ISC Deck 2 - multi-unit Flashcards

1
Q

What is the principle that a security architecture is designed so that each entity is granted the minimum system resources and authorizations that the entity requires to perform its function?

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the principle that a user has a legitimate reason to access a resource or system?

A

Need to know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the principle that is designed to minimize uncertainty in enforcing access decisions in information systems and services?

A

Zero trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which mitigation concept approach uses several layers of defense to secure the IT environment?

A

Layered security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

From the attacker’s perspective, what are the stages of a cyberattack?

A
  1. Reconnaissance
  2. Scanning
  3. Gaining access
  4. Escalation of privileges
  5. Maintaining access
  6. Network exploitation
  7. Covering tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are not testing procedures consistent with an auditor’s assessment of IT security procedures?

A

1) Interviews with customers
2) Examining logs for evidence of mgmt analysis & review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some testing procedures consistent with an auditor’s assessment of IT security procedures? (HINT: Inquiry and observation)

A

1) Surveys & questionnnaires
2) Review incident reports
3) Interviews with mgmt & staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does identification and authentication include?

A

1) Identifying a user for an application
2) Proving a user’s identity
3) Proving an application’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 4 authorization models?

A

1) Mandatory access control (MAC) - used in high security environments with strigent access control requirements
2) Role-based access control (RBAC) - suited for larger organizations with clearly defines roles and permissions
3) Attribute-based access control (ABAC)- grants permissions based on attributes of user, resource, and environment. Suitable for complex environments
4) Discretionary access control (DAC) - suited for smaller or less security intensive environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a critical consideration independent of backup type when determining a backup strategy?

A

Data retention policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of COSO’s Internal control component best defines how it selects, develops, and performs evaluations to assess the design and operating effectiveness of internal controls that address cyber risk?

A

Monitoring activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In database design, what is the primary purpose of normalization?

A

Avoiding data anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

At what stage of a cyberattack is the perpetrator capable of preparing and delivering the attack?

A

Network exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Version 8 of the Center for Internet Security (CIS) Critical Security Controls (CIS Controls) is comprised of 18 individual controls. Which of the following is not included as one of these 18 controls?

A

Intruder defenses is NOT included.
NOTE: Data protection, malware defenses, and network monitoring and defense are all controls under the CIS Controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main role of servers in an IT system?

A

Providing a service to other computers or programs called clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a characteristic of a data warehouse?

A

It supports a centralized data management system.

17
Q

What is the purpose of the SQL command ORDER BY?

A

The command sorts the result set based on one or more columns. (ex. in ascending or descending order)

18
Q

Under Review & Revision component of the COSO enterprise risk management framework applied to cloud computing governance, what description is associated with the key activity that includes evaluating cloud service providers (CSPs)?

A

Reviewing entity performance and considering risk.

19
Q

What is the four phase process for incident response handling?

A

1) Preparation
2) Detection and analysis
3) Containment, eradication & recovery
4)Post incident activity

20
Q

What are an auditor’s procedures for evaluating an organization’s response to incidents?

A

1) Review the incident response plan
2) Examine the incident documentation
3) Interview key personnel
4) Assess incident ID and reporting
5) Assess incident classification and prioritization
6) Evaluate response procedures
7) Evaluate communication
7) Assess post incident review
8) Review incident response testing procedures

21
Q

Name a detective control which produces reports to a management station when detecting malicious network activities.

A

Intrusion Detection System (IDS)

22
Q

Within the layered security approach, each layer where data communications within and across networks are protected can best be defined as

A

Transmission level security

23
Q

Name a data management control that encrypts data in transit?

A

Transport Layer Security

24
Q

What should an effective data management process be based on?

A

Data sensitivity

25
Q

What is the primary purpose of testing change control policies for IT resources?

A

The primary purpose of testing change control policies is to identify any deviations from expected outcomes and investigate the causes to ensure effectiveness.

26
Q

What is attack-centric modeling

A

A threat modeling framework that focuses on identifying threats with the greatest chance of success and the security controls for mitigating those threats.