Objective 5 Flashcards

1
Q

Which of the following terms refer to the specific laws and regulations set by a country’s government that dictate how the personal data of its citizens should be collected, stored, and processed?

General Data Protection Regulation (GDPR)
Consent management
National legal implications
Data encryption

A

National legal implications are laws and regulations set at the country level that outline the requirements and boundaries for data protection and privacy.

Consent management is a process that ensures organizations obtain and manage the consent of individuals before collecting or processing their personal data. Data encryption is a method used to protect data from unauthorized access by converting it into a code. The GDPR is a regulation enacted by the European Union to ensure data protection and privacy for all its citizens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term refers to an organization’s predetermined level of acceptable risk exposure?

Risk tolerance
Risk appetite
Exposure factor
Conservative

A

Risk tolerance refers to an organization’s predetermined level of acceptable risk exposure.

It represents the extent to which an organization is willing to tolerate potential risks before taking action to mitigate or avoid them. The exposure factor is a calculation that determines the amount of value that is lost if an event takes place. It doesn’t measure an organization’s level of acceptable risk exposure. The term “conservative” is not directly related to risk management. In financial contexts, it may refer to a risk-averse approach or cautious decision-making. While similar to risk tolerance, risk appetite refers to the amount of risk an organization is willing to take on to achieve its strategic objectives. It represents the organization’s overall attitude toward risk-taking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following terms BEST describe the affirmation of the validation of the accuracy and thoroughness of compliance-related reports?

Attestation
Regulatory examination
Independent third-party audit
Internal assessment

A

Attestation is the correct answer. In the context of compliance, attestation refers to the formal confirmation or affirmation that the compliance-related reports are accurate and thorough. It typically involves a statement or certification made by an authorized party, confirming that the processes and data in the reports are valid.

Regulatory examination refers to an official review by a regulatory body to assess compliance but doesn’t specifically focus on the affirmation of accuracy. Independent third-party audit is a more formal, external evaluation of compliance but doesn’t directly refer to the affirmation itself, which is more about attestation. Internal assessment refers to self-evaluations within an organization but does not carry the same formal, external validation as attestation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The executive team at a software development firm decides that any project with a potential financial impact greater than $500,000 due to a security incident will require an immediate review and intervention. This financial impact figure represents which of the following in risk management?

Risk level
Risk threshold
Risk limit
Risk tolerance

A

Risk threshold is the correct answer. The risk threshold refers to the specific point or value at which an organization decides to take action, such as conducting a review or intervention, due to the potential impact of a security incident. In this case, the executive team has set a threshold of $500,000 for financial impact, above which immediate action is required.

Risk level is incorrect because it refers to the overall assessment of the risk based on likelihood and impact, not the specific trigger point for action. Risk limit is a similar concept but generally refers to the maximum acceptable level of risk in a given scenario, often relating to financial or operational constraints. Risk tolerance refers to the overall amount of risk an organization is willing to accept, but in this case, the executive team is setting a threshold for action, not defining the overall tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following BEST describes the Software Development Life Cycle (SDLC) in application security?

It only considers security during the testing and creation phases of software development.
It primarily focuses on the speed of software delivery over security.
It replaces the need for regular software updates and patches.
It emphasizes the integration of security in software creation and maintenance.

A

It emphasizes the integration of security in software creation and maintenance is the correct answer. The Software Development Life Cycle (SDLC) in application security focuses on integrating security at every stage of software development, from design and development to testing and maintenance. This ensures that security is considered proactively throughout the process, reducing vulnerabilities and addressing security concerns as the software is being built and updated.

The other options are incorrect because they either narrow the scope of security considerations to certain phases (testing and creation), prioritize speed over security, or suggest that SDLC replaces the need for ongoing maintenance like patches, which is not the case. Regular updates and patches remain important even within the SDLC framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hair and There, an online beauty supply store, has conducted a comprehensive risk assessment and identified potential vulnerabilities in their network infrastructure. They recognize that another global pandemic would seriously harm their business and is a considerable risk. After careful analysis, they determine that they simply cannot control whether another pandemic occurs. They take measures to help reduce the types of damage a pandemic will cause and then hope that it doesn’t happen. Which risk management strategy is are they employing?

Avoid
Accept
Transfer
Mitigate

A

Mitigating the risk means implementing measures or controls to reduce the potential impact or likelihood of the risk event occurring.

Accepting the risk means the organization acknowledges the risk and does not take any specific actions to mitigate it. In the scenario above, they do take some measures to reduce the impact, so they are not just accepting the risk. Transferring the risk involves shifting the financial burden of potential losses to a third party, such as an insurance company. There is no mention of bringing in a third party to accept some of the financial burden for a pandemic. Avoiding the risk involves eliminating the risk entirely by refraining from activities or situations that could expose the organization to potential threats. They are not avoiding the risk since they are taking actions to minimize the impact. If they were avoiding the risk, they would probably close the business since avoiding involves not undertaking the activity that is risky.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Emily is part of the IT team and oversees the secure transmission of sensitive data within her organization, ensuring that all systems comply with integrity protocols. She monitors for any inconsistencies or issues that could compromise data integrity. What role does Emily most likely hold?

Data Custodian
Data Owner
Data Controller
Data Processor

A

The correct answer is Data Custodian.

Emily is responsible for ensuring the secure transmission of sensitive data and monitoring for issues that could compromise data integrity, which aligns with the role of a Data Custodian. A Data Custodian typically handles the management and protection of data on behalf of the data owner, ensuring that systems are secure and compliant with integrity protocols. Data Owners are responsible for making decisions about the data’s use, while Data Processors are entities that process data based on the Data Owner’s instructions. Data Controllers typically oversee the overall management and compliance of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which agreement type outlines the specific services to be provided by the vendor, along with associated timelines and costs?

MOA
SLA
MSA
SOW

A

A statement of work specifies the detailed scope of work, tasks, deliverables, timelines, and costs for a specific project or engagement with the vendor.

A Memorandum of agreement (MOA) typically outlines a broader understanding or collaboration between parties, but it may not necessarily include specific services, timelines, and costs as in this context. A Service-level agreement (SLA) is a specific type of agreement that defines the level of service expected from the vendor, including performance metrics, response times, and other service-related terms. An MSA is a comprehensive contract that sets forth the general terms and conditions that will govern multiple future engagements between the parties. It may reference specific work orders or statements of work for individual projects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following terms BEST describes the measurement used to describe a 7% possibility of hardware failure in the next year based on past statistical data?

Likelihood
Probability
Severity ranking
Exposure factor

A

The correct answer is Probability. Probability is used to describe the likelihood of an event occurring, such as the 7% possibility of hardware failure in the next year, based on statistical data. Likelihood is a more general term and often refers to the general chance of something happening, while probability is the quantitative measurement of that chance. Severity ranking would be used to describe the impact of an event, and exposure factor refers to the potential loss or impact from an event occurring, which isn’t relevant in this context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following entities is responsible for providing detailed analysis and recommendations to the governance board to aid in informed decision-making, particularly in areas requiring specialized knowledge?

Management Groups
Committees
Executive Teams
Advisory Councils

A

Committees are specialized groups that include subject matter experts who support the governance board with expert analysis and recommendations. While Advisory Councils may also provide advice, they are not solely responsible for in-depth analysis and recommendations for the governance board. Executive Teams individuals are part of the governance board with ultimate decision-making authority but may not focus on specific issues like committees do. Management Groups typically handle day-to-day operational decisions rather than providing specialized support to the governance board.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following types of penetration tests provides the tester with comprehensive knowledge of the target environment, including the system’s architecture, design, and source code, to identify hidden vulnerabilities?

Black box
Grey box
White box
Passive

A

The correct answer is White box. A white box penetration test is when the tester is provided with comprehensive knowledge of the target system, such as system architecture, design, and source code. This enables the tester to conduct a more thorough examination and identify vulnerabilities that may not be easily discovered through other methods.

Black box testing provides no prior knowledge of the system, requiring the tester to work from the outside in, much like an external attacker would. Grey box testing offers partial knowledge, often similar to an insider’s perspective, but not as detailed as white box testing. Passive testing focuses on gathering information without actively interacting with the target system, making it different from the other testing types, which involve more direct engagement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the context of privacy compliance, which of the following describes the role of a data controller?

The organization that handles data retention and storage.
The individual whose data is being processed.
The entity responsible for determining why data is processed.
The external auditor responsible for privacy compliance checks

A

The correct answer is The entity responsible for determining why data is processed. A data controller is the entity or organization that determines the purposes and means of processing personal data. Essentially, they make decisions about how and why data is used and are responsible for ensuring compliance with privacy regulations, such as GDPR.

The other options are incorrect. The organization that handles data retention and storage is typically involved in data management but is not necessarily the data controller. The individual whose data is being processed is referred to as the data subject, not the controller. The external auditor, while important for compliance checks, is not responsible for determining how and why the data is processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Members of the Risk Management Team at Eclipse, an awning manufacturer, are discussing the organization’s approach to risk management. They are considering the level of risk they are willing to accept to achieve the aggressive set of goals the CEO has created. What is the term for what they are considering?

Risk appetite
Risk deterrence
Risk tolerance
Risk acceptance

A

The term for what the Risk Management Team is considering is risk appetite. Risk appetite refers to the level of risk that an organization is willing to take on in pursuit of its objectives or goals, which aligns with the CEO’s aggressive set of goals.

Risk tolerance, while similar, is more about the specific level of risk an organization can bear before it negatively impacts the organization’s ability to meet its objectives. Risk acceptance refers to acknowledging the presence of risk and deciding not to take any action to mitigate it. Risk deterrence involves efforts to reduce the likelihood of a risk occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A severe storm disrupts power at a company’s main data center, leaving essential systems offline. To maintain operations, the IT team initiates procedures to bring up backup systems at an alternate location and restore critical data. Which aspect of the organization’s disaster recovery policy is being implemented in this scenario?

Risk assessment
Business continuity planning
Data redundancy testing
Recovery and restoration processes

A

The correct answer is “Recovery and restoration processes.” This aspect of the disaster recovery policy focuses on the steps to bring systems back online and restore critical data after a disruption, such as the storm in this scenario. The IT team is activating backup systems and restoring data, which is a clear example of this process. “Business continuity planning” refers to the overall strategy to ensure ongoing operations, but it doesn’t specifically address the recovery of data and systems. “Risk assessment” is about identifying and analyzing potential risks, not responding to a disruption, and “Data redundancy testing” involves verifying that backup data is available but doesn’t directly address the recovery process itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following BEST defines the term that represents the expected number of times a risk event will occur within a one-year period?

EF
ALE
SLE
ARO

A

The correct answer is “ARO,” which stands for Annual Rate of Occurrence. ARO represents the expected number of times a particular risk event will occur within a one-year period. It helps in calculating the potential financial impact of risks when combined with other factors like SLE (Single Loss Expectancy) and ALE (Annual Loss Expectancy). “EF” (Exposure Factor) represents the percentage of loss a business would face if a particular risk occurs, while “SLE” is the monetary loss expected from a single occurrence of a risk. “ALE” represents the annual financial loss expected from a risk event occurring multiple times throughout the year, but it requires ARO to calculate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rippled, a drink vendor, is developing a disaster recovery plan to ensure the swift recovery of critical systems and processes in the event of a disruption. They are defining a specific metric which is the amount of acceptable amount of time it will take to return to normal business. What measure are they defining?

MTTR
RPO
MTBF
RTO

A

The correct answer is RTO, which stands for Recovery Time Objective. RTO is the amount of time an organization is willing to tolerate for the recovery of a system or process after a disruption before it impacts the business. This metric helps define how quickly systems need to be restored to avoid significant operational or financial damage. “MTTR” (Mean Time to Repair) refers to the average time required to fix a system after failure, while “RPO” (Recovery Point Objective) focuses on the maximum acceptable amount of data loss, not recovery time. “MTBF” (Mean Time Between Failures) is a reliability measure that tracks the average time between system failures, which is not related to recovery time.

17
Q

What key principle underpins the European Union’s General Data Protection Regulation (GDPR) concerning personal data collection and processing?

Informed consent
Continuous monitoring
Data encryption
Data retention

A

The correct answer is “Informed consent.” The General Data Protection Regulation (GDPR) emphasizes that personal data must be collected and processed with the explicit, informed consent of the individual. This means that organizations must clearly explain how data will be used and obtain permission before collecting or processing it. “Continuous monitoring” is not a core principle of GDPR, although monitoring may be part of ensuring compliance. “Data encryption” is an important security measure but not a foundational principle of the regulation itself. “Data retention” is covered by GDPR but refers to limiting how long personal data is kept, not the key principle of consent for processing.

18
Q

At DionTraining, the risk management team has completed a comprehensive risk assessment and identified potential risks across various departments. To ensure proactive risk management and response, they want to establish a system for continuously monitoring and tracking these identified risks. Which element of the risk management process should the risk management team implement to monitor and track the identified risks over time?

Risk reporting
Risk register
Risk assessment
Business impact analysis

A

The correct answer is “Risk register.” A risk register is a tool used to document and track the identified risks within an organization, along with their potential impacts, likelihood, and the actions taken to mitigate them. This allows for continuous monitoring and management of risks over time. “Risk reporting” is part of the process of communicating risk information, but it is not the tool used for tracking risks. “Risk assessment” refers to the process of identifying and analyzing risks, not tracking them long-term. “Business impact analysis” focuses on understanding the potential impacts of risks on business operations, but it does not track the risks themselves.

19
Q

Which term refers to the percentage of an asset’s value that is expected to be lost when a specific risk eventuates?

EF
Asset impact
Damage proportion
SLE

A

The correct answer is “EF” (Exposure Factor). EF represents the percentage of an asset’s value that is expected to be lost when a specific risk occurs. It is used in risk analysis to quantify the potential loss associated with a specific threat. “SLE” (Single Loss Expectancy) is the result of multiplying the asset’s value by the exposure factor, representing the actual monetary loss when a risk event happens. “Asset impact” and “Damage proportion” are not standard terms used in risk management to describe this concept.