5.1 & 5.2 Flashcards

1
Q

Control Categories

A

Managerial Controls
Operational Controls
Technical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What control is responsible for the address security design and implementation

A

Managerial controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who implements operational controls

A

People associated with the operational control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False technical controls are implemented via systems

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 6 control types

A

Preventive, Detective, Corrective, Deterrent, Compensating, and Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Motion Detectors, IDS/IPS are all part of what control type

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some attributes of a preventive control

A

Physically control access
Door lock
Security guards
Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What access control is meant to mitigate damage

A

Corrective control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is the purpose of deterrent controls to discourage intrusion attempts? If, so list an attribute or method you would associate with deterrent controls. If the answer is not deterrent give the correct choice

A

Yes, that is the purpose. The use of security signs or a login banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This controls uses physical means like a fence or man traps

A

Physical security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What control type does not prevent an attack but instead initiates a restoration process like a backup power system or re-image

A

Compensating security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the CIS and what is it purpose

A

Center for Internet Security. It’s job is to improve cyber defenses. One way it improves cyber defense is through the twenty key actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the NIST RMF.

A

National Institute of Standards and Technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the six steps of the NIST RMF

A

– Step 1: Categorize - Define the environment
– Step 2: Select - Pick appropriate controls
– Step 3: Implement - Define proper implementation
– Step 4: Assess - Determine if controls are working
– Step 5: Authorize - Make a decision to
authorize a system
– Step 6: Monitor - Check for ongoing compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the National Institute Standards and Technology Cyber Security Framework
(NIST CSF)

A

Is a framework that helps organizations manage their cyber security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 4 ISO/IEC frameworks

A

ISO/IEC 27001
ISO/IEC 27002
ISO/IEC 27701
ISO/IEC 31000

17
Q

What are the responsibilities associated with the ISO/IEC 27001

A

Manages information security

18
Q

What are the responsibilities associated with the ISO/IEC 27002

A

It is a reference for a set of code practices for information security controls

19
Q

What are the responsibilities associated with the ISO/IEC 27701

A

process specific controls to help bridge the gap between privacy and security. Privacy Information Management System (PIMS)

20
Q

What are the responsibilities associated with the ISO/IEC 31000

A

International standards for risk management

21
Q

Name the two SSAE SOC 2 types

A

Type 1: Tests audits in place at a particular point in time

Type 2: Tests controls over a period of at least six consecutive months

22
Q

What is the CSA

A

Cloud Security Alliance is an organization that provides assurance in securing cloud computing