Domain 2 Flashcards

1
Q

Filip installs and integrates a non discretionary system, which access control policy gets enforced?

A

Role based

The users gets their priv from their role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Annette has decided to use a passphrase instead of a dictionary word password for better security. Her new password converts into?

A

Virtual password

Im system today convert the password into a hash so that if this system gets hacked attack her only has password hasshest instead of the actual password. The hash ax as a virtual password because his value authenticate the user not the password itself 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hubert desires the best and most expensive security protection for their firm. Which of the following should they select?

Passwords
Smart cards
Palm vein scanner
Fingerprinted reader

A

Palm vein scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control category that react after an incident is called

A

Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allison is a security manager charged with investigating a recent preaching to the corporate network. What control category does this fall under

A

Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

O’Reillys performing a security audit for a customer and find several cases were users can access to data without a formal access approval procedure. Riley recommend a formal access approval process to fix the issue. Which grocery list that approves policies for users to gain access to data?

A

Data owner

Data owners are responsible for allowing access to data they owned. Data owners approve access policies and then operations implement some

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company is setting up an idea that is rule-based. A rule based IDS does/contain which of the following

A

If statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Passive entities that subjects access are called what

A

Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When it comes to providing a user with access to resources just that falls authentication is called

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of risk exists when several Entities or orgs are involved in a project. The risk or threats are often due to the variations of objectives, expectations, timelines budgets and security priorities

A

Multiparty risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the weakness in a asset or absence of the weakness of a safeguard or countermeasure?

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Anything used in a business process or task

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Being suspected to asset loss bc of a threat, there is a possibility that a vulnerability can or will be exploited

A

Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Then possibility or likelihood that a threat will exploit a vulnerability to cause harm to an asset and the severity of damage that could result

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Any potential Al occurrence that may cause an undesirable or unwanted outcome for an org or for specific asset

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When evaluating safeguards what is the rule that should be followed in most cases

A

The annual costs of safeguards should not exceed the expected annual cost of asset value loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a valid definition of risk

A

An assessment of probability, possibility or chance

Risk=threat*vulnerability

Every instance of exposure

18
Q

What is the level of natural, native or default risk that exists in an environment, system or product prior to any risk management efforts being performed

A

Inherent risk

19
Q

Phishing, hoax, watering hole and bushing are examples of social engineering attacks

A

True

20
Q

What is it when the behavior of users, objects, visitors, customers are analyzed for a specific goal or purpose

A

UEBA and UBA

21
Q

Should disabling them users account when they’re terminated as soon as possible

A

True

22
Q

What ensures that orgs providing services maintain an appropriate level of service agreed on by both the service providers, vendor or contractor and the customer org

A

SLA

23
Q

Are SLAs important when using any goer of third party services

A

True

24
Q

What is the detailed process of identifying factors that could damage or disclosure assets, evaluating those factors in light of asset value and countermeasure cost and implements ring cost effective shrinks for mitigating or reducing risk

A

Risk management

25
Q

What is the primary goal of risk management

A

Reduce risks to An acceptable level

26
Q

Risk management is composed of two primary elements

A

Risk assessment and risk response

27
Q

What occurs me could cause an undesirable or unwanted outcome for an org

A

Threat

28
Q

What intentionally exploits vulnerabilities

A

Threat agent/vectors

29
Q

Accidental occurrences and intentional exploitations of vulnerabilities

A

Threat events

30
Q

The path or means by which an attacker or attach gains access to a target in order to cause harm

A

Threat vector

31
Q

Weakness in an asset or the absence of the weakness of a safeguard

A

Vulnerability

32
Q

Susceptible to asset loss bc of a threat

A

Exposure

33
Q

Likelihood a threat will exploit a vulnerability

A

Risk

34
Q

Intentional attempted exploitation of a vulnerability

A

Attack

35
Q

Intrusion or penetration is the occurrence of a security mechanism being bypassed or thwarted by a threat agent

A

Breach

36
Q

What type of risk assessment is scenario based and not calculator based

A

Qualitative

37
Q

Quantitative risk analysis cost function s

A
AV 
EF
SLE
ARO
ALE
38
Q

What is the total amount of risk an org would Face ID no safe guards were implemented

Threats * vulnerabilities * asset value= Total risk

A

Total risks

39
Q

Total risk - control gap= residual risk

A
40
Q

The total cost of countermeasures should be less than the value of the asset

A

True

41
Q

The cost of countermeasures should be less that the benefit of the countermeasures

A

True

42
Q

What attacks

Exploits human behavior

A

Social engineering

It exploits human characteristics like being nice or scared