Review Questions 1 SYS701
18 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Matt is updating the organization's threat assessment process. What category of control is Matt implementing?

  • Operational
  • Corrective
  • Technical
  • Managerial (correct)

Jade's organization recently suffered a security breach affecting stored credit card data and is now subject to sanctions for violating the Payment Card Industry Data Security Standard (PCI DSS). What category of risk is concerning Jade?

  • Financial
  • Operational
  • Strategic
  • Compliance (correct)

Chris is responding to a security incident that compromised one of his organization's web servers. He believes that the attackers defaced one or more pages on the website. What cybersecurity objective did this attack violate?

  • Integrity (correct)
  • Availability
  • Confidentiality
  • Nonrepudiation

Tonya is concerned about the risk that an attacker will attempt to gain access to her organization's database server. She is searching for a control that would discourage the attacker from attempting to gain access. What type of security control is she seeking to implement?

<p>Deterrent (B)</p> Signup and view all the answers

Greg is implementing a Data Loss Prevention (DLP) system and wants to protect against sensitive information transmitted by guests on the wireless network. Which DLP technology would best meet this goal?

<p>Network-based (D)</p> Signup and view all the answers

What term best describes data that is being sent between two systems over a network connection?

<p>Data in transit (C)</p> Signup and view all the answers

Tina is tuning her organization's Intrusion Prevention System (IPS) to prevent false positive alerts. What type of control is Tina implementing?

<p>Technical control (C)</p> Signup and view all the answers

Tony is reviewing the status of his organization's defenses against a breach of their file server. He believes that a compromise of the file server could reveal information that would prevent the company from continuing to do business. What term best describes the risk that Tony is considering?

<p>Strategic (B)</p> Signup and view all the answers

Which data element is LEAST likely to be directly associated with identity theft?

<p>Frequent flyer number (B)</p> Signup and view all the answers

Which term best describes an organization's desired security posture?

<p>Control objectives (C)</p> Signup and view all the answers

A 'Beware of Dogs' sign is placed on a datacenter fence. What control type does this exemplify?

<p>Deterrent (A)</p> Signup and view all the answers

Which technology uses mathematical algorithms to render information unreadable without the correct key?

<p>Data encryption (B)</p> Signup and view all the answers

An organization doesn't use full-disk encryption on laptops, resulting in what type of control gap?

<p>Preventive (B)</p> Signup and view all the answers

Which compliance regulation most directly affects the operations of a health-care provider?

<p>HIPAA (D)</p> Signup and view all the answers

Nolan is writing an after action report on a security breach that took place in his organization. The attackers stole thousands of customer records from the organization's database. What cybersecurity principle was most impacted in this breach?

<p>Confidentiality (A)</p> Signup and view all the answers

Which one of the following objectives is not one of the three main objectives that information security professionals must achieve to protect their organizations against cybersecurity threats?

<p>Nonrepudiation (B)</p> Signup and view all the answers

Which one of the following data protection techniques is reversible when conducted properly?

<p>Tokenization (A)</p> Signup and view all the answers

Which one of the following statements is not true about compensating controls under PCI DSS?

<p>Controls used to fulfill one PCI DSS requirement may be used to compensate for the absence of a control needed to meet another requirement. (A)</p> Signup and view all the answers

Flashcards

Operational control

A category of controls focusing on improving business processes and managing risks effectively.

Compliance risk

Risk associated with failing to conform to laws and regulations, such as PCI-DSS.

Integrity in cybersecurity

A cybersecurity objective ensuring that data remains accurate and unaltered during its lifecycle.

Data masking

A technique to protect sensitive information by obfuscating certain fields in a dataset.

Signup and view all the flashcards

Deterrent security control

Controls intended to discourage security breaches or unauthorized access.

Signup and view all the flashcards

Network-based DLP

Data Loss Prevention technology that monitors and protects data in transit over a network.

Signup and view all the flashcards

Data in transit

Data actively being transferred between systems over a network connection.

Signup and view all the flashcards

Technical control

Control measures that involve technology and software to enhance security, such as tuning an IPS.

Signup and view all the flashcards

Strategic Risk

Risk that a compromise could damage business continuity.

Signup and view all the flashcards

Identity Theft Element

Data element less commonly linked to identity theft.

Signup and view all the flashcards

Desired Security State

The preferred security condition for an organization.

Signup and view all the flashcards

Deterrent Control

Control type that discourages undesirable actions.

Signup and view all the flashcards

Data Encryption

Technology that makes information unreadable without a key.

Signup and view all the flashcards

Control Gap

Absence of necessary security measures, like full-disk encryption.

Signup and view all the flashcards

HIPAA Compliance

Regulation directly impacting healthcare provider operations.

Signup and view all the flashcards

Confidentiality Principle

Cybersecurity principle most impacted by data theft.

Signup and view all the flashcards

Study Notes

Threat Assessment Process

  • Matt's actions regarding the threat assessment process fall under operational controls.

Security Breach and Risk

  • Jade's concern regarding a security breach pertains to compliance risks, specifically violating the Payment Card Industry Data Security Standard (PCI DSS).

Security Incident Response

  • Chris's incident response regarding a compromised web server involves a violation of data integrity (i.e., defacement).

Data Minimization Techniques

  • The provided table most likely used data masking as a minimization technique. Note the presence of the sensitive credit card numbers.

Security Control Types

  • Tonya's search for a control to discourage attackers falls under deterrent controls.

Data Loss Prevention (DLP)

  • Network-based DLP technology is best suited to protect against sensitive guest transmissions on a wireless network.

Data in Transit

  • Data sent between systems over a network connection is considered data in transit.

Intrusion Prevention System (IPS) Tuning

  • Tina's tuning of the IPS to prevent false positive alerts relates to operational controls.

Cybersecurity Attacker Goals

  • Allocation is not a common goal of a cybersecurity attacker.

File Server Breach Risk

  • Tony's concern about a compromised file server is a strategic risk, representing a possible halt to business operations.

Identity Theft Data Elements

  • A frequent flyer number is not commonly associated with identity theft.

Desired Security State

  • The desired security state of an organization is best described as control objectives.

Data Center Security Control

  • The "Beware of Dogs" sign on the datacenter fence is a physical deterrent control.

Data Obfuscation

  • Data encryption involves mathematical algorithms to render information unreadable without the appropriate key.

Control Gap

  • The lack of full-disk encryption on laptops is a preventive control gap.

Healthcare Compliance

  • HIPAA compliance is directly relevant to healthcare providers.

Security Breach Impact

  • A security breach stealing customer records primarily impacts the confidentiality principle.

Information Security Objectives

  • Nonrepudiation is one of the three main objectives.

Reversible Data Protection

  • Masking is a reversible data protection technique.

Compensating Controls Under PCI DSS

  • Compensating controls must meet the intent, not the rigor, of the original requirement. Compensating controls must provide a similar level of defense.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Quiz on security concepts, including threat assessment process, data loss prevention (DLP) techniques, and data security. Covers topics such as operational controls, compliance risks, and incident response related to security breaches.

More Like This

Data Loss Prevention Overview
40 questions
Data Loss Prevention and Management
5 questions
Use Quizgecko on...
Browser
Browser