Information Security Governance Flashcards
Which CIA security pillar often uses encryption?
- Availability
- Auditing
- Integrity
- Confidentiality
Confidentiality
Which chain of custody step deals with user sign-in and sign-out logs?
- Transfer
- Collection
- Storage
- Access
Access
Which password policy setting best protects against dictionary password attacks?
- Account lockout
- Password expiry
- Password length
- Password history
Account lockout
Which body normally approves or rejects change requests?
- Chief Financial Officer (CFO)
- Change Advisory Board (CAB)
- Chief Executive Officer (CEO)
- Configuration Advisory Board (CAB)
Change Advisory Board (CAB)
Which type of network connection is commonly used to link offices together without going over the Internet?
- Site-to-site VPN
- IPv6
- Dedicated network circuit
- User-to-site VPN
Dedicated network circuit
Which SLA attribute relates the most closely to business continuity?
- Service location availability
- Service uptime
- Service costs
- Service credits
Service uptime
Which strategy best defines the benefit of a Business Model for Information Security (BMIS)?
- Aligning business objectives with security design
- Period review of security control efficacy
- Reduced IT security costs
- Ensuring employee security awareness
Aligning business objectives with security design
How does configuration management differ from change management?
- Change management keeps systems performance at a desired level over time, configuration management is short-term
- Configuration management keeps systems performance at a desired level over time, change management is short-term
- Configuration management applies solely to security controls, change management applies to long-term system desired performance
- Change management keeps systems performance above a specified level over time, configuration management is short-term
Configuration management keeps systems performance at a desired level over time, change management is short-term
Which strategy should be employed to modify organizational culture to increase security awareness?
- Gap analysis
- BMIS
- COBIT
- Asset valuation
Gap analysis
Which model treats internal and external threats egually?
- BMIS
- Zero-trust
- Zero-day
- COBIT
Zero-trust
What is COBIT used for?
- Risk management
- Software coding pipelines
- Financial auditing
- Compliance with GDPR
Risk management
Which term describes information that can be traced back to an individual?
- IP
- PII
- DSS
- PCI
PII
Which term describes the process of defining the current and desired states of a system and outlines the pathway to achieve the desired state?
- COBIT
- Change management
- Gap analysis
- Configuration management
Gap analysis
You are budgeting the next year’s cloud computing costs. Which type of expense is this?
- Operating expense
- Capital expense
- Long-term expense
- Short-term expense
Operating expense