ISC2 CC Flashcards
______ is a difficult balance to achieve when many system users are guests or customers, and it is not known if they are accessing the system from a compromised machine or vulnerable mobile application. So, the security professional’s obligation is to regulate access—protect the data that needs protection, yet permit access to authorized individuals.
Confidentiality is a difficult balance to achieve when many system users are guests or customers, and it is not known if they are accessing the system from a compromised machine or vulnerable mobile application. So, the security professional’s obligation is to regulate access—protect the data that needs protection, yet permit access to authorized individuals.
_____ is a term related to the area of confidentiality. It pertains to any data about an individual that could be used to identify them. Other terms related to confidentiality are protected health information (PHI) , which is information regarding one’s health status, and classified or sensitive information, which includes trade secrets, research, business plans and intellectual property.
Personally Identifiable Information (PII) is a term related to the area of confidentiality. It pertains to any data about an individual that could be used to identify them. Other terms related to confidentiality are protected health information, which is information regarding one’s health status, and classified or sensitive information, which includes trade secrets, research, business plans and intellectual property.
The address 8be2:4382:8d84:7ce2:ec0f:3908:d29a:903a is an:
IPv6 Address
MAC Address
IPv4 Address
Web Address
IPv6
An IPv6 address is a 128-bit address represented as a sequence of eight groups of 16-bit hexadecimal values. An IPv4 address is a 32-bit address represented as a sequence of four 8-bit integers. A Mac address is a 48-bit address represented as six groups of 8 bits values in hexadecimal. A web address consists of a protocol name, a server address, and a resource path (see ISC2 Study Guide, chapter 4, module 1 - Understand Computer Networking).
Which of the following is NOT an ethical canon of the ISC2?
Advance and protect the profession
Protect society, the common good, necessary public trust and confidence, and the infrastructure
Act honorably, honestly, justly, responsibly, and legally
Provide active and qualified service to principal
Provide active and qualified service to principal
In the code of ethics, we read “Provide diligent and competent service to principals”, and not “Provide active and qualified service to principals.”; all the other options are valid canons of the code of ethics (see ISC2 Study Guide Chapter 1, Module 5).
Which of the following is NOT a protocol of the OSI Level 3?
IGMP
IP
SNMP
ICMP
SNMP
Internet Protocol (IP) is known to be a level 3 protocol. Internet Control Message Protocol (ICMP) and Internet Group Management Protocol (IGMP) are also level 3 protocols. Simple Network Management Protocol (SNMP) is a protocol used to configure and monitor devices attached to networks. It is an application-level protocol (level 7), and therefore the only option that is not from level 3.
Which of the following is NOT a social engineering technique?
Double-dealing
Quid pro quo
Baiting
Pretexting
Double-dealing
Baiting is a social engineering attack wherein a scammer uses a false promise to lure a victim. Pretexting is a social engineering technique that manipulates victims into disclosing information. Quid pro quo is a social engineering attack (technically, one that combines ‘baiting’ with ‘pretexting’) that promises users a profit in exchange for information (that can later be used to gain control of a user’s account or sensitive information). Regarding cybersecurity, ‘Double-dealing’ is not a valid social engineering attack (see ISC2 Study Guide, chapter 5, module 3, under Chapter Resource).
In which of the following phases of an Incident Recovery Plan are incident responses prioritized?
Detection and Analysis
Containment, Eradication, and Recovery
Post-incident Activity
Preparation
Detection and Analysis
Incident responses are prioritized in the Detection and Analysis phase (see the ISC2 Study Guide, Chapter 2, Module 1, under Components of Incident Response).
In which of the following access control models can the creator of an object delegate permission?
MAC
DAC
ABAC
RBAC
DAC
In a Discretionary Access control model, the permissions associated with each object (file or data) are set by the owner of the object. In this model, the creator of an object implicitly becomes its owner, and therefore can decide who will have permission over the objects. In the remaining models, access specifications are centrally determined.
Which of the following principles aims primarily at fraud detection?
Separation of Duties
Least Privilege
Defense in Depth
Privileged Accounts
Separation of Duties
According to the principle of Separation of Duties, operations on objects are to be segmented (often referred to as ‘transactions’), requiring distinct users and authorizations. The involvement of multiple users guarantees that no single user can perpetrate and conceal errors or fraud in their duties. To the extent that users have to review the work of other users, Separation of Duties can also be considered a mechanism of fraud detection (see ISC2 Study Guide Chapter 1, Module 3). The principle of Least Privilege states that subjects should be given only those privileges required to complete their specific tasks. The principle of Privileged Accounts refers to the existence of accounts with permissions beyond those of regular users. Finally, the principle of Defense in Depth endorses the use of multiple layers of security for holistic protection.
The SMTP protocol operates at OSI Level:
25
7
3
23
7
Simple Mail Transport Protocol (SNMP) is an application layer protocol that operates at level 7. Level 3 corresponds to the network layer. There are no OSI layers above level 7. The number 25 presumably refers to the TCP/IP port of the SMTP protocol. The number 23, in turn, refers to the TCP/IP port of the Telnet protocol.
What is an effective way of hardening a system?
Patch the system
Have an IDS in place
Run a vulnerability scan
Create a DMZ for web application services
Patch the system
According to NIST SP 800-152, hardening is defined as the process of eliminating the means of an attack by simultaneously patching vulnerabilities and turning off nonessential services. The ISC2 Study Guide, chapter 5, module 2, under Configuration Management Overview, reads “One of the best ways to achieve a hardened system is to have updates, patches, and service packs installed automatically”. Vulnerability scans and IDS do not eliminate the means of an attack. The DMZ does not eliminate vulnerabilities in a system.
Which of these is the PRIMARY objective of a Disaster Recovery Plan?
Maintain crucial company operations in the event of a disaster
Communicate to the responsible entities the damage caused to operations in the event of a disaster
Outline a safe escape procedure for the organization’s personnel
Restore company operation to the last-known reliable operation state
Restore company operation to the last-known reliable operation state
A Disaster Recovery Plan (DRP) is a plan for processing and restoring operations in the event of a significant hardware or software failure, or of the destruction of the organization’s facilities. The primary goal of a DRP is to restore the business to the last-known reliable state of operations (see Chapter 2 ISC2 Study Guide, module 4, under The Goal of Disaster Recovery). Maintaining crucial operations is the goal of the Business Continuity Plan (BCP). The remaining options may be included in a DRP, but are not its primary objective.
Risk Management is:
The impact and likelihood of a threat.
The assessment of the potential impact of a threat.
The creation of an incident response team.
The identification, evaluation and prioritization of risks.
The identification, evaluation and prioritization of risks.
Risk Management is the process of identifying, assessing and mitigating risks (ISC2 Study Guide, chapter 1, module 2). “Impact and likelihood of a threat” is a definition of risk. “Creating an incident response team” and “assessing the potential impact of a threat” can be considered Risk Management actions, but are not in themselves Risk Management.
In risk management, the highest priority is given to a risk where:
The expected probability of occurrence is high, and the potential impact is low
The frequency of occurrence is high, and the expected impact value is low
The expected probability of occurrence is low, and the potential impact is low
The frequency of occurrence is low, and the expected impact value is high
The frequency of occurrence is low, and the expected impact value is high
The highest priority is given to risks estimated to have high impact and low probability over high probability and low impact value (ISC2 Study Guide, Chapter 1, Module 2). In qualitative risk analysis, the ‘expected probability of occurrence’ and the ‘frequency of occurrence’ refer to the same thing. The same goes for the concepts of expected impact value (NIST SP 800-30 Rev. 1 under Impact Value) and potential impact (NIST SP 800-60 Vol. 1 Rev. 1 under Potential Impact).
According to ISC2, which are the six phases of data handling?
Create -> Share -> Use -> Store -> Archive -> Destroy
Create -> Use -> Store -> Share -> Archive -> Destroy
Create -> Share -> Store -> Use -> Archive -> Destroy
Create -> Store -> Use -> Share -> Archive -> Destroy
Create -> Store -> Use -> Share -> Archive -> Destroy
According to the data security lifecycle model, the six phases of data security lifecycle model are Create -> Store -> Use -> Share -> Archive -> Destroy (see ISC2 Study Guide, chapter 5, module 1 under data handling).
Which of the following is NOT a type of learning activity used in Security Awareness?
Education
Training
Tutorial
Awareness
Tutorial
The three learning activities that organizations use in training for security awareness are Education, Training and Awareness (see ISC2 Study Guide, chapter 5, module 4). A tutorial is a form of training, but is not on the list of types of learning activities.
Which of these has the PRIMARY objective of identifying and prioritizing critical business processes?
Disaster Recovery Plan
Business Continuity Plan
Business Impact Analysis
Business Impact Plan
Business Impact Analysis
The term ‘Business Impact Plan’ does not exist. A Business Impact Analysis (BIA) is a technique for analyzing how disruptions can affect an organization, and determines the criticality of all business activities and associated resources. A Business Continuity Plan (BCP) is a pre-determined set of instructions describing how the mission/business processes of an organization will be sustained during and after a significant disruption. A Disaster Recovery Plan is a written plan for recovering information systems in response to a major failure or disaster.
The implementation of Security Controls is a form of:
Risk acceptance
Risk avoidance
Risk reduction
Risk transference
Risk reduction
The implementation of Security Controls involves taking actions to mitigate risk, and thus is a form of risk reduction. Risk acceptance will take no action, risk avoidance will modify operations in order to avoid risk entirely, and risk transference will transfer the risk to another party.
Which of the following is NOT an element of System Security Configuration Management?
Audit logs
Inventory
Updates
Baseline
Audit logs
System Security Configuration Management elements are inventories, baselines, updates and patches. Audit logs can be generated after ‘Verification and Audit’. However, ‘Verification and Audit’ is a configuration management procedure, and not a configuration management element (see ISC2 Study Guide, chapter 5, module 2, under Chapter Resource).
If there is no time constraint, which protocol should be employed to establish a reliable connection between two devices?
SNMP
DHCP
UDP
TCP
TCP
TCP is used for connection-oriented communication, verifies data delivery, and is known to favor reliability. In a congested network, TCP delays data transmission, and thus cannot guarantee delivery under time constraints. UDP favors speed and efficiency over reliability, and thus cannot ensure a reliable connection. DHCP and SNMP are (respectively) a device configuration and a device management protocol, which means that neither aims to establish connections between devices.
Which of the following is NOT a possible model for an Incident Response Team (IRT)?
Pre-existing
Leveraged
Hybrid
Dedicated
Pre-existing
The three possible models for incident response are Leveraged, Dedicated, and Hybrid (see the ISC2 Study Guide, Chapter 2, Module 1, under Chapter Takeaways). The term ‘Pre-existing’ is not a valid model for an IRT.
Which are the components of an incident response plan?
Preparation -> Detection and Analysis -> Containment -> Eradication -> Post-Incident Activity -> Recovery
Preparation -> Detection and Analysis -> Eradication -> Recovery -> Containment -> Post-Incident Activity
Preparation -> Detection and Analysis -> Recovery -> Containment -> Eradication -> Post-Incident Activity
Preparation -> Detection and Analysis -> Containment, Eradication and Recovery -> Post-Incident Activity
Preparation -> Detection and Analysis -> Containment, Eradication and Recovery -> Post-Incident Activity
The components commonly found in an incident response plan are (in this order): Preparation; Detection and Analysis; Containment, Eradication and Recovery; Post-Incident Activity (see the ISC2 Chapter 2, Module 1, under Components of an Incident Response Plan).
Which of the following canons is found in the ISC2 code of ethics?
Advance and promote the profession
Provide diligent and competent service to principals
Protect society, the common good, and the infrastructure
Act honorably, honestly, safely and legally
Provide diligent and competent service to principals
Only “Provide diligent and competent service to principals” contains the accurate text of the ISC2 code of ethics. Although a security professional should discourage unsafe practices, no direct reference to acting safely exists in the canons. Aside from society, the common good and infrastructure, security professionals are expected to protect public trust and confidence. Finally, they are expected to protect the profession, and not just advance and promote it.
Which of these is NOT a change management component?
RFC
Governance
Rollback
Approval
Governance
All significant change management practices address typical core activities: Request For Change (RFC), Approval, and Rollback (see ISC2 Study Guide, chapter 5, module 3). Governance is not one of these practices.