ISC Deck 5 multi-unit Flashcards

1
Q

What is asset-centric thread modeling?

A

It is a threat modeling framework that prioritizes system assets and the business impact of losing each asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Under the incident response guidelines of NIST SP 800-61, what is the role of the IT support team during incident handling ?

A

According to NIST SP 800-61, the IT support team’s role includes executing actions on affected systems as directed by the incident response team to contain and mitigate the effects of the breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is not a cloud-unique cybersecurity risk associated with a cloud service provider’s (CSP) implementation of a cloud computing environment?

A

The compromise of the public key infrastructure due to lack of segregation of duties over the issuance and use of certificates is a risk generally applicable to cloud computing platforms and is not unique to a CSP’s implementation of a cloud environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a brute force attack?

A

A brute-force attack is an automated method of password cracking. It uses a trial-and error program to systematically guess the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is return-oriented programming?

A

Return-oriented programming is an advanced technique that attackers use to manipulate a system’s control flow and execute code sequences already present in the system’s memory by exploiting its vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Framework Core of the NIST Cybersecurity Framework consists of five concurrent and continuous functions designed to control cyber risk activities and outcomes. These five functions include

A

1) Identify
2)Protect
3)Detect
4)Respond
5)Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A SOC 1, type 2 report has four modifications to a type 1 report what are they?

A

1) an addition to the auditor’s responsibility to test the effectiveness of controls
2) the addition of a section of the report describing the auditor’s tests of controls
3) an opinion on the effectiveness of the controls over a period of time
and
4) the opinion of the description and suitability is extended to a period of time rather than a point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What information do user entities, and business partners usually need to identify, assess, and address the risk associated with the use of a service organization?

A

The need the design, operation, and effectiveness of controls.

The do NOT need management’s assertion about the controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

According to NIST SP 800-61, what must an incident response plan include>

A

1) a mission statement
2) strategies and goals
3) senior management approval
4) the organization’s approach to incident response
5) how the organization will communicate during an incident
6) metrics for measuring incident response capability
7) a roadmap for maturation of the incident response capability
8) how the program fits into the overall organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which component of the COSO Internal Control – Integrated Framework involves the entity gaining an understanding of its cyber risk profile?

A

The control environment component of the COSO internal control framework asserts that the board of directors should understand the organization’s cyber risk profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which procedure includes the auditor’s determination of whether an incident was reported in a timely manner?

A

The auditor assesses the identification of the incident and reporting by comparing the actual identification and reporting to the incident response plan. The auditor will look for any discrepancies and evaluate if the incident was detected and reported in a timely manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When considering COSO’s component of the control environment for evaluating trust services criteria, the service auditor would be most interested that

A

The board of directors identifies and accepts its oversight responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The entity should develop risk mitigation practices over technology that enable the organization to manage cyber risk. This is best covered by which of the following COSO internal control framework components?

A

The entity should develop control activities, otherwise known as risk mitigations, including general control and application control activities over technology, that enable the organization to manage cyber risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a threat agent?

A

An individual or group maliciously intending to exploit weaknesses in an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following procedures includes an examination of whether incident response procedures aligned with prescribed response procedures?

A

Evaluate response procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In a SOC 2 report description, what are the four components of the system used to provide services?

A

1) Infrastructure
2) Software
3) People
4) Procedures