Security Program Management and Oversight Flashcards
(107 cards)
A company is developing its cybersecurity policies and procedures. While doing so, they refer to industry best practices that are not legally required but are recommended for improving security. What type of document are they most likely using?
A. Compliance regulations
B. Guidelines
C. Secure configuration guides
D. Benchmarks
β
Correct Answer: B. Guidelines
πΉ Explanation: Guidelines provide recommendations for best practices but are not mandatory for compliance. They help organizations shape their security policies.
πΈ Why other choices are incorrect:
A. Compliance regulations β These are legally binding and must be followed.
C. Secure configuration guides β These provide specific settings for secure system configurations.
D. Benchmarks β These are industry-accepted standards for security but can be mandatory in regulated industries.
A companyβs cybersecurity team is responsible for ensuring compliance with evolving regulations. Since some regulatory requirements change more frequently than others, they must monitor for updates regularly.
Which of the following regulations is most likely to require frequent monitoring for updates?
A. A globally recognized standard, such as ISO 27001
B. A national cybersecurity law, such as FISMA
C. A local industry-specific regulation
D. A constitutional law regarding consumer privacy
β
Correct Answer: C. A local industry-specific regulation
πΉ Explanation:
Regulations created by smaller governing bodies, such as state or industry-specific regulatory groups, are more prone to revision compared to national laws or international standards.
πΈ Why other choices are incorrect:
A. Global standards (ISO 27001) β These are guidelines, not legally mandated, and do not change as frequently.
B. National cybersecurity laws (FISMA) β National regulations are less frequently updated than local or industry-specific regulations.
D. Constitutional laws β Laws established at the constitutional level are very difficult to change and do not require frequent monitoring.
Which of the following best describes the purpose of an Acceptable Use Policy (AUP) in an organization?
A. To define how employees can use the organizationβs network, systems, or devices
B. To provide high-level security policies for securing organizational data
C. To outline procedures for responding to cybersecurity incidents
D. To establish how the organization will continue operations after a disaster
β
Correct Answer: A. To define how employees can use the organizationβs network, systems, or devices
πΉ Explanation: An Acceptable Use Policy (AUP) defines what users are allowed and not allowed to do when using company resources such as networks, computers, and mobile devices.
πΈ Why other choices are incorrect:
B. Information Security Policy (ISP) β Covers broad security policies, not just system usage.
C. Incident Response (IR) Plan β Focuses on responding to cybersecurity incidents.
D. Disaster Recovery (DR) Plan β Focuses on restoring operations after disasters.
Which type of procedure defines how a new employee is securely added to an organizationβs systems and networks?
A. Access control procedure
B. Incident response playbook
C. Disaster Recovery (DR) Plan
D. Onboarding procedure
β
Correct Answer: D. Onboarding procedure
πΉ Explanation: An onboarding procedure ensures that new employees are securely added to company systems by defining account creation, access provisioning, security training, and asset assignment steps.
πΈ Why other choices are incorrect:
A. Access control procedure β Covers authentication and authorization policies, but does not define the full onboarding process.
B. Incident response playbook β Focuses on cybersecurity threats, not employee onboarding.
C. Disaster Recovery (DR) Plan β Ensures business continuity after a disaster, but does not cover hiring procedures.
Which of the following policies provides a broad overview of how an organization secures information and data across its systems?
A. Incident Response (IR) Plan
B. Business Continuity (BC) Plan
C. Information Security Policy (ISP)
D. Change Management Policy
β
Correct Answer: C. Information Security Policy (ISP)
πΉ Explanation: An ISP defines the high-level policies that guide an organizationβs overall security strategy, including credential management, encryption, and onboarding/offboarding.
πΈ Why other choices are incorrect:
A. IR Plan β Defines incident handling steps, not broad security policies.
B. BC Plan β Focuses on continuing business operations during disruptions.
D. Change Management Policy β Manages system and operational changes, not overall security policies.
A multinational company operates in both the United States and the European Union (EU) and collects customer data from both regions. The security team is tasked with ensuring the company follows all applicable data protection laws.
Which of the following best describes the type of security considerations the company must account for?
A. Industry considerations
B. Local/Regional considerations
C. National considerations
D. Global considerations
β
Correct Answer: B. Local/Regional considerations
πΉ Explanation: The company must comply with both U.S. and EU data protection laws. Since the General Data Protection Regulation (GDPR) applies to all organizations handling EU residentsβ data, and U.S. laws apply to businesses within the U.S., these regional laws impact compliance requirements.
πΈ Why other choices are incorrect:
A. Industry considerations β Industry-specific regulations apply only within certain sectors, while this scenario involves geographic laws.
C. National considerations β National laws apply only within a single country, but this scenario spans multiple regions.
D. Global considerations β Global standards provide guidelines, but the company is legally required to follow regional laws.
Match each governance structure to its correct description.
Governance Structures:
1-Board of Directors
2-Committee
3-Government Entity
4-Centralized Governance
5-Decentralized Governance
Descriptions:
A. A hierarchical governance model where decisions flow from a top entity to all lower levels.
B. A group of individuals appointed by shareholders to oversee management.
C. A government-sponsored agency responsible for policy creation and enforcement.
D. A group of experts and managers responsible for a specific organizational function.
E. A governance model that allows lower levels of an organization to decide how to implement security policies.
β Correct Answer:
1 β B (Board of Directors = Oversees management, appointed by shareholders)
2 β D (Committee = Group responsible for a specific function, often with subject matter experts)
3 β C (Government Entity = Creates and enforces security policies, e.g., CISA)
4 β A (Centralized Governance = Hierarchical decision-making, top-down enforcement)
5 β E (Decentralized Governance = Provides policy direction but allows lower levels flexibility in implementation)
A company recently suffered a data breach and is conducting a risk assessment to determine the cause and severity of the incident. This assessment is being conducted in direct response to the breach and is being expedited to quickly address the issue.
Which type of risk assessment is the company performing?
A. Recurring
B. One-time
C. Ad hoc
D. Continuous
β
Correct Answer: C. Ad hoc
πΉ Explanation:
An ad hoc risk assessment is performed in response to a specific event, such as a security breach, to quickly evaluate and address the risk.
πΈ Why other choices are incorrect:
A. Recurring β A recurring assessment is conducted at preset intervals, not in response to a sudden event.
B. One-time β A one-time assessment provides a broad overview of risk, rather than addressing an immediate concern.
D. Continuous β Continuous assessments are automated and ongoing, not reactive to a single incident.
A cybersecurity analyst is assessing potential threats to a financial institution. Since some risks cannot be easily quantified, the analyst assigns subjective ratings (e.g., low, medium, high) based on personal experience and expert judgment.
Which type of risk assessment is being conducted?
A. Qualitative
B. Quantitative
C. Exposure Factor (EF)
D. Probability Analysis
β
Correct Answer: A. Qualitative
πΉ Explanation:
A qualitative risk assessment relies on expert judgment and subjective scales (e.g., 1-5 or low-high) to evaluate risks that lack precise numerical data.
πΈ Why other choices are incorrect:
B. Quantitative β Uses numerical values, formulas, and probability metrics, rather than subjective ratings.
C. Exposure Factor (EF) β Measures asset damage as a percentage, not risk rating.
D. Probability Analysis β Assigns numerical probability values, while qualitative assessments are subjective.
Which of the following formulas is used to determine the Annualized Loss Expectancy (ALE) in risk analysis?
A. ALE = ARO Γ SLE
B. ALE = EF Γ AV
C. ALE = Probability Γ Impact
D. ALE = Risk Severity Γ Likelihood
β
Correct Answer: A. ALE = ARO Γ SLE
πΉ Explanation:
The Annualized Loss Expectancy (ALE) formula is: ALE=AROΓSLE where:
ARO (Annualized Rate of Occurrence) = How often the risk is expected to occur in a year
SLE (Single Loss Expectancy) = The monetary loss per incident
πΈ Why other choices are incorrect:
B. EF Γ AV β This formula calculates Single Loss Expectancy (SLE), not ALE.
C. Probability Γ Impact β Does not determine financial loss expectancy per year.
D. Risk Severity Γ Likelihood β Used in qualitative assessments, but not for ALE
A financial institution maintains a comprehensive document that tracks all potential cybersecurity risks, their likelihood, impact, and mitigation strategies. The document also includes a visual representation that helps executives make risk-based decisions.
Which of the following is the document and visualization method being used?
A. Key Risk Indicator (KRI) and Risk Appetite Statement
B. Risk Matrix and Risk Register
C. Risk Owner Report and Risk Threshold Graph
D. Risk Heat Map and Risk Tolerance Table
β
Correct Answer: B. Risk Matrix and Risk Register
πΉ Explanation:
A Risk Register is a detailed document listing risks, their impact, likelihood, and potential mitigation strategies.
A Risk Matrix (Heat Map) is a visual tool used to quickly assess risk severity based on impact and likelihood.
πΈ Why other choices are incorrect:
A. KRI and Risk Appetite Statement β KRIs track risk indicators, but do not map risks visually.
C. Risk Owner Report and Risk Threshold Graph β Risk owners manage risks, but there is no such thing as a βRisk Owner Reportβ.
D. Risk Heat Map and Risk Tolerance Table β βRisk Tolerance Tableβ is not a standard concept in risk management.
An organization uses automated security tools to monitor network traffic, detect potential security threats, and alert administrators in real time.
Which type of risk assessment is being used?
A. One-time
B. Recurring
C. Ad hoc
D. Continuous
β
Correct Answer: D. Continuous
πΉ Explanation:
A continuous risk assessment is automated and ongoing, constantly analyzing security threats and alerting the organization to emerging risks.
πΈ Why other choices are incorrect:
A. One-time β A one-time assessment provides a risk snapshot at a single point in time.
B. Recurring β Recurring assessments occur at scheduled intervals, not continuously.
C. Ad hoc β Ad hoc assessments are reactive to specific events, rather than running continuously.
Which policy ensures that an organization continues to operate during and after a cybersecurity breach or incident?
A. Disaster Recovery (DR) Plan
B. Business Continuity (BC) Plan
C. Incident Response (IR) Plan
D. Software Development Lifecycle (SDLC) Policy
β
Correct Answer: B. Business Continuity (BC) Plan
πΉ Explanation: A Business Continuity (BC) Plan ensures that an organization continues to function even after an incident, such as a cyberattack or hardware failure.
πΈ Why other choices are incorrect:
A. DR Plan β Focuses on restoring services after a disaster, not maintaining operations during an incident.
C. IR Plan β Focuses on detecting and responding to security incidents, not ensuring continuity.
D. SDLC Policy β Governs secure software development, not business operations.
A cybersecurity analyst is responding to a ransomware attack and follows a documented set of specific steps to contain and eliminate the threat. What is the analyst most likely using?
A. Incident Response (IR) Plan
B. Change Management Policy
C. Disaster Recovery (DR) Plan
D. Playbook
β
Correct Answer: D. Playbook
πΉ Explanation: A playbook provides detailed procedural steps for responding to specific incidents, such as ransomware attacks. It guides security teams through containment, eradication, and recovery actions.
πΈ Why other choices are incorrect:
A. IR Plan β Provides general guidelines for handling incidents, but playbooks give step-by-step instructions.
B. Change Management Policy β Governs system modifications, not incident response.
C. Disaster Recovery (DR) Plan β Focuses on restoring IT services after a disaster, not responding to a cybersecurity attack.
A financial institution is updating its security policies to comply with mandatory, legally enforceable security regulations at different levels. Match each regulatory requirement to the correct category:
Regulatory Requirements:
HIPAA β Governs security of medical records.
GDPR β Regulates privacy and security of EU residentsβ personal data.
FISMA β Requires cybersecurity protections for U.S. federal agencies.
ISO 27001 β Provides internationally recognized security best practices.
Categories:
A. Industry Considerations
B. Local/Regional Considerations
C. National Considerations
D. Global Considerations
β Correct Answer:
HIPAA β A. Industry Considerations
GDPR β B. Local/Regional Considerations
FISMA β C. National Considerations
ISO 27001 β D. Global Considerations
πΉ Explanation:
HIPAA is an industry-specific regulation for medical entities.
GDPR applies regionally to all businesses handling EU residentsβ data.
FISMA is a national law for U.S. federal agencies.
ISO 27001 is a global security framework, but not legally required.
A multinational organization needs a governance model that allows its regional offices to implement security policies in a way that best fits their unique operational needs. However, they must still adhere to corporate security requirements.
Which type of governance model should the company adopt?
A. Centralized governance
B. Decentralized governance
C. Government entity oversight
D. Board of directors oversight
β
Correct Answer: B. Decentralized governance
πΉ Explanation:
A decentralized governance model allows each regional office to decide how to implement security policies while still adhering to overall corporate requirements.
πΈ Why other choices are incorrect:
A. Centralized governance β Would require strict top-down enforcement, limiting flexibility.
C. Government entity oversight β External government agencies regulate compliance but do not dictate internal company structure.
D. Board of directors oversight β A board sets high-level policies but does not handle daily governance structure decisions.
Which of the following best describes the risk identification process in cybersecurity?
A. Assigning a severity value to a risk based on likelihood and impact
B. Determining any risk an organization and its environment may face
C. Implementing technical controls to mitigate identified risks
D. Conducting risk assessments at scheduled intervals
β
Correct Answer: B. Determining any risk an organization and its environment may face
πΉ Explanation:
Risk identification is the process of determining and categorizing potential risks that an organization may face, including malicious risks, environmental risks, compliance risks, and financial risks.
πΈ Why other choices are incorrect:
A. Assigning a severity value β This is part of risk assessment, not risk identification.
C. Implementing controls β This falls under risk mitigation, which happens after risks are identified.
D. Conducting scheduled assessments β This describes recurring risk assessments, but risk identification happens before assessments are conducted.
Which of the following best describes the role of a data controller in data management?
A. The individual or entity that makes decisions about what data is collected and how it is processed.
B. The highest authority responsible for overseeing all data protection and compliance.
C. A third party responsible for processing data on behalf of another entity.
D. A technical specialist responsible for implementing security controls to protect data.
β
Correct Answer: A. The individual or entity that makes decisions about what data is collected and how it is processed.
πΉ Explanation:
A data controller decides why data is collected, what data is collected, and how it will be used. This role is primarily used in EU-based regulations, such as GDPR.
πΈ Why other choices are incorrect:
B. Data owner β A data owner has higher authority over security and compliance.
C. Data processor β A processor carries out data operations but does not make decisions about collection or purpose.
D. Data custodian β A custodian secures data but does not control its processing rules.
Which of the following best describes the role of a government entity in cybersecurity governance?
A. It is responsible for overseeing a specific department within an organization.
B. It determines how an organization implements security policies at the operational level.
C. It is a group of shareholders that define an organizationβs security priorities.
D. It creates and enforces security policies and compliance regulations.
β
Correct Answer: D. It creates and enforces security policies and compliance regulations.
πΉ Explanation:
Government entities, such as the Cybersecurity and Infrastructure Security Agency (CISA), are responsible for developing, enforcing, and monitoring cybersecurity policies and regulations to ensure compliance and national security.
πΈ Why other choices are incorrect:
A. Oversees a department β This describes a committee, not a government entity.
B. Determines operational security β This describes a decentralized governance model, not government oversight.
C. Group of shareholders β Shareholders appoint a board of directors, but they do not enforce security regulations.
A hurricane severely damages an organizationβs primary data center. Which policy will guide the organization in restoring services as quickly as possible?
A. Business Continuity (BC) Plan
B. Disaster Recovery (DR) Plan
C. Incident Response (IR) Plan
D. Change Management Policy
β
Correct Answer: B. Disaster Recovery (DR) Plan
πΉ Explanation: A Disaster Recovery (DR) Plan focuses on recovering IT services after a major disaster (e.g., hurricanes, fires, floods).
πΈ Why other choices are incorrect:
A. BC Plan β Ensures operations continue during disruptions, but DR focuses on recovery after disasters.
C. IR Plan β Manages cybersecurity incidents, not natural disasters.
D. Change Management Policy β Governs system changes, not disaster recovery.
Which of the following best describes a security standard in an organization?
A. A high-level policy outlining security objectives
B. A detailed set of required security controls and configurations
C. A flexible guide with recommended best practices
D. A step-by-step guide for performing a specific security task
β
Correct Answer: B. A detailed set of required security controls and configurations
πΉ Explanation: A standard is a mandatory set of security requirements that organizations must follow to ensure compliance. It serves as a baseline for security controls and may include minimum configurations and best practices.
πΈ Why other choices are incorrect:
A. High-level policy β Describes policies, which define security objectives but are not as detailed or technical.
C. Flexible guide β Describes guidelines, which are not mandatory like standards.
D. Step-by-step guide β Describes procedures, which outline how to execute tasks but are more specific than standards.
A U.S.-based healthcare provider is expanding its telemedicine services to patients in the European Union (EU). The IT security team is responsible for ensuring compliance with all applicable security regulations for protecting patient data.
Which of the following two regulations must the organization comply with? (Select TWO.)
A. Federal Information Security Modernization Act (FISMA)
B. General Data Protection Regulation (GDPR)
C. Health Insurance Portability and Accountability Act (HIPAA)
D. International Organization for Standardization (ISO 27001)
E. California Consumer Privacy Act (CCPA)
β
Correct Answers: B. GDPR and C. HIPAA
πΉ Explanation:
HIPAA applies to U.S. healthcare providers, ensuring the security and privacy of patient records.
GDPR applies because the company is handling data from EU residents.
πΈ Why other choices are incorrect:
A. FISMA β Applies only to U.S. federal agencies, not private healthcare providers.
D. ISO 27001 β A voluntary global security standard, not a legally required regulation.
E. CCPA β A California-specific law that does not apply to EU residents
A financial institution conducts a risk assessment every quarter to evaluate potential threats to its network and ensure its risk response strategies remain appropriate.
Which type of risk assessment is the organization using?
A. One-time
B. Ad hoc
C. Recurring
D. Continuous
β
Correct Answer: C. Recurring
πΉ Explanation:
A recurring risk assessment is conducted at preset intervals (such as quarterly) to monitor changes in risk over time and ensure appropriate risk management strategies are in place.
πΈ Why other choices are incorrect:
A. One-time β One-time assessments are performed only once and do not recur.
B. Ad hoc β Ad hoc assessments are performed only in response to specific incidents, not on a set schedule.
D. Continuous β Continuous assessments run nonstop and are often automated, rather than scheduled quarterly.
A company wants to perform a data-driven risk assessment to calculate the potential financial losses associated with a cyberattack. They use statistical models, probability values, and cost estimations to determine how much money they could lose if an incident occurs.
Which type of risk assessment is the company performing?
A. Qualitative
B. Quantitative
C. Impact Analysis
D. Likelihood Estimation
β
Correct Answer: B. Quantitative
πΉ Explanation:
A quantitative risk assessment uses mathematical models, probability values, and financial data to produce replicable numerical results for risk evaluation.
πΈ Why other choices are incorrect:
A. Qualitative β Uses subjective ratings (e.g., low, medium, high) instead of numerical calculations.
C. Impact Analysis β Focuses on the effects of a risk, but does not include numerical calculations.
D. Likelihood Estimation β Determines how likely a risk will occur but does not assign financial values.