Ad Code

cs205 final term preparation 2025

 cs205 final term preparation 2025

 

Q No 01: very important. Security Breach in 2014

 

How much card piayed: 56 million payment cards compromised

How much peopie effectedd Affected 78.8 million individuals

Which kind of vuinerabiiity expioited: Then they exploited a zero-day vulnerability in Windows Or Exploitable vulnerabilities were found in anthem network

How much maii used : The malware was also able to capture 53 million email addresses.

56 million payment cards compromised • Early September 2014

  Sequence of events: The attackers were able to gain access to one of Home Depot’s vendor environments by using a third-party vendor’s logon credentials

- Then they exploited a zero-day vulnerability in Windows, which allowed them to pivot from the vendor-specific environment to the Home Depot corporate environment.

- Once they were in the Home Depot network, they were able install memory scraping malware on over 7,500 self-checkout POS terminals (Smith, 2014).

- This malware was able to grab 56 million credit and debit cards. The malware was also able to capture 53 million email addresses (Winter, 2014).

Q No 02: Steps in Security engineering: (Repeated )

  Assess risk profile

  Research security solutions

  Design security architecture

  Implement security controls & solutions

  Test and validate security posture

 

 

 

 

Q No 03: Security transformation project:

 

 

  Security transformation project time line:

  Project initiation: 2 Mths

  Layer 1: security hardening of IT assets (6 Mths) – Layer 2: VM (1 Mth)

  Layer 3: security engineering (1 Mth)

  Layer 4: Governance & ISO cert.(3 Mths)

 Q no 04: Software Assurance Maturity Modei (SAMM) oovernance Phase: (Repeated in exams )

  OWASP Software Assurance Maturity Model (SAMM) Governance Phase:

  Strategy & Metrics

  Education & Guidance

  Policy & Compliance

Strategy & Metrics: Focused on establishing the framework within an organization for a software security assurance program. –

Education & ouidance: Focused on arming personnel involved in the software lifecycle with knowledge and resources to design,

Poiicy & Compiiance: – Focused on understanding and meeting external legal and regulatory requirements while also driving internal security standards to ensure compliance in a way that’s aligned with the business purpose of the org.

Q no 5: IT Security functions

- Network security

- Systems security

- Application & database security

- Mobile security

Q No 6: Topic No 145: WHAT IS SECURITY ENoINEERINo?

 

 

  Security Engineering is the third layer of the Security Transformation Model

  Consists of more in-depth and complicated security activities which take more time and effort

  Many times related to security architecture

  Types of activities for security engineering:

  FW granular access lists

  Building an effective DMZ architecture

  Segregating the network with VLANs

  Adding a security tool such as SIEM, FW, DLP, NAC, etc

  App-DB encryption

Q no 7: Topic No 146: WHAT IS THE OBJECTIVE OF SECURITY ENoINEERINo? ( MOSTLY)

  Security architecture as per best-practices

  The right security devices in the right places

  Effective security configuration of security devices (features)

  Optimum operation of security devices

  Aggregate controls

Exampies:

  FW first and then IPS

  Edge FW, data center FW

  Malware protection at the network edge

 

 

 

Q no 8: What is a patch?

What are generai steps for patch management? ( yeh steps mostly ate hain exams main)


 

 

 

Step1: Establish baseline IT assets inventory

Step 2: Gather software patch and vulnerability information

Step3: identify vulnerability relevancy and filter to assign to end point Step 4: review approve and mitigate patch management

 

 

- “A patch is a piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities and other bugs”

What is patch management?

- Patch management is an area of systems management that involves acquiring, testing, and installing multiple patches (code changes) to an administered computer system.

Patch management tasks : − Maintaining current knowledge of available patches, deciding what patches are appropriate for particular systems, ensuring that patches are installed properly, testing systems after installation, and documenting all associated procedures, such as specific configs required.

Risk of not patching: By not applying a patch you might be leaving the door open for a malware attack

- Malware exploits flaws in a system in order to do its work. In addition, the timeframe between an exploit and when a patch is released is getting shorter

Q No: 09: Topic No 283: Key Leadership Quaiities Of InfoSec (Head IMP Repeating)

Lets examine the key leadership qualities of the Information Security Head or the key resource driving the Security Transformation Program

  Authenticity

  Candidness

  Fairness & fair play

  Team environment

  Recognizing talent and hard work


 

 

 

  Celebrating success!

 

 

Q no 10: Roies & responsibiiities in security governance.

  Roles & responsibilities:

  Is right person working at the right place?

  Do key people tasked with security governance & documentation has the right skills and experience to build documentation?

  Are staffs aware of their responsibilities related to security governance documentation …policies, SOPs, checklists, etc?

  Is documentation and process approach part of staff JDs & appraisal?

Q No 11: Four-iayer security transformation modei or Four piiiars of security transformation modei

Four-layer security transformation model provides the correct sequence and focus in order to address organizational security gaps

1.  Security Hardening; Security controls on IT assets & process

2.  Vulnerability Management; patching

3.  Security Engineering; More complex security design & solutions

4.  Security Governance; Managing the information security program

Q No 12: Info security oovernance initiai Biock.

Initiai

      Policy

      Responsibility

      Recourse and priority

      Periodic review


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Intermediate

      Change management

      SOP,s

      Awareness

 

      Monitoring


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Mature

      Risk management

      Internal audit

     


Incident management


 

 

 

 

 

 

 

 

 

 

 

 

 

 

Q No: 13:  Info security governance initiai biock detaii.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Q No 14: Topic No 198: How To Buiid Effective InfoSec oovernance? (Imp Repeated)

Key success factors: (see also minor detail of all these 06 points) – Leadership


 

 

 

  Strategy

  Structure

  Reporting

  Project management

  Culture

 

 

 

 

 

 

 

 

 

 

 

 

 

Q NO 15 : Pen test and Red team Exercise ( look a minor review on these steps)

: Estabiish a Penetration Testing Program

Establish a program for penetration tests that includes a full scope of blended attacks, such as wireless, client-based, and web application attacks.

20.2: Conduct Reguiar Externai and Internai Penetration Tests

Conduct regular external and internal penetration tests to identify vulnerabilities and attack vectors that can be used to exploit enterprise systems successfully.

20.3: Perform Periodic Red Team Exercises

 

 

 

Perform periodic Red Team exercises to test organizational readiness to identify and stop attacks or to respond quickly and effectively.

. 20.7: Ensure Resuits from Penetration Test are Documented Using Open, Machine readabie Standards

Wherever possible, ensure that Red Teams results are documented using open, machine readable standards (e.g., SCAP). Devise a scoring method for determining the results of Red Team exercises so that results can be compared over time.

Q No 16: Most Important: (read and keep in mind about steps Basic Foundationai and organizationai)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Q NO 17: Monitor and Detect Any Unauthorized Use of Encryption


 

 

 

  Monitor all traffic that is encrypted with protocols such as SSL or TLS leaving the organization and detect any unauthorized use of encryption.

Q No 18: Topic No 262: What is Security Vaiidation?

  What does security validation mean?

To confirm via walk-through of system or device that the security controls implemented by an IT team have actually been implemented correctly

  Who implements the security controls?

  Under the Security Transformation Model, security controls are implemented by the IT teams

  Who conducts security validation?

Security controis are vaiidated by the Information Security team or by a third party consuitant foiiowing the principie of segregation of duty

  Why do we need to validate security controls?

  To check the completeness of the controls

  To check the correctness of the controls

  As an overall assurance

Q No 19: Topic No 268: Software Security Testing & Validation–1 ( imp )

The OWASP Software Assurance Maturity Model (SAMM) undertakes software security testing & validation during the following phases:

  Verification

  Deployment

  OWASP Software Assurance Maturity Model (SAMM) Verification Phase:

  Design Review

  Code Review

  Security Testing


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Q Bo 20: Topic No 270: Embedding Info Sec In to Project Management ( IMP)

  PMIs five phases of project management:

  Initiate

Plan

Executing

Controlling

Closing ( Also see these steps minor look for detail).

Q No 21: topic 235 RISK MANAoEMENT FRAMEWORK

RISK MANAGEMENT FRAMEWORK

  The principles of risk management and the framework are closely related.

For example, one of the principles is that risk management should be integrated and one of the components of the framework is integration.

The principle outlines what must be achieved, and the framework provides information on how to achieve the required integration.

  The ISO 31000 guidelines are centered on leadership and commitment.

  The remaining components of the framework are design, impiementation, evaiuation and

improvement. This approach is often represented in management literature as plando-check-act.


 

 

 

  This is often referred to as the risk architecture, strategy and protocois of the organization,

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Q No 22: Topic No 237: ISO31000:2018 RISK MANAoEMENT – HOW TO IMPLEMENT

A Risk Practitioners Guide To ISO31000:2018 Successful implementation of a risk management initiative is an ongoing process that involves working through 10 activities below on a continuous basis. These activities relate to:

(1)  Plan;

(2)  Implement;

(3)  Measure; and

(4)  Learn.

Q No 23: Topic No 234: ISO31000:2018 RISK MANAGEMENT 8 PRINCIPLES

PRINCIPLES:

1.  Framework and processes should be customized and proportionate.

2.  Appropriate and timely involvement of stakeholders is necessary.

3.  Structured and comprehensive approach is required.

4.  Risk management is an integral part of all organizational activities.


 

 

 

5.  Risk management anticipates, detects, acknowledges and responds to changes.

6.  Risk management explicitly considers any limitations of available information.

7.  Human and cultural factors influence all aspects of risk management.

8.  Risk management is continually improved through learning and experience.

The first five principles provide guidance on how a risk management initiative should be designed, and principles six, seven and eight relate to the operation of the risk management initiative.

Risk management Frame work 05 component:

1.  Integration, 2 designs, 3 Implementation, 4. Evaluation , 5 Improvement

Q No 24: What is an internai security assessment? ( Q yeh aye ga what is internal assessment, mention any one reason definition k bad neche se koi se kuch steps bata dena)

DEFINATION: An effort to assess the security posture, risks, or vulnerabilities for any project, service, application, or device

  When is an internai security assessment required?

  Launch of a new IT project or service

  When an incident has occurred

  On change of leadership

  Regulatory or compliance requirements.

Q No25: What is the purpose of effective toii scanning? ( an search from google)

To perform external and internal reconnaissance of available infrastructure component, network scanning tool can be used. A network scanning tool aims to identify active hosts on a network, either to attack them, or to assess vulnerability in the network.

Q No 26: Which steps are inciude in ensuring INFOSEC ASPECTS OF BUSINESS CONTINUITY MNoMT

INFORMATION SECURITY INCIDENT MANAGEMENT

A.16.1  MNGMT OF INFOSEC INCIDENTS & IMPROVEMENTS

A.16.1.1  RESPONSIBILITIES & PROCEDURES

A.16.1.2  REPORTING INFOSEC SECURITY EVENTS

A.16.1.3  REPORTING INFOSEC WEAKNESSES


 

 

 

A.16.1.4  ASSESSMENT OF & DECISION ON INFOSEC EVENTS

A.16.1.5  RESPONSE TO INFOSEC INCIDENTS

A.16.1.6. LEARNING FROM INFOSEC INCIDENTS

A.16.1.7 COLLECTION OF EVIDENCE

Q No 27: Types of Network redundancy ( verify this also) AVAILABILITY OF INFORMATION PROCESSING FACILITIES

Information processing facilities shall be implemented with redundancy sufficient to meet availability requirements.

Different types of network redundancy include ( This one Ans not sure )

      Multiple spanning trees

      Ring network

      Diverse trunking

      Multi protocol labe

 

 

Q No 28: What are five steps in business continuity pian management. ( please verfy this ) Five phases of development and maintaining business continuity plan

Phase1: Access your risk (natural disaster, cyber attack, ransom ware, data corruption,) Phase 2: Business impact analysis

Phase 3: Identify critical assects Phase 4: Back up your data

Phase 5: Plan for recovery. 6. Test your plan

IMPORTANT TOPIC     ↓↓

Q No 29: Topic no 118: What Are The Steps In VM Lifecycle?

VM Steps:

1.  Analyze assets

2.  Prepare scanner

3.  Run vulnerability scan


 

 

 

4.  Assess results

5.  Patch systems

6.  Verify (re-scan)

Q No 30:What are some of the common vulnerability scanners?

OpenVAS

Nessus

Qualys

Rapid7

Free tool offered. Browser check SSL

Zero-day exploit:

  A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security

hole is then exploited by hackers before the vendor becomes aware and hurries to fix it this exploit is called a zero day attack.

Q No 31: Topic no 127: Who Conducts Vulnerability Management

  A


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Q No 32: Topic no 129: Qualys Features

  Qualys:

  Cloud-based service

  On-premise device

  Complete suite

  Scalable and immediate deployment

  Asset discovery; find and organize hosts

  Prioritize & manage remediation tickets

  Continuous monitoring service

  Policy compliance scanning

  Qualys Secure Seal for websites

Q No 33: Topic no 136: How Do VM Scanners Work?

  Lets take a look at Qualys scanning technique:

  Qualys Guard scanning methodology mainly focuses on the different steps that an attacker might follow

in order to perform an attack.


 

 

 

  It tries to use exactly the same discovery and information gathering techniques that will be used by an

attacker.

Checking if the remote host is alive

The first step is to check if the host to be scanned is up and running in order to avoid wasting time on scanning a dead or unreachable host

Firewall detection

The second test is to check if the host is behind any firewalling/filtering device. This test enables the scanner to gather more information about the network Infrastructure and will help during the scan of TCP and UDP ports.

TCP / UDP Port scanning

The third step is to detect all open TCP and UDP ports to determine which services

Are running on this host. The number of ports is configurable, but the default scans Is approximately 1900 TCP ports and 180 UDP ports.

Q No 34: Topic no 141: VM Challenges & Pitfalls

Challenges:

  Internal expertise on VM tool

  Not enough support from IT teams

  Vulnerability patching causing application failure

  Management support

Q No 35: Topic no 142: IT Asset Management Challenges

  The typical enterprise has hundreds or thousands of IT assets with a fast-paced business environment

  Tough challenge to keep all IT assets tracked and updated with all the right software patches and

updates

  Challenges:

  Asset discovery & tracking

  Antivirus status

  Windows & OS updates

  Patch management

  Change management

 

Q No 36: Types of activities for security engineering: Very imp


 

 

 

  FW granular access lists

  Building an effective DMZ architecture

  Segregating the network with VLANs

  Adding a security tool such as SIEM, FW, DLP, NAC, etc

  App-DB encryption

Why is security governance at stage 4?

  First build a building and then manage it

  First 2 stages build up the essential foundation

  3rd stage implements advanced security measures

  Then (4th stage) it is time to manage

Q no 38: Pakistan’s InfoSec paradigm

  Governance overkill

  Reactive

  Superficial

  Complete absence of underlying security controls

Q NO 39: Topic No 198: How To Build Effective InfoSec Governance?


 

 

 

 

 

 

Q No 40: Topic No 202: Role Of CISO In Driving Infosec Program

 

 

 

 

 

 

 

 

 

 

 

Q No 41: Topic No 203: Key Inhibitors For Security Program Failure


Q No 42: Topic No 207: Security Documentation: Standards

Policies:


 

 

Policies are formal statements produced and supported by senior management. They can

be organization-wide, issue-specific or system specific. Your organization’s policies should

reflect your objectives for your information security program.

Standards

Standards are mandatory actions or rules that give formal policies support

and direction. One of the more difficult parts of writing standards for an information security program is getting a company-wide consensus on what

standards need to be in place.

Compulsory and must be enforced to be effective. (This also applies to policies!)

Procedures

Procedures are detailed step by step instructions to achieve a given goal or mandate. They are

typically intended for internal departments and should adhere to strict change control processes.

Guidelines

Guidelines are recommendations to users when specific standards do not apply.

Guidelines are

designed to streamline certain processes according to what the best practices are. Guidelines, by nature, should be open to interpretation and do not need to be followed to the letter.

Q No 43: Topic No 211: ISMS: Leading InfoSec Governance Framework


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Q No 44: What is ISO27002:2013?

  Information technology -- Security techniques -- Code of practice for information

security controls

  Renamed from ISO 17799

  PCI Data Security Standard (DSS):

Designed to ensure that ALL companies that accept, process, store or transmit

  Managed by Security Standards Council

  SSC is an independent body that was created by the major payment card brands (Visa, MasterCard, American Express, Discover and JCB

  6 Broad goals and 12 requirements


 

 

Topic No 231: COBIT

  ISACA framework for IT Governance

  COBIT 5 helps enterprises to create optimal value from IT by maintaining a balance between realising benefits and optimising risk levels and resource use (ISACA)

•• COBIT 5 brings together five principles that allow the enterprise to build an effective

governance and management framework (ISACA)

  Based on a holistic set of seven enablers that optimises IT investment and use for the

benefit of stakeholders (ISACA)

 

 

 

 

 

 

 

 

 

 

Q No 45: Topic No 230: NIST FRAMEWORK

  The Computer Security Resource Center (CSRC) website guides users to NIST resources

on computer, cyber, and information security and privacy.

  Its content includes publications, projects, research, news and events from the NIST

Information Technology Laboratory's (ITL) two security divisions

Q No 46: Types of Changes:

Standard changes are changes to a service or to the IT infrastructure where the implementation


 

 

 

process and the risks are known upfront.

Normal Changes

  Those that must go through the change process before being approved and implemented. If they are determined to be high-risk, a change advisory board must decide whether they will be implemented.

Emergency Changes

  Arise when an unexpected error or threat occurs, such as when a flaw in the infrastructure related to services needs to be addressed immediately.

Q No 47: Topic No 243: PROJECT MANAGEMENT FOR INFOSEC: PART 1

  PART 1:

  Importance Of Project Management For Information Security

  CYBER SECURITY CHALLENGES:

Reactive

Superficial

Contention

Box-Approach

Governance-Overkill

Q No 48: Topic No 254: CYBER SECURITY MATURITY MATRIX

I.             FOUNDATION, II. FUNDAMENTALS, III. HARDENED, IV. PROTECTED, V. MONITORED, VI. SECURED

I. FOUNDATION

Edge FW With Filtering Active Directory (WS/S)

Licensed Enterprise AV (WS/S)

Licensed Windows OS (WS/S) Or Open Source

: RED TEAM PENETRATION TESTINo

  Red team and blue team

  Attack & defense simulation

  Continuously find holes in security defenses

  Uncover security vulnerabilities before hackers exploit them

    What does security validation mean?

To confirm via waik-through of system or device that the security controls implemented by an IT team have actuaiiy been impiemented correctiy

  Who implements the security controls?

  Under the Security Transformation Model, security controls are implemented by

I.                    the IT teams

II.                Who conducts security validation?


 

 

 

Security controls are validated by INFORMATION SECURITY TEAM or by THIRD PARTY consultant following the principle of segregation of duty.

Q No 49: Why do we need to validate security controls?

  To check the compieteness of the controls

  To check the correctness of the controls

  As an overall assurance

 

 

 

 

 

 

 

                                                                                                              

 

 

 

 

 

 

Q No 50: Types of security testing:

  Vulnerability assessment (VA)

  Penetration testing (PT)

  Other security tests through various automated tools

  Code review (initiated in test environment)

Q No 51:What is security accreditation?

  Accreditation is the formal acceptance of the adequacy of the system’s overall security by the management (SANS)


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Q No 52: Topic No 267: Embedding Info Sec Lifecycle into SDLC ( Yeh pora topic important hai)

  The systems development life-cycle (SDLC) should embed the Information Security Activities forming a sec-SDLC (secure SDLC)

  Software Assurance Maturity Model (SAMM) developed by OWASP

  A guide to building security into software development

 

Q No 53: Topic No 270: Embedding Info Sec In to Project Management

  PMIs five phases of project management:

  Initiate

  Plan

  Executing

  Controlling

  Closing

Q No 54: Topic No 272: Different Types Of Security Assessments

  Vulnerability assessment

  Penetration test

  Audits

  White box/grey box/ black box assessments

  Risk assessment

  Threat assessment

  Bug bounty

  Red team

Q No 55: Topic No 278: Benefits Of The Security Transformation

Key Benefits:– Prevention of attacks– Prevention of fraud & pilferage– A reliable & robust IT setu

Impact of attacks: Loss of market goodwill–  Loss of customer confidence


 

 

 

        Regulatory fines,     legal consequences

  Prevention Of Fraud & Piiferage:

An effective Information Security Program makes it harder to conduct fraud, abuse, or misuse without getting detected

  Controls in business process

  Audits

A Reiiabie & Robust IT Setup:– Business continuity & DR– Redundancy– Backups– Capacity management – Change management

 

 

 

 

 

 

 

What are Five steps in business continuity plan management. Types of network redundancy.

Q No 56: What are objective of applying Cryptography ( See topic no 218)

Topic No 218: ISO27001:2013 Controls Appendix; Part 5 In this module lets look at ISO27001:2013 (ISMS) related to cryptography, and physical & environmental security.

A.10.1  CRYPTOoRAPHIC CONTROLS

A.10.1.1  POLICY ON THE USE OF CRYPTOGRAPHIC CONTROLS

A.10.1.2  KEY MANAGEMENT

A.10.1.2 KEY MANAGEMENT Control: A policy on the use, protection and lifetime of cryptographic keys shall be developed and implemented through their whole lifecycle.

Q No 57: Control as per ISO27001? Which type should use assest inventory long

: Deploy an automated asset inventory discovery tool and use it to build a preliminary inventory of systems connected to an organization’s public and private network

Maintain an asset inventory of all systems connected to the network and the network devices themselves, recording at least the network addresses, machine name(s), purpose of each system, an asset owner responsible for each device…

Q No 58::Write the name perform actitvities in control validation process?

Ans:The activities involve in control validation are typically referred as a “Control testing” or “Security control assessment

Mention the name of valid section healing in the appendix isms Types stored in assests inventory just names

Q No 59: Which action a rise management support of security transformation


 

 

 

Ans: Topic No 281: Actions To Raise Management Support • What can you do if your organizational management is not supporting for the Information Security Transformation Program? a) Understand the organizational business requirements and potential impact b) Understand regulations & sector best- practices c) Evaluate the security posture d) Assess the extent of work and resources required e) Present your report

Q No 60: Answer the following with respect to vulnerability.

Q; Which team have primary ownership Ans: Information security team

Q: which team tests the patches in environment? Ans: IT ops team

 

MCQ No 1---------- Technique / Solution can be used to analyze and block inbound email attachments

with malicious behavior.

A.      Enterprise antivirus

B.      Sandboxing

C.      Siem solution

D.      Fim solution

MCQ No2: OWASP software assurance maturity model (SAMM) undertakes software security testing and validation during …………

A.      Governance and deployment

B.      Governance and verification

C.      Verification deployment

D.      Construction and Governance

MCQ No 3: Creating awareness relating to policy and ISMS fall under---------- Clause.

A.      Support

B.      Operation

C.      Performance evaluation

D.      Leadership

MCQ No 4: Assigning resources, assignment rules and communicating roles fall under------ clause.

A.      Support

B.      Leadership

C.      Performance evaluation

D.      Operation

 

 

 

 

MCQ No 5: The objective of COBIT is to help organization--------------- --.

A.      Create optical values from it by balancing benefits with risk

B.      Implement a strong governance of it


 

 

 

C.      Manage it effectively while ensuring business continuity

D.      Create a single page it dashboard

MCQ No 6: In security transformation model ownership of validation of controls lies with

A.      IT operation team

B.      Business team

C.      Info security or consultant

D.      IT help desk team

MCQ No 7: where should source code be kept as best practice?

A.      Access control system

B.      Change control system

C.      Version control system

D.      Source control system

MCQ No 8: As per ISO27001 Operating procedure should be

A.      Confidential

B.      Verbally communicated

C.      Decided on adhoc basis

D.      Documented and available to who need them

 

 

MCQ No 9: It seems to conducting a successful security transformation project is more challenging in a?

A.      Large size organization

B.      Medium size organization

C.      Small sized organization

D.      Environment where multiple sites are present

 

 

 

 

MCQ No 10: Stage 2 of security transformation refers to

A.      Security Governance

B.      Security engineering

C.      Security hardening


 

 

 

D.      Vulnerability management

MCQ No 11--------- should be used to ensure that critical system files have not been altered.

A.      CIS cat pro

B.      Qualys vulnerability scanner

C.      Security information and event monitoring tools

D.      File integrity monitoring tool

MCQ No 12: An authentic information head always -----------

A.      Take credit of every thing

B.      Never admits mistakes and failure

C.      Give credit where it is due

D.      Very strict and disciplined

MCQ No 13: Network performance degradation can be faced in--------- step of VM cycle.

A.      Preparing the scanner

B.      Analyzing the asset

C.      Running the scanner

D.      Applying the patches

MCQ No 14----------- category vulnerabilities have the highest severity in Qualys scan.

A.      Level 2      ( Not sure )

B.      Level 3

C.      Level 4

D.      Level 5

MCQ No15: ISO31000 guidelines are centered on-------- ?

A.      Organization context

B.      Leadership and commitment

C.      Planning

D.      operation

MCQ No 16------------ plays an instrumental role in success of security transformation program.

A.      IT team lead by CIO

B.      Business team

C.      Internal team


 

 

 

D.      Highest management

MCQ No17-------- should be deployed to limit and control that which devices can be connected to the

network?

A.      802.1x

B.      802.11g

C.      802.11b

D.      802.11n

MCQ No 18: all network traffic to or from internet must pass through-------- to filter unauthenticated

connections.

A.      Application layering proxy

B.      Session layer filtering proxy

C.      Network layer filtering proxy

D.      System layer filtering proxy

MCQ No 19: in which phase of Security assessment, assessment method based on report format are decided

A.      Report finding

B.      Build plan, scope and objectives

C.      Assign role

D.      Conduct assessment

MCQ No 20: Automated tool should be used to verify and compare the network device configuration with

A.      Approved security configuration

B.      Recommended security configuration by vendor

C.      Latest security configuration released by vendor

D.      Default security configuration released by vendor

MCQ No 21: Under security transformation model which team is responsible for validation of control ?

A.      Business team

B.      Info security team or consultant

C.      IT operation team

D.      IT help desk team


x

 

 

MCQ No 22: The computer security resources center (CSRC) website guides user to---- resources?

A.      CIS resources on computer , cyber, information security and privacy

B.      SANS resources on computer, cyber, information security and privacy

C.      NITS resources on computer , cyber, information security and privacy

D.      PCI resources on computer , cyber, information security and privacy MCQ No 23: Complex password should be enforced to survive--------- ?

A.      Dictionary attack

B.      Injection attack

C.      DOS attack

D.      Phishing attack

MCQ No 24-------------- activities are carried out in phase 1 (Pilot phase) of information security

transformation program?

A.      Perform hardening of Key IT asset in Test environment

B.      Understand origination and its security issues

C.      Develop ISMC

D.      Identify assets for various phases

MCQ No 25: Candidness quality of information security head means that he-- ?

A.      Promote performance and merit

B.      Encourage-solo flight of team member

C.      Honesty and straight talk

D.      Adjust players in right position

 

 

 

 

 

 

MCQ No 26------------- protocol used for Assigning address dynamically?

A.      DCP

B.      HTTP

C.      DHCP

D.      IP


 

 

 

MCQ No 27------- Team has primary ownership of vulnerability management process?

A.      Information security team.

B.      IT operation team

C.      Business team

D.      Risk and compliance team

MCQ No 28-------- Rules are mentioned relate to C++ security hardening?

A.      Seven

B.      Eight

C.      Nine

D.      Ten

MCQ No 29------- is goal f performing audit

A.      Testing Security that is Assumed to be secure

B.      Technical assessment design to achieve specific goals

C.      To fix as many things are possible and efficiently as possible

D.      Focuses on how on existing configuration compare to standard

MCQ No 30. Under security transformation model which team is responsible for implementing controls?

A.      It operation team

B.      Security consultant

C.      Risk compliance team

D.      Business team

MCQ No 31: In--------- assessment tester has full access to all internal information about the target?

A.      White box assessment

B.      Grey box assessment

C.      Black box assessment

D.      Risk assessment

MCQ No 32-------- assessment is designed to determine whether an attacker can achieve specific goals

when facing your current security posture?

A.      Threat assessment

B.      Bug bounty hunting

C.      Penetration testing


 

 

 

D.      Red team exercise

MCQ No 33--------- are the key benefits of security transformation project implementation to an

organization?

A.      IT team get experience and aware of security

B.      Prevention of attack

C.      IT team gets incentives

D.      Management becomes aware of IT team capability

MCQ No 34--------- action is recommended for organization having very good security posture and have

a score higher than 85% ?

A.      Go for risk assessment

B.      Third party security review

C.      Go for ISO27001 certification

D.      Information security transformation program

 

 

MCQ No 35: Version of security related updates should be applied on network devices?

A.      Latest

B.      Default

C.      Latest and stable

D.      Oldest

 

 

MCQ No 36: Most of the problem associated with week security posture are due to----- ?

A.      Lack of awareness

B.      Lack of funds

C.      Lack of experience

D.      Lack of commitment

MCQ No 37: The information security policy need to be---------- ?

A.      Review once in three year

B.      Update once in five year

C.      Locked in drawer and kept confidential

D.      Regularly reviewed and approved for the changes


 

 

 

MCQ No 38: In case of financial sector------------ regulations need to be reviewed and understood to

raise management support for security transformation ?

A.      SBP

B.      PTA

C.      PEMRA

D.      PEPRA

MCQ No 39: Inventory of authorized and unauthorized software control require making a list of--- ?

A.      Authorized access and version

B.      Authorized operating system and version

C.      Authorized software and version

D.      Unauthorized software and version

MCQ No 40: Which principle should be used when setting up a user in data base?

A.      Principle of normal user

B.      Principle of administrative user

C.      Principle of least privilege

D.      Principle of highest privilege

 

Risk rating is assign to vu or the basis of two criteria. You require just point out crietwra? ( Search this on own basis from chat gpt)

 

 

Post a Comment

0 Comments