Lecture 12 Flashcards

1
Q

What is social engineering?

A

A psychological manipulation technique used to trick people into giving away sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information Security Governance?

A

The strategic direction and risk management process to ensure security objectives are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the COBIT framework?

A

A governance framework that helps organizations manage IT risks and align IT with business objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four steps of the policy lifecycle?

A

Plan, Implement, Monitor, and Evaluate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between a policy and a guideline?

A

Policy is a mandatory rule, while guideline is a recommendation that is not enforced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of security policies?

A
  • Acceptable Use Policy
  • Password Policy
  • Data Protection Policy
  • Incident Response Policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three principles of personnel security?

A
  • Least Privilege
  • Separation of Duties
  • Limited reliance on key employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are key components of Business Continuity Planning (BCP)?

A
  • Data backups
  • Disaster recovery sites
  • Key personnel replacement strategies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main goal of Access Control?

A

To ensure only authorized users have access to sensitive information and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is IT Security Operations?

A

The continuous process of maintaining and protecting IT systems through monitoring, auditing, and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly