questions Flashcards
Chad is a security practitioner tasked with ensuring that the information on the organization’s public website is not changed by anyone outside the organization.
This task is an example of ensuring _________.
- Integrity
Preventing unauthorized modification is the definition of integrity.
Which of the following is an example of a “Something you know” authentication factor?
- Password
A password is something the user knows and can present as an authentication factor to confirm an identity assertion.
Which of the following is an example of a “Something you are” authentication factor?
A photograph of your face
A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing ________.
Non-repudiation
Non-repudiation is the concept that users cannot deny they have performed transactions that they did, in fact, conduct. A system that keeps a record of user transactions provides non-repudiation.
What is the European Union (EU) law that grants legal protections to individual human privacy?
The General Data Protection Regulation (GDPR)
For which of the following systems would the security concept of availability probably be most important?
Medical systems that monitor patient condition in an intensive-care unit
Information that reflects patient condition is data that necessarily must be kept available in real time, because that data is directly linked to the patients’ well-being (and possibly their life). This is, by far, the most important of the options listed.
For which of the following assets is integrity probably the most important security aspect?
The file that contains passwords used to authenticate users
In risk management concepts, a(n) _________ is something a security practitioner might need to protect.
Asset
An asset is anything with value, and a security practitioner may need to protect assets.
In risk management concepts, a(n) ___________ is something or someone that poses risk to an organization or asset.
Threat
Of the following, which would probably not be considered a threat?
A laptop with sensitive data on it
Which of the following probably poses the most risk?
A high-likelihood, high-impact event
Within the organization, who can identify risk?
- Anyone
Kerpak works in the security office of a medium-sized entertainment company. Kerpak is asked to assess a particular threat, and he suggests that the best way to counter this threat would be to purchase and implement a particular security solution.
This is an example of _______.
- Mitigation (減少)
Applying a security solution (a type of control) is an example of mitigation.
Sophia is visiting Las Vegas and decides to put a bet on a particular number on a roulette wheel.
This is an example of _________.
Acceptance
Sophia is accepting the risk that the money will be lost, even though the likelihood is high; Sophia has decided that the potential benefit (winning the bet), while low in likelihood, is worth the risk.
Phrenal is selling a used laptop in an online auction. Phrenal has estimated the value of the laptop to be $100, but has seen other laptops of similar type and quality sell for both more and less than that amount. Phrenal hopes that the laptop will sell for $100 or more, but is prepared to take less for it if nobody bids that amount.
This is an example of ___________.
- Risk tolerance
Phrenal has decided there is an acceptable level of risk associated with the online sale of the laptop; this is within Phenol’s risk tolerance.
A software firewall is an application that runs on a device and prevents specific types of traffic from entering that device.
This is a type of ________ control.
- Technical
A software firewall is a technical control because it is a part of the IT environment.
At the airport, there are red lines painted on the ground next to the runway, which prohibits 禁止traffic from crossing it.
This is an example of a(n)______ control.
Physical
A bollard is a post set securely in the ground in order to prevent a vehicle from entering an area or driving past a certain point.
Bollards are an example of ______ controls.
Physical
Druna is a security practitioner tasked with ensuring that laptops are not stolen from the organization’s offices.
Which sort of security control would probably be best for this purpose?
Physical
Because laptops are tangible objects, and Druna is trying to ensure that these objects are not moved from a certain place, physical controls are probably best for the purpose.
Triffid Corporation has a policy that all employees must receive security awareness instruction before using email; the company wants to make employees aware of potential phishing attempts that the employees might receive via email.
What kind of control is this instruction?
Administrative
Both the policy and the instruction are administrative controls; rules and governance are administrative.
ISC2 publishes a Common Body of Knowledge (CBK) that IT security practitioners should be familiar with; this is recognized throughout the industry as a set of material that is useful for practitioners to refer to.
Certifications can be issued for demonstrating expertise in this Common Body of Knowledge.
What kind of document is the Common Body of Knowledge?
- Standard
The Common Body of Knowledge is used throughout the industry, recognized among many people, countries and organizations. This is a standard.
The city of Grampon wants to ensure that all of its citizens are protected from malware, so the city council creates a rule that anyone caught creating and launching malware within the city limits will receive a fine and go to jail.
What kind of rule is this?
Law
The city council is a governmental body making a legal mandate; this is a law.
The Triffid Corporation publishes a strategic overview of the company’s intent to secure all the data the company possesses. This document is signed by Triffid’s senior management.
What kind of document is this?
Policy
This is an internal, strategic document, and is therefore a policy.
Grampon municipal code requires that all companies that operate within city limits will have a set of processes to ensure employees are safe while working with hazardous 危險的 materials. Triffid Corporation creates a checklist of activities employees must follow while working with hazardous materials inside Grampon city limits.
The municipal code is a ______, and the Triffid checklist is a ________.
Law, procedure
The municipal code was created by a governmental body and is a legal mandate; this is a law. The Triffid checklist is a detailed set of actions which must be used by Triffid employees in specific circumstances; this is a procedure.