IS3445 CHAP 15 WEB APPLICATION SECURITY ORGANIZATIONS, EDUCATION, TRAINING, AND CERTIFICATION Flashcards
___ are now normally higher level coordination bodies with wider responsibilities for vulnerability and attack research and issuing warning and vulnerability notices.
(CIRT) Computer incident response team
___ is an all hours or on call group for an organization, corporation, or country designed to respond to online attacks or similar events. May also be called ISIRT.
(CSIRT) Computer security incident response team
___ is the basic description of computer application and operating system vulnerability; run for the Department of Homeland Security by the MITRE Corporation.
(CVE) Common Vulnerabilities and Exposures list
___ is a regularly updated US federal government project that sets a minimum security configuration for Microsoft Windows XP and Windows Vista computers that are used as general-purpose desktops.
(FDCC) Federal Desktop Core Configuration
___ is a worldwide voluntary and collaborative body bringing together incident response teams and related organizations. It encourages rapid and secure communications between affected communities and allows in-confidence information sharing.
(FIRST) Forum of Incident Response and Security Teams
___ is a carefully monitored system set up by security professionals to be attacked, so that attack sources and methods can be analyzed.
Honeypot
___ is a nonprofit professional and certification body that provides related programs for information security professionals.
(ISC)2 International Information Systems Security Certification Consortium
___ is the international standard for accrediting schemes that certify personal competences.
ISO 17024
___ is a copyright or licensing system that, compared with conventional commercial licensing schemes, allows wide use and modification of the material.
Open source
- Which organization provides incident response support for the federal government?
- OWASP
- The Secret Service
- US-CERT
- FIRST
US-CERT
- Which organizations investigate Internet crime?
- MLATs
- IC3
- ECTFs
- OWASP
IC3
ECTFs
- Which of the following standards are governed by NIST? (Select two)
- Advanced Encryption Standard (AES)
- ISO 27001
- Federal Desktop Core Configuration
- CISSP
Advanced Encryption Standard (AES)
Federal Desktop Core Configuration
- which of the following are (ISC)2 qualifications? (Select three)
- CISM
- CISSP
- CISSP-ISSEP
- Security+
- CSSLP
CISSP
CISSP-ISSEP
CSSLP
- You must pass an exam to become an (ISC)2 associate.
TRUE OR FALSE
TRUE
- Which certification organization is not approved under DiD Directive 8750?
- CERT/CC
- ISACA
- SANS GIAC
- FLETC
FLETC