ISC 1 - Regulations, Standards, & Frameworks Flashcards

1
Q

What is NIST?

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the core functions of the NIST Privacy Framework?

A

Communicate
Govern
Identify
Control
Protect
Detect
Respond
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the protect function of NIST composed of?

A

1-data protection policies, processes, and procedures
2- identity management, authentications, and access control
3 - data security
4 - data maintenance
5 - protective technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the control function of NIST composed of?

A

1- data processing policies, processes, and procedures
2 - data processing management
3 - disassociated processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the identity function of NIST composed of?

A

1- inventory and mapping
2 - business environment
3 - risk assessment
4 - data processing ecosystem risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the govern function of NIST composed of?

A

1 - governance policies, processes, and procedures
2- risk management strategy
3- awareness and training
4 - monitoring review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four implementation tiers?

A

Partial
Risk-Informed
Repeatable
Adaptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two framework profiles?

A

Current and target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Health Insurance and Portability Act (HIPAA)?

A

A business that handles protected health information (PHI) via transmission of health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the GDPR?

A

General Data Protection Regulation; For companies located in the EU, the scope of GDPR applies to data processing organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIS - What is the Inventory and Control of Enterprise Assets?

A

Actively manage all enterprise assets connected to the infrastructure to accurately know all assets that need to be monitored and protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIS - What is Inventory and Control of Software Assets?

A

Actively manage (inv, track, and correct) all software on the network so that only authorized software is installed and executed. Unauthorized and unmanaged software is found and prevented from installation and execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIS - What is Data Protection?

A

Develop processes and technical controls to identify, classify, securely handle, retain, and dispose of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CIS - What is Secure Configuration of Enterprise Assets and Software?

A

Establish and maintain the secure configuration of enterprise assets and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CIS - What is Account Management?

A

Assign and manage authorization to credentials for user, admin, and service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIS - What is Access Control Management?

A

Create, assign, manage, and revoke access credentials and privileges for user, admin, and service accts for assets and software

17
Q

CIS - What is continuous vulnerability management?

A

Continuously assess and track vulnerabilities on all enterprise assets within their infrastructure, to remediate and minimize the window of opportunity for attackers.

18
Q

CIS - What is Audit Log Management?

A

Collect, alert, review, and retain audit logs of events that could help detect, understand, or recover from an attack

19
Q

CIS - What are email and web browser protections?

A

Improve protections and detections of threats from email and web vectors.

20
Q

CIS - What is Data Recovery?

A

Implement controls such as protecting recovery data and performing automated backups

21
Q

CIS - What is Network Infrastructure Management?

A

Est., implement, and actively/securely manage network devices to prevent attackers from exploiting vulnerable network services and access points

22
Q

CIS - What is Network Monitoring & Defense?

A

Operate processes and tooling to est. and maintain comprehensive network monitoring and defense against security threats across the enterprise’s network infrastructure and user base

23
Q

CIS - What is Security Awareness and Skills Training?

A

Est. and maintain a security awareness program, training workforce members to recognize social engineering attacks, and training workforce members on authentication best practices

24
Q

CIS - What is Application Software Security?

A

Manage the security life cycle of in-house developed, hosted, or acquired software to prevent, detect, and remediate security weaknesses before they impact the enterprise

25
Q

CIS - What is Incident Response Management?

A

Est. a program to develop and maintain an incident response capability (policies, plans, procedures, roles, training, communications) to prepare, detect, and quickly respond to an attack

26
Q

CIS - What is Penetration Testing?

A

Test the effectiveness and resiliency of enterprise assets by identifying and exploiting weaknesses in controls (people, processes, and technology) and stimulating the objectives and actions of an attacker

27
Q

What are the three principles for a Governance framework?

A

1 - Based on conceptual model
2 - open and flexible
3 - aligned to major standards

28
Q

What are the COBIT Design Factors?

A

Risk Profile
Enterprise Strategy
IT implementation methods
Threat Landscape

29
Q

What are the components of the governance system?

A

Processes
Organizational structures
Principles, policies, and frameworks
Information
Culture, ethics, and behavior
People, skills, and competencies
Services, infrastructure, and applications

30
Q

Evaluate, Direct, and Monitor (5)

A

1- governance framework setting and maintenance
2 - benefits delivery
3 - risk optimization
4 - resource optimization
5 - stakeholder engagement/management

31
Q

Align, Plan, and Organize

A

Managed strategy
Managed innovation
Managed risk
Managed data

32
Q

Deliver, Service, and Support (6)

A

1 - Managed Operations
2 - service requests and incidents
3 - managed problems
4 - managed continuity
5 - managed security services
6 - managed business process controls

33
Q

Build, Acquire, and Implement

A
  • Managed programs, projects, requirements definition, IT changes, assets, knowledge, organizational change, availability and capacity
  • resource optimization
  • benefits delivery
  • governance framework setting and maintenance
34
Q

Monitor, Evaluate, and Assess

A
  • a system of internal control
  • performance and conformance monitoring
  • assurance
  • compliance with external requirements