Domain1 Flashcards

(32 cards)

1
Q

If its indicate best practices and it is discretionary

A

guideline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the attacker pulled several pieces of generic info to determine a specific sensitive value

A

Inference attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

siphon off minute of money to accumulate large amount of funds

A

Salami attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the attacker laters or change the contents of database

A

Data Diddling attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

framework is broadly adopted by thread modeling and threat intelligence org and widely used in many software packages and tools

MITRE’s ATTACK
STRIDE
PASTA

A

MITRE’s ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an individual should have the minimum set of permission to carry out their work

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

no single person should have the right to perform two distinct task

A

Separation of Duty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

notifications posted at each door reminding employees to be careful in allowing people

A

Directive control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used when controls like lock are not sufficient and people need to put another control like signs,alarms.

A

Compensating Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__ rely on a preponderance of evidence

A

Civil case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

must be proven beyond reasonable doubt

A

Criminal case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many years?
Patents
Copyright
Trademarks
Trade secret

A

Patents has shortest duration which is 20years; Copyright last 70years; Trademarks renewable indefintely and trade secret no expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After risk acceptance strategy what is next?

A

After risk acceptance strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Requiring callback authorizations on voice only requests are sample of

A

social engineering attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BCP training should be done

quarterly
semi annual
annually

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a counter terrorism that expand ability of US LAW enforcement to use electronic monitoring with less judicial oversight

A

USA Patriotic ACT

17
Q

attempts to resolve dispute between two parties such as private individual or corporate entities

A

Civil investigation

18
Q

Occurs when an individual who otherwise has no intention of commiting a crime is lured in doing so at urge of law enforcement

19
Q

Occurs wen person is already planning to commit a crime is eventually lured into doing it

20
Q

defines the technical aspect of a security program including hardware and software and it is mandatory

A

Standard document

21
Q

Policy should be review every

quarterly
semi annual
annually

22
Q

Gleaning information in printed documents

A

Dumpster diving

23
Q

registering a domain like well known domain(GOOOGEL.com) to make a mistake

24
Q

enables company in US to process info of individuals in EU member nation

A

EU US Privacy Sheild Framwork

25
Usually supplements procedures and present more details on how to perform the procedures and it is mandatory
Standard
26
protects the expression of the idea of the resource
Copyright
27
Risk assessment methodology typically employed by small teams from IT and business areas to conduct risk analysis and commonly used by private sector
OCTAVE
28
Is used to discover complex failure modes that maybe involved multiple systems or subsystems
Fault tree analysis
29
NIST 800-30 is use to?
to assess risk
30
is a DNS poisoning attack that attempt to modify a DNS cache by providing invalid information to a DNS server
Pharming attack
31
is using image; waterhole targets specific group of users infecting a website they like to visit
Clickjacking
32
Data at rest protection? RSA SHA-256 AES 256 D-H
AES256 and Data custodians backing up data or doing maintenance