d.
Security impact analyses80. d.
Security impact analyses are conducted in the continuous monitoring phase whenever there are changes to the information system. The other three choices are part of the security accreditation phase, which comes before the continuous monitoring phase.81. Which of the following is
not a usual common error or vulnerability in information systems?a.
Encryption failuresb.
Buffer overflowsc.
Format string errorsd.
Failing to check input for validity81. a.
Usually, encryption algorithms do not fail due to their extensive testing, and the encryption key is getting longer making it more difficult to break into. Many errors reoccur, including buffer overflows, race conditions, format string errors, failing to check input for validity, and computer programs being given excessive access privileges.82. Which of the following is
not the responsibility of the configuration manager?a.
Documenting the configuration management planb.
Approving, denying, or deferring changesc.
Evaluating configuration management metric informationd.
Ensuring that an audit trail of changes is documented82. c.
Evaluating configuration management metric information is the responsibility of the configuration control review board, whereas the other three choices are responsibilities of the configuration manager. 83. Which of the following tasks are performed during continuous monitoring step of the configuration management (CM) process?
1.
Configuration verification tests2.
System audits3.
Patch management4.
Risk managementa.
1 and 2b.
2 and 3c.
1, 2, and 3d.
1, 2, 3, and 483. d.
The configuration management (CM) process calls for continuous system monitoring to ensure that it is operating as intended and that implemented changes do not adversely impact either the performance or security posture of the system. Configuration verification tests, system audits, patch management, and risk management activities are performed to achieve the CM goal. 84. Which of the following levels of the software capability maturity model (CMM) is the most basic in establishing discipline and control in the software development process?
a.
Initial levelb.
Defined levelc.
Repeatable leveld.
Managed level84. c.
The Software Engineering Institute (SEI) is a nationally recognized, federally funded research and development center established in the United States to address software development issues. It developed a process maturity framework that would help organizations improve their software development process. In general, the CMM serves as an indicator of the likely range of cost, schedule, and quality results to be achieved by system development projects within an organization. In the repeatable level, basic project management processes are established to track cost, schedule, and functionality. The necessary process discipline is in place to repeat earlier successes on projects with similar applications. The other three choices are not applicable because the correct answer is based on the definition of CMM levels. 85. An unauthorized user has successfully accessed a computer-based application system. Which of the preventive controls has failed to work?
a.
Compatibility testsb.
Validity checksc.
Security label checksd.
Confidentiality tests85. a.
As a part of preventive controls, compatibility tests are used to determine whether an acceptable user is allowed to proceed in the system. This test focuses on passwords, access rules, and system privileges.A validity check is incorrect because it tests for the accuracy of codes such as state, tax rates, and vendor number. A security label check is incorrect because it tests for the specific designation assigned to a system resource such as a file, which cannot be changed except in emergency situations. A confidentiality test is incorrect because it ensures that data is disclosed only to authorized individuals.
86. In a distributed computing environment, replicated servers could have negative impact on which of the following?
a.
Fault-tolerant mechanismsb.
Availabilityc.
Scalabilityd.
Recoverability