CIS Controls 1-18 Flashcards

1
Q

Control 1 Inventory and control of enterprise assets

A

Helps organizations actively track and manage all IT assets connected to a company’s IT infrastructure physically or virtually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2 Inventory and control of software assets

A

Provides recommendations for organizations to track and actively manage all software applications so that only authorized software is installed on company devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Protection

A

Helps organizations develop ways to securely manage the entire life cycle of their data, from initial identification and classification data to its disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure configuration of enterprise assets and software

A

Helps organizations establish and maintain secure baseline configurations for their enterprise assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Account management

A

This control outlines best practices for companies to manage credentials and authorization for user accounts, privileged user accoutns, and service accounts for the company hardware and software applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access control management

A

Specifies the type of access that the user account should have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Continuous vulnerability management

A

Helps identify and track vulnerabilities within its infrastructure so that it can remediate and eliminate weak points or windows of opportunity for bad actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Audit log management

A

Establishes an enterprise log management process so that organizations can be altered and recover from an attack in real-time, or near real time, using log collection and analytic features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Email and Web browse protection

A

Provides recommendations on how to detect and protect against cybercrime attempted through email or the internet by directly engaging employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data recovery

A

Established data backup, testing, and restoration processes that allow organizations to effectively recover company assets to a pre-incident state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware defenses

A

Assists companies in preventing the installation and propagation of malware onto company assets and its network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network infrastructure management

A

Established procedures and tools for managing and securing a company’s network infrastructure. Network infostructure included both physical and virtual devices, such as firewalls, gateways, routers, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network monitoring and defense

A

Establishes processes for monitoring and defending a company’s network infrastructure against internal and external security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Awareness and skill training

A

Guides organizations in establishing a security awareness and training program to reduce cybersecurity risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Service provider management

A

Helps organizations develop processes to evaluate third-party service providers that have access to sensitive data or that are responsible for managing some or all of a company’s IT functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application software security

A

Establishes safeguards that manage the entire life cycle of software that is acquired, hosted, or developed in-house to detect, deter, and resolve cybersecurity weaknesses before they are exploited

16
Q

Incident response management

A

Provides the recommendations necessary to establish an incident response management program to detect, respond, and prepare for potential cybersecurity attacks.

17
Q

Penetration testing

A

Helps organizations test the sophistication of their cybersecurity defense system in place by simulating actual attacks in an effort to not just find but exploit weaknesses.