100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

(ISC)2 Certified in Cybersecurity - Exam Prep With Complete Solutions

Rating
-
Sold
-
Pages
81
Grade
A+
Uploaded on
04-03-2024
Written in
2023/2024

(ISC)2 Certified in Cybersecurity - Exam Prep With Complete Solutions Document specific requirements that a customer has about any aspect of a vendor's service performance. A) DLR B) Contract C) SLR D) NDA - answerC) SLR (Service-Level Requirements) _________ identifies and triages risks. - answerRisk Assessment _________ are external forces that jeopardize security. - answerThreats _________ are methods used by attackers. - answerThreat Vectors _________ are the combination of a threat and a vulnerability. - answerRisks We rank risks by _________ and _________. - answerLikelihood and impact _________ use subjective ratings to evaluate risk likelihood and impact. - answerQualitative Risk Assessment _________ use objective numeric ratings to evaluate risk likelihood and impact. - answerQuantitative Risk Assessment _________ analyzes and implements possible responses to control risk. - answerRisk Treatment _________ changes business practices to make a risk irrelevant. - answerRisk Avoidance _________ reduces the likelihood or impact of a risk. - answerRisk Mitigation An organization's _________ is the set of risks that it faces. - answerRisk Profile _________ Initial Risk of an organization. - answerInherent Risk _________ Risk that remains in an organization after controls. - answerResidual Risk _________ is the level of risk an organization is willing to accept. - answerRisk Tolerance _________ reduce the likelihood or impact of a risk and help identify issues. - answerSecurity Controls _________ stop a security issue from occurring. - answerPreventive Control _________ identify security issues requiring investigation. - answerDetective Control _________ remediate security issues that have occurred. - answerRecovery Control Hardening == Preventative - answerVirus == Detective Backups == Recovery - answerFor exam (Local and Technical Controls are the same) _________ use technology to achieve control objectives. - answerTechnical Controls _________ use processes to achieve control objectives. - answerAdministrative Controls _________ impact the physical world. - answerPhysical Controls _________ tracks specific device settings. - answerConfiguration Management _________ provide a configuration snapshot. - answerBaselines (track changes) _________ assigns numbers to each version. - answerVersioning _________ serve as important configuration artifacts. - answerDiagrams _________ and _________ help ensure a stable operating environment. - answerChange and Configuration Management Purchasing an insurance policy is an example of which risk management strategy? - answerRisk Transference What two factors are used to evaluate a risk? - answerLikelihood and Impact What term best describes making a snapshot of a system or application at a point in time for later comparison? - answerBaselining What type of security control is designed to stop a security issue from occurring in the first place? - answerPreventive What term describes risks that originate inside the organization? - answerInternal What four items belong to the security policy framework? - answerPolicies, Standards, Guidelines, Procedures _________ describe an organization's security expectations. - answerPolicies (mandatory and approved at the highest level of an organization) _________ describe specific security controls and are often derived from policies. - answerStandards (mandatory) _________ describe best practices. - answerGuidelines (recommendations/advice and compliance is not mandatory) _________ step-by-step instructions. - answerProcedures (not mandatory) _________ describe authorized uses of technology. - answerAcceptable Use Policies (AUP) _________ describe how to protect sensitive information. - answerData Handling Policies _________ cover password security practices. - answerPassword Policies _________ cover use of personal devices with company information. - answerBring Your Own Device (BYOD) Policies _________ cover the use of personally identifiable information. - answerPrivacy Policies _________ cover the documentation, approval, and rollback of technology changes. - answerChange Management Policies Which element of the security policy framework includes suggestions that are not mandatory? - answerGuidelines What law applies to the use of personal information belonging to European Union residents? - answerGDPR What type of security policy normally describes how users may access business information with their own devices? - answerBYOD Policy _________ the set of controls designed to keep a business running in the face of adversity, whether natural or man-made. - answerBusiness Continuity Planning (BCP) BCP is also known as _________. - answerContinuity of Operations Planning (COOP) Defining the BCP Scope: - answerWhat business activities will the plan cover? What systems will it cover? What controls will it consider? _________ identifies and prioritizes risks. - answerBusiness Impact Assessment BCP in the cloud requires _________ between providers and customers. - answerCollaboration _________ protects against the failure of a single component. - answerRedundancy _________ identifies and removes SPOFs. - answerSingle Point of Failure Analysis _________ continues until the cost of addressing risks outweighs the benefit. - answerSPOF Analysis _________ uses multiple systems to protect against service failure. - answerHigh Availability _________ makes a single system resilient against technical failures. - answerFault Tolerance _________ spreads demand across systems. - answerLoad Balancing 3 Common Points of Failure in a system. - answerPower Supply, Storage Media, Networking Disk Mirroring is which RAID level? - answer1 Disk striping with parity is which RAID level? - answer5 (uses 3 or more disks to store data) What goal of security is enhanced by a strong business continuity program? - answerAvailability What is the minimum number of disk required to perform RAID level 5? - answer3 What type of control are we using if we supplement a single firewall with a second standby firewall ready to assume responsibility if the primary firewall fails? - answerHigh Availability _________ provide structure during cybersecurity incidents. - answerIncident Response Plan _________ describe the policies and procedures governing cybersecurity incidents. - answerIncident Response Plans _________ leads to strong incident response. - answerPrior Planning Incident Response Plans should include: - answerStatement of Purpose, Strategies and goals for incident response, Approach to incident response, Communication with other groups, Senior leadership approval _________ should be consulted when developing a plan. - answerNIST SP 800-61 Incident response teams must have personnel available _________. - answer24/7 _________ is crucial to effective incident identification. - answerMonitoring _________ security solution that collects information from diverse sources, analyzes it for signs for security incidents and retains it for later use. - answerSecurity Incident and Event Management (SIEM) The highest priority of a first responder must be containing damage through _________. - answerIsolation During an incident response, what is the highest priority of first responders? - answerContaining the damage You are normally required to report security incidents to law enforcement if you believe a law may have been violated. True or False - answerFalse _________ restores normal operations as quickly as possible. - answerDisaster Recovery What are the initial response goals regarding Disaster Recovery? - answerContain

Show more Read less
Institution
2 Certified In Cybersecurity
Course
2 Certified in Cybersecurity











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
2 Certified in Cybersecurity
Course
2 Certified in Cybersecurity

Document information

Uploaded on
March 4, 2024
Number of pages
81
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TheStar Florida State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
616
Member since
2 year
Number of followers
179
Documents
24416
Last sold
11 hours ago
Stuvia Prodigy

Tested, Verified and Updated Study Materials with 100% Guaranteed Success.

3.8

122 reviews

5
58
4
22
3
21
2
4
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions