ISC Deck 4 multi-unit Flashcards

1
Q

Which of the following NIST Privacy Framework Core functions focuses on understanding organizational risk tolerance?

A

Govern-P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following NIST Privacy Framework Core functions focuses on understanding organizational risk tolerance?

A

Data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIST SP 800-53 is designed to help organizations select, design, and implement security and privacy controls. Which of the following questions does it not seek to address?

A

How can control costs be minimized while while still achieving maximum cybersecurity efficiency?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is risk?

A

A measure of the extent to which an entity is threatened by a potential circumstance or event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the risk determination step in cyber risk assessment?

A

The step combines the likelihood and impact assessments to determine the overall risk associated with a potential threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between privacy and confidentiality?

A

Privacy is a matter of restricting access to information about individuals.
Confidentiality involves protecting data from disclosure to unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which system relieves parties from the need to establish their own pairs of keys when they want to communicate securely?

A

Public-key infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between public-key encryption from symmmetric key encryption?

A

Public-key (asymmetric) encryption occurs when communicating parties create a pair of keys, one of which is made public while the other is kept secret.
Symmetric encryption occurs when the communicating parties agree to the use of a single private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a coded electronic certificate that the certificate authority create contain?

A

1) the holder’s name
2) its public key
3) a serial number
4) an expiration date
NOTE: The Certificate authority makes its own public key widely available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which cyber risk assessment step include the determination of the overall risk associated with a potential threat?

A

Risk determination - it combines the likelihood & impact assessments to determine overall risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which does NIST SP 800-53 not address?

A

It does not address minimization of control costs while achieving max cybersecurity efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a security incident?

A

A security event is a violation of computer security policies, acceptable use policies, or standard security practices. It is considered a potential exposure. Incidents do not happen all the time ex data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an event In IT security?

A

An event is any observable change in a system or network that might lead to an incident or breach. It does not immediately denote a policy violation. Events are everyday occurrences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an Adverse opinion?

A

An opinion when a misstatement is BOTH Material and Pervasive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Disclaimer of opinion?

A

When the service auditor is unable to obtain sufficient appropriate evidence (Scope limitation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Unqualified (clean) opinion?

A

When there are no material misstatements.

17
Q

What is a Qualified opinion?

A

When the effect of misstatements are Material but NOT Pervasive.

18
Q

According to the Center for Internet Security (CIS), what should the configuration of data access control lists be based upon?

A

A user’s Need to Know

19
Q

What are the typical responsibilities osf the treasury/financing cycle

A

1) Investing funds
2) Compliance with debt covenants
3) Obtaining and repaying capital
NOTE: It does not oversee daily cash receipts and disbursements

20
Q

NIST SP 800-53 establishes controls for which applicable parties?

A

Systems & individuals

21
Q

In a flowchart which symbol would indicate that someone inputs a transaction or receives information?

A

A video display symbol

22
Q

In the cash disbursements process, what action takes place before the check is prepared, signed, and mailed?

A

The supplier invoice is matched to the purchase order and receiving report to prepare a payment voucher.

23
Q

In the realm of cybersecurity, how do threat agents exploit race condition vulnerabilities within computing systems?

A

By using code injection to add unauthorized steps into the process sequence of a trusted operation.

NOTE: Race condition attacks exploit situations where computing systems perform tasks in specific sequences.

24
Q

How should the concept of materiality be factored into an auditor’s opinion?

A

Materiality should be evaluated in the context of the common information needs of a broad range of user entities and their auditors.

25
Q

Which is not a cloud-unique cybersecurity risk associated with a cloud service provider’s (CSP) implementation of a cloud computing environment?

A

The compromise of the PKI due to lack of segregation of duties over the issuance and use of certificates is a risk generally applicable to cloud computing platforms and is not unique to a CSP’s implementation of a cloud environment.

26
Q

What is the role of cloud service providers (CSPs) in resource provisioning for cloud computing services?

A

CSPs provision and allocate computing resources to customers based on their needs and within contract limitations.

27
Q

What is a data center in the context of IT systems?

A

A data center is a dedicated facility or infrastructure where an organization houses and operates its computer systems.

28
Q
A