Domain 1 - Security and Risk Management Flashcards

1
Q

The Following are elements of what Threat Assessment model?

Spoofing, Tampering, Repudiation, Information disclosure (privacy breach or data leak), Denial of service, and Elevation of privilege.

A

STRIDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which commercial business/private sector data classification is used to control information about individuals within an organization?

A

PRIVATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data classifications are used to focus security controls over what three areas?

A

Storage

Processing

Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When seeking to hire new employees, what is the first step?

A

Create a job description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

________ includes analyzing an environment for risks, evaluating each threat event as to its likelihood of occurring and the cost of the damage it would cause, assessing the cost of various countermeasures for each risk, and creating a cost/benefit report for safeguards to present to upper management

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ are accidental or intentional exploitations of vulnerabilities

A

Threat Events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ______ is the absence or weakness of a safeguard or countermeasure.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All of the following are valid definitions of what?

A. An assessment of probability, possibility, or chance

B. Risk = threat * vulnerability

C. Every instance of exposure

A

RISK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True / False

The annual costs of safeguards should not exceed the expected annual cost of asset loss.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is single loss expectancy (SLE) calculated?

A

SLE = Asset value ($) * exposure factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is the value of a safeguard to a company calculated?

A

ALE before safeguard – ALE after implementing the safeguard – annual cost of safeguard [(ALE1 – ALE2) – ACS]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the first step that individuals responsible for the development of a business continuity plan should perform?

A

Business organization analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Once the BCP team is selected, what should be the first item placed on the team’s agenda?

A

Business organization analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the broadest category of computer systems protected by the Computer Fraud and Abuse Act, as amended?

A

Systems used in interstate commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intellectual Property protection is achieved through what?

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What framework allows U.S. companies to certify compliance with EU privacy laws?

A

The Privacy Shield framework, governed by the U.S. Department of Commerce and Federal Trade Commission, allows U.S. companies to certify compliance with EU data protection law.

17
Q

Which one of the following is not a requirement that Internet service providers must satisfy in order to gain protection under the “transitory activities” clause of the Digital Millennium Copyright Act?

A

The service provider and the originator of the message must be located in different states.

18
Q

Which one of the following laws is not designed to protect the privacy rights of consumers and internet users?

A

The USA PATRIOT Act was adopted in the wake of the September 11, 2001, terrorist attacks. It broadens the powers of the government to monitor communications between private citizens and therefore actually weakens the privacy rights of consumers and internet users. The other laws mentioned all contain provisions designed to enhance individual privacy rights.

19
Q

What is the standard duration of patent protection in the United States?

A

20 years from the application date

20
Q
A