Introduction Flashcards

1
Q

What are the four major domains covered by the CISM exam covers ?

A
  • Information Security Governance
  • Information Security Risk Management
  • Information Security Program
  • Incident Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a deterrent control ?

A

Deterrent controls are administrative mechanisms (such as policies, procedures, standards, guidelines, laws, and regulations) that are used to guide the execution of security within an organization. Deterrent controls are utilized to promote compliance with external controls, such as regulatory compliance.

Deterrent controls attempt to discourage individuals from causing an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the different type of controls ?

A

Preventive controls attempt to prevent an incident from occurring.

Detective controls attempt to detect incidents after they have occurred.

Corrective controls attempt to reverse the impact of an incident.

Deterrent controls attempt to discourage individuals from causing an incident.

Compensating controls are alternative controls used when a primary control is not feasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is the ultimate authority over the organization ?

A

The board of directors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does MOU mean ?

A

Memoranda of Understanding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When is a MOU (Memoranda of Understanding) relevant ?

A

When it is an agreement with another INTERNAL organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does MSA mean ?

A

Master Service Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SLA mean ?

A

Service Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When to use MSA and SLAs ?

A

When the service is to be provided to external service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does BPA mean ?

A

Business Partnership Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When to use a BPA ?

A

When 2 organizations are entering into a joint effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does AV mean ?

A

Asset Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is threat hunting ?

A

Cyber threat hunting is a proactive security search through networks, endpoints, and datasets to hunt malicious, suspicious, or risky activities that have evaded detection by existing tools.

Thus, there is a distinction between cyber threat detection versus cyber threat hunting. Threat detection is a somewhat passive approach to monitoring data and systems for potential security issues, but it’s still a necessity and can aid a threat hunter. Proactive cyber threat hunting tactics have evolved to use new threat intelligence on previously collected data to identify and categorize potential threats in advance of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of the Red Team ?

A

They attempt to gain access to systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of the Blue Team ?

A

They are defenders who secure systems from attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the role of the White team ?

A

They are observers and judges

17
Q

What is the role of the Purple team ?

A

They bring together members of red and blue teams

18
Q

What does “preponderance of the evidence” mean

A

The evidence demonstrate that the outcome of the case is more likely than not.

19
Q

Which “evidence standard” do civil cases follow ?

A

Preponderance of the evidence

20
Q

What is a parallel test ?

A

It is a type of tests where the alternate processing facility is activated but the primary site retains operational control

21
Q

What is a full interruption tests ?

A

In this type of test the primary site is shut down and operational control moves to the alternate site

22
Q

What is a simulation test ?

A

Simulations and Structured Walk-Throughs do not affect normal operations and do not activate the alternate site.

23
Q

What are the supporting tasks covered in the 1st chapter “Today’s Information Security Manager” ?

A
  1. Identify Internal and external Influences to the organization that impact the information security strategy
  2. Establish and/or maintain an information security strategy in alignment with organizational goals and objectives
  3. Gain ongoing commitment from Senior Leadership and other stakeholders to support the successful implementation of the Information Security Strategy
  4. Define, Communicate and Monitor Information Security Responsibilities throughout the organization and lines of authority
24
Q

What is the responsibility of an Information Security Manager ?

A

Leading teams of cybersecurity professionals and helping them achieve the goals of the cybersecurity program while aligning those objectives with the needs of the business.