Domain 1: Security Principles Flashcards
Which region enacted comprehensive legislation addressing personal privacy in 2016?
European Union
What is the purpose of implementing security controls in the risk management process?
To mitigate減輕 the risk to an acceptable level
If a pickpocket is a threat, what would be their attack vector?
Their technique and approach
How do companies that offer identity theft insurance manage their own financial risk?
By calculating premium payments against potential payouts
What term is used to refer to information that, when combined with other pieces of data, significantly narrows缩小 the possibility of association with more individuals?
Personally Identifiable Information (PII)个人身份信息
What potential risk can occur when a remote worker’s laptop is left unattended or unlocked?
Accidental introduction of unauthorized software with malware
In the United States, which act governs the privacy of medical information?
HIPAA
In e-commerce and electronic transactions, what does non-repudiation protect against?
Falsely虛假地 denying transactions
What is an “asset” in the context of risk management terminology?
Something in need of protection
Who is responsible for determining risk tolerance in an organization?
Executive management and board of directors
Executive management and board of directors
Evaluate the likelihood of the event and take appropriate actions to mitigate the risk
Which regulation grants data protection and control to individuals within the EU, regardless of citizenship?
General Data Protection Regulation (GDPR)
What role might security professionals play in risk assessment at a system level?
Assisting in risk assessment at a system level
Security professionals are likely to assist in risk assessment at a system level, focusing on process, control, monitoring, or incident response and recovery activities.
Who is responsible for identifying risks within an organization?
Employees at all levels of the organization
What is an example of a physical control?
Walls, fences, guards, locks
According to the code of ethics, what are information security professionals expected to uphold堅持?
Be honorable, honest, just and responsible within legal conduct
Multifactor authentication involves using two or more instances of different authentication factors.
Which of the following are considered a widely accepted factor for authentication?
Something you have
Something you are
Something you know
Kristal is the security administrator for a large online service provider. Kristal learns that the company is harvesting the personal data of its customers and sharing the data with local governments where the company operates, without the knowledge of the users, to allow the governments to persecute users on the basis of their political and philosophical beliefs.
The published user agreement states that the company will not share personal user data with any entities without the users’ explicit permission.
According to the ISC2 Code of Ethics, to whom does Kristal ultimately owe a duty in this situation?
The users
What is the primary purpose of the ISC2 Code of Ethics?
Ensuring the safety and welfare of society and the common good
While taking the certification exam for this certification, you notice another candidate for the certification cheating.
What should you do?
Report the candidate to ISC2
What type of authentication process is used at the bank with an ATM card?
Two-factor authentication
The use of an ATM card (something you have) and a PIN (something you know) at the bank, providing two different factors of authentication.
What type of cyber attack often targets the availability of data?
Ransomware attacks勒索軟體
Ransomware attacks often target the availability of data by locking up systems and blocking access to vital information and services. Access is typically restored only after a ransom is paid.
What does knowledge-based authentication involve?
Differentiating between authorized and unauthorized users using a passphrase or secret code
passphrase or secret code (e.g., PIN or password)
What is the purpose of using a risk matrix?
To prioritize risks based on likelihood and impact
What measures would a trauma center be most likely to take to ensure zero tolerance for power failure?
Redundancy in emergency power supplies, battery backup, and generators
Which of the following is NOT one of the four typical ways of managing risk?
Conflate 合併
typical ways of managing risk:
Avoidance
Acceptance
Mitigation
Transfer
When a company chooses to ignore a risk and proceed with a risky activity, which treatment is being applied by default?
Acceptance
What is risk tolerance often likened to?
Risk appetite
Siobhan is deciding whether to make a purchase online; the vendor wants Siobhan to create a new user account and is requesting Siobhan’s full name, home address, credit card number, phone number, email address, the ability to send marketing messages to Siobhan, and permission to share this data with other vendors.
Siobhan decides that the item for sale is not worth the value of Siobhan’s personal information, and decides to not make the purchase.
What kind of risk management approach did Siobhan make?
Avoidance
What is done with the result of the risk assessment process?
It is presented as a report or presentation to the management
A chief information security officer (CISO) at a large organization documented a policy that establishes the acceptable use of cloud environments for all staff.
Management/Administrative control
Policies, standards, processes, procedures and guidelines set by corporate administrative entities (e.g., executive- and/or mid-level management) are management/administrative controls.
Software security practitioners seek to maintain the CIA of systems and software based on business needs.
Which aspect of the CIA is focused on guaranteeing that authorized subjects are granted uninterrupted access to objects in a timely fashion?
Availability