CISSP Section 2 Flashcards

(34 cards)

1
Q

1 When switching to hardware encryption from Software encryption, What is most important? What is not?

A

security level offered by hardware encryption compared to software encryption. Not if it compatibale to exisitng systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What is better at protecting data? A: using strong encryption or password or B: access control
A

access control.because they ensure that only authorized users can access the data dictionary, preventing unauthorized access and potential breaches. Access controls can include measures such as authentication procedures, permissions and rights management, and monitoring and auditing of access activity. Using strong encryption or pasword does not address issues such as managing who has access to the decryption keys. Unauthorized individuals with the password could still access the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

11 How long should you retain data?

A

LEAST amount of time necessary to comply with legal and regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

13 Which is the most effective approach to increase security for the company’s sensitive data? Encryption or MFA

A

Not Enhance data encryption. While enhancing encryption is crucial, encryption alone won’t protect against all potential threats, especially if the keys or passwords are compromised. (MFA) requires users to provide multiple forms of identification before gaining access to a system. This means that even if a malicious actor obtains a user’s password, they would still need another form of verification (like a token or a fingerprint) to access the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

23 Why is symmetric encryption not enough for data in motion? And what is the solution?

A

symmetric (or asymmetric) encyrtion by itself is not enough. VPN is the best because it also includes encryption ensuring the integrity and confidentiality of the data while it is in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

31 What security does CASB provide?

A

CASBs provide both encryption and access control to protect data that is in transit to the cloud, or within the cloud, and to enforce policies for accessing this data. The CASB encrypts data before it is sent to the cloud and decrypts it when it is returned. It also provides fine-grained access control, which allows organizations to enforce policies on who can access what data, under what circumstances. This dual functionality is what makes CASBs uniquely suited to the requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

34 Common sense mistake. Data retention policy. Which is most effective?

A

A policy that allows for data to be retained on a case-by-case basis. I picked “shortest amount of time”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

37 What is the first thing you do to tailor a security plan?

A

Key word here is “Tailoring”. Customized security controls are built based on the organization’s unique needs and risk profile, indicating that the plan has been customized for that specific organization. Customized security controls may include, for instance, specialized access controls, bespoke encryption protocols, or specific incident response procedures. Risk assessments do not indicate tailoring. They are a pre-requisite to tailoring a security plan, as the information gleaned from risk assessments can then be used to create customized security controls, but they, in themselves, are also not an indicator of a tailored security plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

40 Trick question: Conducting regular audits of network traffic

A

Don’t forget to read “network”. You forgot to read that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

41 What is the best way to protect a food formula or software alogrithm?

A

Encrypt the formula and store it on a secure server, Not file with USPTO because you can’t patent a formula and algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

42 What is MAC memory access control?

A

security mechanism that regulates how different parts of a computer system, such as processes or users, can interact with specific memory locations. It ensures that only authorized entities can read, write, or execute data within designated memory regions, preventing unauthorized access and potential security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

44 Trick question. risk assessment vs vulnerability assessment

A

Risk and vulnerability accessment is not the same . If the question ask for risk, the answer should be related to risk, not vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

47 what is cspm
Cloud security posture management

A

CSPM, or Cloud Security Posture Management, is a category of security products that help organizations avoid misconfigurations and reduce risk by checking for deviation from security best practices. CSPM tools continuously monitor and report on an organization’s security status, provide security risk assessment, and suggest remediation steps for the identified misconfigurations and compliance violations in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

49 data sensitivity and data confidendiality mean the same?

A

No. Confidentiality focuses on preventing unauthorized access or disclosure, but it doesn’t take into account other aspects that might be involved in determining sensitivity, such as the potential impact of unauthorized alteration or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

53 what is cloud security gateway

A

CSGs provide visibility and control over cloud infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

63 Which part of CIA does Privilege escalation attack?

A

Privilege escalation refers to a situation where an attacker gains higher access rights on a system or network, often due to system vulnerabilities, and uses them to cause harm or exploit the system further. While this is a serious security concern, it primarily threatens the integrity and availability aspects of the CIA triad rather than confidentiality directly.

17
Q

63 What does Data exfiltration mean?

A

Data exfiltration refers to unauthorized copying, transfer, or retrieval of data from a computer or server. This is a direct attack on the confidentiality aspect of the CIA triad.

18
Q

66 Why is In a file cabinet with a lock not very safe vs a Safe

A

file cabinet with a lock doesn’t protect from environmental elements while a Safe does.

19
Q

70 Which should you do first? A gap analysis or design a plan?

A

First do a gap analysis to identify areas of non-compliance: The first step is to understand the current state of the organization’s software asset management (SAM) practices and identify areas where they may not meet ISO 19770 requirements. By conducting a gap analysis, the organization can pinpoint specific areas that need improvement, which will then inform the development of a comprehensive compliance plan. Developing a comprehensive compliance plan: While this is a critical step in the process, it comes after the gap analysis. A compliance plan is developed based on the results of the gap analysis to address the identified areas of non-compliance and ensure that the organization aligns with ISO 19770 standards

20
Q

what is ISO 15489-1?

A

ISO 15489 establishes the fundamental concepts and principles for creating, capturing, and managing records. This standard applies to records in any format, structure, or technological environment, regardless of time. So its about accessing records based on roles and permissions.

21
Q

70 What is ISO 19770?

A

IT asset management address both the processes and technology for managing software assets and related IT assets

22
Q

76 what is ISO 27000

A

provides a framework for organizations to establish, implement, maintain, and continually improve an Information Security Management System (ISMS). The series offers best practices and guidelines for managing information security risks and protecting sensitive information. Asset management is another important element of the ISO 27000 standard, as it involves identifying and classifying information assets and implementing controls to ensure their security and integrity.

23
Q

91 Is overwriting data on harddrive effective on no data remittance?

A

Generally yes.

24
Q

98 Which step comes first? Develop a data governance framework OR Identify and classify data assets

A

The first step in implementing a data ownership policy is to identify and classify data assets to determine which data is important and needs to be protected. Data classification refers to the process of categorizing data into types, forms, or any other distinct class.

Before such a framework can be established, the organization needs to identify and classify its data assets to determine what needs to be governed.

25
100 What is more effective against data breaches? Firewall or security audits?
Firewall is not be sufficient to address all potential vulnerabilities that could lead to a data breach
26
101 What is the role of a security analyst and what is not their role?
Investigating security breaches and incidents. not implementation of security policies and procedures. that is system admins.
27
102 How do you "ensure" something works?
You do an analysis, not do something technical like server hardening. You do a risk analysis.
28
111 Which is a more important step? A) Data Disposal B) Data Backup
A) Data disposal is more important because you don't want data to be leaked to the wrong person.. With data backup, its not as important.
29
115 What is a data custodian?
A data custodian is an individual or team responsible for the technical management and stewardship of data within an organization. They are the IT professionals who ensure data is stored securely, readily accessible, and managed according to the data owner's specifications. Essentially, they are the "caretakers" of the data from a technical perspective.
30
117 What is the primarly role of a security analyst? And not their primarily role?
Find vulernabilities. Not monitoring.
31
117 What is the primary role of the security engineer? And not their primarily role
primary role is the implementation of security controls based on the vulnerabilities identified by security analysts. It is not designing.
32
123 Does overwriting with 0 and 1 work on SSDs?
No it doesn't. This is because of the wear-leveling algorithms that SSDs use to prolong their lifespan, which ensure data isn't repeatedly written to the same cells.
32
119 What are the 3 factors in the data retention policy?
The crux of a data retention policy lies within legal, security, and financial implications.. It is not technological.
33