Governance, Risk, and Compliance Flashcards
Janet, a defense contractor for the military, performs an analysis of their enterprise network to identify what type of work the Army would be unable to perform if the network were down for more than a few days. Which of the following was Janet trying to identify?
A. Mission Essential Function
B. Critical Systems
C. Backup and Restoration
D. Single Point of Failure
A. Mission Essential Functons
Your organization is updating its incident response communications plan. A business analyst in the working group recommends that if the company discovers they are the victims of a data breach, they should only notify the affected parties to minimize media attention and bad publicity. Which of the following recommendations do you provide in response to the business analyst’s statement?
A. An External Hosted
B. The Human Resorces
C. Guidance of Law
D. The first Responder
C. Guidance of Law
Which of the following agreements is used between companies and employees, between companies and contractors, and between two companies to protect information assets?
A. SLA
B. NDA
C. DSAU
D. ISA
B. NDA
Hilda needs a cost-effective backup solution that would allow for the restoration of data within a 24 hour RPO. The disaster recovery plan requires that backups occur during a specific timeframe each week, and then the backups should be transported to an off-site facility for storage. What strategy should Hilda choose to BEST meet these requirements?
A. Create a daily incremental backup
B. Create a full backup
C. Create disk to disk
D. Configure replication of data
A. Create a daily incremental backup
Dion Training has performed an assessment as part of their disaster recovery planning. The assessment found that the organization’s RAID takes, on average, about 8 hours to repair when two drives within the RAID fail. Which of the following metrics would best represent this time period?
A. RTO
B. RPO
C. MTTR
D. MTBF
C. MTTR
Which of the following terms is used to describe the period of the time taken to correct a fault so that the system is restored to full operations after a failure or incident?
A. MTTR
B. RPO
C.MTBF
D.RTO
A.MTTR
Dion Training has performed an assessment as part of their disaster recovery planning. The assessment found that their file server has crashed twice in the last two years. The most recent time was in August, and the time before that was 15 months before. Which of the following metrics would best represent this 15 month time period?
A. MTTR
B. RTO
C. MTBF
D. RPO
C.MTBF
Your company is setting up a system to accept credit cards in their retail and online locations. Which of the following compliance types should you be MOST concerned with dealing with credit cards?
A. PHI
B. PII
C. PCI-DSS
D. GDPR
C. PCI-DSS
Which type of agreement between companies and employees is used as a legal basis for protecting information assets?
A. NDA
B. SLA
C. ISA
D. MOU
A.NDA
Your organization is updating its Acceptable User Policy (AUP) to implement a new password standard that requires a guest’s wireless devices to be sponsored before receiving authentication. Which of the following should be added to the AUP to support this new requirement?
A. Network authentication
B. Sponsored guest passwords
C. All guest provide valid identification
D. Open authentication
C. All guest provide valid identification
You just moved into a new house, and you are worried about a burglar breaking into the home and stealing your laptop. Unfortunately, the security alarm company cannot get to your home to install the security system you just purchased for another 3 weeks. In the meantime, they have sent you a little sign that says, “Protected by Security Inc.” for you to place in front of your house. Once installed, which of the following control types is this sign?
A. Detective
B. Deterrent
C. Preventive
D. Corrective
B.Deterrent
You have been asked to classify a hospital’s medical records as a form of regulated data. Which of the following would BEST classify this type of data?
A. GDPR
B. PII
C. PCI
D. PHI
D. PHI
Which of the following BEST describes when a third-party takes components produced by a legitimate manufacturer and assembles an unauthorized replica sold in the general marketplace?
A. Recycling
B. Entuerpunership
C. Counterfeiting
D. Capitalism
C. Counterfeiting
After completing an assessment, you create a chart listing the associated risks based on the vulnerabilities identified with your organization’s privacy policy. The chart contains listings such as high, medium, and low. It also utilizes red, yellow, and green colors based on the likelihood and impact of a given incident. Which of the following types of assessments did you just complete?
A. Privacy Assessment
B. Qualitative Risk Assessment
C. Quantative Risk Assessment
D. Supply Chain Assessment
B. Qualitative Risk Assessment
Vulnerability scans must be conducted continuously to meet regulatory compliance requirements for the storage of PHI. During the last vulnerability scan, a cybersecurity analyst received a report of 2,592 possible vulnerabilities and was asked by the Chief Information Security Officer (CISO) for a plan to remediate all the known issues. Which of the following should the analyst do next?
A. Wait to perform any additional scans
B. Place any asset that contains PHI
C. Attempt to identify false positives
D. Filter the scan results to include only those items listed as critical
D. Filter the scan results to include only those items listed as critical
A competitor recently bought Dion Training’s ITIL 4 Foundation training course, transcribed the video captions into a document, re-recorded the course exactly word for word as an audiobook, then published this newly recorded audiobook for sale on Audible. From Dion Training’s perspective, how would you BEST classify this situation?
A. IP Theft
B. Data Breach
C. Mission essential functions
D. Identify Theft
A. IP Theft
You are applying for a job at a cybersecurity firm. The application requests you enter your social security number, date of birth, and email address to conduct a background check as part of the hiring process. Which of the following types of information have you been asked to provide?
A. IP
B. PII
C. CUI
D. PHI
B. PII
A new corporate policy dictates that all access to network resources will be controlled based on the user’s job functions and tasks within the organization. For example, only people working in Human Resources can access employee records, and only the people working in finance can access customer payment histories. Which of the following security concepts is BEST described by this new policy?
A. Directory Permission
B. Blocklist
C. Least Privilege
D. Permission Creep
C. Least Privilege
James, a programmer at Apple Computers, is surfing the internet on his lunch break. He comes across a rumor site focused on providing details of the upcoming iPhone being released in a few months. James knows that Apple likes to keep its product details a secret until it is publicly announced. As James is looking over the website, he sees a blog post with an embedded picture of a PDF containing detailed specifications for the next iPhone and labeled “Proprietary Information – Internal Use Only.” The new iPhone is still several months away from release. What should James do next?
A. Contact team lead and ask what they should do next
B. Reply to the blog post and deny the accuracy of the specfication
C. Contact the service desk or incident response team to determine what to do next
D. Contact the website owner and request the take down the PDF
C. Contact the service desk or incident response team to determine what to do next
During your review of the firewall logs, you notice that an IP address from within your company’s server subnet had been transmitting between 125 to 375 megabytes of data to a foreign IP address overnight each day. You have determined this has been occurring for approximately 5 days, and the affected server has since been taken offline for forensic review. Which of the following is MOST likely to increase the impact assessment of the incident?
A. PII of the company employees and customers was exfiltrated
B. Raw financial Information about the company was accessed
C. IP addresses and other network-related confiiguration was exfiltrated
D. Forensic review of the server requireed fallback to less efficent service
A. PII of the company employees and customers was exfiltrated
What regulation protects the privacy of student educational records?
A. GLBA
B. SOX
C. FERPA
D. HIPAA
C.FERPA
You have been hired as a cybersecurity analyst for a privately-owned bank. Which of the following regulations would have the greatest impact on your bank’s cybersecurity program?
A. SOX
B. HIPAA
C. FERPA
D. GLBA
D. GLBA
Which law requires government agencies and other organizations that operate systems on behalf of government agencies to comply with security standards?
A. HIPAA
B. FISMA
C. COPPA
D. SOX
B. FISMA
Jamie’s organization is attempting to budget for the next fiscal year. Jamie has calculated that the asset value of a database server is $120,000. Based on her analysis, she believes that a data breach to this server will occur once every four years and has a risk factor is 30%. What is the ALE for a data breach within Jamie’s organization?
A. $90,000
B. $36,000
C. $360,000
D. $9,000
D. $9,000
When you purchase an exam voucher at diontraining.com, the system only collects your name, email, and credit card information. Which of the following privacy methods is being used by Dion Training?
A. Data Minimization
B. Tokenization
C. Atomization
D. Data Masking
A. Data Minimization
Dion Training is currently undergoing an audit of its information systems. The auditor wants to understand better how the PII data from a particular database is used within business operations. Which of the following employees should the auditor interview?
A. Data Owner
B. Data Protection Officer
C. Data Steward
D. Data Controller
B. Data Protection Officer
Which of the following categories would contain information about a French citizen’s race or ethnic origin?
A. PHI
B. SPI
C. DLP
D. PII
B. SPI