Chapter 1, Today's Cyber Security Analyst Flashcards

1
Q

If security controls are focused on protecting data, privacy controls are focused on what?

A

privacy controls focus on the ways a company can use and share information it has collected about individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GAPP are strong best practices for implementing a ______ program.

A

privacy program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which GAPP principle does the following align to? “The entity monitors compliance with its privacy policies and procedures and has procedures to address privacy-related complaints and disputes.”

a. Monitoring and enforcement
b. Use, retention, and disposal.
c. Choice and consent.

A

a. Monitoring and enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which GAPP principle does the following align to? “The entity protects personal information against unauthorized access (both physical and logical).”

a. Access.
b. Collection.
c. Security for privacy.

A

C. Security for privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which GAPP principle does the following align to?
“The entity describes the choices available to the individual and obtains implicit or explicit consent with respect to the collection, use, and disclosure of personal information. “

A

Choice and Consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which GAPP principle does the following align to? “the entity limits the use of personal information to the purposes identified in the notice and for which the individual has provided implicit or explicit consent. The entity retains personal information for only as long as necessary…”

A

Use, retention, and disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the definition of a Threat?

A

is any circumstance or event that has the potential

to compromise confidentiality, integrity, or availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk is the possibility or likelihood of…

A

threat exploiting a vulnerability

resulting in a loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The combination of ______ x _____ equals the Risk

A

Threat x Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which NIST document guides for conducting risk assessments?

A

(SP) 800-30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the NIST SP 800-30, what are the first two tasks in Step 2 of Conducting the risk assessment?

A

1- Identify Threats

2 - Identify vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the NIST SP 800-30, what are the 3-4 and 5 tasks in Step 2 of Conducting the risk assessment?

A

3 - Determine likelihood of occurrence
4 - determine magnitude of impact
5 - determine risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What kind of environment would you only use Mandatory Access Control approach to security? Why? Which operating system can enforce it?

A

In highly sensitive applications. This is because it is tricky to manage.
SELinux can enforce it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which NIST document guides on conducting pen tets?

A

800-115

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 phases of the pen test planning stage?

A

Timing
Scope
Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In war games, which team is responsible for securing the targeted environment?

A

Blue team

17
Q

What does the white team do in cyber security war games?

A

coordinates the exercise, arbitrates and maintains the technical environment

18
Q

What is decomposition?

A

Decomposition is a philospohy of reverse engineering where engineers start with the finished product and work their way back to its component parts.

19
Q

What uses code detonation and what is it?

A

After isolating application code, a sandbox will use code detonation which stops the code running on the network after the sandbox has determined that the application is behaving strangely

20
Q

Why are compiled languages hard to reverse engineer?

A

Because they’re in binary format for the machine to be able to read and not a human. De compiling the binary back to the source code is usually unreliable.