Domain 1: Security Principles Flashcards
Which region enacted comprehensive legislation addressing personal privacy in 2016?
European Union
What is the purpose of implementing security controls in the risk management process?
To mitigate減輕 the risk to an acceptable level
If a pickpocket is a threat, what would be their attack vector?
Their technique and approach
How do companies that offer identity theft insurance manage their own financial risk?
By calculating premium payments against potential payouts
What term is used to refer to information that, when combined with other pieces of data, significantly narrows缩小 the possibility of association with more individuals?
Personally Identifiable Information (PII)个人身份信息
What potential risk can occur when a remote worker’s laptop is left unattended or unlocked?
Accidental introduction of unauthorized software with malware
In the United States, which act governs the privacy of medical information?
HIPAA
In e-commerce and electronic transactions, what does non-repudiation protect against?
Falsely虛假地 denying transactions
What is an “asset” in the context of risk management terminology?
Something in need of protection
Who is responsible for determining risk tolerance in an organization?
Executive management and board of directors
Executive management and board of directors
Evaluate the likelihood of the event and take appropriate actions to mitigate the risk
Which regulation grants data protection and control to individuals within the EU, regardless of citizenship?
General Data Protection Regulation (GDPR)
What role might security professionals play in risk assessment at a system level?
Assisting in risk assessment at a system level
Security professionals are likely to assist in risk assessment at a system level, focusing on process, control, monitoring, or incident response and recovery activities.
Who is responsible for identifying risks within an organization?
Employees at all levels of the organization
What is an example of a physical control?
Walls, fences, guards, locks
According to the code of ethics, what are information security professionals expected to uphold堅持?
Be honorable, honest, just and responsible within legal conduct
Multifactor authentication involves using two or more instances of different authentication factors.
Which of the following are considered a widely accepted factor for authentication?
Something you have
Something you are
Something you know
Kristal is the security administrator for a large online service provider. Kristal learns that the company is harvesting the personal data of its customers and sharing the data with local governments where the company operates, without the knowledge of the users, to allow the governments to persecute users on the basis of their political and philosophical beliefs.
The published user agreement states that the company will not share personal user data with any entities without the users’ explicit permission.
According to the ISC2 Code of Ethics, to whom does Kristal ultimately owe a duty in this situation?
The users
What is the primary purpose of the ISC2 Code of Ethics?
Ensuring the safety and welfare of society and the common good
While taking the certification exam for this certification, you notice another candidate for the certification cheating.
What should you do?
Report the candidate to ISC2
What type of authentication process is used at the bank with an ATM card?
Two-factor authentication
The use of an ATM card (something you have) and a PIN (something you know) at the bank, providing two different factors of authentication.
What type of cyber attack often targets the availability of data?
Ransomware attacks勒索軟體
Ransomware attacks often target the availability of data by locking up systems and blocking access to vital information and services. Access is typically restored only after a ransom is paid.
What does knowledge-based authentication involve?
Differentiating between authorized and unauthorized users using a passphrase or secret code
passphrase or secret code (e.g., PIN or password)
What is the purpose of using a risk matrix?
To prioritize risks based on likelihood and impact