Module 6 Flashcards

1
Q

information security policies - do they need to be reviewed, if so how often

A

are to be reviewed and evaluated periodically ( at least annually) or if any changes occur with the facility that affects an approved policy statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

who is the key owner of security policies

A

Information Security Officer (ISO) is the key owner. policy reviews and encouraging engagement is this persons responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

mobile device policy - what are we doing here

A

develop specific policies, plans, and procedures to address members of the workforce who use mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

information security policies are to be reviewed and evaluated how often

A

periodically, at least annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

general goal of web application pen testing?

A

gain unauthorized access to client data within the application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

security audit functions should always stay independent of:

  1. environmental controls
  2. policy controls
  3. risk assessments
  4. operational and change management functions
A

operational and change management functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

segregation of information security duties are important because it

A

reduces the risk of accidental or deliberate system misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

risk assessment is done how often

A

at least once a year and must result in a comprehensive risk analysis report and recommended safeguards and prioritize risks and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

risk management - one responsibility is

A

define a timeline to react to notifications of potentially relevant technical vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is one thing that information security incident management should do

A

implement training that augments the certification or other qualifications of workforce members and use tools so as to strengthen the value of the preserved evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

one of the changes between 1.1 and `1.2 of NIST cybersecurity framework was a change in the identify function, what was it

A

supplier chain risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly