Operation Security1.docx
- 文档编号:4554974
- 上传时间:2023-05-07
- 格式:DOCX
- 页数:87
- 大小:67.42KB
Operation Security1.docx
《Operation Security1.docx》由会员分享,可在线阅读,更多相关《Operation Security1.docx(87页珍藏版)》请在冰点文库上搜索。
OperationSecurity1
OperationManagement
Yourquizresults:
Hidedetailsinallquestions.
Hidecorrectquestions.
TopofForm
1.Question:
1101|Difficulty:
5/5|Relevancy:
3/3
WhichofthefollowingisnotacriticalsecurityaspectofOperationsControls?
o
Controlsoverhardware.
o
Datamediaused.
o
Operatorsusingresources.
o
Environmentalcontrols.
D.Thecorrectansweris:
Environmentalcontrols.
WhileitisimportantthatenvironmentalconcernsareaddressedtheyarepartofthePhysicalSecurityDomain.
AlloftheotheranswersfalldirectlyunderOperationsSecurity.
Lastmodified8/27/2007-J.Hajec
ThankstoCrispinYuenfordetectingatypowithingthisquestionandreportingit.
ThankstoLinaAutoimprovetheexplanationtothisquestion.
Comment:
References:
AIOv3PhysicalSecurity(pages370-372)
AIOv3OperationSecurity(page900)
Contributor:
NickMackovski
Studyarea:
CISSPCBKdomain#7-OperationsSecurity
Coveredtopic:
Operationscontrols
Thisquestion©Copyright2003–2006NickMackovski,cccure.org.Allrightsreserved.
2.Question:
1417|Difficulty:
5/5|Relevancy:
3/3
Whichofthefollowingquestionsislesslikelytohelpinassessingcontrolsoveraudittrails?
o
Doestheaudittrailprovideatraceofuseractions?
o
Areincidentsmonitoredandtrackeduntilresolved?
o
Isaccesstoonlinelogsstrictlycontrolled?
o
Isthereseparationofdutiesbetweensecuritypersonnelwhoadministertheaccesscontrolfunctionandthosewhoadministertheaudittrail?
Accesscontroladministratorshouldnothaveaccesstoaudittrailtopreventinternalfraud.
B.Audittrailsmaintainarecordofsystemactivitybysystemorapplicationprocessesandbyuseractivity.Inconjunctionwithappropriatetoolsandprocedures,audittrailscanprovideindividualaccountability,ameanstoreconstructevents,detectintrusions,andidentifyproblems.Audittrailcontrolsareconsideredtechnicalcontrols.Monitoringandtrackingofincidentsismoreanoperationalcontrolrelatedtoincidentresponsecapability.
Source:
SWANSON,Marianne,NISTSpecialPublication800-26,SecuritySelf-AssessmentGuideforInformationTechnologySystems,November2001(PagesA-50toA-51).
Lastmodified07/02/2007,RonHehemann
Contributor:
ChristianVezina
Studyarea:
CISSPCBKdomain#7-OperationsSecurity
Coveredtopic:
Audittrails
3.Question:
1493|Difficulty:
4/5|Relevancy:
3/3
WhichofthefollowingisnotanOrangeBook-definedlifecycleassurancerequirement?
o
Securitytesting
o
Designspecificationandtesting
o
Trusteddistribution
o
Systemintegrity
D.ThelifecycleassurancerequirementsspecifiedintheOrangeBookare:
securitytesting,designspecificationandtesting,configurationmanagementandtrusteddistribution.SystemintegrityisalsodefinedintheOrangeBookbutisanoperationalassurancerequirement,notalifecycleassurancerequirement.
Source:
KRUTZ,RonaldL.&VINES,RusselD.,TheCISSPPrepGuide:
MasteringtheTenDomainsofComputerSecurity,JohnWiley&Sons,2001,Chapter6:
OperationsSecurity(page219).
Also:
U.S.DepartmentofDefense,TrustedComputerSystemEvaluationCriteria(OrangeBook),DOD5200.28-STD.December1985(alsoavailablehere).
Contributor:
ChristianVezina
Studyareas:
CISSPCBKdomain#6-SecurityArchitectureandDesign,CISSPCBKdomain#7-OperationsSecurity
Coveredtopic:
Systemassurance
Thisquestion©Copyright2003–2006ChristianVezina,cccure.org.Allrightsreserved.
4.Question:
205|Difficulty:
1/5|Relevancy:
3/3
Whichofthefollowingisthemostreliable,securemeansofremovingdatafrommagneticstoragemediasuchasamagnetictape,oracassette?
o
Degaussing
o
ParityBitManipulation
o
Certification
o
Bufferoverflow
Answer:
A.Informationisstoredonamagneticrecordingmedium(ferricoxides,chromiumdioxide,etc.)bymagnetizingsectionsofitfromalocalfield,inmostcasestherecordingprocessitself,theamplitudeandfrequencyofwhichvaryaccordingtotheinformationitiscarrying.Thisinformationisdistributedalongtherecordingtrackbythemovementofthemediumrelativetotherecordinghead,beitrotaryorlinear.Itispossibleinmostequipmenttoeraseitbypassingthemediumacrossaneraseheadbutthisnormallywouldbeinatimeequaltorecordtime.Itisspeedierandhencemorepracticaltosubmitthebulkofthemediumtoafield,whichcanbemadetodemagnetizeitinoneshortoperation.Thisisachievedbysubjectingitinbulktoaseriesoffieldsofalternatingpolarityandgraduallydecreasingstrength.Anequipmentthatdoesthisisa"Degausser"(otherwiseknownasaBulkEraser).Regardlessofname,itsfunctionistoreducetonearzerothemagneticfluxstoredinthemagnetizedmedium.FluxdensityismeasuredinGaussorTesla.
Rememberthatdelete,simplyremovesthefilefromtheTOCorVTOC,itdoesnotremovethefilecontent.
Reference:
Whatisdegaussing.
Studyarea:
CISSPCBKdomain#7-OperationsSecurity
Coveredtopic:
Dataremanenceandobjectreuseprotection
Thisquestion©Copyright2003–2006cccure.org.Allrightsreserved.
5.Question:
253|Difficulty:
3/5|Relevancy:
3/3
WhichofthefollowingisNOTamediaviabilitycontrolusedtoprotecttheviabilityofdatastoragemedia?
o
clearing
o
marking
o
handling
o
storage
A.Clearingreferstotheoverwritingofdatamediaintendedtobereusedinthesameorganization.
Source:
KRUTZ,RonaldL.&VINES,RusselD.,TheCISSPPrepGuide:
MasteringtheTenDomainsofComputerSecurity,pages231,348. Marking,handlingandstorageareallmediaviabilitycontrolsusedtoprotecttheviabilityofdatastoragemedia.
Contributor:
EricYandell
Studyarea:
CISSPCBKdomain#7-OperationsSecurity
Coveredtopic:
Sensitiveinformationandmediahandling
Thisquestion©Copyright2003–2006EricYandell,cccure.org.Allrightsreserved.
6.Question:
1501|Difficulty:
4/5|Relevancy:
3/3
AccordingtotheOrangeBook,whichsecuritylevelisthefirsttorequireconfigurationmanagement?
o
B2
o
B3
o
A1
o
B1
A.Configurationmanagementistheprocessoftrackingandapprovingchancestoasystem.ItisonlyrequiredforB2,B3andA1levelsystems,butbecauseitiscommonsense,itisrecommendedforsystemsthatareevaluatedatlowerlevels.
Source:
KRUTZ,RonaldL.&VINES,RusselD.,TheCISSPPrepGuide:
MasteringtheTenDomainsofComputerSecurity,JohnWiley&Sons,2001,Chapter6:
OperationsSecurity(page223).
Also:
U.S.DepartmentofDefense,TrustedComputerSystemEvaluationCriteria(OrangeBook),DOD5200.28-STD.December1985(alsoavailablehere).
Contributor:
ChristianVezina
Studyareas:
CISSPCBKdomain#7-OperationsSecurity,CISSPCBKdomain#6-SecurityArchitectureandDesign
Coveredtopic:
Configurationmanagement
Thisquestion©Copyright2003–2006ChristianVezina,cccure.org.Allrightsreserved.
7.Question:
1340|Difficulty:
4/5|Relevancy:
3/3
Whenitcomestomagneticmediasanitization,whatdifferencecanbemadebetweenclearingandpurginginformation?
o
Clearingcompletelyerasesthemediawhereaspurgingonlyremovesfileheaders,allowingtherecoveryoffiles.
o
Clearingrendersinformationunrecoverablebyakeyboardattackandpurgingrendersinformationunrecoverableagainstlaboratoryattack.
o
Theybothinvolverewritingthemedia.
o
Clearingrendersinformationunrecoverableagainstalaboratoryattackandpurgingrendersinformationunrecoverabletoakeyboardattack.
B.Theremovalofinformationfromastoragemediumiscalledsanitization.Differentkindsofsanitizationprovidedifferentlevelsofprotection.Adistinctioncanbemadebetweenclearinginformation(renderingitunrecoverablebyakeyboardattack)andpurging(renderingitunrecoverableagainstlaboratoryattack).Therearethreegeneralmethodsofpurgingmedia:
overwriting,degaussing,anddestruction.
Source:
SWANSON,Marianne&GUTTMAN,Barbara,NationalInstituteofStandardsandTechnology(NIST),NISTSpecialPublication800-14,GenerallyAcceptedPrinciplesandPracticesforSecuringInformationTechnologySystems,September1996(page26).
Contributor:
ChristianVezina
Studyarea:
CISSPCBKdomain#7-OperationsSecurity
Coveredtopics
(2):
Dataremanenceandobjectreuseprotection,Sensitiveinformationandmediahandling
Thisquestion©Copyright2003–2006ChristianVezina,cccure.org.Allrightsreserved.
8.Question:
1504|Difficulty:
3/5|Relevancy:
3/3
Hardwareavailabilityreportsallowtheidentificationofthefollowingproblemsexceptfor:
o
Inadequatetrainingforoperators
o
Excessiveoperatingsystemsmaintenance
o
Userdissatisfaction
o
Inadequatehardwarefacilities
C.Hardwareavailabilityreportsarehardwaremonitoringproceduresthatindicatethetimeperiodsduringwhichthecomputerisinoperationandavailableforutilizationbyusers.Downtimeperiodsmayindicateinadequatehardwarefacilities,excessiveoperatingsystemmaintenance,lackofpreventativemaintenance,inadequatephysicalplantsorinadequatetrainingforoperators.Userdissatisfactionisaratherconsequenceofsystemsunavailability.
Source:
InformationSystemsAuditandControlAssociation,CertifiedInformationSystemsAuditor2002reviewmanual,Chapter3:
TechnicalInfrastructureandOperationalPractices(page99).
Contributor:
ChristianVezina
Studyarea:
CISSPCBKdomain#7-OperationsSecurity
Coveredtopic:
Operationscontrols
Thisquestion©Copyright2003–2006ChristianVezina,cccure.org.Allrightsreserved.
9.Question:
1498|Difficulty:
4/5|Relevancy:
3/3
Whichtrustedfacilitymanag
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- Operation Security1