Domain 1- Security and Risk Management Flashcards
Under the Digital Milennium Copyright Act (DMCA), what type of offenses do not require prompt action by an internet service provider after it receives a notification of infringement claim from a copyright holder?
A) Storage of information by a customer on a provider’s server
B) Caching of information by the provider
C) Transmission of information over the provider’s network by a customer
D) Caching of information in a provider search engine
C) The DMCA states that providers are not responsible for the transitory activities of their users. Transmission of information over a network would qualify for this exemption. The other activities listed are all non-transitory actions that require remediation by the provider.
Which one of the following elements of information is not considered PII that would trigger most US state data breach laws?
A) Student ID number
B) Social security number
C) Driver’s license number
D) Credit card number
A) Most state data breach notification laws are modeled after California’s law, which covers SSN, driver’s license number, state identification card number, credit/debit card number, bank account numbers (in conjunction with a PIN or password) , medical records, and health insurance information
In 1991, the Federal sentencing guidelines formalized a rule that requires senior executives to take personal responsibility for information security matters. What is the name of this rule?
A) Due diligence rule
B) Personal liability rule
C) Prudent man rule
D) Due process rule
C) The prudent man rule requires that senior executives take personal responsibility ensuring that the due care that ordinary, prudent individuals would exercise in the same situation. The rule originally applied to financial matters, but federal sentencing guidelines applied them to information security matters in 1991.
Scott is developing a BCP and is having difficulty prioritizing resources because of the difficulty of combining information about tangible and intangible assets. What would be the most effective risk assessment approach for him to use?
A) Quantitative analysis
B) Qualitative analysis
C) Neither quantitative nor qualitative risk assessment
D) Combination of quantitative and qualitative risk assessment?
D) Scott would see the best results by combining elements of quantitative and qualitative risk assessment. Quantitative risk assessment excels at analyzing financial risk, while qualitative risk assessment is a good tool for intangible risks. Combining the two techniques provides a well rounded risk picture.
Which one of the following actions might be taken as part of a business continuity plan?
A) Restoring from backup tapes
B) Implementing RAID
C) Relocating to a cold site
D) Restarting business operations
B) RAID technology provides fault tolerance for hard drive failures and is an example of a business continuity action. Restoring from backup tapes, relocating to cold site, and restarting business operations are all DR actions
Which one of the following is not normally considered a business continuity task?
A) Business impact assessment
B) Emergency response guidelines
C) Electronic vaulting
D) Vital records program
C) Electronic vaulting is a data backup task that is part of a disaster recovery, not business continuity effort.
Who should receive initial BCP training in an organization?
A) Senior executives
B) Those with specific business continuity roles
C) Everyone in the organization
D) First responders
C) Everyone in the organization should receive a basic awareness training for the BCP. Those with specific roles, such as first responders and senior executives, should also recieve detailed, role-specific training.
James is conducting a risk assessment for his org. and is attempting to assign an asset value to the servers in his data center. The organization’s primary concern is ensuring that it has sufficient funds available to rebuild the data center in the event it is damaged or destroyed. Which one of the following asset valuation methods would be most appropriate i this situation?
A) Purchase cost
B) Depreciated cost
C) Replacement cost
D) Opportunity cost
C) If the organization’s primary concern is the cost of rebuilding the data center, James should use the replacement cost method to determine the current market price for equivalent servers
HAL systems recently decided to stop offering public NTP services because of a fear that its NTP servers would be used in amplification DDoS attacks. What type of risk management strategy did HAL pursue with respect to its NTP services
A) Risk mitigation
B) Risk acceptance
C) Risk transference
D) Risk avoidance
D) HAL systems decided to stop offering the service because of the risk. This is an example of a risk avoidance strategy. The company altered its operations in a manner that eliminates the risk of NTP misuse.
Becka recently signed a contract with an alternate data processing facility that will provide her company with space in the event of a disaster. The facility includes HVAC, power, and communications circuits but not hardware. What type of facility is Becka using
A) Cold site
B) Warm site
C) Hot site
D) Mobile site
A) A cold site includes the basic capabilities required for a datacenter operations; space, power, HVAC, and communications, but it does not include any hardware required to restore operations.
Which one of the following laws requires that communications service providers cooperate with law enforcement requests?
A) ECPA
B) CALEA
C) Privacy act
D) HITECH ac
B) Communications assistance to law enforcement act (CALEA) requires that all communication carriers make wiretaps possible for law enforcement officials who have an appropriate court order.
Which one of the following stakeholders is not typically included ona BCP team?
A) Core business function leaders
B) Information technology staff
C) CEO
D) Support departments
C) While senior management should be represented in the BCP team, it would be highly unusual for the CEO to fill this roll personally
Which one of the following stakeholders is not typically included ona BCP team?
A) Core business function leaders
B) Information technology staff
C) CEO
D) Support departments
C) While senior management should be represented in the BCP team, it would be highly unusual for the CEO to fill this roll personally.
Which of the following is not a goal for a formal change management plan?
A) Implement change in an orderly fashion
B) Test changes prior to implementation
C) Provide rollback plans for changes
D) Inform stakeholders of changes after they occur
D) Stakeholders should be informed of changes before, not after, they occur. The other items listed are goals of change management.
Helen is the owner of a website that provides information for middle and highschool students preparing for exams. She is concerned thatbthe activities of her site may fall under the jurisdiction of the children’s online privacy protection act (COPPA). What is the cutoff age below which parents must give consent in advance of the collection of personal information from their children under COPPA?
A) 13
B) 15
C) 17
D) 18
A) COPPA require that websites obtain parental consent for the collection of personal information from children under the age of 13