study set 2 Flashcards

(48 cards)

1
Q

What is it called when a data owner accepts the certification?

A

Accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAAA

A
A frame work:
Identification
Authentication
Authorization
Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EF

A

Exposure Factor

the % of loss that is expected from an risk event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Privacy Act of 1974 applies to who?

A

applies only to federal Agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 8 steps to EDRM

A

The Electronic Discovery Reference Model

  1. Identification
  2. Preservation
  3. Collection
  4. processing
  5. review
  6. Analysis
  7. Production
  8. Presentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OEP

A

Occupant Emergency Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A privacy Policy needs to cover what 4 items?

A
  1. Collection
  2. Use
  3. Disclosure
  4. Protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vertical Control?

A

example Top secret, secret, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proactive Controls are?

A

Safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

‘IT’ logs and Documents are what type of Evidence?

A

Secondary Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is committee of sponsoring organizations of the treadway commission called?

A

COSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Typosquatting

A

URL Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISO 27799 standard is focused around?

A

Protecting PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogger is a threat to what CIA

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GDPR

A

updated EU Law for 2018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

“NEED TO KNOW” is what type of control?

A

Horizontal Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Tangible and physical objects are what type of evidence

A

Real evidence

Hard drives, usb sticks but not the data on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are 3 Corrective Controls

A
  1. anti-virus
  2. Patches
  3. IPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What act is for Identity theft

A

(ITADA) Identity Theft and Assumption Deterrence Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The First step of a BCP should perform?

A

(BOA) Business Organization Analysis

21
Q

What is the correct way to dispose of a SSD Drive?

22
Q

SOX

A

Sarbanes - Oxlet Act of 2002

Publicly traded companies have regulation on financial reports

23
Q

The 3 Rules of HIPAA

A
  1. privacy Rule
  2. security Rules
  3. Breach notification Rules
24
Q

Developed Guidelines for International Data is properly protected in a Globalized Economy

A

(OECD) Organization for Economic Co-operation and development

25
MOA /MOU
Memorandums of Agreement / understanding for Essential personnel
26
The Military or DOD Data Classification
1. Top Secret 2. Secret 3. Confidential 4. Unclassified
27
IPS / IDS ensure what of CIA
Availability
28
STRIDE
Is a Threat categorization scheme from Microsoft ``` spoofing tampering repudiation info disclosure DOS attack Elevation of privilege ```
29
Supporting facts and elements are what type of evidence?
Collaborative | Not a fact on it's own
30
When you see something, what type of evidence?
Direct Evidence
31
Who Defines the acceptable level of risk?
Security Steering Committee
32
What policy would address on how to deal with Data no longer Needed?
Data Destruction Policy
33
4 CIA Confidentiality threats
1. Attacks on Encryption 2. Social Engineering 3. Key Logger 4. IOT internet of Things
34
"The Majority of the proof" relate to what law?
Civil Law
35
Cybersquatting
domain squatting
36
Counterfeiting is ?
an attack on trademarks
37
"Beyond a Reasonable Doubt"
Criminal Law
38
What are the Business Data Classifications
High Sensitive sensitive internal public
39
Security Steering Committee Is Responsible for?
Is Responsible for making Decisions on Tactical and strategic security issues. Members are asked to join
40
Software code is a threat to what CIA
Availability
41
Exigent circumstance is?
Immediate threat to Human life or evidence destruction. Only applies to law enforcement or " under the color of law"
42
ISO 27002 is focused on?
ITSM
43
Password hashing with salting is what part of the CIA?
Integrity
44
the 5 ISC2 code of Ethics
1. Protect the Society 2. The Common Good 3. Public Trust & confidence 4. Provide diligent and competent service 5. Advance and protect the profession
45
Retention policy deals with?
How long to backup Where to Keep the backup What do we Keep
46
What is the self Directed Rick Evaluation methodology
OCTAVE
47
Which attack would you be seeing if you saw a SYN packet with the source and the destination as the same address?
LAND attack (Local Area Network Denial attack )
48
three authentication responses a RADIUS server returns
access-accept, access-reject, access-challenge