Test Study 5 Flashcards
Detail the responsibilities of the following positions:
CEO CIO CSO CISO CPO
CEO - responsible for overall organization and its mission
CIO - responsible for aligning information and technology strategies
CSO - responsible for physical and technical security of assets
CISO - responsible for monitoring and analyzing risk information associated with data protection
CPO - largely responsible for ensuring that there is compliance with organization and regulatory privacy rules
Who is responsible for overall organization and its mission?
CEO
Who is responsible for aligning information and technology strategies?
CIO
Who is responsible for physical and technical security of assets?
CSO
Who is responsible for monitoring and analyzing risk information associated with data protection?
CISO
Who is responsible for ensuring that there is compliance with organization and regulatory privacy rules?
CPO
What is the GISRA?
Government Information Security Reform Act
Requires federal agencies to perform risk assessments, enact policies, and combines several other previous laws.
What act is related to risk assessment and combines several previous laws?
GISRA
What is FISMA?
Federal Information Security Modernization Act
Handles risk management by the federal government.
Which act deals with risk management in the federal government?
FISMA
What type of control are backups?
Recovery
RAID is fault tolerance, not recovery, which is compensating.
What stage of the risk management framework do you ensure that controls are implemented properly?
Assess
What stage of the risk management framework do you declare the acceptance of risks?
Authorize
What stage of the risk management framework do you perform ongoing assessment of control effectiveness?
Monitor
What is FIPS-198 and what does it provide?
A US Government standard for keyed-HMAC and authentication
What is a US governement protocol standard for authentication?
FIPS-198
At what ring are the drivers present in a computing system?
Ring 0
What are the wifi speeds and ranges?
- 4 - 46m
- 0 - 23m
- 11a = 54
- 11b = 11
- 11g = 54
- 11n = 600
- 11ac = 3466
What protocol and port can be used to load remote operating system?
TFTP, 69
What can TFTP be used for?
Loading a remote operating system.
What are some authentication methods that can be used over non-ethernet networks?
PAP, CHAP, MSCHAP
Which authentication method should be used over non-ethernet networks?
CHAP
What is PAP?
Password Authentication Protocol
Operates in clear text, should not be used, was often used in dial up.
What is CHAP?
Challenge handshake authentication protocol
Uses an encrypted challenge and a three way handshake
What is MS-CHAP?
Microsoft CHAP
Has vulnerabilities because it uses DES
What non-ethernet authentication method operates in clear text?
PAP