Practice Test SYO - 701 Security Program Management and Oversight Flashcards
Jill’s organization wants to ensure that services and systems are back online and functioning normally within 4 hours of an event or incident. What term best describes this goal?
An RTO
An MTTR
An RPO
An MTBF
A. A recovery time objective (RTO) is set by organizations to describe how long restoring systems or services to normal function after a disruption can take. Mean time to repair (MTTR) is the average time it takes to repair a system or device. A recovery point objective (RPO) describes how much data can be lost in the event of an outage or issue, and the mean time between failures (MTBF) is a measure of the reliability of a system. It is the expected amount of time that will elapse between system failures.
Angie is performing a penetration test and has gathered information using the Shodan search engine about her target. What type of reconnaissance has she performed?
Active
Commercial
Scanner‐based
Passive
D. Angie has conducted passive reconnaissance. She did not perform a scan or otherwise take direct active action to gather her information. Instead, she used the existing Shodan engine to gather information. While Shodan is a commercial product and does gather information using scans, databases like Shodan are considered passive reconnaissance, and the Security+ exam objectives recognize two types of reconnaissance: active and passive.
Hong’s company conducts regular risk assessments. As part of their assessment process, they gather a team of experts who assess risks on a scale from low to high based on their knowledge and experience. What type of risk assessment is Hong’s company conducting?
Ad hoc
Quantitative
Qualitative
Continuous
C. Qualitative risk assessment uses knowledge and expertise to assess risk rather than assigning numeric values and calculations like a quantitative assessment process would. Ad hoc risk assessment is done when risks need to be assessed for a specific, immediate need unlike the planned, regular risk assessments described. Continuous risk assessment is ongoing, whereas this is conducted regularly.
Grace wants to establish a governance structure that will leverage third‐party experts who are paid by her organization. What governance structure should she select?
Board‐based
Committee‐based
Government‐based
Market‐based
A. Boards often include external members who may have industry or other experience and expertise that will benefit the organization, and they are sometimes, but not always, paid as part of their work on the board. Committees are frequently composed of internal staff; government‐based governance occurs through laws or as part of public service. Market‐based is not a type of governance outlined by the Security+ exam objectives.
Marissa has been recruited to a group that provides oversight for an organization but that doesn’t engage in the day‐to‐day operations of the organization. The group focuses on strategy and direction for the organization and meets a few times a year. What type of governance group is Marissa part of?
An activist investor’s group
A committee
A board
A regulator
C. Boards provide strategic oversight and direction for organizations. Boards may form subcommittees to accomplish specific tasks or to provide oversight over specific areas. Regulators oversee an industry based on law. Activist investor’s groups are not covered by the exam, but typically they own stock in an organization and seek to direct the organization through their activism and stock ownership.
Sharon’s organization wants to understand the risks that it will experience due to acquiring a new subsidiary, but it needs to conduct the assessment quickly while leveraging their industry expertise. Which of the following risk assessment options should Sharon recommend to address this need?
Conduct an ad hoc risk assessment.
Conduct a one‐time risk assessment.
Conduct a third‐party risk assessment.
Build a continuous risk assessment process.
B. A one‐time risk assessment that addresses the acquisition will best meet Sharon’s needs. Ad hoc assessments are less formal, and they are often used to quickly assess a system or other potential risk. There is no requirement listed for third‐party assessment, and they can be both expensive and time‐consuming. Continuous risk assessment efforts are typically built into ongoing processes and are not suited to this type of one‐time review.
Which of the following will provide a customer the opportunity to engage a third party to deliver an SOC 2, Type 1 report created by third‐party assessors?
A penetration testing agreement
A risk assessment agreement
A vulnerability scan clause
A right‐to‐audit clause
D. Right‐to‐audit clauses provide customers with the right to have an audit of their vendor like an SOC 2, Type 1 assessment performed. SOC 2, Type 1 reports are not penetration testing reports, vulnerability scan reports, or risk assessment reports.
Jake’s team has begun handling new data related to customers, including their personally identifiable information. Jake takes on a new role that has responsibilities including classifying each data element gathered about customers. What is Jake’s role in the data handling process?
Controller
Custodian
Owner
Processor
C. Data owners classify, protect, oversee the use of, and ensure the quality of data. Controllers are responsible for the procedures and purposes of data use, often described as the why and how. Custodians are the staff and teams who handle data, and processors work with data on behalf of a controller.
Which of the following is not a commonly used term to describe risk appetite?
Intentional
Neutral
Expansionary
Conservative
A. Terms used for risk appetite in the Security+ exam objectives include conservative, neutral, and expansionary. Intentional is not a term used for risk appetite.
What does a data steward do?
Create data.
Carry out data use and security policies.
Explain compliance requirements for data.
Oversee data throughout its life cycle.
B. Data stewards are responsible for the data in their charge. That means they carry out data usage and security policies and ensure that data is handled appropriately. Creating data is typically done by data owners, who also explain and set data security policies. Multiple roles oversee data throughout its life cycle, not just a data steward.
Colleen’s organization has deployed web application firewalls (WAFs) to protect their web services from being impacted by a known SQL injection attack. What risk management strategy has the organization adopted?
Transfer
Accept
Avoid
Mitigate
C. Avoidance seeks to prevent the risk from occurring. In this case, the WAF is a method of preventing the attack, thus avoiding the risk. Risk transfer options move the costs of risks to another organization such as through insurance. Acceptance involves management acknowledging that the risk and its impacts may occur and that the organization will move forward despite that chance. Mitigation works to limit the impact of a risk.
Requiring all web traffic to be sent via HTTPS is an example of what type of standard?
Access control
Encryption
Password
Physical security
B. HTTPS using TLS is a form of encryption for data in motion. Encryption standards often require specific ways to use encryption, encryption algorithms, settings or configurations for encryption, or times and places where encryption must be used. Access control standards focus on how access is controlled, by whom, and who is impacted. Password standards define settings and requirements related to passwords, and physical security standards address physical security requirements.
Why are cloud IaaS vendors unlikely to agree to including a right‐to‐audit clause in their contracts?
The risk to their other customers is too great.
The cost of the assessment is too high.
They may not pass the audit.
They have competing regulatory requirements.
A. Cloud vendors rarely agree to right‐to‐audit clauses, instead choosing to provide their own third‐party audit results. This reduces the chances of an audit or assessment causing issues with their other customers. Third‐party audit costs covered by right‐to‐audit clauses are often borne by the customers, not the vendor. Not passing an audit is unlikely for major vendors, regulatory requirements are more likely to require audits, and regulations rarely limit auditability.
Jill’s organization has selected Agile with a CI/CD process for their organization. What type of policy would document this selection?
Business continuity
Disaster recovery
Incident response
Software development life cycle
D. Agile, along with continuous integration/continuous delivery (CI/CD) pipelines, describes a software development life cycle. Business continuity, disaster recovery, and incident response policies may mention the Agile process and impacts on the CI/CD pipeline, but it is not the primary focus of those types of policies.
Megan’s organization wants to create a change management policy. Which of the following is not a typical change type found in a change policy?
Preauthorized changes
Emergency changes
Legislated changes
Standard changes
C. Change management practices often include options for preapproved changes, emergency changes, and standard changes. Changes required by legislation or other external factors are not typically built into most change management processes.
What describes the key difference between policies and standards?
Policies are defined by third parties; standards are defined by organizations.
Policies are defined by organizations; standards are defined by third parties.
Policies are a statement of intent; standards define how rules help enforce policy.
Policies are legally enforceable; standards are optional.
C. Policies are a statement of organizational intent. Standards are defined to help organization achieve that intent through the use of rules. Policies are typically defined by an organization, and standards may be adopted from third parties or created by the organization itself. Policies might be defined by law but are not required to be defined that way.
Connie wants to explain the consequences of noncompliance with data regulations to her organization’s management. Which of the following is the most common statutory consequence of noncompliance with regulations?
Data breaches
Reputational damage
Contractual impacts
Fines
D. Regulations most commonly have fines and sanctions as their primary punishments levied against noncompliant organizations. Data breaches and reputational damage may occur, but are they are not enforced by regulation. Contractual impacts may occur, but again are not directly enforced by regulations.
The company that Omar works for wants to co‐develop a mobile application with a third‐party company. What type of agreement should they both sign as part of this?
An SLA
An NDA
An MSA
A BPA
D. BPAs, or business partners agreements, are used when two organizations want to do business as a partnership. SLAs, or service level agreements, determine service levels and penalties if they are not met. Nondisclosure agreements, or NDAs, are used to protect sensitive data. Master service agreements, or MSAs, are foundational documents determining how organizations will work together as a foundation for specific work covered in SOWs, or statements of work.
What term describes the possibility of a risk occurring?
Impact
Likelihood
Potential
Rate of occurrence
B. Likelihood describes the possibility of a risk occurring. Impact describes what will happen if it does, potential is not a term used in this space, and rate of occurrence is how often a risk occurs on an annual basis.
Risk assessments required for regulatory compliance are most frequently conducted in which of the following modes?
As ad hoc risk assessments
As one‐time risk assessments
As recurring risk assessments
As continuous risk assessments
C. Regulatory compliance typically requires risk assessment on a regular basis, often once a year. Ad hoc, one‐time, and continuous risk assessments are used for other purposes to serve the organization but are not as common for regulatory compliance.
How is exposure factor (EF) expressed for risk calculations?
As a calculation of the ALE multiplied by the ARO
As the likelihood of loss
As a potential percentage of loss
As a calculation of the SLE multiplied by the ARO
C. Exposure factors are the percentage of value of an asset that would be lost due to an incident. ALE is the annual loss expectancy, and the ARO is the annual rate of occurrence. SLE is the single loss expectancy. Calculating these gives the cost of an incident, but EF is the impact of the risk and is not calculated using these, nor does it involve the likelihood of the risk.
Valerie’s organization wants to ensure that their access control vestibule, ID card system, and guards are effective in stopping unwanted entrance. What type of penetration test should she use to validate this?
Physical
Offensive
Defensive
Integrated
D. Integrated penetration testing combines both offensive and defensive penetration testing, and testing guards as well as attempting to make it through access controls is an example of an integrated test. Physical security testing involves testing an organization’s physical security defenses and practices, including guards, locks and doors, and other physical security components like access control vestibules. Offensive penetration testing involves acting like attackers, while defensive penetration testing seeks to learn as defenders.
Alexandria wants to mitigate the risk of ransomware during its initial infection stages. Which of the following strategies should she employ?
Deploy an EDR tool.
Purchase cybersecurity insurance.
Use secure, ransomware‐resistant backups.
Continue to operate as usual.
A. Secure, ransomware resistant backups can mitigate the impact of ransomware but cannot stop it from impacting systems like an endpoint detection and response (EDR) tool can. Since Alexandria’s focus is on immediate mitigation, her best answer is EDR. Cybersecurity insurance is a means of transferring risk, and simply operating as usual is an acceptance strategy.
Shane’s organization has determined that they can accept up to $10,000,000 a year in risk‐related loss in support of their strategic plans. What term best describes this?
Risk acceptance
Risk appetite
Ad hoc risk
A conservative risk tolerance
B. Shane’s organization has determined their risk appetite. They are willing to accept some risk, but may also choose to mitigate, transfer, or otherwise deal with their risk to match their appetite. Ad hoc describes risk assessment, not risk appetite or thresholds, and there is no way to determine if this is a conservative, neutral, or expansionary risk appetite.