Domain 1 Flashcards

Security Principles

1
Q

A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff. This is an example of a _____ control.

A

Management/Administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which region enacted comprehensive legislation addressing personal privacy in 2016?

A

European Union

(In 2016, the European Union passed comprehensive legislation addressing personal privacy, deeming it an individual human right)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of implementing security controls in the risk management process?

A

To mitigate the risk to an acceptable level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a pickpocket is a threat, what would be their attack vector?

A

Their technique and approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What term is used to refer to information that, when combined with other pieces of data, significantly narrows the possibility of association with more individuals?

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do companies that offer identity theft insurance manage their own financial risk?

A

By calculating premium payments against potential payouts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What potential risk can occur when a remote worker’s laptop is left unattended or unlocked?

A

Accidental introduction of unauthorized software with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multifactor authentication involves using two or more instances of different authentication factors.

Which of the following are considered a widely accepted factor for authentication?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

While taking the certification exam for this certification, you notice another candidate for the certification cheating.

What should you do?

A

Report the candidate to ISC2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the United States, which act governs the privacy of medical information?

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an “asset” in the context of risk management terminology?

A

Something in need of protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is responsible for determining risk tolerance in an organization?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What action is suggested to mitigate the risk associated with a threat?

A

Evaluate the likelihood of the event and take appropriate actions to mitigate the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which regulation grants data protection and control to individuals within the EU, regardless of citizenship?

A

General Data Protection Regulation (GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What role might security professionals play in risk assessment at a system level?

A

Assisting in risk assessment at a system level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is responsible for identifying risks within an organization?

A

Employees at all levels of the organization

16
Q

Procedures are

A

the detailed steps
to complete a task that support
departmental or organizational policies

17
Q

Policies are

A

put in place by organizational
governance, such as executive
management, to provide guidance
in all activities to ensure that the
organization supports industry
standards and regulations

18
Q

Standards are

A

often used by governance
teams to provide a framework to
introduce policies and procedures
in support of regulations

19
Q

Regulations are

A

commonly issued
in the form of laws, usually from
government (not to be confused with
governance) and typically carry financial
penalties for non-compliance