14. Effective means to incident prevention do
a. Awareness
b. Logs and alerts
c. Compliance
d. Common sense
15. Which of the following is used to distribute illegal content such as copies of copyrighted songs and movies?
a. Quarantine server
b. Remote access server
c. Warez server
d. E-mail server
16. Log monitoring
a. Incident handling
b. Policy violations
c. Auditing
d. Data sources
17. Which of the following requires accountability of a data controller?
a. Organization for Economic Co-Operation and Development (OECD)
b. International organization for standards (ISO)
c. The Common Criteria (CC)
d. The Internet Engineering Task Force (IETF)
18. Regarding the United States import and export laws about using encryption in products exporting to trading partners in the world, which of the following is required to monitor internal communications or computer systems and to prepare for disaster recovery?
a. Key renewal
b. Key escrow
c. Key retrieval
d. Key transport
The other three choices are incorrect because they cannot help in key recovery. Key renewal is the process used to extend the validity period of a cryptographic key so that it can be used for an additional time period. Key retrieval helps to obtain a cryptographic key from active or archived electronic storage or from a backup facility. Key transport is the secure movement of cryptographic keys from one cryptographic module to another module.
19. Which of the following minimizes the potential for incident encroachment?
1. Firewalls
2. Laws
3. Separation of duties
4. Regulations
a. 1 and 2
b. 2 and 4
c. 1 and 3
d. 3 and 4
The objective of separation of duties is to ensure that no single individual (acting alone) can compromise an application. In both cases, procedural and technical safeguards are used to enforce a basic security policy in that high risk activities should be segregated from low-risk activities and that one person should not be able to compromise a system. These two controls when combined provide a strong barrier for incidents to occur, which minimize the potential for incident encroachment.
Laws and regulations guide the security objectives and form the foundation for developing basic security policies and controls.