- A group of regulations implemented by the European Union (EU) to protect personal data of EU citizens. GDPR (General Data Protection Regulation)
- A security attack is defined as which of the following? Malicious threat
- A security attack is defined as which of the following? An event that has been identified by correlation and analytics tools a malicious activity.
- An attack or security event that has been reviewed by IBM security analysts or the world at large and deemed worthy of deeper investigation. Incident/Security Incident
- An event on a system or network detected by a security device or application. So this can be any normal activity from entering a password. That’s a security event. IT can be a firewall rule check. That’s a security event. IT’s not the same as an attack Security event
- An identified or identifiable natural person. Data subject
- Any information relating to a data subject Personal Data
- Any operation performed on personal data (includes storage, access) anywhere in the world Processing
- are more procedural. These are how the servers configured. What are the rules for how often you patch a system? Who’s responsible for monitoring the logs and reviewing them? How your staff are trained and wat activities they perform. These are operational or procedural controls. Operational Controls
- are tooling or software or features and functions that restrict or control the security of the data or the processes. So you can think of encryption, you think of logging, you can think of password software, all of these are examples of technical controls. Technical Controls
- designed to focus on protecting your environment and your systems from theft, from damage, from disruption and from misdirection. Comes in three categories: physical controls, technical controls, and operational controls. Security
- determines the purpose and means of processing personal data Controller
- General specifications, not specific to any industry. Important, but not legally required. ISO 27001 as an example, or SOC Foundational Compliance
- HIPAA Administrative safeguards include which two (2) of the following? Workface training and management, and security personnel
- HIPAA Administrative safeguards include which two (2) of the following? Workforce training and management, and Security Personnel
- HIPAA Administrative safeguards include which two (2) of the following? – Security Personnel
– Workforce Training and Management - HIPAA Physical safeguards include which two (2) of the following? Facility Access and Control, and Workstation and Device Security
- HIPAA Physical safeguards include which two (2) of the following? – Workstation and Device Security
– Facility Access and Control - If you are a mature organization which CIS Controls Implementation Group would you use? Implementation Group 3
- In which CIS control category will you find Incident Response and Management? Organizational
- In which CIS control category will you find Incident Response and Management? Organizational
- is the subset of the security events. It is a security event that has been identified by correlation and analytics tools as a malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself. Attack/Security Attack
- One PCI Requirement is using an approved scanning vendor to scan at what frequency? Quarterly
- One PCI Requirement is using an approved scanning vendor to scan at what frequency? Quarterly
- PCI includes 264 requirements grouped under how many main requirements? 12
- PCI includes 264 requirements grouped under how many main requirements? 12
- PCI uses which three (3) of the following Card Holder Data Environment categories to determine scope? People, processes, and technology
- PCI uses which three (3) of the following Card Holder Data Environment categories to determine scope? – Technology
– Processes
– People - processes personal data on behalf of the controller Processor
- Regulations or standards specific to an industry or dealing with a specific type of data. Often legal requirements. Industry Compliance
- strongly focused on data. How information is used, who that information is shared with, or if that information is used to track users. Who has access to the data? How is it stored? How is it transferred? Privacy
- tests that security measures are in place. Which and how many depend on the specific compliance. Often will cover additional non-security requirements such as business practices, vendor agreements, organizational controls, etc. There are generally two types of compliance. Foundational and Industry. Compliance
- The HIPAA security rule requires covered entites to maintain which two (2) reasonable safeguards for protecting e-PHI? – Physical
– Technical - The HIPAA security rule requires covered entities to maintain which two (2) reasonable safeguards for protecting e-PHI Physical, and Technical
- The HIPAA Security Rule requires covered entities to maintain which three (3) reasonable safeguards for protecting e-PHI? physical, administrative, technical
- The HIPAA Security Rule requires covered entities to maintain which three (3) reasonable safeguards for protecting e-PHI? – Administrative
– Physical
– Technical - these are for the servers in the data centers. So how do you physically keep your systems that you’re operating your applications on contained, right? How do you ensure the physical security of the hardware? Physical Control
- Under GDPR who determines the purpose and means of processing of personal data? Controller
- Under GDPR who determines the purpose and means of processing of personal data? Controller
- Under the International Organization for Standardization (ISO) which standard focuses on Privacy? ISO 27018
- Under the International Organization for Standardization (ISO) which standard focuses on Privacy? X – ISO 27001
X – ISO 27003 - What is an auditor looking for when they test control the control for implementation over an entire offering with no gaps? Completeness
- What is an auditor looking for when they test the control for implementation over an entire offering with no gaps? consistency?
- What year did the European Union start enforcing GDPR? 2018
- What year did the GDPR come into effect? 2018
- Which is NOT one of the security controls? Testing
- Which is NOT one of the security controls? Testing
- Which is the foundational principal that everyone will get during a SOC audit? Security
- Which is the foundational principle that everyone will get during a SOC audit? Security
- Which of the bad guys are described as “They are “in” an organization but are human and make mistakes”? Inadvertent Actor
- Which of the bad guys are described as “They are “in” an organization but are human and make mistakes“? Inadvertant Actor
- Which order does a typical compliance process follow? Establish scope, readiness assessment, gap remediation, testing/auditing, management reporting
- Which SOC report is closest to an ISO report? Type 1
- Which three (3) of these obligations are part of the 5 key GDPR obligations? Accountability of Compliance, Consent, Rights of EU Data Subject
- Which three (3) of these obligations are part of the 5 key GDPR obligations? Check all that apply – Consent
– Accountability of Compliance
– Rights of EU Data Subject - Who is the governing entity for HIPAA? Department of Health and Human Services’
- Who is the governing entity for HIPAA? US Department of Health and Human Services Office of Civil Rights
Other Links:
See other websites for quiz:
Check on QUIZLET
