Domain 1 Flashcards
Dorian automatically backed up a smart phone nightly to the cloud. Does this represent safety confidential Aliti integrity or availability
Availability
Aisha just received an International information system security certification consortium certification. Her primary service as per the code of ethics is to:
Shareholders
Management
Users
Humanity
Humanity
Ian‘s private data has been attacked and leaked onto the Internet. Which of the following is not his personally identifiable information?
Password
Facial photo
Media access control MAC address
Internet protocol address (ip)
Password
Someone who completes all the backups for their cloud subscribers. What is the role at their company?
Data owner
Data subject
Data custodian
Data professor
Data custodian
Her user has lost their login and password for a sass solution that was set up a 1999. The system is so old The user no longer has the email account to recover the password the company‘s policy is to not provide credentials via tech-support what is the next step?
Scour the darn web for the credentials
Recovers the login details from 1999 backups
Continue emailing tech support
Give up
Scour the dark web for the Credentials
When you discover that two employees you work with colluded and a harm to contractor how should you report this ethics violation to ISC
In a typed or hand written letter
Installing firewalls to protect users from outside attacks is a good example of what
Due care
What is recommended to follow only?
Policies, procedures, standards are guidelines
Guidelines
Wait is required to rebuild the organization and build an IT help test infrastructure for customer support. Which framework and standards and help him best facilitate this
The IT infrastructure library ITIL
Montrie Is required to stray card verification value codes after transactions have been completed. She is complying with which standard
The Payment card industry data security standard PCI – DSS
David is reviewing frameworks that would help him with the types of controls that should be in place to secures organization. What standard should he use?
ISO 27002
This focuses on security controls being put in place
Nina a forensic accountant suspects fried within the organization and implemented separation of duties to medicate the issues. Later investigation shows a fraud has appeared to continue. What is most likely occurring
Collusion
Do you know a forensic accountant suspects far within the organization implemented Separation of duties to medicate issues. Later investigation shows Fred has appeared to continue what is her next best step
Implement job rotation
What represents the indirect costs, direct cost, replacement cost and upgrade cost for the entire life cycle of a asset
TCO
Total cost of ownership
Negligence uses a reasonable person standard in cyber security measures showing necessary do you care when working with PII. this is known as
Prudent person principal
This is a standard of care that a reasonably prudent person would follow in certain situation
What should be combined with a PIN To recover detail records of a loan agreement
Common access card (CAC)
This is the best authentication type to go find some thing that you know authentication with. Since your password, mothers maiden name and birthday or or something you know these combine with a pen with simply be single factor authentication
Randy is an engineering manager who hires Perseus senior engineer to manage the corporation account in Cleveland. But also a senior in engineer here’s complaints from customers and report them to Randy’s of Percy. What is Randy’s best next step
Follow corporate policies on staff management
Ya a is selling Covid 19 masks online to the EU. Which regulation is the most important for her to consider
GFPR
General data protection regulation
Which fender neutral certification helps validate at the club provider has good security quality assurance
CSA Star
cloud security allowance security trust assurance and risk
Credit card information was stolen, and the victim believes that the owner should go to prison what is most likely to occur
The PCI – DSS is a contractual agreement between the store owner and the credit card provider. At worse the owner will lose the right to except credit cards
What would be used when IT services are outsourced
SLA
SLAs are used to monitor the effectiveness of the service provider
Tara’s computer started performing very slowly, and then a pop-up blocker computer I notified her that unless she paid $300 she would never have access to date again. What type of attack is this
Ransomware 
Alexis is a security engineer my secure network from the outside attackers
Implement security harden standards which would include disabling telling an FTP services, installing the latest cutie patches and updates are moving default login passwords.
Koopa security manager practices decrypting secure documents. He is plain text of some of the files and needs to keep the rest. What a tech should he use
Known plaintext attack
Which is not a directive control type?
A Privacy policy, terms of services, guard dog or beware of guard dog
Guard dog
David  Has purchased tablets for the staff for $2000 each. Insurance will cover 50% of their loss stolen or damaged. On an average here five laptops or less dollar damage. What would be the annualize lost expectancy calculation
5000
Zulian has spent weeks collecting pricing performance and turning data to conduct her risk assessment meetings now that she has all the data, Our team will perform which type of risk analysis
Quantitative
Zhenjiang advises on security matters, helps drafts security policies and sits on the config management board. What is his role
Security director