Domain 1 Security and Risk Management Flashcards
business organizations use which of the following levels of classifications:
Public, Internal Use Only, Confidential, Restricted
time between when the changes are made on one system and when they’re propagated to other systems is known as:
Time-of-check/time-of-use (TOC/TOU)
This person is responsible for the overall protection of the information assets.
Executive Manager
This legal system is also known as Regulatory Law and is concerned with the governance of public bodies and agency power among other areas.
Administrative Law
Who should direct short-term recovery actions immediately following a disaster?
Disaster Recovery Manager.
Which of the following should NOT be a role of the Security Administrator?
Authorizing access rights
What is the main purpose of Corporate Security Policy?
To communicate management’s intentions in regards to information security
A contingency plan should address:
Potential risks. Residual risks. Identified risks.
Which of the following focuses on sustaining an organization’s business functions during and after a disruption?
Business continuity plan
The deliberate planting of apparent flaws in a system for the purpose of detecting attempted penetrations or confusing an intruder about which flaws to exploit is called:
enticement
What are the three primary goals of a BIA?
Criticality prioritization, downtime estimation, and resource requirements.
most appropriate to notify an internal user that monitoring is being enforced and there is no expectation of privacy on systems that belong to the company?
Written agreement
guidelines recommended to protect PII
Limited, Relevant and Specific in Purpose
This type of authentication is better than simple passwords but the technology involved is still subject to loss, damage, or theft for examination.
Type 2: Something you have
What is the appropriate role of the security analyst in the application system development or acquisition project?
control evaluator & consultant
The first step in the implementation of the contingency plan is to perform:
A data backup
Who is responsible for restricting and monitoring access of a data user?
Security Administrator
Which of the following would be the best recovery strategy if you have an application which cannot accept any downtime without negatively impacting the organization.
Dual Data Center
Hashing functions takes message input of a given length and create a(n) __________.
Fixed Length Output
This sequence is used to detect errors in transmission of messages and is often deployed with symmetric key cryptography.
Checksum
A professor in a school shared a time management software with a colleague so that she could check out its features and buy the software if she found it useful. This may have likely violated the terms under which the software was licensed to the professor. What ethical principle would the professor apply to justify his action?
Change of scale test
Which of the following is not part of the current state assessment phase for BCP/DRP?
Design initial acceptance testing of plans
Which of the following contains general approaches that also provide the necessary flexibility in the event of unforeseen circumstances?
Guidelines
Which of the following teams is responsible for starting recovery of the original site in the aftermath of a disaster?
Salvage team
what are the guidelines to classify data?
Classify all data irrespective of the format it exists in (paper, digital, audio, video)
What formula is used to calculate total risk?
Threats x vulnerability x asset value
the following is NOT a responsibility of a database administrator
Providing access authorization to databases
What are the five key principle that forms the core of the COBIT5 framework?
1) Meeting Stakeholders needs,
2) Covering the enterprise end to end,
3) Apply a single integrated framework,
4) Enabling a holistic approach,
5) Seperating governance from management.
The method for determining the level of risk to the organization’s information if this data to be lost or compromised is known as:
Information Classification
Plans and organizes information security activities throughout the organization.
Security officer
When it comes to Risk Mitigation, which risk countermeasure involves not even taking the chance with the risk?
Risk Avoidance
What are the three primary goals of a BIA?
Criticality prioritization,
downtime estimation, and
resource requirements.
ISC2 Code of Ethics Canons?
*Protect society, the commonwealth, and the infrastructure
Advance and protect the profession
Act honorably, honestly, justly, responsibly, and legally Provide diligent and competent service to principals
financial risks can be calculated is by using the formula:
P * M = C
(AAA)
Identity and Authentication, Authorization and Accountability