Section 2 - ISC2 Flashcards

1
Q

Confidentiality, Integrity and Availability are referred to as

A

the CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PII Stands for
PHI Stands for

A

Personal Identifiable Information
Protected Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the measure of the importance assigned to information by its owner

A

Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term is Availability typically associated with

A

Criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the process called of verifying or providing the users identification is know as

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 3 Common methods of Authentication

A

Something you know - passwords or phrases (Knowledge Base)
Something you have - Token, cards (Token-Base)
Something you are - Biometrics (Characteristics Base)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False - Best practice is to use all 3 of the common methods of communication

A

False - 2 at least two is recommended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the legal term as defined as the protection against an individual falsely denying having performed a particular action

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name 3 Risk Management Terminology and their definitions

A

Asset - something that needs protection
Vulnerability - is a gap or weakness
Threat - something or someone that aims to exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name Threat Actors

A

Insiders
Outside Individuals
Formal Entities
Nation States
Technology such as bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat Vector is

A

the approach and technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The magnitude of the harm that can be expected and can result in a chain reaction is called

A

Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the 4 Risk Treatments

A

Avoidance - exit the service due to high risks
Acceptance - risk averse or low likelihood
Mitigation - Most common taking steps to minimize
Transfer - insurance for eg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name the 3 Security Controls

A

Physical Controls
Administrator Controls
Technical Controls (logical controls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the detailed steps to complete a task that supports departmental or organizational policies

A

Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used by governance teams to provide a framework to introduce policies and procedures in support of regulations

A

Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Put in place by organizational governance such as executive management to provide guidance

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

in form of laws typically from government and can carry financial penalties

A

Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name the Code of Ethics Cannons

A

Protect Society, the common good, necessary public trust and confidence in the infrastructure

Act honorably, honestly, justly, responsibility and legally

Provide diligent and competent services to principles

Advance and protect the profession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The process and act of converting the message from plaintext to ciphertext sometimes referred to as enciphering

A

Encyrption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The process of how an organization is managed, usually includes all aspects of how decisions are made for that organization, such as policies, roles and procedures

A

Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define Likelihood of Occurrence

A

based on a weighted factor on subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What Department is NIST part of?

A

US Dept. of Commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Qualitative Risk vs Quantitative Risk Analysis

A

Qualitative - assignment based on low, medium and high
Quantitative - numerical values are assigned to both impact and likelihood based on stats and monetized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Is BCP an Incident Response Plan

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Name the Components of an Incident Response Plan

A

Preparation - policy, identify critical data, train staff on response, ERT, Roles and responsibilities, Communication between stakeholders

Detection and Analysis - monitor attack vectors, Analyze incidents, prioritize, standard incident docs

Containment , Eradication and Recovery

Post Incident Activity - identify evidence, document lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

T or F Business Continuity is to bring all systems fully operational

A

Fales - just critical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the nickname of the book of procedures for BCP

A

RedBook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

True or False DR starts where BC leaves off

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What part of the CIA Triad is Incident Response, Business Continuity and Disaster Recovery

A

Availablity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the mitigations of violations of security policies and recommended practices

A

Incident Handling/Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Is a Firewall considered a Security Control

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

for Access Controls Subjects constitute the following

A

User, a process, a procedure, client or server, program, workstations,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the term for anything that the subject is trying to access referred to

A

Objects

Note: Objects are passive and do not contain their own access control logic and need to be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the term for an instruction developed to allow or deny access to an object by comparing the validated identity of the subject to an access control list

A

Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the implementations of access control and are part of a _________ strategy

A

Layered Defense also know as defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

It is acceptable to do profile user copies to save time T or F

A

False

38
Q

An entrance to a building where two doors with only one open at a time

A

Mantrap

39
Q

What is CPTED

A

Crime Prevention Through Environmental Design

40
Q

What are the common two types of Biometics

A

Physiological - Fingerprint, Iris (colored portion around the outside of the pupil), retinal (blood vessels in the back of the eye)

Behavioral - how a person acts by measuring voiceprints, signature dynamics and keystroke dynamics.

41
Q

What is DAC

A

Discretionary Access Control

Most common access control giving the user rights to pass the information, grant privilege’s, change security attributes

They are controlled by each individual object owner and not scalable

42
Q

Which Access Control is uniformly enforced across all data subject and provide detail

A

Mandatory Access Control
Only properly designated security administrators as trusted subjects can modify any of the security rules

43
Q

What is RBAC

A

Role Based Access Controls
Assigned by roles to each of the applicable systems

44
Q

True or False that encapsulation occurs when data moves down the OSI Model

A

True
This is coming from the previous layers header address

45
Q

As data moves up the OSI model what is that process called

A

de-encapsulation
header and footer are discarded

46
Q

What Layer in the TCP/IP Stack is ICMP and what is its function

A

Internet Layer
Used to determine the health of the network or specific link. Used by Ping, traceroute and other network management tools

47
Q

What is FTP’s insecure Port and SFTP Secure Port

A

21 - FTP
22 - SFTP

48
Q

What is Telnets Port and it Secure Counterpart

A

Telnet - 23
SSH - 22

49
Q

What is SMTP port and its secure counterpart

A

SMTP - 25
SMTP with TLS - 587

50
Q

What is time’s port and replaced by what

A

Time - 37
Network Time Protocol (NTP) - 123

51
Q

What is DNS port and replaced by what

A

DNS - 53
DNS over TLS - 853

52
Q

True or False - communication between endpoint and server requires a 3 way handshake

A

True

53
Q

What is the type of threat that places themselves between two devices such as a web browser and web server

A

On-Path Attack

54
Q

What is a passive, noninvasive attack to observe the operation of a device

A

Side-channel
power monitoring, timing and fault analysis attacks

55
Q

Which attack refers to threats that demonstrate an unusually high level of technical and operational sophistication spanning months or even years.

A

Advanced Persistent Threat (APT)

performed by organized groups such as Nation states

56
Q

True of False a Host-Based Intrusion System will monitor multiple servers and networks

A

False - it monitors activity on a single computer and is more detailed than a Network IDS. They are more costly to manage since they require administration on each of the systems they reside on

57
Q

True or False Network Intrusion Systems can monitor encrypted traffic

A

False - it can monitor other package details. a NIDS can monitor a large network by using remote sensors to collect data at key network locations and send to centralized console

58
Q

What refers to the process of designing, using our operating different process in ways that isolate high-risk activities from lower risk ones.

A

Firewalling

59
Q

Traditionally what OSI layer do firewalls operate at

A

Layer 4 - session

60
Q

What are Joint Operating Agreements and name them

A

Memo of Understanding and Memo of Agreement between organizations sometimes competitors that can work together in a disaster

61
Q

Micro segmentation of networks with firewalls at every connecting point is referred to as ________

A

Zero Trust

62
Q

True or False Network Access Control (NAC) can create policies along with enforcing them

A

False - they only enforce the polices that are in place.

63
Q

What type of devices would NAC enforce

A

Medical Devices
IoT Devices
BYOD such as phones and tablets
Guest users and contractor

example would be Hotel based Internet access. Logging in and validating room number and name

64
Q

True of False a DMZ is an example of Network Segmentation

A

True

65
Q

What is a Web-Application Firewall used for and can replace

A

It is used to control both internal and external traffic including encrypted like a traditional firewall.

It can replace a DMZ

66
Q

Key reason to segment Embedded Systems and IoT

A

These systems often control mechanisms such as AC, power, medical devices special care should be taken to isolate them from other devices on the network

67
Q

VLAN is a form of Micro segmentation - T or F

A

True

VPN and Security Groups are other examples

68
Q

What is the term when a malicious user can see traffic on other VLAN’s

A

VLAN Hopping

69
Q

True of False - All VPN are encrypted

A

False

70
Q

Name the 6 Major Sets of the Data Life Cycle

A

Create
Store
Use
Share
Archive
Destroy/Delete

71
Q

True of False - OSHA Requires if there is a claim that employee data is kept for 30 years

A

True

72
Q

Degausing is ____________

A

using magnets to erase data on hard drives

73
Q

What is the definition of Classification in Data Handling

A

Identifies the degree of harm that that asset if exposed would cause to the organization. Focused on maintaining confidentiality of the data based on sensitivity

74
Q

What type of data classification control of assigning a level of sensitivity

A

Labeling

75
Q

True of False it is acceptable to apply the longest retention period to all types of information in an orginization

A

False

76
Q

What is the term for any data that is left on media after deleting? What can be done to remediate

A

Remanence

Clearing the device using Random values also called overwriting or zeroing

Purging the device such as degaussing

Physical Destruction

77
Q

True of False Ingress Monitors the outbound traffic

A

False - Egress is the monitoring of outbound traffic

78
Q

What is part of Egress Monitoring

A

Data Loss/Leak Prevention (DLP)

79
Q

What are the two functions that provide Integrity with Encryption

A

Hash Functions - a finger print of the file

Digital Signatures - electronic signature providing non-repudiation

80
Q

True of False - all plaintexts are fully readable by humans

A

False -

81
Q

_______ Encryption is where both sender and receiver have the same Key.

A

Symmetric Encryption

Note- not very scalable if every person needs a key to communicate with each other

82
Q

Which type of Encryption requires out of band key distribution

A

Symmetric

83
Q

Same Key
Single Key
Shared Key
Secret Key and
Session Key are all names for what Encryption

A

Symmetric

84
Q

________ Encryptions uses one key to encrypt and a different key to decrypt

A

Asymmetric Encryption

85
Q

List some key benefits of Asymmetric Encryption

A

More scalable with no overhead of key exchange
Non-Repudiation of origin and delivery, access control and data integrity
More Secure

86
Q

Which Encryption has the best performance. Asymmetric or Symmetric

A

Symmetric.

The amount of processing espeically with large amounts of data is not practical for Asymmetric

87
Q

Who performs the study the mathematical techniques to attempting to defeat cryptography

A

CryptAnalysts

88
Q

What is the process where it takes an input set of data and returns a fixed length result called ______

A

Hash Value - most common method of ensuring message integrity today

89
Q

What is the term of comparing the digest code to the original called

A

Checksum

90
Q

Using a rogue interactive voice response (IVR) to recreate legitimate sounding bank or other institutions is called

A

Phone Phishing or Vishing

91
Q

The human equivalent of phishing where someone impersonates an authority or trusted figure

A

Pretexting

92
Q

Quid pro quo in Social Engineering is

A

request for information in exchange for something