Final Exam Flashcards
Final Assessment
Steve is a security practitioner assigned to come up with a protective measure for ensuring cars don’t collide with pedestrians.
What is probably the most effective type of control for this task?
Physical
Fill in the missing word:
Chad is a security practitioner tasked with ensuring that the information on the organization’s public website is not changed by anyone outside the organization.
This task is an example of ensuring _________.
Integrity
Which of the following is an example of a “Something you know” authentication factor?
Password
Which of the following is an example of a “Something you are” authentication factor?
A photograph of your face
Fill in the missing word:
A system that collects transactional information and stores it in a record in order to show which users performed which actions are an example of providing ________.
Non-repudiation
What is the European Union (EU) law that grants legal protections to individual human privacy?
The General Data Protection Regulation
For which of the following systems would the security concept of availability probably be most important?
Medical systems that monitor patient condition in an intensive-care unit
For which of the following assets is integrity probably the most important security aspect?
The file that contains passwords used to authenticate users
Fill in the missing word:
In risk management concepts, a(n) _________ is something a security practitioner might need to protect.
Asset
Fill in the missing word:
In risk management concepts, a(n) ___________ is something or someone that poses a risk to an organization or asset.
Threat
Of the following, which would probably not be considered a threat?
Which of the following probably poses the most risk?
A high-likelihood, high-impact event
Within the organization, who can identify risk?
Anyone
Fill in the missing word:
Kerpak works in the security office of a medium-sized entertainment company. Kerpak is asked to assess a particular threat, and he suggests that the best way to counter this threat would be to purchase and implement a particular security solution.
This is an example of _______.
Mitigation
Fill in the missing word:
Sophia is visiting Las Vegas and decides to put a bet on a particular number on a roulette wheel.
This is an example of _________.
Acceptance
Fill in the missing word:
Phrenal is selling a used laptop in an online auction. Phrenal has estimated the value of the laptop to be $100 but has seen other laptops of similar type and quality sell for both more and less than that amount. Phrenal hopes that the laptop will sell for $100 or more, but is prepared to take less for it if nobody bids that amount.
This is an example of ___________.
Risk tolerance
Fill in the missing word:
A software firewall is an application that runs on a device and prevents specific types of traffic from entering that device.
This is a type of ________ control.
Technical
Fill in the missing word:
At the airport, there are red lines painted on the ground next to the runway, which prohibits traffic from crossing it.
This is an example of a(n)______ control.
Physical
Fill in the missing word:
A bollard is a post set securely in the ground in order to prevent a vehicle from entering an area or driving past a certain point.
Bollards are an example of ______ controls.
Physical
Druna is a security practitioner tasked with ensuring that laptops are not stolen from the organization’s offices. Which sort of security control would probably be best for this purpose?
Physical
Triffid Corporation has a policy that all employees must receive security awareness instruction before using email; the company wants to make employees aware of potential phishing attempts that the employees might receive via email.
What kind of control is this instruction?
Administrative
ISC2 publishes a Common Body of Knowledge (CBK) that IT security practitioners should be familiar with; this is recognized throughout the industry as a set of material that is useful for practitioners to refer to. Certifications can be issued for demonstrating expertise in this Common Body of Knowledge.
What kind of document is the Common Body of Knowledge?
Standard
The city of Grampon wants to ensure that all of its citizens are protected from malware, so the city council creates a rule that anyone caught creating and launching malware within the city limits will receive a fine and go to jail.
What kind of rule is this?
Law
The Triffid Corporation publishes a strategic overview of the company’s intent to secure all the data the company possesses. This document is signed by Triffid’s senior management.
What kind of document is this?
Policy
Fill in the missing words:
Grampon municipal code requires that all companies that operate within city limits will have a set of processes to ensure employees are safe while working with hazardous materials. Triffid Corporation creates a checklist of activities employees must follow while working with hazardous materials inside Grampon city limits.
The municipal code is a ______, and the Triffid checklist is a ________.
Law, procedure
Fill in the missing word:
The Payment Card Industry (PCI) Council is a committee made up of representatives from major credit card providers (Visa, Mastercard, American Express) in the United States.
The PCI Council issues rules that merchants must follow if the merchants choose to accept payment via credit card. These rules describe best practices for securing credit card processing technology, activities for securing credit card information, and how to protect customers’ personal data.
This set of rules is a _____.
Standard
Hoshi is an ISC2 member who works for the Triffid Corporation as a data manager. Triffid needs a new firewall solution, and Hoshi is asked to recommend a product for Triffid to acquire and implement. Hoshi’s cousin works for a firewall vendor; that vendor happens to make the best firewall available.
What should Hoshi do?
Disclose the relationship, but recommend the vendor/product
Olaf is a member of ISC2 and a security analyst for Triffid Corporation.
During an audit, Olaf is asked whether Triffid is currently following a particular security practice. Olaf knows that Triffid is not adhering to that standard in that particular situation, but that saying this to the auditors will reflect poorly on Triffid.
What should Olaf do?
Tell the auditors the truth
Aphrodite is a member of ISC2 and a data analyst for Triffid Corporation. While Aphrodite is reviewing user log data, Aphrodite discovers that another Triffid employee is violating the acceptable use policy and watching streaming videos during work hours.
What should Aphrodite do?
Inform Triffid management
Glena is an ISC2 member. Glena receives an email from a company offering a set of answers for an ISC2 certification exam.
What should Glena do?
Inform ISC2
Fill in the missing word:
You are reviewing log data from a router; there is an entry that shows a user sent traffic through the router at 11:45 am, local time, yesterday.
This is an example of a(n) _______.
Event
Who approves the incident response policy?
Senior management
Fill in the missing word:
An attacker outside the organization attempts to gain access to the organization’s internal files. This is an example of a(n) ______.
Intrusion
Which of the following are not typically involved in incident detection?
What is the risk associated with resuming full normal operations too soon after a DR effort?
The danger posed by the disaster might still be present
What is the goal of Business Continuity efforts?
Keep critical business functions operational
Which of the following is likely to be included in the business continuity plan?
Alternate work areas for personnel affected by a natural disaster
What is the most important goal of a business continuity effort?
Preserve health and human safety
What is the overall objective of a disaster recovery (DR) effort?
Return to normal, full operations
What is the risk associated with delaying the resumption of full normal operations after a disaster?