1: H
ow should obsolete prototypes, 2: W
hat qualifies something as a
models, and test items be disposed of? trade secret?
Domain: Information Security Domain: Information Security
3: W
hat are three methods of sanitizing 4: W
hat are the two primary aspects of
electronic media? recovery after an information loss?
Domain: Information Security Domain: Information Security
5: D
uring which stage of a project is 6: W
hat is the difference between
critical information most vulnerable? embedded and host-based systems?
Domain: Information Security Domain: Information Security
7: W
hat three aspects of information 8: W
hat are the five IS infrastructure
must be protected? management countermeasures?
Domain: Information Security Domain: Information Security
2: T he information added value or 1: T hey should be destroyed so they
benefit to the owner, the trade secret can’t be reverse engineered
was specifically identified, and the
owner provided a reasonable level of
protection for the information
IAP 1.5.4 p 24 IAP 1.4.2 p 14
4: R
eturn to normal business operations 3: O
verwriting, degaussing, physical
ASAP and implement measures to destruction
prevent a recurrence
IAP 1.7 p 30 IAP 1.6.2 p 27
6: Embedded systems are typically 5: T he intermediate phases
programmed at the manufacturer and run
proprietary or nonstandard operating systems,
e.g. cameras, card readers, and video converters.
Host-based systems run on more standard
operating systems such as Windows and Linux and
are easier to change
IAP 2.5 p 73 IAP 1 Appendix D p 49
8: V
ulnerability and patch management, 7: C
onfidentiality, integrity, availability
system monitoring and log review, IS
security metrics, physical security of
the IS infrastructure, IT staff training
in information security
IAP 3.1.6 p 91 IAP 2.3 p 69, IAP 3 85
9: W
hat are the seven layers of the Open 10: W
hat is the “A triad” of information
Systems Interconnect network model? security with regard to access
control?
Domain: Information Security Domain: Information Security
11: W
hat is an escalation of privilege 12: A
ccording to ISO 27002, which
attack? three elements of guidance should
information security policies include,
at a minimum?
Domain: Information Security Domain: Information Security
Domain: Information Security Domain: Information Security
Domain: Information Security Domain: Information Security
10: A
uthentication, authorization, 9: P
hysical, data link, network, transport,
auditing/accountability session, presentation, application
IAP Figure 3-7 p 103 IAP 3.2.1 p 97
12: D
efinition of information security 11: W
hen an email program is tricked
and its objectives/scope, statement into executing an email as if it were a
of management intent, brief program rather than text
explanation of security policies/
principles/standards important to the
organization
IAP 3.5.2 p 141 SOP 3.2.1 p 48 Security Management 4.5.1 p 90