Domain 1 set 5 Flashcards

(35 cards)

1
Q

Wassenaar Agreement

A

Export Restriction

No exporting strong encryption or bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARO

A

Annual Rate Of Occurrence

How often the threat is expected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EF

A

Exposure Factor

the % of loss that is expected from an risk event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset Value X Exposure Factor = ?

A

SLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

GLBA

A

Gramm -Leach - Bailey Act

Covers Financial institutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HIPAA

A

Health Insurance Portability and Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Typosquatting

A

URL Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cybersquatting

A

domain squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

STRIDE

A

Is a Threat categorization scheme from Microsoft

spoofing
tampering
repudiation
info disclosure
DOS attack
Elevation of privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The First step of a BCP should perform?

A

(BOA) Business Organization Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SOX

A

Sarbanes - Oxlet Act of 2002

Publicly traded companies have regulation on financial reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software code is a threat to what CIA

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code injection is a threat to what CIA

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogger is a threat to what CIA

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 CIA Confidentiality threats

A
  1. Attacks on Encryption
  2. Social Engineering
  3. Key Logger
  4. IOT internet of Things
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MOA /MOU

A

Memorandums of Agreement / understanding for Essential personnel

17
Q

IAAA

A
A frame work
Identification
Authentication
Authorization
Accountability
18
Q

IPS / IDS ensure what of CIA

19
Q

Patch management ensure what of CIA

20
Q

Entrapment is a ?

A

Solid legal defense strategy

21
Q

ISO 27799 standard is focused around?

A

Protecting PHI

22
Q

Exigent circumstance is?

A

Immediate threat to Human life or evidence destruction.

Only applies to law enforcement or “ under the color of law”

23
Q

IT logs and Documents are what type of Evidence?

A

Secondary Evidence

24
Q

When you see something, what type of evidence?

A

Direct Evidence

25
Counterfeiting is ?
an attack on trademarks
26
Allows search and seizure without immediate disclosure
Patriot Act of 2001
27
The Control Framework that is focused on IT service management
ITIL
28
"The Majority of the proof" relate to what law?
Civil Law
29
To much integrity what will suffer?
Availability
30
Tangible and physical objects are what type of evidence
Real evidence Hard drives, usb sticks but not the data on them.
31
To much confidentiality what will suffer?
Availability
32
Honeypots and honeynets need to be appoved by who?
Senior management and legal department
33
To much Availability what will suffer?
confidentiality and integrity
34
Password hashing with salting is what part of the CIA?
Integrity
35
The 3 Rules of HIPAA
1. privacy Rule 2. security Rules 3. Breach notification Rules