ISC - Daily Cumulative Review Flashcards

Flashcards include concepts within daily (final review) cumulative 30 MCQ Exams that were answered wrong. The purpose is to keep the question so simple, one could theoretically study them while driving.

1
Q

What conversion method implements a new system one at a time?

A

Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is business impact analysis a part of?

A

Business continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four components of NIST Special Publication 800-39?

A

Risk:
1. Framework
2. Assessment
3. Response
4. Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define CIS Critical Security Control 12: Network infrastructure management?

A

Manage network devices to prevent exploitation of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Personal Identifiable Information (PII)?

A

Data that can be used to identify an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a company-wide Acceptable Use Policy (AUP)?

A

Control to regulate and protect technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does one ensure 3NF during data normalization?

A

Eliminate data that relies on both primary key and non-key attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is tunneling in terms of a VPN?

A

Data or packets in one protocol are enclosed into packets of a different protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the definition of an Acceptance Test?

A

Ensures that software works correctly in normal environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the steps of a business continuity plan for disaster recover?

A
  1. Assess risks
  2. Identify critical applications and data
  3. Develop plan for handling applications
  4. Determine responsibilities
  5. Test recovery plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Recovery Time Objective (RTO)?

A

Max time it takes to restore operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Recovery Point Objective (RPO)?

A

Max threshold for acceptable data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 8 component’s of COSO ERM Framework?

A
  1. Internal environment
  2. Objective setting
  3. Event identification
  4. Risk assessment
  5. Risk response
  6. Control activities
  7. Information and communication
  8. Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define the four tier’s under the NIST CSF?

A

4 (Adaptive) - Prioritization
3 (Repeatable) - Integration
2 (Risk-informed) - Awareness
1 (Partial) - Incident management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should be done to CSOCs in the carve-out method?

A

Excluded from description of SO’s system.

Note: Should not exclude all references of the SoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the point of a digital signature?

A

Authentication due to encryption

17
Q

What is disaster recovery planning?

A

Ensure ability to restore and continue operations

18
Q

What is the name of the cybersecurity threat where an IoT device is used as an entry point?

A

Escalated cyberattacks

19
Q

What is system availability?

A

Recover from incident

20
Q

What are some components of system availability?

A

Business resiliency, business continuity, system availability controls, crisis management, disaster recovery

21
Q

What is the change management step, close loop verification?

A

Monitoring output, compare to wanted outcome, adjust

22
Q

What are some general controls?

A
  • Software acquisition and development
  • Security management
  • IT infrastructure
23
Q

What is the main advantage of IaasS over Paas?

A

Control over:
• Operating system
• Firewalls
• Runtime

24
Q

What are the four NIST Privacy Framework Core and their respective definitions?

A

Control - Management structure
Identify - Answers ‘what’?
Communicate - Dialogue
Govern - Best structure

25
How can the holistic approach governance system principle under COBIT 2019 best be summarized?
Diversity in IT governance systems components
26
Summarize the requirements of "Payment Card Industry Data Security Standards" (PCI DSS)?
Protect cardholder data
27
Define general controls in an information system?
Ensure control environment is well managed.
28
When CUEC are identified in a SOC Type 2 engagement, how should the scope section be changed?
Include statement that the design and operating effectiveness of the CUEC were not evaluated.
29
What is the definition of the following database schemas: 1. Hierarchical model 2. Flat model 3. Star schema 4. Snowflake schema
1. Data relationships 2. Individual data 3. Fact table -> dimension tables 4. Fact table -> dimension tables -> multiple related tables
30
What should management's description of Cybersecurity Risk Management include?
1. Business and Operations 2. Information at risk 3. Risk governance strucuture
31
What are benefits of cloud computing over in-house systems?
Cheaper to install and maintain