Test Questions Flashcards

1
Q

ISO 31000

A

International risk management best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GDPR

A

The European Union’s regulation that states that personal data cannot be collected or processed without the individual’s informed consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PCI DSS

A

Outlines how credit card/bank info must be safely managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SSAE SOC2

A

An audit/test that reports on an organization’s controls relative to the CIA triad..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PCI DSS

A

PCI DSS = Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIST CSF

A

NIST CSF = National Institute of Standards and Technology, Cyber Security Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISO 22301

A

ISO 22301 – security & resilience, business continuity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ISO 27001

A

ISO 27001 – information security rules and requirements (compliance/regulations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ISO 27001 ***

A

ISO 27001Information Security Management Systems

Infosec rules and requirements used by many governing bodies to create compliance/regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISO 27701***

A

ISO 27701 Privacy Information Management

An extension to 27001 that outlines rules and regulations specifically tied to privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISO 27002***

A

ISO 27002 Information Security Best Practices

Guidelines and suggestions for how to start or improve infosec at an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO 31000***

A

ISO 31000 Risk Management Best Practices

Generic (non specific) suggestions for managing risk response within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES

A

• Advanced Encryption Standard (AES/AES256)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Compensation

A

= • Substitutes for a principal control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Vulnerability Scoring System (CVSS)

A

provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CVE

A

is a list of entries—each containing an identification number, a description, and at least one public reference—for publicly known cybersecurity vulnerabilities.

17
Q

SIEM (Security information and event management)

A

is a service/software that gathers network and application logs in real-time and analyzes them, giving security experts the ability to better monitor and analyze attacks/threats.

18
Q

SOAR (Security Orchestration, Automation, and Response)

A

Sometimes running alongside the SIEM or built into it, SOAR (Security Orchestration, Automation, and Response) was designed to automate and improve response time when a SIEM detects a threat/anomaly on the network. Sometimes referred to as a Next Generation SIEM.

19
Q

SSH

A

Secure Shell (SSH) is a widely used remote access protocol. It is very likely to be used to
manage devices and services. SSH uses two types of key pairs:
• A host key pair identifies an SSH server. The server reveals the public part when a
client connects to it. The client must use some means of determining the validity of
this public key. If accepted, the key pair is used to encrypt the network connection
and start a session.
• A user key pair is a means for a client to login to an SSH server. The server stores a
copy of the client’s public key. The client uses the linked private key to generate an
authentication request and sends the request (not the private key) to the server.
The server can only validate this request if the correct public key is held for that
client.