ISC Deck 4 multi-unit Flashcards
Which of the following NIST Privacy Framework Core functions focuses on understanding organizational risk tolerance?
Govern-P
Which of the following NIST Privacy Framework Core functions focuses on understanding organizational risk tolerance?
Data loss prevention (DLP)
NIST SP 800-53 is designed to help organizations select, design, and implement security and privacy controls. Which of the following questions does it not seek to address?
How can control costs be minimized while while still achieving maximum cybersecurity efficiency?
What is risk?
A measure of the extent to which an entity is threatened by a potential circumstance or event.
What is the risk determination step in cyber risk assessment?
The step combines the likelihood and impact assessments to determine the overall risk associated with a potential threat.
What is the difference between privacy and confidentiality?
Privacy is a matter of restricting access to information about individuals.
Confidentiality involves protecting data from disclosure to unauthorized parties.
Which system relieves parties from the need to establish their own pairs of keys when they want to communicate securely?
Public-key infrastructure
What is the difference between public-key encryption from symmmetric key encryption?
Public-key (asymmetric) encryption occurs when communicating parties create a pair of keys, one of which is made public while the other is kept secret.
Symmetric encryption occurs when the communicating parties agree to the use of a single private key.
What does a coded electronic certificate that the certificate authority create contain?
1) the holder’s name
2) its public key
3) a serial number
4) an expiration date
NOTE: The Certificate authority makes its own public key widely available.
Which cyber risk assessment step include the determination of the overall risk associated with a potential threat?
Risk determination - it combines the likelihood & impact assessments to determine overall risk
Which does NIST SP 800-53 not address?
It does not address minimization of control costs while achieving max cybersecurity efficiency
What is a security incident?
A security event is a violation of computer security policies, acceptable use policies, or standard security practices. It is considered a potential exposure. Incidents do not happen all the time ex data breaches
What is an event In IT security?
An event is any observable change in a system or network that might lead to an incident or breach. It does not immediately denote a policy violation. Events are everyday occurrences.
What is an Adverse opinion?
An opinion when a misstatement is BOTH Material and Pervasive.
What is Disclaimer of opinion?
When the service auditor is unable to obtain sufficient appropriate evidence (Scope limitation)