Domain 1 set 5 Flashcards

1
Q

Wassenaar Agreement

A

Export Restriction

No exporting strong encryption or bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARO

A

Annual Rate Of Occurrence

How often the threat is expected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EF

A

Exposure Factor

the % of loss that is expected from an risk event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset Value X Exposure Factor = ?

A

SLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

GLBA

A

Gramm -Leach - Bailey Act

Covers Financial institutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HIPAA

A

Health Insurance Portability and Accountability Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Typosquatting

A

URL Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cybersquatting

A

domain squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

STRIDE

A

Is a Threat categorization scheme from Microsoft

spoofing
tampering
repudiation
info disclosure
DOS attack
Elevation of privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The First step of a BCP should perform?

A

(BOA) Business Organization Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SOX

A

Sarbanes - Oxlet Act of 2002

Publicly traded companies have regulation on financial reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software code is a threat to what CIA

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Code injection is a threat to what CIA

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogger is a threat to what CIA

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 CIA Confidentiality threats

A
  1. Attacks on Encryption
  2. Social Engineering
  3. Key Logger
  4. IOT internet of Things
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MOA /MOU

A

Memorandums of Agreement / understanding for Essential personnel

17
Q

IAAA

A
A frame work
Identification
Authentication
Authorization
Accountability
18
Q

IPS / IDS ensure what of CIA

A

Availability

19
Q

Patch management ensure what of CIA

A

Availability

20
Q

Entrapment is a ?

A

Solid legal defense strategy

21
Q

ISO 27799 standard is focused around?

A

Protecting PHI

22
Q

Exigent circumstance is?

A

Immediate threat to Human life or evidence destruction.

Only applies to law enforcement or “ under the color of law”

23
Q

IT logs and Documents are what type of Evidence?

A

Secondary Evidence

24
Q

When you see something, what type of evidence?

A

Direct Evidence

25
Q

Counterfeiting is ?

A

an attack on trademarks

26
Q

Allows search and seizure without immediate disclosure

A

Patriot Act of 2001

27
Q

The Control Framework that is focused on IT service management

A

ITIL

28
Q

“The Majority of the proof” relate to what law?

A

Civil Law

29
Q

To much integrity what will suffer?

A

Availability

30
Q

Tangible and physical objects are what type of evidence

A

Real evidence

Hard drives, usb sticks but not the data on them.

31
Q

To much confidentiality what will suffer?

A

Availability

32
Q

Honeypots and honeynets need to be appoved by who?

A

Senior management and legal department

33
Q

To much Availability what will suffer?

A

confidentiality and integrity

34
Q

Password hashing with salting is what part of the CIA?

A

Integrity

35
Q

The 3 Rules of HIPAA

A
  1. privacy Rule
  2. security Rules
  3. Breach notification Rules