final exam Flashcards
Which of the following concepts should be the most important consideration when determining how to budget properly for security controls?
Risk likelihood and impact
What type of control assists and mitigates the risk an existing control is unable to mitigate?
Compensating control
Jane’s company spends thousands of dollars a month managing user accounts inhouse. Jane wants to save money by hiring a cloud-based user account management provider. This is an example of risk _______.
transference
For which of the following should employees receive training to establish how they are to treat information of differing sensitivity levels?
Information classification
The ISO 27701 is an extension to the ISO 27001 standard that specifically deals with ____.
privacy management
Which of the following processes uses auditing to ensure that users are traced to and held responsible for their actions?
Accountability
Which of the following statements best defines the recovery point objective (RPO)?
The RPO is the maximum allowable amount of data (measured in terms of time) that the organization can afford to lose during a disaster or an incident.
If a person knows a control exists, and this control keeps him or her from performing a malicious act, what type of control would this be classified as?
Deterrent control
Your company’s t-shirt printer went down … again. The tech whose job it is to keep the printer running tells you that it’s going to take her about 30 minutes to repair the printer. This 30-minute period is best represented by which of the following answers?
MTTR
What type of organizations are the main users of an interconnection service agreement (ISA)?
Telecommunication companies
If a person does not know a control exists, and this control keeps her from performing a malicious act, what type of control would this be classified as?
Preventative control
For which of the following should employees receive training to establish how to handle end-of-life and unnecessary data?
Data disposal
Which of the following terms indicates the amount of time it takes for a hardware component to recover from failure?
Mean time to recovery
Which of the following is the most common public-private key generation algorithm used in public key cryptography?
RSA
Which of the following is a protocol used to obtain the status of digital certificates in public keys?
OCSP