100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

(ISC)2 Certified in Cybersecurity - Exam Prep With Complete Solutions

Beoordeling
-
Verkocht
-
Pagina's
81
Cijfer
A+
Geüpload op
04-03-2024
Geschreven in
2023/2024

(ISC)2 Certified in Cybersecurity - Exam Prep With Complete Solutions Document specific requirements that a customer has about any aspect of a vendor's service performance. A) DLR B) Contract C) SLR D) NDA - answerC) SLR (Service-Level Requirements) _________ identifies and triages risks. - answerRisk Assessment _________ are external forces that jeopardize security. - answerThreats _________ are methods used by attackers. - answerThreat Vectors _________ are the combination of a threat and a vulnerability. - answerRisks We rank risks by _________ and _________. - answerLikelihood and impact _________ use subjective ratings to evaluate risk likelihood and impact. - answerQualitative Risk Assessment _________ use objective numeric ratings to evaluate risk likelihood and impact. - answerQuantitative Risk Assessment _________ analyzes and implements possible responses to control risk. - answerRisk Treatment _________ changes business practices to make a risk irrelevant. - answerRisk Avoidance _________ reduces the likelihood or impact of a risk. - answerRisk Mitigation An organization's _________ is the set of risks that it faces. - answerRisk Profile _________ Initial Risk of an organization. - answerInherent Risk _________ Risk that remains in an organization after controls. - answerResidual Risk _________ is the level of risk an organization is willing to accept. - answerRisk Tolerance _________ reduce the likelihood or impact of a risk and help identify issues. - answerSecurity Controls _________ stop a security issue from occurring. - answerPreventive Control _________ identify security issues requiring investigation. - answerDetective Control _________ remediate security issues that have occurred. - answerRecovery Control Hardening == Preventative - answerVirus == Detective Backups == Recovery - answerFor exam (Local and Technical Controls are the same) _________ use technology to achieve control objectives. - answerTechnical Controls _________ use processes to achieve control objectives. - answerAdministrative Controls _________ impact the physical world. - answerPhysical Controls _________ tracks specific device settings. - answerConfiguration Management _________ provide a configuration snapshot. - answerBaselines (track changes) _________ assigns numbers to each version. - answerVersioning _________ serve as important configuration artifacts. - answerDiagrams _________ and _________ help ensure a stable operating environment. - answerChange and Configuration Management Purchasing an insurance policy is an example of which risk management strategy? - answerRisk Transference What two factors are used to evaluate a risk? - answerLikelihood and Impact What term best describes making a snapshot of a system or application at a point in time for later comparison? - answerBaselining What type of security control is designed to stop a security issue from occurring in the first place? - answerPreventive What term describes risks that originate inside the organization? - answerInternal What four items belong to the security policy framework? - answerPolicies, Standards, Guidelines, Procedures _________ describe an organization's security expectations. - answerPolicies (mandatory and approved at the highest level of an organization) _________ describe specific security controls and are often derived from policies. - answerStandards (mandatory) _________ describe best practices. - answerGuidelines (recommendations/advice and compliance is not mandatory) _________ step-by-step instructions. - answerProcedures (not mandatory) _________ describe authorized uses of technology. - answerAcceptable Use Policies (AUP) _________ describe how to protect sensitive information. - answerData Handling Policies _________ cover password security practices. - answerPassword Policies _________ cover use of personal devices with company information. - answerBring Your Own Device (BYOD) Policies _________ cover the use of personally identifiable information. - answerPrivacy Policies _________ cover the documentation, approval, and rollback of technology changes. - answerChange Management Policies Which element of the security policy framework includes suggestions that are not mandatory? - answerGuidelines What law applies to the use of personal information belonging to European Union residents? - answerGDPR What type of security policy normally describes how users may access business information with their own devices? - answerBYOD Policy _________ the set of controls designed to keep a business running in the face of adversity, whether natural or man-made. - answerBusiness Continuity Planning (BCP) BCP is also known as _________. - answerContinuity of Operations Planning (COOP) Defining the BCP Scope: - answerWhat business activities will the plan cover? What systems will it cover? What controls will it consider? _________ identifies and prioritizes risks. - answerBusiness Impact Assessment BCP in the cloud requires _________ between providers and customers. - answerCollaboration _________ protects against the failure of a single component. - answerRedundancy _________ identifies and removes SPOFs. - answerSingle Point of Failure Analysis _________ continues until the cost of addressing risks outweighs the benefit. - answerSPOF Analysis _________ uses multiple systems to protect against service failure. - answerHigh Availability _________ makes a single system resilient against technical failures. - answerFault Tolerance _________ spreads demand across systems. - answerLoad Balancing 3 Common Points of Failure in a system. - answerPower Supply, Storage Media, Networking Disk Mirroring is which RAID level? - answer1 Disk striping with parity is which RAID level? - answer5 (uses 3 or more disks to store data) What goal of security is enhanced by a strong business continuity program? - answerAvailability What is the minimum number of disk required to perform RAID level 5? - answer3 What type of control are we using if we supplement a single firewall with a second standby firewall ready to assume responsibility if the primary firewall fails? - answerHigh Availability _________ provide structure during cybersecurity incidents. - answerIncident Response Plan _________ describe the policies and procedures governing cybersecurity incidents. - answerIncident Response Plans _________ leads to strong incident response. - answerPrior Planning Incident Response Plans should include: - answerStatement of Purpose, Strategies and goals for incident response, Approach to incident response, Communication with other groups, Senior leadership approval _________ should be consulted when developing a plan. - answerNIST SP 800-61 Incident response teams must have personnel available _________. - answer24/7 _________ is crucial to effective incident identification. - answerMonitoring _________ security solution that collects information from diverse sources, analyzes it for signs for security incidents and retains it for later use. - answerSecurity Incident and Event Management (SIEM) The highest priority of a first responder must be containing damage through _________. - answerIsolation During an incident response, what is the highest priority of first responders? - answerContaining the damage You are normally required to report security incidents to law enforcement if you believe a law may have been violated. True or False - answerFalse _________ restores normal operations as quickly as possible. - answerDisaster Recovery What are the initial response goals regarding Disaster Recovery? - answerContain

Meer zien Lees minder
Instelling
2 Certified In Cybersecurity
Vak
2 Certified in Cybersecurity











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
2 Certified in Cybersecurity
Vak
2 Certified in Cybersecurity

Documentinformatie

Geüpload op
4 maart 2024
Aantal pagina's
81
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TheStar Florida State University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
616
Lid sinds
2 jaar
Aantal volgers
179
Documenten
24416
Laatst verkocht
13 uur geleden
Stuvia Prodigy

Tested, Verified and Updated Study Materials with 100% Guaranteed Success.

3,8

122 beoordelingen

5
58
4
22
3
21
2
4
1
17

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen