1. A security analyst is using the SCinformation system = [(confidentiality, impact), (integrity, impact), (availability, impact)]formula while performing risk analysis. What will this formula be used for?
A) to calculate SLE B) to calculate quantitative risk C) to calculate ALE D) to calculate the aggregate CIA score
2. What services allow for changes to an operating system to be detected by an authorized party?
A) attestation B) bonding C) verification D) sealing
3. What port number does HTTPS use?
A) 69 B) 443 C) 80 D) 23
4. Which of the following is an example of an incident?
A) account lockout for a single user account B) an invalid user account - s login attempt C) several invalid password attempts for multiple users D) a user attempting to access a folder to which he does nothave access
5. An organization has a research server farm with a value of $12,000. The exposure factor for a complete power failure is 10%.The annualized rate of occurrence that this will occur is 5%. What is the ALE for this event?
A) $1,200 B) $600 C) $60 D) $12,000
1. Right Answer: D Explanation: The formula given in the scenario is used to calculate the aggregate CIA score. To calculate ALE, you should multiply SLE Γ? ARO. To calculate SLE, you should multiply AV Γ? EF. Quantitative risk involves using SLE and ALE.
2. Right Answer: A Explanation: Attestation services allow an authorized party to detect changes to an operating system. Attestation services involve generating a certificate for the hardware that states what software is currently running. The computer can use this certificate to attest that unaltered software is currently executing.
3. Right Answer: B Explanation: When HTTPS is used, port 80 is not used. Rather, HTTPS uses port 443.
4. Right Answer: C Explanation: Several invalid password attempts for multiple users is an example of an incident. All the other examples are events.
5. Right Answer: C Explanation: ALE = SLE Γ? ARO = $1,200 Γ? 5% = $60 SLE = AV Γ? EF = $12,000 Γ? 10% = $1,200
Leave a comment