final exam Flashcards

1
Q

Which of the following concepts should be the most important consideration when determining how to budget properly for security controls?

A

Risk likelihood and impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of control assists and mitigates the risk an existing control is unable to mitigate?

A

Compensating control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Jane’s company spends thousands of dollars a month managing user accounts inhouse. Jane wants to save money by hiring a cloud-based user account management provider. This is an example of risk _______.

A

transference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

For which of the following should employees receive training to establish how they are to treat information of differing sensitivity levels?

A

Information classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ISO 27701 is an extension to the ISO 27001 standard that specifically deals with ____.

A

privacy management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following processes uses auditing to ensure that users are traced to and held responsible for their actions?

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements best defines the recovery point objective (RPO)?

A

The RPO is the maximum allowable amount of data (measured in terms of time) that the organization can afford to lose during a disaster or an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If a person knows a control exists, and this control keeps him or her from performing a malicious act, what type of control would this be classified as?

A

Deterrent control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your company’s t-shirt printer went down … again. The tech whose job it is to keep the printer running tells you that it’s going to take her about 30 minutes to repair the printer. This 30-minute period is best represented by which of the following answers?

A

MTTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of organizations are the main users of an interconnection service agreement (ISA)?

A

Telecommunication companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If a person does not know a control exists, and this control keeps her from performing a malicious act, what type of control would this be classified as?

A

Preventative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For which of the following should employees receive training to establish how to handle end-of-life and unnecessary data?

A

Data disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following terms indicates the amount of time it takes for a hardware component to recover from failure?

A

Mean time to recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the most common public-private key generation algorithm used in public key cryptography?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a protocol used to obtain the status of digital certificates in public keys?

A

OCSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is normally required to convert and read coded messages?

A

Codebook

17
Q

Which of the following methods of strengthening weak keys involves taking a weak initial key and feeding it to an algorithm that produces an enhanced key, which is much stronger?

A

key stretching

18
Q

All of the following are characteristics of hashing, except:

A

Hashes are decrypted using the same algorithm and key that encrypted them

19
Q

Which of the following algorithms was one of the five finalists for the U.S. government–sponsored competition to become the Advanced Encryption Standard (AES) competition, but did not win?

A

Twofish

20
Q

Before information is converted to an unreadable state using cryptography, in what form is the information?

A

Plaintext