study set 2 Flashcards

1
Q

What is it called when a data owner accepts the certification?

A

Accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAAA

A
A frame work:
Identification
Authentication
Authorization
Accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EF

A

Exposure Factor

the % of loss that is expected from an risk event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Privacy Act of 1974 applies to who?

A

applies only to federal Agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 8 steps to EDRM

A

The Electronic Discovery Reference Model

  1. Identification
  2. Preservation
  3. Collection
  4. processing
  5. review
  6. Analysis
  7. Production
  8. Presentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OEP

A

Occupant Emergency Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A privacy Policy needs to cover what 4 items?

A
  1. Collection
  2. Use
  3. Disclosure
  4. Protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vertical Control?

A

example Top secret, secret, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proactive Controls are?

A

Safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

‘IT’ logs and Documents are what type of Evidence?

A

Secondary Evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is committee of sponsoring organizations of the treadway commission called?

A

COSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Typosquatting

A

URL Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ISO 27799 standard is focused around?

A

Protecting PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogger is a threat to what CIA

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GDPR

A

updated EU Law for 2018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

“NEED TO KNOW” is what type of control?

A

Horizontal Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Tangible and physical objects are what type of evidence

A

Real evidence

Hard drives, usb sticks but not the data on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are 3 Corrective Controls

A
  1. anti-virus
  2. Patches
  3. IPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What act is for Identity theft

A

(ITADA) Identity Theft and Assumption Deterrence Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The First step of a BCP should perform?

A

(BOA) Business Organization Analysis

21
Q

What is the correct way to dispose of a SSD Drive?

A

Incinerate

22
Q

SOX

A

Sarbanes - Oxlet Act of 2002

Publicly traded companies have regulation on financial reports

23
Q

The 3 Rules of HIPAA

A
  1. privacy Rule
  2. security Rules
  3. Breach notification Rules
24
Q

Developed Guidelines for International Data is properly protected in a Globalized Economy

A

(OECD) Organization for Economic Co-operation and development

25
Q

MOA /MOU

A

Memorandums of Agreement / understanding for Essential personnel

26
Q

The Military or DOD Data Classification

A
  1. Top Secret
  2. Secret
  3. Confidential
  4. Unclassified
27
Q

IPS / IDS ensure what of CIA

A

Availability

28
Q

STRIDE

A

Is a Threat categorization scheme from Microsoft

spoofing
tampering
repudiation
info disclosure
DOS attack
Elevation of privilege
29
Q

Supporting facts and elements are what type of evidence?

A

Collaborative

Not a fact on it’s own

30
Q

When you see something, what type of evidence?

A

Direct Evidence

31
Q

Who Defines the acceptable level of risk?

A

Security Steering Committee

32
Q

What policy would address on how to deal with Data no longer Needed?

A

Data Destruction Policy

33
Q

4 CIA Confidentiality threats

A
  1. Attacks on Encryption
  2. Social Engineering
  3. Key Logger
  4. IOT internet of Things
34
Q

“The Majority of the proof” relate to what law?

A

Civil Law

35
Q

Cybersquatting

A

domain squatting

36
Q

Counterfeiting is ?

A

an attack on trademarks

37
Q

“Beyond a Reasonable Doubt”

A

Criminal Law

38
Q

What are the Business Data Classifications

A

High Sensitive
sensitive
internal
public

39
Q

Security Steering Committee Is Responsible for?

A

Is Responsible for making Decisions on Tactical and strategic security issues.

Members are asked to join

40
Q

Software code is a threat to what CIA

A

Availability

41
Q

Exigent circumstance is?

A

Immediate threat to Human life or evidence destruction.

Only applies to law enforcement or “ under the color of law”

42
Q

ISO 27002 is focused on?

A

ITSM

43
Q

Password hashing with salting is what part of the CIA?

A

Integrity

44
Q

the 5 ISC2 code of Ethics

A
  1. Protect the Society
  2. The Common Good
  3. Public Trust & confidence
  4. Provide diligent and competent service
  5. Advance and protect the profession
45
Q

Retention policy deals with?

A

How long to backup
Where to Keep the backup
What do we Keep

46
Q

What is the self Directed Rick Evaluation methodology

A

OCTAVE

47
Q

Which attack would you be seeing if you saw a SYN packet with the source and the destination as the same address?

A

LAND attack (Local Area Network Denial attack )

48
Q

three authentication responses a RADIUS server returns

A

access-accept,
access-reject,
access-challenge