regulations, standards or frameworks. Flashcards

1
Q

The _____ publishes the “20 CIS Controls.” _____ can be used to perform an overall evaluation of security posture.

A

Center for Internet Security (CIS)

The Risk Assessment Method (CIS-RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Department of Defense Cyber Exchange provides _____ with hardening guidelines for a variety of software and hardware solutions.

A

Security Technical Implementation Guides (STIGs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____, by the National Institute of Standards and Technology (NIST), provides checklists and benchmarks for a variety of operating systems and applications.

A

National Checklist Program (NCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ______ can be used with automated vulnerability scanners to test compliance against these benchmarks.

A

Center for Internet Security Configuration Access Tool (CIS-CAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ______ is a set of 12 requirements aimed to ensure companies that process, store, or transmit credit card information maintain a secure environment.

A

Payment Card Data Security Standard (PC DSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ______ mandates that medical facilities and patient representatives protect private health information of an individual.

A

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ______ provides a security policy for how private sector organizations can assess and improve their ability to prevent, detect, and respond to cybersecurity attacks.

A

National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)

also maps to Cloud Security Alliance Cloud Controls Matrix (CSA CCM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ frameworks are based on specific laws and regulations and ensure compliance of those standards. These _____ frameworks are highly-controlled and regulated

A

Regulatory

Medical records are governed by regulatory laws, for example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The _____ Act mandates the implementation of risk assessments, internal controls, and audit procedures in the United States. It maps to CSA CCM.

A

Sarbanes-Oxley (SOX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _____ is an international standard for information technology security. It maps to CSA CCM.

A

International Organization for Standardization (ISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The _____ is an audit specification guide developed for accountants.

A

Statements on Standards for Attestation Engagements (SSAE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The _____ states that personal data cannot be collected, processed, or retained without the individual’s informed consent.

A

European Union’s General Data Protection Regulation (GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The _____ is a federal law in the United States and is a vertical law for the financial sector.

A

Gramm–Leach–Bliley Act (GLBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The _____ defines the safe handling and storage of financial information.

A

Payment Card Industry Data Security Standard (PCI DSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Service Organization Control (SOC) Type _ report addresses internal controls over financial reporting.

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A Service Organization Control (SOC) Type _ report provides assurances about the effectiveness of controls in place in an organization within a given timeframe.

A

2

17
Q

A Service Organization Control (SOC) Type _ report is not as detailed of a report certifying compliance with SOC2.

A

3

18
Q

The _____ is a framework that provides guidance in security domains, including application security, identity and access management, mobile security, encryption and key management, and data center operations.

A

Cloud Security Alliance Cloud Controls Matrix (CSA CCM)