ISC2 CC Flashcards

1
Q

A documented, lowest level of security configuration
allowed by a standard or organization

A

Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In 2016, the European Union passed comprehensive
legislation that addresses personal privacy,
deeming it an individual human right.

A

General Data
Protection
Regulation
(GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

professional organization that sets
standards for telecommunications, computer
engineering and similar disciplines.

A

Institute of
Electrical and
Electronics
Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

develops voluntary international standards
in collaboration with its partners in international
standardization, the International Electro-
technical Commission (IEC) and the International
Telecommunication Union (ITU), particularly in the field
of information and communication technologies

A

International
Organization
of Standards
(ISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The internet standards organization, made up of network
designers, operators, vendors and researchers, that defines
protocol standards (e.g., IP, TCP, DNS) through a process
of collaboration and consensus

A

Internet
Engineering
Task Force
(IETF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A weighted factor based on a subjective analysis of the
probability that a given threat is capable of exploiting
a given vulnerability or set of vulnerability

A

Likelihood of
Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

part of the U.S. Department of Commerce
and addresses the measurement infrastructure within
science and technology efforts within the U.S. federal
government. NIST sets standards in a number of areas,
including information security within the Computer Security
Resource Center of the Computer Security Divisions

A

National
Institutes of
Standards and
Technology
(NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The inability to deny taking an action such as
creating information, approving information
and sending or receiving a message

A

Non-
repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

“any information about an individual maintained by an agency,
including (1) any information that can be used to distinguish
or trace an individual’s identity, such as name, Social
Security number, date and place of birth, mother’s maiden
name, or biometric records; and (2) any other information
that is linked or linkable to an individual, such as medical,
educational, financial and employment information.”

A

Personally
Identifiable
Information
(PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information regarding health status, the provision of
healthcare or payment for healthcare as defined in HIPAA

A

Protected
Health
Information
(PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A method for risk analysis that is based on
the assignment of a descriptor such as low,
medium or high.

A

Qualitative
Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A method for risk analysis where numerical values
are assigned to both impact and likelihood based
on statistical probabilities and monetarized
valuation of loss or gain

A

Quantitative
Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of detecting and analyzing incidents to
limit the incident’s effect

A

Incident
Handling
or Incident
Response(IR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The documentation of a predetermined set of
instructions or procedures to detect, respond to
and limit consequences of a malicious cyberattack
against an organization’s information system

A

Incident
Response Plan
(IRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An architectural approach to the design of buildings
and spaces which emphasizes passive features
to reduce the likelihood of criminal activity.

A

Crime
Prevention
through
Environmental
Design (CPTED)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information security strategy integrating people,
technology, and operations capabilities to establish
variable barriers across multiple layers and missions
of the organization

A

Defense in
Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An automated system that controls an individual’s ability to access one or more computer system resources, such as a workstation, network, application or database. This system requires the validation of an individual’s identity through some mechanism, such as a PIN, card, biometric or other token. It has the capability to assign different access privileges to different individuals depending on their roles and responsibilities in an organization

A

Logical Access
Control
Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A certain amount of access control is left to the
discretion of the object’s owner, or anyone else who is
authorized to control the object’s access. The owner can
determine who should have access rights to an object
and what those rights should be

A

Discretionary
Access Control
(DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An entrance to a building or an area that
requires people to pass through two doors
with only one door opened at a time.

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The practice of ensuring that an organizational
process cannot be completed by a single person;
forces collusion as a means to reduce insider threats

A

Segregation
of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The process of creating, maintaining and
deactivating user identities on a system

A

User
Provisioning

21
Q

A set of routines, standards, protocols, and tools for building
software applications to access a web-based software
application or web tool

A

Application
programming
interface (API)

22
Q

An IP network protocol standardized by the Internet
Engineering Task Force (IETF) through RFC 792 to
determine if a particular service or host is available

A

internet
Control
Message
Protocol
(ICMP)

23
Q

Standard protocol for transmission of data
from source to destinations in packet-switched
communications networks and interconnected
systems of such network

A

Internet
Protocol (IPv4)

24
Part of a zero-trust strategy that breaks LANs into very small, highly localized zones using firewalls or similar technologies. At the limit, this places firewall at every connection point.
Micro segmentation
25
An information security standard administered by the Payment Card Industry Security Standards Council that applies to merchants and service providers who process credit or debit card transaction
Payment Card Industry Data Security Standard (PCI DSS)
26
The standard communication protocol for sending and receiving emails between senders and receivers
Simple Mail Transport Protocol (SMTP)
27
A logical group of workstations, servers, and network devices that appear to be on the same LAN despite their geographical distribution
Virtual Local Area Network (VLAN)
28
A group of computers and devices that are located in the same vicinity, forming a network based on radio transmissions rather than wired connections. A Wi-Fi network is a type
Wireless Area Network (WLAN)
29
The graphical user interface (GUI) for the Nmap Security Scanner, an open-source application that scans networks to determine everything that is connected as well as other information.
Zenmap
30
A computer responsible for hosting applications to user workstations
Application Server
31
A digit representing the sum of the correct digits in a piece of stored or transmitted digital data, against which later comparisons can be made to detect errors in the data
Checksum
32
A process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated
Configuration management
33
One who performs cryptanalysis which is the study of mathematical techniques for attempting to defeat cryptographic techniques and/or information systems security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or of the algorithm itself.
Cryptanalyst
34
System capabilities designed to detect and prevent the unauthorized use and transmission of information
Data Loss Prevention (DLP)
35
Monitoring of outgoing network traffic
Egress Monitoring
35
A technique of erasing data on disk or tape (including video tapes) that, when performed properly, ensures that there is insufficient magnetic remanence to reconstruct data
Degaussing
36
Monitoring of incoming network traffic
Ingress Monitoring
37
A digital signature that uniquely identifies data and has the property such that changing a single bit in the data will cause a completely different message digest to be generated
Message Digest
38
The entirety of the policies, roles, and processes the organization uses to make security decisions in an organization
Security Governance
39
PORT: Secure Shell (SSH)
22
39
PORT: File Transfer Protocol (FTP)
21
40
PORT: Remote Desktop Protocol (RDP)
3389
41
PORT: NetBIOS
137-139
42
PORT: Simple Mail Transfer Protocol (SMTP)
25
43
PORT: Post Office Protocol (POP)
110
44
PORT: Internet Message Access Protocol (IMAP)
143
45
HTTP
80
46
PORT: HTTPS
443
47
Hardening
A reference to the process of applying secure configurations (to reduce the attack surface) and locking down various hardware, communications systems, and software, including operating system, web server, application server, application, etc