Governance, Risk, and Compliance Flashcards

1
Q

Which assessment examines physical and electronic information handling issues to determine whether security weaknesses exist?

A

Organizational risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In which location should all changes made to your organization’s network and computers be listed?

A

In the change management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of risk analysis is based on the expert judgment and intuition of members of an organization?

A

Qualitative risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which risk response strategy does not implement any countermeasures, but allows risks to remain?

A

Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the definition of maximum tolerable downtime (MTD)

A

The maximum amount of time a business can tolerate a system remaining non-functional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four types of personally identifiable information (PII)

A
  • Personal characteristics
  • Unique set of assigned numbers
  • Descriptions of events or points in time
  • Description of locations or places
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some examples of personal characteristics for personally identifiable information (PII)?

A
  • Full name
  • Date of birth
  • Height
  • Ethnicity
  • Place of birth
  • Mother’s maiden name
  • Biometric characteristics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some examples of unique sets of assigned numbers that can be used as personally identifiable information (PII)?

A
  • Government ID
  • Telephone number
  • Driver’s license number
  • PIN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some examples of descriptions of events or points in time that can be used as personally identifiable information (PII)?

A
  • Arrest records
  • Employment records
  • Medical records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can GPS information be used as an example of a description of location for personally identifiable information (PII)?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the acronym MTTR denote?

A

Mean time to recover or repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When considering regulations set forth by multiple government entities, which regulations should be adopted by an organization?

A

The most restrictive?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What techniques attempts to predict the likelihood that a threat will occur and assign monetary values in the event a loss occurs?

A

Quantitative risk analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which assessment examines network recorces and information to determine the probability of a successful attack by a hacker?

A

Network risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which term is used for an agreement that is signed by two partnering companies?

A

Business partners agreement (BPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of controls is implemented to secure physical access to an object, such as a building, a room, or a computer?

A

Physical or operational control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Upon which report does the business continuity plan depend most?

A

Business Impact Analysis (BIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of administrative controls?

A

Implement security policies based on procedures, standards, and guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In which situation will you accept a risk?

A

When the cost of safeguard exceeds the amount of the potential loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the term for the method of determining which kinds of controls are needed to classify and protect a company’s information assets?

A

Risk assessment

21
Q

What is another term for unencrypted credentials?

A

Clear text credentials

22
Q

Which risk response strategy involves reducing the probability or impact of a risk to an acceptable risk threshold?

A

Mitigation

23
Q

What is another term for logical controls?

A

Technical controls

24
Q

Which type of controls includes developing policies and procedures, screening personnel, conducting security awareness training, and implementing change control?

A

Administrative controls

25
What can you do to ensure that staff understands which data they are handling?
Proper labeling
26
What does the acronym MTTR denote?
Mean time to repair
27
Which component of a computer use policy indicates that data stored on a company computer is not guaranteed to remain confidential?
No expectation of privacy policy
28
Which type of controls work to protect system access, network architecture and access, control zones, auditing, and encryption and protocols?
Technical controls
29
Regarding mean time before failure (MTBF) and mean time to repair (MTTR) as they relate to system reliability, which metrics are desirable?
A high MTBF and a low MTTR
30
What is the purpose of technical controls?
To restrict access to objects and protect availability, confidentiality, and integrity
31
What is the purpose of physical controls?
To work with administrative and technical controls to enforce physical access control
32
What is a service level agreement (SLA)
A contract between a network service provider and a customer that specifies the services the network service provider will furnish?
33
What is the formula for determining annualized loss expectancy (ALE)?
ALE = single loss expectation (SLE) x annualized rate of occurrence (ARO)
34
What is the recommended action when the cost of the safeguard exceeds the amount of potential loss for a given risk?
Accept the risk
35
Which type of controls dictates how security policies are implemented to fulfill the company's security goals?
Administrative or management control
36
What does the acronym MTBF denote
Mean time before failure
37
What does the acronym RPO denote?
Recovery point objective
38
Which type of controls includes controlling access to different parts of a building, implementing locking systems, installing fencing, implementing environmental controls, and protecting the facility perimeter?
Physical controls
39
Which term refers to the loss potential of an asset for a single year?
Annualized loss expectancy (ALE)
40
According to the CompTIA Security+ blueprint, what are the four categories of platform/vendor-specific guides?
* Webserver * Operating system (OS) * Application server * Network infrastructure devices
41
Which risk response strategy involves purchasing insurance to protect the organization should the risk occur?
Transference
42
Which type of controls include access control mechanisms, password management, identification methods, authentication methods, and security devices?
Technical or logical controls
43
What is the first step in a business impact analysis
To identify all of the organization's business units
44
What does the acronym MTBF denote?
Mean time between failures
45
Which risk response strategy involves modifying the security plan to eliminate the risk or its impact
Avoidance
46
What does the acronym RTO denote?
Recovery time objective
47
What is the primary concern of the business impact analysis(BIA)?
Identifies all business resources that could be lost
48
Which policy forces all users to organize their work areas to reduce the risk of data theft?
Clean desk policy
49
Which term is used for an agreement between two or more parties where the parties cannot create a legally enforceable agreement?
Memorandum of Understanding (MoU)