Copyright holders, content providers, and manufacturers use digital rights management (DRM) in order to limit usage of digital media and devices. Which of the following security challenges does DRM include? Each correct answer represents a complete solution. Choose all that apply.
Answer : A, C, D
The security challenges for DRM are as follows:
Key hiding: It prevents tampering attacks that target the secret keys. In the key hiding process, secret keys are used for
authentication, encryption, and node-locking.
Device fingerprinting: It prevents fraud and provides secure authentication. Device fingerprinting includes the summary of hardware
and software characteristics in order to uniquely identify a device.
OTA provisioning: It provides end-to-end encryption or other secure ways for delivery of copyrighted software to mobile devices.
Answer B is incorrect. Access control is not a security challenge for DRM.
You work as a project manager for BlueWell Inc. You are preparing to plan risk responses for your project with your team. How many risk response types are available for a negative risk event in the project?
Answer : D
There are four risk responses available for a negative risk event.
The risk response strategies for negative risks are:
Avoid: It involves altering the project management plan to remove the threats completely.
Transfer: It requires shifting some or all of the negative effects of a threat including the ownership of response, to a third party.
Mitigate: It implies a drop in the probability and impact of an unfavorable risk event to be within suitable threshold limits.
Accept: It delineates that the project plan will not be changed to deal with the risk. Management may develop a contingency plan if the
risk occurs. It is used for both negative and positive risks.
Answer C is incorrect. There are four responses for negative risk events.
Answer A is incorrect. There are four, not three, responses for negative risk events. Do not forget that acceptance can be used for
negative risk events.
Answer B is incorrect. There are seven total risk responses, four of which can be used for negative risk events.
You are the project manager of the GHY project for your organization. You are about to start the qualitative risk analysis process for the project and you need to determine the roles and responsibilities for conducting risk management. Where can you find this information?
Answer : C
The risk management plan defines the roles and responsibilities for conducting risk management.
A Risk management plan is a document arranged by a project manager to estimate the effectiveness, predict risks, and build response plans
to mitigate them. It also consists of the risk assessment matrix.
Risks are built in with any project, and project managers evaluate risks repeatedly and build plans to address them. The risk management
plan consists of analysis of possible risks with both high and low impacts, and the mitigation strategies to facilitate the project and avoid
being derailed through which the common problems arise. Risk management plans should be timely reviewed by the project team in order to
avoid having the analysis become stale and not reflective of actual potential project risks. Most critically, risk management plans include a risk
strategy for project execution.
Answer A is incorrect. The risk register does not define the risk management roles and responsibilities.
Answer D is incorrect. Enterprise environmental factors may define the roles that risk management officials or departments play in the
project, but the best answer for all projects is the risk management plan.
Answer B is incorrect. The staffing management plan does not define the risk management roles and responsibilities.
Which of the following statements about a host-based intrusion prevention system (HIPS) are true?
Each correct answer represents a complete solution. Choose two.
Answer : C, D
A host-based intrusion prevention system (HIPS) is an application usually employed on a single computer. It complements traditional finger-
print-based and heuristic antivirus detection methods, since it does not need continuous updates to stay ahead of new malware. When a
malicious code needs to modify the system or other software residing on the machine, a HIPS system will notice some of the resulting changes
and prevent the action by default or notify the user for permission. It can handle encrypted and unencrypted traffic equally and cannot detect
events scattered over the network.
Answer B is incorrect. Network address translation (NAT) is a technique that allows multiple computers to share one or more IP
addresses. NAT is configured at the server between a private network and the Internet. It allows the computers in a private network to share
a global, ISP assigned address. NAT modifies the headers of packets traversing the server. For packets outbound to the Internet, it translates
the source addresses from private to public, whereas for packets inbound from the Internet, it translates the destination addresses from
public to private.
Answer A is incorrect. Network intrusion prevention system (NIPS) is a hardware/software platform that is designed to analyze, detect,
and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop malicious
traffic. NIPS is able to detect events scattered over the network and can react.
Which of the following is an attack with IP fragments that cannot be reassembled?
Answer : B
Teardrop is an attack with IP fragments that cannot be reassembled. In this attack, corrupt packets are sent to the victim's computer by using
IP's packet fragmentation algorithm. As a result of this attack, the victim's computer might hang.
Answer D is incorrect. Smurf is an ICMP attack that involves spoofing and flooding.
Answer C is incorrect. Dictionary attack is a type of password guessing attack. This type of attack uses a dictionary of common words to
find out the password of a user. It can also use common words in either upper or lower case to find a password. There are many programs
available on the Internet to automate and execute dictionary attacks.
Answer A is incorrect. A password guessing attack occurs when an unauthorized user tries to log on repeatedly to a computer or
network by guessing usernames and passwords. Many password guessing programs that attempt to break passwords are available on the
Internet. Following are the types of password guessing attacks:
Brute force attack
Dictionary attack
Which of the following acts is used to recognize the importance of information security to the economic and national security interests of the United States?
Answer : D
The Federal Information Security Management Act of 2002 is a United States federal law enacted in 2002 as Title III of the E-Government Act
of 2002. The act recognized the importance of information security to the economic and national security interests of the United States. The
act requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the
information and information systems that support the operations and assets of the agency, including those provided or managed by another
agency, contractor, or other source.
FISMA has brought attention within the federal government to cybersecurity and explicitly emphasized a 'risk-based policy for cost-effective
security'. FISMA requires agency program officials, chief information officers, and Inspectors Generals (IGs) to conduct annual reviews of the
agency's information security program and report the results to Office of Management and Budget (OMB). OMB uses this data to assist in its
oversight responsibilities and to prepare this annual report to Congress on agency compliance with the act.
Answer B is incorrect. The Lanham Act is a piece of legislation that contains the federal statutes of trademark law in the United States.
The Act prohibits a number of activities, including trademark infringement, trademark dilution, and false advertising. It is also called Lanham
Trademark Act.
Answer A is incorrect. The Computer Misuse Act 1990 is an act of the UK Parliament which states the following statement:
Unauthorized access to the computer material is punishable by 6 months imprisonment or a fine 'not exceeding level 5 on the standard
scale' (currently 5000).
Unauthorized access with the intent to commit or facilitate commission of further offences is punishable by 6 months/maximum fine on
summary conviction or 5 years/fine on indictment.
Unauthorized modification of computer material is subject to the same sentences as section 2 offences.
Answer C is incorrect. The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1984 intended to reduce
cracking of computer systems and to address federal computer-related offenses. The Computer Fraud and Abuse Act (codified as 18 U.S.C.
1030) governs cases with a compelling federal interest, where computers of the federal government or certain financial institutions are
involved, where the crime itself is interstate in nature, or computers used in interstate and foreign commerce. It was amended in 1986, 1994,
1996, in 2001 by the USA PATRIOT Act, and in 2008 by the Identity Theft Enforcement and Restitution Act. Section (b) of the act punishes
anyone who not just commits or attempts to commit an offense under the Computer Fraud and Abuse Act but also those who conspire to do
so.
Which of the following are the tasks performed by the owner in the information classification schemes?
Each correct answer represents a part of the solution. Choose three.
Answer : A, B, D
The different tasks performed by the owner are as follows:
He makes the original determination to decide what level of classification the information requires, which is based on the business
requirements for the safety of the data.
He reviews the classification assignments from time to time and makes alterations as the business needs change.
He delegates the responsibility of the data safeguard duties to the custodian.
He specifies controls to ensure confidentiality, integrity and availability.
Answer C is incorrect. This task is performed by the custodian and not by the owner.