Security Governance and Operational Agreements
54 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What characterizes transient cookies?

  • Available after the session has ended.
  • Sent to multiple domains if allowed.
  • Stored on the machine’s hard disk drive.
  • Stored in memory and discarded during session teardown. (correct)
  • What is a key feature of secure cookies?

  • They can be transmitted in clear text.
  • They are shared across different domains.
  • They expire immediately after session teardown.
  • They must be supported by the web browser to be effective. (correct)
  • Which type of control is designed to identify and react to incidents that have already occurred?

  • Compensating control
  • Preventative control
  • Detective control (correct)
  • Corrective control
  • What results can arise from non-compliance with regulations?

    <p>Sanctions and fines</p> Signup and view all the answers

    What is an essential aspect of effective patch management?

    <p>Testing patches in a sandboxed environment prior to deployment.</p> Signup and view all the answers

    What is the primary purpose of governance in security management?

    <p>To provide strategy and direction</p> Signup and view all the answers

    Which best describes centralized patch management?

    <p>A server pushes patches to endpoint devices.</p> Signup and view all the answers

    What is the primary purpose of sandboxing?

    <p>To isolate a component from other operational components.</p> Signup and view all the answers

    Which document type outlines the step-by-step instructions for completing tasks within an organization?

    <p>Procedures</p> Signup and view all the answers

    Which component of security governance is mainly responsible for overseeing mission fulfillment in an organization?

    <p>Committee</p> Signup and view all the answers

    How does decentralized patch management function?

    <p>Clients pull patches from a vendor’s repository.</p> Signup and view all the answers

    Which of the following methods is NOT typically part of patch management?

    <p>Rolling out patches in a single phase.</p> Signup and view all the answers

    Which type of policy defines how an organization manages and protects its information assets?

    <p>Information Security Policy</p> Signup and view all the answers

    What is the focus of a Privacy Policy within an organization?

    <p>Expectations of privacy regarding employees</p> Signup and view all the answers

    What is the role of attestation services in patch management?

    <p>Provide a means to query running module hashes.</p> Signup and view all the answers

    Which type of control provides a backup mechanism to help mitigate risks in security management?

    <p>Compensating control</p> Signup and view all the answers

    What is one potential outcome of receiving punitive actions for non-compliance?

    <p>Damage to reputation</p> Signup and view all the answers

    Which type of control is specifically aimed at preventing security incidents from occurring in the first place?

    <p>Preventative control</p> Signup and view all the answers

    What is the primary objective of the Change Management procedures?

    <p>To manage changes without increasing risk</p> Signup and view all the answers

    Which agreement establishes a comprehensive legal relationship between a service provider and a customer/client?

    <p>Master Service Agreement (MSA)</p> Signup and view all the answers

    What is the role of the Data Privacy Officer (DPO) under GDPR?

    <p>To protect data subject information in compliance with GDPR</p> Signup and view all the answers

    Which is NOT a data protection method mentioned in the content?

    <p>Data Backup</p> Signup and view all the answers

    What type of data does the term 'regulated data' refer to?

    <p>Data that is required to be protected by government or industry regulation</p> Signup and view all the answers

    Which document method emphasizes actions to be performed within a project?

    <p>Work Order (WO)</p> Signup and view all the answers

    What characterizes a Memorandum of Understanding (MOU)?

    <p>An informal understanding that lacks legal weight</p> Signup and view all the answers

    Which of the following is NOT a method for risk identification?

    <p>Social media monitoring</p> Signup and view all the answers

    Which classification label corresponds to 'Medium' criticalness?

    <p>Sensitive</p> Signup and view all the answers

    What is the typical outcome of the usage phase in the information life-cycle model?

    <p>Information in an unencrypted state</p> Signup and view all the answers

    What is the primary purpose of offboarding procedures?

    <p>Recouping allocated resources during employment termination</p> Signup and view all the answers

    In the Change Management approval process, what is established during change approval?

    <p>Version control and testing of the change</p> Signup and view all the answers

    Which of the following is NOT a type of operational agreement mentioned?

    <p>Operational Plan (OP)</p> Signup and view all the answers

    What is the main purpose of risk management?

    <p>To enhance strategic, long-term success by managing risks</p> Signup and view all the answers

    Which of these roles is NOT involved as per the data policy components?

    <p>Data facilitator</p> Signup and view all the answers

    What is a risk register primarily used for?

    <p>Identifying, tracking, and assigning risks within an organization</p> Signup and view all the answers

    How is the likelihood in a risk matrix primarily assessed?

    <p>Based on statistics and historical threat data</p> Signup and view all the answers

    What type of risk assessment occurs on a regular schedule due to contractual or regulatory requirements?

    <p>Recurring risk assessment</p> Signup and view all the answers

    Which of the following describes the qualitative risk analysis?

    <p>It is based on human opinion or judgment.</p> Signup and view all the answers

    What is a disadvantage of quantitative risk analysis?

    <p>It requires numerical values that may obscure certain risks.</p> Signup and view all the answers

    What formula represents Single Loss Expectancy (SLE)?

    <p>SLE = Asset Value * Exposure Factor</p> Signup and view all the answers

    When an incident causes a building worth $1,000,000 to suffer a 70% loss, what is the Single Loss Expectancy (SLE)?

    <p>$700,000</p> Signup and view all the answers

    What is a key risk indicator?

    <p>A signal that an emerging risk trend may affect the organization</p> Signup and view all the answers

    Which risk management approach aims to minimize loss as much as possible?

    <p>Conservative</p> Signup and view all the answers

    What does the term 'risk tolerance' refer to?

    <p>The maximum loss a company can accept without action</p> Signup and view all the answers

    What happens to risks that fall below the risk threshold?

    <p>They are ignored altogether.</p> Signup and view all the answers

    Which protocol is primarily used for key generation and distribution in WLAN?

    <p>802.1X</p> Signup and view all the answers

    What is the frequency range used by the 802.11b protocol?

    <p>2.4 GHz</p> Signup and view all the answers

    Which encryption protocol is used by WPA2 for message confidentiality?

    <p>AES-128</p> Signup and view all the answers

    What is the maximum bandwidth of the 802.11ac protocol?

    <p>3.5 Gbps</p> Signup and view all the answers

    Which feature is specific to WPA3 compared to WPA2?

    <p>192-bit AES key size</p> Signup and view all the answers

    What modulation technique is used in 802.11n?

    <p>OFDM</p> Signup and view all the answers

    When does the data transference phase occur in WLAN?

    <p>After key generation and distribution</p> Signup and view all the answers

    Which authentication method is part of WPA2's mutual authentication process?

    <p>EAP-TLS</p> Signup and view all the answers

    What is a characteristic of the Bluetooth Host Controller Interface (HCI)?

    <p>It enables wireless communication</p> Signup and view all the answers

    Which of the following protocols is NOT part of WPA3's mutual authentication?

    <p>PSK</p> Signup and view all the answers

    Study Notes

    ### Security Governance

    • Organizational policies focus on information security, privacy, acceptable usage, employment, and change management.
    • Regulatory compliance is verified through internal and external audits.
    • Non-compliance can lead to significant consequences, including sanctions, fines, and reputational damage.
    • Governance structure includes management (board and committees) and government agencies.
    • Security hierarchy of documents includes policies, standards, procedures, and guidelines.
    • Organizational policies include:
      • Information Security policy: defines how an organization manages and protects information.
      • Privacy policy: defines employee privacy expectations.
      • Acceptable Use Policy (AUP): defines acceptable use of company resources.
      • Employment policy: covers employee-employer lifecycle.
      • Change Management policy: defines change management approach, roles, and responsibilities.

    Operational Agreements

    • Operational agreements include Master Service Agreements (MSA), Service-Level Agreements (SLA), Statement of Work (SoW) / Work Order (WO), Business Partnership Agreement (BPA), Non-Disclosure Agreement (NDA), Memorandum of Agreement (MOA), and Memorandum of Understanding (MOU).

    Data Policy

    • Data policy components include roles and responsibilities, like data owner, data custodian/steward, data controller, and data processor.
    • The General Data Protection Regulation (GDPR) defines data subject, Data Privacy Officer (DPO), and their responsibilities.
    • The information lifecycle model encompasses creation, processing, dissemination, usage, storage, and disposal of data.

    Asset Management

    • Asset management involves maintaining positive control throughout the asset's lifetime.
    • Steps include:
      • Acquisition and procurement
      • Assignment and accountability
      • Asset monitoring and tracking
      • Decommissioning and disposal

    Risk Management

    • Risk management involves identifying, monitoring, and reducing risk to an acceptable level.
    • Management establishes risk appetite, which can be expansionary, neutral, or conservative.
    • Risk tolerance defines the acceptable variance in business objective performance.
    • Risk Identification methods include process analysis, interviews, asset tracking, cognitive computing, and workshops.
    • Risk assessment can be one-time, ad hoc, recurring, or continuous.
    • Qualitative risk analysis relies on human judgment and opinions, offering insights into the impact beyond financial implications.
    • Quantitative risk analysis utilizes numerical values for impact and likelihood, supporting cost-benefit analysis.
    • Single Loss Expectancy (SLE) and Annualized Loss Expectancy (ALE) are used to quantify financial risk.

    Secure Cookies

    • Secure cookies are configured to prevent them being sent to a domain other than the originator.
    • Server configuration settings ensure cookies aren't sent in clear text.
    • Success depends on browser support.

    Patch Management

    • Patch management involves updating the security baseline of firmware, applications, or operating systems to address vulnerabilities and introduce new features.
    • Patches can be deployed through centralized or decentralized management systems.
    • Effective patch management requires careful monitoring and tracking of deployed patches.

    Sandboxing

    • Sandboxing creates a controlled environment to isolate components from other operational components.
    • Sandboxing restricts access to system resources like memory and storage locations.
    • Sandboxing techniques include firewall ACLs, hypervisors, memory managers, and physical isolation.

    Bluetooth Technology

    • Laptops and controllers communicate over an ad hoc network via the Bluetooth Host Controller Interface (HCI)
    • The latest versions of Bluetooth use AES-CCM for frame confidentiality and authenticity
    • Bluetooth Secure Authentication uses HMAC-SHA256 with mutual authentication

    Wireless Local Area Network (WLAN)

    • IEEE 802.11 WLAN protocols deliver data, management, and control frames
    • WLAN phases include discovery, authentication, key generation/distribution, data transference, and termination
    • Discovery uses management frames like beacon and association frames
    • Authentication uses protocols like 802.1X and EAP
    • Data-in-transit protection protocols are used during data transference

    Wireless Site Survey

    • Wi-Fi analyzer, monitor mode, and signal quality assessments are used during this phase
    • RFI heat maps are used for assessing radio frequency interference

    Wireless Network Protocols and Frequencies

    • 802.11a: 5 GHz, 54 Mbps, OFDM modulation
    • 802.11b: 2.4 GHz, 11 Mbps, DSSS modulation
    • 802.11g: 2.4 GHz, 54 Mbps, OFDM/DSSS modulation
    • 802.11n: 2.4 GHz & 5 GHz, 600 Mbps, OFDM/DSSS modulation
    • 802.11ac: 5 GHz, 3.5 Gbps, QAM/OFDM/DSSS modulation
    • 802.11ax: 2.4 GHz & 5 GHz, 9.6 Gbps, QAM/OFDM/DSSS modulation

    Wi-Fi Protected Access (WPA)

    • WPA2 is NIST FIPS 140-2 compliant and uses CCMP with AES encryption
    • CCMP uses CBC-MAC for packet authenticity and AES-128 for message confidentiality
    • WPA2 supports mutual authentication through EAP protocols such as EAP-TLS, PEAP, EAP-TTLS, and EAP-FAST
    • WPA3 requires Wi-Fi certification and authenticates AP and client before association
    • WPA3 uses IEEE 802.11w Management Frame Protection (MFP)
    • CCMP provides data origin authentication and replay protection
    • WPA3 uses SAE in personal mode and 128-bit AES key size
    • WPA3 enterprise mode uses 192-bit AES key size and supports EAP-TLS, PEAP, and EAP-TTLS

    Network Switch Monitoring

    • In order to monitor all network traffic passing through a switch, a configuration must be made to the switch to enable mirroring.
    • Mirroring allows the switch to send a copy of all network traffic to a monitoring device for analysis.
    • This can be used for security, troubleshooting, and performance monitoring.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers key concepts in security governance, including organizational policies on information security, privacy, and change management. Additionally, it highlights the importance of regulatory compliance and the hierarchical structure of security documentation. Test your knowledge on how governance impacts organizational practices and operational agreements.

    Use Quizgecko on...
    Browser
    Browser