Domain 5.0: Governance, Risk, and Compliance Flashcards

1
Q

generally, ___ deter, prevent, detect or correct. some ___ such as anti-malware, provide more than 1 of those functions

A

controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a computer login notification is an example of a common ____ control

A

preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ controls are used when a business or technological constraint exists and an alternate control is effective in the current security threat landscape

A

compensating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___, ___, ___ and ISA are types of interoperability agreements that help mitigate risk when dealing with 3rd parties

A

SLA (service-level agreement), BPA (business partners agreement), MOU (memorandum of understanding) (and ISA-interconnection security agreements)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

user ___ require unique training and awareness. the user ____ include general users, privileged users, system admin, executive users, data owners and system owners. the last 3 are in positions that are responsible for creating or managing security policies

A

types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ designates the amount of data that will be lost or will have to be reentered due to network downtime

A

RPO (recovery point objective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ designates the amount of time that can pass before a disruption begins to seriously impede normal business operations

A

RTO (recovery time objective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is the average time before a product requires repair

A

MTBF (mean time between failures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ is the average time before a product fails and cannot be repaired

A

MTTF (mean time to fail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a ____ ____ ___ determines whether systems contain personal information. a ____ ____ _____ is needed for any organization that collects, uses, stores, or processes such information

A

privacy threshold assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ _____ is largely a function of threat, vulnerability and impact. it can be considered with this formula

____ = threat x vulnerability x impact

A

risk assessment
risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ _____ includes asset identification, risk assessment, threat identification and classification, and identification of vulnerabilities

A

risk identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

regarding risk, ____ measures are based on subjective values; they are less precise than ___ measures, which rely on numbers

A

qualitative, quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an ____ ___ can be accepted, mitigated, transferred, or avoided. purchasing insurance is a common example of transferring risk

A

identified risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ = SLE (single loss expectancy) x ARO (annualized rate of occurrence)

used in quantitative risk assessment

A

ALE (annualized loss expectancy)

7 laptops stolen a year (ARO) x $1,000 (SLE) = $7,000 (ALE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ ____ is important because change introduces risk that can impact systems and services

A

change management

17
Q

a _____ details considerations for backup and restoration, including secure recovery methods

A

DRP (disaster recovery plan)

18
Q

to be considered ___, information must be specifically associated with an individual person

A

PII (personally identifiable information)

19
Q

data ____ determine data’s classification level. data ____ implement the controls for the data

A

owners, custodians

20
Q

___ is a data disposal method that involves using a tool to reduce or remove the magnetic field of storage media

A

degaussing

21
Q

___ provide guidance for creating a secure configuration posture

A

benchmarks