Domain1 Flashcards

1
Q

If its indicate best practices and it is discretionary

A

guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the attacker pulled several pieces of generic info to determine a specific sensitive value

A

Inference attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

siphon off minute of money to accumulate large amount of funds

A

Salami attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the attacker laters or change the contents of database

A

Data Diddling attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

framework is broadly adopted by thread modeling and threat intelligence org and widely used in many software packages and tools

MITRE’s ATTACK
STRIDE
PASTA

A

MITRE’s ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an individual should have the minimum set of permission to carry out their work

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

no single person should have the right to perform two distinct task

A

Separation of Duty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

notifications posted at each door reminding employees to be careful in allowing people

A

Directive control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used when controls like lock are not sufficient and people need to put another control like signs,alarms.

A

Compensating Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__ rely on a preponderance of evidence

A

Civil case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

must be proven beyond reasonable doubt

A

Criminal case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many years?
Patents
Copyright
Trademarks
Trade secret

A

Patents has shortest duration which is 20years; Copyright last 70years; Trademarks renewable indefintely and trade secret no expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After risk acceptance strategy what is next?

A

After risk acceptance strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Requiring callback authorizations on voice only requests are sample of

A

social engineering attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BCP training should be done

quarterly
semi annual
annually

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a counter terrorism that expand ability of US LAW enforcement to use electronic monitoring with less judicial oversight

A

USA Patriotic ACT

17
Q

attempts to resolve dispute between two parties such as private individual or corporate entities

A

Civil investigation

18
Q

Occurs when an individual who otherwise has no intention of commiting a crime is lured in doing so at urge of law enforcement

A

Entrapment

19
Q

Occurs wen person is already planning to commit a crime is eventually lured into doing it

A

Enticement

20
Q

defines the technical aspect of a security program including hardware and software and it is mandatory

A

Standard document

21
Q

Policy should be review every

quarterly
semi annual
annually

A

Annually

22
Q

Gleaning information in printed documents

A

Dumpster diving

23
Q

registering a domain like well known domain(GOOOGEL.com) to make a mistake

A

Typosquating

24
Q

enables company in US to process info of individuals in EU member nation

A

EU US Privacy Sheild Framwork

25
Q

Usually supplements procedures and present more details on how to perform the procedures and it is mandatory

A

Standard

26
Q

protects the expression of the idea of the resource

A

Copyright

27
Q

Risk assessment methodology typically employed by small teams from IT and business areas to conduct risk analysis
and commonly used by private sector

A

OCTAVE

28
Q

Is used to discover complex failure modes that maybe involved multiple systems or subsystems

A

Fault tree analysis

29
Q

NIST 800-30 is use to?

A

to assess risk

30
Q

is a DNS poisoning attack that attempt to modify a DNS cache by providing invalid information to a DNS server

A

Pharming attack

31
Q

is using image; waterhole targets specific group of users infecting a website they like to visit

A

Clickjacking

32
Q

Data at rest protection?

RSA
SHA-256
AES 256
D-H

A

AES256 and Data custodians backing up data or doing maintenance