1. Right Answer: C
Explanation: Management should ensure that all information assets (data and systems) have an appointed owner who makes decisions about classification and access rights.System owners typically delegate day-to-day custodianship to the systems delivery/operations group and security responsibilities to a security administrator.Owners, however, remain accountable for the maintenance of appropriate security measures.
2. Right Answer: A
Explanation: Having access to the database could provide access to database utilities, which can update the database without an audit trail and without using the application.Using SQL only provides read access to information, in a networked environment, accessing the database remotely does not make a difference.What is critical is what is possible or completed through this access. To access a database, it is necessary that a user is authenticated using a user ID.
3. Right Answer: B
Explanation: Access control lists are the authorization tables that document the users who have been given permission to use a particular system resource and the types of access they have been granted. The other choices would not document who has been given permission to use (access) specific system resources.
4. Right Answer: B
Explanation: The most effective control is to ensure that the granting of temporary access is based on services to be provided and that there is an expiration date (hopefully automated) associated with each ID. The SLA may have a provision for providing access, but this is not a control; it would merely define the need for access.Vendors require access for a limited period during the time of service. However, it is important to ensure that the access during this period is monitored. Deleting these user, I Dafter the work is completed is necessary, but if not automated, the deletion could be overlooked.
5. Right Answer: D
Explanation: The use of a single user ID by more than one individual precludes knowing who in fact used that ID to access a system; therefore, it is literally impossible to hold anyone accountable. All user IDs, not just shared IDs, can be used by unauthorized individuals. Access management would not be any different with shared IDs, and shared user IDs do not necessarily have easily guessed passwords.
Leave a comment