (and later the SANS Institute) propose the following incident response phases:
1. Preparation
2. Identification
3. Containment
4. Eradication
5. Recovery
6. Lessons learned

1. Preparation
- This phase prepares an organization to develop an incident response plan prior to an incident. Sufficient preparation facilitates smooth execution.
- Activities in this phase include:
   o Establishing an approach to handle incidents
   o Establishing policy and warning banners in information system to deter intruders and allow information collection.
   o Establishing communication plan to stakeholders.
   o Developing criteria on when to report incident to authorities.
   o Developing a process to activate the incident management team.
   o Establishing a secure location to execute the incident response plan.
   o Ensuring equipment needed is available.

2. Identification
- This phase aims to verify if an incident has happened and find out more details about the incident. Reports on possible incidents may come from information systems, end users or other organizations.
Not all reports are valid incidents, as they may be false alarms or may not qualify as an incident.
- Activities in this phase include:
   o Assigning ownership of an incident or potential incident to an incident handler.
   o Verifying that report or events qualify as an incident.
   o Establishing chain of custody during identification when handling potential evidence.
   o Determining the severity of an incident and escalating it as necessary.

3. Containment
- After an incident has been identified and confirmed, the IMT is activated and information from the incident handler is shared.
- The team will conduct a detailed assessment and contact the system owner or business manager of the affected information systems/assets to coordinate further action.
- The action taken in this phase is to limit the exposure. Activities in this phase include:
   o Activating the incident management/response team to contain the incident.
   o Notifying appropriate stakeholders affected by the incident.
   o Obtaining agreement on actions taken that may affect availability of a service or risks of the containment process.
   o Getting the IT representative and relevant virtual team members involved to implement containment procedures.
   o Obtaining and preserving evidence.
   o Documenting and taking backups of actions from this phase onward.
   o Controlling and managing communication to the public by the public relations team.

4. Eradication
- When containment measures have been deployed, it is time to determine the root cause of the incident and eradicate it.
- Eradication can be done in a number of ways:
   o restoring backups to achieve a clean state of the system,
   o removing the root cause
   o improving defenses
   o performing vulnerability analysis to find further potential damage from the same root cause.
- Activities in this phase include:
   o Determining the signs and cause of incidents
   o Locating the most recent version of backups or alternative solutions
   o Removing the root cause. In the event of worm or virus infection, it can be removed by deploying appropriate patches and updated antivirus software.
   o Improving defenses by implementing protection techniques
   o Performing vulnerability analysis to find new vulnerabilities introduced by the root cause

5. Recovery
- This phase ensure that affected systems or services are restored to a condition specified in the service delivery objectives (SDO - ระยะเวลาที่เปลี่ยนไปใช้ระบบสำรอง) or business continuity plan (BCP - ระยะเวลากู้คืนระบบ). The time constraint up to this phase is documented in the RTO.
- Activities in this phase include:
   o Restoring operations to normal
   o Validating that actions taken on restored systems where successful
   o Getting involvement of system owners to test the system
   o Facilitating system owners to declare normal operation

6. Lessons learned
- At the end of the incident response process, a report should be developed to share what has happened, what measures were taken and the results after the plan was executed.
- The report should contain lesson learned that provide the IMT and other stakeholders valuable learning points of what could have been done better.
- These lessons should be developed into a plan to enhance the incident management capability and the documentation of the incident response plan. Activities in this phase include:
   o Writing the incident report
   o Analyzing issues encountered during incident responses efforts
   o Proposing improvement based on issues encountered
   o Presenting the report to relevant stakeholders

Gap Analysis - Basis for an Incident Response Plan
- Gap analysis - compares current incident response capabilities with the desired level.
- By comparing the two levels, the following may be identified:
   o Processes that need to be improved to be more efficient and effective
   o Resource needed to achieve the objectives for the incident response capability.

Business Impact Assessment
- A BIA should:
   o Determine the loss to the organization resulting from a function being unavailable
   o Establish the escalation of that loss over time
   o Identify the minimum resources needed for recovery
   o Prioritize the recovery of processes and supporting systems
- Create report to aide stakeholders in understanding what impact an incident would have on the business.
- A successful BIA requires participation from:
   o Senior management  -> approved
   o IT  -> custodian
   o End-user personnel  -> owner

Incident Management and Response Teams
Number of teams depends upon size of organization and magnitude of operations - examples include:
- The emergency action team  -> เข้าถึงจุดเกิดเหตุ
- Damage assessment team -> ประเมิน
- Emergency management team -> สั่งการ
- Relocation team  -> ย้าย Site
- Security team  -> ทีม security

Recovery Site
Types of offsite backup hardware facilities available include:
- Hot sites  -> มีระบบสำคัญ
- Warm sites  -> มีอุปกรณ์สำคัญ
- Cold sites  -> ห้องเปล่า
- Mobile sites -> รถ truck
- Duplicate sites -> เหมือน site หลัก
- Mirror sites -> ทำคู่ขนานกับระบบหลัก

Basis for Recovery Site Selections
Response and recovery strategy should be based on the following considerations:
- Interruption window -> Gap
- RTOs -> ระบบ
- RPOs -> Data
- Services delivery objectives (SDOs) -> ระยะสลับไปใช้ Alternative sites
- Maximum tolerable outages (MTOs) -> ระยะที่ Alternative sites สามารถใช้งานได้นานที่สุด
- Proximity factors -> สิ่งที่เกิดขึ้นคล้ายๆกัน ในพื้นที่แถบเดียวกัน
- Location -> ระยะห่างระหว่างสถานที่ๆ เกิดเหตุ กับ |Alternative sites
- Nature of probable disruptions -> ธรรมชาติของเหตุ เช่นระยะเวลาเกิดเหตุจะนานกี่ชั่วโมง

Reciprocal Agreements
Alternatives available for securing backup hardware and physical facilities include:
- A vendor or third party
- Off-the-shelf -- to make use of this approach, several strategies must be employed:
   o Avoiding the use of unusual and hard-to-get equipment
   o Regularly updating equipment to keep current
   o Maintaining software compatibility to permit the operation of newer equipment

Impact Analysis with Incident Response
The ISM needs to:
- Oversee the development of response and recovery plans* to ensure that they are properly designed and implemented.
- Ensure resources required to continue the business are identified and recorded.
- Identify and validate response and recovery strategies.
- Obtain senior management approval of strategies.
- Oversee the development of comprehensive response and recovery plans.

High-Availability Considerations
Plan must also address fault tolerant systems:
- Fail safe servers using clusters or load balancing.
- Redundant Array of Inexpensive Disks (RAID)

Types of Tests
Tests that are progressively more challenging can include:
- Table-top walk-through of the plans
- Table-top walk-through with mock disaster scenarios
- Testing the infrastructure and communication components of the recovery plan
- Testing the infrastructure and recovery of the critical
- applications
- Testing the infrastructure, critical applications and involvement of the end users
- Full restoration and recovery tests with some personnel unfamiliar with the systems
- Surprise tests

==============================================================
Practice Question 4-1
The PRIMARY goal of a postincident review is to:
   a. gather evidence for subsequent legal action.
   b. identify individuals who failed to take appropriate action.
   c. prepare a report on the incident for management.
   d. derive ways to improve the response process.

Practice Question 4-2
Which of the following is the MOST appropriate quality that an incident handler should possess?
   a. Presentation skill for management report
   b. Ability to follow policy and procedures
   c. Integrity
   d. Ability to cope with stress

Practice Question 4-3
What is the PRIMARY reason for conducting triage?
   a. Limited resources in incident handling
   b. As a part of the mandatory process in incident handling
   c. To mitigate an incident
   d. To detect an incident

Practice Question 4-4
Which of the following is MOST important when deciding whether to build an alternate facility or subscribe to a hot site operated by a third party?
   a. Cost to rebuild information processing facilities
   b. Incremental daily cost of losing different systems
   c. Location and cost of commercial recovery facilities
   d. Estimated annualized loss expectancy (ALE) from key risks

Practice Question 4-5
Which of the following documents should be contained in a computer incident response team (CIRT) manual?
   a. Risk assessment
   b. Severity criteria
   c. Employee phone directory
   d. Table of all backup files

Practice Question 4-6
Which of the following types of insurance coverage would protect an organization against dishonest or fraudulent behavior by its own employees? (ความไม่ซื้อสัตย์ของพนักงาน)
   a. Fidelity
   b. Business interruption
   c. Valuable papers and records
   d. Business continuity

Practice Question 4-7
Which of the following practices would BEST ensure the adequacy of a disaster recovery plan?
   a. Regular reviews of recovery plan information
   b. Table top walk-through of disaster recovery plans
   c. Regular recovery exercises using expert personnel
   d. Regular audits of disaster recovery facilities

Practice Question 4-8
Which of the following procedures would provide the BEST protection if an intruder or malicious program has gained superuser (e.g., root) access to a system?
   a. Prevent the system administrator(s) from accessing the system until it can be shown that they were not he accackers.
   b. Inspect the system and intrusion detection output to identify all changes and then undo them.
   c. Rebuild the system using original media.
   d. Change all passwords then resume normal operations.

Practice Question 4-9
Which of the following is likely to be the MOST significant challenge when developing an incident management plan?
   a. Plan does not align with organizational goals
   b. Inplementation of log centralization, correlation and event tracking
   c. Development of incident metrics
   d. Lack of management support and organizational consensus

Practice Question 4-10
If a forensics copy of a hard drive is needed, the copied data is MOST defensible from a legal standpoint if which of the following is used?
   a. A compressed copy of all contents of the hard drive
   b. A copy that includes all files and directories
   c. A bit-by-bit copy of all data
   d. An encrypted copy of all contents of the hard drive

Thursday, April 21, 2016

ISACA CISM Sample Examination 2015

ISACA CISM Sample Examination
Exam Questions by Domain Area
Reference to: daypo.net ----------- Simulado CISM

Domain 1 - Information Security Governance (24%)

1. Which of the following requirements would have the lowest level of priority in information security?
   a. Technical
   b. Regulatory
   c. Privacy
   d. Business

Information security priorities may, at times, override technical specifications, which then must be rewritten to conform to minimum security standards. Regulatory and privacy requirements are government-mandated and, therefore, not subject to override. The needs of the business should alwares take precedence in deciding information security priorities.
-----

2. The PRIMARY goal in developing an information security strategy is to:
   a. establish security metrics and performance monitoring.
   b. educate business process owners regarding their duties.
   c. ensure that legal and regulatory requirements are met.
   d. support the business objectives of the organization.

The business objectives of the organization supersede all other factors. Establishing metrics and measuring performance, meeting legal and regulatory requirements, and educating business process owners are all subordinate to this overall goal.
-----

3. Senior management commitment and support for information security can BEST be enhanced through:
   a. a format security policy sponsored by the chief executive officer (CEO).
   b. regular security awareness training for employees.
   c. periodic review of alignment with business management goals.
   d. senior management sign-off on the information security strategy.

Ensuring that security activities continue to be aligned and support business goals is critical to obtaining their support. Although having the chief executive officer (CEO) sign-off on the security policy and senior management sign-off on the security strategy makes for good visibility and demonstrates good tone at the top, it is a one-time discrete event that may be quickly forgotten by senior management. Security awareness training for employees will not have as much effect on senior management commitment.
-----

4. Which of the following MOST commonly falls within the scope of an information security governance steering committee?
   a. Interviewing candidates for information security specialist positions.
   b. Developing content for security awareness programs.
   c. Prioritizing information security initiatives.
   d. Approving access to critical financial systems.

Prioritizing information security initiatives is the only appropriate item. the interviewing of specialists should be performed by the information security manager, while the developing of program content should be performed by the information security staff. Approving access to critical financial systems is the responsibility of individual system data owners.
-----

5. Which of the following is the MOST important factor when designing information security architecture?
   a. Technical platform interfaces.
   b. Scalability of the network.
   c. Development methodologies.
   d. Stakeholder requirements.

The most important factor for information security is that it advances the interests of the business, as defined by stakeholder requirements. Interoperability and scalability, as well as development methodologies, are all important but are without merit if a technologically-elegant solution is achieved that does not meet the needs of the business.
-----

6. What will have the HIGHEST impact on standard information security governance models?
   a. Number of employees.
   b. Distance between physical locations.
   c. Complexity of organizations structure.
   d. Organizational budget.

Information security governance models are highly dependent on the overall organizational structure. Some of the elements that impact organizational structure are multiple missions and functions across the organization, leadership and lines of communication. Number of employees and distance between physical locations have less impact on information security governance models since well-defined process, technology and people components intermingle to provide the proper governance. Organizational budget is not a major impact once good governance models are in place, hence governance will help in effective management of the organization's budget.
-----

7. In order to highlight to management the importance of integrating information security in the business processes, a newly hired information security officer should FIRST:
   a. prepare a security budget.
   b. conduct a risk assessment.
   c. develop an information security policy.
   d. obtain benchmarking information.

Risk assessment, evaluation and impact analysis will be the starting point for driving management's attention to information security. All other choices will follow the risk assessment.
-----

8. An outcome of effective security governance is:
   a. business dependency assessment.
   b. risk assessment.
   c. strategic alignment.
   d. planning.

Business dependency assessment is a process of determining the dependency of a business on certain information resources. It is not an outcome or a product of effective security management. Strategic alignment is an outcome of effective security governance. When there is good governance, there is likely to be strategic alignment. Risk assessment is not an outcome of effective security governance; it is a process. Planning comes at the beginning of effective security governance, and is not an outcome but a process.
-----

9. How would an information security manager balance the potentially conflicting requirements of an international organization's security standards and local regulation?
   a. Give organization standards preference over local regulations.
   b. Follow local regulations only.
   c. Make the organization aware of those standards where local regulations causes conflicts.
   d. Negotiate a local version of the organization standards.

Adherenace to local regulations must always be the priority. Not following local regulations can prove detrimental to the group organization. Following local regulations only is incorrect since there needs to be some recognition of organization requirements. Making an organization aware of standards is a sensible step, but is not a total solution. Negotiating a local version of the organization standards is the most effective compromise in this situation.
-----

10. Which of the following should drive the risk analysis for an organization?
   a. Senior management.
   b. Security manager.
   c. Quality manager.
   d. Legal department.

Although senior management should support and sponsor a risk analysis, the know-how and the management of the project will be with the security department. Quality management and the legal department will contribute to the project.
-----

11. In implementing information security governance, the information security manager is PRIMARILY responsible for:
   a. developing the security strategy.
   b. reviewing the security strategy.
   c. communicating the security strategy.
   d. approving the security strategy.

The information security manager is responsible for developing a security strategy based on business objectives with the help of business process owners. Reviewing the security strategy is the responsibility of a steering committee. The information security manager is not necessarily responsible for communicating or approving the security strategy.
-----

12. An information security strategy document that includes specific links to an organization's business activities is PRIMARILY and indicator of:
   a. performance measurement.
   b. integration.
   c. alignment.
   d. value delivery.

Strategic alignment of security with business objectives is a key indicator of performance measurement.In guiding a security program, a meaningful performance measurement will also rely on an understanding of business objectives, which will be an outcome of alignment. Business linkages do not by themselves indicate integration or value delivery. While alignment is an important precondition, it is not as important an indicator.
-----

13. To justify the need to invest in a forensic analysis tool, an information security manager should FIRST:
   a. review the functionalities and implementation requirements of the solution.
   b. review comparison reports of tool implementation in peer companies.
   c. provide examples of situations where such a tool would be useful.
   d. demonstrate that the investment meets organizational needs.

Any investment must be reviewed to determine whether it is cost effective and supports the organizational strategy. It is important to review the features and functionalities provided by such a tool, and to provide examples of situations where the tool would be useful, but that come after sustantiating the investment and return on investment to the organization.
-----

14. The MOST useful way to describe the objectives in the information security strategy is through:
   a. attributes and characteristics of the 'desired state'.
   b. overall control objectives of the security program.
   c. mapping the IT systems to key business processes.
   d. calculation of annual loss expectations.

Security strategy will typically cover a wide variety of issues, processes, technologies and outcomes that can best be described by a set of characteristics and attributes that are desired. Control objectives are developed after strategy and policy development. Mapping IT system to key business processes does not address strategy issues. Calculation of annual loss expectations would not describe the objectives in the information security strategy.
-----

15. Which of the following will have the GREATEST impact on a financial enterprise with offices in various countries are involved in transborder flow of information?
   a. Current and future technologies.
   b. Evolving data protection regulations.
   c. Economizing the costs of network bandwidth.
   d. calculation of annual loss expectations.

Information security laws vary from country to country and an enterprise must be aware of and follow the applicable laws from each country. There are regulations from countries mandating the data security requirements, and these generally should be followed wherever the data are flowing between the various offices. The other choices would be considered, but will have less impact compared to regulatory requirements.
-----

16. Strategic alignment is PRIMARILY achieved when services provided by the information security department:
   a. closely reflect the requirements of key business stakeholders.
   b. closely reflect the desires of the IT executive team.
   c. reflect the requirements of industry best practices.
   d. are reliable and cost-effective using the latest technologies.

The information security strategic plan should be aligned to the business strategy. Business strategy is the articulation of the desires of the business executive team and the board of directors, who are key stakeholders. IT strategic alignment is achieved when it closely reflects the requirements and desires of these business users. The IT executive team does not necessarily reflect the opinion and requirements of the broader business. Choice C is wrong because industry best practices may not be the right solution for the business. Even if the solution is reliable and cost-effective, if it does not meet the business needs then it is not directed toward business advantage.
-----

17. Who is in the BEST position to implement and monitor a balanced scorecard (BSC) for the information system (IS) security program?
   a. Executive management.
   b. The chief information security officer (CISO)
   c. The director of auditing.
   d. The chief information officer (CIO)

An IT BSC demonstrates IT value, facilitates IT governance, and acts as a decision support tool for IT management. The CISO develops, implements and monitors the performance metrics as part of the information security governance framework. It is the role of executive management to provide support to IS management to implement measures to achieve the security objectives. The director of auditing oversees the execution of various audit plans and provides assurance that controls are implemented and operating effectively to support the objectives. The CIO is responsible for the technology governance of the enterprise.
-----

18. Which of the following is the MOST important factor on which to rely to successfully assign cross-organizational responsibility to integrate an information security program?
   a. The ease of information security technologies.
   b. Open channels of communication.
   c. The roles of different job functions.
   d. Qualified information security professionals in each department.

Job functions across the organization must be taken into consideration before assigning responsibility withing the information security program. The transparency of information security technologies and processes is important at the end-user level to ensure that information security does not reduce the efficiency of exiting work practices, encouraging work-arounds or other actions that render controls ineffective. Open channels of communication are important, but do not necessarily lead to assigning responsibility for information security control to another person. Having qualified information security professionals in each department will not necessarily translate into a willingness to accept information security responsibility.
-----

19. The security responsibility of data custodians in an organization will include:
   a. assuming overall protection of information assets.
   b. determining data classification levels.
   c. implementing security controls in products they install.
   d. ensuring security measures are consistent with policy.

Security responsibilities of data custodians within an organization include ensuring that appropriate security measures are maintained and are consistent with organizational policy. Executive management holds overall responsibility for protection of the information assets. Data owners determine data classification levels for information assets so that so that appropriate levels of controls can be provided to meet the requirement relating to confidentiality, integrity and availability. Implementation of information security in products is the responsibility of the IT developers.
-----

20. Who can BEST approve plans to implement an information security governance framework?
   a. Internal auditor.
   b. Information security management.
   c. Steering committee.
   d. Infrastructure management.

Senior management that is part of the security steering committee is in the best position to approve plans to implement an information security governance framework. An internal auditor is secondary to the authority and influence of senior management. Information security management should not have the authority to approve the security governance framework. Infrastructure management will not be in the best position since it focuses more on the technologies than on the business.
-----

21. An organization that has decided to implement a formal information security program should FIRST:
   a. invite an external consultant to create the security strategy.
   b. allocate budget based on best practices.
   c. benchmark similar organizations.
   d. define high-level business security requirements.

All four choices are valid steps in the process of implementing a formal information security program; however, defining high-level business security requirements should precede the others because the implementation should be based on those security requirements.
-----

22. Which of the following is a key area of the ISO 27001 framework?
   a. Operational risk assessment.
   b. Financial crime metrics.
   c. Capacity management.
   d. Business continuity management.

Operational risk assessment, financial crime metrics and capacity management can complement the information security framework, but only business continuity management is a key component.
-----

23. The MAIN goal of an information security strategic plan is to:
   a. develop a risk assessment plan.
   b. develop a data protection plan.
   c. protect information assets and resources.
   d. establish security governance.

The main goal of an information security strategic plan is to protect information assets and resources. Developing a risk assessment plan and a data protection plan, and establishing security governance refer to tools utilized in the security strategic plan that achieve the protection of information assets and resources.
-----

24. Information security policies should:
   a. address corporate network vulnerabilities.
   b. address the process for communicating a violation.
   c. be straightforward and easy to understand.
   d. be customized to specific groups and roles.

As high-level statements, information security policies should be straightforward and easy to understand. They are high-level and therefore, do not address network vulnerabilities directly or the process for communicating a violation. As policies, they should provide a uniform message to all groups and user roles.
-----



Domain 2 - Information Risk Management and Compliance (33%)

25. Attackers who exploit cross-site scripting vulnerabilities take advantage of:
   a. a lack of proper input validation controls.
   b. weak authentication controls in the web application layer.
   c. flawed cryptographic secure sockets layer (SSL) implementations and short key lengths.
   d. implicit web application trust relationships.

Cross-site scripting attacks inject malformed input. Attackers who exploit weak application authentication controls can gain unauthorized access to applications and this has little to do with cross-site scripting vulnerabilities. Attackers who exploit flowed cryptographic security sockets layer (SSL) implementations and short key lengths can sniff network traffic and crack keys to gain unauthorized access to information. This has little to do with cross-site scripting vulnerabilities. Web application trust relationships do not relate directly to the attack.
-----

26. Which of the following would BEST address the risk of data leakage?
   a. File backup procedures.
   b. Database integrity checks.
   c. Acceptable use policies.
   d. Incident response procedures.

Acceptable use policies are the best measure for preventing  the unauthorized disclosure of confidential information. The other choices do not address confidentiality of information.
-----

27. A company recently developed a breakthrough technology. Since this technology could give this company a significant competitive edge, which of the following would FIRST govern how this information is to be protected?
   a. Access control policy
   b. Data classification policy
   c. Encryption standards.
   d. Acceptable use policy.

Data classification policies define the level of protection to be provided for each category of data. Without this mandated ranking of degree of protection, it is difficult to determine what access controls or levels of encryption should be in place. An acceptable use policy is oriented more toward the end user and, therefore, would not specifically address what controls should be in place to adequately protect information.
-----

28. What is the BEST technique to determine which security controls to implement with a limited budget?
   a. Risk analysis
   b. Annualized loss expectancy (ALE) calculations.
   c. Cost-benefit analysis
   d. Impact analysis

Cost-benefit analysis is performed to ensure that the cost of a safeguard does not outweigh it's benefit and that the best safeguard is provided for the cost of implementation. Risk analysis identifies the risks and suggests appropriate mitigation. The annualized loss expectancy (ALE) is subset of a cost-benefit analysis. Impact analysis would indicate how much could be lost if a specific threat occurred.
-----

29. A company's mail server allows anonymous file transfer protocol (FTP) access which could be exploited. What process should the information security manager deploy to determine the necessity for remedial action?
   a. A penetration test
   b. A security baseline review
   c. A risk assessment
   d. A business impact analysis (BIA)

A risk assessment will identify the business impact of such  vulnerability being exploited and is, thus, the correct process. A penetration test or a security baseline review may identify the vulnerability but not the remedy. A business impact analysis (BIA) will more likely identify the impact of the loss of the mail server.
-----

30. Which of the following measures would be MOST effective against insider threats to confidential information?
   a. Role-based access control
   b. Audit trail monitoring
   c. Privacy policy
   d. Defense-in-depth

Role-based access control provides access according to business needs; therefore, it reduces unnecessary access rights and enforces accountability. Audit trail monitoring is a detective control, which is 'after the fact.'. Privacy policy is not relevant to this risk. Defense-in-depth primarily focuses on external threats.
-----

31. Which of the following is the MAIN reason for performing risk assessment on a continuous basis?
   a. Justification of the security budget must be continually made.
   b. New vulnerabilities are discovered every day.
   c. The risk environment is constantly changing.
   d. Management needs to be continually informed about emerging risks.

The risk environment is impacted by factors such as changes in technology, and business strategy. These changes introduce new threats and vulnerabilities to the organization. As a result, risk assessment should be performed continuously. Justification of a budget should never be the main reason for performing a risk assessment. New vulnerabilities should be managed through a patch management process. Informing management about emerging risks is important, but is not the main driver for determining when a risk assessment should be performed.
-----

32. There is a time lag between the time when a security vulnerability is first published, and the time when a patch is delivered. Which of the following should be carried out FIRST to mitigate the risk during this time period?
   a. Identify the vulnerable systems and apply compensating controls.
   b. Minimize the use of vulnerable systems.
   c. Communicate the vulnerability to system users.
   d. Update the signatures database of the intrusion detection system (IDS)

The best protection is to identify the vulnerable systems and apply compensating controls until a patch is installed. Minimizing the use of vulnerable systems and communicating the vulnerability to system users could be compensating controls but would not be the first course of action. Choice D does not make clear the timing of when the intrusion detection system (IDS) signature list would be updated to accommodate the vulnerabilities that are not yet publicly known. Therefore, this approach should not always be considered as the first option.
-----

33. Which of the following security activities should be implemented in the change management process to identify key vulnerabilities introduced by changes?
   a. Business impact analysis (BIA)
   b. Penetration testing
   c. Audit and review
   d. Threat analysis

Penetration testing focuses on identifying vulnerabilities. None of the other choices would identify vulnerabilities introduced by changes.
-----

34. Which of the following techniques MOST clearly indicates whether specific risk-reduction controls should be implemented?
   a. Cost-benefit analysis
   b. Penetration testing
   c. Frequent risk assessment programs
   d. Annual loss expectancy (ALE) calculation

In a cost-benefit analysis, the annual cost of safeguards is compared with the expected cost of loss. This can then be used to justify a specific control measure. Penetration testing may indicate the extent of a weakness but, by itself, will not establish the cost/benefit of a control. Frequent risk assessment programs will certainly establish what risk exists but will not determine the maximum cost of controls. Annual loss expectancy (ALE) is a measure which will contribute to the value of the risk but, along, will not justify a control.
-----

35. An organization has decided to implement additional security controls to treat the risks of a new process. This is an example of:
   a. eliminating the risk.
   b. transferring the risk.
   c. mitigating the risk.
   d. accepting the risk.

Risk can never be eliminated entirely. Transferring the risk gives it away such as buying insurance so the insurance company can take the risk. Implementing additional controls is an example of mitigating risk. Doing nothing to mitigate the risk would be an example of accepting risk.
-----

36. Which of the following roles is PRIMARILY responsible for determining the information classification levels for a given information asset?
   a. Manager
   b. Custodian
   c. User
   d. Owner

Although the information owner may be in a management position and is also considered a user, the information owner role has the responsibility for determining information information classification levels. Management is responsible for higher-level issues such as providing and approving budget, supporting activities, etc. The information custodian is responsible for day-today security  tasks such as protecting information, backing up information, etc. Users are the lowest level. They use the data. The owner classifies the data.
-----

37. The PRIMARY reason for assigning classes of sensitivity and criticality to information resource is to provide a basis for:
   a. determining the scope for inclusion in an information security program.
   b. defining the level of access controls.
   c. justifying costs for information resources.
   d. determining the overall budget of an information security program.

The assigned class of sensitivity and criticality of the information resource determines the level of access controls to be put in place. The assignment of sensitivity and criticality takes place with the information assets that have already been included in the information security program and has only an indirect bearing on the costs to be incurred. The assignment of sensitivity and criticality contributes to, but does not decide, the overall budget of the information security program.
-----

38. An organization is already certified to an international security standard. Which mechanism would BEST help to further align the organization with other data security regulatory requirements as per new business needs?
   a. Key performance indicators (KPIs)
   b. Business impact analysis (BIA)
   c. Gap analysis
   d. Technical vulnerability assessment

Gap analysis would help identify the actual gaps between the desired state and the current implementation of information security management. BIA is primarily used for business continuity planning. Technical vulnerability assessment is used for detailed assessment of technical controls, which would come later in the process and would not provide complete information in order to identify gaps.
-----

39. When performing a qualitative risk analysis, which of the following will BEST produce reliable results?
   a. Estimated productivity losses
   b. Possible scenarios with threats and impacts
   c. Value of information assets
   d. Vulnerability assessment

Listing all possible scenarios that could occur, along with threats and impacts, will better frame the range of risks and facilitate a more informed discussion and decision. Estimated productivity losses, value of information assets and vulnerability assessments would not be sufficient on their own.
-----

40. Which of the following is the BEST method to ensure the overall effectiveness of a risk management program?
   a. User assessments of changes
   b. Comparison of the program results with industry standards.
   c. Assignment of risk within the organization
   d. Participation by all members of the organization

Effective risk management requires participation, support and acceptance by all applicable members of the organization, beginning with the executive levels. Personnel must understand their responsibilities and be trained on how to fulfill their roles.
-----

41. The MOST effective use of a risk register is to:
   a. identify risks and assign roles and responsibilities for mitigation.
   b. identify threats and probabilities.
   c. facilitate a thorough review of all IT-related risks on a periodic basis.
   d. record the annualized financial amount of expected losses due to risks.

A risk register is more than a simple list--it should be used as a tool to ensure comprehensive documentation, periodic review and formal update of all risk elements in the enterprise's IT and related organization. Identifying risk and assigning roles and responsibilities for mitigation are elements of the register. Identifying threats and probabilities are two elements that are defined in the risk matrix, as differentiated from the broader scope of content in, and purpose for, the risk register. While the annualized loss expectancy (ALE) should be included in the register, this quantification is only a single element in the overall risk analysis program.
-----

42. logging is an example of which type of defense against systems compromise?
   a. Containment
   b. Detection
   c. Reaction
   d. Recovery

Detection defenses include logging as well as monitoring, measuring, auditing, detecting viruses and intrusion. Examples of containment defenses are awareness, training and physical security defenses. Examples of reaction defenses are incident response, policy and procedure change, and control enhancement. Examples of recovery defenses are backups and restorations, failover and remote sites, and business continuity plans and disaster recovery plans.
-----

43. Which of the following is the MOST implement to keep in mind when assessing the value of information?
   a. The potential financial loss
   b. The cost of recreating the information
   c. The cost of insurance coverage
   d. Regulatory requirement

The potential for financial loss is always a key factor when assessing the value of information. Choices B, C and D may be contributors, but not the key factor.
-----

44. When a proposed system change violates an existing security standard, the conflict would be BEST resolved by:
   a. calculating the risk
   b. enforcing the security standard.
   c. redesigning the system change.
   d. implementing mitigating controls.

Decisions regarding security should always weigh the potential loss from a risk against the existing controls. Each situation is unique; therefore, it is not advisable to always decide in favor of enforcing a standard. Redesigning the proposed change might not always be the best option because it might not meet the business needs. Implementing additional controls might be an option, but this would be done after the risk is known.
-----

45. The information classification scheme should:
   a. consider possible impact of a security breach.
   b. classify personal information in electronic form.
   c. be performed by the information security manager.
   d. classify systems according to the data processed.

Data classification is determined by the business risk, i.e., the potential impact on the business of the loss, corruption or disclosure of information.It must be applied to information in all forms, both electronic and physical (paper), and should be applied by the data owner, not the security manager. Choice B is an incomplete answer because it addresses only privacy issues, while choice A is a more complete response. Systems are not classified per se, but the dta they process and store should definitely by classified.
-----

46. Which of the following is the BEST method to provide a new user with their initial password for e-mail system access?
   a. interoffice a system-generated complex password with 30 days expiration.
   b. Provide a temporary password over the telephone set for immediate expiration.
   c. Require no password but force the user to set their own in 10 days.
   d. Set initial password equal to the user ID with expiration in 30 days.

Documenting the password on paper is not the best method even if sent through interoffice mail--if the password is complex and difficult to memorize, the user will likely keep the printed password and this creates a security concern. A temporary password that will need to be changed upon first logon is the best method because it is reset immediately and replaced with the user's choice of password, which will make it easier for the user to remember. If it is given to the wrong person, the legitimate user will likely notify security if still unable to access the system, so the security risk is low. Setting an account with no initial password is a security concern even if it is just for a few days. Choice D provides the greatest security threat because user IDs are typically known by both users and security staff, thus compromising access for up to 30 days.
-----

47. An operating system (OS) noncritical patch to enhance system security cannot be applied because a critical application is not compatible with the change. Which of the following is the BEST solution?
   a. Rewrite the application to conform to the upgrade operating system.
   b. Compensate for not installing the patch with mitigating controls.
   c. Alter the patch to allow the application to run in a privileged state.
   d. Run the application on a test platform; turn production to allow patch and application.

Since the operating system (OS) patch will adversely impact a critical application, a mitigating control should be identified that will provide an equivalent level of security. Since the application is critical, the patch should not be applied without regard for the application; business requirements must be considered. Altering the OS patch to allow the application to run in a privileged state may create new security weaknesses. Finally, running a production application on a test platform is not an acceptable alternative since it will mean running a critical production application on a platform not subject to the same level of security controls.
-----

48. Primary direction on the impact o compliance with new regulatory requirements that may lead to major application system changes should be obtained form the:
   a. corporate internal auditor.
   b. system developers/analysis.
   c. key business process owners.
   d. corporate legal counsel.

Business process owners are in the best position to understand how new regulatory requirements may affect their systems. legal counsel and infrastructure management, as well as internal auditors, would not be in as good a position to fully understand all ramifications.
-----

49. The IT function has declared that, when putting a new application into production, it is not necessary to update the business impact analysis (BIA) because it does not produce modifications in the business processes. The information security manager should:
   a. verify the decision with the business units.
   b. check the system's risk analysis.
   c. recommend update after postimplementation review.
   d. request an audit review.

Verifying the decision with the business units is the correct answer because it is not the IT function's responsibility to decide whether a new application modifies business processes Choice B does not consider the change in the applications. Chooices C and D delay the update.
-----

50. An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. The vulnerability identified is:
   a. broken authentication
   b. unvalidated input
   c. cross-site scripting
   d. structured query language (SQL) injection

the authentication process is broken because, although the session is valid, the application should reauthenticate when the input parameters are changed. The review provided valid employee IDs, and valid input was processed. The problem here is the lack of reauthentication when the input parameters are changed. Cross-site scripting is not the problem in this case since the attack is not transferred to any other user's browser to obtain the output. Structured query language (SQL) injection is not a problem since input is provided as a valid employee ID and no SQL queries are injected to provide the output.
-----

51. What is the MOST cost-effective method of identifying new vendor vulnerabilities?
   a. External vulnerability reporting sources
   b. Periodic vulnerability assessments performed by consultants
   c. Intrusion prevention software
   d. Honeypots located in the DMZ

External vulnerability source are going to be the most cost-effective method of identifying these vulnerabilities. The cost involved in choices B and C would be much higher, especially if performed at regular intervals. Honeypots would not identify all vendor vulnerabilities. In addition, honeypots located in the DMZ can create a security risk if the production network is not well protected from traffic from compromised honeypots.
-----

52. Of the following, retention of business records should be PRIMARILY based on:
   a. periodic vulnerability assessment.
   b. regulatory and legal requirements.
   c. device storage capacity and longevity.
   d. past litigation.

Retention of business records is a business requirement that must consider regulatory and legal requirements based on geographic location and industry. Choices A and C are important elements for making the decision, but the primary driver is the legal and regulatory requirements that need to be followed by all companies. Record retention may take into consideration past litigation, but it should not be the primary decision factor.
-----

53. Which is the BEST way to measure and prioritize aggregate risk deriving from a chain of linked system vulnerabilities?
   a. Vulnerability scans
   b. Penetration tests
   c. Code reviews
   d. Security audits

A penetration test is normally the only security assessment that can like vulnerabilities together by exploiting them sequentially. This gives a good measurement and prioritization of risks. Other security assessments such as vulnerability scans, code reviews and security audits can help give an extensive and thorough risk and vulnerability overview, but will not be able to test or demonstrate the final consequence of having everal vulnerabilities linked together. Penetration testing can give risk a new perspective and prioritize based on the end result of a sequence of security problems.
-----

54. Determining the nature and extent of activities required in developing or improving an information security program often requires assessing the existing security level of various program components. The BEST process to accomplish this task is to perform a(n):
   a. impact assessment.
   b. vulnerability assessment.
   c. gap analysis
   d. threat assessment.

A gap analysis is used to determine the current state of security for various program components as compared to the desired state. Once the gaps have been determined, action items to improve various aspects of the program should be prioritized using a risk-based approach. An impact assessment is used to determine potential impact in the event of loss of a resource. Vulnerability is only one aspect to be considered in a security review. A threat assessment would not normally be a part of a security review.
-----

55. The design and implementation of controls and countermeasures must be PRIMARILY focused on:
   a. eliminating IT risk.
   b. cost-benefit balance
   c. resource management
   d. the number of assets protected

The balance between cost and benefits should direct controls selection. The focus must include procedural, operational and other risks, in addition to IT risk. Resource management is not directly related to controls. The implementation of controls is based on the impact and risk, not on the number of assets.
-----

56. The PRIMARY purpose of performing an internal attack and penetration test is to identify:
   a. weaknesses in network and server security.
   b. ways to improve the incident response process.
   c. potential attack vectors on the network perimeter.
   d. the optimum response to internal hacker attacks.

An internal attack and penetration test are designed to identify weaknesses in network and server security. They do not focus as much on incident response or the network perimeter.
-----

57. An organization has learned of a security breach at another company that utilizes similar technology. The FIRST thing the information security manager should do is:
   a. assess the likelihood of incidents from the reported cause.
   b. discontinue the use of the vulnerable technology.
   c. report to senior management that the organization is not affected.
   d. remind staff that no similar security breaches have taken place.

The security manager should first assess the likelihood of a similar incident occurring, based on available information. Discontinuing the use of the vulnerable technology would not necessarily be practical since it would likely be needed to support the business. Reporting to senior management that the organization is not affected due to controls already in place would be premature until the information security manager can first assess the impact of the incident. Until this has been researched, it is not certain that no similar security breaches have taken place.
-----



Domain 3 - Information Security Program Development and Management (25%)

58. An intrusion detection system should be placed:
   a. outside the firewall
   b. on the firewall server
   c. on a screened subnet
   d. on the external router

An intrusion detection system (IDS) should be placed on a screened subnet, which is a demilitarized zone (DMZ). Placing it on the internet side of the firewall is not advised because the system will generate alerts on all malicious traffic - even though 99 percent will be stopped by the firewall and never reach the internal network. The same would be true of placing it on the external router, if such a thing were feasible. Since firewalls should be installed on hardened servers with minimal services enabled, it would be inappropriate to install the  IDS on the same physical device.
-----

59. The BEST reason for an organization to have two discrete firewalls connected directly to the internet and to the same DMZ would be to:
   a. provide in-depth defense
   b. separate test and production
   c. permit traffic load balancing
   d. prevent a denial-of-service attack

Having two entry points, each guarded by a separate firewall, is desirable to permit traffic load balancing. As they both connect ot the  internet and to the same demilitarized zone (DMZ), such as arrangement is not practical for separating test from production or preventing a denial-of-service attack.
-----

60. An extranet server should be placed:
   a. outside the firewall
   b. on the firewall server
   c. on a screened subnet
   d. on the external router

An external server should be placed on a screened subnet, which is a demilitarized zone (DMZ). Placing it on the internet side of the firewall would leave it defenseless. The same would be true of placing it on the external router, although this would not be possible. Since firewalls should be installed on hardened servers with minimal services enabled, it would be inappropriate to store the extranet on the same physical device.
-----

61. Which of the following is the BEST metric for evaluating the effectiveness of security awareness training? The number of:
   a. password resets
   b. reported incidents
   c. incidents resolved
   d. access rule violations

Reported incidents will provide an indicator of the awareness level of staff. An increase in reported incidents could indicate that the staff is paying more attention to security. Password resets and access rule violations may or may not have anything to do with awareness levels. The number of incidents resolved may not correlate to staff awareness.
-----

62. Security monitoring mechanisms should PRIMARILY:
   a. focus on business-critical information
   b. assist owners to manage control risks
   c. focus on detecting network intrusions
   d. record all security violations

Security monitoring must focus on business-critical information to remain effectively usable by and credible to business users. Control risk is the possibility that controls would not detect an incident or error condition, and therefore is not a correct answer because monitoring would not directly assist in managing this risk. Network intrusions are not the only focus of monitoring mechanisms; although they should record all security violations, this is not the primary objective.
-----

63. When contracting with an outsourcer to provide security administration, the MOST improtant contractual element is the:
   a. right-to-terminate clause
   b. limitations of liability
   c. service level agreement (SLA)
   d. financial penalties clause

Service level agreements (SLAs) provide metrics to which outsourcing firms can be held accountable. This is more important than a limitation  on the outsourcing firm's liability, a right-to-terminate clause or a hold-harmless agreement which involves liabilities to third parties.
-----

64. Which of the following is the BEST metric for evaluating the effectiveness of an intrusion detection mechanism?
   a. Number of attacks detected
   b. Number of successful attacks
   c. Ratio of false positives to false negatives
   d. Ratio of successful to unsuccessful attacks

The ratio of false positives to false negatives will indicate whether an intrusion detection system (IDS) is properly tuned to minimize the number of false alarms while, at the same time, minimizing the number of omissions. The number of attacks detected, successful attacks or the ratio of successful to unsuccessful attacks would not indicate whether the IDS is properly configured.
-----

65. Which of the following is MOST effective in preventing weaknesses from being introduced into existing production systems?
   a. Patch management
   b. Change management
   c. Security baselines
   d. Virus detection

Change management controls the process of introducing changes to systems. This is often the point at which a weakness will be introduced. Patch management involves the correction of software weaknesses and would necessarily follow change management procedures. Security baselines provide minimum recommended settings and do not prevent introduction of control weaknesses. Virus detection is an effective tool but primarily focuses on malicious code from external sources, and only for those applications that are online.
-----

66. Which of the following is MOST effective in preventing security weaknesses in operating systems?
   a. Patch management
   b. Change management
   c. Security baselines
   d. Configuration management

Patch management corrects discovered weaknesses by applying a correction (a patch) to the original program code. Change management controls the process of introducing changes to systems. Security baselines provide minimum recommended settings. Configuration management controls the updates to the production environment.
-----

67. Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information?
   a. Baseline security standards
   b. System access violation logs
   c. Role-based access controls
   d. Exit routines

Role-based access controls help ensure that users only have access to files and systems appropriate for their job role. Violation logs are detective and do not prevent unauthorized access. Baseline security standards do not prevent unauthorized access. Exit routines are dependent upon appropriate role-based access.
-----

68. Which of the following is generally used to ensure that information transmitted over the internet is authentic and actually transmitted by the named sender?
   a. Biometric authentication
   b. Embedded steganographic
   c. Two-factor authentication
   d. Embedded digital signature

Digital signatures ensure that transmitted information can be attributed to the named sender; this provides nonrepudiation. Stenographic techniques are used to hide messages or data within other files. Biometric and two-factor authentication is not generally used to protect internet data transmissions.
-----

69. What is an appropriate frequency for updating operating system (OS) patches on production servers?
   a. During scheduled rollouts of new applications
   b. According to a fixed security patch management schedule
   c. Concurrently with quarterly hardware maintenance
   d. Whenever important security patches are released

Patches should be applied whenever important security updates are released. They should not be delayed to coincide with other scheduled rollouts or maintenance. Due to the possibility of creating a system outage, they should not be deployed during critical periods of application activity such as month-end or quarter-end closing.
-----

70. A border router should be placed on which of the follwing?
   a. Web server
   b. IDS server
   c. Screened subnet
   d. Domain boundary

A border router should be placed on a (security) domain boundary. Placing it on a web server or screened subnet, which is a demilitarized zone (DMZ) would not provide any protection. Border routers are positioned on the boundary of the network, but do not reside on a server.
-----

71. An e-commerce order fulfillment web server should generally be placed on which of the following?
   a. Internal network
   b. Demilitarized Zone (DMZ)
   c. Database server
   d. Domain controller

An e-commerce order fulfillment web server should be placed within a DMZ to protect it and the internal network from external attack. Placing it on the internal network would expose the internal network to  potential attack from the internet. Since a database server should reside on the internal network, the same exposure would exist. Domain controllers would not normally share the same physical device as a web server.
-----

72. Secure customer use of an e-commerce application can BASE be accomplished through:
   a. data encryption
   b. digital signatures
   c. strong passwords
   d. two-factor authentication

Encryption would be the preferred method of ensuring confidentiality in customer communications with an e-commerce application. Strong passwords, by themselves, would not be sufficient since the data could still be intercepted, while two-factor authentication would be impractical. digital signatures would not provide a secure means of communication. In most business-to-customer (B-to-C) web applications, a digital signature is also not a practical solution.
-----

73. What is the BEST defense against a Structured Query Language (SQL) injection attack?
   a. Regularly updated  signature files
   b. A properly configured firewall
   c. An intrusion detection system
   d. Strict controls on input fields

Structured Query language (SQL) injection involves the typing of programming command statements within a data entry field on a web page, usually with the intent of fooling the application into thinking that a valid password has been entered in the password entry field. the best defense against such an attack is to have strict edits on what can be typed into a data input field so that programming commands will be rejected. Code reviews should also be conducted to ensure that such edits are in place and that there are no inherent weaknesses in the way the code is written; software is available to test for such weaknesses. All other choices would fail to prevent such an attack.
-----

74. Which of the following is the MOST important consideration when implementing an intrusion detection system (IDS)?
   a. Tuning
   b. Patching
   c. Encryption
   d. Packet filtering

If an intrusion detection system (IDS) is not properly tuned it will generate an unacceptable number of false positives and/or fail to sound an alarm when an actual attack is underway. Patching is more related to operating system hardening, while encryption and packet filtering would not be as relevant.
-----

75. Which of the following is the MOST important consideration when securing customer credit card data acquired by a point-of-sale (POS) cash register?
   a. Authentication
   b. Hardening
   c. Encryption
   d. Nonrepudiation

Cardholder data should be encrypted using strong encryption techniques. Hardening would be secondary in importance, while nonrepudiation would not be as relevant. Authentication of the point-of-sale (POS) terminal is a previous step to acquiring the card information.
-----

76. Which of the following practices is BEST to remove system access for contractors and other temporary users when it is no longer required?
   a. Log all account usage and send it to their manager
   b. Establish predetermined automatic expiration dates
   c. Require managers to e-mail security when the user leaves
   d. Ensure each individual has signed a security acknowledgement

Predetermined expiration dates are the most effective means of removing systems access for temporary users. Reliance on managers to promptly send in termination notices cannot always be counted on, while requiring each individual to sign a security acknowledgement would have little effect in this case.
-----

77. Which of the following is MOST important for a successful information security program?
   a. Adequate training on emerging security technologies
   b. Open communication with process owners
   c. Adequate policies, standards and procedures
   d. Executive management commitment

Sufficient executive management support is the most important factor for the success of an information security program. Open communication, adequate training, and good policies and procedures, while important, are not as important as support from top management; they will not ensure success if senior management support is not present.
-----

78. When considering the value of assets, which of the following would give the information security manager the MOST objective basis for measurement of value delivery in information security governance?
   a. Number of controls
   b. Cost of achieving control objectives
   c. Effectiveness of controls
   d. Test results of controls

Comparison of cost of achievement of control objectives and corresponding value of assets sought to be protected would provide a sound basis for the information security manager to measure value delivery. Number of controls has no correlation with the value of assets unless the effectiveness of the controls and their cost are also evaluated. Effectiveness of controls has no correlation with the value of assets unless their costs are also evaluated. Test results of controls have no correlation with the value of assets unless the effectiveness of the controls and their cost are also evaluated.
-----

79. Which of the following, using public key cryptography, ensures authentication, confidentiality and nonrepudiation of a message?
   a. Encrypting first by receiver's private key and second by sender's public key
   b. Encrypting first by sender's private key and second by receiver's public key
   c. Encrypting first by sender's private key and second decrypting by sender's public key
   d. Encrypting first by sender's public key and second by receiver's private key

Encrypting by the sender's private key ensures authentication. By being able to decrypt with the sender's public key, the receiver would know that the message is sent by the sender only and the sender cannot deny/repudiate the message. By encrypting with the sender's public key secondly, only the sender will be able to decrypt the message and confidentiality is assured. The receiver's private key is private to the receiver and the sender cannot have it for encryption. Similarly, the receiver will not have the private key of the sender to decrypt the second-level encryption. In the case of encrypting first by the sender's private key and, second, decrypting by the sender's public key, confidentiality is not ensured since the message can be decrypted by anyone using the sender's public key. The receiver's private key would not be available to the sender for second-level encryption. Similarly, the sender's private key would not be available to the receiver for decrypting the message.
-----

80. A test plan to validate the security controls of a new system should be developed during which phase of the project?
   a. Testing
   b. Initiation
   c. Design
   d. Development

In the design phase, security checkpoints are defined and a test plan is developed. The testing phase is too late since the system has already been developed and is in production testing. In the initiation phase, the basic security objective of the project is acknowledged. Development is the coding phase and is too late to consider test plans.
-----

81. The MOST effective way to ensure that outsourced service providers comply with the organization's information security policy would be:
   a. service level monitoring
   b. penetration testing
   c. periodically auditing
   d. security awareness training

Regular audit exercise can spot any gap in the information security compliance. Service level monitoring can only pinpoint operational issues in the organization's operational environment. Penetration testing can identify security vulnerability but cannot ensure information compliance. Training can increase users' awareness on the information security policy, but is not more effective than auditing.
-----

82. In order to protect a network against unauthorized external connections to corporate systems, the information security manager should BEST implement:
   a. a strong authentication
   b. IP antispoofing filtering
   c. network encryption protocol
   d. access list of trusted devices

Strong authentication will provide adequate assurance on the identity of the users, while IP antispoofing is aimed at the device rather than the user. Encryption protocol ensures data confidentiality and authenticity while access lists of trusted devices are easily exploited by spoofed identity of the clients.
-----



Domain 4 - Information Security Incident Management (18%)

83. Which of the following terms and conditions represent a significant deficiency if included in a commercial hot site contract?
   a. A hot site facility will be shared in multiple disaster declarations.
   b. All equipment is provided "at time of disaster, not on floor".
   c. The facility is subject to a "first-come, first-served" policy
   d. Equipment may be substituted with equivalent model

Equipment provided "at time of disaster (ATOD), not on floor" means that the equipment is not available but will be acquired by the commercial hot site provider on a best effort basis. This leaves the customer at the mercy of the marketplace. If equipment is not immediately available, the recovery will be delayed. Many commercial providers do require sharing facilities in cases where there are multiple simultaneous declarations, and that priority may be established on a first-come, first-served basis. It is also common for the provider to substitute equivalent or better equipment, as they are frequently upgrading and changing equipment.
-----

84. Which of the following should be performed FIRST in the aftermath of a denial-of-service attack?
   a. Restore servers from backup media stored offsite.
   b. Conduct an assessment to determine system status
   c. Perform an impact analysis of the outage.
   d. Isolate the screened subnet.

An assessment should be conducted to determine whether any permanent damage occurred and the overall system status. It is not necessary at this point to rebuild any servers. An impact analysis of the outage or isolating the demilitarized zone (DMZ) or screen subnet will not provide any immediate benefit.
-----

85. Which of the following is the MOST important element to ensure the successful recovery of a business during a disaster?
   a. Detailed technical recovery plans are maintained offsite.
   b. Network redundancy is maintained through separate providers.
   c. Hot site equipment needs are recertified on a regular basis
   d. Appropriate declaration criteria have been established.

In a major disaster, staff can be injured or can be prevented from traveling to the hot site, so technical skills and business knowledge can be lost. It is therefore critical to maintain an updated copy of the detailed recovery plan at an offsite location. Continuity of the business requires adequate network redundancy, hot site infrastructure that is certified as compatible and clear criteria for declaring a disaster. Ideally, the business continuity program addresses all of these satisfactorily. However, in a disaster situation, where all these elements are present, but without the detailed technical plan, business recovery will be seriously impaired.
-----

86. The business continuity policy should contain which of the following?
   a. Emergency call trees.
   b. Recovery criteria
   c. Business impact assessment (BIA)
   d. Critical backups inventory

Recovery criteria, indicating the circumstances under which specific actions are undertaken, should be contained within a business continuity policy. Telephone trees, business impact assessments (BIAs) and listings of critical backup files are too detailed to include in a policy document.
-----

87. The PRIMARY purpose of installing an intrusion detection system (IDS) is to identify:
   a. weaknesses in network security.
   b. patterns of suspicious access.
   c. how an attack was launched on the network.
   d. potential attacks on the internal network.

The most important function of an intrusion detection system (IDS) is to identify potential attacks on the network. Identifying how the attack was launched is secondary. It is not designed specifically to identify weaknesses in network security or to identify patterns of suspicious logon attempts.
-----

88. Which of the following would represent a violation of the chain of custody when a backup tape has been identified as evidence in a fraud investigation? the tape was:
   a. removed into the custody of law enforcement investigators.
   b. kept in the tape library pending further analysis.
   c. sealed in a signed envelope and locked in a safe under dual control.
   d. handed over to authorized independent investigators.

Since a number of individuals would have access to the tape library, and could have accessed and tampered with the tape, the chain of custody could not be verified. All other choices provide clear indication of who was in custody of the tape at all times.
-----

89. when properly tested, which of the following would MOST effectively support an information security manager in handling a security breach?
   a. Business continuity plan
   b. Disaster recovery plan
   c. Incident response plan
   d. Vulnerability management plan

An incident response plan documents the step-by-step process to follow, as well as the related roles and responsibilities pertaining to all parties involved in responding to an information security breach. A business continuity plan or disaster recovery plan would be triggered during the execution of the incident response plan in the case of a breach impacting the business continuity. A vulnerability management plan is a procedure to address technical vulnerabilities and mitigate the risk through configuration changes (patch management).
-----

90. Isolation and containment measures for a compromised computer have been taken and information security management is now investigating. What is the MOST appropriate next step?
   a. Run a forensics tool on the machine to gather evidence.
   b. Reboot the machine to break remote connections.
   c. Make a copy of the whole system's memory.
   d. Document current connections and open Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports.

When investigating a security breach, it is important to preserve all traces of evidence left by the invader. For this reason, it is imperative to preserve the memory contents of the machine in order to analyze them later. The machine in order to analyze them later. The correct answer is choice C because a copy of the whole system's memory is obtained for future analysis by running the appropriate tools. This is also important from a legal perspective since an attorney may suggest that the system was changed during the conduct of the investigation. Running a computer forensics tool in the compromised machine will cause the creation of at least one process that may overwrite evidence. Rebooting the machine will delete the contents of the memory, erasing potential evidence. Collecting information about current connections and open Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports is correct, but doing so by using tools may also erase memory contents.
-----

91. The recovery point objective (RPO) requires which of the following?
   a. Disaster declaration
   b. Before-image restoration
   c. System restoration
   d. After-image processing

The recovery point objective (RPO) is the point in the processing flow at which system recovery should occur. This is the predetermined state of the application processing and data used to restore the system and to continue the processing flow. Disaster declaration is independent of this processing checkpoint. Restoration of the system can occur at a later date, as does the return to normal, after-image processing.
-----

92. Who would be in the BEST position to determine the recovery point objective (RPO) for business applications?
   a. Business continuity coordinator
   b. Chief operations officer (COO)
   c. Information security manager
   d. Internal audit

the recovery point objective (RPO) is the processing checkpoint to which systems are recovered. In addition to data owners, the chief operations officer (COO) is the most knowledgeable person to make this decision. It would be inappropriate for the information security manager or an internal audit to determine the RPO because they are not directly responsible for the data or the operation.
-----

93. When the computer incident response team (CIRT) finds clear evidence that a hacker has penetrated the corporate network and modified customer information, an information security manager should FIRST notify:
   a. the information security steering committee.
   b. customers who may be impacted.
   c. data owners who may be impacted.
   d. regulatory agencies overseeing privacy.

The data owners should be notified first so they can take steps to determine the extent of the damage and coordinate a plan for corrective action with the computer incident response team. Other parties will be notified later as required by corporate policy and regulatory requirements.
-----

94. The systems administrator did not immediately notify the security officer about a malicious attack. An information security manager could prevent this situation by:
   a. periodically testing the incident response plans.
   b. regularly testing the intrusion detection system (IDS)
   c. establishing mandatory training of all personnel.
   d. periodically reviewing incident response procedures.

Security incident response plans should be tested to find any deficiencies and improve existing processes. Testing the intrusion detection system (IDS) is a good practice but would not have prevented this situation. All personnel need to go through formal training to ensure that they understand the process, tools and methodology involved in handling security incidents. However, testing of the actual plans is more effective in ensuring the process works as intended. Reviewing the response procedures is not enough; the security response plan needs to be tested on a regular basis.
-----

95. Which of the following would a security manager establish to determine the target for restoration of normal processing?
   a. Recovery time objective (RTO)
   b. Maximum tolerable outage (MTO)
   c. Recovery point objectives (RPOs)
   d. Services delivery objectives (SDOs)

Recovery time objective (RTO) is the length of time from the moment of an interruption until the time the process must be functioning at a service level sufficient to limit financial and operational impacts to an acceptable level. Maximum tolerable outage (MTO) is  the maximum time for which an organization can operate in a reduced mode. Recovery point objectives (RPOs) relate to the age of the data required for recovery. Services delivery objectives (SDOs) are the levels of service required in reduced mode.
-----

96. Which of the following should be the PRIMARY basis for making a decision to establish an alternate site for disaster recovery?
   a. A business impact analysis (BIA), which identifies the requirements for continuous availability of critical business processes.
   b. Adequate distance between the primary site and the alternate site so that the same disaster does not simultaneously impact both sites.
   c. A benchmarking analysis of similarly situated enterprises in the same geographic region to demonstrate due diligence.
   d. Differences between the regulatory requirements applicable at the primary site and those at the alternate site.

The BIA will help determine the recovery time objective (RTO) and recovery point objective (RPO) for the enterprise. This information will drive the decision on the appropriate level of protection for its assets. Natural disasters and regulatory requirements are just two of many factors that an enterprise must consider when it decides whether to pursue an alternate site for disaster recovery. While a benchmark could provide useful information, the decision should be based on a BIA, which considers factors specific to the enterprise.
-----

97. During a business continuity plan (BCP) test, one department discovered that its new software application was not going to be restored soon enough to meet the needs of the business. This situation can be avoided in the future by:
   a. conducting a periodic and event-dirven business impact analysis (BIA) to determine the needs of the business during a recovery.
   b. assigning new applications a higher degree of importance and scheduling them for recovery first.
   c. developing a help-desk ticket process that allows departments to request recovery of software during a disaster.
   d. conducting a thorough risk assessment prior to purchasing the software.

A periodic BIA can help compensate for changes in the needs of the business for recovery during a disaster. Choice B is an incorrect assumption regarding the automatic importance of a new program. Choice C is not an appropriate recovery procedure because it allows individual business units to make unilateral decisions without consideration of broader implications. The risk assessment may not include the BIA.
-----

98. The main mail server of a financial institution has been compromised at the superuser level; the only way to ensure the system is secure would be to:
   a. change the root password of the system.
   b. implement multifactor authentication.
   c. rebuild the system from the original installation medium.
   d. disconnect the mail server from the network.

Rebuilding the system from the original installation medium is the only way to ensure all security vulnerabilities and potential stealth malicious programs have been destroyed. Changing the root password of the system does not ensure that integrity of the mail server. Implementing multifactor authentication is an aftermeasure and does not clear existing security threats. Disconnecting the mail server from the network is an initial step, but does not guarantee security.
-----

99. Which of the following would present the GREATEST risk to information security?
   a. Virus signature files updates are applied to all server every day.
   b. Security access logs are reviewed  within five business days.
   c. Critical patches are applied within 24 hours of their release
   d. Security incidents are investigated within five business days

Security incidents are configured to capture system events that are important from the security perspective; they include incidents also captured in the security access logs and other monitoring tools. Although, in some instances, they could wait for a few days before they are researched, from the options given this would have the greatest risk to security. Most often, they should be analyzed as soon as possible. Virus signatures should be updated as often as they become available by the vendor, while critical patches should be installed as soon as they are reviewed and tested, which could occur in 24 hours.
-----

100. Which of the following is the MOST important area of focus when examining potential security compromise of a new wireless network?
   a. Signal strength
   b. Number of administrators
   c. Bandwidth
   d. Encryption strength

The number of individuals with access to the network configuration presents a security risk. Encryption strength is an area where wireless networks tend to fall short; however, the potential to compromise the entire network is higher when an inappropriate number of people can alter the configuration. Signal strength and network bandwidth are secondary issues.
-----