Missed Questions Flashcards

1
Q

Disabling certain system functions or shutting down the system when risks are identified is an example of:

A

Risk Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a document containing detailed information on potential cybersecurity risks?

A

Risk Register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an assessment tool used for prioritizing the severity of different risks? (2 answers)

A

Risk heat map & Risk matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Assessment of risk probability and its impact based on subjective judgment falls into the category of:

A

Qualitative risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the computing term used when an IoT (Internet of Things) device processes and makes decisions without the need to connect to the internet?

A

Edge computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the computing term for an IoT device that uses both cloud processing and/or it’s own processing power to perform its functions?

A

Fog computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Biometric Factors?

A
Fingerprint scanner
Retinal scanner
Iris scanner
Voice recognition
Facial recognition
Gait analysis (walking motion)
Vein scanners or vascular scanner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In regards to biometric acceptance rates, what are the three measurements?

A

FAR - False acceptance rate
FRR - False rejection rate
CER - Crossover error rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the CER? How is it achieved?

A

The accuracy of a biometric system where the FAR and FRR are equal. Adjust the sensitivity of the device to equalize the values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 A’s in multifactor authentication?

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are chain of trust and GPS readings considered legitimate factors for multifactor authentication?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What security control does a data backup fall under?

A

Operational control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What security control does a vulnerability assessment fall under?

A

Managerial security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Do CCTV’s (security cameras) fall under detective security controls?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of security control do login banners fall under?

A

Deterrent security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of security control is Sandboxing?

A

Compensating security control

17
Q

What can be used to validate the origin (provenance) of digital evidence?

A

Hashing

Checksums

18
Q

What is OSINT?

A

Open source intelligence

19
Q

What forensic utilities enables the extraction of RAM contents?

A

Memdump

20
Q

The process of searching, collecting, and securing electronic data with the intent of using it in a legal proceeding or investigation is known as

A

E-discovery

21
Q

What is a Faraday cage used for?

A

Electromagnetic Shielding!

22
Q

What is an all purpose printer considered?

A

A multi-functional device