Chapter 4 & 5 - Risk Management and Incident Response

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Summarize the strategies that can be chosen by an organization when planning for business continuity.

1. Empower your team. 2. Enhance your reporting 3. Keep communication constant. 4. Automate as much as possible. 5. Provide the necessary tools.

A(n) _____ is a detailed examination of the events that occurred during an incident or disaster, from first detection to final recovery

AAR (after-action review)

Risk _____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.

Appetite

A threat _____ is an evaluation of the threats to information assets, including a determination of their likelihood of occurrence and potential impact of an attack.

Assessment

____ is the process of assigning financial value or worth to each information asset.

Asset valuation

Of the three types of mitigation plans, the _____ plan is the most strategic and long-term, as it focuses on the steps to ensure the continuation of the organization.

Business Continuity

The CPMT should include a _____ who is a high-level manager to support, promote, and endorse the findings of the project and could be the COO or (ideally) theCEO/president.

Champion

Ideally, the _____, systems administrators, the chief information security officer (CISO), and key IT and business managers should be actively involved during the creation and development of all CP components

Chief Information Officer

_____ are the fixed moral attitudes or customs of a particular group.

Cultural Mores

The most common schedule for tape-based backup is a _____ backup, either incremental or differential, with a weekly off-site full backup

Daily on-site

Incident _____ assessment is used to determine the impact from a breach of confidentiality, integrity, and availability on information and information assets.

Damage

_____ is the rapid determination of the scope of the breach in the confidentiality, integrity, and availability of information and information assets during or just following an incident.

Damage Assessment

_____ use allows copyrighted materials to be used to support news reporting, teaching, scholarship, and similar activities, if the use is for educational or library purposes,is not for profit, and isnot excessive.

Fair

A data classification scheme is a formal access control methodology used to assign a level of availability to an information asset and thus restrict when people who can access it.

False

A recovery time objective (RTO) is the total amount of time the system owner or authorizing official is willing to accept for a business process outage or disruption.

False

A security clearance is a component of a data classification scheme that assigns a status level to systems to designate the maximum level of classified data that may be stored on them.

False

A(n) DR plan ensures that critical business functions continue if a catastrophic incident or disaster occurs. _____

False

A(n) disaster recovery plan includes the steps necessary to ensure the continuation of the organization when a disaster's scope or scale exceeds the ability of the organization to restore operations, usually through relocation of critical business functions to an alternate location. ______________

False

An attack, breach of policy, or other incident always constitutes a violation of law, requiring notification of law enforcement.

False

Changes to systems logs are a possible indicator of an actual incident.

False

Cost-benefit analyses (CBAs) cannot be calculated after controls have been functioning for a time, as observation over time prevents precision in evaluating the benefits of the safeguard and determining whether it is functioning as intended.

False

In a cost-benefit analysis, a single loss expectancy (SLE) is the calculated value associated with the most likely loss from an attack; the SLE is the product of the asset's value and the annualized loss expectancy.

False

Knowing yourself means identifying, examining, and understanding the threats facing the organization's information assets

False

Risk acceptance defines the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility. _____

False

Risk perception is the assessment of the amount of risk an organization is willing to accept for a particular information asset, typically part of the risk appetite. _____

False

The computer security incident response team is composed solely of technical IT professionals who are prepared to detect, react to, and recover from an incident

False

When an organization depends on IT-based systems to remain viable, InfoSec and the discipline of asset management must become an integral part of the economic basis for making business decisions. _____

False

Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?

Financial Services Modernization Act

A resumption location known as a ____ is a fully configured computer facility capable of establishing operations at a moment's notice.

Hot site

Each of the following is a role for the crisis management response team EXCEPT:

Informing local emergency services to respond to the crisis

Understanding the _____ context means understanding elements that could impact or influence the RM process such as the organization's governance structure (or lack thereof), the organization's internal stakeholders, as well as the organization's culture.

Internal

The probability that a specific vulnerability within an organization will be attacked by a threat is known as _____

Likelihood

_____ is the probability that a specific vulnerability within an organization's assets will be successfully attacked.

Likelihood

The total amount of time the system owner or authorizing official is willing to accept for a business process outage or disruption is _____.

MTD ( Maximum tolerable downtime)

The _____ risk treatment strategy attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards.

Mitigation

When deciding which information assets to track, consider the following asset attributes: people, _____, data, software, and hardware.

Procedures

____ uses a number of hard drives to store information across multiple drive units

RAID

The maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources is ____.

Recovery Time Objective (RTO)

s each information asset is identified, categorized, and classified, a(n) _____ value must be assigned to it.

Relative

The transfer of transaction data in real-time to an off-site facility is called ____.

Remote journaling

Incident _____ is the set of activities taken to plan for, detect, and correct the impact of an incident on information assets.

Response

_____ equals the probability of a successful attack multiplied by the expected loss from a successful attack plus an element of uncertainty.

Risk

Risk _____ is a determination of the extent to which an organization's information assets are exposed to risk.

Risk Assessment

A service bureau is an agency that provides a service for a fee. _____

True

Establishing a competitive business model, method, or technique enables an organization to provide a product or service that is superior and creates a(n) competitive advantage. _____

True

Incident classification is the process of examining an adverse event or incident candidate and determining whether it constitutes an actual incident.

True

Incident response is an organization's set of planning and preparation efforts for detecting, reacting to, and recovering from an incident.

True

Prior to the development of each of the types of contingency planning documents, the CP team should work to develop the policy environment. _____

True

Prior to the development of each of the types of contingency planning documents, the CP team should work to develop the policy environment.

True

Residual risk is the risk that organizations are willing to accept even after current current controls have been applied.

True

Risk control, also known as risk treatment, is the application of controls that reduce the risks to an organization's information assets to an acceptable level.

True

The code of ethics put forth by (ISC) focuses on four mandatory canons: "Protect society, the commonwealth, and the infrastructure; act honorably, honestly, justly, responsibly, and legally; provide diligent and competent service to principals; and advance and protect the profession." _____

True

The disaster recovery preparation team (DRPT) is the team responsible for designing and managing the DR plan by specifying the organization's preparation, response, and recovery from disasters.

True

The organization must choose one of two philosophies that will affect its approach to IR and DR as well as subsequent involvement of digital forensics and law enforcement: the two approaches are protect and forget, and apprehend and prosecute.

True

The threats-vulnerabilities-assets (TVA) worksheet is a document that shows a comparative ranking of prioritized assets against prioritized threats, with an indication of any vulnerabilities in the asset/threat pairings.

True

The upper management of an organization must structure the IT and information security functions to defend the organization's information assets.

True

The value of information to the organization's competition should influence the asset's valuation.

True

To determine if the risk to an information asset is acceptable or not, you estimate the expected loss the organization will incur if the risk is exploited.

True

Flaws or weaknesses in an information asset, security procedure, design, or control that can be exploited accidentally or on purpose to breach security are known as _____.

Vulnerabilities

A(n) _____ plan ensures that critical business functions continue if a catastrophic incident or disaster occurs.

business continuity

A fundamental difference between a BIA and risk management is that risk management focuses on identifying threats, vulnerabilities, and attacks to determine which controls can protect information, while the BIA assumes _____.

controls have proven ineffective controls have failed controls have been bypassed All of the above

In 2002, Congress passed the Federal Information Security Management Act (FISMA), which mandates that all federal agencies _____

develop policies and procedures based on risk assessments provide security awareness training periodic assessment of risk all of the other answers are correct

An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor with a ____ backup strategy.

disk-to-disk-to-cloud

A potential disadvantage of a timeshare site-resumption strategy is:

more than one organization might need the facility


Ensembles d'études connexes

Ch. 31: The Nurse in the Schools

View Set

Difference between reducing valve and regulator, operation of flow restrictors, Bourdon gauges, and Thorpe tubes, effects of downstream pressure on meters, laboratory value that increases during hypoxia, clinical signs of mild/moderate and severe hypoxia,

View Set

Chapter 12: Marketing Channels: Delivering Customer Value

View Set

Chapter 18: Marketing in a Global Economy

View Set

POL California Life: Contract Law

View Set

Ch 18 Intraoperative Nursing Management

View Set

AP Gov. Chapter 2 Quiz Questions

View Set