Module 15 Flashcards

1
Q

Angelo has received notification that a business partner will no longer sell or update a specific product. What type of notification is this?

EOL
EOS
EOP
EOA

A

End of life (EOL) is a term used by a manufacturer to indicate that a product has reached the end of its “useful life” and the manufacturer will no longer market, sell, or update it after a specified date. The manufacturer may still offer maintenance options but at a premium price.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following threats would be classified as the actions of a hacktivist?

Compliance threat
Environmental threat
Internal threat
External threat

A

An external risk is from the outside (like the actions of a hacktivist).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Simona needs to research a control that attempts to discourage security violations before they occur. Which control will she research?

Preventive control
Deterrent control
Corrective control
Detective control

A

A deterrent control attempts to discourage security violations before they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not a legally enforceable agreement but is still more formal than an unwritten agreement?

BPA
MSA
MOU
SLA

A

A memorandum of understanding (MOU) describes an agreement between two or more parties. It demonstrates a “convergence of will” between the parties so that they can work together. An MOU generally is not a legally enforceable agreement but is more formal than an unwritten agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following control categories includes conducting workshops to help users resist phishing attacks?

Managerial
Operational
Technical
Administrative

A

Operational controls may include conducting workshops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are assigned to destroy the data stored in electrical storage by degaussing. You need to ensure that the drive is destroyed. What should you do before degaussing so that the destruction can be verified?

You should burn the disk before degaussing.
You should perform data masking before degaussing.
You should wipe the data before degaussing.
You should delete the data before degaussing.

A

Wiping overwrites the disk space with zeroes or random data. It will destroy the entirety of the data, which can verify its destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following methods can be used to destroy data on paper?

Pulping
Masking
Degaussing
Wiping

A

Pulping breaks paper back into wood cellulose fibers after the ink is removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are the cybersecurity chief of an enterprise. A risk analyst new to your company has come to you about a recent report compiled by the team’s lead risk analyst. According to the new analyst, the report overemphasizes the risk posed by employees who currently have broad network access and puts too much weight on the suggestion to immediately limit user access as much as possible. According to the new analyst, not only does the report not mention the risk posed by a hacktivist group that has successfully attacked other companies in the same industry, it doesn’t mention data points related to those breaches and your company’s risk of being a future target of the group.

How should you address this issue so that future reports and risk analyses are more accurate and cover as many risks as needed?

You should implement mean time between failure.
You should implement qualitative risk assessment.
You should implement risk control self-assessment.
You should implement quantitative risk assessment.

A

Risk control self-assessment (RCSA) is an “empowering” methodology that limits unconscious biases by having management and staff at all levels collectively work to identify and evaluate risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following types of risk would organizations being impacted by an upstream organization’s vulnerabilities be classified as?

Legacy risk
External risk
Multiparty risk
Multi-network risk

A

Multiparty risk is the impact that one organization’s vulnerabilities can have on other organizations connected to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the end-of-service notice indicate?

The enterprise will no longer offer support services for a product.
The service-level agreement with a vendor has expired.
The nondisclosure agreement with a service vendor has expired.

The enterprise is halting the manufacturing of a product.

A

End-of-service (EOS) indicates the end of support when the manufacturer quits selling a piece of equipment and no longer provides maintenance services or updates after a specific date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You were hired by a social media platform to analyze different user concerns regarding data privacy. After conducting a survey, you found that the concern of a majority of users is personalized ads. Which of the following should you mention in your report as a major concern?

Statistical inferences
Identity theft
Associations with groups
Individual inconveniences

A

Individual inconveniences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which risk remains after additional controls are applied?

Control risk
Internal risk
Inherent risk
Residual risk

A

Residual risk is the risk level that remains after additional controls are applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In an interview, you are asked to differentiate between data protection and data privacy. How should you differentiate between data protection and data privacy?

Data protection secures data against unauthorized access, while data privacy secures data against authorized access.

Data protection involves unauthorized data access, while data privacy secures data against authorized access.

Data protection involves securing data against unauthorized access, while data privacy is concerned with authorized data access.

Data protection secures data against authorized access, while data privacy involves unauthorized data access.

A

Data protection secures data against unauthorized access, and data privacy makes data accessible only to authorized persons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The protection of which of the following data type is mandated by HIPAA?

Health information
Personally identifiable information
Proprietary data
Public data

A

The Health Insurance Portability and Accountability Act (HIPAA) mandates that protected health information is kept secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should be done when the information life cycle of the data collected by an organization ends?

Protect the data
Tokenize the data
Mask the data
Destroy the data

A

When the information life cycle ends, data should be destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a list of potential threats and associated risks?

Risk portfolio
Risk matrix
Risk assessment
Risk register

A

A risk register is a list of potential threats and associated risks. Often shown as a table, a risk register can help provide a clear snapshot of vulnerabilities and risks.

17
Q

Which of the following data types has the highest level of data sensitivity?

Private
Sensitive
Confidential
Secure

A

Confidential is the highest level.

18
Q

Which of the following uses data anonymization?

Data obfuscation sanitization (DOS)
Data minimization
Data masking
Tokenization

A

Data masking involves creating a copy of the original data but obfuscating (making unintelligible) any sensitive elements such as a user’s name or Social Security number. Data masking should replace all actual information that is not absolutely required. Because data masking involves replacing data elements, it is also called data anonymization: there is not a means to reverse the process to restore the data back to its original state.

19
Q

Which of the following threats would be classified as the actions of a hacktivist?

External threat
Internal threat
Compliance threat
Environmental threat

A

An external risk is from the outside (like the actions of a hacktivist).

20
Q

After reviewing the data collection procedures in your organization, a court ordered you to issue a document that specifies how the organization uses the collected personal information. This document must be displayed to the user before allowing them to share personal data. Which of the following documents should you prepare?

Data minimization
Terms of agreement
Pseudo-anonymization
Privacy notice

A

A privacy notice that outlines how an organization uses the personal information it collects.

21
Q

When your enterprise’s collected data information life cycle ended, you were asked to destroy the data stored on magnetic storage devices. Which of the following techniques should you use to destroy the data?

Pulverize the data
Degauss the data
Shred the data
Delete the data

A

Degaussing permanently destroys the entire magnetic drive by reducing or eliminating the magnetic field.

22
Q

Several quantitative tools like mean time between failure (MTBF), mean time to recovery (MTTR), mean time to failure (MTTF), and failure in time (FIT) can be used to predict the likelihood of the risk. Which of these tools perform similar functions?

MTBF and MTTF
MTBF and FIT
FIT and MTTR
MTTF and MTTR

A

The mean time between failure (MTBF) calculates the average (mean) amount of time until a component fails, cannot be repaired, and must be replaced. The failure in time (FIT) calculation is another way of reporting MTBF. FIT can report the number of expected failures per one billion hours of operation for a device.

23
Q

Your company has hired a contractor to build fences surrounding the office building perimeter and install signs that say “premises under 24-hour video surveillance.” When do these controls occur?

The fence should be built before an attack, and the signs erected after an attack
The fence should be built after an attack, and the signs installed before an attack
The fence and the signs should both be installed after an attack
The fence and the signs should both be installed before an attack

A

Perimeter fences are physical control, and surveillance camera warnings are deterrent control. Both of these control types occur before an attack.

24
Q

In 2016, your enterprise issued an end-of-life notice for a product. In 2020, an end-of-service notice was issued for the same product. What does this mean?

The product’s expected lifetime ended in 2016, and it was removed from all enterprise services in 2020.

The product manufactured by your company expired in 2016, and it stopped functioning in 2020.

Your company stopped manufacturing a product in 2016, and all maintenance services for the product stopped in 2020.

All legacy systems in your enterprise were prevented from functioning in 2016 and completely replaced in 2020.

A

An end-of-life notice is issued when a company stops manufacturing a product, and an end-of-service notice is issued when a company stops all support for the product.

25
Which of these is NOT a response to risk? a. Mitigation b. Transference c. Resistance d. Avoidance
c. Resistance
26
Which of the following is NOT a threat classification category? a. Compliance b. Financial c. Tactical d. Strategic
c. Tactical
27
Which of the following approaches to risk calculation typically assigns a numeric value (1–10) or label (High, Medium, or Low) to represent a risk? a. Quantitative risk calculation b. Qualitative risk calculation c. Rule-based risk calculation d. Policy-based risk calculation
b. Qualitative risk calculation
28
Giovanni is completing a report on risks. To which risk option would he classify the action that the organization has decided not to construct a new a data center because it would be located in an earthquake zone? a. Transference b. Avoidance c. Rejection d. Prevention
b. Avoidance
29
Emiliano needs to determine the expected monetary loss every time a risk occurs. Which formula will he use? a. AV b. SLE c. ARO d. ALE
b. SLE
30
Enzo is reviewing the financial statements and has discovered a serious misstatement. What type of risk has he found? a. Control risk b. Financial risk c. Reporting risk d. Monetary risk
a. Control risk
31
Which of the following is NOT a concern for users regarding the usage of their privacy data? a. Associations with groups b. Individual inconveniences and identity theft c. Timeliness of data d. Statistical inferences
c. Timeliness of data
32
Which of the following is NOT a consequence to an organization that has suffered a data security breach? a. Reputation damage b. IP theft c. De-escalation of reporting requirements d. Monetary fine
c. De-escalation of reporting requirements
33
Sergio has been asked to make a set of data that was once restricted now available to any users. What data type will Sergio apply to this set of data? a. Open b. Unrestricted c. Public d. Available
c. Public
34
Which of the following is NOT true about data sovereignty? a. Data sovereignty is a concept that until recently was less of an issue. b. Generally, data is subject to the laws of the country in which it is collected or processed. c. Governments cannot force companies to store data within specific countries. d. Regulations are not necessarily on where an organization is headquartered.
c. Governments cannot force companies to store data within specific countries.
35
Bob needs to create an agreement between his company and a third-party organization that demonstrates a “convergence of will” between the parties so that they can work together. Which type of agreement will Bob use? a. SLA b. BPA c. ISA d. MOU
d. MOU
36
In an interview, you are asked to explain how gamification contributes to enterprise security. How should you reply? Recreational gaming helps secure an enterprise network by keeping the attacker engaged in harmless activities. Instructional gaming can train employees on the details of different security risks while keeping them engaged. Recreational gaming can train employees on how to contain a physical threat at an enterprise. Instructional gaming in an enterprise keeps suspicious employees entertained, preventing them from attacking.
Gamification is the process of using game-based scenarios for **_instruction_**. Security training can often include gamification in an attempt to heighten the interest and retention of the learner.
37
Which of the following can be done to obfuscate sensitive data? Degaussing Pulping Masking Shredding
Masking Data masking involves creating a copy of the original data by obfuscating any sensitive elements.