Domain 1 - Security and Risk Management Flashcards
Which of the following contains the primary goals and objectives of security? A. A network’s border perimeter B. The CIA Triad C. A stand-alone system D. The Internet
B. The CIA Triad
Vulnerabilities and risks are evaluated based on their threats against which of the
following?
A. One or more of the CIA Triad principles
B. Data usefulness
C. Due care
D. Extent of liability
A. One or more of the CIA Triad principles
Which of the following is a principle of the CIA Triad that means authorized subjects are
granted timely and uninterrupted access to objects?
A. Identification
B. Availability
C. Encryption
D. Layering
B. Availability
Which of the following is not considered a violation of confidentiality? A. Stealing passwords B. Eavesdropping C. Hardware destruction D. Social engineering
C. Hardware destruction
Which of the following is not true?
A. Violations of confidentiality include human error.
B. Violations of confidentiality include management oversight.
C. Violations of confidentiality are limited to direct intentional attacks.
D. Violations of confidentiality can occur when a transmission is not properly encrypted.
C. Violations of confidentiality are limited to direct intentional attacks.
STRIDE is often used in relation to assessing threats against applications or operating
systems. Which of the following is not an element of STRIDE?
A. Spoofing
B. Elevation of privilege
C. Repudiation
D. Disclosure
D. Disclosure
If a security mechanism offers availability, then it offers a high level of assurance that
authorized subjects can _________________________ the data, objects, and resources.
A. Control
B. Audit
C. Access
D. Repudiate
C. Access
\_\_\_\_\_\_\_\_\_\_\_ refers to keeping information confidential that is personally identifiable or which might cause harm, embarrassment, or disgrace to someone if revealed. A. Seclusion B. Concealment C. Privacy D. Criticality
C. Privacy
All but which of the following items requires awareness for all individuals affected?
A. Restricting personal email
B. Recording phone conversations
C. Gathering information about surfing habits
D. The backup mechanism used to retain email messages
D. The backup mechanism used to retain email
What element of data categorization management can override all other forms of access control? A. Classification B. Physical access C. Custodian responsibilities D. Taking ownership
D. Taking ownership
What ensures that the subject of an activity or event cannot deny that the event occurred? A. CIA Triad B. Abstraction C. Nonrepudiation D. Hash totals
C. Nonrepudiation
Which of the following is the most important and distinctive concept in relation to layered security? A. Multiple B. Series C. Parallel D. Filter
B. Series
Which of the following is not considered t an example of data hiding?
A. Preventing an authorized reader of an object from deleting that object
B. Keeping a database from being accessed by unauthorized visitors
C. Restricting a subject at a lower classification level from accessing data at a higher classification level
D. Preventing an application from accessing hardware directly
A. Preventing an authorized reader of an object from deleting that object
What is the primary goal of change management? A. Maintaining documentation B. Keeping users informed of changes C. Allowing rollback of failed changes D. Preventing security compromises
D. Preventing security compromises
What is the primary objective of data classification schemes?
A. To control access to objects for authorized subjects
B. To formalize and stratify the process of securing data based on assigned labels of
importance and sensitivity
C. To establish a transaction trail for auditing ccountability
D. To manipulate access controls to provide for the most efficient means to grant or restrict functionality
B. To formalize and stratify the process of securing data based on assigned labels of
W hich of the following is typically not a characteristic considered when classifying data? A. Value B. Size of object C. Useful lifetime D. National security implications
B. Size of object
What are the two common data classification schemes?
A. Military and private sector
B. Personal and government
C. Private sector and unrestricted sector
D. Classified and unclassified
A. Military and private sector
Which of the following is the lowest military data classification for classified data? A. Sensitive B. Secret C. Proprietary D. Private
B. Secret
Which commercial business/private sector data classification is used to control information about individuals within an organization? A. Confidential B. Private C. Sensitive D. Proprietary
B. Private
Data classifications are used to focus security controls over all but which of the following? A. Storage B. Processing C. Layering D. Transfer
C. Layering
A threat categorization scheme developed by Microsoft. It is an acronym standing for: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
STRIDE
To prevent unauthorized disclosure
Confidentiality
No unauthorized modifications, consistent data
Integrity
Reliable and timely access to resources
Availability
User claims identity. Used for user access control
Identification
Process of verifying a user’s identity
Authentication
Linking actions to a user
Accountability
Granting rights and permissions to an authorized identity
Authorization
Recording a log of events and activities related to subjects and systems
Auditing
Ensures subject of activity or event cannot deny that they event happened
Nonrepudiation
A long-term plan that is fairly stable and not a lot of detail. It defines the organizations goals and objectives. It is part of Security Management Planning
Strategic
A midterm plan developed to provide more details on accomplishing the goals in the strategic plan. It is part of Security Management Planning.
Tactical
Plans that are short-term and highly detailed. Based on Strategic and Tactical plans.
Operational
The user of multiple security controls in a series.
Layering or Defense in Depth
Put similar elements into groups, classes or roles for efficiency. Used when classifying objects or assigning roles to subjects.
Abstraction
Preventing data from being discovered or accessed by a subject.
Data Hiding
The collection of practices related to supporting, defining, and directing the security efforts of an entire organization.
Security Governance
Document that defines the scope of security needed by the organization. It also discusses the assets that need protection and the extent which security solutions should go to provide protection. An overview of the organizations security needs. Part of a Security Policy Structure
Security Policy
Tactical documents that define steps or methods to accomplish the goals and direction defined by security policies. Part of a Security Policy Structure
Standards
Defines a minimum level of security that every system must meet. Part of a Security Policy Structure
Baselines
Offers recommendations on how standards and baselines are implemented and servers as an operational guide for both security professionals and users. Part of a Security Policy Structure
Guidelines
A detailed, step-by-step how to document that describes the exact actions necessary to implement a specific security solution. Part of a Security Policy Structure
Procedures