Information Security Governance Flashcards

1
Q

Which CIA security pillar often uses encryption?

  • Availability
  • Auditing
  • Integrity
  • Confidentiality
A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which chain of custody step deals with user sign-in and sign-out logs?

  • Transfer
  • Collection
  • Storage
  • Access
A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which password policy setting best protects against dictionary password attacks?

  • Account lockout
  • Password expiry
  • Password length
  • Password history
A

Account lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which body normally approves or rejects change requests?

  • Chief Financial Officer (CFO)
  • Change Advisory Board (CAB)
  • Chief Executive Officer (CEO)
  • Configuration Advisory Board (CAB)
A

Change Advisory Board (CAB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of network connection is commonly used to link offices together without going over the Internet?

  • Site-to-site VPN
  • IPv6
  • Dedicated network circuit
  • User-to-site VPN
A

Dedicated network circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which SLA attribute relates the most closely to business continuity?

  • Service location availability
  • Service uptime
  • Service costs
  • Service credits
A

Service uptime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which strategy best defines the benefit of a Business Model for Information Security (BMIS)?

  • Aligning business objectives with security design
  • Period review of security control efficacy
  • Reduced IT security costs
  • Ensuring employee security awareness
A

Aligning business objectives with security design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does configuration management differ from change management?

  • Change management keeps systems performance at a desired level over time, configuration management is short-term
  • Configuration management keeps systems performance at a desired level over time, change management is short-term
  • Configuration management applies solely to security controls, change management applies to long-term system desired performance
  • Change management keeps systems performance above a specified level over time, configuration management is short-term
A

Configuration management keeps systems performance at a desired level over time, change management is short-term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which strategy should be employed to modify organizational culture to increase security awareness?

  • Gap analysis
  • BMIS
  • COBIT
  • Asset valuation
A

Gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which model treats internal and external threats egually?

  • BMIS
  • Zero-trust
  • Zero-day
  • COBIT
A

Zero-trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is COBIT used for?

  • Risk management
  • Software coding pipelines
  • Financial auditing
  • Compliance with GDPR
A

Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which term describes information that can be traced back to an individual?

  • IP
  • PII
  • DSS
  • PCI
A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which term describes the process of defining the current and desired states of a system and outlines the pathway to achieve the desired state?

  • COBIT
  • Change management
  • Gap analysis
  • Configuration management
A

Gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are budgeting the next year’s cloud computing costs. Which type of expense is this?

  • Operating expense
  • Capital expense
  • Long-term expense
  • Short-term expense
A

Operating expense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly