Day1 12-21-2018 Flashcards

@27th MArch

1
Q

Build a business case

A
  1. Justify the investment of time and money
  2. Balance security and busines concerns
  3. Achieve confidentiality integrity and availiability goals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Florian receives a flyer from a federal agency announcing that a new administrative law will affect his business operations. Where should he go to find the text of the law?

A

The Code of Federal Regulations (CFR) is the codification of the general and permanent rules and regulations (sometimes called administrative law) published in the Federal Register by the executive departments and agencies of the federal government of the United States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trademark process |

A

USPTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk Acceptance

A

Risk Acceptance: Risk acceptance does not reduce any effects however it is still considered a strategy. This strategy is a common option when the cost of other risk management options such as avoidance or limitation may outweigh the cost of the risk itself. A company that doesn’t want to spend a lot of money on avoiding risks that do not have a high possibility of occurring will use the risk acceptance strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Avoidance

A

Risk Avoidance: Risk avoidance is the opposite of risk acceptance. It is the action that avoids any exposure to the risk whatsoever. Risk avoidance is usually the most expensive of all risk mitigation options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Limitation

A

Risk Limitation: Risk limitation is the most common risk management strategy used by businesses. This strategy limits a company’s exposure by taking some action. It is a strategy employing a bit of risk acceptance along with a bit of risk avoidance or an average of both. An example of risk limitation would be a company accepting that a disk drive may fail and avoiding a long period of failure by having backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Transferrence

A

Risk Transference: Risk transference is the involvement of handing risk off to a willing third party. For example, numerous companies outsource certain operations such as customer service, payroll services, etc. This can be beneficial for a company if a transferred risk is not a core competency of that company. It can also be used so a company can focus more on their core competencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cold Side

A

In simple language, cold sites are mere empty operational spaces with basic facilities like raised floors, air conditioning, power and communication lines etc. On occurring of an incident and if the operations can do with a little down time, alternate facilities are brought to and set up in the cold site to resume operations. A cold site is the least expensive type of backup site for an organization to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Warm

A

A warm site is a compromise between hot and cold. These sites will have hardware and connectivity already established, though on a smaller scale than the original production site or even a hot site. Warm sites might have backups on hand, but they may not be complete and may be between several days and a week old. The recovery will be delayed while backup tapes are delivered to the warm site, or network connectivity is established and data is recovered from a remote backup site (Example: SAN.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HOT Side

A

A hot site is a duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data. Real time synchronization between the two sites may be used to completely mirror the data environment of the original site using wide area network links and specialized software. Following a disruption to the original site, the hot site exists so that the organization can relocate with minimal losses to normal operations in the shortest recovery tim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which one of the following individuals would be the most effective organizational owner for an information security program?

A

CIO CISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

soc1 vs soc2

A

The Service Organizations Control audit program includes business continuity controls in a SOC 2, but not SOC 1,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which one of the following laws requires that communications service providers cooperate with law enforcement requests?

A. ECPA

B. CALEAYour selection is incorrect

C. Privacy Act

D. HITECH Act

A

The Communications Assistance to Law Enforcement Act (CALEA) requires that all communications carriers make wiretaps possible for law enforcement officials who have an appropriate court order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What principle of information security states that an organization should implement overlapping security controls whenever possible?

A. Least privilege

B. Separation of duties

C. Defense in depthYour selection is incorrect

D. Security through obscurity

A

Defense in depth states that organizations should have overlapping security controls designed to meet the same security objectives whenever possible. This approach provides security in the event of a single control failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ben is responsible for the security of payment card information stored in a database. Policy directs that he remove the information from the database, but he cannot do this for operational reasons. He obtained an exception to policy and is seeking an appropriate compensating control to mitigate the risk. What would be his best option?

A. Purchasing insurance

B. Encrypting the database contentsYour selection is incorrect

C. Removing the data

D. Objecting to the exception

A

Ben should encrypt the data to provide an additional layer of protection as a compensating control. The organization has already made a policy exception, so he should not react by objecting to the exception or removing the data without authorization. Purchasing insurance may transfer some of the risk but is not a mitigating control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

sox

A

SOX A U.S. law that requires internal controls assessments including IT transaction flows for publicly traded companies.

17
Q

Chris is worried that the laptops that his organization has recently acquired were modified by a third party to include keyloggers before they were delivered. Where should he focus his efforts to prevent this?

A

Supply chain management can help ensure the security of hardware, software, and services that an organization acquires. Chris should focus on each step that his laptops take from the original equipment manufacturer to delivery.

18
Q

Q. 105 Which of the following is not typically included in a prehire screening process?

A. A drug test

B. A background check

C. Social media review

D. Fitness evaluationYour selection is incorrect

A

fitness

19
Q

Lawrence has been asked to perform vulnerability scans and a risk assessment of systems. Which organizational process are these more likely to be associated with?

A. A mergerYour selection is incorrect

B. A divestiture

C. A layoff

D. A financial audit

A

When organizations merge, it is important to understand the state of the security for both organizations. Running vulnerability scans and performing a risk assessment are both common steps taken when preparing to merge two (or more!) IT environments.

20
Q

A Security Controls Assessment (SCA) most often refers to a formal U.S. government process for assessing security controls and is often paired with a Security Test and Evaluation (ST&E) process. This means that Laura is probably part of a government organization or contractor.

A

Signing a noncompete NCA or nondisclosure agreement is typically done at hiring. Exit interviews, recovery of organizational property, and account termination are all common elements of a termination process.