Domain 5 Flashcards
Security Operations
What is the most important aspect of security awareness/training?
Protecting health and human safety
Degaussing is
The process of reducing or eliminating an unwanted magnetic field (or data) stored on tape and disk media
Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way?
Data life cycle
Which of the following is the life cycle of data handling?
Create, store, use, share, archive, destroy
What do integrity services, provided by hash functions and digital signatures, allow a recipient to verify?
That a message has not been altered by malice or error
What is the purpose of security awareness training?
To align information security goals with the organization’s mission and vision
What is the primary purpose of storing passwords as hash values or digests?
To check if a password matches without revealing the password itself
What is the role of security engineers in data security?
Security engineers figure out who is trying to log in and assess security codes
How long does it take to crack a 10-number password using software with cryptographic calculation?
5 seconds
What is something that every security policy should have?
Consequences for non-compliance
Whaling attacks are
Phishing attacks that attempt to trick
highly placed officials or private individuals
with sizable assets into authorizing large
fund wire transfers to previously unknown
entities
What does the term “whaling attacks” refer to in the context of phishing?
Attacks against highly placed officials or individuals with sizable assets
What task is recommended for employees to practice what they’ve learned?
Sending simulated phishing emails
What solution is recommended for users who struggle to remember multiple passwords for different systems?
Encourage the use of a recommended password management solution
Why is asymmetric encryption considered more secure?
It involves a unique code for the sender and receiver
How does hashing respond to minor changes in the input, such as misspellings or changes in letter case?
It generates a different hash digest for each input
What is meant by the term rollback?
Restoring the system to its previous state before a change
Who is often tasked with coordinating the change management effort?
Information Security professionals