Domaine 5 : Gestion et supervision des programmes de sécurité Flashcards

1
Q

What is the purpose of security standards?

A

Establish formalized procedures to ensure consistent security practices across an organization and reduce risk by providing clear guidelines for handling various security-related situations.

Security standards help organizations maintain a uniform approach to security and mitigate potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do password policies define?

A

Requirements for password complexity, length, and expiration, as well as procedures for password resets and the use of password managers.

Effective password policies are crucial for maintaining security and preventing unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do authentication standards mandate?

A

Centralized authentication methods (e.g., LDAP, Active Directory) over local accounts and ensure consistent authentication mechanisms across all systems.

Centralized authentication enhances security by simplifying user management and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do access control standards determine?

A

How access rights are granted, reviewed, and revoked, and may require management approval or training before granting access to sensitive data.

Proper access control is essential for protecting sensitive information and ensuring that only authorized personnel have access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What measures are included in physical security standards?

A

ID badges and electronic door locks to control physical access and differentiate access levels for employees, contractors, and guests.

Physical security is a critical aspect of overall organizational security, protecting facilities from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do encryption standards specify?

A

Approved encryption algorithms and key management practices, differentiating standards for data at rest and data in transit.

Encryption is vital for protecting sensitive information from unauthorized access and ensuring data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the benefit of using established frameworks?

A

Adopting industry-recognized standards from organizations like ISO and NIST to ensure compliance with widely accepted security practices.

Established frameworks provide a solid foundation for developing security policies and practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is security awareness important?

A

Educating users is crucial in preventing security breaches.

Awareness programs help users recognize and respond to potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are phishing simulations used for?

A

Conducting simulated phishing attacks to train users in identifying malicious emails.

Helps in assessing the effectiveness of security awareness training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the goal of training users to recognize anomalous behavior?

A

To detect unusual activities that may indicate a security incident.

Encourages prompt reporting of suspicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should reporting mechanisms include?

A

Clear procedures for reporting security incidents.

Ensures users know how and where to report potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the importance of regular training and updates?

A

Providing ongoing education to keep users informed about emerging threats.

Updating training materials to reflect the latest security best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary purpose of audits and assessments?

A

Evaluate the effectiveness of security controls and policies, identify vulnerabilities and areas for improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are internal audits?

A

Conducted by the organization’s own staff to assess compliance and effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are external audits?

A

Performed by third parties to provide an unbiased evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of risk assessments?

A

Identify potential threats and the likelihood of their occurrence

17
Q

What is a vulnerability assessment?

A

Scan systems to detect known vulnerabilities

18
Q

What is penetration testing?

A

Simulate attacks to test the robustness of security measures

19
Q

Why are compliance and standards important in audits?

A

Ensure adherence to industry standards and regulatory requirements

20
Q

Name three common frameworks for compliance.

A
  • ISO 27001
  • NIST
  • PCI DSS
21
Q

What should be maintained during reporting and documentation?

A

Detailed records of findings, methodologies, and remediation steps

22
Q

What is the purpose of reports in audits?

A

Inform stakeholders and guide future security strategies

23
Q

Fill in the blank: Internal audits are conducted by the organization’s own _______.

24
Q

True or False: External audits are performed by the organization’s own staff.

25
Fill in the blank: Compliance frameworks ensure adherence to industry _______ and regulatory requirements.
standards
26
What is the goal of vulnerability assessments?
Detect known vulnerabilities
27
What do risk assessments help to identify?
Potential threats and the likelihood of their occurrence
28
Fill in the blank: Reports are used to inform _______ and guide future security strategies.
stakeholders