Official Study Guide Flashcards
the Digital Millennium Copyright Act (DMCA) requires ISP’s to act promptly when notified of copyright infringement to address data stored or cached on systems controlled by it, but not on ___
data actively transmitted
the ___ act provides protection of trade secrets
Economic Espionage
Patents are registered with the ___
United States Patent and Trademark Office (USPTO)
the ___ requires federal agencies to implement information security programs
Federal Information Security Management Act (FISMA)
a ___ audit covers business continuity planning
SOC 2
the threshold for malicious damage to a federal computer system that triggers the Computer Fraud and Abuse Act is ___
$5,000
___ is a control objective framework that is widely accepted around the world and focuses specifically on information security controls
ISO 27002
___ requires that communications service providers cooperate with law enforcement requests
The Communications Assistance for Law Enforcement Act (CALEA)
the ___ of a company is not typically involved in BDP meetings, but should approve it when it is complete
CEO
the cutoff age below which parents must give consent in advance of the collection of personal information from their children under the Children’s Online Privacy Protection Act (COPPA) is ___
13
reliability of the materials and equipment used by a company are addressed in its ___
supply chain
A ___ most often refers to a formal US government process for assessing security controls and is often paired with a Security Test and Evaluation (ST&E) process.
security controls assessment (SCA)
Control Objectives for Information and Related Technology (COBIT) would be used by a ___ to help balance IT security needs with business needs
business owner
the security baseline applied to a system is primarily determined by ___
the classification of data it contains
even if it has been anonymized, personal health information should be classified as ___
Private
to make sure the windows workstations are in compliance with a security baseline, use ___
Microsoft Group Policy
data with the military classification of ___ would, if disclosed, could cause serious harm to national security
Secret
due to danger of remnant data, the US National Security Agency requires the ___ of SSD’s when no longer needed
physical destruction
The ___ requires conspicuously posted privacy policies on commercial websites that collect the personal information of California residents
California Online Privacy Protection Act
data “in motion” means data that is travelling ___ only
electronically
the earliest detection of fires can detect them in the ___ phase
incipient
business “Confidential” classification is equivalent to ___ or the military classification ___ and poses ___ danger, even though “Confidential” is the lowest military classification
proprietary; top secret; exceptionally grave
restricting access of a process to system resources to limit its impact on other processes (like a sandbox) is known as ___
confinement
if a customer is using IaaS and leaves sensitive information on a vendor’s drive, it is the ___ responsibility to remove the data
vendor’s
in assessing and accepting security controls, ___ means it has been validated by a company’s testers, ___ means it has been accepted by management (or an approved authority), and ___ means it has been validated by a third party
certification; accreditation; verification
to deter a casual intruder, fences should be ___ high, to deter a determined intruder it should be ___ high and have ___ at the top
6 ft; 8 ft; 3 strands of barbed wire
Halon is no longer used for fire suppression because ___
it contains CFC’s
___ sensors detect changes in electromagnetic fields to detect motion
capacitance
___ is malware which exploits port __ and infects IoT devices
Mirai, 23
Frame Relay supports ___, unlike X.25
multiple private virtual circuits (PVCs)
wireless clients on a LAN typically operate in ___ mode, which allows them to communicate with other clients through a Access Point
Infrastructure (or Master)
The RST flag is used to ___ in a TCP packet
reset or disconnect a session