Test Questions Flashcards

1
Q

Which phase of the 6 phase IR model must be followed to determine whether a security incident has occured?

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

!st activity for determining the adequacy of the IRP?

A

Checklist Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Process to undertake if it is determined that the time to communicate an incident and the response time for acting on the incident is too long

A

GAP analysis - investigates the diff between current IR capabilities and desired incident response capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protects a org after a internal breach of proprietary data

A

NDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Info security govern is derived in part from corp governance

A

True. Info Sec Governance is a subset of corp governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does info sec governance provide

A

Strategic directions and supports the orgs business goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Before risk can be prioritized, what must be done?

A

Perform a BIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which risk assessment model organizes risk into a binary tree

A

FAIR (Factor Analysis on Info Risk. uses binary tree as logical framework for evaluating risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is risk evaluted in the FAIR assessment model?

A

2 areas- Loss event frequency and probable loss magnitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ISO 27005

A

Framework for assessing risk- Uses elements of Cobit 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Probalislistic Risk Assessment model (PRA)

A

A systematic methodology that analyzes risk according to three basic questions - 1. What can go wrong 2. How likely is it? 3 What are the consequences?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What members of the IRT are responsible for ensuring criminal attackers are prosecued?

A

Legal, Steering group, Info sec manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a info sec manager responsible for?

A

developing and mantaining IR capabilities, managing risk and incidents and performing proactive and reactive measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a steering group responsible for?

A

Incident management and response concept, approving charter, approving exceptions/ deviations, and final decisionss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does incident response manager do?

A

Supervise tasks related to response, coordinates resources to complete tasks, take responsibility of the incident response plan execution and presents incident response report and lessons learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does IT security specialist do?

A

performs complex IR tasks and IT security assessment/ audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What should be done after determining threat level has cahnged

A

Begin Change Mangement Process- document all details, approve, implement, and test

18
Q

How to establish a process to protect an orgs assets

A

1 Bsuiness Impact Analysis 2. Return on Scurity Investment 3. Perform a risk analysis

19
Q

What is a ROSI

A

Return on security investment. Determine how much saved by the investment in mitigation methods

20
Q

What is a risk analysis

A

Estimates the liklihood of a loss

21
Q

Most important factor to ensure an IRP will handle security incidents successfully and effectively?

A

Test all aspects of the plan

22
Q

Valid method for assessing employees cysec training and awareness?

A

Phishing tests

23
Q

What is the 1st ste in the process of developing an info sec program?

A

Determine desired outcome for security

24
Q

Example of KPI for determining the performance of the info sec controls and policies

A

The number of incidents resolved per year within 2 minutes of occurrence

25
Q

WHat concept describes determining the disparity between exisitng controls in a systm and the control objectives

A

Performing a gap analysis

26
Q

What is Zachman framework

A

2 dimensional framework that enables analysis of org to be communicated in ways that are appropriate for each group. Analysis of the org can be presented to differnet groups in diff ways according to responsiblities

27
Q

What is SABSA

A

Sherwood APplied Buss Security Architecture- An enterpise security architecture framework that is risk driven

28
Q

What is TOGAF

A

The Open Group Arhitecture Framework - Framework that iteratively monitors and updates individual requirements

29
Q

What is NIST 800-53

A

It is a control framework

30
Q

How should an Org ensure legal, regulatory, and org requirements are followed during or after a sec incident

A

Incorporate the legal framework into the IRP

31
Q

What is the ultimate purpose of various metrics in the info sec program?

A

Decision making support

32
Q

Role responsible to developing the sec monitoring process and metrics to determine effectiveness of info sec process in protecting an org info assets

A

Info Sec manager

33
Q

WHat is CIO responsible for?

A

IT Planning, budgeting, and performance

34
Q

What are individual buss owners responsible for?

A

Assigning proper security controls

35
Q

Who should be contacted to escalate a response?

A

Whoever is listed in the incident response plan

36
Q

What is the most important reason for establishing and maintaing info sec policies?

A

Support the business goals of the org

37
Q

What entity is responsible for overseeing all security projects to ensure they align with the info sec strategy?

A

Steering committee

38
Q

What is the best desciption of security controls?

A

Security controls include any means of managing risk

39
Q

Who is responsible for contacting law enforcement?

A

Senior Management

40
Q

Which group is responsible for helping to achieve consensus on priorities and trade-offs with regards to security considerations

A

Steering committee