Governance, Risk, and Compliance Flashcards
What is the primary goal of governance in the context of information security?
A) implementing technical controls
B) establishing policies and procedures
C) performing vulnerability assessments
D) enforcing user training
Establishing policies and procedures
Governance in information security is primarily concerned with setting up a framework of policies, procedures, and controls to guide an organization’s security posture. These policies are designed to align with the organization’s objectives and ensure compliance.
What is the purpose of a risk assessment in an organization’s security strategy?
A) identifying vulnerabilities
B) determining compliance requirements
C) assigning blame in case of a security incident
D) evaluating the cost of security measures
Identifying vulnerabilities
The primary purpose of a risk assessment is to identify potential threats, vulnerabilities, and their potential impact on an organization’s assets. It’s a fundamental step in developing effective security measures.
Which of the following is an example of a compliance standard relevant to the handling of payment card data?
A) HIPAA
B) PCI DSS
C) FERPA
D) ISO/IEC 27001
PCI DSS
PCI DSS (Payment Card Industry Data Security Standard). PCI DSS is specifically designed to ensure the secure handling of cardholder information. It applies to all organizations that handle credit card data.
What role does the CISO (Chief Information Security Officer) typically play in an organization’s security governance?
A) developing software applications
B) implementing firewalls and intrusion detection systems
C) enforcing security policies and procedures
D) managing HR operations
Enforcing security policies and procedures
The CISO is primarily responsible for establishing and enforcing security policies and procedures, aligning them with the organization’s objectives.
How does governance differ from compliance in the context of security management?
A) governance deals with regulations, while compliance focuses on internal policies
B) governance refers to policies, while compliance refers to risk assessment
C) governance defines the rules, while compliance ensures adherence to those rules
D) governance establishes procedures, while compliance dictates technology use
Governance defines the rules, while compliance ensures adherence to those rules
Governance defines the rules, while compliance ensures adherence to those rules. Governance sets the framework, rules, and guidelines for security, while compliance is about conforming to those rules and standards.
What is the main purpose of a compliance audit?
A) identifying vulnerabilities
B) ensuring conformity to established standards and regulations
C) conducting risk assessment
D) creating security policies
Ensuring conformity to established standards and regulations
A compliance audit verifies whether an organization is adhering to relevant laws, regulations, and internal policies regarding security measures.
How does risk acceptance differ from risk avoidance in risk management?
A) risk acceptance involves mitigating identified risks, while risk avoidance ignores potential risks
B) risk acceptance is acknowledging the existence of a risk without taking action, while risk avoidance is actively working to eliminate risks
C) risk acceptance transfers identified risks to a third party, while risk avoidance mitigates risks within the organization
D) risk acceptance is embracing identified risks, while risk avoidance is eliminating the risk by investing in insurance
B
Risk acceptance is acknowledging the existence of a risk without taking action, while risk avoidance is actively working to eliminate risks
Risk acceptance means acknowledging the existence of a risk without taking actions to mitigate it, whereas risk avoidance involves active measures to eliminate or reduce the risk.
Which regulation is specifically designed to protect the privacy of individuals’ personally identifiable information (PII)?
A) GDPR
B) SOX
C) GLBA
D) FERPA
GDPR
GDPR (General Data Protection Regulation) is specifically designed to protect the privacy of individuals’ personally identifiable information within the European Union and the European Economic Area.
What is the primary objective of a security policy in an organization?
A) enforcing legal regulation
B) providing technical guidance for IT professionals
C) communicating management’s directives for security
D) establishing penalties for security breaches
Communicating management’s directives for security
Security policies in an organization communicate management’s directives and expectations for security measures to ensure alignment and compliance throughout the organization.
What is the primary objective of a data classification policy in an organization’s security framework?
A) to define security measures for physical data storage
B) to categorize data based on sensitivity and define handling procedures
C) to outline procedures for disaster recovery
D) to encrypt all sensitive data
To categorize data based on sensitivity and define handling procedures
A data classification policy establishes how data should be categorized based on sensitivity levels and outlines appropriate handling procedures for each category.
What is the primary focus of a change management process in an organization’s security governance?
A) implementing security incident response plans
B) reviewing security policies quarterly
C) controlling modifications to systems and environments
D) evaluating security awareness training effectiveness
C
Controlling modifications to systems and environments
Change management in security governance primarily focuses on controlling and documenting modifications to systems, configurations, and environments to maintain security and reduce risks associated with changes.
Which term refers to the maximum acceptable amount of time a system can be unavailable before it starts causing severe damage to the organization?
A) MTBF (mean time between failures)
B) RTO (recovery time objective)
C) MTTR (mean time to repair)
D) MTD (maximum tolerable downtime)
MTD (maximum tolerable downtime)
MTD is the maximum duration a system can be down before severe damage occurs to the organization.
What is the primary purpose of a security awareness training program within an organization?
A) implementing security controls
B) identifying security incidents
C) educating employees about security best practices
D) responding to security breaches
C
Educating employees about security best practices
Security awareness training aims to educate employees about security best practices and potential threats.
Which of the following is an essential component of a security policy framework in an organization?
A) conducting regular vulnerability assessments
B) providing physical access controls
C) establishing a business continuity plan
D) configuring network firewalls
Establishing a business continuity plan
A business continuity plan is vital for operations during and after a disaster or security breach.
What is the primary objective of an IT audit of an organization’s security governance?
A) ensuring all software is up-to-date
B) verifying compliance with policies and regulations
C) implementing new security protocols
D) assessing user access controls
B
Verifying compliance with policies and regulations
An IT audit primarily aims to assess and ensure that the organization complies with established policies, regulations, and industry standards.
Which term describes the process of quantifying the possible losses from a particular risk?
A) risk analysis
B) risk mitigation
C) risk assessment
D) risk management
Risk analysis
Risk analysis involves the process of evaluating potential losses from a specific risk in terms of impact and likelihood.