Page 1558 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1558

email servers, and on each system. More than one anti-malware
                    application on a single system isn’t recommended. A single

                    solution for the whole organization is often ineffective because
                    malware can get into the network in more than one way. Content
                    filtering at border gateways (boundary between the internet and
                    the internal network) is a good partial solution, but it won’t catch
                    malware brought in through other methods.

               11.  B. Penetration testing should be performed only with the

                    knowledge and consent of the management staff. Unapproved
                    security testing could result in productivity loss, trigger emergency
                    response teams, and result in legal action against the tester
                    including loss of employment. A penetration test can mimic
                    previous attacks and use both manual and automated attack
                    methods. After a penetration test, a system may be reconfigured to
                    resolve discovered vulnerabilities.


               12.  B. Accountability is maintained by monitoring the activities of
                    subjects and objects as well as monitoring core system functions
                    that maintain the operating environment and the security
                    mechanisms. Authentication is required for effective monitoring,
                    but it doesn’t provide accountability by itself. Account lockout
                    prevents login to an account if the wrong password is entered too
                    many times. User entitlement reviews can identify excessive

                    privileges.

               13.  B. Audit trails are a passive form of detective security control.
                    Administrative controls are management practices. Corrective
                    controls can correct problems related to an incident, and physical
                    controls are controls that you can physically touch.

               14.  B. Auditing is a methodical examination or review of an
                    environment to ensure compliance with regulations and to detect

                    abnormalities, unauthorized occurrences, or outright crimes.
                    Penetration testing attempts to exploit vulnerabilities. Risk
                    analysis attempts to analyze risks based on identified threats and
                    vulnerabilities. Entrapment is tricking someone into performing an
                    illegal or unauthorized action.

               15.  A. Clipping is a form of nonstatistical sampling that reduces the
   1553   1554   1555   1556   1557   1558   1559   1560   1561   1562   1563