ISC2 CC Flashcards

1
Q

A documented, lowest level of security configuration
allowed by a standard or organization

A

Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In 2016, the European Union passed comprehensive
legislation that addresses personal privacy,
deeming it an individual human right.

A

General Data
Protection
Regulation
(GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

professional organization that sets
standards for telecommunications, computer
engineering and similar disciplines.

A

Institute of
Electrical and
Electronics
Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

develops voluntary international standards
in collaboration with its partners in international
standardization, the International Electro-
technical Commission (IEC) and the International
Telecommunication Union (ITU), particularly in the field
of information and communication technologies

A

International
Organization
of Standards
(ISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The internet standards organization, made up of network
designers, operators, vendors and researchers, that defines
protocol standards (e.g., IP, TCP, DNS) through a process
of collaboration and consensus

A

Internet
Engineering
Task Force
(IETF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A weighted factor based on a subjective analysis of the
probability that a given threat is capable of exploiting
a given vulnerability or set of vulnerability

A

Likelihood of
Occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

part of the U.S. Department of Commerce
and addresses the measurement infrastructure within
science and technology efforts within the U.S. federal
government. NIST sets standards in a number of areas,
including information security within the Computer Security
Resource Center of the Computer Security Divisions

A

National
Institutes of
Standards and
Technology
(NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The inability to deny taking an action such as
creating information, approving information
and sending or receiving a message

A

Non-
repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

“any information about an individual maintained by an agency,
including (1) any information that can be used to distinguish
or trace an individual’s identity, such as name, Social
Security number, date and place of birth, mother’s maiden
name, or biometric records; and (2) any other information
that is linked or linkable to an individual, such as medical,
educational, financial and employment information.”

A

Personally
Identifiable
Information
(PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information regarding health status, the provision of
healthcare or payment for healthcare as defined in HIPAA

A

Protected
Health
Information
(PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A method for risk analysis that is based on
the assignment of a descriptor such as low,
medium or high.

A

Qualitative
Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A method for risk analysis where numerical values
are assigned to both impact and likelihood based
on statistical probabilities and monetarized
valuation of loss or gain

A

Quantitative
Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of detecting and analyzing incidents to
limit the incident’s effect

A

Incident
Handling
or Incident
Response(IR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The documentation of a predetermined set of
instructions or procedures to detect, respond to
and limit consequences of a malicious cyberattack
against an organization’s information system

A

Incident
Response Plan
(IRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An architectural approach to the design of buildings
and spaces which emphasizes passive features
to reduce the likelihood of criminal activity.

A

Crime
Prevention
through
Environmental
Design (CPTED)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information security strategy integrating people,
technology, and operations capabilities to establish
variable barriers across multiple layers and missions
of the organization

A

Defense in
Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An automated system that controls an individual’s ability to access one or more computer system resources, such as a workstation, network, application or database. This system requires the validation of an individual’s identity through some mechanism, such as a PIN, card, biometric or other token. It has the capability to assign different access privileges to different individuals depending on their roles and responsibilities in an organization

A

Logical Access
Control
Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A certain amount of access control is left to the
discretion of the object’s owner, or anyone else who is
authorized to control the object’s access. The owner can
determine who should have access rights to an object
and what those rights should be

A

Discretionary
Access Control
(DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An entrance to a building or an area that
requires people to pass through two doors
with only one door opened at a time.

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The practice of ensuring that an organizational
process cannot be completed by a single person;
forces collusion as a means to reduce insider threats

A

Segregation
of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The process of creating, maintaining and
deactivating user identities on a system

A

User
Provisioning

21
Q

A set of routines, standards, protocols, and tools for building
software applications to access a web-based software
application or web tool

A

Application
programming
interface (API)

22
Q

An IP network protocol standardized by the Internet
Engineering Task Force (IETF) through RFC 792 to
determine if a particular service or host is available

A

internet
Control
Message
Protocol
(ICMP)

23
Q

Standard protocol for transmission of data
from source to destinations in packet-switched
communications networks and interconnected
systems of such network

A

Internet
Protocol (IPv4)

24
Q

Part of a zero-trust strategy that breaks LANs
into very small, highly localized zones using
firewalls or similar technologies. At the limit, this
places firewall at every connection point.

A

Micro
segmentation

25
Q

An information security standard administered by the
Payment Card Industry Security Standards Council
that applies to merchants and service providers
who process credit or debit card transaction

A

Payment
Card Industry
Data Security
Standard
(PCI DSS)

26
Q

The standard communication protocol for sending and
receiving emails between senders and receivers

A

Simple Mail
Transport
Protocol (SMTP)

27
Q

A logical group of workstations, servers, and
network devices that appear to be on the same
LAN despite their geographical distribution

A

Virtual Local
Area Network
(VLAN)

28
Q

A group of computers and devices that are
located in the same vicinity, forming a network
based on radio transmissions rather than wired
connections. A Wi-Fi network is a type

A

Wireless Area
Network
(WLAN)

29
Q

The graphical user interface (GUI) for the Nmap
Security Scanner, an open-source application
that scans networks to determine everything that
is connected as well as other information.

A

Zenmap

30
Q

A computer responsible for hosting applications
to user workstations

A

Application
Server

31
Q

A digit representing the sum of the correct digits in a piece
of stored or transmitted digital data, against which later
comparisons can be made to detect errors in the data

A

Checksum

32
Q

A process and discipline used to ensure that
the only changes made to a system are those
that have been authorized and validated

A

Configuration
management

33
Q

One who performs cryptanalysis which is the study
of mathematical techniques for attempting to
defeat cryptographic techniques and/or information
systems security. This includes the process of looking
for errors or weaknesses in the implementation
of an algorithm or of the algorithm itself.

A

Cryptanalyst

34
Q

System capabilities designed to detect and prevent the
unauthorized use and transmission of information

A

Data Loss
Prevention
(DLP)

35
Q

Monitoring of outgoing network traffic

A

Egress
Monitoring

35
Q

A technique of erasing data on disk or tape (including video
tapes) that, when performed properly, ensures that there
is insufficient magnetic remanence to reconstruct data

A

Degaussing

36
Q

Monitoring of incoming network traffic

A

Ingress
Monitoring

37
Q

A digital signature that uniquely identifies data and
has the property such that changing a single bit in
the data will cause a completely different message
digest to be generated

A

Message Digest

38
Q

The entirety of the policies, roles, and
processes the organization uses to make
security decisions in an organization

A

Security
Governance

39
Q

PORT: Secure Shell (SSH)

A

22

39
Q

PORT: File Transfer Protocol (FTP)

A

21

40
Q

PORT: Remote Desktop Protocol (RDP)

A

3389

41
Q

PORT: NetBIOS

A

137-139

42
Q

PORT: Simple Mail Transfer Protocol (SMTP)

A

25

43
Q

PORT: Post Office Protocol (POP)

A

110

44
Q

PORT: Internet Message Access Protocol (IMAP)

A

143

45
Q

HTTP

A

80

46
Q

PORT: HTTPS

A

443

47
Q

Hardening

A

A reference to the process of applying secure configurations
(to reduce the attack surface) and locking down various
hardware, communications systems, and software,
including operating system, web server, application server,
application, etc