The systems in the other three choices are internal systems to an organization that are developed with a specific business purpose and with adequate security controls. General support system is an interconnected set of information resources under the same direct management control that share common functionality, including hardware, software, data/information, applications, communications, and people. An information system is classified as a major system when its development, maintenance, and operating cost are high and when it has a significant role in the overall operations of an organization.
171. Which of the following are required for an information system to become resilient?
1.
Detect and respond capabilities2.
Manage single points-of-failure3.
Implement a response strategy4.
Develop a reporting systema.
1 and 2b.
2 and 3c.
1 and 3d.
1, 2, 3, and 4172. Which of the following does
a.
Passwordsb.
Disk mirroringc.
Audit trailsd.
Redundant array of independent diskDisk mirroring, redundant array of independent disk (RAID), and passwords are the first line-of-defenses. Disk mirroring and RAID act as the first line-of-defense for protecting against data loss. Incorrect entry of a password will be rejected thus disallowing an unauthorized person to enter into a computer system. Both disk mirroring and RAID provide redundant services.
The line-of-defenses are security mechanisms for limiting and controlling access to and use of computer system resources. They exercise a directing or restraining influence over the behavior of individuals and the content of computer systems. The line-of-defenses form a core part of defense-in-depth strategy or security-in-depth strategy.
173. Which of the following is the last (final) line-of-defense for the defense-in-depth strategy?
a.
Perimeter-based securityb.
Network-based computing environmentc.
Host-based computing environmentd.
Host-based securityPerimeter-based security is incorrect because it is a technique of securing a network by controlling accesses to all entry and exit points of the network. Network-based computing environment is incorrect because it focuses on effective control and monitoring of data flow into and out of the enclave, which consists of multiple LANs, ISDNs, and WANs connected to the Internet. It provides a first line-of-defense. Host-based security is incorrect because it is a technique of securing an individual system from attacks.
The line-of-defenses are security mechanisms for limiting and controlling access to and use of computer system resources. They exercise a directing or restraining influence over the behavior of individuals and the content of computer systems. The line-of-defenses form a core part of defense-in-depth strategy or security-in-depth strategy.
174. What do fundamental goals of the defense-in-depth include?
a.
Sneak and peekb.
Trap and tracec.
Detect and respondd.
Protect and detect