CISSP (Chapter 2 - Information Security Governance and Risk Management) Flashcards
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Who has the primary responsibility of determining the classification level for information?A. The functional managerB. Senior managementC. The ownerD. The user
C. A company can have one specific data owner or different data owners who have been delegated the responsibility of protecting specific sets of data. One of the responsibilities that goes into protecting this information is properly classifying it.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
If different user groups with different security access levels need to access the same information, which of the following actions should management take?A. Decrease the security level on the information to ensure accessibility and usability of the information.B. Require specific written approval each time an individual needs to access the information.C. Increase the security controls on the information.D. Decrease the classification label on the information.
C. If data is going to be available to a wide range of people, more granular security should be implemented to ensure that only the necessary people accessChapter 2: Information Security Governance and Risk Management151the data and that the operations they carry out are controlled. The security implemented can come in the form of authentication and authorization technologies, encryption, and specific access control mechanisms.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
What should management consider the most when classifying data?A. The type of employees, contractors, and customers who will be accessing the dataB. Availability, integrity, and confidentialityC. Assessing the risk level and disabling countermeasuresD. The access controls that will be protecting the data
B. The best answer to this question is B, because to properly classify data, the data owner must evaluate the availability, integrity, and confidentiality requirements of the data. Once this evaluation is done, it will dictate which employees, contractors, and users can access the data, which is expressed in answer A. This assessment will also help determine the controls that should be put into place.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Who is ultimately responsible for making sure data is classified and protected?A. Data ownersB. UsersC. AdministratorsD. Management
D. The key to this question is the use of the word “ultimately.” Though management can delegate tasks to others, it is ultimately responsible for everything that takes place within a company. Therefore, it must continually ensure that data and resources are being properly protected.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Which factor is the most important item when it comes to ensuring security is successful in an organization?A. Senior management supportB. Effective controls and implementation methodsC. Updated and relevant security policies and proceduresD. Security awareness by all employees
A. Without senior management’s support, a security program will not receive the necessary attention, funds, resources, and enforcement capabilities.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
When is it acceptable to not take action on an identified risk?A. Never. Good security addresses and reduces all risks.B. When political issues prevent this type of risk from being addressed.C. When the necessary countermeasure is complex.D. When the cost of the countermeasure outweighs the value of the asset and potential loss.
D. Companies may decide to live with specific risks they are faced with if the cost of trying to protect themselves would be greater than the potential loss if the threat were to become real. Countermeasures are usually complex to a degree, and there are almost always political issues surrounding different risks, but these are not reasons to not implement a countermeasure.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Which is the most valuable technique when determining if a specific security control should be implemented?A. Risk analysisB. Cost/benefit analysisC. ALE resultsD. Identifying the vulnerabilities and threats causing the risk
B. Although the other answers may seem correct, B is the best answer here. This is because a risk analysis is performed to identify risks and come up with suggested countermeasures. The ALE tells the company how much it could lose if a specific threat became real. The ALE value will go into the cost/benefit analysis, but the ALE does not address the cost of the countermeasure and the benefit of a countermeasure. All the data captured in answers A, C, and D are inserted into a cost/benefit analysis.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Which best describes the purpose of the ALE calculation?A. Quantifies the security level of the environmentB. Estimates the loss possible for a countermeasureC. Quantifies the cost/benefit resultD. Estimates the loss potential of a threat in a span of a year
D. The ALE calculation estimates the potential loss that can affect one asset from a specific threat within a one-year time span. This value is used to figure out the amount of money that should be earmarked to protect this asset from this threat.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
The security functionality defines the expected activities of a security mechanism, and assurance defines which of the following?A. The controls the security mechanism will enforceB. The data classification after the security mechanism has been implementedC. The confidence of the security the mechanism is providingD. The cost/benefit relationship
C. The functionality describes how a mechanism will work and behave. This may have nothing to do with the actual protection it provides. Assurance is the level of confidence in the protection level a mechanism will provide. When systems and mechanisms are evaluated, their functionality and assurance should be examined and tested individually.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
How do you calculate residual risk?A. Threats × risks × asset valueB. (Threats × asset value × vulnerability) × risksC. SLE × frequency = ALED. (Threats × vulnerability × asset value) × controls gap
D. The equation is more conceptual than practical. It is hard to assign a number to an individual vulnerability or threat. This equation enables you to look at the potential loss of a specific asset, as well as the controls gap (what the specific countermeasure cannot protect against). What remains is the residual risk, which is what is left over after a countermeasure is implemented
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Why should the team that will perform and review the risk analysis information be made up of people in different departments?A. To make sure the process is fair and that no one is left out.B. It shouldn’t. It should be a small group brought in from outside the organization because otherwise the analysis is biased and unusable.C. Because people in different departments understand the risks of their department. Thus, it ensures the data going into the analysis is as close to reality as possible.D. Because the people in the different departments are the ones causing the risks, so they should be the ones held accountable.
C. An analysis is only as good as the data that go into it. Data pertaining to risks the company faces should be extracted from the people who understand best the business functions and environment of the company. Each department understands its own threats and resources, and may have possible solutions to specific threats that affect its part of the company.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Which best describes a quantitative risk analysis?A. A scenario-based analysis to research different security threatsB. A method used to apply severity levels to potential loss, probability of loss, and risksC. A method that assigns monetary values to components in the risk assessmentD. A method that is based on gut feelings and opinions
C. A quantitative risk analysis assigns monetary values and percentages to the different components within the assessment. A qualitative analysis uses opinions of individuals and a rating system to gauge the severity level of different threats and the benefits of specific countermeasures.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Why is a truly quantitative risk analysis not possible to achieve?A. It is possible, which is why it is used.B. It assigns severity levels. Thus, it is hard to translate into monetary values.C. It is dealing with purely quantitative elements.D. Quantitative measures must be applied to qualitative elements.
D. During a risk analysis, the team is trying to properly predict the future and all the risks that future may bring. It is somewhat of a subjective exercise and requires educated guessing. It is very hard to properly predict that a flood will take place once in ten years and cost a company up to $40,000 in damages, but this is what a quantitative analysis tries to accomplish.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
What is CobiT and where does it fit into the development of information security systems and security programs?A. Lists of standards, procedures, and policies for security program developmentB. Current version of ISO 17799C. A framework that was developed to deter organizational internal fraudD. Open standards for control objectives
D. The Control Objectives for Information and related Technology (CobiT) is a framework developed by the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI). It defines goals for the controls that should be used to properly manage IT and ensure IT maps to business needs.
CISSP (Chapter 2 - Information Security Governance and Risk Management)
What are the four domains that make up CobiT?A. Plan and Organize, Acquire and Implement, Deliver and Support, and Monitor and EvaluateB. Plan and Organize, Maintain and Implement, Deliver and Support, and Monitor and EvaluateC. Plan and Organize, Acquire and Implement, Support and Purchase, and Monitor and EvaluateD. Acquire and Implement, Deliver and Support, and Monitor and Evaluate
A. CobiT has four domains: Plan and Organize, Acquire and Implement, Deliver and Support, and Monitor and Evaluate. Each category drills down into subcategories. For example, Acquire and Implement contains the following subcategories:• Acquire and Maintain Application Software• Acquire and Maintain Technology Infrastructure• Develop and Maintain Procedures• Install and Accredit Systems• Manage Changes