ISC S3 Flashcards

Main points in S3 after completing modules.

1
Q

What is the difference between asymmetric and symmetric encryption?

A

Asymmetric: Public and private Key
Symmetric: Shared keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Confidentiality according to NIST?

A

Restrictions on data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is privacy according to NIST?

A

Right to control information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are three examples of preventative controls in terms of cybersecurity?

A
  1. Network access
  2. Encryption
  3. User access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Data Obfuscation and what are the three types and their definitions?

A

Replacing data with less valuable data.

Encryption: Scrambles data with cryptography
Tokenization: Replace data with substitute data using code or token
Masking: Swaps data with similar data but maintain structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Data Loss Prevention (DLP) and types of DLP?

A

Prevent info to be transferred out.

e.g., Endpoint-based, Cloud-based, Network-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are data protection controls?

A
  • Digital security
  • Change management
  • Backup
  • User access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Incident Response Timeline?

A

Map out when an incident starts, is detected, and contained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 7 phases of an Incident Response Timeline?

A
  1. Preparation
  2. Detection
  3. Containment
  4. Eradication
  5. Reporting
  6. Recovery
  7. Learning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(1) What are the two types of incident response team models and (2) what is a secondary function applicable to these models?

A
  1. Centralized and Distributed response teams
  2. Coordinating team
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a cybersecurity event vs. cybersecurity incident?

A

Event - Benign or adverse (negative) occurrence
Incident - Threat to organization’s computer or network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some events Cyber Insurance Policies cover?

A
  • Data breaches
  • Cyber Extortions
  • Replacement costs for information systems
  • Incident Response Costs (Expenses to recover lost or stolen data)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are system availability controls?

A

Controls that ensure heavily relied upon networks are not disrupted due to physical damage, security incidents, or intentional damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly