(2) Play It Safe: Manage Security Risks Flashcards
Fill in the blank: The _____ domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.
asset security
communication and network security
security operations
identity and access management
identity and access management
The identity and access management domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.
What is the focus of the security and risk management domain?
Optimize data security by ensuring effective processes are in place
Define security goals and objectives, risk mitigation, compliance, business continuity, and regulations
Manage and secure wireless communications
Secure physical networks and wireless communications
Define security goals and objectives, risk mitigation, compliance, business continuity, and regulations
The focus of the security and risk management domain is defining security goals and objectives, risk mitigation, compliance, business continuity, and regulations.
In which domain would a security professional conduct security control testing; collect and analyze data; and perform security audits to monitor for risks, threats, and vulnerabilities?
Identity and access management
Communication and network engineering
Security assessment and testing
Security architecture and engineering
Security assessment and testing
In the security assessment and testing domain, a security professional conducts security control testing; collects and analyzes data; and performs security audits to monitor for risks, threats, and vulnerabilities.
Fill in the blank: The _____ domain concerns conducting investigations and implementing preventive measures.
asset security
security operations
software development security
communications and networking engineering
security operations
The security operations domain concerns conducting investigations and implementing preventative measures.
What is a vulnerability?
Any circumstance or event that can negatively impact assets
An organization’s ability to manage its defense of critical assets and data and react to change
Anything that can impact the confidentiality, integrity, or availability of an asset
A weakness that can be exploited by a threat
A weakness that can be exploited by a threat
Fill in the blank: Information protected by regulations or laws is a _____. If it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation.
high-risk asset
new-risk asset
low-risk asset
medium-risk asset
high-risk asset
Information protected by regulations or laws is a high-risk asset. If it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation.
What are the key impacts of threats, risks, and vulnerabilities? Select three answers.
Damage to reputation
Identity theft
Employee retention
Financial damage
Damage to reputation
Identity theft
Financial damage
Fill in the blank: The steps in the Risk Management Framework (RMF) are prepare, _____, select, implement, assess, authorize, and monitor.
categorize
communicate
reflect
produce
categorize
The steps in the RMF are prepare, categorize, select, implement, assess, authorize, and monitor. In the categorize step, security professionals develop risk-management processes and tasks.
Fill in the blank: Security posture refers to an organization’s ability to react to change and manage its defense of _____ and critical assets.
data
domains
consequences
gaps
data
Which of the following examples are key focus areas of the security and risk management domain? Select three answers.
Store data properly
Follow legal regulations
Maintain business continuity
Mitigate risk
Follow legal regulations
Maintain business continuity
Mitigate risk
How does business continuity enable an organization to maintain everyday productivity?
By exploiting vulnerabilities
By ensuring return on investment
By outlining faults to business policies
By establishing risk disaster recovery plans
By establishing risk disaster recovery plans
Fill in the blank: According to the concept of shared responsibility, employees can help lower risk to physical and virtual security by _____. Select two answers.
recognizing and reporting security concerns
limiting their communication with team members
taking an active role
meeting productivity goals
recognizing and reporting security concerns
taking an active role
A security analyst researches ways to improve access and authorization at their business. Their primary goal is to keep data secure. Which security domain does this scenario describe?
Identity and access management
Asset security
Communication and network security
Security assessment and testing
Identity and access management
Which of the following activities may be part of establishing security controls? Select three answers.
Implement multi-factor authentication
Evaluate whether current controls help achieve business goals
Monitor and record user requests
Collect and analyze security data regularly
Implement multi-factor authentication
Evaluate whether current controls help achieve business goals
Collect and analyze security data regularly
Fill in the blank: The software development security domain involves the use of the software development ___, which is an efficient process used by teams to quickly build software products and services.
lifecycle
functionality
staging
operations
lifecycle
Which of the following statements accurately describe risk? Select all that apply.
A high-risk asset is any information protected by regulations or laws.
Another way to think of risk is the likelihood of a threat occurring.
If compromised, a low-risk asset would have a severe negative impact on an organization’s ongoing reputation.
If compromised, a medium-risk asset may cause some damage to an organization’s ongoing operations.
A high-risk asset is any information protected by regulations or laws.
Another way to think of risk is the likelihood of a threat occurring.
If compromised, a medium-risk asset may cause some damage to an organization’s ongoing operations.
A business experiences an attack. As a result, its critical business operations are interrupted and it faces regulatory fines. What type of consequence does this scenario describe?
Financial
Identity
Reputation
Practical
Financial
Fill in the blank: In the Risk Management Framework (RMF), the _____ step might involve implementing a plan to change password requirements in order to reduce requests to reset employee passwords.
authorize
prepare
categorize
implement
implement
How do security frameworks enable security professionals to help mitigate risk?
They are used to establish laws that reduce a specific security risk.
They are used to create unique physical characteristics to verify a person’s identity.
They are used to establish guidelines for building security plans.
They are used to refine elements of a core security model known as the CIA triad.
They are used to establish guidelines for building security plans.
Security frameworks are used to establish guidelines for building security plans that enable security professionals to help mitigate risk.
Competitor organizations are the biggest threat to a company’s security.
True
False
True
People are the biggest threat to a company’s security. This is why educating employees about security challenges is essential for minimizing the possibility of a breach.
Fill in the blank: Security controls are safeguards designed to reduce _____ security risks.
broadscale
specific
general
public
specific
Security controls are safeguards designed to reduce specific risks.
A security analyst works on a project designed to reduce the risk of vishing. They develop a plan to protect their organization from attackers who could exploit biometrics. Which type of security control does this scenario describe?
Encryption
Ciphertext
Classification
Authentication
Authentication
This describes authentication, which is the process of implementing controls to verify who someone or something is before granting access to specific resources within a system.
What is the CIA triad?
A foundational security model used to set up security policies and systems
A mandatory security framework involving the selection of appropriate controls
A set of security controls used to update systems and networks
Ongoing validation processes involving all employees in an organization
A foundational security model used to set up security policies and systems
The CIA triad is a foundational security model used to set up security policies and systems. The core principles of the model are confidentiality, integrity, and availability.
Which element of the CIA triad specifies that only authorized users can access specific information?
Confidentiality
Confirmation
Integrity
Access
Confidentiality
Confidentiality specifies that only authorized users can access specific information.
A security analyst discovers that certain data is inaccessible to authorized users, which is preventing these employees from doing their jobs efficiently. The analyst works to fix the application involved in order to allow for timely and reliable access. Which element of the CIA triad does this scenario describe?
Applicability
Capacity
Integrity
Availability
Availability
This scenario describes availability. Availability specifies that data is accessible to authorized users.
Fill in the blank: According to the CIA triad, _____ refers to ensuring that an organization’s data is verifiably correct, authentic, and reliable.
Integrity
Accuracy
Credibility
Availability
Integrity
According to the CIA triad, integrity refers to ensuring that an organization’s data is verifiably correct, authentic, and reliable.
What is the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)?
A set of security controls that help analysts determine what to do if a data breach occurs
Standards, guidelines, and best practices that organizations follow voluntarily in order to manage cybersecurity risk
A collection of security principles focused on maintaining confidentiality, integrity, and availability
A required business framework for ensuring security updates and repairs are successful
Standards, guidelines, and best practices that organizations follow voluntarily in order to manage cybersecurity risk
The NIST CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
Fill in the blank: The five core functions that make up the CSF are: identify, protect, detect, _____, and recover.
reevaluate
reflect
regulate
respond
respond
The five core functions that make up the CSF are: identify, protect, detect, respond, and recover.
Fill in the blank: The CSF _____ function relates to monitoring systems and devices in an organization’s internal network to help security teams manage potential cybersecurity risks and their effects.
protect
identify
respond
recover
identify
The CSF identify function relates to monitoring systems and devices in an organization’s internal network to help security teams manage potential cybersecurity risks and their effects.
What does a security analyst’s work involve during the CSF recover function?
Return affected systems back to normal operation
Protect an organization through the implementation of employee training
Contain, neutralize, and analyze security incidents
Pinpoint threats and improve monitoring capabilities
Return affected systems back to normal operation
During the recover function, a security analyst’s work involves returning affected systems back to normal operation.