CIS Critical Security Controls Flashcards

I1 M3

1
Q

Actively track & manage all IT assets connected to a company’s IT infrastructure physically or virtually

A

(1) Inventory & Control of Enterprise Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Actively manage all software on the network to ensure only authorized software is installed & can execute on company devices

A

(2) Inventory & Control of Software Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Securely manage the life cycle of data; Identify, classify, securely handle, retain, & dispose of data to prevent data loss & unauthorized access

A

(3) Data Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Establish & maintain secure configurations for hardware & software to reduce vulnerability

A

(4) Secure Configuration of Enterprise Assets & Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Manage credentials & authorization for user accounts, privileged user accounts, & service accounts for company hardware & software applications

A

(5) Account Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Limit access to assets & data based on role & need-to-know to enforce least privelege

A

(6) Access Control Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Continuously identify & remediate vulnerabilities to reduce the risk of exploitation

A

(7) Continuous Vulnerability Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Collect, manage, & review audit logs to detect & investigate suspicious activity

A

(8) Audit Log Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Implement controls to protect against threats delivered via email & web browsers

A

(9) Email & Web Browser Protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Preventing the installation & propagation of malware onto company assets & its network

A

(10) Malware Defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Established data backup, testing, & restoration process that allow organizations to effectively recover company assets to a pre-incident state

A

(11) Data Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Establishes procedures & tools for managing & securing a company’s network infrastructure

A

(12) Network Infrastructure Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Monitor the network for unusual or malicious activity & respond to thread in real-time

A

(13) Network Monitoring & Defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provide ongoing training to develop security skills & awareness for all personnel

A

(14) Security Awareness & Skills Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Evaluate & manage risks associated with third-party service providers & ensure they meet security requirements

A

(15) Service Provider Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Establish safeguards that manage the entire life cycle of the software that is acquired, hosted, or developed in-house to detect, deter, & resolve cybersecurity weaknesses before they are exploited

A

(16) Application Software Security

16
Q

Develop & maintain an incident response plan to detect, respond to, & recover from cybersecurity incidents

A

(17) Incident Response Management

17
Q

Regularly test systems through simulated attacks to identify weaknesses in controls & improve security posture

A

(18) Penetration Testing