Chapter 16: Security Governance and Compliance

Chapter 16: Security Governance and Compliance

University

20 Qs

quiz-placeholder

Similar activities

Cloud Architecting - Week 9

Cloud Architecting - Week 9

University

20 Qs

Test blanc

Test blanc

University

20 Qs

Cyber EOP - Internet, Intranet, and Extranet  By Mr. B

Cyber EOP - Internet, Intranet, and Extranet By Mr. B

12th Grade - University

18 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

Mitigating Data Loss

Mitigating Data Loss

University

20 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

25 Qs

SYO 701 INTRO TO SECURITY Module FC-2

SYO 701 INTRO TO SECURITY Module FC-2

University

20 Qs

Chapter 16: Security Governance and Compliance

Chapter 16: Security Governance and Compliance

Assessment

Quiz

Computers

University

Medium

Created by

Fhaa Lossx

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Joe is authoring a document that explains to system administrators one way in which they might comply with the organization's requirement to encrypt all laptops. What type of document is Joe writing?

Policy

Guideline

Procedure

Standard

Answer explanation

Key Phrase: "One way to comply"

Explanation:
Correct Answer (B): Joe is writing a guideline because the key phrase “one way” suggests a non-mandatory approach to compliance. Guidelines offer recommendations rather than enforceable rules.

Why others are wrong:

  • A: Policy - Policies are mandatory and define required behaviors, which is not indicated in the scenario.

  • C: Procedure - A procedure would involve a detailed step-by-step process, which isn’t described here.

  • D: Standard - Standards are also mandatory and enforceable, but Joe is describing one option for compliance, not a strict requirement.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which one of the following statements is NOT true about compensating controls under PCI DSS?

Controls used to fulfill one PCI DSS requirement may be used to compensate for the absence of a control needed to meet another requirement.

Controls must meet the intent of the original requirement.

Controls must meet the rigor of the original requirement.

Compensating controls must provide a similar level of defense as the original requirement.

Answer explanation

Key Phrase: "Compensating controls"

Explanation:
Correct Answer (A): PCI DSS compensating controls must meet the same rigor as the original control, but they cannot be used across different requirements. The original requirement must be met independently, and compensating controls should address gaps in specific requirements.

Why others are wrong:

  • B: Controls must meet the intent of the original requirement - This is correct. Compensating controls should fulfill the original intent of the requirement.

  • C: Controls must meet the rigor of the original requirement - This is also true; compensating controls should not be less rigorous than the original control.

  • D: Compensating controls must provide a similar level of defense as the original requirement - This is correct as well. Compensating controls should offer an equivalent level of protection.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What law creates privacy obligations for those who handle the personal information of European Union residents?

HIPAA

FERPA

GDPR

PCI DSS

Answer explanation

Key Phrase: "Personal information of EU residents"

Explanation:
Correct Answer (C): The General Data Protection Regulation (GDPR) governs the handling of personal data for residents of the European Union, imposing strict privacy requirements.

Why others are wrong:

  • A: HIPAA - HIPAA applies to the healthcare industry and U.S. citizens' health data.

  • B: FERPA - FERPA applies to educational institutions in the U.S. and governs student records, not personal data in general.

  • D: PCI DSS - PCI DSS applies to payment card information, not general personal data privacy.

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which one of the following is NOT one of the five core security functions defined by the NIST Cybersecurity Framework?

Identify

Contain

Respond

Recover

Answer explanation

Key Phrase: "Core security functions"

Explanation:
Correct Answer (B): The NIST Cybersecurity Framework includes the following five core functions: Identify, Protect, Detect, Respond, and Recover. "Contain" is not one of them.

Why others are wrong:

  • A: Identify - This is one of the five core functions: understanding assets, risks, and vulnerabilities.

  • C: Respond - This is a core function: responding to detected cybersecurity events.

  • D: Recover - This is a core function: restoring capabilities after a cybersecurity event.

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What ISO standard provides guidance on privacy controls?

27002

27001

27701

31000

Answer explanation

Key Phrase: "Privacy controls"

Explanation:
Correct Answer (C): ISO 27701 specifically provides guidelines on privacy controls and how to integrate them with ISO 27001, which is focused on information security management.

Why others are wrong:

  • A: ISO 27002 - ISO 27002 provides guidelines on the implementation of information security controls, not privacy-specific ones.

  • B: ISO 27001 - ISO 27001 is focused on information security management systems, not specifically privacy.

  • D: ISO 31000 - ISO 31000 provides guidelines on risk management, not privacy.

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which one of the following documents must normally be approved by the CEO or a similarly high-level executive?

Standard

Procedure

Guideline

Policy

Answer explanation

Key Phrase: "Approved by the CEO or high-level executive"

Explanation:
Correct Answer (D): Policies usually require approval from senior leadership, such as the CEO, because they are mandatory and set the direction for the organization’s security practices.

Why others are wrong:

  • A: Standard - While standards are important, they often do not require CEO approval, though they do need executive endorsement.

  • B: Procedure - Procedures are operational and often approved by department heads or managers, not necessarily the CEO.

  • C: Guideline - Guidelines are optional and do not typically require high-level approval.

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Greg would like to create an umbrella agreement that provides the security terms and conditions for all future work that his organization does with a vendor. What type of agreement should Greg use?

BPA

MOU

MSA

SLA

Answer explanation

Key Phrase: "Umbrella agreement"

Explanation:
Correct Answer (C): An MSA (Master Service Agreement) is a long-term contract that outlines the general terms and conditions for all future work with a vendor, including security requirements. It serves as the overarching agreement, with project-specific details covered in statements of work (SOWs).

Why others are wrong:

  • A: BPA - A BPA (Blanket Purchase Agreement) is typically used for purchasing goods and services in an ongoing relationship, not specifically for security terms.

  • B: MOU - An MOU (Memorandum of Understanding) is a non-binding agreement that outlines general intentions but doesn't typically cover detailed security terms.

  • D: SLA - An SLA (Service Level Agreement) focuses on service performance and quality, not overarching terms or security conditions.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?