(ISC)2 Certified in Cybersecurity - Exam Prep With Complete Solutions
(ISC)2 Certified in Cybersecurity - Exam Prep With Complete Solutions Document specific requirements that a customer has about any aspect of a vendor's service performance. A) DLR B) Contract C) SLR D) NDA - answerC) SLR (Service-Level Requirements) _________ identifies and triages risks. - answerRisk Assessment _________ are external forces that jeopardize security. - answerThreats _________ are methods used by attackers. - answerThreat Vectors _________ are the combination of a threat and a vulnerability. - answerRisks We rank risks by _________ and _________. - answerLikelihood and impact _________ use subjective ratings to evaluate risk likelihood and impact. - answerQualitative Risk Assessment _________ use objective numeric ratings to evaluate risk likelihood and impact. - answerQuantitative Risk Assessment _________ analyzes and implements possible responses to control risk. - answerRisk Treatment _________ changes business practices to make a risk irrelevant. - answerRisk Avoidance _________ reduces the likelihood or impact of a risk. - answerRisk Mitigation An organization's _________ is the set of risks that it faces. - answerRisk Profile _________ Initial Risk of an organization. - answerInherent Risk _________ Risk that remains in an organization after controls. - answerResidual Risk _________ is the level of risk an organization is willing to accept. - answerRisk Tolerance _________ reduce the likelihood or impact of a risk and help identify issues. - answerSecurity Controls _________ stop a security issue from occurring. - answerPreventive Control _________ identify security issues requiring investigation. - answerDetective Control _________ remediate security issues that have occurred. - answerRecovery Control Hardening == Preventative - answerVirus == Detective Backups == Recovery - answerFor exam (Local and Technical Controls are the same) _________ use technology to achieve control objectives. - answerTechnical Controls _________ use processes to achieve control objectives. - answerAdministrative Controls _________ impact the physical world. - answerPhysical Controls _________ tracks specific device settings. - answerConfiguration Management _________ provide a configuration snapshot. - answerBaselines (track changes) _________ assigns numbers to each version. - answerVersioning _________ serve as important configuration artifacts. - answerDiagrams _________ and _________ help ensure a stable operating environment. - answerChange and Configuration Management Purchasing an insurance policy is an example of which risk management strategy? - answerRisk Transference What two factors are used to evaluate a risk? - answerLikelihood and Impact What term best describes making a snapshot of a system or application at a point in time for later comparison? - answerBaselining What type of security control is designed to stop a security issue from occurring in the first place? - answerPreventive What term describes risks that originate inside the organization? - answerInternal What four items belong to the security policy framework? - answerPolicies, Standards, Guidelines, Procedures _________ describe an organization's security expectations. - answerPolicies (mandatory and approved at the highest level of an organization) _________ describe specific security controls and are often derived from policies. - answerStandards (mandatory) _________ describe best practices. - answerGuidelines (recommendations/advice and compliance is not mandatory) _________ step-by-step instructions. - answerProcedures (not mandatory) _________ describe authorized uses of technology. - answerAcceptable Use Policies (AUP) _________ describe how to protect sensitive information. - answerData Handling Policies _________ cover password security practices. - answerPassword Policies _________ cover use of personal devices with company information. - answerBring Your Own Device (BYOD) Policies _________ cover the use of personally identifiable information. - answerPrivacy Policies _________ cover the documentation, approval, and rollback of technology changes. - answerChange Management Policies Which element of the security policy framework includes suggestions that are not mandatory? - answerGuidelines What law applies to the use of personal information belonging to European Union residents? - answerGDPR What type of security policy normally describes how users may access business information with their own devices? - answerBYOD Policy _________ the set of controls designed to keep a business running in the face of adversity, whether natural or man-made. - answerBusiness Continuity Planning (BCP) BCP is also known as _________. - answerContinuity of Operations Planning (COOP) Defining the BCP Scope: - answerWhat business activities will the plan cover? What systems will it cover? What controls will it consider? _________ identifies and prioritizes risks. - answerBusiness Impact Assessment BCP in the cloud requires _________ between providers and customers. - answerCollaboration _________ protects against the failure of a single component. - answerRedundancy _________ identifies and removes SPOFs. - answerSingle Point of Failure Analysis _________ continues until the cost of addressing risks outweighs the benefit. - answerSPOF Analysis _________ uses multiple systems to protect against service failure. - answerHigh Availability _________ makes a single system resilient against technical failures. - answerFault Tolerance _________ spreads demand across systems. - answerLoad Balancing 3 Common Points of Failure in a system. - answerPower Supply, Storage Media, Networking Disk Mirroring is which RAID level? - answer1 Disk striping with parity is which RAID level? - answer5 (uses 3 or more disks to store data) What goal of security is enhanced by a strong business continuity program? - answerAvailability What is the minimum number of disk required to perform RAID level 5? - answer3 What type of control are we using if we supplement a single firewall with a second standby firewall ready to assume responsibility if the primary firewall fails? - answerHigh Availability _________ provide structure during cybersecurity incidents. - answerIncident Response Plan _________ describe the policies and procedures governing cybersecurity incidents. - answerIncident Response Plans _________ leads to strong incident response. - answerPrior Planning Incident Response Plans should include: - answerStatement of Purpose, Strategies and goals for incident response, Approach to incident response, Communication with other groups, Senior leadership approval _________ should be consulted when developing a plan. - answerNIST SP 800-61 Incident response teams must have personnel available _________. - answer24/7 _________ is crucial to effective incident identification. - answerMonitoring
Written for
- Institution
- 2 Certified in Cybersecurity
- Course
- 2 Certified in Cybersecurity
Document information
- Uploaded on
- April 10, 2024
- Number of pages
- 81
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
isc2 certified in cybersecurity exam prep with