Chapter 10 - Auditing and Management Process Flashcards

1
Q

What is a clipping level in auditing?

A

The Clipping Level is the predefined threshold upon an action must breach for an alert to be triggered.

One failed log on attempt should not trigger an alert but double digit failed log on attempt could suggest a bruteforce attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Audits are an example of what control?

Preventative, Detective or Physical control?

A

Detective Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When are audits typically conducted?

A
  1. Regular predefined periods such as yearly, monthly etc.
  2. After significant events such as breaches.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the ISACA CISA certification?

A

A certification that identifies individuals who audit, control and assess a business’s IP and business systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the ISACA CSM certification?

A

A management focused certification that audits individuals who design, build and manage enterprise InfoSec programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is PCIDSS?

A

PCIDSS - Payment Card Industry Data Security Standards

Requires organization that processes card payments to comply with specific security requirements to protect account and card data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ‘Imaging’ in relation to configuration management?

A

Imaging is when a standard OS image is deployed that has been configured to suit the organizations’ security baseline.

These images are used to deploy resources across the estate.

These contain specific system hardening configurations along with other configurations in line with the company’s security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Group Policy in relation to configuration management?

A

Group Policy allows centralized administration of deployed resources.

Group Policy Objects are system configurations that have been identified within the group’s security policy and can be changed centrally by an administrator and deployed across the entire estate.

i.e. Ports, Firewalls, Port service etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In relation to change management what is CRB and CAB?

A

Change Review Board

Change Authority Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly