ISC Deck 2 Flashcards

1
Q

Cloud Service Provider (CSP)

A

relies on sharing of resources, is very secure and leads to economies of scale. managed by third parties
Is NOT on site, leads to fewer IT professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BCP vs DR Plans

A

BCP is preventative and DR is corrective
DR is part of BCP
BCP is continuous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Security Controls

A

Physical (ID badges, security guards, generators)
Technical - IT controls (general or app)
Administrative (Seg of Duties)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of preventative and detective controls

A

Access control software - preventative
Echo Checks and Hash Total - Detective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IT Roles and their functions

A

Data Librarian - control over entity’s data
System’s analyst - investigates business system and decides how computer can be applied
Computer Operator - runs comp eq
Programmer - writes, tests and debugs programs for apps or systems.
System Steering committee - involved in long range plans and overseeing info systems.
Systems Programmer - programs OS, installs, upgrades and compiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Business Impact Analysis (BIA)

A

Used to ID business units that are essential. Assesses time to return these to full functionality in event of a disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Management Assertion applicable to ALL SOC report

A

That the description of the system is fairly presented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Two primary entities covered by GDPR

A

Data processors and Data Controllers.
Data Processors handle data but do NOT determine purpose. Controller does that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

COBIT 2019 Holistic Approach

A

Ensure that all enablers are implemented in a holistic manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a validity check?

A

ensures that only authorized info is entered and accepted by the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Public Cloud

A

Client’s data is stored in the cloud and managed by a third party. Data is still secure and not available across orgs. Resources are also not shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of Encryption

A

Asymmetric Encryption - Public AND private key (more secure)
Symmetric Encryption - Public only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Purpose of Mgmt System Description for SOC2

A

enable report users to understand the system and the processing and flow of data. Prepare in accordance with specific criteria and describes procedures/controls in place to manage risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SOC Independence

A

Must be independent of responsible party - service org. No independence required of user entity.
If subservice org is used and mgmt uses the inclusive, they become a responsible party which requires independence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Device and Software Hardening

A

Reducing total vulnerabilities points and surfaces that can be attacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Steps in a Disaster Recovery Plan

A

Assess Org Risk
ID applications/data that are critical
Develop plan
Designate Personnel
Testing Plan

17
Q

Business Impact Analysis Steps

A

Establish BIA Approach
ID Critical Resources
Define disruption impacts
Estimate Losses
Establish recovery priorities
Create BIA report
implement BIA recommendations

18
Q

Metrics for Phishing Simulations

A

Report Rates: percent of employees who report phishing emails during sim
Click Rates: those who click on phishing link in sim
Re-Click rates: those who initially failed and click again.

19
Q

Tokenization

A

removes production data and replaces it with a surrogate value. Hashing or encryption can be ways to transform data

20
Q

Masking

A

Swaps data with other like data to disguise while maintaining a similar structure to original. Ex. SSNs (999) or Credit card numbers (xxx)

21
Q
A