Domain 6 - Information Security Flashcards

1
Q

Who should be included for insider threat?

A

employees, vendors, and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

do copyrights have to be registered to be protected

A

no, but it helps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is trade dress

A

the commercial look and feel of a product or service that identifies and distinguishes the source of the product or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how long does a patent last and what laws are relevant

A

20 years, and there are no criminal laws on infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what must information protection measures ensure in both the physical and cyber environment

A

confidentiality
integrity
availability
accountability
recoverability
auditability
nonrepudiation (inability to dispute) of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ISO/IEC 27001:2005

A

the keystone for continual improvement in the organization’s ability to effectively manage the security of its information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ISO 27000 cover

A

people, technology, and processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is NIST

A

National Institue of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ISO

A

International Organization for Standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is IEC

A

International Electrotechnical Commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What businesses is the Framework for Improving Critical Infrastructure Cybersecurity suitable for

A

appropriate for wide range of organizations both private and public because of simplicity and scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ransomware and what was it previously called

A

once known as cryptoware; encrypting a user’s files and demanding payment to decrypt them (via phising, trojan attacks, compromised credentials, or software vulnerabilities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are business email compromise schemes

A

posing as an executive to initiate a wire transfer to an account controlled by criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the name for the process by which an organizational user is identified and granted privileges to levels of network information, systems, or resources, is called which of the following?

A

logical network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly