Domain 1 Flashcards
Security Principles
A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff. This is an example of a _____ control.
Management/Administrative control
Which region enacted comprehensive legislation addressing personal privacy in 2016?
European Union
(In 2016, the European Union passed comprehensive legislation addressing personal privacy, deeming it an individual human right)
What is the purpose of implementing security controls in the risk management process?
To mitigate the risk to an acceptable level
If a pickpocket is a threat, what would be their attack vector?
Their technique and approach
What term is used to refer to information that, when combined with other pieces of data, significantly narrows the possibility of association with more individuals?
Personally Identifiable Information (PII)
How do companies that offer identity theft insurance manage their own financial risk?
By calculating premium payments against potential payouts
What potential risk can occur when a remote worker’s laptop is left unattended or unlocked?
Accidental introduction of unauthorized software with malware
Multifactor authentication involves using two or more instances of different authentication factors.
Which of the following are considered a widely accepted factor for authentication?
Something you are, something you know
While taking the certification exam for this certification, you notice another candidate for the certification cheating.
What should you do?
Report the candidate to ISC2
In the United States, which act governs the privacy of medical information?
HIPAA
What is an “asset” in the context of risk management terminology?
Something in need of protection
Who is responsible for determining risk tolerance in an organization?
Executive management and board of directors
What action is suggested to mitigate the risk associated with a threat?
Evaluate the likelihood of the event and take appropriate actions to mitigate the risk
Which regulation grants data protection and control to individuals within the EU, regardless of citizenship?
General Data Protection Regulation (GDPR)
What role might security professionals play in risk assessment at a system level?
Assisting in risk assessment at a system level
Who is responsible for identifying risks within an organization?
Employees at all levels of the organization
Procedures are
the detailed steps to complete a task that support
departmental or organizational policies
They are put in place by organizational governance, such as executive management, to provide guidance in all activities to ensure that the organization supports industry standards and regulations
Policies are
often used by governance teams to provide a framework to introduce policies and proceduresin support of regulations
Standards
commonly issued in the form of laws, usually from
government (not to be confused with governance) and typically carry financial penalties for non-compliance
Regulations are
Bot
Malicious code that acts like a remotely controlled “robot” for an attacker, with other Trojan and worm capabilities
Criticality
A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function
Data Integrity
The property that data has not been altered in an unauthorized manner. Data integrity covers data in storage, during processing and while in transit
General Data Protection Regulation (GDPR)
In 2016, the European Union passed comprehensive legislation that addresses personal privacy, deeming it an individual human right
Integrity
The property of information whereby it is recorded, used and maintained in a way that ensures its completeness, accuracy, internal consistency and usefulness for a stated purpose
International Organization of Standards (ISO)
The ISO develops voluntary international standards in collaboration with its partners in international standardization, the International Electro-technical Commission (IEC) and the International Telecommunication Union (ITU), particularly in the field of information and communication technologies
Internet Engineering Task Force (IETF)
The internet standards organization, made up of network designers, operators, vendors and researchers, that defines protocol standards (e.g., IP, TCP, DNS) through a process of collaboration and consensus
Multi-Factor Authentication
Using two or more distinct instances of the three factors of authentication (something you know, something you have, something you are) for identity verification