Domain 1 Flashcards
Security Principles
A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff. This is an example of a _____ control.
Management/Administrative control
Which region enacted comprehensive legislation addressing personal privacy in 2016?
European Union
(In 2016, the European Union passed comprehensive legislation addressing personal privacy, deeming it an individual human right)
What is the purpose of implementing security controls in the risk management process?
To mitigate the risk to an acceptable level
If a pickpocket is a threat, what would be their attack vector?
Their technique and approach
What term is used to refer to information that, when combined with other pieces of data, significantly narrows the possibility of association with more individuals?
Personally Identifiable Information (PII)
How do companies that offer identity theft insurance manage their own financial risk?
By calculating premium payments against potential payouts
What potential risk can occur when a remote worker’s laptop is left unattended or unlocked?
Accidental introduction of unauthorized software with malware
Multifactor authentication involves using two or more instances of different authentication factors.
Which of the following are considered a widely accepted factor for authentication?
While taking the certification exam for this certification, you notice another candidate for the certification cheating.
What should you do?
Report the candidate to ISC2
In the United States, which act governs the privacy of medical information?
HIPAA
What is an “asset” in the context of risk management terminology?
Something in need of protection
Who is responsible for determining risk tolerance in an organization?
What action is suggested to mitigate the risk associated with a threat?
Evaluate the likelihood of the event and take appropriate actions to mitigate the risk
Which regulation grants data protection and control to individuals within the EU, regardless of citizenship?
General Data Protection Regulation (GDPR)
What role might security professionals play in risk assessment at a system level?
Assisting in risk assessment at a system level