Domain 2.0 Compliance & Op Security Flashcards
Which of the following is used to describe a situation where an alert is sent to an adminstrator when an event is mistakenly recognized as malicious?
A. True negative
B. True positive
C. False negative
D. False positive
D. False positive
Which of the following is implemented via technical control?
A. Business continuity planning
B. Principle of least privilige
C. Background checks
D. Perimeter breach detection
B. Principle of least privilige
What business security policy focuses on directing subjects to perform business tasks and avoid wasting resources?
A. Acceptable Use Policy
B. Service Level Agreement
C. Retention Policy
D. Business Continuity Plan
A. Acceptable Use Policy
Which of the following is a valid formula for calculating ALE?
A. Total risk + controls gap
B. Vulnerabilities & Asset Value & risk
C. AV x EF x ARO
D. 802.1x + x.500
C. AV x EF x ARO
This means
Annual Loss Expectancy =
Asset Value) x (Exposure Factor) x (Annual Rate of Occurence
Which of the following is not a valid response to risk?
A. Outsourcing
B. Implementing a safeguard
C. Ignore it until the next budget year
D. Obtaining insurance
C. Ignore it until the next budget year
After the security policy is written, inventories are crafted, and maps of the physical and logical layouts are drawn, what must be performed in order to allow for reasonable recovery in the event of a disaster years after the initial implementation of the infrastructure?
A. Online access to procedures
B. Maintaining change documentation
C. Weekly backups stored onsite
D. Paper copies of policies
B. Maintaining change documentation
What is the greatest threat to organizations from removable media that is used as part of normal day-to-day work tasks?
A. Intellectual property theft
B. Spread of email hoaxes
C. Data corruption
D. Social Engineering
A. Intellectual property theft
What is a primary goal of Auditing?
A. Check compliance with security policy
B. Prevent users from performing any personal tasks
C. Limiting information access to external entities
D. Training personal in regards to security
A. Check compliance with security policy
Which of the following forms of data is least volatile?
A. Data stored in cache
B. Network connections
C. Flash memory in a desk drawer
D. An internal hard drive
C. Flash memory in a desk drawer
What is the chain of custody?
A. Documentation of the owners since the original retail purchase date
B. An accounting of all responsible parties who handled or had access to the evidence
C. A computer lock used to prevent theft of portable devices
D. A forensic tool used to extract hidden data from hard drive slack space
B. An accounting of all responsible parties who handled or had access to the evidence
When an IDS alerts the administrator that an intrusion is taking place, what is often the first action the first responder should perform?
A. Containment
B. Reconstitution
C. Contact law enforcement
D. Restore files from backup
A. Containment
Which of the following does not represent PII?
A. Phone number
B. User name
C. Fingerprint
D. Favorite dessert
D. Favorite dessert
PII - Personally Identifiable Information
After awareness training, which of the following is the next best countermeasure against social engineering?
A. Implementing multi-factor authentication
B. Updating the disaster recovery plan
C. Restricting the flow of information through the use of security labels
D. Obtaining a certification through taking an exam
C. Restricting the flow of information through the use of security labels
What does a clean desk policy require?
A. Desks are free from debris or overt signs of wear and use
B. Anti-bacterial wipes are used to prevent the spread of germs and disease
C. Paperwork is files away at the end of every work period
D. A user desktop must only contain OS elements
C. Paperwork is files away at the end of every work period
Business impact analysis is the act of performing a risk assessment on what element or aspect of an organization?
A. SLAs
B. Processes
C. Assets
D. Finances
B. Processes
SLA - Service Level Agreements