Domain 1 Flashcards

1
Q

Dorian automatically backed up a smart phone nightly to the cloud. Does this represent safety confidential Aliti integrity or availability

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Aisha just received an International information system security certification consortium certification. Her primary service as per the code of ethics is to:

Shareholders
Management
Users
Humanity

A

Humanity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ian‘s private data has been attacked and leaked onto the Internet. Which of the following is not his personally identifiable information?

Password
Facial photo
Media access control MAC address
Internet protocol address (ip)

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Someone who completes all the backups for their cloud subscribers. What is the role at their company?

Data owner
Data subject
Data custodian
Data professor

A

Data custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Her user has lost their login and password for a sass solution that was set up a 1999. The system is so old The user no longer has the email account to recover the password the company‘s policy is to not provide credentials via tech-support what is the next step?

Scour the darn web for the credentials
Recovers the login details from 1999 backups
Continue emailing tech support
Give up

A

Scour the dark web for the Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When you discover that two employees you work with colluded and a harm to contractor how should you report this ethics violation to ISC

A

In a typed or hand written letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Installing firewalls to protect users from outside attacks is a good example of what

A

Due care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is recommended to follow only?

Policies, procedures, standards are guidelines

A

Guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wait is required to rebuild the organization and build an IT help test infrastructure for customer support. Which framework and standards and help him best facilitate this

A

The IT infrastructure library ITIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Montrie Is required to stray card verification value codes after transactions have been completed. She is complying with which standard

A

The Payment card industry data security standard PCI – DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

David is reviewing frameworks that would help him with the types of controls that should be in place to secures organization. What standard should he use?

A

ISO 27002

This focuses on security controls being put in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Nina a forensic accountant suspects fried within the organization and implemented separation of duties to medicate the issues. Later investigation shows a fraud has appeared to continue. What is most likely occurring

A

Collusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Do you know a forensic accountant suspects far within the organization implemented Separation of duties to medicate issues. Later investigation shows Fred has appeared to continue what is her next best step

A

Implement job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What represents the indirect costs, direct cost, replacement cost and upgrade cost for the entire life cycle of a asset

A

TCO

Total cost of ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Negligence uses a reasonable person standard in cyber security measures showing necessary do you care when working with PII. this is known as

A

Prudent person principal

This is a standard of care that a reasonably prudent person would follow in certain situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should be combined with a PIN To recover detail records of a loan agreement

A

Common access card (CAC)

This is the best authentication type to go find some thing that you know authentication with. Since your password, mothers maiden name and birthday or or something you know these combine with a pen with simply be single factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Randy is an engineering manager who hires Perseus senior engineer to manage the corporation account in Cleveland. But also a senior in engineer here’s complaints from customers and report them to Randy’s of Percy. What is Randy’s best next step

A

Follow corporate policies on staff management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ya a is selling Covid 19 masks online to the EU. Which regulation is the most important for her to consider

A

GFPR

General data protection regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which fender neutral certification helps validate at the club provider has good security quality assurance

A

CSA Star

cloud security allowance security trust assurance and risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Credit card information was stolen, and the victim believes that the owner should go to prison what is most likely to occur

A

The PCI – DSS is a contractual agreement between the store owner and the credit card provider. At worse the owner will lose the right to except credit cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What would be used when IT services are outsourced

A

SLA

SLAs are used to monitor the effectiveness of the service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Tara’s computer started performing very slowly, and then a pop-up blocker computer I notified her that unless she paid $300 she would never have access to date again. What type of attack is this

A

Ransomware 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Alexis is a security engineer my secure network from the outside attackers

A

Implement security harden standards which would include disabling telling an FTP services, installing the latest cutie patches and updates are moving default login passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Koopa security manager practices decrypting secure documents. He is plain text of some of the files and needs to keep the rest. What a tech should he use

A

Known plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which is not a directive control type?

A Privacy policy, terms of services, guard dog or beware of guard dog

A

Guard dog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

David  Has purchased tablets for the staff for $2000 each. Insurance will cover 50% of their loss stolen or damaged. On an average here five laptops or less dollar damage. What would be the annualize lost expectancy calculation

A

5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Zulian has spent weeks collecting pricing performance and turning data to conduct her risk assessment meetings now that she has all the data, Our team will perform which type of risk analysis

A

Quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Zhenjiang advises on security matters, helps drafts security policies and sits on the config management board. What is his role

A

Security director

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DMCA

A

a
Digital millennium copyright act

This is used if there is copyrighted material and it is not removed

30
Q

EAC

A

Email account compromise

This happens when attack or use this phishing, spearphishing, wailing, password attacks, malware and so on to compromise a sea level executive email account for the purpose of tricking targets to send sons

31
Q

A systems administrator notices that Spam and phishing attacks are increasing what’s the next best step

A

Implement training on spam and phishing attacks

32
Q

What represents an acceptable amount of data loss measured in time

A

RPO and backup should be taken for the amount of time that the RPO set

33
Q

Individuals from all departments of the organization meet to prioritize risk space on impact, likelihood, and exposure what process is this

A

Business impact analysis

34
Q

What is a non-technical method to engage a victim and gather information to help exploit An attack

A

Social engineering

35
Q

What is the formula used to calculate risk

A

Risk = threat * vulnerability

36
Q

Kyung has been assigned to find recovery size result the deer planning meeting. Her job is to find sites with heating cooling electricity Internet access and power. The site will require no computers. Whatever recovery site is this

A

Cold

37
Q

Mr. Billings is the chief security officer of the organization in this designing a policy that includes fences secured parking security policies farewells account management and patch management. This is example of what strategy

A

Defense in depth

38
Q

Form sites are which type of control functionality

A

Recovery

39
Q

What type of laws are invoked when a person violates government laws

A

Criminal laws

40
Q

Gail and his team have developed the perfect advertising algorithm so that when users search on his website it leads them in exactly to the information they need to reach. What is his best approach to us during the secrecy of his algorithm

A

Copyright

41
Q

Mr. billing uses the Linux operating system in for the copies and gives it to his friends. He is allowed to do this because of which of the following licenses

A

End user license agreement

EULA

42
Q

The area of the United States copyright law that makes it crime to copy and distribute Stolen software is called

A

DCMA

43
Q

A document that has step-by-step instructions

A

Procedures

44
Q

What is not used to calculate the total cost of ownership

A

Cost to replace the item

TCO uses
Support costs , maintenance costs and assets cost

45
Q

A
46
Q

When calculating TCO what won’t be used?

Support costs
Cost to replace unit
Cost maintenance
Asset cost

A

Cost to replace unit

47
Q

When figuring out the percentage of risk and org would suffer if an asset is compromised, what signifies the aspect of risk?

Safeguards
Vulnerabilities
Exposure factor

A

Vulnerabilities

48
Q

Security management is Developing and updating policies for staff and vendors in security are considered which of the following ?

Management
Operational
Technical
Logical

A

Management

49
Q

True or false

Procedures are the same as written directives

A

True

50
Q

True or false

Strategic documents would be considered policies

A

True

51
Q

True or false

Guidelines contain step by step instructions that must be followed

A

False

52
Q

True or false

Standards can define KPIs

A

True

53
Q

A project engineer puts together a project, and she adds security according to the lifecycle. What is the life cycle

A
Planning 
Requirements 
Design 
Develop
Test
Production 
Disposal
54
Q

Which is not a PCI-DSS requirement

Configure switch settings
Maintain firewall
Encrypt transmission of cc data
Use anti virus software

A

Configure switch settings

55
Q

If an employee signed a REP(reasonable expectation of privacy agreement) but her boss has been reading her emails and listening to calls, what step should the employee take next?

A

Nothing, she waived her rights to phone privacy while at work

56
Q

An employee doesn’t want to loose their job if their employer finds out they have cancer. They don’t want what to leak?

PHI
HIPAA
HHS
HITECH

A

PHI

57
Q

Boris is working to complete a design project. He decides to hire a contractor to help complete the project on time. What type of risk response is he using?

A

Acceptance

58
Q

What is critical for proper IR?

A

Having an IRP

59
Q

Quests is preparing a DR exercise and emails emergency task lists tot eh DR teams for review. What type of exercises?

A

Checklist

60
Q

Quests is a space Flight Lieutenant putting together classifications for her computer system which of the following sensitivity system so she follow

A

Top-secret, secret, confidential, unclassified

This is because she is in the military

61
Q

Andre provided his phone number, email address, and home address to the delivery place so they can deliver the groceries, he is considered what?

Data owner
Data custodian
Data subject
Data auditor 

A

Data subject

62
Q

Venus needs an administrative co tell to enhance the confidentiality of data, what should she implement?

A

NDA

63
Q

Juan plans to perform testing on his website and generate random input to see if it is vulnerable to what type of attack?

Fuzzing
Dos
Malware
Input validation

A

Fuzzing

Fuzz Testing applications low tons of random and put in the fields.

64
Q

Stan wishes to set up more secure authentication for Caesars which of the following is not best for authentication

Retinal scan, username, Palm V scan, or CAC

A

User name

65
Q

What is not part of an SLA

Financial credit for downtime, office services, coverage service, service level objects

A

Alpha services

66
Q

Noncompete agreements are generally unenforceable because

A

Courts value as citizens right to earn a reasonable income

67
Q

Which is best represented as the product of a threat and vulnerability?

A

Risk

68
Q

What represents the product of the assets value and exposure factor!?

A

Single loss expectancy (SLE)

69
Q

And organization is initiating the qualitative risk analysis process which is not part of the process

A

Cost versus benefit analysis

Qualitative research depends more on rankings in judgment rather than numbers

70
Q

What is the number one source of cyber fatigue

A

Password management