Chap 1 - information & Sec environment Flashcards

1
Q

The purpose of a copyright is to protect

A

The expression of ideas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ethical obligations to society include

A

Duty to principals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization is developing a new product using sound project management principles. These principles should ensure that:

A

All changes to the project are formally reviewed and approved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The purpose of a baseline is to:

A

Create a standard configuration for all equipment on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The difference between awareness and training is:

A

Awareness should be provided to all staff not just IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To whom or what should a Chief Security Officer (CSO) report according to best practices?

A

As high up in the organization as possible to maintain visibility for Information security and limit the inaccurate translation of messages as they move through organizational management levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Organization for Economic Cooperation and Development (OECD) has generated and published a set of 8 principles for personal privacy. Which of the following is NOT one of these 8 principles?

A

Right to be Forgotten Principle. –> therefore, GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A CISSP candidate signs his or her agreement to the ISC2 Code of Ethics statement. Which of the following would violate this Code and could cause the candidate to lose his or her certification?

A

Retaining customer information from previous penetration tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All but which of the following items requires awareness for all individuals affected?

A

The backup mechanism used to retain email messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the most important and distinctive concept in relation to layered security?

A

Series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a primary purpose of an e􀁛it interview?

A

To review the nondisclosure agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following represents accidental or intentional exploitations of vulnerabilities?

A

Threat events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the term used to describe the responsibility of a firm’s officers and directors to ensure that adequate measures are in place to minimize the effect of a disaster on the organization’s continued viability?

A

Due diligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Matthew recently authored an innovative algorithm for solving a mathematical problem, and he wants to share it with the world. However, prior to publishing the software code in a technical journal, he wants to obtain some sort of intellectual property protection. Which type of protection is best suited to his needs?

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FlyAway Travel has offices in both the European Union and the United States and transfers personal information between those offices regularly. Which of the seven requirements for processing personal information states that organizations must inform individuals about how the information they collect is used?

A

Notice

The Notice principle says that organizations must inform individuals of the information the organization collects about individuals and how the organization will use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In 1991, the federal sentencing guidelines formalized a rule that requires senior executives to take personal responsibility for information security matters. What is the name of this rule?

A

Prudent man rule

17
Q

Which one of the following control categories does not accurately describe a fence around a facility?

A

A. Physical –> correct

B. Detective
C. Deterrent
D. Preventive

18
Q

James is conducting a risk assessment for his organization and is attempting to assign an asset value to the servers in his data centre. The organization’s primary concern is ensuring that it has sufficient funds available to rebuild the data centre in the event it is damaged or destroyed. Which one of the following asset valuation methods would be most appropriate in this situation?

A

Replacement cost

19
Q

what is data portability

A

the right of data subject to move personal data from one data controller to another

20
Q

what agreement in 1996 governs the import & export of crypto technology

A

the wassenaar arrangement

21
Q

what are the key security roles (people)

A
  1. senior mgmt
  2. security professionals
  3. asset owner
  4. custodian
  5. user
  6. auditors
22
Q

what are the basic secure design principles

A
  1. least privilege
  2. defense in depth
  3. secure default
  4. fail securely
  5. separation of duties
  6. keep it simple
  7. trust, but verify
  8. zero trust
  9. privacy by design
  10. shared responsibilities
23
Q

what are the 8 privacy principles

A
  1. collection limitation
  2. data quality
  3. purpose specification
  4. use limitation
  5. security safeguard
  6. openness principles
  7. individual participation
  8. accountability
24
Q

(ISC)2 code of ethics

A
  1. protect society, the common good, necessary public trust and confidence and the infrastructure
  2. act honorably, honestly, justly, responsibly and legally
  3. provide diligent and competent service to principals
  4. advance and protect the profession